Nothing Special   »   [go: up one dir, main page]

US20220358185A1 - Traversing data structures for compliance - Google Patents

Traversing data structures for compliance Download PDF

Info

Publication number
US20220358185A1
US20220358185A1 US15/368,127 US201615368127A US2022358185A1 US 20220358185 A1 US20220358185 A1 US 20220358185A1 US 201615368127 A US201615368127 A US 201615368127A US 2022358185 A1 US2022358185 A1 US 2022358185A1
Authority
US
United States
Prior art keywords
report
semantic
data
map
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/368,127
Inventor
David Newman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wells Fargo Bank NA
Original Assignee
Wells Fargo Bank NA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wells Fargo Bank NA filed Critical Wells Fargo Bank NA
Priority to US15/368,127 priority Critical patent/US20220358185A1/en
Assigned to WELLS FARGO BANK, N.A. reassignment WELLS FARGO BANK, N.A. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NEWMAN, DAVID
Publication of US20220358185A1 publication Critical patent/US20220358185A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G06F17/30589
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/211Schema design and management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/282Hierarchical databases, e.g. IMS, LDAP data stores or Lotus Notes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • G06F16/367Ontology
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/80Information retrieval; Database structures therefor; File system structures therefor of semi-structured data, e.g. markup language structured data such as SGML, XML or HTML
    • G06F16/84Mapping; Conversion
    • G06F16/86Mapping to a database
    • G06F17/248
    • G06F17/2705
    • G06F17/30734
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/186Templates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/205Parsing
    • G06F17/241
    • G06F17/30371
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/169Annotation, e.g. comment data or footnotes

Definitions

  • Embodiments described herein generally relate to parsing data structures and in particular, but without limitation, to traversing data structures for compliance.
  • a blockchain may contain one or more blocks.
  • a block may include one or more data entries.
  • a hash may be included in each block that is based on the content of previous blocks in the blockchain.
  • FIG. 1 is a diagram depicting relationships between objects that may be in a contract, according to various examples.
  • FIG. 2 is a semantic representation of a sentence, according to various examples
  • FIG. 3 illustrates a schematic diagram of validating a data structure, according to various examples
  • FIG. 4 is a diagram illustrating a semantic representation of an interest rate swap, according to various examples
  • FIG. 5 illustrates a flowchart of a method of adding a compliance signature to a data structure, according to various examples
  • FIG. 6 illustrates a schematic diagram of a system of using smart contracts and a blockchain
  • FIG. 7 illustrates a schematic diagram of auditing and reporting using a blockchain, according to various examples
  • FIG. 8 illustrates a schematic diagram of a system for generating a report block, according to various embodiments
  • FIG. 9 illustrate a diagram of a logic annotation, according to various embodiments.
  • FIG. 10 illustrates a schematic diagram of a report block, according to various embodiments.
  • FIG. 11 illustrates a flowchart of a method of, according to various examples
  • FIG. 12 is a block diagram illustrating an example machine upon which any one or more of the techniques (e.g., methodologies) discussed herein may be performed, according to an example embodiment.
  • An ontology may be as a taxonomy of objects for a given field-different fields may use different ontologies.
  • the ontology may identify types, properties, and interrelationships between the objects.
  • an ontology may be used to determine if data complies with the ontology.
  • the definition of an ontology is described a schema.
  • the schema may include a number of entries that define the properties of a Person object such as “given name,” “height,” “weight,” etc., and the properties may also have expected types.
  • the “height” property may have a quantitative type where as “given name” may be text.
  • the excepted type of an object may be another object such as a property of “knows” having an expected type of Person. Accordingly, the data string “Alice knows Bob” can be thought of as two Person objects with the Alice having the “knows” property.
  • S-P-O Subject, Predicate, Object
  • FIG. 1 depicting relationships between objects that may be in a contract.
  • Industry groups may promulgate schemas/ontologies for use by their members or for communicating with their members.
  • FIBOTM Financial Industry Business Ontology
  • FIG. 1 depicts relationships between objects that may be in a contract.
  • Industry groups may promulgate schemas/ontologies for use by their members or for communicating with their members.
  • FIBOTM Financial Industry Business Ontology
  • FIG. 1 depicting relationships between objects that may be in a contract.
  • FIBOTM Financial Industry Business Ontology
  • FIG. 2 illustrates the concept of “Corporate Ownership” as used in a semantic ontology, according to an example.
  • the example uses the S-P-O format discussed above.
  • One flexibility of a semantic ontology is that data from any number of sources may be standardized and harmonized. Accordingly, once a data store (e.g., file system, relational database, NoSQL database, flat file database) is populated with enough semantically intact data, the data may be mined, stored, queried, audited, and validated.
  • the data may originate in a number of forms such as unstructured data, a spreadsheet, a relational database, Extensible Markup Language (XML), JavaScript Object Notation, etc.
  • XML Extensible Markup Language
  • a service may map or translate the various formats into a common format for easier data mining.
  • a webpage may include the unstructured data “Global Bank owns>50% voting shares of London Bank.” This data may be parsed into the S-P-O format of subject: Global Bank; predicate: owns; and object: London Bank.
  • the service may update a database to indicate the relationship between Global Bank and London Bank according to a defined schema.
  • Regulators may use this information when analyzing more complex transactions. For example, after enough data has been inputted into a data store, regulators—as well as financial institutions—may quickly perform systemic risk analysis or compliance with regulation W. Other use cases may be readily apparent to a person of ordinary skill in the art without departing from the scope of this disclosure and may vary depending on the technology area.
  • a web service may be provided that validates data according to a known schema and provides a digital compliance signature indicating the data is valid.
  • FIG. 3 illustrates a schematic diagram 300 of validating a data structure, according to various example embodiments.
  • the diagram 300 illustrates validating system 302 , unvalidated data structure 304 , validated data structure 306 , and blockchain 308 .
  • the validating system 302 includes compliance subsystem 310 , classification subsystem 312 , attribution subsystem 314 , and signature subsystem 316 , according to various examples.
  • the servers and components of the diagram 300 may communicate via one or more networks (not shown).
  • the networks may include local-area networks (LAN), wide-area networks (WAN), wireless networks (e.g., 802.11 or cellular network), the Public Switched Telephone Network (PSTN) network, ad hoc networks, cellular, personal area networks or peer-to-peer (e.g., Bluetooth®, Wi-Fi Direct), or other combinations or permutations of network protocols and network types.
  • the networks may include a single local area network (LAN) or wide-area network (WAN), or combinations of LAN's or WAN's, such as the Internet.
  • the validating system 302 may provide an Application Programming Interface (API) to publishers of a transaction.
  • a publisher may be any entity that wants to have data validated against an ontology.
  • a publisher may be a financial institution such as a bank, corporation, brokerage, closing company, etc.
  • a transaction may be a set of data that defines one or more properties of an entity within an ontology. For convenience, FIG. 3 will be discussed as an interest rate swap between two banks.
  • FIG. 4 is a diagram illustrating a semantic representation of an interest rate swap, according to various examples.
  • the interest rate swap may be encapsulated into a format for validation by the validating system 302 .
  • Examples of encapsulation formats include, but are not limited to, XML and JavaScript Object Notation-Linked Data (JSON-LD).
  • JSON-LD JavaScript Object Notation-Linked Data
  • An addition component of JSON-LD is the identification of a schema that the payload of the JSON-LD is supposed to adhere to (referred to as the validation source in FIG. 3 )
  • JSON-LD encoding may be used for a swap contract such as displayed in FIG. 4 :
  • the validating system 302 may include at least one web server to respond to API calls from publishers of data, such as unvalidated data structure 304 .
  • the validating system 302 may also include at least one processor to execute subsystems 310 - 316 .
  • the execution of the subsystems may take place in one physical computing device or be distributed across multiple computing devices. In some instances, more than one computing device completes the same task (e.g., first to complete).
  • the computing devices may be located in one geographic area or distributed across multiple geographic areas.
  • the compliance subsystem 310 compares the payload of unvalidated data structure 304 to a schema as defined by the validation source. Validating may include retrieving the rules for the various entities in the payload checking for their compliance. For example, the schema may indicate that the type “SwapContract” requires two “Party” types. If the payload fails to include two parties, the unvalidated data structure 304 would be rejected as failing to comply with the schema and not added to a blockchain. In an example, the compliance subsystem 310 calls a third-party service to check the payload for validation.
  • the classification subsystem 312 may modify the payload if additional classifications of objects can be inferred by data in the payload.
  • the JSON-LD states the first type is that of a “SwapContract” with one leg having a “hasRate” type and the second leg having a “FloatingRatelndex” type.
  • the schema identified in the validation source may indicate that a SwapContract that includes the “hasRate” type and the “FloatingRatelndex” type is properly classified as a “FixedFloatlnterestRateSwapContact.” Accordingly, classification subsystem 312 may modify “SwapContract” to “FixedFloatInterestRateSwapContact.”
  • a data structure examined by validating system 302 includes a digital signature of the publisher.
  • the digital signature may be a hash of the payload (or of the payload and validation source) encrypted using the private key of the publisher.
  • the attribution subsystem 314 may retrieve the public key-either included with the JSON-LD message or from a registry—of the publisher to decode the hash of the payload.
  • the attribution subsystem 314 may also create a hash of the payload which is compared with the decoded hash. If the two hashes match, the publisher may be considered verified. Other types of attribution techniques may be used without departing from the scope of this disclosure.
  • the signature subsystem 316 may attach a compliance signature to the unvalidated data structure 304 to create validated data structure 306 .
  • the compliance signature may be based a hash the payload and optionally the validator source and publisher signature.
  • the hash may be signed using the private key of the validating system 302 .
  • the validated data structure 306 represents an example format of a compliance signed data structure.
  • the validated data structure 306 may be added to a blockchain.
  • the payload is not included in the blockchain, but only signed hashes of the payload.
  • the blockchain may include all the previous swap contracts; although the blockchain may not be limited to only swap contracts. Accordingly, anyone with the blockchain may trust another party that indicates the swap contract described in the example above is valid based on the signed hash or signed payload outputted by validating system 302 .
  • adding the validated data structure 306 to the blockchain is accomplished by distributing the validated data structure 306 to numerous anonymous servers.
  • the servers may need to complete a computationally difficult calculation in order to add validated data structure 306 to the blockchain.
  • the calculation may require using a hash of previously added information to the blockchain. In such as a manner, the blockchain becomes difficult to improperly modify.
  • the blockchain may be trusted by other parties despite the anonymous nature of the servers.
  • a party could take the public key of validating system 302 to decode the compliance signature, resulting in the hash of the payload.
  • the party could independently calculate the hash of the payload and compared to the decoded hash. If the hashes match, the party can know that the transaction in the payload is valid and attributable to the publisher.
  • the compliance signature does not include the publisher signature in the hash.
  • blockchain includes the payload signed by both the publisher and the validating system 302 .
  • FIG. 5 illustrates a flowchart of method of adding a compliance signature to a data structure. The method may be performed by executing, using at least one processor, instructions stored on a non-transitory computer-readable medium.
  • an electronic data structure may be received.
  • the electronic data structure may include a location of a validation source for a payload of the data structure.
  • the location may be a uniform resource identifier that links to a semantic schema.
  • the semantic schema may be retrieved (operation 504 ).
  • the semantic schema may identify rules such as names of object types (also referred to an elements), properties of object types, valid values for the properties, restriction on operations of object types with respect to other object types, among other things.
  • the data structure may also include a payload.
  • the payload may identify at least one object type, a property of the object, and a value for the property. Multiple objects may be included in the data structure as well multiple different object types.
  • the electronic data structure conforms to the JSON-LD format.
  • the data structure may also include a digital signature of the publisher of the electronic data structure.
  • the data structure may be validated according to the semantic schema.
  • the rules of the semantic schema may be compared to the elements of the data structure for validation. For example, properties included in the data structure may be compared to valid properties according to the schema. Similarly, the values for the properties may be compared to the valid values for the properties.
  • An element of the payload may be modified based on the schema.
  • the schema may identify a hierarchy of elements (parent/child, genus/species, etc.).
  • the data structure may identify a genus object but an examination of the properties of the genus object may be used to infer the genus could only be one of the species objects. Thus, the genus object may be altered to the species.
  • an electronic compliance signature may be appended to the data structure.
  • the payload may be hashed and encrypted using a private key to create the electronic compliance signature.
  • a blockchain that includes at least one block with at least one transaction may be retrieved.
  • the hashed payload signed by the electronic compliance signature may be appended to the blockchain.
  • the payload with the compliance signature is appended to the block chain instead of (or in addition to) a hashed version of the payload.
  • Different version of the payload may be appended to the blockchain.
  • two versions of the payload may be appended to the blockchain: one hashed payload with the changes and one hashed payload without the changes.
  • the hashes may be signed as indicated above. Additionally, sometimes the hash may include the digital signature of the publisher and other times the hash may be created without the digital signature.
  • Standardized ontologies and blockchains may have additional uses beyond, or in addition to, the data validation methods described above.
  • smart contracts may leverage the ontology in describing the components of a contract.
  • a smart contract may be a contract that is described in terms of an electronic program construct as opposed to written in prose.
  • a smart contract may be partially or completely automated.
  • a smart contract may define, programmatically (e.g., functionally, procedural), conditional logic with respect to the performance of the contract. For example, consider a relatively straightforward exchange stock purchase. Via a broker, a user may offer to purchase X dollars worth of a stock at a certain price. The user may an account with the broker with money set aside for the purchase. Upon the stock being at the price, the broker may purchase the stock on behalf of the user and debit the user's account.
  • the state of the contract may be stored in blockchain.
  • each variable of a contract e.g., the stock price in the previous example
  • fraud may occur if one party updates the state of the contract with an invalid/incorrect value. For example, if a nefarious party changes the state to indicate there is more money in an account then there is actually is a stock trade may execute even if there is not enough money to cover the cost of the purchase.
  • FIG. 6 illustrates a schematic diagram of a system of using smart contracts and a blockchain.
  • the system illustrates blockchain provider 602 , a first party 604 , a second party 606 , and a blockchain 608 .
  • the blockchain 608 includes a number of blocks identified as contract template block 610 , block 612 and block 614 .
  • a stateful blockchain In contrast to a stateless blockchain, such as used with bitcoins, a stateful blockchain maintains the values—in this case contract values, among other operational values. The blockchain 608 may therefore be queried to see if a contract may be completed.
  • the benefits of a blockchain is one of trust in a decentralized environment. A query, or update of variable, may be calculated by a number of participating nodes to arrive at the true value of a variable. If a single bad actor tries to change a value, the other nodes will reject it and it will not be added to the blockchain.
  • the blockchain may also include a template for different contracts.
  • the contract templates may be defined according to an ontology, such as FIBO.
  • the format of the data entered on the blockchain 608 may be a JSON-LD encoding adhering to FIBO.
  • the blockchain 608 may be public or private, and may have access right restrictions.
  • the contract identifier may be used by all parties to the contract.
  • the contract identifier may be used by all parties to the contract. For example, consider that the contract trade in FIG. 6 is a swap contract. As described above, a JSON-LD encoding may be used for the swap contract and may begin:
  • the identifier may be used by to find confirmation of the trade across blocks of the blockchain 608 .
  • the confirmation of the trade for party A may be in block 612 and the confirmation of the trade for party B may be in block 614 .
  • the identifier may be hashed onto the blockchain to cryptographically point to two (or more) disparate parts of the blockchain 608 .
  • the hash may be such that the hash may not be used for a different swap. Again, this is different than the stateless blockchain of bitcoin in which anonymity and non-traceability are features.
  • the identifier may be generated by the party that initiates the contract.
  • a stateful blockchain may have a number of terms and conditions.
  • the blockchain 608 may be examined to see which of these conditions have been met and when they were met.
  • the blockchain 608 may also indicate that when a contract has been completed, when both sides of a contract confirm the contract, etc.
  • the contract may also trigger execution of other transactions, also stored on the blockchain 608 (e.g., the state of a variable may trigger execution).
  • a standardized ontology (optionally with validation signatures) on a blockchain is for auditing purposes. Regulations may require that each entry in a report indicate where it came from, when it occurred, other entries/transactions it implicates, etc. When every transaction is verified, and signed as adhering to a standard ontology, auditing because much easier. For example, a federal agency may be given keys to unlock all, or a subset, of encrypted transaction data on a blockchain to verify reports as necessary. The inherent properties of a blockchain coupled with the signed verifications may be give the agency the confidence that no fraudulent data is present. The data in the blockchain may also identify the location of generated regulatory reports as well as the locations of the data necessary to validate the reports.
  • HMDA Home Mortgage Disclosure Act
  • LOB line of business
  • CFPB Consumer Finance Protection Bureau
  • the use of a blockchain provides data security and attribution and immutability.
  • the blockchain may be public or private, and may have access right restrictions.
  • FIG. 7 illustrates a schematic diagram of auditing and reporting using a distributed ledger (e.g., a blockchain), according to various examples.
  • FIG. 7 includes, semantic ontology 702 , financial institution 704 , provenance ontology 706 , app 708 , app 710 , distributed ledger 712 , and report 714 .
  • the lines between app 708 , app 710 , into the distributed ledger 712 may represent report block entries.
  • a report block entry may comprise a series of identifiers to information needed to retrieve and verify a report, such as report 714 . These entries are discussed in further detail in FIGS. 8-10 , but an overview of the system is presented in FIG. 7 .
  • the financial institution 704 may represent an entity that is required to provide one or more reports to one or more government agencies. The use of the system in FIG. 7 is not limited to such uses and may be utilized by other any organization that requires verified reporting.
  • the financial institution 704 may have its own semantic ontology 702 that describes data stored within the financial institution 704 .
  • the semantic ontology 702 is a standardized ontology such as FIBO. In further instances the semantic ontology 702 may be a superset of FIBO.
  • the provenance ontology 706 may define an ontology language to indicate, among other things, roles and identities responsible for entries in a report.
  • the report may include entries in accordance with the provenance ontology 706 that indicate where the data come from, when it was there, etc.
  • the entries corresponding to the provenance ontology 706 are stored in a separate file, such as a provenance log.
  • the provenance log may include entries related to one or more reports.
  • FIG. 7 illustrates that financial institution 704 has a few different lines of business (LOB). Underneath the LOBs, app 708 and app 710 are distinguished from each other based on the line pattern. The line patterns correspond to different blocks in the distributed ledger 712 -indicating different report entries associated with app 708 and 710 .
  • LOB lines of business
  • the distributed ledger 712 may include a reporting block that identifies the various LOBs and associated apps and relevant portions of the distributed ledger 712 related to their respective reports.
  • the identification may be in the form of cryptographic pointer identifying the previous block of the distributed ledger 712 relevant to the report (or previous reports). That previous block may include another pointer that identifies the “next” previous block.
  • a regulatory agency may trace back-in-time through the distributed ledger 712 to retrieve the relevant data for a report associated with a given app and verify it for auditing purposes.
  • FIG. 8 illustrates a schematic diagram of a system for generating a report block.
  • FIG. 8 include report input 802 , semantic ontology 804 , logic annotations 806 , blockchain 808 , automated profiling and mapping component 810 , report execution component 812 , report 814 , semantic map 816 , provenance ontology 820 , and provenance log 822 .
  • the various components in FIG. 8 may be distributed across multiple computing devices in multiple geographic locations, or they may be located in a single computing device in a single location. The execution of the various components may completely automated or partially automated.
  • the report input 802 identifies the data sources that store data for an organization, such as a financial institution.
  • the sources may XML documents, databases, Excel documents, etc.
  • the semantic map 816 may in the form of R2RML, which is a relational database (RDB) to RDF mapping proposed W3C standard.
  • R2RML relational database
  • One purpose of R2RML is to facilitate a map of existing relational data—as encapsulated in one or more databases—to the RDF data model.
  • the input for an R2RML mapping is a logical table that may be a base table, a view, or a valid SQL query.
  • the output of the R2RML is a mapping of the logical table to a RDF using a triple map.
  • a triple map is a rule that takes each row in one of the logical tables to an RDF triple.
  • the rule may have two components, the subject map and a multiple predicate-object map, which may be made up of predicate maps and object maps.
  • the triple for a given database row may be formulated by combining the subject map with a predicate map and an object map.
  • the proposed W3C documentation provides the following, slightly modified, example.
  • EMP database table
  • the EMP table includes three columns: EMPNO, ENAME, JOB.
  • a row of the EMP table is “7639:SMITH:CLERK.”
  • a triple map may for the EMP table may be:
  • the output of the R2RML may be any suitable output of the R2RML.
  • the semantic map 816 may include mappings from the semantic ontology 804 to the report inputs 802 .
  • the semantic map 816 may identify where, within the data sources of an organization, the relevant data for the report 814 is located.
  • a person or computer program-such as automated profile and mapping component 810 may first look to the semantic ontology 804 to see how a mortgage is classified (e.g., what type of object). Then, the semantic map 816 may be parsed to determine what columns in what database tables map to the classification.
  • the report execution component 812 may receive data (e.g., through an API) from the automated profile and mapping component 810 that indicates the location of data for a given report.
  • a report definition template may identify the requirements for a given report. For example, it may be identify what data is needed, in what format, for what time periods, etc.
  • the report execution component may also retrieve logic annotations 806 to facilitate the execution of the report.
  • the logic annotations 806 may define, using the semantic ontology 804 , how to calculate the data for a given report.
  • FIG. 9 illustrate a diagram of a logic annotation. Although shown diagrammatically, the logic annotation may be stored in a XML format adhering to the semantic ontology 804 .
  • FIG. 9 includes blockchain 902 , report 904 , semantic object 906 , and data source 908 .
  • an auditor which may be a computer program, that accesses blockchain 902 , and a report block leads the auditor to report 904 (discussed in further detail with respect to FIG. 10 ).
  • the report 904 may reference one or more semantic objects, such as semantic object 906 .
  • a logic annotations file may be examined. The file may indicate how the object is used with respect to other semantic objects, as well as indicate the data sources for the semantic object. In such a manner, an auditor may independently calculate the data in the report 904 .
  • the logic annotations may include provenance data indicating when the logic annotation file was created, who created it, etc.
  • the report execution component 812 may generate the report 814 using the logic annotations 806 and report input 802 .
  • the report execution component 812 may also gather the locations (e.g., logical locations such as URI locations) of the data sources and attribution sources (e.g., provenance ontology 820 ) are located for a given report. This information may be placed into the report block for a given report as discussed next with reference to FIG. 10 .
  • FIG. 10 illustrates a schematic diagram of a report block, according to various embodiments.
  • a report block may be part of a block of the blockchain.
  • the blockchain may include hundreds, thousands, or more blocks.
  • a report block may include references to locations of files for a given report.
  • the report block may include references to sources files (e.g., the underlying source of data in the report), a location of a semantic map (e.g., R2RML mappings), a reference to logic annotations for semantic objects in the report, a reference to a provenance log, a reference to a semantic ontology used in the report, and a reference to the underlying report itself.
  • sources files e.g., the underlying source of data in the report
  • a semantic map e.g., R2RML mappings
  • the report block may also include a reference to a previous block in the blockchain that includes the previous report (e.g., the report for the previous quarter).
  • the information in the report block may be encrypted, signed, or both.
  • the data is encrypted using a public key of a regulatory agency that needs the report.
  • FIG. 11 illustrates an example method that may be performed by one or more processors executed instructions stored in a non-transitory computer readable medium.
  • a method may include accessing a report definition template ( 1102 ), the report definition template identifying a set of data requirement for a report.
  • a requested report may include a report type.
  • Each template may have a corresponding report type.
  • a database may be queried using the report type to retrieve the corresponding template.
  • the report definition file may identify logic annotations for calculating the semantic object and wherein the location of the logic annotations are transmitted to the blockchain for adding to the report block.
  • the method may further include mapping the set of data requirements to a corresponding semantic object in a semantic ontology ( 1104 ) and parsing a semantic map to determine a database table storing data for the semantic object ( 1106 ).
  • the method may include retrieving the data for the semantic object from the database table ( 1108 ).
  • the method may also include generating a report data file adhering to the semantic object ontology based in part on the retrieved data ( 1110 ).
  • the report data file may the data transmitted for adding to a report block in a blockchain.
  • the method may also include transmitting a logical location of the generated report data file, a logical location of the semantic map, and logical location of the semantic ontology to a blockchain node for adding to a report block in the blockchain ( 1112 ).
  • the method may also include accessing a provenance log identifying an entity that entered the data in the database table.
  • the provenance log may be formatted according to a provenance ontology.
  • the logical location of the provenance log and the provenance ontology may be transmitted to the blockchain node for adding to the report block.
  • the method may further include retrieving an identifier of a previously computed report using the report definition template; querying a database to determine a block identifier for that includes a report block for the previously computed report; and transmitting the block identifier to the blockchain node for adding to the report block in the blockchain.
  • Embodiments described herein may be implemented in one or a combination of hardware, firmware, and software. Embodiments may also be implemented as instructions stored on a machine-readable storage device, which may be read and executed by at least one processor to perform the operations described herein.
  • a machine-readable storage device may include any non-transitory mechanism for storing information in a form readable by a machine (e.g., a computer).
  • a machine-readable storage device may include read-only memory (ROM), random-access memory (RAM), magnetic disk storage media, optical storage media, flash-memory devices, and other storage devices and media.
  • Examples, as described herein, may include, or may operate on, logic or a number of components, modules, or mechanisms.
  • Modules may be hardware, software, or firmware communicatively coupled to one or more processors in order to carry out the operations described herein.
  • Modules may hardware modules, and as such modules may be considered tangible entities capable of performing specified operations and may be configured or arranged in a certain manner.
  • circuits may be arranged (e.g., internally or with respect to external entities such as other circuits) in a specified manner as a module.
  • the whole or part of one or more computer systems may be configured by firmware or software (e.g., instructions, an application portion, or an application) as a module that operates to perform specified operations.
  • the software may reside on a machine-readable medium.
  • the software when executed by the underlying hardware of the module, causes the hardware to perform the specified operations.
  • the term hardware module is understood to encompass a tangible entity, be that an entity that is physically constructed, specifically configured (e.g., hardwired), or temporarily (e.g., transitorily) configured (e.g., programmed) to operate in a specified manner or to perform part or all of any operation described herein.
  • each of the modules need not be instantiated at any one moment in time.
  • the modules comprise a general-purpose hardware processor configured using software; the general-purpose hardware processor may be configured as respective different modules at different times.
  • Software may accordingly configure a hardware processor, for example, to constitute a particular module at one instance of time and to constitute a different module at a different instance of time.
  • Modules may also be software or firmware modules, which operate to perform the methodologies described herein.
  • FIG. 12 is a block diagram illustrating a machine in the example form of a computer system 1200 , within which a set or sequence of instructions may be executed to cause the machine to perform any one of the methodologies discussed herein, according to an example embodiment.
  • the machine operates as a standalone device or may be connected (e.g., networked) to other machines.
  • the machine may operate in the capacity of either a server or a client machine in server-client network environments, or it may act as a peer machine in peer-to-peer (or distributed) network environments.
  • the machine may be an onboard vehicle system, wearable device, personal computer (PC), a tablet PC, a hybrid tablet, a personal digital assistant (PDA), a mobile telephone, or any machine capable of executing instructions (sequential or otherwise) that specify actions to be taken by that machine.
  • PC personal computer
  • PDA personal digital assistant
  • machine shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
  • processor-based system shall be taken to include any set of one or more machines that are controlled by or operated by a processor (e.g., a computer) to individually or jointly execute instructions to perform any one or more of the methodologies discussed herein.
  • Example computer system 1200 includes at least one processor 1202 (e.g., a central processing unit (CPU), a graphics processing unit (GPU) or both, processor cores, compute nodes, etc.), a main memory 1204 and a static memory 1206 , which communicate with each other via a link 1208 (e.g., bus).
  • the computer system 1200 may further include a video display unit 1210 , an alphanumeric input device 1212 (e.g., a keyboard), and a user interface (UI) navigation device 1214 (e.g., a mouse).
  • the video display unit 1210 , input device 1212 and UI navigation device 1214 are incorporated into a touch screen display.
  • the computer system 1200 may additionally include a storage device 1216 (e.g., a drive unit), a signal generation device 1218 (e.g., a speaker), a network interface device 1220 , and one or more sensors (not shown), such as a global positioning system (GPS) sensor, compass, accelerometer, or another sensor.
  • a storage device 1216 e.g., a drive unit
  • a signal generation device 1218 e.g., a speaker
  • a network interface device 1220 e.g., a Wi-Fi
  • sensors not shown
  • GPS global positioning system
  • the storage device 1216 includes a machine-readable medium 1222 on which is stored one or more sets of data structures and instructions 1224 (e.g., software) embodying or utilized by any one or more of the methodologies or functions described herein.
  • the instructions 1224 may also reside, completely or at least partially, within the main memory 1204 , static memory 1206 , and/or within the processor 1202 during execution thereof by the computer system 1200 , with the main memory 1204 , static memory 1206 , and the processor 1202 also constituting machine-readable media.
  • machine-readable medium 1222 is illustrated in an example embodiment to be a single medium, the term “machine-readable medium” may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more instructions 1224 .
  • the term “machine-readable medium” shall also be taken to include any tangible medium that is capable of storing, encoding or carrying instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure or that is capable of storing, encoding or carrying data structures utilized by or associated with such instructions.
  • the term “machine-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, and optical and magnetic media.
  • machine-readable media include non-volatile memory, including but not limited to, by way of example, semiconductor memory devices (e.g., electrically programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM)) and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
  • semiconductor memory devices e.g., electrically programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM)
  • EPROM electrically programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • flash memory devices e.g., electrically programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM)
  • flash memory devices e.g., electrically programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM
  • the instructions 1224 may further be transmitted or received over a communications network 1226 using a transmission medium via the network interface device 1220 utilizing any one of a number of well-known transfer protocols (e.g., HTTP).
  • Examples of communication networks include a local area network (LAN), a wide area network (WAN), the Internet, mobile telephone networks, plain old telephone (POTS) networks, and wireless data networks (e.g., Wi-Fi, 3, and 4G LTE/LTE-A or WiMAX networks).
  • POTS plain old telephone
  • wireless data networks e.g., Wi-Fi, 3, and 4G LTE/LTE-A or WiMAX networks.
  • transmission medium shall be taken to include any intangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible medium to facilitate communication of such software.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • General Health & Medical Sciences (AREA)
  • Animal Behavior & Ethology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A method may include accessing a report definition template, the report definition template identifying a set of data requirement for a report; mapping the set of data requirements to a corresponding semantic object in a semantic ontology; parsing a semantic map to determine a database table storing data for the semantic object; retrieving the data for the semantic object from the database table; generating a report data file adhering to the semantic object ontology based in part on the retrieved data; transmitting a logical location of the generated report data file, a logical location of the semantic map, and logical location of the semantic ontology to a blockchain node for adding to a report block in the blockchain.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a Non-Provisional of and claims the benefit of priority under 35 U.S.C. § 119(e) from U.S. Provisional Application Ser. No. 62/262,047, filed on Dec. 2, 2015; 62/314,333, filed Mar. 28, 2016; and 62/319,837, filed Apr. 8, 2016, each of which are hereby incorporated by reference herein in their entirety.
  • TECHNICAL FIELD
  • Embodiments described herein generally relate to parsing data structures and in particular, but without limitation, to traversing data structures for compliance.
  • BACKGROUND
  • A blockchain may contain one or more blocks. A block may include one or more data entries. A hash may be included in each block that is based on the content of previous blocks in the blockchain.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In the drawings, which are not necessarily drawn to scale, like numerals may describe similar components in different views. Like numerals having different letter suffixes may represent different instances of similar components. Some embodiments are illustrated by way of example, and not limitation, in the figures of the accompanying drawings in which:
  • FIG. 1 is a diagram depicting relationships between objects that may be in a contract, according to various examples.
  • FIG. 2 is a semantic representation of a sentence, according to various examples;
  • FIG. 3 illustrates a schematic diagram of validating a data structure, according to various examples;
  • FIG. 4 is a diagram illustrating a semantic representation of an interest rate swap, according to various examples;
  • FIG. 5 illustrates a flowchart of a method of adding a compliance signature to a data structure, according to various examples;
  • FIG. 6 illustrates a schematic diagram of a system of using smart contracts and a blockchain;
  • FIG. 7 illustrates a schematic diagram of auditing and reporting using a blockchain, according to various examples;
  • FIG. 8 illustrates a schematic diagram of a system for generating a report block, according to various embodiments;
  • FIG. 9 illustrate a diagram of a logic annotation, according to various embodiments,
  • FIG. 10 illustrates a schematic diagram of a report block, according to various embodiments; and in which
  • FIG. 11 illustrates a flowchart of a method of, according to various examples
  • FIG. 12 is a block diagram illustrating an example machine upon which any one or more of the techniques (e.g., methodologies) discussed herein may be performed, according to an example embodiment.
  • DETAILED DESCRIPTION
  • An ontology may be as a taxonomy of objects for a given field-different fields may use different ontologies. The ontology may identify types, properties, and interrelationships between the objects. When used in the electronic realm, an ontology may be used to determine if data complies with the ontology. In some examples, the definition of an ontology is described a schema.
  • As a simple example, consider a schema for a Person object. The schema may include a number of entries that define the properties of a Person object such as “given name,” “height,” “weight,” etc., and the properties may also have expected types. Thus, the “height” property may have a quantitative type where as “given name” may be text. The excepted type of an object may be another object such as a property of “knows” having an expected type of Person. Accordingly, the data string “Alice knows Bob” can be thought of as two Person objects with the Alice having the “knows” property.
  • Another way to consider ontologies is using a “Subject, Predicate, Object” (S-P-O) format. Using the example of “Alice knows Bob,” Alice is the subject, the predicate is “knows,” and the object is “Bob.” With reference back to the example Person schema, the predicate is the property in the schema and the expected type is the object. In other words, a schema may semantically define valid relationships between multiple objects.
  • As another example, consider FIG. 1 depicting relationships between objects that may be in a contract. Industry groups may promulgate schemas/ontologies for use by their members or for communicating with their members. For example, the Financial Industry Business Ontology (FIBO™) identifies numerous objects and their semantically defined relationships common in the financial industry-such as depicted in FIG. 1. While the majority of this disclosure is focused on financial terms and use cases, the same methods can be applied to any industry (e.g., retail, health care, etc.).
  • FIG. 2 illustrates the concept of “Corporate Ownership” as used in a semantic ontology, according to an example. The example uses the S-P-O format discussed above. One flexibility of a semantic ontology is that data from any number of sources may be standardized and harmonized. Accordingly, once a data store (e.g., file system, relational database, NoSQL database, flat file database) is populated with enough semantically intact data, the data may be mined, stored, queried, audited, and validated. The data may originate in a number of forms such as unstructured data, a spreadsheet, a relational database, Extensible Markup Language (XML), JavaScript Object Notation, etc.
  • In some instances, a service (e.g., a web service) may map or translate the various formats into a common format for easier data mining. For example, a webpage may include the unstructured data “Global Bank owns>50% voting shares of London Bank.” This data may be parsed into the S-P-O format of subject: Global Bank; predicate: owns; and object: London Bank. At this point, the service may update a database to indicate the relationship between Global Bank and London Bank according to a defined schema.
  • Regulators, or other users, may use this information when analyzing more complex transactions. For example, after enough data has been inputted into a data store, regulators—as well as financial institutions—may quickly perform systemic risk analysis or compliance with regulation W. Other use cases may be readily apparent to a person of ordinary skill in the art without departing from the scope of this disclosure and may vary depending on the technology area.
  • Problems may arise when large amounts of data is assumed to be compliant with an ontology but fails to meet the requirements of the ontology. In various examples, a web service may be provided that validates data according to a known schema and provides a digital compliance signature indicating the data is valid.
  • FIG. 3 illustrates a schematic diagram 300 of validating a data structure, according to various example embodiments. The diagram 300 illustrates validating system 302, unvalidated data structure 304, validated data structure 306, and blockchain 308. The validating system 302 includes compliance subsystem 310, classification subsystem 312, attribution subsystem 314, and signature subsystem 316, according to various examples.
  • In various examples, the servers and components of the diagram 300 may communicate via one or more networks (not shown). The networks may include local-area networks (LAN), wide-area networks (WAN), wireless networks (e.g., 802.11 or cellular network), the Public Switched Telephone Network (PSTN) network, ad hoc networks, cellular, personal area networks or peer-to-peer (e.g., Bluetooth®, Wi-Fi Direct), or other combinations or permutations of network protocols and network types. The networks may include a single local area network (LAN) or wide-area network (WAN), or combinations of LAN's or WAN's, such as the Internet.
  • The validating system 302 may provide an Application Programming Interface (API) to publishers of a transaction. A publisher may be any entity that wants to have data validated against an ontology. Within the financial industry, a publisher may be a financial institution such as a bank, corporation, brokerage, closing company, etc. A transaction may be a set of data that defines one or more properties of an entity within an ontology. For convenience, FIG. 3 will be discussed as an interest rate swap between two banks.
  • FIG. 4 is a diagram illustrating a semantic representation of an interest rate swap, according to various examples. In order to have the interest rate swap considered valid by other sources, the interest rate swap may be encapsulated into a format for validation by the validating system 302. Examples of encapsulation formats include, but are not limited to, XML and JavaScript Object Notation-Linked Data (JSON-LD). An addition component of JSON-LD is the identification of a schema that the payload of the JSON-LD is supposed to adhere to (referred to as the validation source in FIG. 3)
  • For example, the following JSON-LD encoding may be used for a swap contract such as displayed in FIG. 4:
  • {
    ″@context″ : {
    ″@vocab″ : ″http://spec.edmcouncil.org/fibo/Swaps/″
    },
    ″@type″ : “SwapContract″,
    “hasIdentifier″ : “Swap1001″,
    “hasSwapStream″ : [
    { ″@type″ : “SwapStream″,
    “hasPayerParty″ : { “@type “Party“,
    “hasLegalEntityIdentifier” : “LEI5001”},
    “hasRate″ : “0.05” },],
    “hasSwapStream″ : [
    { ″@type″ : “SwapStream″,
    “hasPayerParty″ : { “@type “Party“,
    “hasLegalEntityIdentifier″ : “LEI7777”},
    “hasFloatingRateIndex″ : { “@type “RateIndex”,
    “hasIdentifier” : “LIBOR” },]
    }
  • The validating system 302 may include at least one web server to respond to API calls from publishers of data, such as unvalidated data structure 304. The validating system 302 may also include at least one processor to execute subsystems 310-316. The execution of the subsystems may take place in one physical computing device or be distributed across multiple computing devices. In some instances, more than one computing device completes the same task (e.g., first to complete). The computing devices may be located in one geographic area or distributed across multiple geographic areas.
  • In an example, the compliance subsystem 310 compares the payload of unvalidated data structure 304 to a schema as defined by the validation source. Validating may include retrieving the rules for the various entities in the payload checking for their compliance. For example, the schema may indicate that the type “SwapContract” requires two “Party” types. If the payload fails to include two parties, the unvalidated data structure 304 would be rejected as failing to comply with the schema and not added to a blockchain. In an example, the compliance subsystem 310 calls a third-party service to check the payload for validation.
  • The classification subsystem 312 may modify the payload if additional classifications of objects can be inferred by data in the payload. Using the example above, the JSON-LD states the first type is that of a “SwapContract” with one leg having a “hasRate” type and the second leg having a “FloatingRatelndex” type. The schema identified in the validation source may indicate that a SwapContract that includes the “hasRate” type and the “FloatingRatelndex” type is properly classified as a “FixedFloatlnterestRateSwapContact.” Accordingly, classification subsystem 312 may modify “SwapContract” to “FixedFloatInterestRateSwapContact.”
  • In some instances a data structure examined by validating system 302 includes a digital signature of the publisher. The digital signature may be a hash of the payload (or of the payload and validation source) encrypted using the private key of the publisher. The attribution subsystem 314 may retrieve the public key-either included with the JSON-LD message or from a registry—of the publisher to decode the hash of the payload. The attribution subsystem 314 may also create a hash of the payload which is compared with the decoded hash. If the two hashes match, the publisher may be considered verified. Other types of attribution techniques may be used without departing from the scope of this disclosure.
  • If both the compliance subsystem 310 and attribution subsystem 314 indicate the payload complies with the schema, and is properly attributable to the publisher, the signature subsystem 316 may attach a compliance signature to the unvalidated data structure 304 to create validated data structure 306. The compliance signature may be based a hash the payload and optionally the validator source and publisher signature. The hash may be signed using the private key of the validating system 302. The validated data structure 306 represents an example format of a compliance signed data structure.
  • After a compliance signature has been added to a data structure, the validated data structure 306 may be added to a blockchain. In some instances, the payload is not included in the blockchain, but only signed hashes of the payload. The blockchain may include all the previous swap contracts; although the blockchain may not be limited to only swap contracts. Accordingly, anyone with the blockchain may trust another party that indicates the swap contract described in the example above is valid based on the signed hash or signed payload outputted by validating system 302.
  • In some instances, adding the validated data structure 306 to the blockchain is accomplished by distributing the validated data structure 306 to numerous anonymous servers. The servers may need to complete a computationally difficult calculation in order to add validated data structure 306 to the blockchain. The calculation may require using a hash of previously added information to the blockchain. In such as a manner, the blockchain becomes difficult to improperly modify. Once added, the blockchain may be trusted by other parties despite the anonymous nature of the servers.
  • For example, similarly to how attribution subsystem 314 determines a valid publisher, a party could take the public key of validating system 302 to decode the compliance signature, resulting in the hash of the payload. The party could independently calculate the hash of the payload and compared to the decoded hash. If the hashes match, the party can know that the transaction in the payload is valid and attributable to the publisher. As indicated above, in some instance the compliance signature does not include the publisher signature in the hash. Thus, in some instances, blockchain includes the payload signed by both the publisher and the validating system 302.
  • FIG. 5 illustrates a flowchart of method of adding a compliance signature to a data structure. The method may be performed by executing, using at least one processor, instructions stored on a non-transitory computer-readable medium.
  • At operation 502, an electronic data structure may be received. The electronic data structure may include a location of a validation source for a payload of the data structure. The location may be a uniform resource identifier that links to a semantic schema. The semantic schema may be retrieved (operation 504). The semantic schema may identify rules such as names of object types (also referred to an elements), properties of object types, valid values for the properties, restriction on operations of object types with respect to other object types, among other things.
  • The data structure may also include a payload. The payload may identify at least one object type, a property of the object, and a value for the property. Multiple objects may be included in the data structure as well multiple different object types. In an example, the electronic data structure conforms to the JSON-LD format. The data structure may also include a digital signature of the publisher of the electronic data structure.
  • At operation 506, the data structure may be validated according to the semantic schema. The rules of the semantic schema may be compared to the elements of the data structure for validation. For example, properties included in the data structure may be compared to valid properties according to the schema. Similarly, the values for the properties may be compared to the valid values for the properties.
  • An element of the payload may be modified based on the schema. For example, the schema may identify a hierarchy of elements (parent/child, genus/species, etc.). The data structure may identify a genus object but an examination of the properties of the genus object may be used to infer the genus could only be one of the species objects. Thus, the genus object may be altered to the species.
  • At operation 508, based on a result of the validating indicating the payload complies with the semantic schema, an electronic compliance signature may be appended to the data structure. The payload may be hashed and encrypted using a private key to create the electronic compliance signature. Additionally, a blockchain that includes at least one block with at least one transaction may be retrieved. The hashed payload signed by the electronic compliance signature may be appended to the blockchain. In an example, the payload with the compliance signature is appended to the block chain instead of (or in addition to) a hashed version of the payload.
  • Different version of the payload may be appended to the blockchain. For example, when the payload is modified as above, two versions of the payload may be appended to the blockchain: one hashed payload with the changes and one hashed payload without the changes. The hashes may be signed as indicated above. Additionally, sometimes the hash may include the digital signature of the publisher and other times the hash may be created without the digital signature.
  • Standardized ontologies and blockchains may have additional uses beyond, or in addition to, the data validation methods described above. For example, smart contracts may leverage the ontology in describing the components of a contract. A smart contract may be a contract that is described in terms of an electronic program construct as opposed to written in prose. A smart contract may be partially or completely automated.
  • A smart contract may define, programmatically (e.g., functionally, procedural), conditional logic with respect to the performance of the contract. For example, consider a relatively straightforward exchange stock purchase. Via a broker, a user may offer to purchase X dollars worth of a stock at a certain price. The user may an account with the broker with money set aside for the purchase. Upon the stock being at the price, the broker may purchase the stock on behalf of the user and debit the user's account. Conceptually, a smart contract may have a condition of “IF stock XYZ>=$45 a share, THEN purchase 5 shares AND debit account the purchase price.”
  • The state of the contract may be stored in blockchain. In other words, each variable of a contract (e.g., the stock price in the previous example) may have a value on the blockchain (as well as the history of its value). Because the execution of the contract is generally fully automated, fraud may occur if one party updates the state of the contract with an invalid/incorrect value. For example, if a nefarious party changes the state to indicate there is more money in an account then there is actually is a stock trade may execute even if there is not enough money to cover the cost of the purchase.
  • FIG. 6 illustrates a schematic diagram of a system of using smart contracts and a blockchain. The system illustrates blockchain provider 602, a first party 604, a second party 606, and a blockchain 608. The blockchain 608 includes a number of blocks identified as contract template block 610, block 612 and block 614.
  • One solution to the invalid values problem described above, is to use a stateful blockchain. In contrast to a stateless blockchain, such as used with bitcoins, a stateful blockchain maintains the values—in this case contract values, among other operational values. The blockchain 608 may therefore be queried to see if a contract may be completed. The benefits of a blockchain is one of trust in a decentralized environment. A query, or update of variable, may be calculated by a number of participating nodes to arrive at the true value of a variable. If a single bad actor tries to change a value, the other nodes will reject it and it will not be added to the blockchain.
  • The blockchain may also include a template for different contracts. The contract templates may be defined according to an ontology, such as FIBO. The format of the data entered on the blockchain 608 may be a JSON-LD encoding adhering to FIBO. The blockchain 608 may be public or private, and may have access right restrictions.
  • One requirement for a contract may be a contract identifier. The contract identifier may be used by all parties to the contract. For example, consider that the contract trade in FIG. 6 is a swap contract. As described above, a JSON-LD encoding may be used for the swap contract and may begin:
  • {
    ″@context″ : {
    ″@vocab″ : ″http://spec.edmcouncil.org/fibo/Swaps/″
    },
    ″@type″ : “SwapContract″,
    “hasIdentifier″ : “Swap1001″,
    “hasSwapStream″ : [
    . . .

    The “Swap1001” may identify the swap and both party A and party B may use it.
  • Furthermore, the identifier may be used by to find confirmation of the trade across blocks of the blockchain 608. For example, the confirmation of the trade for party A may be in block 612 and the confirmation of the trade for party B may be in block 614. In various examples, the identifier may be hashed onto the blockchain to cryptographically point to two (or more) disparate parts of the blockchain 608. The hash may be such that the hash may not be used for a different swap. Again, this is different than the stateless blockchain of bitcoin in which anonymity and non-traceability are features. The identifier may be generated by the party that initiates the contract.
  • Another benefit of a stateful blockchain is one can see the state of a contract evolve over time. As mentioned, a smart contract may have a number of terms and conditions. The blockchain 608 may be examined to see which of these conditions have been met and when they were met. The blockchain 608 may also indicate that when a contract has been completed, when both sides of a contract confirm the contract, etc. The contract may also trigger execution of other transactions, also stored on the blockchain 608 (e.g., the state of a variable may trigger execution).
  • Another benefit of a standardized ontology (optionally with validation signatures) on a blockchain is for auditing purposes. Regulations may require that each entry in a report indicate where it came from, when it occurred, other entries/transactions it implicates, etc. When every transaction is verified, and signed as adhering to a standard ontology, auditing because much easier. For example, a federal agency may be given keys to unlock all, or a subset, of encrypted transaction data on a blockchain to verify reports as necessary. The inherent properties of a blockchain coupled with the signed verifications may be give the agency the confidence that no fraudulent data is present. The data in the blockchain may also identify the location of generated regulatory reports as well as the locations of the data necessary to validate the reports.
  • By way of example, the Home Mortgage Disclosure Act (HMDA) has numerous requirements. Within an organization, each line of business (LOB) such as mortgage, also banking, and home equity, and generate reports for complying with the HMDA. Quarterly, these reports may be aggregated and manual and statistical review may take place to try and avoid any errors. On an annual basis, these quarterly reports may be created and provided to the Consumer Finance Protection Bureau (CFPB) for examination. The CFPB may then have to manually go back and examine the reports to ensure HMDA compliance.
  • Because of the manual nature of many of the reporting tasks, it may be difficult to determine who put what in each report, when it was added to the report, what calculations were used to generate the numbers in reports, and what were the sources of the data in the reports. As discussed further below, the use of a blockchain provides data security and attribution and immutability. The blockchain may be public or private, and may have access right restrictions.
  • FIG. 7 illustrates a schematic diagram of auditing and reporting using a distributed ledger (e.g., a blockchain), according to various examples. FIG. 7 includes, semantic ontology 702, financial institution 704, provenance ontology 706, app 708, app 710, distributed ledger 712, and report 714. The lines between app 708, app 710, into the distributed ledger 712 may represent report block entries. A report block entry may comprise a series of identifiers to information needed to retrieve and verify a report, such as report 714. These entries are discussed in further detail in FIGS. 8-10, but an overview of the system is presented in FIG. 7.
  • The financial institution 704 may represent an entity that is required to provide one or more reports to one or more government agencies. The use of the system in FIG. 7 is not limited to such uses and may be utilized by other any organization that requires verified reporting. The financial institution 704 may have its own semantic ontology 702 that describes data stored within the financial institution 704. In some instances, the semantic ontology 702 is a standardized ontology such as FIBO. In further instances the semantic ontology 702 may be a superset of FIBO.
  • The provenance ontology 706 may define an ontology language to indicate, among other things, roles and identities responsible for entries in a report. Thus, in addition to providing the regulatory requirements (e.g., required data) the report may include entries in accordance with the provenance ontology 706 that indicate where the data come from, when it was there, etc. In some examples, the entries corresponding to the provenance ontology 706 are stored in a separate file, such as a provenance log. The provenance log may include entries related to one or more reports.
  • FIG. 7 illustrates that financial institution 704 has a few different lines of business (LOB). Underneath the LOBs, app 708 and app 710 are distinguished from each other based on the line pattern. The line patterns correspond to different blocks in the distributed ledger 712-indicating different report entries associated with app 708 and 710.
  • The distributed ledger 712 may include a reporting block that identifies the various LOBs and associated apps and relevant portions of the distributed ledger 712 related to their respective reports. The identification may be in the form of cryptographic pointer identifying the previous block of the distributed ledger 712 relevant to the report (or previous reports). That previous block may include another pointer that identifies the “next” previous block. In such a manner, a regulatory agency may trace back-in-time through the distributed ledger 712 to retrieve the relevant data for a report associated with a given app and verify it for auditing purposes.
  • FIG. 8 illustrates a schematic diagram of a system for generating a report block. FIG. 8 include report input 802, semantic ontology 804, logic annotations 806, blockchain 808, automated profiling and mapping component 810, report execution component 812, report 814, semantic map 816, provenance ontology 820, and provenance log 822. The various components in FIG. 8 may be distributed across multiple computing devices in multiple geographic locations, or they may be located in a single computing device in a single location. The execution of the various components may completely automated or partially automated.
  • The report input 802 identifies the data sources that store data for an organization, such as a financial institution. The sources may XML documents, databases, Excel documents, etc.
  • The semantic map 816 may in the form of R2RML, which is a relational database (RDB) to RDF mapping proposed W3C standard. One purpose of R2RML is to facilitate a map of existing relational data—as encapsulated in one or more databases—to the RDF data model. The input for an R2RML mapping is a logical table that may be a base table, a view, or a valid SQL query. The output of the R2RML is a mapping of the logical table to a RDF using a triple map. A triple map is a rule that takes each row in one of the logical tables to an RDF triple. The rule may have two components, the subject map and a multiple predicate-object map, which may be made up of predicate maps and object maps. The triple for a given database row may be formulated by combining the subject map with a predicate map and an object map.
  • The proposed W3C documentation provides the following, slightly modified, example. Consider a database table EMP. The EMP table includes three columns: EMPNO, ENAME, JOB. A row of the EMP table is “7639:SMITH:CLERK.” A triple map may for the EMP table may be:
  • @prefix rr: <http://www.w3.org/ns/r2rml#>.
    @prefix ex: <http://example.com/ns#>.
    <#TriplesMap1>
     rr:logicalTable [ rr:tableName “EMP” ];
     rr:subjectMap [
      rr:template
    “http://data.example.com/employee/{EMPNO}”;
      rr:class ex:Employee;
     ];
     rr:predicateObjectMap [
      rr:predicate ex:name;
      rr:objectMap [ rr:column “ENAME” ];
     ].
  • The output of the R2RML may be
  • <http://data.example.com/employee/7369>rdf:type ex:Employee.
    <http://data.example.com/employee/7369>ex:name “SMITH”.
  • In FIG. 8, the semantic map 816 may include mappings from the semantic ontology 804 to the report inputs 802. In other words, the semantic map 816 may identify where, within the data sources of an organization, the relevant data for the report 814 is located.
  • In a simplified example, consider a report that requires all mortgage transactions. A person or computer program-such as automated profile and mapping component 810—may first look to the semantic ontology 804 to see how a mortgage is classified (e.g., what type of object). Then, the semantic map 816 may be parsed to determine what columns in what database tables map to the classification. The report execution component 812 may receive data (e.g., through an API) from the automated profile and mapping component 810 that indicates the location of data for a given report. A report definition template may identify the requirements for a given report. For example, it may be identify what data is needed, in what format, for what time periods, etc.
  • The report execution component may also retrieve logic annotations 806 to facilitate the execution of the report. The logic annotations 806 may define, using the semantic ontology 804, how to calculate the data for a given report. FIG. 9 illustrate a diagram of a logic annotation. Although shown diagrammatically, the logic annotation may be stored in a XML format adhering to the semantic ontology 804.
  • FIG. 9 includes blockchain 902, report 904, semantic object 906, and data source 908. Consider an auditor, which may be a computer program, that accesses blockchain 902, and a report block leads the auditor to report 904 (discussed in further detail with respect to FIG. 10). The report 904 may reference one or more semantic objects, such as semantic object 906. In order to determine if the value for the semantic object 906 is correct, a logic annotations file may be examined. The file may indicate how the object is used with respect to other semantic objects, as well as indicate the data sources for the semantic object. In such a manner, an auditor may independently calculate the data in the report 904. In some instances, the logic annotations may include provenance data indicating when the logic annotation file was created, who created it, etc.
  • With reference back to FIG. 8, the report execution component 812 may generate the report 814 using the logic annotations 806 and report input 802. The report execution component 812 may also gather the locations (e.g., logical locations such as URI locations) of the data sources and attribution sources (e.g., provenance ontology 820) are located for a given report. This information may be placed into the report block for a given report as discussed next with reference to FIG. 10.
  • FIG. 10 illustrates a schematic diagram of a report block, according to various embodiments. A report block may be part of a block of the blockchain. The blockchain may include hundreds, thousands, or more blocks. A report block may include references to locations of files for a given report. The report block may include references to sources files (e.g., the underlying source of data in the report), a location of a semantic map (e.g., R2RML mappings), a reference to logic annotations for semantic objects in the report, a reference to a provenance log, a reference to a semantic ontology used in the report, and a reference to the underlying report itself. The report block may also include a reference to a previous block in the blockchain that includes the previous report (e.g., the report for the previous quarter). The information in the report block may be encrypted, signed, or both. In an example, the data is encrypted using a public key of a regulatory agency that needs the report.
  • FIG. 11 illustrates an example method that may be performed by one or more processors executed instructions stored in a non-transitory computer readable medium. In various example embodiments, a method may include accessing a report definition template (1102), the report definition template identifying a set of data requirement for a report. A requested report may include a report type. Each template may have a corresponding report type. Thus, a database may be queried using the report type to retrieve the corresponding template.
  • The report definition file may identify logic annotations for calculating the semantic object and wherein the location of the logic annotations are transmitted to the blockchain for adding to the report block.
  • The method may further include mapping the set of data requirements to a corresponding semantic object in a semantic ontology (1104) and parsing a semantic map to determine a database table storing data for the semantic object (1106). The method may include retrieving the data for the semantic object from the database table (1108). The method may also include generating a report data file adhering to the semantic object ontology based in part on the retrieved data (1110). The report data file may the data transmitted for adding to a report block in a blockchain.
  • The method may also include transmitting a logical location of the generated report data file, a logical location of the semantic map, and logical location of the semantic ontology to a blockchain node for adding to a report block in the blockchain (1112).
  • The method may also include accessing a provenance log identifying an entity that entered the data in the database table. The provenance log may be formatted according to a provenance ontology. The logical location of the provenance log and the provenance ontology may be transmitted to the blockchain node for adding to the report block.
  • The method may further include retrieving an identifier of a previously computed report using the report definition template; querying a database to determine a block identifier for that includes a report block for the previously computed report; and transmitting the block identifier to the blockchain node for adding to the report block in the blockchain.
  • Embodiments described herein may be implemented in one or a combination of hardware, firmware, and software. Embodiments may also be implemented as instructions stored on a machine-readable storage device, which may be read and executed by at least one processor to perform the operations described herein. A machine-readable storage device may include any non-transitory mechanism for storing information in a form readable by a machine (e.g., a computer). For example, a machine-readable storage device may include read-only memory (ROM), random-access memory (RAM), magnetic disk storage media, optical storage media, flash-memory devices, and other storage devices and media.
  • Examples, as described herein, may include, or may operate on, logic or a number of components, modules, or mechanisms. Modules may be hardware, software, or firmware communicatively coupled to one or more processors in order to carry out the operations described herein. Modules may hardware modules, and as such modules may be considered tangible entities capable of performing specified operations and may be configured or arranged in a certain manner. In an example, circuits may be arranged (e.g., internally or with respect to external entities such as other circuits) in a specified manner as a module. In an example, the whole or part of one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware processors may be configured by firmware or software (e.g., instructions, an application portion, or an application) as a module that operates to perform specified operations. In an example, the software may reside on a machine-readable medium. In an example, the software, when executed by the underlying hardware of the module, causes the hardware to perform the specified operations. Accordingly, the term hardware module is understood to encompass a tangible entity, be that an entity that is physically constructed, specifically configured (e.g., hardwired), or temporarily (e.g., transitorily) configured (e.g., programmed) to operate in a specified manner or to perform part or all of any operation described herein. Considering examples in which modules are temporarily configured, each of the modules need not be instantiated at any one moment in time. For example, where the modules comprise a general-purpose hardware processor configured using software; the general-purpose hardware processor may be configured as respective different modules at different times. Software may accordingly configure a hardware processor, for example, to constitute a particular module at one instance of time and to constitute a different module at a different instance of time. Modules may also be software or firmware modules, which operate to perform the methodologies described herein.
  • FIG. 12 is a block diagram illustrating a machine in the example form of a computer system 1200, within which a set or sequence of instructions may be executed to cause the machine to perform any one of the methodologies discussed herein, according to an example embodiment. In alternative embodiments, the machine operates as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine may operate in the capacity of either a server or a client machine in server-client network environments, or it may act as a peer machine in peer-to-peer (or distributed) network environments. The machine may be an onboard vehicle system, wearable device, personal computer (PC), a tablet PC, a hybrid tablet, a personal digital assistant (PDA), a mobile telephone, or any machine capable of executing instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while only a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein. Similarly, the term “processor-based system” shall be taken to include any set of one or more machines that are controlled by or operated by a processor (e.g., a computer) to individually or jointly execute instructions to perform any one or more of the methodologies discussed herein.
  • Example computer system 1200 includes at least one processor 1202 (e.g., a central processing unit (CPU), a graphics processing unit (GPU) or both, processor cores, compute nodes, etc.), a main memory 1204 and a static memory 1206, which communicate with each other via a link 1208 (e.g., bus). The computer system 1200 may further include a video display unit 1210, an alphanumeric input device 1212 (e.g., a keyboard), and a user interface (UI) navigation device 1214 (e.g., a mouse). In one embodiment, the video display unit 1210, input device 1212 and UI navigation device 1214 are incorporated into a touch screen display. The computer system 1200 may additionally include a storage device 1216 (e.g., a drive unit), a signal generation device 1218 (e.g., a speaker), a network interface device 1220, and one or more sensors (not shown), such as a global positioning system (GPS) sensor, compass, accelerometer, or another sensor.
  • The storage device 1216 includes a machine-readable medium 1222 on which is stored one or more sets of data structures and instructions 1224 (e.g., software) embodying or utilized by any one or more of the methodologies or functions described herein. The instructions 1224 may also reside, completely or at least partially, within the main memory 1204, static memory 1206, and/or within the processor 1202 during execution thereof by the computer system 1200, with the main memory 1204, static memory 1206, and the processor 1202 also constituting machine-readable media.
  • While the machine-readable medium 1222 is illustrated in an example embodiment to be a single medium, the term “machine-readable medium” may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more instructions 1224. The term “machine-readable medium” shall also be taken to include any tangible medium that is capable of storing, encoding or carrying instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure or that is capable of storing, encoding or carrying data structures utilized by or associated with such instructions. The term “machine-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, and optical and magnetic media. Specific examples of machine-readable media include non-volatile memory, including but not limited to, by way of example, semiconductor memory devices (e.g., electrically programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM)) and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
  • The instructions 1224 may further be transmitted or received over a communications network 1226 using a transmission medium via the network interface device 1220 utilizing any one of a number of well-known transfer protocols (e.g., HTTP). Examples of communication networks include a local area network (LAN), a wide area network (WAN), the Internet, mobile telephone networks, plain old telephone (POTS) networks, and wireless data networks (e.g., Wi-Fi, 3, and 4G LTE/LTE-A or WiMAX networks). The term “transmission medium” shall be taken to include any intangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible medium to facilitate communication of such software.
  • The above detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show, by way of illustration, specific embodiments that may be practiced. These embodiments are also referred to herein as “examples.” Such examples may include elements in addition to those shown or described. However, also contemplated are examples that include the elements shown or described. Moreover, also contemplate are examples using any combination or permutation of those elements shown or described (or one or more aspects thereof), either with respect to a particular example (or one or more aspects thereof), or with respect to other examples (or one or more aspects thereof) shown or described herein.

Claims (18)

1. A method comprising:
accessing a report definition template, the report definition template identifying a set of data requirements for a report and including a report type for a requested report;
mapping the set of data requirements to a corresponding semantic object in a standardized semantic ontology to identify an object classification used to determine if data complies with the set of data requirements, wherein the report definition template further identifies logic annotations for calculating the semantic object;
creating a semantic map in a resource description framework (RDF) language to map the logical annotations using the semantic ontology and an RDF triple map;
formulating the RDF triple map by combining a subject map with a multiple predicate-object map including a predicate map and an object map;
parsing the semantic map to determine which columns in a database table map to the object classification and store data for the semantic object;
receiving an input through an application programming interface (API) from an automated profiling and mapping component that includes at least some location data for the requested report using the report type;
retrieving the data for the semantic object from the determined columns in the database table;
generating a report data file adhering to the semantic ontology based in part on the retrieved data and the logic annotations, wherein the logic annotations are stored in a format adhering to the semantic ontology;
transmitting a plurality of logical locations, the plurality of logical locations including a logical location of the generated report data file, a logical location of the semantic map, a logical location of the logic annotations, and logical location of the semantic ontology to a blockchain node for adding to a report block in the blockchain, the plurality of logical locations in the report block allowing for verification of the calculated semantic object contained in the report data file;
retrieving an identifier of a previously computed report using the report definition template and the input;
querying a database to determine a block identifier that includes a report block for the previously computed report, wherein the report block includes references to source files including an underlying source of data in the report, a location of the semantic map, a reference to logic annotations for semantic objects in the report, a reference to a provenance log, a reference to the semantic ontology used in the report, a reference to the report, and a reference to a previous block in the blockchain that includes the previously computed report for a previous time period, and wherein information in the report block is signed and encrypted using a public key of a regulatory agency; and
transmitting the block identifier to the blockchain node for adding to the report block in the blockchain.
2. (canceled)
3. The method of claim 1, further comprising:
accessing a provenance log identifying an entity that entered the data in the database table.
4. The method of claim 3, wherein the provenance log is formatted according to a provenance ontology.
5. The method of claim 4, wherein a logical location of the provenance log and the provenance ontology are transmitted to the blockchain node for adding to the report block.
6. (canceled)
7. A non-transitory computer readable medium comprising instructions, which when executed by at least one processor, configure the processor to perform operations comprising:
accessing a report definition template, the report definition template identifying a set of data requirements for a report and including a report type for a requested report;
mapping the set of data requirements to a corresponding semantic object in a standardized semantic ontology to identify an object classification used to determine if data complies with the set of data requirements, wherein the report definition template further identifies logic annotations for calculating the semantic object;
creating a semantic map in a resource description framework (RDF) language to map the logical annotations using the semantic ontology and an RDF triple map;
formulating the RDF triple map by combining a subject map with a multiple predicate-object map including a predicate map and an object map;
parsing the semantic map to determine which columns in a database table map to the object classification and store data for the semantic object;
receiving an input through an application programming interface (API) from an automated profiling and mapping component that includes at least some location data for the requested report using the report type;
retrieving the data for the semantic object from the determined columns in the database table;
generating a report data file adhering to the semantic ontology based in part on the retrieved data and the logic annotations, wherein the logic annotations are stored in a format adhering to the semantic ontology;
transmitting a plurality of logical locations, the plurality of logical locations including a logical location of the generated report data file, a logical location of the semantic map, a logical location of the logic annotations, and logical location of the semantic ontology to a blockchain node for adding to a report block in the blockchain, the plurality of logical locations in the report block allowing for verification of the calculated semantic object contained in the report data file;
retrieving an identifier of a previously computed report using the report definition template and the input;
querying a database to determine a block identifier that includes a report block for the previously computed report, wherein the report block includes references to source files including an underlying source of data in the report, a location of the semantic map, a reference to logic annotations for semantic objects in the report, a reference to a provenance log, a reference to the semantic ontology used in the report, a reference to the report, and a reference to a previous block in the blockchain that includes the previously computed report for a previous time period, and wherein information in the report block is signed and encrypted using a public key of a regulatory agency; and
transmitting the block identifier to the blockchain node for adding to the report block in the blockchain.
8. (canceled)
9. The non-transitory computer readable medium of claim 7, the operations further comprising:
accessing a provenance log identifying an entity that entered the data in the database table.
10. The non-transitory computer readable medium of claim 9, wherein the provenance log is formatted according to a provenance ontology.
11. The non-transitory computer readable medium of claim 10, wherein a logical location of the provenance log and the provenance ontology are transmitted to the blockchain node for adding to the report block.
12. (canceled)
13. A system comprising:
at least one processor;
a storage device comprising instructions, which when executed by the at least one processor, configure the processor to perform operations comprising:
accessing a report definition template, the report definition template identifying a set of data requirements for a report and including a report type for a requested report;
mapping the set of data requirements to a corresponding semantic object in a standardized semantic ontology to identify an object classification used to determine if data complies with the set of data requirements, wherein the report definition template further identifies logic annotations for calculating the semantic object;
creating a semantic map in a resource description framework (RDF) language to map the logical annotations using the semantic ontology and an RDF triple map;
formulating the RDF triple map by combining a subject map with a multiple predicate-object map including a predicate map and an object map;
parsing the semantic map to determine which columns in a database table map to the object classification and store data for the semantic object;
receiving an input through an application programming interface (API) from an automated profiling and mapping component that includes at least some location data for the requested report using the report type;
retrieving the data for the semantic object from the determined columns in the database table;
generating a report data file adhering to the semantic ontology based in part on the retrieved data and the logic annotations, wherein the logic annotations are stored in a format adhering to the semantic ontology;
transmitting a plurality of logical locations, the plurality of logical locations including a logical location of the generated report data file, a logical location of the semantic map, a logical location of the logic annotations, and logical location of the semantic ontology to a blockchain node for adding to a report block in the blockchain, the plurality of logical locations in the report block allowing for verification of the calculated semantic object contained in the report data file;
retrieving an identifier of a previously computed report using the report definition template and the input;
querying a database to determine a block identifier that includes a report block for the previously computed report, wherein the report block includes references to source files including an underlying source of data in the report, a location of the semantic map, a reference to logic annotations for semantic objects in the report, a reference to a provenance log, a reference to the semantic ontology used in the report, a reference to the report, and a reference to a previous block in the blockchain that includes the previously computed report for a previous time period, and wherein information in the report block is signed and encrypted using a public key of a regulatory agency; and
transmitting the block identifier to the blockchain node for adding to the report block in the blockchain.
14. (canceled)
15. The system of claim 13, the operations further comprising:
accessing a provenance log identifying an entity that entered the data in the database table.
16. The system of claim 15, wherein the provenance log is formatted according to a provenance ontology.
17. The system of claim 16, wherein a logical location of the provenance log and the provenance ontology are transmitted to the blockchain node for adding to the report block.
18. (canceled)
US15/368,127 2015-12-02 2016-12-02 Traversing data structures for compliance Abandoned US20220358185A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/368,127 US20220358185A1 (en) 2015-12-02 2016-12-02 Traversing data structures for compliance

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201562262047P 2015-12-02 2015-12-02
US201662314333P 2016-03-28 2016-03-28
US201662319837P 2016-04-08 2016-04-08
US15/368,127 US20220358185A1 (en) 2015-12-02 2016-12-02 Traversing data structures for compliance

Publications (1)

Publication Number Publication Date
US20220358185A1 true US20220358185A1 (en) 2022-11-10

Family

ID=83901523

Family Applications (3)

Application Number Title Priority Date Filing Date
US15/368,127 Abandoned US20220358185A1 (en) 2015-12-02 2016-12-02 Traversing data structures for compliance
US15/368,120 Active 2039-06-19 US11650972B1 (en) 2015-12-02 2016-12-02 Semantic compliance validation for blockchain
US18/299,198 Pending US20230244653A1 (en) 2015-12-02 2023-04-12 Semantic compliance validation for blockchain

Family Applications After (2)

Application Number Title Priority Date Filing Date
US15/368,120 Active 2039-06-19 US11650972B1 (en) 2015-12-02 2016-12-02 Semantic compliance validation for blockchain
US18/299,198 Pending US20230244653A1 (en) 2015-12-02 2023-04-12 Semantic compliance validation for blockchain

Country Status (1)

Country Link
US (3) US20220358185A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220150073A1 (en) * 2020-11-09 2022-05-12 International Business Machines Corporation Blockchain based verifiabilty of user status
US11650972B1 (en) 2015-12-02 2023-05-16 Wells Fargo Bank, N.A. Semantic compliance validation for blockchain
US20230198751A1 (en) * 2020-04-21 2023-06-22 Grabtaxi Holdings Pte. Ltd. Authentication and validation procedure for improved security in communications systems
CN116383859A (en) * 2023-06-06 2023-07-04 四川省建筑科学研究院有限公司 Detection report generation method and device, electronic equipment and storage medium
US20230336499A1 (en) * 2022-02-04 2023-10-19 Red Hat, Inc. Managing cloud acquisitions using distributed ledgers
US12019608B2 (en) * 2022-08-23 2024-06-25 Sap Se Storing and querying knowledge graphs in column stores using a global dictionary
US12026165B2 (en) * 2022-08-12 2024-07-02 GM Global Technology Operations LLC Cooperative system architecture for engineering asset management and sharing

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7913159B2 (en) * 2003-03-28 2011-03-22 Microsoft Corporation System and method for real-time validation of structured data files
CN1955991A (en) * 2005-10-25 2007-05-02 国际商业机器公司 Method and device for integrating model sementics and field sementics in service model
CN101398831B (en) 2007-09-27 2013-08-21 日电(中国)有限公司 Noumenon data leading-in and leading-out method and device
US8285748B2 (en) * 2008-05-28 2012-10-09 Oracle International Corporation Proactive information security management
US8166306B2 (en) * 2008-06-18 2012-04-24 International Business Machines Corporation Semantic digital signatures
US20100217975A1 (en) * 2009-02-25 2010-08-26 Garret Grajek Method and system for secure online transactions with message-level validation
US20100281061A1 (en) * 2009-04-30 2010-11-04 International Business Machines Corporation Semantic Data Validation of Disjoint Data
US8285967B1 (en) 2009-06-30 2012-10-09 Emc Corporation Method for on-demand block map generation for direct mapped LUN
US20110246530A1 (en) * 2010-03-31 2011-10-06 Geoffrey Malafsky Method and System for Semantically Unifying Data
KR100989581B1 (en) 2010-04-28 2010-10-25 한국과학기술정보연구원 Apparatus and method for building resource description framework network using ontology schema merged named entity database and mining rule
US8572760B2 (en) * 2010-08-10 2013-10-29 Benefitfocus.Com, Inc. Systems and methods for secure agent information
US9076152B2 (en) * 2010-10-20 2015-07-07 Microsoft Technology Licensing, Llc Semantic analysis of information
US8515999B2 (en) * 2011-09-29 2013-08-20 International Business Machines Corporation Method and system providing document semantic validation and reporting of schema violations
US9704119B2 (en) * 2012-09-28 2017-07-11 Rex Wiig System and method of a requirement, compliance and resource management
US9876775B2 (en) 2012-11-09 2018-01-23 Ent Technologies, Inc. Generalized entity network translation (GENT)
US20140324908A1 (en) * 2013-04-29 2014-10-30 General Electric Company Method and system for increasing accuracy and completeness of acquired data
US10769122B2 (en) * 2014-03-13 2020-09-08 Ab Initio Technology Llc Specifying and applying logical validation rules to data
US10340038B2 (en) * 2014-05-13 2019-07-02 Nant Holdings Ip, Llc Healthcare transaction validation via blockchain, systems and methods
US9276751B2 (en) * 2014-05-28 2016-03-01 Palo Alto Research Center Incorporated System and method for circular link resolution with computable hash-based names in content-centric networks
US9749297B2 (en) 2014-11-12 2017-08-29 Yaron Gvili Manicoding for communication verification
US9602596B2 (en) * 2015-01-12 2017-03-21 Cisco Systems, Inc. Peer-to-peer sharing in a content centric network
US10565588B2 (en) 2015-03-12 2020-02-18 International Business Machines Corporation Cryptographic methods implementing proofs of work in systems of interconnected nodes
US10402792B2 (en) 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
US20170132626A1 (en) * 2015-11-05 2017-05-11 Mastercard International Incorporated Method and system for processing of a blockchain transaction in a transaction processing network
US20170140375A1 (en) 2015-11-15 2017-05-18 Michael Kunstel System and Method for Permissioned Distributed Block Chain
US20220358185A1 (en) 2015-12-02 2022-11-10 Wells Fargo Bank, N.A. Traversing data structures for compliance
US9948467B2 (en) * 2015-12-21 2018-04-17 Mastercard International Incorporated Method and system for blockchain variant using digital signatures
US20180083965A1 (en) 2016-09-16 2018-03-22 William Curtis Donovan Method and Apparatus for Managing Authentication in a Decentralized or Distributed Network of Cyber- Physical Systems

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11650972B1 (en) 2015-12-02 2023-05-16 Wells Fargo Bank, N.A. Semantic compliance validation for blockchain
US20230198751A1 (en) * 2020-04-21 2023-06-22 Grabtaxi Holdings Pte. Ltd. Authentication and validation procedure for improved security in communications systems
US20220150073A1 (en) * 2020-11-09 2022-05-12 International Business Machines Corporation Blockchain based verifiabilty of user status
US12010244B2 (en) * 2020-11-09 2024-06-11 International Business Machines Corporation Blockchain based verifiability of user status
US20230336499A1 (en) * 2022-02-04 2023-10-19 Red Hat, Inc. Managing cloud acquisitions using distributed ledgers
US12026165B2 (en) * 2022-08-12 2024-07-02 GM Global Technology Operations LLC Cooperative system architecture for engineering asset management and sharing
US12019608B2 (en) * 2022-08-23 2024-06-25 Sap Se Storing and querying knowledge graphs in column stores using a global dictionary
CN116383859A (en) * 2023-06-06 2023-07-04 四川省建筑科学研究院有限公司 Detection report generation method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
US20230244653A1 (en) 2023-08-03
US11650972B1 (en) 2023-05-16

Similar Documents

Publication Publication Date Title
US20230244653A1 (en) Semantic compliance validation for blockchain
US11874947B1 (en) System of managing data across disparate blockchains
US10997142B2 (en) Cognitive blockchain automation and management
US11481603B1 (en) System for deep learning using knowledge graphs
JP6899065B2 (en) Methods, equipment and non-transient computer readable storage media for the automatic generation of analysis results from blockchain data
CN109791591B (en) Method and system for identity and credential protection and verification via blockchain
US20230106484A1 (en) Cryptographic Asset Collateral Management
US20180268491A1 (en) Cognitive regulatory compliance automation of blockchain transactions
US9760620B2 (en) Confidently adding snippets of search results to clusters of objects
US20230360120A1 (en) Blockchain based loan securitization
Schintler et al. Encyclopedia of big data
US10121071B2 (en) Document verification system
Southerton Datafication
US11182502B2 (en) Systems and methods for computing data privacy-utility tradeoff
US9998450B2 (en) Automatically generating certification documents
US11068646B2 (en) Merging documents based on document schemas
US20200294148A1 (en) Analysis systems and methods
US20240184767A1 (en) Metadata Management through Blockchain Technology
US10489419B1 (en) Data modeling translation system
Huang Data processing
CN109408704B (en) Fund data association method, system, computer device and storage medium
CN113934729A (en) Data management method based on knowledge graph, related equipment and medium
US9489438B2 (en) Systems and methods for visualizing master data services information
Zhang Data Synthesis
Lynham From data to information

Legal Events

Date Code Title Description
AS Assignment

Owner name: WELLS FARGO BANK, N.A., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NEWMAN, DAVID;REEL/FRAME:043219/0627

Effective date: 20170216

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION