The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other bioinformatic information. Certain embodiments may facilitate policy-based governance of access to and/or use of bioinformatic information, improved interaction with and/or use of distribu
The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other bioinformatic information. Certain embodiments may facilitate policy-based governance of access to and/or use of bioinformatic information, improved interaction with and/or use of distributed bioinformatic information, parallelization of various processes involving bioinformatic information, and/or reduced user involvement in bioinformatic workflow processes, and/or the like. Further embodiments may provide for memoization processes that may persistently store final and/or intermediate results of computations performed using genomic data for use in connection with future computations.
대표청구항▼
1. A method for performing trusted computations on genomic data performed by a distributed computing system comprising a processor and a non-transitory computer-readable storage medium storing instructions that, when executed by the processor, cause the system to perform the method, the method compr
1. A method for performing trusted computations on genomic data performed by a distributed computing system comprising a processor and a non-transitory computer-readable storage medium storing instructions that, when executed by the processor, cause the system to perform the method, the method comprising: receiving first policy information from a stakeholder system articulating one or more first requirements associated with computational results generated using a genomic data set;receiving a first request from a user system to perform a computation by the distributed computer system, the first request comprising a first set of one or more pieces of identification information, the computation comprising analyzing a genomic data set to determine a particular genomic feature of the genomic data set;determining, based on the first set of one or more pieces of identification information, that a result of a prior computation using the first set of one or more pieces of identification information is not stored in a persistent storage associated with the distributed computing system;storing information associated with the first set of one or more pieces of identification information in the persistent storage;generating, based on the first set of one or more pieces of identification information, a result of the computation using the genomic data set;associating the result of the computation with the first policy information;storing the result of the computation and the associated first policy information in the persistent storage;sending the result of the computation to the user system:receiving a second request to perform the computation by a computational module of the distributed computing system using the genomic data set, the second request comprising the first set of one or more pieces of identification information;determining, based on the first set of one or more pieces of identification information, that the result of the computation is stored in the persistent storage;accessing the result of the computation from the persistent storage;determining, based on the first policy information associated with the result of the computation, that the first policy information does not permit sending the result of the computation to the system associated with the second request; andpreventing the result of the computation from being sent to the system associated with the second request. 2. The method of claim 1, wherein the method further comprises receiving, from the stakeholder system, the genomic data set. 3. The method of claim 1, wherein the method further comprises receiving second policy information securely associated with the genomic data set articulating one or more second requirements associated with the use of the genomic data set. 4. The method of claim 3, wherein generating a result of the computation using the genomic dataset comprises determining that the one or more second requirements articulated by the second policy information have been met. 5. The method of claim 3, wherein the second policy information is received from the stakeholder system. 6. The method of claim 1, wherein the first set of one or more pieces of identification information comprises authentication information. 7. The method of claim 1, wherein the first set of one or more pieces of identification information comprises a cohort selection associated with the genomic data set. 8. The method of claim 1, wherein the first set of one or more pieces of identification information comprises instruction information associated with the computation. 9. The method of claim 1, wherein the method further comprises associating the information associated with the first set of one or more pieces of identification information with the result of the computation in the persistent storage. 10. The method of claim 1, wherein the information associated with the first set of one or more pieces of identification information comprises a computed hash of the first set of one or more pieces of identification information. 11. The method of claim 1, wherein the information associated with the first set of one or more pieces of identification information comprises the first set of one or more pieces of identification information. 12. The method of claim 1, wherein the genomic data set comprises human genomic data. 13. The method of claim 1, wherein determining that the result of a prior computation is not stored in the persistent storage comprises: computing a hash of the first set of one or more pieces of identification information;determining that the hash of the first set of one or more pieces of identification is not stored in the persistent storage; andbased on the determination, determining that the result of the prior computation is not stored in the persistent storage.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (6)
Ait-Mokhtar, Salah, Efficient knowledge base system.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.