Systems and methods for bi-directional database application programming interface, extract transform and load system, and user computing device

ABSTRACT

Systems and methods are provided for improved integration between database systems. Data from multiple disparate computing systems is transmitted via bi-directional communication interfaces. The data is stored in its original form from respective data sources and transformed in stream and/or batch processes into one or more predefined formats. Individual transformations are stored and/or recorded. The transformed and/or integrated data is provided to one or more computing devices via the communication interfaces.

INCORPORATION BY REFERENCE TO ANY PRIORITY APPLICATIONS

Any and all applications for which a foreign or domestic priority claim is identified in the Application Data Sheet as filed with the present application are hereby incorporated by reference under 37 CFR 1.57.

This application is a continuation of U.S. patent application Ser. No. 16/449,119 entitled “Systems And Methods For Bi-Directional Database Application Programming Interface, Extract Transform And Load System, And User Computing Device” filed Jun. 21, 2019, which is a continuation of U.S. patent application Ser. No. 15/663,557 entitled “Systems And Methods For Bi-Directional Database Application Programming Interface, Extract Transform And Load System, And User Computing Device” filed Jul. 28, 2017, now U.S. Pat. No. 10,331,667, which claims benefit of U.S. Provisional Patent Application Ser. No. 62/368,981 entitled “Systems And Methods For A Dynamic Bi-Directional Database Application Programming Interface And A Dynamic Extract Transform And Load System” filed Jul. 29, 2016, U.S. Provisional Patent Application Ser. No. 62/380,965 entitled “Systems And Methods For Bi-Directional Database Application Programming Interface, Extract Transform And Load System, And User Computing Device” filed Aug. 29, 2016, and U.S. Provisional Patent Application Ser. No. 62/433,708 entitled “HEALTH USER INTERFACE APPLICATION” filed Dec. 13, 2016, which are hereby incorporated by reference in their entireties.

BACKGROUND

In the area of computer-based platforms, data may be normalized, stored in a database, and queried.

BRIEF DESCRIPTION OF THE DRAWINGS

The following drawings and the associated descriptions are provided to illustrate embodiments of the present disclosure and do not limit the scope of the claims.

FIG. 1 is a block diagram illustrating an example bi-directional communication system, dynamic extract, transform, and load system, and/or data exchange service.

FIG. 2 is a block diagram illustrating another example bi-directional communication system and/or interface.

FIG. 3 depicts example communication interface routines, data types, and/or output.

FIG. 4 is a block diagram illustrating another example dynamic extract, transform, and load system.

FIG. 5 is a block diagram illustrating an example data schema.

FIGS. 6A-6I illustrate example graphical user interfaces of a user computing device.

FIG. 7 is a flowchart of an example method of bi-directional communication, data processing, and/or data exchange.

FIG. 8 is a flowchart of an example method of dynamic data transformation.

FIGS. 9A-9C illustrate additional example graphical user interfaces of a user computing device.

FIGS. 10A-10D illustrate additional example graphical user interfaces of a user computing device.

FIG. 11 is a flowchart of an example method of application communication interface version control.

FIG. 12 is a diagram illustrating a computing system with which certain embodiments discussed herein may be implemented.

FIGS. 13A-13M depict example input and/or output of the bi-directional communication system, dynamic extract, transform, and load system, and/or data exchange service.

FIGS. 14A-14M illustrate additional example graphical user interfaces of a user computing device.

FIG. 15 is a flowchart of an example method of signature generation.

FIG. 16 is a flowchart of an example method of device status verification.

DETAILED DESCRIPTION

Various aspects of the disclosure will now be described with regard to certain examples and embodiments. They are intended to illustrate but not to limit the disclosure. Nothing in this disclosure is intended to imply that any particular feature or characteristic of the disclosed embodiments is essential.

It may be beneficial for disparate computing systems operating on various platforms to communicate and/or exchange data with one another. One approach is to normalize and store data from multiple disparate electronic record systems in a standardized format in a database. However, data centralization and/or normalization may result in inefficiencies and/or inaccuracies in the data. Moreover, problems with processing, storing, and providing data arise when data comes from different sources and is in different formats. For example, patient's medical data may be maintained by different providers in different formats.

Disclosed herein are embodiments of systems and methods that may be used to advantageously exchange data between disparate computing systems in an efficient and accurate manner. The disparate computing systems may include different electronic record systems, different information systems, and/or various user computing devices. For example, data may be collected from disparate data sources and transformed and/or integrated according to one or more predefined formats. The data may be transmitted via bi-directional, secure, and/or customizable communication interfaces. The exchange and/or storage of the data may comply with one or more regulations and/or laws. The data may be stored in its original form from respective data sources and transformed in stream and/or batch processes into the one or more predefined formats. Individual transformations may be stored and/or recorded. For example, the storage and/or recordation of transformations may correspond to an audit log. Individual providers and/or consumers of data may specify how the data should be transformed, such as de-identified, who can access the data, and/or for what period of time it may be accessible. The data from multiple data sources may be integrated and/or grouped according to one or more identification processes. The transformed and/or integrated data can be provided to one or more computing devices via the communication interfaces. The systems and methods described herein may improve the accuracy, security, and efficiency of data processing and/or computing systems. For example, the systems and techniques described herein may improve the functioning of the computer and/or computing systems, such as increased flexibility in data processing, faster search and/or transformation times, and/or improved data security.

Relational databases typically follow a number of rules and guidelines for organizing data items, such as data normalization. A relational database specifies that each data item be uniquely classified as a particular instance of a relation. Each set of relations is stored in a distinct table. Each row in the table represents a particular data collection, and each column represents an attribute that is shared over all data items in that table. In information exchanges, data from multiple data sources are sometimes stored in normalized format in relational databases. Accordingly, data from two different systems, which may originate in different formats, are transformed into a single data format in the relational database. Accordingly, inaccuracies may arise in the data normalization. For example, in a health information exchange context, lab results from a data provider may include five decimal places of precision and lab results from a different data provider may include four decimal places of precision. Continuing with the example, the normalized database of the health information exchange may only store three decimal places of precision, and, therefore, storing the lab results from the data providers results in loss of precision. Thus, a consumer of the data that requests lab data for four or five decimal places cannot achieve such precision from the health information exchange. Moreover, databases also typically follow the create, read, update, and delete (CRUD) model. Accordingly, updates and/or deletions to a row in the database permanently affect downstream consumers of such data. The systems and techniques described herein may allow for more flexible and/or reliable data exchanges.

An example implementation of the relational database model is where providers require other networks to place their data into a central repository. This data is often manipulated in an attempt to normalize all of the data to an even baseline before ever sending the data to the end repository. Depending on the system, different workflows are utilized by the provider to move data; if batches are incorrectly processed on the data, duplicate records are made, or even entire batch processes have to be rerun. When data is shared across networks, entire record sets are shared rather than individual data points. The medium of exchange is only set by running a VPN tunnel and then often sending the data raw, above layer 3 of the Open Systems Interconnection (OSI) model. Once data has been moved from one provider to another, audit logs of whom has touched or viewed the data (if they exist at all) often lives only on the originating systems, which makes building compliance reports a taskly process.

The systems and methods described herein may be intrinsically tied to network and/or computer technology because such solutions may be related to communication over computer networks, Application Programming Interfaces, data processing, and/or computer data security. For example, the data communication techniques and solutions described herein may be intrinsically tied to computer networks and/or one or more network protocols, such as HTTP. The processes for efficiently transforming data according to multiple data formats in a batch and/or stream manner for improved query times also may be intrinsically tied to database technology.

The systems and methods described herein may improve computer-related technology. In some embodiments, a data exchange service and/or transformation system may improve over relational databases and/or address the deficiencies of data normalization. The data exchange service and/or transformation system may store the original data in its original format as received from one of multiple disparate data sources. The data schema and/or data stores of the data exchange service may not follow the CRUD pattern. The underlying data store architecture of the data exchange service may permit Create and Read, but may not allow Update nor Delete. Since updates may not be permitted, multiple versions of data may be stored and/or the data exchange service may indicate which versions of data are the latest or most up to date. Thus, the deficiencies of normalized data systems from multiple data sources may be addressed by storing the original data, not permitting deletes or updates of data, and/or storing multiple transformations of data. The data exchange service and/or transformation system can be more flexible and/or reliable than normalized data systems that typically integrate data from multiple sources by storing the data in a single format. The systems and methods described herein may enable faster computer processing. For example, streamed processing by the one or more workflows of the transformation system may result in near-time or real-time generated data according to one or more data formats. Accordingly, the processed data in the one or more data formats may be available via the communication interface within seconds of receiving the original data. Further, in some embodiments, the distributed architecture of the workflows of the transformation system and/or the communication interface of the data exchange service may result in faster responses times to requests for data.

Example Data Exchange System

FIG. 1 illustrates an example data exchange service 112, according to some embodiments of the present disclosure. In the example of FIG. 1 , the network environment 110 includes a network 122, a data exchange service 112, a user computing device 102, and a provider 104. As used herein, users, user computing devices, providers, and/or location establishments may be referred to as entities. Various communications between these services, systems, and/or devices are illustrated. For example, the user computing device 102 may send and/or receive data from the data exchange service 112, and/or the providers 104 may send and/or receive data from the data exchange service 112. Thus, two or more providers 104 may effectively communicate with one another via the data exchange service 112. Additionally or alternatively, the user computing device 102 may receive data that originally came from a provider 104 and that has been potentially modified by the data exchange service 112.

The example data exchange service 112 includes a communication interface 114, a transformation system 100, and data store(s) 116A-116C. An example of the communication interface 114 is a bi-directional Application Programming Interface (API). Data may be received and/or transmitted to the data exchange service 112 via the communication interface 114. The data may be processed by the transformation system 100 and/or stored in multiple formats in the data store(s) 116A-116C.

In some embodiments, the data exchange service 112, upon receiving data, can dynamically extract, transform, and/or load the data according to one or more customized transformations. As described herein, the data may be transformed in a stream and/or batch process according to multiple customized transformations, such that each consumer of the data may receive the data in a specified format. Moreover, the original data may be stored and/or each transformation of the data may be stored as an audit log. Accordingly, data consumers may receive data within seconds after the initial request due to the near-time or real-time processing of the data that occurs according to one or more specified transformations.

In some embodiments, the systems and methods described herein may be applied in the healthcare context. For example, the data exchange service 112 may be implemented to enable Healthcare as a Service (HaaS). In the example, the dating exchange service 112 may enable healthcare scheduling, messaging, retrieval of patient summary, clinical, and/or analytics data, processing of patient intake forms, physician searching, real or near-time eligibility, payment, demographics, provide a consistent display of healthcare data, ordering of healthcare products, and/or other healthcare services described herein. The bi-directional communication interface and/or data stores of the data exchange service 112 may implement the workflows and/or customized logic for processing patient-related data to enable the healthcare services. Example providers and/or data sources 104 include electronic medical records (EMR) systems, hospital information systems (HIS), radiology information systems (RIS), laboratory information systems (LIS), dietary information systems, picture archiving indication systems (PACS), emergency department and/or room systems, medical transcription systems, and/or some combination thereof. Example EMR systems that may be supported by the data exchange service 112 (via direct database access and/or via the communication interface 114) include Allscripts, IDX, Centricity, and MediTech. Example interfaces, communication protocols, and/or specifications that may be supported by the communication interface 114 include HL7, HL7 over SSL, HL7v2, HL7v3, Minimal Lower Layer protocol (MLLP), Fast Healthcare Interoperability Resources (FIHR), Continuity of Care Document (CCD), Clinical Document Architecture (CDA), Consolidated Clinical Document Architecture (CCDA), Digital Imaging and Communications in Medicine (DICOM), Nationwide Health Information Network (NwHIN) Direct, X12, and/or some combination thereof.

In some embodiments, the data exchange service 112 can include the data stores 116A-116C. The data stores 116A-116C can include a NoSQL database and a search engine. Data may be stored in one or more of the data stores 116A-116C to take advantage of respective benefits for each data store, such as the benefits of particular data store types for optimized writing, reading, and/or searching. The transformation system 100 can include workflows to perform the data processing. Each workflow may include instructions sets to perform the data processing. The data exchange service 112 can receive original data via the communication interface 114. The data exchange service 112 can store the original data in the data stores 116A-116C in its original format. The transformation system 100 can identify the applicable workflows and/or instruction sets to apply to the original data.

A first workflow can generate first data from the original data by applying the first instruction set to the original data. A second workflow can generate second data from the original data by applying the second instruction set to the original data, where the first instruction set differs from the second instruction set. Thus, the transformation system 100 can include customized logic to generate multiple different formats of transformed data from the original data. The transformation system 100 can store the first data and the second data in the data stores 116A-116C, such as the NoSQL database and the search engine.

The data exchange service 112 can receive a first request from a first external computing device via the communication interface 114. In response to the first request, the data exchange service 112 can determine to retrieve the first data from the NoSQL database where, for example, the first request includes an identifier that corresponds to the first data. When compared against other databases, such as relational databases, advantages of NoSQL databases can include that they are more scalable and provide superior performance, and that the data model of NoSQL databases can address several shortcomings of other data models, such as the relational model. The advantages of NoSQL databases include being able to handle large volumes of structured, semi-structured, and unstructured data. The data exchange service 112 can transmit the first data to the first external computing device.

The data exchange service 112 can receive a second request via the communication interface 114. In response to the second request, the data exchange service 112 can determine to retrieve the second data from the search engine where, for example, the second request includes a search parameter. In some embodiments, a search engine can advantageously search data in a table format, such as a table with a large number of rows and/or columns. The data exchange service 112 can transmit the second data to the second external computing device.

In some embodiments, the workflows of the transformation system 100 can include logic determine whether a particular workflow should be applied to data. The first instruction set of the first workflow can include first boolean logic. The transformation system 100 can determine that the original data corresponds to a particular type of data. The transformation system 100 can determine, according to the first boolean logic, to generate the first data because the original data corresponds to the particular type of data. Another workflow can include a different instruction set and different boolean logic, the transformation system 100 can determine, according to the different boolean logic, to not generate data according to a different instruction set because the original data corresponds to the particular type of data.

In some embodiments, advantages of the transformation system 100 storing the original data and/or including workflows to process data is that additional instruction sets and/or workflows can easily be added to the transformation system 100. The transformation system 100 can add a third workflow to the existing workflows. The third workflow can include a third instruction set for processing data. The transformation system 100 can then apply the third workflow to the original data generate third data according to the third instruction set. The transformation system 100 can store the third data in in the data stores 116A-116C.

FIG. 2 illustrates another example data exchange service 112 and communication interface 114, according to some embodiments of the present disclosure. The embodiment of FIG. 2 may be similar to the embodiment of FIG. 1 . For example, in the embodiment of FIG. 2 , the network environment 110 includes a network 122, a data exchange service 112, a user computing device 102, and a provider 104. The example data exchange service 112 includes an internal communication interface 136, and may include additional elements such as a transformation system and/or data stores (not illustrated). The example communication interface 114 includes a router 130, an outbound queue service 132, and an internal queue service 134.

In some embodiments, the communication interface 114 is load balanced. For example, the communication interface 114 may receive requests, such as HTTP requests. In the example, clients may request through HTTP, DNS, and/or SSL. The router 130 may be load balanced to receive many requests. For example, the router 130 may include many servers, such as in a hosted or “cloud” computing environment, and may use a load balancer, such as NGINX. Thus, the load-balancing of the communication interface 114 may be scaled horizontally (such as adding additional servers) and/or vertically (such as increasing the computing resources of one or more servers). Example load balancing methods include round-robin, a least connection method (a request is sent to the server with the least number of active connections with server weights taken into consideration), an IP hash method (the server to which a request is sent is determined from the client IP address), a generic hash method (the server to which a request is sent is determined from a user-defined key which may be a text, variable, and/or some combination thereof), a least time method (select the server with the lowest average latency and the least number of active connections, where the lowest average latency may be calculated based on one or more parameters, such as time to receive the first byte from the server or time to receive the full response from the server), or some other method. The communication interface 114 may further be implemented to be stateless.

The example router 130 may be a proxy communication interface, such as a proxy API, to communicate with other services. For example, the router 130 may determine where to forward requests and/or data, such as forwarding data to other micro services. The distributed services of the communication interface 130 may use an identity service to communicate with one another. For example, the identity service may use unique service identifiers and/or may authenticate services. In the example, the router 130 may determine whether to forward data to the outbound queue service 132 and/or the internal queue service 134. In some embodiments, the queue services 132 and/or 134 may be load-balanced, such as by using NGINX.

In the outbound queue example, the router 130 has programmatically determined that additional data may be required from an external source. The outbound queue service 132 may send and/or request data from an external provider 104. The outbound queue service 132 then retrieves data and/or receives one or more messages from the external provider 104, such as an external hospital system. The outbound queue service 132 may send a subsequent message to an internal service to transmit the received external data.

In some embodiments, after data has been processed through the queue services 132 and/or 134, the data is transmitted to the remainder of the data exchange service 112 via the internal communication interface 136. For example, the internal communication interface 136 may be an internal API for transmitting data and/or requests to the transformation system 100 and/or data stores 116. Advantages of multiple layers and/or segmentation of services, queues, authentication, and/or messaging systems may include increased security of the data exchange service 112 because this example architecture may require a potential attacker to compromise multiple layers and/or different segments of the data exchange service 112 to successfully penetrate the system.

FIG. 3 depicts example communication interface routines, data types, and/or output, according to some embodiments of the present disclosure. For example, the data exchange service 112 may communicate via the example communication interface routines 310, 312, and 314. In some embodiments, the communication interface routines 310, 312, and 314 may correspond to an API. In some embodiments, the communication interface of the data exchange service 112 may include aspects of representational state transfer (REST) and/or be RESTful. The communication interface may receive and/or return data objects, such as in a JSON or other data format. The communication interface of the data exchange service 112 may further correspond to a framework. An example framework includes a publicly available application programming interface framework. Accordingly, the example APIs may be dynamic. An example API may be dynamically updated via an upload of a configuration file.

The communication interface routines 310, 312, and 314 may correspond to communication specifications of the data exchange service 112. For example, the communication interface routines 310, 312, and 314 may correspond to medication, medical condition, and/or hospital services. In some embodiments, the communication interface routines 310 support HTTP and uniform resource identifiers (URIs). For example, with respect to the communication interface routines 310, one or more medication objects may be retrieved for a user via the GET “/medication” method; a specific medication object may be retrieved via the GET “/medication/:id” method where “:id” corresponds to a parameter; a medication object may be created via the POST method “medication/create”; a specific medication object may be updated via the PUT method “medication/update/:id” where “:id” corresponds to a parameter; and/or a specific medication object may be removed via the DELETE method “/medication/remove/:id” where “:id” corresponds to a parameter. With respect to the communication interface routines 312, a condition may be created via the POST method “condition/create”; and/or a condition may be searched via the GET “/condition/:action” method. As described herein, the data exchange service 112 may support multiple communication interface routines, such as dynamically supporting additional APIs per provider. Additionally or alternatively, the communication interface routines 310, 312, and 314 use and/or support a different communication protocol other than HTTP.

The communication interface routines may receive parameters and/or return output. For example, with respect to the communication interface routines 314, a user's clinical history may be retrieved via the GET method “/hospital/summary/:provider_id”. The GET method of the communication interface 314 may include the parameter 320 for a provider_id of parameter type “query” and/or data type “string.” The GET method of the communication interface 314 may return output 322. Example output 320 includes a data object, such as a JSON data object. In this example, the output 320 includes data regarding a user's clinical history.

The communication interface routines 310, 312, and 314 may correspond to HTTP method conventions. For example, a GET method may retrieve information from a server as specified by the URI. A POST method may be used to send data to the server as specified by the URI. A PUT method may replace a current representation of the target data object with an uploaded data object as specified by the URI. A DELETE method may remove a current representation of the target data object as specified by the URI. In some embodiments, the data exchange service 112 may support PUT and DELETE methods; however, the underlying implantation of the data exchange service 112 may not follow the CRUD pattern, as described herein. For example, the data exchange service 112 may not actually replace and/or delete data in response to receiving PUT and/or DELETE method invocations.

FIG. 4 is a block diagram illustrating another example dynamic extract, transform, and load system, according to some embodiments of the present disclosure. In the example of FIG. 4 , the computing environment 400 includes a feed 402, workflows 404, 406, 408, 410, and 412, and one or more data stores 420 and 422A-422B. The computing environment 400 may correspond to portions of the data exchange service 112. For example, the communication interface 114 of FIG. 1 and/or the internal communication interface 136 of FIG. 2 may correspond to the feed 402. The transformation system 100 of FIG. 1 may include the one or more workflows 404, 406, 408, 410, and 412.

The example feed 402 may receive data in stream and/or batch fashion, as described herein. In a healthcare context, example received data includes ADT, electronic medical records, scheduling, messaging, patient summary, laboratory, clinical, analytics, patient intake forms, physician queries, real or near-time eligibility, payment, demographics (such as patient data including names, addresses, or other patient-related information), healthcare product orders, other healthcare data, and/or some combination thereof. As used herein, the terms “laboratory,” “labs,” and “lab” may be used interchangeably. Example formats of the received data include HL7, HL7 over SSL, HL7v2, HL7v3, FIHR, CCD, CDA, CCDA, DICOM, PACS, NwHIN Direct, X12, and/or some combination thereof. As an initial matter, a copy of the original data and/or feed data may be stored as originally received in the one or more data stores 420. The feed data is then transmitted to one or more workflows 404, 406, 408, 410, and 412 to process the data.

The one or more workflows process the data and store the generated data in the one or more data stores 422A-422B. For example, a first workflow 404 may include logic, such as boolean logic, to determine whether the received data should be processed by the first workflow 404. Such example logic may include identifying that the received data includes a particular type of data, such as ADT data. Any of the workflows 404, 406, 408, 410, and 412 may be a process in a computation and/or processing system, such as a distributed and/or processing computation system, a streaming computation and/or processing system, a distributed storage system (such as using the MapReduce programming model), and/or some combination thereof. Any of the example workflows 404, 406, 408, 410, and 412 may process data in a near-time or real-time streaming fashion. For example, in a near-time or real-time streaming context, the first workflow 404 may correspond to logic for processing ADT data including a first determination that the received data includes ADT data. The first workflow 404 may initially determine whether the ADT data includes allergy, patient, and/or encounter data. In the allergy example, the first workflow 404 includes an instruction set to parse and/or extract the allergy data according to one or more specifications. The instruction set may include instructions to programmatically generate allergy data according to one or more defined formats. For example, the defined formats may include logic specific to a provider or consumer of the data, and/or that formats the data according to legal or compliance requirements. The processed allergy data is then stored in the one or more data stores 422A-422B. For example, data store 422A may correspond to a distributed database, and/or data store 422B may correspond to a search engine. Additional example data stores include a NoSQL database, a distributed search engine, a RESTful search engine, and/or some combination thereof. The one or more data stores 422A-422B may include multiple of data store types, each of which may be used for respective benefits, such as the benefits of particular data store types for optimized writing, reading, and/or searching. Additionally or alternatively, any of the workflows 404, 406, 408, 410, and 412 may process data in a batch manner. For example, the first workflow 404 may receive unstructured data, which may be queued in batches until sufficient data has been received for processing.

In some embodiments, advantages of the automated processing of the received data according to one or more data formats include improved performance of the data exchange service 112. For example, streamed processing by the one or more workflows 404, 406, 408, 410, and 412 may result in near-time or real-time generated data according to one or more data formats. Accordingly, the processed data in the one or more data formats may be available via the communication interface within seconds of receiving the original data.

In some embodiments, individual transformations and/or steps to process the data may be stored. For example, each instruction and/or operation to generate a data item from the original data may be stored in a data store. Accordingly, a workflow may generate new data by replaying and/or changing some of the previous individual transformations of the data. In some embodiments, the instruction sets for generating the processed data may be dynamic. For example, additional instruction sets may be added to a workflow that enables the workflow to process the original data according to new specifications. In other words, the stored transformation and/or steps allow the data exchange service 112 to optionally “replay” the transformation and/or steps to the original data.

Continuing with the first workflow example, the first workflow may additionally or alternatively process the received data. For example, patient and/or encounter data may be extracted from the ADT data. As used herein, example encounter data includes an in-patient visit at a hospital, clinic, and/or location establishment. If the ADT data includes demographic data, the demographic data may be extracted. Similar to the processing of allergy data, the first workflow may include instruction sets to generate demographic, patient, and/or encounter data according to one or more defined formats. Similarly, the generated data may be stored in the one or more data stores 422A-422B, such as a distributed database, a NoSQL database, a distributed search engine, a RESTful search engine, and/or some combination thereof.

Additionally or alternatively, additional workflows may process the received original data. In some embodiments, the additional workflows may process the data in a similar manner as compared to the first workflow. A second example workflow 406 may be configured to process CCDA data. For example, the second workflow 406 may determine, according to boolean logic, that the original received data includes CCDA data, and that the data should be processed by the second workflow 406. In the second workflow example, the second workflow 406 may extract medication and/or diagnosis data from the CCDA data and generate processed medication and/or diagnosis data in one or more defined formats according to one or more instruction sets. The second workflow 406 can then store the generated data in the one or more data stores 422A-422B. A third example workflow 408 may be configured to process immunization data. Similar to previous examples, the third workflow 408 may: determine to process the original data, such as determining that the original data includes immunization data; extract and/or parse the immunization data, including generating processed immunization data in one or more defined formats according to one or more instruction sets; and/or store the generated data in the one or more data stores 422A-422B. A fourth example workflow 410 may be configured to process labs data. Similar to previous examples, the fourth workflow 408 may: determine to process the original data, such as determining that the original data includes labs data; extract and/or parse the labs data, which may further include pathology, blood bank, and/or microbiology data; generate processed labs, pathology, blood bank, and/or microbiology data in one or more defined formats according to one or more instruction sets; and/or store the generated data in the one or more data stores 422A-422B. As illustrated, the computing environment 400 may process any number of different data formats by additional workflows. For example, additional workflows may be dynamically added to the computing environment 400 and/or the workflows may dynamically receive additional instruction sets for processing and/or generating data according to new data formats.

FIGS. 13A-13M depict example input and/or output of the bi-directional communication system, dynamic extract, transform, and load system, and/or data exchange service. The example input and/or output 1302, 1304, 1306, 1308, 1310, 1312, 1314, 1316, 1318, 1320, 1322, and/or 1324 may correspond to one or more data formats. The example formats of input and/or output 1302-1324 may correspond to HL7, CCDA, and/or JavaScript Object Notation (JSON) data format. Example input and/or output 1302-1324 may be illustrative and may not conform exactly to one or more particular data formats. Moreover, as described herein, additional formats for input and/or output may be supported by the data exchange service 112 and/or the transformation system 100, such as FHIR, DICOM, PACS, NwHIN Direct, X12, XML, or any other data format.

In FIGS. 13A and 13B, the example input and/or output 1302 and/or 1304 may correspond to ADT data. The input data 1302 and/or output data 1304 can include patient data, such as demographics data. The example input 1302 may be in a HL7 data format, which may include delimiters and/or separators such as the pipe (|), caret ({circumflex over ( )}), ampersand (&), and/or tilde (˜). As described herein, the data exchange service 112 and/or the transformation system 100 may transform the example input 1302 into the example output 1304, which may correspond to a JSON data format. In some embodiments, a workflow, such as the workflows of FIG. 4 , may ingest and/or parse the input data into a data object format and/or a key-value pair database. The workflow may then transform the ingested data according to one or more instructions sets. The one or more instruction sets may specify the fields, values, and/or key-value pairs to include in the output data, such as example output 1304. The workflow may also include and/or invoke a formatter that is configured to generate the output data according to one or more formats, such as, JSON, XML, HL7, CCDA, FHIR, a custom format, and/or any other data format. In some embodiments, the output may be enhanced with additional data. For example, the example output 1304 includes an identifier, such as a “patient_id” value, which may be used through the communication interface (such as the API) of the data exchange service 112 to further query, update, and/or transmit data regarding the particular patient. For example, the patient_id may correspond to a data object within the data exchange service 112. In some embodiments, the patient_id may correspond to a stateless data object where the patient_id key may expire after a configurable period of time.

The identifier can include a number, string, and/or randomized string or number. An example identifier is a Globally Unique Identifier (“GUID”). In some embodiments, GUIDs may not be guaranteed to be unique. However, the chances of a repeating unique identifier may be extremely low and/or negligible due to their implementation. For example, a unique identifier may be generated from random or pseudorandom numbers with 122 bits such that the total number of unique identifiers is 2¹²². Thus, the unique identifiers are so large that the probability of the same number being generated randomly and/or pseudo-randomly twice is negligible. In some embodiments, shorter and/or longer identifiers may be used.

In FIGS. 13C and 13D, the example input and/or output 1306 and/or 1308 may correspond to CCDA data. The example input 1306 may be in a CCDA data format, may include XML and/or HTML data. The input data 1306 and/or output data 1308 can include medications data. In some embodiments, a workflow, may ingest and/or parse the CCDA input data into a data object format and/or a key-value pair database, which may include parsing the XML and/or HTML data. For example, the workflow may transform the ingested data into the example output 1308, as described herein. Similar to the patient_id described above, the medication_id of the example output 1308 may correspond to a data object that may be used via the communication interface for communication with the data exchange service 112 and/or may expire after a configurable period of time.

In FIGS. 13E and 13F, the example input and/or output 1310 and/or 1312 may correspond to immunization data. The example input 1310 may be in a HL7 data format. As described herein, the data exchange service 112 and/or the transformation system 100 may transform the example input 1310 into the example output 1312, which may correspond to a JSON data format. Similar to the patient_id described above, the immunization_id of the example output 1312 may correspond to a data object that may be used via the communication interface for communication with the data exchange service 112 and/or may expire after a configurable period of time.

In FIGS. 13G-13I, the example input and/or output 1314 and/or 1316A-1316D may correspond to lab data. The example input 1314 may be in a HL7 data format. As described herein, the data exchange service 112 and/or the transformation system 100 may transform the example input 1314 into the example output 1316A-1316D, which may correspond to a JSON data format. Moreover, the instruction sets to transform the example input 1314 may access coded data to match codes in the example input 1314 to some of the output data of the example output 1316A-1316D. Similar to the patient_id described above, the lab_id of the example output 1316A-1316D may correspond to a data object that may be used via the communication interface for communication with the data exchange service 112 and/or may expire after a configurable period of time.

In FIGS. 13J and 13K, the example input and/or output 1318 and/or 1320 may correspond to lab results data. The input data 1318 and/or output data 1320 can include imaging related data. The example input 1318 may be in a HL7 data format. The example input 1318 may include encoded data. For example, the example input 1318 includes encoded base64 data. As described herein, the data exchange service 112 and/or the transformation system 100 may transform the example input 1318 into the example output 1320, which may correspond to a JSON data format. Moreover, the instruction sets to transform the example input 1318 may decode the encoded data. For example, the example output includes “results,” which may be the decoded data that was originally encoded in the input. For example, a base64 decoding may be used to generate the decoded HTML data in the example output 1320. According, the decoded HTML may be presented in a user interface by the receiving system of the example output 1320. Similar to the patient_id described above, the imaging_id and/or the encounter_id of the example output 1320 may correspond to a data object that may be used via the communication interface for communication with the data exchange service 112 and/or may expire after a configurable period of time.

In FIGS. 13L and 13M, the example input and/or output 1322 and/or 1324 may correspond to vitals data. The example input 1322 may be in a HL7 data format. As described herein, the data exchange service 112 and/or the transformation system 100 may transform the example input 1322 into the example output 1324, which may correspond to a JSON data format. Moreover, the instruction sets to transform the example input 1322 may omit data from the example input 1322. For example, the example input includes temperature: “99 degrees F. (97.6-100.4),” which may indicate an average or summary temperature (e.g., 99 degrees F.) and a temperature range and/or high/lows (e.g., 97.6-100.4). However, a customized instruction set may include logic to output some data (such as the average or summary temperature, “99° F.”) while omitting other data (such as the “97.6-100.4”). Similar to the patient_id described above, the vitals_id of the example output 1324 may correspond to a data object that may be used via the communication interface for communication with the data exchange service 112 and/or may expire after a configurable period of time.

FIG. 5 is a block diagram illustrating an example data schema, according to some embodiments of the present disclosure. The example data schema environment 500 includes data store collections 502, 510, 512, 514, 516, 518, and 520. Each data store collection may include one or more data stores. For example, the data store collection 502 includes data stores 504, 506, and 508. An example data store collection may correspond to a logical grouping of data stores. The example data schema environment 500 may include relations, between the data store collections and/or data stores, which are illustrated as the connecting lines in FIG. 5 .

In some contexts, the example data schema environment 500 may correspond to a star pattern in which primary information is centralized that facilitates the access of data radiating outwards from the primary information. The data store collection 502 may represent the center of the example schema. An advantage of this data schema approach may include that the peripheral information may accessed after accessing a minimal number of relations, such as one or two relations, from the primary information. In the healthcare context, the example data schema environment 500 may correspond to a clinical schema. For example, the data stores 504, 506, and 508 of the data store collection 502 may correspond to patient, encounter, and provider data stores, respectively. Accordingly, the data exchange service 112 may use the centralized patient, encounter, and/or provider data to access the data store collections 502, 510, 512, 514, 516, 518, and 520. Example data in the data store collections 502, 510, 512, 514, 516, 518, and 520 may correspond to lab data, pathology data, allergy data, ontology data, microbiology data, immunization data, radiology data, and/or other clinical data. Accordingly, the patient, encounter, and/or provider data may provide identifying information to access other corresponding clinical data, such as lab data, pathology data, allergy data, ontology data, etc.

In some embodiments, the data store collections and/or data stores may include one or more data store types. Example data store collections and/or data stores may correspond to a distributed database, a NoSQL database, a distributed search engine, a RESTful search engine, and/or some combination thereof. In other embodiments, the data schema environment 500 and/or portions of the environment may be in a relational database. For example, data stores 504, 506, and 508 may be tables in a relational database. The results of the data processing described herein may be stored in the data schema environment 500. The data exchange service may use other schemas for storing different types of data. For example, in the healthcare context, a different schema may be used for analytical data.

In some embodiments, the data schema environment 500 and/or data stores of the data exchange service 112 do not follow the CRUD pattern. For example, the underlying data store architecture of the data exchange service 112 may permit Create and Read, but not Update nor Delete. In the example architecture, data is continuously created. Continuing with the example, since updates may not be permitted, multiple versions of data may be stored and/or the data exchange service 112 may indicate which versions of data are the latest or most up to date. In some embodiments, timestamps and/or versioning history is stored for each revision of data, which may indicate the latest and/or most up to date version of the data. Accordingly, the data exchange service 112 may advantageously allow auditing with a high degree of confidence because updates or deletes may be prohibited.

In some embodiments, the data exchange service 112 is configured to automatically generate communication interfaces from data schema. For example, the data exchange service 112 automatically generates technical documentation from the data schema. The technical documentation may correspond to a format that is compatible with a framework for generating communication interfaces, such as a publicly available application programming interface framework. Accordingly, the communication interfaces, such as APIs, may be automatically generated from the technical documentation. The automatically generated communication interfaces can then be used by clients for communicating with the data exchange service 112.

FIGS. 6A-6I illustrate example graphical user interfaces of a user computing device. The graphical user interfaces 600 of FIGS. 6A-6I are example graphical user interfaces of the user computing device 102 of FIGS. 1 and 2 . The user computing device may include a client, such as an application, and the application may be configured to communicate with the data exchange service 112. User interactions with the graphical user interfaces 600 of FIGS. 6A-6I may cause the client to request data from the data exchange service 112 and/or to send data to the data exchange service 112. Example data that may be sent and/or received between the user computing device 102 and the data exchange service 112 include the data described in further detail with respect to FIGS. 13A-13M. In some embodiments, the data presented on the user computing device is sent and/or received via the network 122 to the data exchange service 112. Example user interactions include messaging and/or appointment scheduling through the graphical user interfaces 600 of the client. Example presentations of the data include the graphical user interfaces 600 for viewing a patient's health data, such as allergies, medications, conditions, documents, immunization data, and/or vitals. Other aspects of embodiments disclosed herein may be illustrated in FIGS. 6A-6I. In various embodiments, aspects of the user interfaces may be rearranged from what is shown and described below, and/or particular aspects may or may not be included.

In FIG. 6A, the graphical user interface 600 enables a user login to the client. In some embodiments, the user interaction to login to the client causes bi-directional communication with the data exchange service 112, such as a first transmission from the client to the data exchange service 112 of login credentials and/or a second transmission from the data exchange service 112 to the client authenticating the user. In FIG. 6B, the graphical user interface 600 includes a menu with user interface elements that may be selected.

In FIGS. 6C and 6D, the graphical user interface 600 includes user interface elements associated with appointment scheduling. In FIG. 6C, the appointment data presented a graphical user interface 600 may be received from the data exchange service 112. In FIG. 6D, a user may schedule an appointment, which may cause data to be transmitted to the data exchange service 112.

In FIGS. 6E-6I, the graphical user interface 600 enables a user to view health data. In FIG. 6E, user interaction with the graphical user interface 600 may cause the client to request health data from the data exchange service 112. As shown in FIG. 6F, the health data may include allergy data, medications data, conditions data, health-related documents, immunization data, and/or vitals data. In FIG. 6G, example allergy data is presented in the graphical user interface 600. In FIG. 6H, example medications data is presented in the graphical user interface 600, such as active or inactive prescriptions for a particular patient. Example data that may be sent from the data exchange service 112 to the user computing device for presentation in the graphical user interface 600 of FIG. 6H includes the data 1308 described with respect to FIG. 13D. In FIG. 6I, example conditions data is presented in the graphical user interface 600, such as active or past conditions for a particular patient.

FIGS. 9A-9C and 10A-10D illustrate additional example graphical user interfaces of a user computing device. The graphical user interfaces 900 of FIGS. 9A-9C and graphical user interfaces 1000 of FIGS. 10A-10D are example graphical user interfaces of the user computing device 102 of FIGS. 1 and 2 . The user computing device may include a client, such as an application, and the application may be configured to communicate with the data exchange service 112. User interactions with the graphical user interfaces 900 of FIGS. 9A-9C and graphical user interfaces 1000 of FIGS. 10A-10D may cause the client to request data from the data exchange service 112 and/or to send data to the data exchange service 112. In some embodiments, the data presented on the user computing device is sent and/or received via the network 122 to the data exchange service 112. Example data that may be sent and/or received between the user computing device 102 and the data exchange service 112 include the data described in further detail with respect to FIGS. 13A-13M. Other aspects of embodiments disclosed herein may be illustrated in FIGS. 9A-9C and 10A-10D. In various embodiments, aspects of the user interfaces may be rearranged from what is shown and described below, and/or particular aspects may or may not be included.

FIGS. 9A-9C depict graphical user interfaces 900 that present a health dashboard. The graphical user interfaces 900 presents vitals data, such as statistics, labs, and medical information that has been recorded and/or collected. The data presented in the graphical user interfaces 900 may be received and/or transmitted from the data exchange service 112. Example data that may be sent from the data exchange service 112 to the user computing device for presentation in the graphical user interfaces 900 of FIGS. 9A-9C includes the data 1324 described with respect to FIG. 13M.

In FIGS. 10A-10D, the graphical user interface 1000 includes additional user interface elements associated with appointment scheduling. In FIGS. 10A-10D, a user may schedule an appointment using the graphical user interfaces 1000, which may cause data to be transmitted to the data exchange service 112.

FIG. 7 is a flowchart illustrating an example bi-directional communication, data processing, and/or data exchange process 700, according to some embodiments of the present disclosure. Some blocks of the example method 700 may be performed by portions of the data exchange service 112. For example, the example method 700 may be performed by any of the systems, computing devices, and/or servers described herein, such as the communication interface 114, the transformation system 100, one or more providers 104, and/or one or more user computing devices 102, and/or some combination thereof. Depending on the embodiment, the method 700 may include fewer or additional blocks and/or the blocks may be performed in an order different than is illustrated.

Beginning at block 705, the data exchange service 112 receives data. For example, the data exchange service 112 may receive data via the communication interface 114. In some embodiments, the communication interface 114 includes an API for receiving the data, as described herein. Additional information regarding communication interfaces and/or APIs is described in further detail with respect to FIG. 3 . In a healthcare context, example received data includes ADT, electronic medical records, scheduling, messaging, patient summary, laboratory, clinical, analytics, patient intake forms, physician queries, real or near-time eligibility, payment, demographics, healthcare product orders, other healthcare data, and/or some combination thereof. Example formats of the received data include HL7, HL7 over SSL, HL7v2, HL7v3, FHIR, CCD, CDA, CCDA, DICOM, PACS, NwHIN Direct, X12, and/or some combination thereof. Data may be sent over HTTP messages and/or may be sent in the JSON data format. In some embodiments, the data is sent securely. Example security mechanisms include Transport Layer Security (TLS), TLSv2, SSL, HTTPS, and/or VPN. Additionally or alternatively, data may be directly received and/or retrieved from one or more providers. For example, data may be automatically extracted from one or more relational databases, such as a SQL database, and/or electronic medical record systems.

At block 710, the data exchange service 112 determines how to route and/or process the received data. For example, the data exchange service 112 may determine that the received data is ready to be processed internally. Alternatively, the data exchange service 112 may determine that the received data requires further supplementation. Additional information regarding routing of data is described in further detail with respect to FIG. 2 and/or router 130 of FIG. 2 . The data exchange service 112 may further use programmatic logic to determine how to process different data. For example, ADT data may be forwarded to a particular workflow for processing, CCDA data may be forwarded to a different workflow for different processing, labs data may be forwarded to yet another workflow for different processing, etc. Additional information regarding workflows and workflow determinations is described in further detail with respect to FIG. 4 . In some embodiments, the data exchange service 112 determines to stream and/or batch process the data.

In the batch processing example, the data exchange service 112 will hold the received data until sufficient other data has been received and/or a determination that the received data is complete. For example, the data exchange service 112 first determines whether the received data is complete or incomplete for batch processing. In the example, incomplete data may be identified based on missing parameters and/or identifiers in the data. Example data that requires batching includes unstructured data, which may include an ending and/or segment identifier to indicate whether the received data is complete. The data exchange service 112 may use other logic to determine whether the data is complete. If the received data is incomplete, the data exchange service 112 may hold the received data in a queue until additional data has been received. In the unstructured data example, where a complete portion and/or segment of the data may be necessary before the unstructured data can be structured and/or parsed in a meaningful manner. Example data that may be batched for processing includes laboratory data. In some embodiments, batch processing may advantageously conserve and/or efficiently use computing resources since such processing may require large computing power and batching the processing of the data may result in fewer bottlenecks to spread out the computationally intensive processing.

At block 715, the data exchange service 112 determines whether additional data should be requested. As described herein, the determination may be based on the type of initial data and/or request that has been received. For example, the data exchange service 112 may have in-patient data available internally to be processed through the internal system. However, a request for out-patient data may cause the data exchange service 112 to request specific out-patient data from an external system, such as a healthcare provider. At block 720, the additional data is retrieved externally. For example, the data exchange service 112 may retrieve data directly from an external provider. In other embodiments, the data exchange service 112 sends a message and/or request to the external provider and the external provider sends one or more messages back to the data exchange service 112.

At block 725, the data exchange service 112 processes the data. For example, the transformation system 100 may receive the data. The data may be stored as originally received. The transformation system 100 may include multiple instruction sets for generating new data according to one or more formats, as described herein. As one example, regulations and/or laws may specify the how certain data should be handled. For example, the Health Insurance Portability and Accountability Act (“HIPAA”) may indicate that certain information be redacted and/or de-identified. Accordingly, an instruction set may include logic for generating redacted and/or de-identified data. Additionally, other instruction sets may be configured to generate, from the same original data, different data according to other formats and/or logic. Additional information regarding data processing is described in further detail with respect to FIGS. 4 and 5 . For example, the generated data sets may be stored in one or more data stores. As described herein, the original and/or processed data may be encrypted when it is stored. The data may be encrypted with a private key. Example encryption algorithms include Triple DES, Blowfish, Twofish, AES, AES-256, AES-256-CBC-HMAC (such as with 4096 bit RSA keys), and/or RSA. The data exchange service 112 may transmit the data internally using cryptographic protocols, such as TLSv2.

At block 730, the data exchange service 112 transmits the data externally. For example, in response to a request, patient data may be transmitted to a user computing device, such as a smartphone and/or desktop. In other examples, data may be transmitted to an external provider, such as a hospital system. In some embodiments, the data is transmitted in response to a communication interface request, such as a request through an API of the data exchange service 112. The data transmission may occur securely over computer networks via the use of security protocols and/or encryption, such as TLS, TLSv2, and/or SSL.

At block 735, the received data is used by a computing device. For example, in the user computing device example, an application on a smartphone and/or a web application may have requested patient data. The user computing device may be accessed by a patient and/or healthcare professional, such as a doctor. The application may present patient medication data, appointment data, patient activity data, acute health data, ambulatory health data, healthcare messages, payment data, eligibility data, and/or any other healthcare service related data. Moreover, via their application, a user may interact with any of their healthcare data, such as requesting medication, sending a message, and/or requesting an appointment, which in turn, further causes additional data to be sent to the data exchange service 112. In other examples, a patient may be discharged from one facility and admitted to another. Accordingly, the receiving facility may request and/or be sent data regarding the new patient via the data exchange service 112.

FIG. 8 is a flowchart illustrating an example dynamic data transformation process 800, according to some embodiments of the present disclosure. Some blocks of the example method 800 may be performed by portions of the data exchange service 112. For example, the example method 800 may be performed by any of the systems, computing devices, and/or servers described herein, such as the communication interface 114 and/or the transformation system 100, and/or some combination thereof. Depending on the embodiment, the method 800 may include fewer or additional blocks and/or the blocks may be performed in an order different than is illustrated. Some blocks of the example method 800 may be similar to blocks of other methods described herein. For example, blocks of the example method 800 may be similar to the blocks of FIGS. 7, 9 , and/or 10.

Beginning at block 805, the data exchange service 112 or a component of the data exchange service 112 receives data. For example, block 705 of FIG. 7 may describe in further detail receiving data from an external data source. The data exchange service 112 may implement an internal communication interface for internally transmitting data to the transformation system 100, as described herein. For example, an internal API may be used to transmit data to the transformation system 100. Additional information regarding internally receiving data is described in further detail with respect to FIGS. 2 and/or 4 . Additional information regarding communication interfaces and/or APIs is described in further detail with respect to FIG. 3 .

At block 810, the transformation system 100 stores the original data. As described herein, advantages of storing the original data may include data integrity and/or robustness of the system to handle additional instruction sets for processing the data, which may be added dynamically. This approach may be in contrast with traditional data normalization systems. An additional advantage of storing the original data is improved auditing. For example, in traditional data normalization systems, if the data is transformed and stored in a single format, the original data and/or format of the data may be lost. Additional information regarding storage of the original data is described in further detail with respect to FIG. 4 .

At block 815, the transformation system 100 preprocesses the data. For example, the transformation system 100 may preprocess the data by extracting the data from containers and/or parsing the data. Example containers include JSON wrappers and/or other data formats. Additional example preprocessing of the data by the transformation system 100 includes determining identifying information from the data.

At block 820, the transformation system 100 identifies applicable workflows. The transformation system 100 may include multiple workflows where one or more workflows may process particular data formats and/or types of data. For example, the transformation system 100 may determine that the ADT workflow should process ADT data, the CCDA workflow should process CCDA data, the labs workflow should process labs data, etc. Additional information regarding workflow determinations is described in further detail with respect to FIG. 4 . As described herein, each workflow may include multiple instruction sets for generating data according to one or more formats. Accordingly, in some embodiments, the identification of the applicable workflows by the transformation system 100 thereby identifies the applicable instruction sets to process the data.

At block 825, the transformation system 100 generates data for the determined workflows. As described herein, multiple data sets may be generated from the same original data according to respective sets of transformation instructions. In some embodiments, the transformation system 100 applies each of the available and/or compatible instruction sets to generate different sets of data into one or more formats. As described herein, the transformation system 100 generates the data sets in a stream and/or batch fashion. Additional information regarding generating processed data is described in further detail with respect to FIG. 4 . As described herein, a workflow may parse the input data, which may be in a particular data format. In some embodiments, the workflow is configured to parse multiple data formats. The parsed data may be stored in a data object and/or data store, such as a key-value database. The available and/or compatible instruction sets may generate output data from the parsed and/or stored data, such as by identifying which of the parsed data should be included in the output data. The available and/or compatible instruction sets may include logic to format the data according to one or more specifications such as number of decimal places, different encodings or decodings, text formats, and/or any other data conventions. The instruction sets may include identifiers that correspond to data objects (such as patient_id, encounter_id, vitals_id, medication_id) for use in the communication interface such as an API. The workflow may include a formatter and/or invoke a formatter to generate the output data according to one or more formats such as JSON, HL7, XML, CCDA, FHIR, a custom data format, and/or any other data format.

At block 830, the transformation system 100 records each of the workflow steps. Continuing with the example where each workflow includes multiple instruction sets for generating data according to multiple formats, each step of an instruction set for generating data may be recorded. An example recorded step may include an individual transformation of a data item, such as converting a data value from six decimal places to three decimal places or redacting a patient name or other identifying information from the generated data. The transformation system 100 may store the workflow steps. For example, the one or more steps may indicate the generation of a new data item from an original data item in the original data. The example one or more steps may indicate an individual transformation of the original data, such as the transformation of an original data item. Example data items include a property, data value, number, string, and/or char value. Additional information regarding storing workflow steps is described in further detail with respect to FIG. 4 .

At block 835, the transformation system 100 stores the generated data. For example, the generated data may be stored in one or more data stores. Example data stores include a distributed database, a NoSQL database, a distributed search engine, a RESTful search engine, and/or some combination thereof. In some embodiments, the generated data may be stored with versioning and/or timestamp information. Accordingly, if an entity requests data, the data exchange service 100 may be able to identify the latest and/or previous version of the requested data based on the particular request. Additional information regarding storing the generated data is described in further detail with respect to FIG. 4 .

FIG. 11 is a flowchart illustrating an example application communication interface version control process 1100, according to some embodiments of the present disclosure. The data exchange system 112 may use different versions of communication interfaces. Accordingly, the systems and techniques described herein may advantageously facilitate the management of multiple communication interface versions to be simultaneously supported by clients and servers. Some blocks of the example method 1100 may be performed by portions of the data exchange service 112. For example, the example method 1100 may be performed by any of the systems, computing devices, and/or servers described herein, such as the communication interface 114, one or more providers 104, and/or one or more user computing devices 102, and/or some combination thereof. Depending on the embodiment, the method 1100 may include fewer or additional blocks and/or the blocks may be performed in an order different than is illustrated.

Beginning at block 1105, a server may transmit an application and/or an update to an application. For example, an executable application may be downloaded to a user computing device, such as a smartphone. In some embodiments, the application as downloaded and/or installed may include multiple versions of the communication interfaces. For example, there may be multiple versions of the same communication interface. Additional information regarding communication interfaces are described in further detail with respect to FIG. 3 . Accordingly, the application as downloaded and/or installed may include the instructions for multiple versions of communication interfaces. However, at a particular time, the application may be configured for a specific version of a particular communication interface.

At block 1110, the data exchange service 112 transmits a message to the application. The example message includes instructions for the application to update to a different version of the particular communication interface. Example advantages of this approach may include: that the application may be upgraded without reinstalling and/or downloading the new communication interface and/or instructions for the new vacation interface; that upgrades may occur transparently to the user; upgrades may be efficiently and compactly communicated to the application; and/or that the data exchange service 112 can simultaneously support multiple versions of communication interfaces. At block 1115, the application upgrades the communication interface to the specified version. At block 1120, the data exchange service 112 receives a message from the application via the upgraded and/or specific version of the communication interface. For example, the new version of the communication interface may send different parameters and/or may use different method calls in communicating with the data exchange service 112.

It will be appreciated that while the present disclosure typically makes reference to information systems in the healthcare context, the systems and methods described herein may be applied to other contexts. For example, the data exchanges, bi-directional interfaces, and/or transformation processes described herein may be applied to different contexts dealing with large amounts of data, such as accounting, retail, analytical, finance, energy, etc. Any transactional data set may be supported by some embodiments of the data exchange service described herein. Particular example contexts include data exchanges for financial services, such as pension funds, or an energy context like the oil industry.

Additional User Computing Device Examples

The data exchange service 112 may communicate with a user computing device. For example, the data exchange service 112 may send and/or receive data from a user computing device 102, as described with respect to FIG. 1 . The example user computing device 102 may be a tablet. Form data may be sent and/or received between the data exchange service 112 and the user computing device 102. Authentication and/or authorization data may be transmitted between the data exchange service 112 and the user computing device 102. Signature data may be transmitted between the data exchange service 112 and the user computing device 102. The systems and techniques described herein may be applied in a person-intake and/or healthcare example. For example, a new patient may need to submit form data at a healthcare establishment, such as a clinic or a hospital. A user may be prompted to setup and/or update their profile and/or demographic information within the data exchange service 112 by submitting the form data. After a user has submitted form data once, they may not need to submit form data on subsequent visits unless data has changed. In some embodiments, the form submission data and/or other personal information is not stored on the user computing device, but rather is transmitted to the data exchange service 112 or other services. Advantages of a form submission system including the data exchange service 112 and/or the user computing device 102 include reducing or eliminating paperwork and/or decreasing waiting times to complete an intake. Further, the application on the user computing device 102 may include security protocols to log out of the application. Thus, since form submission data and/or other personal information is not stored on the user computing device 102, if the user computing device 102 is stolen, then no form submission data and/or other personal information can be compromised.

FIGS. 14A-14M illustrate additional example graphical user interfaces of a user computing device. The graphical user interfaces 1400 of FIGS. 14A-14M are example graphical user interfaces of the user computing device 102 of FIGS. 1 and 2 . The user computing device may include a client, such as an application, and the application may be configured to communicate with the data exchange service 112. User interactions with the graphical user interfaces 1400 of FIGS. 14A-14M may cause the client to request data from the data exchange service 112 and/or to send data to the data exchange service 112. In some embodiments, the data presented on the user computing device is sent and/or received via the network 122 to the data exchange service 112. Example data that may be sent and/or received between the user computing device 102 and the data exchange service 112 include the data described in further detail with respect to FIGS. 13A-13M. Example user interactions include providing user input, such as form and/or signature data, to complete a user check-in process. Other aspects of embodiments disclosed herein may be illustrated in FIGS. 14A-14M. In various embodiments, aspects of the user interfaces may be rearranged from what is shown and described below, and/or particular aspects may or may not be included.

In FIG. 14A, the graphical user interface 1400 enables a user to begin the check-in process. As illustrated, a user can input an authentication or PIN code to login. In other embodiments, a user may be prompted to check in with a username and password (not illustrated). In FIG. 14B, the graphical user interface 1400 presents an appointment schedule. A user, such as the patient or check-in clerk, can select a particular appointment for a patient in the appointment schedule.

In FIGS. 14C, 14D, 14E, 14F, and/or 14G, the graphical user interface 1400 enables a user to enter user input that can include demographics data. The user computing device may transmit the user input, which can include demographics data, to the data exchange service 112. Example demographics data includes an email address, one or more phone numbers, one or more physical addresses, race or ethnicity, one or more languages, emergency contact information, guardian information, and/or any other kind of information associated with a patient. Example data that may be sent from the data exchange service 112 to the user computing device for presentation in the graphical user interfaces 1400 of FIGS. 14D-14G includes the data 1304 described with respect to FIG. 13B.

In FIGS. 14H-14J, the graphical user interface 1400 enables a user to submit signature data. In FIG. 14I, a user can submit the input signature 1402. In some embodiments, the user computing device can process the input signature 1402, which may be in an image format, to generate signature data. The signature data may be in a scalable vector graphic (SVG) data format. The user computing device can transmit the signature to the data exchange service 112. Additionally or alternatively, the input signature 1402, which may be in an image format, may be transmitted to the data exchange service 112 and the data exchange service 112 may process the input signature 1402 to generate signature data, which may be in a scalable vector graphic (SVG) data format.

In FIG. 14J, a user can submit the input signature 1404. As described herein, the signature data for the signature 1404 may be generated from the signature 1402 of FIG. 14I. For example, the signature 1404 may be in a scalable vector graphic (SVG) data format.

In FIGS. 14K, 14L, and/or 14M, the graphical user interface 1400 enables a user to submit payment data and complete the check-in process.

In some embodiments, the data exchange service 112 and the user computing device 102 communicate through a communication interface, as described herein. For example, the data exchange service 112 and the user computing device 102 communicate through communication interface routines, HTTP requests and responses, and/or URIs, which are described in further detail with respect to FIG. 3 . For example, the demographic information corresponding to the forms of FIGS. 14A-14K may be sent via a communication interface routine and/or API call to the data exchange service 112. Other gathered information, such as the information shown in FIGS. 14A-14K, may be sent via other communication interface routines and/or API calls to the data exchange service 112 or other services.

In some embodiments, other check-in techniques may be used additionally or alternatively to what is shown in FIGS. 14A-14M. For example, a user may be prompted to check in with a username and password. Additionally or alternatively, the username and password check-in may occur via a separate application and/or user interface, such as the application and/or user interface of FIGS. 6A-6I. In other embodiments, the user computing device of the person checking in, which may have an application running on it, may communicate with the user computing device of the staff person to authenticate the user. The authentication communication between the devices may occur automatically via Bluetooth or other wireless communication technology. In other embodiments, the application of the user computing device of the person checking in may receive an authentication or PIN code from the data exchange service 112, and the user may present the authentication or PIN code to the staff person to check the user in and/or identify the user.

FIG. 15 is a flowchart illustrating an example signature submission process 1500, according to some embodiments of the present disclosure. Some blocks of the example method 1500 may be performed by portions of the data exchange service 112 and/or the user computing device 102. The example method 1500 may be performed by any of the systems, computing devices, and/or servers described herein. Depending on the embodiment, the method 1500 may include fewer or additional blocks and/or the blocks may be performed in an order different than is illustrated. Some blocks of the example method 1500 may be similar to blocks of other methods described herein.

Beginning at block 1505, the data exchange service 112 or an application may receive signature input data from the user computing device 102. The user computing device 102 may receive signature input data 1402 of FIG. 14I from a user. The signature input data may be in an image or other data format. Example image formats include png, jpeg, bmp, etc.

At block 1510, the data exchange service 112 or an application generates signature data from the signature input data. For example, the data exchange service 112 may execute an algorithm to generate scalable vector data from the signature input data. Example algorithms include Bézier curve fitting and/or Bézier linear regression to generate the signature data. An example data format for the signature data includes a scalable vector graphic (SVG) data format. Advantages of the signature data format include that the signature can be reproduced to scale, which may not be possible with image formats such as png, jpeg, bmp, etc. The data exchange service 112 may store the signature data with the user's account and/or profile for later use.

At block 1515, another service or the user computing device 102 may request the signature data. As described herein, the request may be sent via the communication interface and/or APIs described herein. Further, the request may include information that authenticates the user for which the signature request is associated.

At block 1520, the data exchange service 112 or an application transmits the signature data to the service or the user computing device 102 that requested the data. At block 1525, the service or the user computing device 102 may use the signature data. For example, the service or the user computing device 102 may apply the user's stored signature, which is in a scalable format, instead of requiring the user to manually sign multiple times. As shown in FIG. 14J, the signature data can be applied multiple times. Further, the data exchange service 112 and/or another service may convert the signature data into another format, such as a Portable Document Format (PDF). In the example, the data exchange service 112 and/or another service may transmit the other signature format and/or the PDF signature to another system, such as an EMR system, which requires the format.

FIG. 16 is a flowchart illustrating an example device verification and/or security process 1600, according to some embodiments of the present disclosure. Some blocks of the example method 1600 may be performed by portions of the user computing device 102. The example method 1600 may be performed by any of the systems, computing devices, and/or servers described herein. Depending on the embodiment, the method 1600 may include fewer or additional blocks and/or the blocks may be performed in an order different than is illustrated. Some blocks of the example method 1600 may be similar to blocks of other methods described herein.

Beginning at block 1605, the user computing device 102 and/or an application of the user computing device 102 retrieves device status data. Example device status data includes wireless connectivity data, network data, and/or geographic and/or geolocation data. For example, the wireless connectivity data may include the Service Set Identifier (SSID) or hotspot that the user computing device 102 is connected to or the default and/or configured SSID. The example network data includes data packets that are received from a computing network, which may correspond to one or more network protocols such as HTTP, TCP/IP, etc. Example geographic and/or geolocation data includes Global Positioning System (GPS) data.

At block 1610, the user computing device 102 and/or the application determines whether the device status data is verified. In one example, the user computing device 102 and/or the application determines whether the user computing device 102 is still connected to the predefined SSID. For example, the predefined SSID may be “Establishment1Network,” and if the user computing device 102 is stolen or removed from the establishment, eventually the user computing device 102 will disconnect from the SSID “Establishment1Network.” As another example, the network data may indicate a MAC address that the user computing device 102 is connected to, such as a gateway or router device. In the MAC address example, if the user computing device 102 is stolen or removed from the establishment, the user computing device 102 may receive a packet from another gateway or router device that has a different MAC address than the MAC address that the user computing device 102 is configured for. In the geographic and/or geolocation data example, the application may have a home location and/or a permitted operating area, such that the application may determine if the user computing device 102 leaves a predefined distance from the home location and/or a predefined area, such as a radius area. Accordingly, the application may store verification data, such as the SSID, network data, and/or geographic and/or geolocation data to verify the device status data.

If the device status data is verified, then the application may return to block 1605 to retrieve updated device status data. In this manner, the application can continuously poll to verify the status of the user computing device 102. In some embodiments, the continuous loop or polling may occur after a predefined or configurable time interval, such as every second, 30 seconds, 1 minute, 5 minutes, etc.

At block 1615, if the device status data is unverified, the user computing device 102 and/or the application takes an unverified status action. In some embodiments, the device status data may be unverified if the device status data is incomplete. For example, if a wireless, network, or GPS device of the user computing device 102 is disabled, then the application may treat the device status data as unverified. An example unverified status action includes logging a staff person or entity out from the application. Accordingly, if the user computing device 102 leaves the establishment or is stolen, the thief would not be able to access the application without entering a proper authentication code. Further, the application may not store or persist any confidential, personal, or any form data, which is an additional security feature if the user computing device 102 is stolen or goes missing. Other unverified status actions include locking or bricking the user computing device, sending an alert message electronically to the data exchange service 112 or another system, and/or generating another type of alert or alarm, such as an alarm noise.

Example Implementation Mechanisms

FIG. 12 depicts a general architecture of a computing system 1200 (sometimes referenced herein as a user computing device, server, and/or computing device). Computing system 1200 and/or components of computing system 1200 may be implemented by any of the devices and/or components discussed herein, such as user computing device 102, one or more providers 104, the communication interface 114, and/or the transformation system 100 of FIG. 1 . The general architecture of the computing system 1200 depicted in FIG. 12 includes an arrangement of computer hardware and software components that may be used to implement aspects of the present disclosure. The computing system 1200 may include many more (or fewer) elements than those shown in FIG. 12 . It is not necessary, however, that all of these elements be shown in order to provide an enabling disclosure. As illustrated, the computing system 1200 includes one or more hardware processors 1204, a communication interface 1218, a computer readable medium storage and/or device 1210, one or more input devices 1214A (such as a touch screen, mouse, keyboard, etc.), one or more output devices 1216A (such as a monitor, screen, and/or display), and memory 1206, some of which may communicate with one another by way of a communication bus 1202 or otherwise. The communication interface 1218 may provide connectivity to one or more networks or computing systems. The hardware processor(s) 1204 may thus receive information and instructions from other computing systems or services via the network 1222.

The memory 1206 may contain computer program instructions (grouped as modules or components in some embodiments) that the hardware processor(s) 1204 executes in order to implement one or more embodiments. The memory 1206 generally includes RAM, ROM and/or other persistent, auxiliary or non-transitory computer-readable media. The memory 1206 may store an operating system that provides computer program instructions for use by the hardware processor(s) 1204 in the general administration and operation of the computing system 1200. The memory 1206 may further include computer program instructions and other information for implementing aspects of the present disclosure. In addition, memory 1206 may include or communicate with storage device 1210. A storage device 1210, such as a magnetic disk, optical disk, or USB thumb drive (Flash drive), etc., is provided and coupled to bus 1202 for storing information, data, and/or instructions.

Memory 1206 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by hardware processor(s) 1204. Such instructions, when stored in storage media accessible to hardware processor(s) 1204, render computer system 1200 into a special-purpose machine that is customized to perform the operations specified in the instructions.

In general, the word “instructions,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software modules, possibly having entry and exit points, written in a programming language, such as, but not limited to, Java, Scala, Lua, C, C++, or C#. A software module may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, but not limited to, BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts. Software modules configured for execution on computing devices by their hardware processor(s) may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, magnetic disc, or any other tangible medium, or as a digital download (and may be originally stored in a compressed or installable format that requires installation, decompression or decryption prior to execution). Such software code may be stored, partially or fully, on a memory device of the executing computing device, for execution by the computing device. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors. The modules or computing device functionality described herein are preferably implemented as software modules, but may be represented in hardware or firmware. Generally, the instructions described herein refer to logical modules that may be combined with other modules or divided into sub-modules despite their physical organization or storage.

The term “non-transitory media,” and similar terms, as used herein refers to any media that store data and/or instructions that cause a machine to operate in a specific fashion. Such non-transitory media may comprise non-volatile media and/or volatile media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 1210. Volatile media includes dynamic memory, such as main memory 1206. Common forms of non-transitory media include, for example, a floppy disk, a flexible disk, hard disk, solid state drive, magnetic tape, or any other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge, and networked versions of the same.

Non-transitory media is distinct from but may be used in conjunction with transmission media. Transmission media participates in transferring information between non-transitory media. For example, transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 1202. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.

Computing system 1200 also includes a communication interface 1218 coupled to bus 1202. Communication interface 1218 provides a two-way data communication to network 1222. For example, communication interface sends and receives electrical, electromagnetic, or optical signals that carry digital data streams representing various types of information via cellular, packet radio, GSM, GPRS, CDMA, WiFi, satellite, radio, RF, radio modems, ZigBee, XBee, XRF, XTend, Bluetooth, WPAN, line of sight, satellite relay, or any other wireless data link.

Computing system 1200 can send messages and receive data, including program code, through the network 1222 and communication interface 1218. A computing system 1200 may communicate with other computing devices 1230, such as an application server, via network 1222.

Computing system 1200 may include a distributed computing environment including several computer systems that are interconnected using one or more computer networks. The computing system 1200 could also operate within a computing environment having a fewer or greater number of devices than are illustrated in FIG. 12 .

Other Variations

Embodiments have been described in connection with the accompanying drawings. However, it should be understood that the figures are not drawn to scale. Distances, angles, etc. are merely illustrative and do not necessarily bear an exact relationship to actual dimensions and layout of the devices illustrated. In addition, the foregoing embodiments have been described at a level of detail to allow one of ordinary skill in the art to make and use the devices, systems, etc. described herein. A wide variety of variation is possible. Components, elements, and/or steps can be altered, added, removed, or rearranged. While certain embodiments have been explicitly described, other embodiments will become apparent to those of ordinary skill in the art based on this disclosure.

The preceding examples can be repeated with similar success by substituting generically or specifically described operating conditions of this disclosure for those used in the preceding examples.

Depending on the embodiment, certain acts, events, or functions of any of the methods described herein can be performed in a different sequence, can be added, merged, or left out altogether (e.g., not all described acts or events are necessary for the practice of the method). Moreover, in certain embodiments, acts or events can be performed concurrently, e.g., through multi-threaded processing, interrupt processing, or multiple processors or processor cores, rather than sequentially. In some embodiments, the algorithms disclosed herein can be implemented as routines stored in a memory device. Additionally, a processor can be configured to execute the routines. In some embodiments, custom circuitry may be used.

The various illustrative logical blocks and modules described in connection with the embodiments disclosed herein can be implemented or performed by a machine, such as a processing unit or processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, logical circuitry, or any combination thereof designed to perform the functions described herein. A processor can be a microprocessor, but in the alternative, the processor can be a controller, microcontroller, or state machine, combinations of the same, or the like. A processor can include electrical circuitry configured to process computer-executable instructions. In another embodiment, a processor includes an FPGA or other programmable device that performs logic operations without processing computer-executable instructions. A processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Although described herein primarily with respect to digital technology, a processor may also include primarily analog components. For example, some or all of the signal processing algorithms described herein may be implemented in analog circuitry or mixed analog and digital circuitry. A computing environment can include any type of computer system, including, but not limited to, a computer system based on a microprocessor, a mainframe computer, a digital signal processor, a portable computing device, a device controller, or a computational engine within an appliance, to name a few.

Each of the processes, methods, and algorithms described in the preceding sections may be embodied in, and fully or partially automated by, code instructions or software modules executed by one or more computing systems or computer processors comprising computer hardware. The processes and algorithms may be implemented partially or wholly in application-specific circuitry. A software module can reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of computer-readable storage medium known in the art. An exemplary storage medium is coupled to a processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium can be integral to the processor. The processor and the storage medium can reside in an ASIC. The ASIC can reside in a user terminal. In the alternative, the processor and the storage medium can reside as discrete components in a user terminal.

Conditional language used herein, such as, among others, “can,” “could,” “might,” “may,” “e.g.,” and the like, unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or states. Thus, such conditional language is not generally intended to imply that features, elements and/or states are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without author input or prompting, whether these features, elements and/or states are included or are to be performed in any particular embodiment. The terms “comprising,” “including,” “having,” and the like are synonymous and are used inclusively, in an open-ended fashion, and do not exclude additional elements, features, acts, operations, and so forth. Also, the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list. Further, the term “each,” as used herein, in addition to having its ordinary meaning, can mean any subset of a set of elements to which the term “each” is applied. Conjunctive language such as the phrase “at least one of X, Y and Z,” unless specifically stated otherwise, is otherwise understood with the context as used in general to convey that an item, term, etc. may be either X, Y or Z. Thus, such conjunctive language is not generally intended to imply that certain embodiments require at least one of X, at least one of Y and at least one of Z to each be present.

Unless otherwise explicitly stated, articles such as “a” or “an” should generally be interpreted to include one or more described items. Accordingly, phrases such as “a device configured to” are intended to include one or more recited devices. Such one or more recited devices can also be collectively configured to carry out the stated recitations. For example, “a processor configured to carry out recitations A, B and C” can include a first processor configured to carry out recitation A working in conjunction with a second processor configured to carry out recitations B and C.

While the above detailed description has shown, described, and pointed out novel features as applied to various embodiments, it will be understood that various omissions, substitutions, and changes in the form and details of the devices or algorithms illustrated can be made without departing from the spirit of the disclosure. Although the disclosure has been described in detail with particular reference to the embodiments disclosed herein, other embodiments can achieve the same results. Variations and modifications of the present disclosure will be obvious to those skilled in the art and it is intended to cover all such modifications and equivalents. As will be recognized, certain embodiments described herein can be embodied within a form that does not provide all of the features and benefits set forth herein, as some features can be used or practiced separately from others. The scope of protection is indicated by the claims that may follow rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims that may follow are to be embraced within their scope. Accordingly, the present disclosure is not intended to be limited by the recitation of the various embodiments. 

What is claimed is:
 1. A system for collecting and sharing data from multiple disparate data sources, the system comprising: one or more first data stores configured to store a plurality of instruction sets for processing data, wherein each instruction set of the plurality of instruction sets corresponds to a workflow from a plurality of workflows; a plurality of second data stores comprising a NoSQL database and a search engine; and one or more hardware computer processors programmed, via executable code instructions, to: receive, via an application programming interface, original data; store the original data in a data store of the plurality of second data stores; identify, from the plurality of instruction sets, a first instruction set from a first workflow and a second instruction set from a second workflow; generate, from the original data, first data according to the first instruction set from the first workflow; store the first data in the NoSQL database and the search engine; generate, from the original data, second data according to the second instruction set from the second workflow, the second data being different from the first data; store the second data in the NoSQL database and the search engine; receive, from a first external computing device, a first request; in response to receiving the first request, retrieve the first data from the NoSQL database; transmit the first data to the first external computing device; receive, from a second external computing device, a second request; in response to receiving the second request, retrieve the second data from the search engine; and transmit the second data to the second external computing device.
 2. The system of claim 1, wherein the one or more hardware computer processors are further programmed, via the executable instructions, to: determine that the original data is incomplete; in response to determining that the original data is incomplete, add the original data to a queue; receive third data; determine that the third data completes the original data; generate, from the original data and the third data, fourth data according to a third instruction set; and store the fourth data in a data store of the plurality of second data stores.
 3. The system of claim 1, wherein generating the first data according to the first instruction set further comprises one or more steps, and wherein the one or more hardware computer processors are further programmed, via the executable instructions, to: store the one or more steps in a data store of the plurality of second data stores, wherein the one or more steps indicate the generation of a new data item from an original data item in the original data.
 4. The system of claim 1, wherein the one or more hardware computer processors are further programmed, via the executable instructions, to: add a third workflow to the plurality of workflows, the third workflow comprising a third instruction set for processing data; generate, from the original data, third data according to the third instruction set; and store the third data in the NoSQL database and the search engine.
 5. A system for collecting and sharing data from multiple disparate data sources, the system comprising: one or more data stores configured to store a plurality of instruction sets for processing data; and one or more hardware computer processors programmed, via executable code instructions, to: receive, via an application programming interface, original data; store the original data in the one or more data stores; identify, from the plurality of instruction sets, a first instruction set and a second instruction set; generate, from the original data, first data according to the first instruction set; store the first data in the one or more data stores; generate, from the original data, second data according to the second instruction set, the second data being different from the first data; store the second data in the one or more data stores; receive, from a first external computing device, a first request; in response to receiving the first request, transmit the first data; receive, from a second external computing device, a second request; and in response to receiving the second request, transmit the second data.
 6. The system of claim 5, wherein the one or more hardware computer processors are further programmed, via the executable instructions, to: determine that the original data is incomplete; in response to determining that the original data is incomplete, add the original data to a queue; receive third data; determine that the third data completes the original data; generate, from the original data and the third data, fourth data according to a third instruction set; and store the fourth data in the one or more data stores.
 7. The system of claim 5, wherein generating the first data according to the first instruction set further comprises one or more steps, and wherein the one or more hardware computer processors are further programmed, via the executable instructions, to: store the one or more steps in the one or more data stores, wherein the one or more steps indicate the generation of a new data item from an original data item in the original data.
 8. The system of claim 5, wherein the first instruction set comprises first boolean logic, wherein the one or more hardware computer processors are further programmed, via the executable instructions, to: determine that the original data corresponds to a particular type of data; and determine, according to the first boolean logic, to generate the first data because the original data corresponds to the particular type of data.
 9. The system of claim 5, wherein the plurality of instruction sets further comprises a third instruction set, wherein the third instruction set comprises third boolean logic, wherein the one or more hardware computer processors are further programmed, via the executable instructions, to: determine that the original data corresponds to a particular type of data; and determine, according to the third boolean logic, to not generate data according to the third instruction set because the original data corresponds to the particular type of data.
 10. The system of claim 5, wherein storing the first data in the one or more data stores further comprises: storing the first data in a NoSQL database; and storing the first data in a search engine.
 11. The system of claim 5, wherein each instruction set of the plurality of instruction sets corresponds to a workflow from a plurality of workflows.
 12. The system of claim 11, wherein the one or more hardware computer processors are further programmed, via the executable instructions, to: add a third workflow to the plurality of workflows, the third workflow comprising a third instruction set for processing data; generate, from the original data, third data according to the third instruction set; and store the third data in the one or more data stores.
 13. A method for collecting and sharing data from multiple disparate data sources, the method comprising: receiving, via an application programming interface, original data; storing the original data in one or more data stores; identify, from a plurality of instruction sets, a first instruction set and a second instruction set; generating, from the original data, first data according to the first instruction set; storing the first data in the one or more data stores; generating, from the original data, second data according to the second instruction set, the second data being different from the first data; storing the second data in the one or more data stores; receiving, from a first external computing device, a first request; in response to receiving the first request, transmitting the first data; receiving, from a second external computing device, a second request; and in response to receiving the second request, transmitting the second data.
 14. The method of claim 13, further comprising: determining that the original data is incomplete; in response to determining that the original data is incomplete, adding the original data to a queue; receiving third data; determining that the third data completes the original data; generating, from the original data and the third data, fourth data according to a third instruction set; and storing the fourth data in the one or more data stores.
 15. The method of claim 13, wherein generating the first data according to the first instruction set further comprises one or more steps, further comprising: storing the one or more steps in the one or more data stores, wherein the one or more steps indicate the generation of a new data item from an original data item in the original data.
 16. The method of claim 13, wherein the first instruction set comprises first boolean logic, further comprising: determining that the original data corresponds to a particular type of data; and determining, according to the first boolean logic, to generate the first data because the original data corresponds to the particular type of data.
 17. The method of claim 13, wherein the plurality of instruction sets further comprises a third instruction set, wherein the third instruction set comprises third boolean logic, further comprising: determining that the original data corresponds to a particular type of data; and determining, according to the third boolean logic, to not generate data according to the third instruction set because the original data corresponds to the particular type of data.
 18. The method of claim 13, wherein storing the first data in the one or more data stores further comprises: storing the first data in a NoSQL database; and storing the first data in a search engine.
 19. The method of claim 13, wherein each instruction set of the plurality of instruction sets corresponds to a workflow from a plurality of workflows.
 20. The method of claim 19, further comprising: adding a third workflow to the plurality of workflows, the third workflow comprising a third instruction set for processing data; generating, from the original data, third data according to the third instruction set; and storing the third data in the one or more data stores. 