Programmatic Data Control

Covenants Control Your Data & Secure It Everywhere

Contain, secure, contract, encrypt, transfer, audit, program, and monetize your data 

Technical Diagram
Master Data Controller

MASTER DATA CONTROLLER

Control Your Data From One Location

People manage email opt-ins, cookie selections, and site privacy choices across many organizations from one convenient location. Master Data Controller ™ presents understandable preferences and data controls. Configure Artificial Intelligent Agents who work on your behalf to automatically manage your identities and data. 

Organizations use the Master Data Controller ™ to manage and audit all organizational data exchanges from a single location augmented with contract enforcing Covenants shared between their growing number of data partners, their data automations within and outside the organization, their remote associates, customers, and users. Configure Artificial Intelligent Agents to automatically audit and remediate data and security compliance. 

Master Data Controller

Manage, contract, control and monetize your organizational data. Master Data Controller ™ provides a single point of control to manage and audit all organizational data exchanges with customers, partners, and associates. Covenants contractually augment and enforce all data exchanges. 

Use Identities of Your Choice

Using federated and Self Sovereign Identity technologies and standards, control your many identities across many organizations. People can create and use different identities for different contexts and roles like work, or recreational activities. 

Z

Contract All Data Uses

All future uses of your data require your express permission using the medical standard of informed consent. We cannot know all the potential future uses for our data but we can require our consent to all emergent new uses. Let Covenants automatically enforce your data agreements

Simplified Data & Identity Sharing

A consistent data and identity sharing user experience grows trust and data exchange in a virtuous cycle. One consistent open source OAuth 2.0 user experience raises user confidence accelerating data sharing. 

g

Unified Marketing & Privacy PreferenceS

Automatically synchronize privacy settings like email opt-ins, cookie tracking selections, and site privacy choices across many brand relationships from a single location.

One-Click Registration

One-Click registration simplifies and accelerates new digital relationships. Control and change identity and data sharing experiences. Covenants ensure you control your data everywhere it moves and grows.

*

Push Data Updates & Accept Access REquests

Covenants automatically update when you change your information like a new address, phone number or name change. Granting other people like support agents access to your data also confirms your identity. 

Data Remote Control

You control your data. Consent to specific data uses. Revoke consent and access with one click. Covenants are created, transferred, versioned, deactivated for noncompliance, reactivated for compliance, eventually ended revoking all data access, and finally flagged for deletion.

Programmatic Data Control Image

DATA CONTAINERS

Secure All Your Data Everywhere

Data Containers are specially designed transferable Programmable Data Objects containing a single person’s data and media like images, video, audio, key/pair value, and SQL relational structures.

Each Data Container is “read only” for edge caching and optimal performance. Changes to master data sources automatically version and update all published Data Containers.

By design, Accesr can never access your data or enable others to access your data. We can only reveal metadata about data transactions like the date/time and parties involved.

Master Data Fabric

Master Data Fabric ™ tracks the data container lifecycle tracking all replicas, aggregates, physical locations, data lineage, and contract lineage. Data changes automatically version and update all downstream containers keeping all copies synced to the master data source.

Data Container Tracking

Data Containers are registered and tracked with a Universal Unique Identifier (UUID) within the Master Data Fabric ™. The source URL and the Data Container location URL enable remote control, versioning, and auditing while tracking and enforcing global data and contract lineage. 

Data Container Datastore

The Data Container Datastore can secure thousands of different tables, with thousands of fields, each with different datatypes and constraints, all automatically indexed for rapid retrieval, and all stored efficiently and compactly in a single disk file. 

~

Secure Data from Hackers

Criminals will avoid Covenants and look for easier targets. Covenants encrypt your data with individual keys and grant access when compliance is assured. A data breach requires criminals to decrypt millions of individually encrypted and tracked data containers. 

Bring Your Own Encryption (BYOE)

Secure your data with BYOE of your choice and keys you control. By design, Accesr can never access your data or enable others to access your data without your awareness and cooperation.  

Data Remote Control

You control your data. Consent to specific data uses. Revoke consent and access with one click. Covenants are created, transferred, versioned, deactivated for noncompliance, reactivated for compliance, eventually ended revoking all data access, and finally flagged for deletion.

Edge Data ControlLer

 The Edge Data Controller  gates and controls all access to Data Containers while enforcing Smart Data Contracts. The Edge Data Controller  enforces compliance at network edge enabling or disabling data access while providing secure Edge Compute data intensive functionality.

+

File TRansfer Hack

Any platform that shares files can also transfer Covenants. Imagine your digital relationships across any file transfer platform sending and receiving Covenants. Control of remote data flows over other file transfer platforms secures your messages and data exchanges with everyone. 

Kovenant Image

Edge Data Controller

Smart Data Contracts

Smart Data Contracts ™ define, enforce and audit data preferences, policies, licenses, and terms of service permitting specific desirable use cases while prohibiting undesirable use cases of your choice.

Define hard and soft data limits while retaining the right to port your data, delete your data, restrict storage, and enforce processing jurisdictions.

Review, revise, or revoke your Smart Data Contracts ™ at anytime. It’s your data so you should control where it’s located or copied and how it’s processed, used and monetized by yourself and others. 

Smart Data Contract

Smart Data Contracts  are self executing, self enforcing and auditable digital agreements. Enforce organizational data policies, data licenses, and terms of use restricting all future use cases. Customers set their own terms of use and configure multi-party choreographed personalization. 

Creative Commons Compatibility

Smart Data Contracts  are compatible with Creative Commons License Agreements. They are structured the same way with three layers: the lawyer-readable legal code, the human-readable deed, and the machine-readable code.

Edge Cache & Control

The Edge Data Controller  gates and controls all access to Data Containers while enforcing Smart Data Contracts. The Edge Data Controller  enforces compliance at network edge enabling or disabling data access while providing secure Edge Compute data intensive functionality.

Use Case Based Pricing

Constrain the uses for the data returned from your API and data commerce. Receive from partners and customers constrained data in return. Data use cases can be priced based on the value of types of data transactions. New use cases are permission based enabling data owners to create new types of digital pricing models as data uses change. 

Automated Privacy Enforcement

Covenants enforce and automate your legal rights like the right to Consent, to Be Forgotten, to Data Portability and to Jurisdictional Compliance. Covenants enforce and automate privacy regulations, data policies and licenses as well as customer centric Covenants.

Edge Compute & Edge AI

Edge Compute and Edge AI shift data processing as close to end users as possible for performance, security and privacy purpose. This enables data intensive workloads at the network edge closest to end users where security and privacy are best enforced and protected. 

Blockchain Interop

Smart Data Contracts interoperate with blockchain smart contracts enabling hybrid solutions. Blockchains provide global marketplace scale data transactions while Covenants provide private and secure multiparty data transactions. Build revolutionary Dapps with hybrid capabilities.

Programmable Data Architecture

Software Defined Networking (SDN), Storage (SDS), and Compute (SDC) can now interoperate with Software Defined Data (SDD). Automatically relocate data containers to ensure jurisdictional compliance and automate privacy and security requirements.