Controlling Access to Secure Information Resources Using Rotational Datasets and Dynamically Configurable Data Containers

ABSTRACT

Aspects of the disclosure relate to controlling access to secure information resources using rotational datasets and dynamically configurable data containers. A computing platform may receive, from a requesting system, a data access request. After authenticating the requesting system, the computing platform may load, using a first data container, first source data from a data track. The computing platform may send the first source data to a second data container. Then, the computing platform may load, using the second data container, second source data from the data track and may produce a first combined dataset. The computing platform may send the first combined dataset to a third data container. Subsequently, the computing platform may load, using the third data container, third source data from the data track and may produce a second combined dataset. Thereafter, the computing platform may send, to the requesting system, the second combined dataset.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of and is a continuation of U.S.patent application Ser. No. 16/426,829, filed May 30, 2019, and entitled“Controlling Access to Secure Information Resources Using RotationalDatasets and Dynamically Configurable Data Containers” which isincorporated by reference herein in its entirety.

BACKGROUND

Aspects of the disclosure relate to deploying digital data processingsystems, providing information security, and preventing unauthorizedaccess to resources of an information system. In particular, one or moreaspects of the disclosure relate to controlling access to secureinformation resources using rotational datasets and dynamicallyconfigurable data containers.

Enterprise organizations may utilize various computing infrastructure tomaintain large data sets, which may include confidential informationand/or other sensitive data that is created and/or used for variouspurposes. In some instances, these large data sets may need to beaccessed by and/or transferred across various networks and/or betweenvarious computer systems. Ensuring security when accessing and/ortransferring such data may be critically important to protect theintegrity and confidentiality of the underlying information. In manyinstances, however, it may be difficult to ensure the integrity andconfidentiality of the information associated with the data sets whilealso attempting to optimize the resource utilization, bandwidthutilization, and efficient operations of the computing infrastructureinvolved in maintaining, accessing, and transferring the data.

SUMMARY

Aspects of the disclosure provide effective, efficient, scalable, andconvenient technical solutions that address and overcome the technicalproblems associated with ensuring information security and preventingunauthorized access to resources of enterprise computer systems bycontrolling access to secure information resources using rotationaldatasets and dynamically configurable data containers.

In accordance with one or more embodiments, a computing platform havingat least one processor, a communication interface, and memory mayreceive, via the communication interface, from a first reader-writersystem, a first data access request. Based on receiving the first dataaccess request from the first reader-writer system, the computingplatform may authenticate the first reader-writer system using a firstdata container object. After authenticating the first reader-writersystem using the first data container object, the computing platform mayrotate a first data track comprising a plurality of datasets to align afirst dataset of the plurality of datasets with the first data containerobject. After rotating the first data track comprising the plurality ofdatasets to align the first dataset of the plurality of datasets withthe first data container object, the computing platform may retrievefirst information from the first dataset using the first data containerobject. Subsequently, the computing platform may send, via thecommunication interface, to the first reader-writer system, the firstinformation retrieved from the first dataset using the first datacontainer object.

In some embodiments, receiving the first data access request from thefirst reader-writer system may include receiving the first data accessrequest from an enterprise user computing device. In some embodiments,receiving the first data access request from the first reader-writersystem may include receiving the first data access request from a datasub-processing computing platform that interfaces with an additionaldata track computing platform which maintains a second data trackdifferent from the first data track.

In some embodiments, rotating the first data track comprising theplurality of datasets to align the first dataset of the plurality ofdatasets with the first data container object may include: identifyingthe first dataset of the plurality of datasets as having content datacorresponding to the first data access request received from the firstreader-writer system; and rotating the first data track comprising theplurality of datasets to align the first dataset of the plurality ofdatasets with the first data container object in response to identifyingthe first dataset of the plurality of datasets as having the contentdata corresponding to the first data access request received from thefirst reader-writer system.

In some embodiments, the first data container object may enforce aplurality of access rules on the first dataset of the plurality ofdatasets after the first data track comprising the plurality of datasetsis rotated to align the first dataset of the plurality of datasets withthe first data container object. In some embodiments, the plurality ofaccess rules enforced on the first dataset of the plurality of datasetsby the first data container object may include one or moresecurity-level access rules. In some embodiments, the plurality ofaccess rules enforced on the first dataset of the plurality of datasetsby the first data container object may include one or more content-typeaccess rules.

In some embodiments, rotating the first data track comprising theplurality of datasets to align the first dataset of the plurality ofdatasets with the first data container object may include rotating adata-container layer comprising the first data container object and atleast one additional data container object different from the first datacontainer object.

In some embodiments, the computing platform may receive, via thecommunication interface, from a second reader-writer system, a seconddata access request. Based on receiving the second data access requestfrom the second reader-writer system, the computing platform mayauthenticate the second reader-writer system using a second datacontainer object. After authenticating the second reader-writer systemusing the second data container object, the computing platform may addthe second data access request to a queue of data access requests to beexecuted.

In some embodiments, when the second data access request reaches anendpoint of the queue of data access requests to be executed, thecomputing platform may rotate the first data track comprising theplurality of datasets to align a second dataset of the plurality ofdatasets with the second data container object. After rotating the firstdata track comprising the plurality of datasets to align the seconddataset of the plurality of datasets with the second data containerobject, the computing platform may retrieve second information from thesecond dataset using the second data container object. Subsequently, thecomputing platform may send, via the communication interface, to thesecond reader-writer system, the second information retrieved from thesecond dataset using the second data container object.

In some embodiments, the computing platform may receive, via thecommunication interface, from a third reader-writer system, a third dataaccess request. Based on receiving the third data access request fromthe third reader-writer system, the computing platform may attempt toauthenticate the third reader-writer system using a third data containerobject. Based on failing to authenticate the third reader-writer systemusing the third data container object, the computing platform may erecta blocker object between the third data container object and the thirdreader-writer system.

In accordance with one or more additional embodiments, a computingplatform having at least one processor, a communication interface, andmemory may receive, via the communication interface, from a firstenterprise user computing device, a first data transfer requestcomprising information scheduling a first data transfer operation. Basedon receiving the first data transfer request from the first enterpriseuser computing device, the computing platform may retrieve firstinformation from a first data track computing platform. Subsequently,the computing platform may configure a second data track computingplatform to receive the first information retrieved from the first datatrack computing platform. After configuring the second data trackcomputing platform to receive the first information retrieved from thefirst data track computing platform, the computing platform may send,via the communication interface, to the second data track computingplatform, the first information retrieved from the first data trackcomputing platform. In addition, sending the first information retrievedfrom the first data track computing platform to the second data trackcomputing platform may cause the second data track computing platform tostore the first information retrieved from the first data trackcomputing platform.

In some embodiments, receiving the first data transfer request from thefirst enterprise user computing device may include receiving informationscheduling a one-time archival operation. In some embodiments, receivingthe first data transfer request from the first enterprise user computingdevice may include receiving information scheduling a periodic archivaloperation.

In some embodiments, retrieving the first information from the firstdata track computing platform may include: generating one or more firstrotation commands for the first data track computing platform; andsending the one or more first rotation commands generated for the firstdata track computing platform to the first data track computingplatform.

In some embodiments, sending the one or more first rotation commandsgenerated for the first data track computing platform to the first datatrack computing platform may cause the first data track computingplatform to rotate a first data track maintained by the first data trackcomputing platform. In addition, the first data track maintained by thefirst data track computing platform may include a plurality of datasets.Additionally, sending the one or more first rotation commands generatedfor the first data track computing platform to the first data trackcomputing platform may cause the first data track computing platform torotate the first data track to align a first dataset of the plurality ofdatasets with a first data container object.

In some embodiments, sending the one or more first rotation commandsgenerated for the first data track computing platform to the first datatrack computing platform may cause the first data track computingplatform to rotate a data-container layer comprising the first datacontainer object and at least one additional data container objectdifferent from the first data container object.

In some embodiments, configuring the second data track computingplatform to receive the first information retrieved from the first datatrack computing platform may include: generating one or more secondrotation commands for the second data track computing platform; andsending the one or more second rotation commands generated for thesecond data track computing platform to the second data track computingplatform.

In some embodiments, generating the one or more second rotation commandsfor the second data track computing platform may include generating theone or more second rotation commands for the second data track computingplatform based on one or more tags associated with the first informationretrieved from the first data track computing platform.

In some embodiments, sending the one or more second rotation commandsgenerated for the second data track computing platform to the seconddata track computing platform may cause the second data track computingplatform to rotate a second data track maintained by the second datatrack computing platform.

In some embodiments, sending the one or more second rotation commandsgenerated for the second data track computing platform to the seconddata track computing platform may cause the second data track computingplatform to rotate a data-container layer comprising a plurality of datacontainer objects.

In some embodiments, sending the first information retrieved from thefirst data track computing platform to the second data track computingplatform may include sending the first information retrieved from thefirst data track computing platform to the second data track computingplatform via a plurality of data filters managed by the computingplatform.

In some embodiments, the computing platform may receive, via thecommunication interface, from a second enterprise user computing devicedifferent from the first enterprise user computing device, a second datatransfer request comprising information scheduling a second datatransfer operation. Based on receiving the second data transfer requestfrom the second enterprise user computing device, the computing platformmay retrieve second information from the first data track computingplatform. Subsequently, the computing platform may configure the seconddata track computing platform to receive the second informationretrieved from the first data track computing platform. Afterconfiguring the second data track computing platform to receive thesecond information retrieved from the first data track computingplatform, the computing platform may send, via the communicationinterface, to the second data track computing platform, the secondinformation retrieved from the first data track computing platform. Inaddition, sending the second information retrieved from the first datatrack computing platform to the second data track computing platform maycause the second data track computing platform to store the secondinformation retrieved from the first data track computing platform.

In accordance with one or more additional embodiments, a computingplatform having at least one processor, a communication interface, andmemory may receive, via the communication interface, from a firstrequesting system, a first data access request. Based on receiving thefirst data access request from the first requesting system, thecomputing platform may authenticate the first requesting system using afirst data container object. After authenticating the first requestingsystem using the first data container object, the computing platform mayload, using the first data container object, first source data from afirst data track maintained by the computing platform, and the firstdata track maintained by the computing platform may include a pluralityof datasets. Subsequently, the computing platform may send the firstsource data loaded using the first data container object to a seconddata container object different from the first data container object.Then, the computing platform may load, using the second data containerobject, second source data from the first data track maintained by thecomputing platform. Thereafter, the computing platform may combine, atthe second data container object, the second source data loaded usingthe second data container object and the first source data loaded usingthe first data container object to produce a first combined dataset.Next, the computing platform may send the first combined dataset to athird data container object different from the first data containerobject and the second data container object. Subsequently, the computingplatform may load, using the third data container object, third sourcedata from the first data track maintained by the computing platform.Then, the computing platform may combine, at the third data containerobject, the third source data loaded using the third data containerobject and the first combined dataset to produce a second combineddataset. Thereafter, the computing platform may send, via thecommunication interface, to the first requesting system, the secondcombined dataset.

In some embodiments, receiving the first data access request from thefirst requesting system may include receiving the first data accessrequest from a first reader-writer system. In some embodiments,receiving the first data access request from the first requesting systemmay include receiving the first data access request from a datasub-processing computing platform that interfaces with an additionaldata track computing platform which maintains a second data trackdifferent from the first data track.

In some embodiments, loading the first source data from the first datatrack maintained by the computing platform using the first datacontainer object may include rotating the first data track to align afirst dataset of the plurality of datasets with the first data containerobject.

In some embodiments, loading the second source data from the first datatrack maintained by the computing platform using the second datacontainer object may include loading the second source data from thefirst data track maintained by the computing platform using the seconddata container object based on re-authenticating the first requestingsystem using the second data container object. In some embodiments,loading the second source data from the first data track maintained bythe computing platform using the second data container object mayinclude rotating the first data track to align a second dataset of theplurality of datasets with the second data container object.

In some embodiments, combining the second source data loaded using thesecond data container object and the first source data loaded using thefirst data container object to produce the first combined dataset mayinclude filtering the second source data loaded using the second datacontainer object and the first source data loaded using the first datacontainer object to remove redundant data.

In some embodiments, sending the first combined dataset to the thirddata container object different from the first data container object andthe second data container object may include sending the first combineddataset to the third data container object based on the first datacontainer object having a first ruleset associated with a first datatype, the second data container object having a second rulesetassociated with a second data type, and the third data container objecthaving a third ruleset associated with a third data type.

In some embodiments, loading the third source data from the first datatrack maintained by the computing platform using the third datacontainer object may include loading the third source data from thefirst data track maintained by the computing platform using the thirddata container object based on re-authenticating the first requestingsystem using the third data container object. In some embodiments,loading the third source data from the first data track maintained bythe computing platform using the third data container object may includerotating the first data track to align a third dataset of the pluralityof datasets with the third data container object.

In some embodiments, combining the third source data loaded using thethird data container object and the first combined dataset to producethe second combined dataset may include filtering the third source dataloaded using the third data container object and the first combineddataset to remove redundant data.

These features, along with many others, are discussed in greater detailbelow.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIGS. 1A-1G depict one or more illustrative computing environments forcontrolling access to secure information resources using rotationaldatasets and dynamically configurable data containers in accordance withone or more example embodiments;

FIGS. 2A-2D depict an illustrative event sequence for controlling accessto secure information resources using rotational datasets anddynamically configurable data containers in accordance with one or moreexample embodiments;

FIGS. 3A-3C depict another illustrative event sequence for controllingaccess to secure information resources using rotational datasets anddynamically configurable data containers in accordance with one or moreexample embodiments;

FIGS. 4A-4C depict another illustrative event sequence for controllingaccess to secure information resources using rotational datasets anddynamically configurable data containers in accordance with one or moreexample embodiments;

FIGS. 5-8 depict example graphical user interfaces for controllingaccess to secure information resources using rotational datasets anddynamically configurable data containers in accordance with one or moreexample embodiments;

FIG. 9 depicts an illustrative method for controlling access to secureinformation resources using rotational datasets and dynamicallyconfigurable data containers in accordance with one or more exampleembodiments;

FIG. 10 depicts another illustrative method for controlling access tosecure information resources using rotational datasets and dynamicallyconfigurable data containers in accordance with one or more exampleembodiments; and

FIG. 11 depicts another illustrative method for controlling access tosecure information resources using rotational datasets and dynamicallyconfigurable data containers in accordance with one or more exampleembodiments.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. It isto be understood that other embodiments may be utilized, and structuraland functional modifications may be made, without departing from thescope of the present disclosure.

It is noted that various connections between elements are discussed inthe following description. It is noted that these connections aregeneral and, unless specified otherwise, may be direct or indirect,wired or wireless, and that the specification is not intended to belimiting in this respect.

FIGS. 1A-1G depict one or more illustrative computing environments forcontrolling access to secure information resources using rotationaldatasets and dynamically configurable data containers in accordance withone or more example embodiments. Referring to FIG. 1A, computingenvironment 100 may include one or more computer systems. For example,computing environment 100 may include a first data track computingplatform 110, a data sub-processing computing platform 120, a seconddata track computing platform 130, a first enterprise user computingdevice 140, a second enterprise user computing device 150, and anadministrator user computing device 160.

As illustrated in greater detail below, data track computing platform110 may include one or more computing devices configured to perform oneor more of the functions described herein. For example, data trackcomputing platform 110 may include one or more computers (e.g., laptopcomputers, desktop computers, servers, server blades, or the like).

Data sub-processing computing platform 120 may include one or morecomputing devices and/or other computer components (e.g., processors,memories, communication interfaces). In addition, and as illustrated ingreater detail below, data sub-processing computing platform 120 may beconfigured to coordinate and manage data transfers and/or otheroperations (which may, e.g., involve managing interactions with and/orexecuting actions on one or more data track computing platforms and/orother devices in computing environment 100).

Data track computing platform 130 may include one or more computingdevices, similar to data track computing platform 110. For example, datatrack computing platform 130 may include one or more computers (e.g.,laptop computers, desktop computers, servers, server blades, or thelike). In addition, and as illustrated in greater detail below, datatrack computing platform 130 may be configured to maintain a data track,manage and execute data transfers and other computing operations, and/orexecute other functions.

Enterprise user computing device 140 may include one or more computingdevices and/or other computer components (e.g., processors, memories,communication interfaces). In addition, enterprise user computing device140 may be linked to and/or used by a first enterprise user (who may,e.g., be associated with an enterprise organization, such as a financialinstitution, which may operate data track computing platform 110 and/orone or more other systems and/or devices in computing environment 100).

Like enterprise user computing device 140, enterprise user computingdevice 150 may include one or more computing devices and/or othercomputer components (e.g., processors, memories, communicationinterfaces). In addition, enterprise user computing device 150 may belinked to and/or used by a second enterprise user (who also may, e.g.,be associated with the enterprise organization which may operate datatrack computing platform 110 and/or one or more other systems and/ordevices in computing environment 100).

Like enterprise user computing device 140 and enterprise user computingdevice 150, administrator user computing device 160 may include one ormore computing devices and/or other computer components (e.g.,processors, memories, communication interfaces). In addition,administrator user computing device 160 may be linked to and/or used bya network administrator or another type of administrative user (who may,e.g., be associated with the enterprise organization which may operatedata track computing platform 110 and/or one or more other systemsand/or devices in computing environment 100).

Computing environment 100 also may include one or more networks, whichmay interconnect one or more of data track computing platform 110, datasub-processing computing platform 120, data track computing platform130, enterprise user computing device 140, enterprise user computingdevice 150, and administrator user computing device 160. For example,computing environment 100 may include a network 170, which may, forinstance, include one or more private networks, public networks,sub-networks, and/or the like, and which may interconnect one or more ofdata track computing platform 110, data sub-processing computingplatform 120, data track computing platform 130, enterprise usercomputing device 140, enterprise user computing device 150, andadministrator user computing device 160.

In one or more arrangements, data sub-processing computing platform 120,enterprise user computing device 140, enterprise user computing device150, administrator user computing device 160, and/or the other systemsincluded in computing environment 100 may be any type of computingdevice capable of receiving a user interface, receiving input via theuser interface, and communicating the received input to one or moreother computing devices. For example, data sub-processing computingplatform 120, enterprise user computing device 140, enterprise usercomputing device 150, administrator user computing device 160, and/orthe other systems included in computing environment 100 may, in someinstances, be and/or include server computers, desktop computers, laptopcomputers, tablet computers, smart phones, or the like that may includeone or more processors, memories, communication interfaces, storagedevices, and/or other components. As noted above, and as illustrated ingreater detail below, any and/or all of data track computing platform110, data sub-processing computing platform 120, data track computingplatform 130, enterprise user computing device 140, enterprise usercomputing device 150, and administrator user computing device 160 may,in some instances, be special-purpose computing devices configured toperform specific functions.

Referring to FIG. 1B, data track computing platform 110 may include oneor more processors 111, memory 112, and communication interface 113. Adata bus may interconnect processor 111, memory 112, and communicationinterface 113. Communication interface 113 may be a network interfaceconfigured to support communication between data track computingplatform 110 and one or more networks (e.g., network 170). Memory 112may include one or more program modules having instructions that whenexecuted by processor 111 cause data track computing platform 110 toperform one or more functions described herein and/or one or moredatabases that may store and/or otherwise maintain information which maybe used by such program modules and/or processor 111. In some instances,the one or more program modules and/or databases may be stored by and/ormaintained in different memory units of data track computing platform110 and/or by different computing devices that may form and/or otherwisemake up data track computing platform 110. For example, memory 112 mayhave, store, and/or include a data track module 112 a, a data trackdatabase 112 b, and a data container management engine 112 c. Data trackmodule 112 a may have instructions that direct and/or cause data trackcomputing platform 110 to control access to secure information resourcesusing rotational datasets and dynamically configurable data containers,as discussed in greater detail below. Data track database 112 b maystore information used by data track module 112 a and/or data trackcomputing platform 110 in controlling access to secure informationresources using rotational datasets and dynamically configurable datacontainers. Data container management engine 112 c may create,configure, and manage one or more data containers, which may be used bydata track computing platform 110 in performing various operations, asdiscussed in greater detail below.

Referring to FIG. 1C, a logical view of datasets stored on a data trackmaintained by data track computing platform 110 is illustrated. Forexample, and as discussed in greater detail below, data track computingplatform 110 may store a plurality of datasets on a rotatable datatrack. The contents of the datasets may be extracted and/or otherwiseaccessed via one or more data containers, which may exist in a layerthat sits on top of the data track and which enforce various rules thatprovide selective access to the contents of the datasets on theunderlying data track. In addition, each data container may interfacewith a single, specific reader-writer system, such as reader-writersystem 181, reader-writer system 182, reader-writer system 183, orreader-writer system 184. In one or more embodiments, enterprise usercomputing device 140, enterprise user computing device 150, and/or othercomputing devices may correspond to such reader-writer systems. Forinstance, reader-writer system 181 may correspond to enterprise usercomputing device 140, and reader-writer system 182 may correspond toenterprise user computing device 150.

Referring to FIG. 1D, a logical view of the data containers that mayinteract with the datasets stored on the data track maintained by datatrack computing platform 110 is illustrated. For example, data container185, data container 186, data container 187, and data container 188 eachmay sit on top of a specific dataset stored on the data track maintainedby data track computing platform 110. Each data container may enforceone or more rules on its underlying dataset, and different datacontainers may enforce different rules relative to each other. Each datacontainer also may interface with and/or otherwise interact with aspecific reader-writer system. For instance, data container 185 mayinterface with reader-writer system 181, data container 186 mayinterface with reader-writer system 182, data container 187 mayinterface with reader-writer system 183, and data container 188 mayinterface with reader-writer system 184. In some instances, a blockermay be erected by data track computing platform 110 to prevent access toone or more datasets and/or to deny access to one or more reader-writersystems. For example, a blocker 189 may be erected by data trackcomputing platform 110 to block and/or otherwise prevent reader-writersystem 183 from accessing and/or otherwise interacting with datacontainer 187.

Referring to FIG. 1E, another logical view of the datasets stored on thedata track maintained by data track computing platform 110 isillustrated, after the data track has been rotated by data trackcomputing platform 110. As seen in FIG. 1E, the data track maintained bydata track computing platform 110 has been rotated such that differentdatasets may now align with different data containers and differentreader-writer systems. Thus, the datasets may now be subject todifferent access rules (e.g., by virtue of sitting below different datacontainers, or no data container) and may now be accessible to differentreader-writer systems (e.g., by virtue of facing towards differentreader-writer systems as a result of the rotation).

Referring to FIG. 1F, another logical view of the data containers thatmay interact with the datasets stored on the data track maintained bydata track computing platform 110 is illustrated, after the datacontainer layer has been rotated by data track computing platform 110.As seen in FIG. 1F, the data container layer (which may, e.g., sit abovethe datasets on the data track maintained by data track computingplatform 110) has been rotated such that different data containers maynow align with different datasets and different reader-writer systems.Thus, the underlying datasets may now be subject to different accessrules (e.g., by virtue of sitting below different data containers, or nodata container) and may now be accessible to different reader-writersystems (e.g., by virtue of different data containers facing towardsdifferent reader-writer systems as a result of the rotation).

Referring to FIG. 1G, a logical view of an alternative arrangement ofdata containers that may interact with the datasets stored on the datatrack maintained by data track computing platform 110 is illustrated. Asseen in FIG. 1G, a plurality of data containers may be arranged in aconcentric manner, similar to a funnel. In this arrangement, differentdata containers may interact with each other in sequentially loadingcontents from different datasets on the underlying data track maintainedby data track computing platform 110, as discussed in greater detailbelow.

FIGS. 2A-2D depict an illustrative event sequence for controlling accessto secure information resources using rotational datasets anddynamically configurable data containers in accordance with one or moreexample embodiments. Referring to FIG. 2A, at step 201, data trackcomputing platform 110 may receive a first data access request from areader-writer system (e.g., reader-writer system 181, reader-writersystem 182, reader-writer system 183, or reader-writer system 184). Forexample, at step 201, data track computing platform 110 may receive, viathe communication interface (e.g., communication interface 113), from afirst reader-writer system (e.g., data sub-processing computing platform120, enterprise user computing device 140, enterprise user computingdevice 150), a first data access request.

In some embodiments, receiving the first data access request from thefirst reader-writer system may include receiving the first data accessrequest from an enterprise user computing device. For example, inreceiving the first data access request from the first reader-writersystem at step 201, data track computing platform 110 may receive thefirst data access request from an enterprise user computing device(e.g., enterprise user computing device 140, enterprise user computingdevice 150).

In some embodiments, receiving the first data access request from thefirst reader-writer system may include receiving the first data accessrequest from a data sub-processing computing platform that interfaceswith an additional data track computing platform which maintains asecond data track different from the first data track. For example, inreceiving the first data access request from the first reader-writersystem at step 201, data track computing platform 110 may receive thefirst data access request from a data sub-processing computing platform(e.g., data sub-processing computing platform 120) that interfaces withan additional data track computing platform (e.g., data track computingplatform 130) which maintains a second data track different from thefirst data track.

At step 202, data track computing platform 110 may authenticate thefirst reader-writer system. For example, at step 202, based on receivingthe first data access request from the first reader-writer system (e.g.,data sub-processing computing platform 120, enterprise user computingdevice 140, enterprise user computing device 150), data track computingplatform 110 may authenticate the first reader-writer system (e.g., datasub-processing computing platform 120, enterprise user computing device140, enterprise user computing device 150) using a first data containerobject. For instance, the first data container object (which may, e.g.,execute and/or otherwise operate on data track computing platform 110)may authenticate the first reader-writer system (e.g., datasub-processing computing platform 120, enterprise user computing device140, enterprise user computing device 150) by interrogating and/orvalidating one or more credentials that are maintained by thereader-writer system and/or provided by the reader-writer system to thefirst data container object. Additionally or alternatively, the firstdata container object (which may, e.g., execute and/or otherwise operateon data track computing platform 110) may authenticate the firstreader-writer system (e.g., data sub-processing computing platform 120,enterprise user computing device 140, enterprise user computing device150) based on a unique identifier associated with the firstreader-writer system and/or one or more access rules defined for thefirst data container object and/or maintained by the first datacontainer object. Such access rules may, for instance, define specificsystems and/or specific groups of systems that may or may not access thedata container object and may be evaluated by data track computingplatform 110 in authenticating the first reader-writer system.

At step 203, data track computing platform 110 may rotate the datatrack. For example, at step 203, after authenticating the firstreader-writer system (e.g., data sub-processing computing platform 120,enterprise user computing device 140, enterprise user computing device150) using the first data container object, data track computingplatform 110 may rotate a first data track comprising a plurality ofdatasets to align a first dataset of the plurality of datasets with thefirst data container object. For instance, in rotating the first datatrack, data track computing platform 110 may rotate and/or otherwisecircularly move the logical layout of datasets (which may, e.g., bestored on the data track maintained by data track computing platform110) while maintaining each dataset's spatial relationship to otherdatasets stored on the data track. For instance, data track computingplatform 110 may rotate the data track as illustrated in FIG. 1E. Inaddition, data track computing platform 110 may align a particulardataset with the data container object that authenticated thereader-writer system (e.g., so as to process the first data accessrequest by retrieving the requested data from the data track). In someinstances, in rotating the first data track, data track computingplatform 110 may send a notification to administrator user computingdevice 160, which may cause administrator user computing device 160 todisplay and/or otherwise present a graphical user interface similar tographical user interface 500, which is illustrated in FIG. 5. As seen inFIG. 5, graphical user interface 500 may include text and/or otherinformation indicating that the access request has been received and thedata track is being rotated (e.g., “<Access Request 1> m <Reader-WriterSystem 1> has been received and authenticated. Data Track 1 is beingrotated to process the request.”).

In some embodiments, rotating the first data track comprising theplurality of datasets to align the first dataset of the plurality ofdatasets with the first data container object may include: identifyingthe first dataset of the plurality of datasets as having content datacorresponding to the first data access request received from the firstreader-writer system; and rotating the first data track comprising theplurality of datasets to align the first dataset of the plurality ofdatasets with the first data container object in response to identifyingthe first dataset of the plurality of datasets as having the contentdata corresponding to the first data access request received from thefirst reader-writer system. For example, in rotating the first datatrack comprising the plurality of datasets to align the first dataset ofthe plurality of datasets with the first data container object, datatrack computing platform 110 may identify the first dataset of theplurality of datasets as having content data corresponding to the firstdata access request received from the first reader-writer system (e.g.,data sub-processing computing platform 120, enterprise user computingdevice 140, enterprise user computing device 150). For instance, datatrack computing platform 110 may identify the first dataset of theplurality of datasets as having content data corresponding to the firstdata access request based on inspecting the contents of the firstdataset and/or based on referencing a data table comprising informationidentifying the contents of the first dataset and/or other datasets.Subsequently, data track computing platform 110 may rotate the firstdata track comprising the plurality of datasets to align the firstdataset of the plurality of datasets with the first data containerobject in response to identifying the first dataset of the plurality ofdatasets as having the content data corresponding to the first dataaccess request received from the first reader-writer system (e.g., datasub-processing computing platform 120, enterprise user computing device140, enterprise user computing device 150).

In some embodiments, the first data container object may enforce aplurality of access rules on the first dataset of the plurality ofdatasets after the first data track comprising the plurality of datasetsis rotated to align the first dataset of the plurality of datasets withthe first data container object. For example, the first data containerobject (which may, e.g., execute and/or otherwise operate on data trackcomputing platform 110) may enforce a plurality of access rules on thefirst dataset of the plurality of datasets after the first data trackcomprising the plurality of datasets is rotated to align the firstdataset of the plurality of datasets with the first data containerobject (e.g., by data track computing platform 110 at step 203). Forinstance, the data container object may enforce read/write rules,security rules, and/or other access rules on the underlying dataset.

In some embodiments, the plurality of access rules enforced on the firstdataset of the plurality of datasets by the first data container objectmay include one or more security-level access rules. For example, datatrack computing platform 110 may enforce one or more security-levelaccess rules on the first dataset of the plurality of datasets byselectively loading content from the first dataset based on the securitylevel of such content (which may, e.g., be indicated by one or more tagsassociated with the contents of the first dataset). Such security leveltags may, for instance, indicate highly secure data, moderately securedata, and/or non-secure data.

In some embodiments, the plurality of access rules enforced on the firstdataset of the plurality of datasets by the first data container objectmay include one or more content-type access rules. For example, datatrack computing platform 110 may enforce one or more content-type accessrules on the first dataset of the plurality of datasets by selectivelyloading content from the first dataset based on the content type of suchcontent (which may, e.g., be indicated by one or more tags associatedwith the contents of the first dataset). Such content-type tags may, forinstance, indicate enterprise data, customer data, personallyidentifying data, and/or unrestricted data.

In some embodiments, rotating the first data track comprising theplurality of datasets to align the first dataset of the plurality ofdatasets with the first data container object may include rotating adata-container layer comprising the first data container object and atleast one additional data container object different from the first datacontainer object. For example, in rotating the first data trackcomprising the plurality of datasets to align the first dataset of theplurality of datasets with the first data container object at step 203,data track computing platform 110 may rotate a data-container layercomprising the first data container object and at least one additionaldata container object different from the first data container object.For instance, data track computing platform 110 may rotate the datacontainer layer and its associated data containers as illustrated inFIG. 1F.

At step 204, data track computing platform 110 may retrieve firstinformation from the first dataset. For example, at step 204, afterrotating the first data track comprising the plurality of datasets toalign the first dataset of the plurality of datasets with the first datacontainer object, data track computing platform 110 may retrieve firstinformation from the first dataset using the first data containerobject. For instance, data track computing platform 110 may retrievefirst information from the first dataset using the first data containerobject by extracting and/or otherwise loading contents of the firstdataset in accordance with one or more access rules imposed on the firstdataset by the first data container object and/or by using one or morefunction calls provided by the first data container object.

Referring to FIG. 2B, at step 205, data track computing platform 110 maysend the retrieved information to the requesting reader-writer system.For example, at step 205, data track computing platform 110 may send,via the communication interface (e.g., communication interface 113), tothe first reader-writer system (e.g., data sub-processing computingplatform 120, enterprise user computing device 140, enterprise usercomputing device 150), the first information retrieved from the firstdataset using the first data container object. For instance, data trackcomputing platform 110 may send the retrieved information so as tocomplete processing of the first data access request.

At step 206, data track computing platform 110 may receive a second dataaccess request from a different reader-writer system (e.g.,reader-writer system 181, reader-writer system 182, reader-writer system183, or reader-writer system 184). For example, at step 206, data trackcomputing platform 110 may receive, via the communication interface(e.g., communication interface 113), from a second reader-writer system(e.g., data sub-processing computing platform 120, enterprise usercomputing device 140, enterprise user computing device 150), a seconddata access request. For instance, data track computing platform 110 mayreceive the second data access request similar to how data trackcomputing platform 110 may receive the first data access request, asdiscussed above.

At step 207, data track computing platform 110 may authenticate thesecond reader-writer system. For example, at step 207, based onreceiving the second data access request from the second reader-writersystem (e.g., data sub-processing computing platform 120, enterpriseuser computing device 140, enterprise user computing device 150), datatrack computing platform 110 may authenticate the second reader-writersystem (e.g., data sub-processing computing platform 120, enterpriseuser computing device 140, enterprise user computing device 150) using asecond data container object. For instance, data track computingplatform 110 may authenticate the second reader-writer system similar tohow data track computing platform 110 may authenticate the firstreader-writer system, as discussed above.

At step 208, data track computing platform 110 may add the second dataaccess request to a queue of data access requests waiting to beprocessed by data track computing platform 110. For example, at step208, after authenticating the second reader-writer system using thesecond data container object, data track computing platform 110 may addthe second data access request to a queue of data access requests to beexecuted. In some instances, in adding the second data access request tothe queue of data access requests to be executed, data track computingplatform 110 may send a notification to administrator user computingdevice 160, which may cause administrator user computing device 160 todisplay and/or otherwise present a graphical user interface similar tographical user interface 600, which is illustrated in FIG. 6. As seen inFIG. 6, graphical user interface 600 may include text and/or otherinformation indicating that the access request has been received andadded to the queue (e.g., “<Access Request 2> from <Reader-Writer System2> has been received and authenticated. The request has been added tothe Spin Queue and will be processed after other request(s) in the SpinQueue are processed.”).

Referring to FIG. 2C, at step 209, data track computing platform 110 mayrotate the data track (e.g., after completing the first data accessrequest and/or other queued data access requests, when the second dataaccess request is next in the queue). For example, at step 209, when thesecond data access request reaches an endpoint of the queue of dataaccess requests to be executed, data track computing platform 110 mayrotate the first data track comprising the plurality of datasets toalign a second dataset of the plurality of datasets with the second datacontainer object. For instance, data track computing platform 110 mayrotate the data track to process the second data access request, similarto how data track computing platform 110 may rotate the data track toprocess the first data access request, as discussed above. In addition,data track computing platform 110 may send a notification toadministrator user computing device 160 associated with the rotation ofthe data track for the second data access request, similar to how datatrack computing platform 110 may send such a notification toadministrator user computing device 160 in processing the first dataaccess request, as discussed above.

At step 210, data track computing platform 110 may retrieve secondinformation from the second dataset on the data track. For example, atstep 210, after rotating the first data track comprising the pluralityof datasets to align the second dataset of the plurality of datasetswith the second data container object, data track computing platform 110may retrieve second information from the second dataset using the seconddata container object. For instance, data track computing platform 110may retrieve second information from the second dataset using the seconddata container object, similar to how data track computing platform 110may retrieve first information from the first dataset using the firstdata container object, as discussed above.

At step 211, data track computing platform 110 may send the secondinformation to the second reader-writer system. For example, at step211, data track computing platform 110 may send, via the communicationinterface (e.g., communication interface 113), to the secondreader-writer system (e.g., data sub-processing computing platform 120,enterprise user computing device 140, enterprise user computing device150), the second information retrieved from the second dataset using thesecond data container object. For instance, data track computingplatform 110 may send the second information to the second reader-writersystem, similar to how data track computing platform 110 may send thefirst information to the first reader-writer system, as discussed above.

At step 212, data track computing platform 110 may receive a third dataaccess request from a different reader-writer system (e.g.,reader-writer system 181, reader-writer system 182, reader-writer system183, or reader-writer system 184). For example, at step 212, data trackcomputing platform 110 may receive, via the communication interface(e.g., communication interface 113), from a third reader-writer system(e.g., data sub-processing computing platform 120, enterprise usercomputing device 140, enterprise user computing device 150), a thirddata access request. For instance, data track computing platform 110 mayreceive the third data access request similar to how data trackcomputing platform 110 may receive the first data access request, asdiscussed above.

Referring to FIG. 2D, at step 213, data track computing platform 110 mayattempt to authenticate the third reader-writer system. For example, atstep 213, based on receiving the third data access request from thethird reader-writer system (e.g., data sub-processing computing platform120, enterprise user computing device 140, enterprise user computingdevice 150), data track computing platform 110 may attempt toauthenticate the third reader-writer system (e.g., data sub-processingcomputing platform 120, enterprise user computing device 140, enterpriseuser computing device 150) using a third data container object. Forinstance, data track computing platform 110 may attempt to authenticatethe third reader-writer system (e.g., data sub-processing computingplatform 120, enterprise user computing device 140, enterprise usercomputing device 150) using a third data container object byinterrogating and/or requesting one or more credentials that aremaintained by the reader-writer system and/or provided by thereader-writer system to the third data container object. Additionally oralternatively, the third data container object (which may, e.g., executeand/or otherwise operate on data track computing platform 110) mayattempt to authenticate the third reader-writer system (e.g., datasub-processing computing platform 120, enterprise user computing device140, enterprise user computing device 150) based on a unique identifierassociated with the third reader-writer system and/or one or more accessrules defined for the third data container object and/or maintained bythe third data container object. Such access rules may, for instance,define specific systems and/or specific groups of systems that may ormay not access the data container object and may be evaluated by datatrack computing platform 110 in authenticating the third reader-writersystem.

At step 214, data track computing platform 110 may fail to authenticatethe third reader-writer system (e.g., data sub-processing computingplatform 120, enterprise user computing device 140, enterprise usercomputing device 150). For example, at step 214, data track computingplatform 110 may determine that one or more credentials that aremaintained by the reader-writer system and/or provided by thereader-writer system to the third data container object are invalid.Additionally or alternatively, the third data container object (whichmay, e.g., execute and/or otherwise operate on data track computingplatform 110) may determine that the third reader-writer system (e.g.,data sub-processing computing platform 120, enterprise user computingdevice 140, enterprise user computing device 150) is not entitled toaccess the third data container object based on a unique identifierassociated with the third reader-writer system and/or one or more accessrules defined for the third data container object and/or maintained bythe third data container object.

At step 215, data track computing platform 110 may erect a blocker(e.g., to prevent the third reader-writer system from accessing thethird data container object and/or the dataset sitting beneath the thirddata container object). For example, at step 215, based on failing toauthenticate the third reader-writer system (e.g., data sub-processingcomputing platform 120, enterprise user computing device 140, enterpriseuser computing device 150) using the third data container object, datatrack computing platform 110 may erect a blocker object between thethird data container object and the third reader-writer system (e.g.,data sub-processing computing platform 120, enterprise user computingdevice 140, enterprise user computing device 150). In some instances, inerecting such a blocker, data track computing platform 110 may generateand/or otherwise instantiate a blocker object in memory that preventssuch access. Additionally or alternatively, data track computingplatform 110 may send a notification to administrator user computingdevice 160, which may cause administrator user computing device 160 todisplay and/or otherwise present a graphical user interface similar tographical user interface 700, which is illustrated in FIG. 7. As seen inFIG. 7, graphical user interface 700 may include text and/or otherinformation indicating that authentication of the third reader-writersystem has failed and a blocker has been erected (e.g., “<Access Request3> from <Reader-Writer System 3> has been received but authenticationfailed. A blocker has been erected to prevent <Reader-Writer System 3>from accessing contents of the data track.”).

At step 216, data track computing platform 110 may update the queue ofdata access requests to be processed. For example, at step 216, datatrack computing platform 110 may update the queue to indicate that thethird data access request has been denied and that the next data accessrequest in the queue should be processed. Subsequently, data trackcomputing platform 110 may continue to receive and process data accessrequests from the same and/or other reader-writer systems, similar tohow data track computing platform 110 may process such requests in theexamples described above. In some instances, such requests may involve areader-writer system loading information from the data track, writinginformation to the data track, and/or performing other operationsassociated with data stored on the data track (e.g., by interacting withone or more data container objects) as in the examples described above.

FIGS. 3A-3C depict another illustrative event sequence for controllingaccess to secure information resources using rotational datasets anddynamically configurable data containers in accordance with one or moreexample embodiments. As discussed in greater detail below, the exampleevent sequence illustrated in FIGS. 3A-3C shows how information may betransferred from one data track computing platform to another data trackcomputing platform. Referring to FIG. 3A, at step 301, datasub-processing computing platform 120 may receive a first data transferrequest from enterprise user computing device 140. For example, at step301, data sub-processing computing platform 120 may receive, via thecommunication interface (e.g., communication interface 113), from afirst enterprise user computing device (e.g., enterprise user computingdevice 140), a first data transfer request comprising informationscheduling a first data transfer operation.

In some embodiments, receiving the first data transfer request from thefirst enterprise user computing device may include receiving informationscheduling a one-time archival operation. For example, in receiving thefirst data transfer request from the first enterprise user computingdevice (e.g., enterprise user computing device 140) at step 301, datasub-processing computing platform 120 may receive information schedulinga one-time archival operation from enterprise user computing device 140.

In some embodiments, receiving the first data transfer request from thefirst enterprise user computing device may include receiving informationscheduling a periodic archival operation. For example, in receiving thefirst data transfer request from the first enterprise user computingdevice (e.g., enterprise user computing device 140) at step 301, datasub-processing computing platform 120 may receive information schedulinga periodic archival operation from enterprise user computing device 140.Such a periodic archival operation may, for instance, be executed ondata sub-processing computing platform 120 in accordance with theinformation received from enterprise user computing device 140, suchthat data stored on a first data track maintained by data trackcomputing platform 110 is archived, backed up, and/or otherwise storedby data sub-processing computing platform 120 on a second data trackmaintained by data track computing platform 130.

At step 302, data sub-processing computing platform 120 may retrievefirst information from data track computing platform 110 (e.g., bysending a data access request to data track computing platform 110, asin the examples described above). For example, at step 302, based onreceiving the first data transfer request from the first enterprise usercomputing device (e.g., enterprise user computing device 140), datasub-processing computing platform 120 may retrieve first informationfrom a first data track computing platform (e.g., data track computingplatform 110).

In some embodiments, retrieving the first information from the firstdata track computing platform may include: generating one or more firstrotation commands for the first data track computing platform; andsending the one or more first rotation commands generated for the firstdata track computing platform to the first data track computingplatform. For example, in retrieving the first information from thefirst data track computing platform (e.g., data track computing platform110) at step 302, data sub-processing computing platform 120 maygenerate one or more first rotation commands for the first data trackcomputing platform (e.g., data track computing platform 110). Forinstance, data sub-processing computing platform 120 may generate one ormore first rotation commands for data track computing platform 110,which may direct and/or cause data track computing platform 110 torotate a data track being maintained by data track computing platform110, as in the examples described above. Subsequently, datasub-processing computing platform 120 may send the one or more firstrotation commands generated for the first data track computing platform(e.g., data track computing platform 110) to the first data trackcomputing platform (e.g., data track computing platform 110). Forinstance, data sub-processing computing platform 120 may send the one ormore first rotation commands to data track computing platform 110 tofacilitate retrieval of the requested information from the data trackvia an appropriate data container, as in the examples described above.

In some embodiments, sending the one or more first rotation commandsgenerated for the first data track computing platform to the first datatrack computing platform may cause the first data track computingplatform to rotate a first data track maintained by the first data trackcomputing platform. In addition, the first data track maintained by thefirst data track computing platform may include a plurality of datasets,and sending the one or more first rotation commands generated for thefirst data track computing platform to the first data track computingplatform may cause the first data track computing platform to rotate thefirst data track to align a first dataset of the plurality of datasetswith a first data container object. For example, by sending the one ormore first rotation commands generated for the first data trackcomputing platform (e.g., data track computing platform 110) to thefirst data track computing platform (e.g., data track computing platform110) at step 302, data sub-processing computing platform 120 may causethe first data track computing platform (e.g., data track computingplatform 110) to rotate a first data track maintained by the first datatrack computing platform (e.g., data track computing platform 110),similar to how data track computing platform 110 may rotate a data trackas in the examples described above. In addition, the first data trackmaintained by the first data track computing platform (e.g., data trackcomputing platform 110) may include a plurality of datasets, and bysending the one or more first rotation commands generated for the firstdata track computing platform (e.g., data track computing platform 110)to the first data track computing platform (e.g., data track computingplatform 110), data sub-processing computing platform 120 may cause thefirst data track computing platform (e.g., data track computing platform110) to rotate the first data track to align a first dataset of theplurality of datasets with a first data container object. For instance,data sub-processing computing platform 120 may cause data trackcomputing platform 110 to rotate the first data track to align a firstdataset of the plurality of datasets with a first data container objectbased on the first dataset of the plurality of datasets storing and/orotherwise having content data corresponding to the first data transferrequest received from the first enterprise user computing device (e.g.,enterprise user computing device 140).

In some embodiments, sending the one or more first rotation commandsgenerated for the first data track computing platform to the first datatrack computing platform may cause the first data track computingplatform to rotate a data-container layer comprising the first datacontainer object and at least one additional data container objectdifferent from the first data container object. For example, by sendingthe one or more first rotation commands generated for the first datatrack computing platform (e.g., data track computing platform 110) tothe first data track computing platform (e.g., data track computingplatform 110) at step 302, data sub-processing computing platform 120may cause the first data track computing platform (e.g., data trackcomputing platform 110) to rotate a data-container layer comprising thefirst data container object and at least one additional data containerobject different from the first data container object, similar to howdata track computing platform 110 may rotate a data-container layer asin the examples described above.

At step 303, data sub-processing computing platform 120 may configuredata track computing platform 130. For example, at step 303, datasub-processing computing platform 120 may configure a second data trackcomputing platform (e.g., data track computing platform 130) to receivethe first information retrieved from the first data track computingplatform (e.g., data track computing platform 110). For instance, datasub-processing computing platform 120 may configure data track computingplatform 130 so as to synchronize production content obtained from datatrack computing platform 110 with archival content maintained on datatrack computing platform 130. In some instances, in configuring thesecond data track computing platform (e.g., data track computingplatform 130), data sub-processing computing platform 120 may send anotification to administrator user computing device 160, which may causeadministrator user computing device 160 to display and/or otherwisepresent a graphical user interface similar to graphical user interface800, which is illustrated in FIG. 8. As seen in FIG. 8, graphical userinterface 800 may include text and/or other information indicating thatan archival operation has been scheduled and/or that various data trackcomputing platforms are being configured by data sub-processingcomputing platform 120 (e.g., “An archival operation has been scheduled.One or more datasets from <Data Track Platform 1—Production System> willbe archived on <Data Track Platform 2—Archive System>. The data trackplatforms are being configured automatically to complete the requesteddata archiving operation.”).

In some embodiments, configuring the second data track computingplatform to receive the first information retrieved from the first datatrack computing platform may include: generating one or more secondrotation commands for the second data track computing platform; andsending the one or more second rotation commands generated for thesecond data track computing platform to the second data track computingplatform. For example, in configuring the second data track computingplatform (e.g., data track computing platform 130) to receive the firstinformation retrieved from the first data track computing platform(e.g., data track computing platform 110) at step 303, datasub-processing computing platform 120 may generate one or more secondrotation commands for the second data track computing platform (e.g.,data track computing platform 130). For instance, data sub-processingcomputing platform 120 may generate one or more second rotation commandsfor data track computing platform 130, which may direct and/or causedata track computing platform 130 to rotate a data track beingmaintained by data track computing platform 130, as in the examplesdescribed above. Subsequently, data sub-processing computing platform120 may send the one or more second rotation commands generated for thesecond data track computing platform (e.g., data track computingplatform 130) to the second data track computing platform (e.g., datatrack computing platform 130). For instance, data sub-processingcomputing platform 120 may send the one or more second rotation commandsto data track computing platform 130 to facilitate an archival processin which the information obtained from data track computing platform 110is archived on and/or otherwise written to the data track maintained bydata track computing platform 130 via an appropriate data container, asin the examples described above.

In some embodiments, generating the one or more second rotation commandsfor the second data track computing platform may include generating theone or more second rotation commands for the second data track computingplatform based on one or more tags associated with the first informationretrieved from the first data track computing platform. For example, ingenerating the one or more second rotation commands for the second datatrack computing platform (e.g., data track computing platform 130) atstep 303, data sub-processing computing platform 120 may generate theone or more second rotation commands for the second data track computingplatform (e.g., data track computing platform 130) based on one or moretags associated with the first information retrieved from the first datatrack computing platform (e.g., data track computing platform 110). Forinstance, data sub-processing computing platform 120 may generate theone or more second rotation commands for data track computing platform130, so as to direct and/or cause data track computing platform 130 torotate its data track to write data to the data track via one or morecontainers with sufficient access rights to comply with securityrestrictions and/or other restrictions imposed by the one or more tagsassociated with the first information retrieved from data trackcomputing platform 110. For instance, data track computing platform 110may have applied security-level tags and/or content-type tags to thedata (e.g., based on the user role(s) and/or user line(s) of businessthat created data, the contents of data, and/or the like), and datasub-processing computing platform 120 may generate the one or moresecond rotation commands for data track computing platform 130 to complywith restrictions imposed by these tags.

In some embodiments, sending the one or more second rotation commandsgenerated for the second data track computing platform to the seconddata track computing platform may cause the second data track computingplatform to rotate a second data track maintained by the second datatrack computing platform. For example, by sending the one or more secondrotation commands generated for the second data track computing platform(e.g., data track computing platform 130) to the second data trackcomputing platform (e.g., data track computing platform 130), datasub-processing computing platform 120 may cause the second data trackcomputing platform (e.g., data track computing platform 130) to rotate asecond data track maintained by the second data track computing platform(e.g., data track computing platform 130). For instance, data trackcomputing platform 130 may maintain a data track (e.g., similar to thedata track maintained by data track computing platform 110) and the oneor more second rotation commands may cause data track computing platform130 to rotate this data track (e.g., similar to how data track computingplatform 110 may rotate its data track), as in the examples describedabove.

In some embodiments, sending the one or more second rotation commandsgenerated for the second data track computing platform to the seconddata track computing platform may cause the second data track computingplatform to rotate a data-container layer comprising a plurality of datacontainer objects. For example, by sending the one or more secondrotation commands generated for the second data track computing platform(e.g., data track computing platform 130) to the second data trackcomputing platform (e.g., data track computing platform 130), datasub-processing computing platform 120 may cause the second data trackcomputing platform (e.g., data track computing platform 130) to rotate adata-container layer comprising a plurality of data container objects.For instance, data track computing platform 130 may have adata-container layer (e.g., similar to the data-container layerassociated with data track computing platform 110), and the one or moresecond rotation commands may cause data track computing platform 130 torotate this data-container layer (e.g., similar to how data trackcomputing platform 110 may rotate its data-container layer), as in theexamples described above.

At step 304, data sub-processing computing platform 120 may send thefirst information to data track computing platform 130. For example, atstep 304, after configuring the second data track computing platform(e.g., data track computing platform 130) to receive the firstinformation retrieved from the first data track computing platform(e.g., data track computing platform 110), data sub-processing computingplatform 120 may send, via the communication interface (e.g.,communication interface 113), to the second data track computingplatform (e.g., data track computing platform 130), the firstinformation retrieved from the first data track computing platform(e.g., data track computing platform 110). In addition, sending thefirst information retrieved from the first data track computing platform(e.g., data track computing platform 110) to the second data trackcomputing platform (e.g., data track computing platform 130) may causethe second data track computing platform (e.g., data track computingplatform 130) to store the first information retrieved from the firstdata track computing platform (e.g., data track computing platform 110).For instance, by sending the first information to data track computingplatform 130 at step 304, data sub-processing computing platform 120 maycause data track computing platform 130 to archive and/or otherwisestore the first information on a data track maintained by data trackcomputing platform 130 (e.g., to complete a data transfer and/orarchival operation from data track computing platform 110 to data trackcomputing platform 130). In some instances, data track computingplatform 110 may, for example, be a live, production system that mayreceive, create, and/or process enterprise data throughout the day eachday, and data track computing platform 110 may tag any and/or all ofthis data with tags indicating a security level of the data, a user whocreated the data, the role of the user who created the data, a line ofbusiness within the enterprise associated with the user who created thedata, and/or the like. And data track computing platform 130 may, forexample, be an archival system that may receive, process, and/or storeany and/or all of this data from data track computing platform 110(e.g., on a data track so as to ensure information security and preventunauthorized access to resources of these enterprise computer systems).

In some embodiments, sending the first information retrieved from thefirst data track computing platform to the second data track computingplatform may include sending the first information retrieved from thefirst data track computing platform to the second data track computingplatform via a plurality of data filters managed by the computingplatform. For example, in sending the first information retrieved fromthe first data track computing platform (e.g., data track computingplatform 110) to the second data track computing platform (e.g., datatrack computing platform 130) at step 304, data sub-processing computingplatform 120 may send the first information retrieved from the firstdata track computing platform (e.g., data track computing platform 110)to the second data track computing platform (e.g., data track computingplatform 130) via a plurality of data filters managed by the computingplatform (e.g., data sub-processing computing platform 120). Forinstance, data sub-processing computing platform 120 may maintain,execute, and/or otherwise be associated with a plurality of differentfilters (e.g., filter 1, filter 2, filter 3, and so on) and data havinga specific tag (e.g., tag 1, tag 2, tag 3, and so on) might only bepermitted to pass through a corresponding filter. For instance,orange-tagged data might only be permitted to pass through anorange-data filter, blue-tagged data might only be permitted to passthrough a blue-data filter, green-tagged data might only be permitted topass through a green-data filter, and/or the like. In some instances,the data might be loaded from a source data track into the correspondingfilters to facilitate transfer and/or storage on a target data track.Additionally or alternatively, the filters may be re-assignable, suchthat each filter may be reassigned to process a different type of dataafter a data transfer process, such as an extract-transfer-load (ETL)process, involving the different data tracks (e.g., maintained by datatrack computing platform 110 and data track computing platform 130) iscompleted.

Referring to FIG. 3B, at step 305, data track computing platform 130 mayreceive the first information from data sub-processing computingplatform 120. At step 306, data track computing platform 130 may storethe first information received from data sub-processing computingplatform 120. For example, at step 306, data track computing platform130 may store the first information received from data sub-processingcomputing platform 120 on the data track maintained by data trackcomputing platform 130.

At step 307, data sub-processing computing platform 120 may receive asecond data transfer request from enterprise user computing device 150.For example, at step 307, data sub-processing computing platform 120 mayreceive, via the communication interface (e.g., communication interface113), from a second enterprise user computing device (e.g., enterpriseuser computing device 150) different from the first enterprise usercomputing device (e.g., enterprise user computing device 140), a seconddata transfer request comprising information scheduling a second datatransfer operation. For instance, data sub-processing computing platform120 may receive the second data transfer request from enterprise usercomputing device 150, similar to how data sub-processing computingplatform 120 may receive the first data transfer request from enterpriseuser computing device 140.

At step 308, data sub-processing computing platform 120 may retrievesecond information from data track computing platform 110. For example,at step 308, based on receiving the second data transfer request fromthe second enterprise user computing device (e.g., enterprise usercomputing device 150), data sub-processing computing platform 120 mayretrieve second information from the first data track computing platform(e.g., data track computing platform 110). For instance, datasub-processing computing platform 120 may retrieve second informationfrom the first data track computing platform (e.g., data track computingplatform 110), similar to how data sub-processing computing platform 120may retrieve first information from the first data track computingplatform (e.g., data track computing platform 110) in the examplesdiscussed above.

Referring to FIG. 3C, at step 309, data sub-processing computingplatform 120 may configure data track computing platform 130. Forexample, at step 309, data sub-processing computing platform 120 mayconfigure the second data track computing platform (e.g., data trackcomputing platform 130) to receive the second information retrieved fromthe first data track computing platform (e.g., data track computingplatform 110). For instance, data sub-processing computing platform 120may configure data track computing platform 130 to receive the secondinformation, similar to how data sub-processing computing platform 120may configure data track computing platform 130 to receive the firstinformation in the examples discussed above.

At step 310, data sub-processing computing platform 120 may send thesecond information to data track computing platform 130. For example, atstep 310, after configuring the second data track computing platform(e.g., data track computing platform 130) to receive the secondinformation retrieved from the first data track computing platform(e.g., data track computing platform 110), data sub-processing computingplatform 120 may send, via the communication interface (e.g.,communication interface 113), to the second data track computingplatform (e.g., data track computing platform 130), the secondinformation retrieved from the first data track computing platform(e.g., data track computing platform 110). In addition, sending thesecond information retrieved from the first data track computingplatform (e.g., data track computing platform 110) to the second datatrack computing platform (e.g., data track computing platform 130) maycause the second data track computing platform (e.g., data trackcomputing platform 130) to store the second information retrieved fromthe first data track computing platform (e.g., data track computingplatform 110).

At step 311, data track computing platform 130 may receive the secondinformation from data sub-processing computing platform 120. At step312, data track computing platform 130 may store the second informationreceived from data sub-processing computing platform 120. For example,at step 312, data track computing platform 130 may store the secondinformation received from data sub-processing computing platform 120 onthe data track maintained by data track computing platform 130.

FIGS. 4A-4C depict another illustrative event sequence for controllingaccess to secure information resources using rotational datasets anddynamically configurable data containers in accordance with one or moreexample embodiments. Referring to FIG. 4A, at step 401, data trackcomputing platform 110 may receive a first data access request. Forexample, at step 401, data track computing platform 110 may receive, viathe communication interface (e.g., communication interface 113), from afirst requesting system (e.g., data sub-processing computing platform120, enterprise user computing device 140, enterprise user computingdevice 150), a first data access request. For instance, data trackcomputing platform 110 may receive a data access request, similar to howdata track computing platform 110 may receive a data access request asin the examples discussed above.

In some arrangements, the data container layer maintained by data trackcomputing platform 110 in connection with the example event sequenceillustrated in FIGS. 4A-4C may resemble the data container layerillustrated in FIG. 1G. In these arrangements, source data may be sentfrom one data container to the next to facilitate the collection of datato respond to a particular data access request, as discussed below.

In some embodiments, receiving the first data access request from thefirst requesting system may include receiving the first data accessrequest from a first reader-writer system. For example, in receiving thefirst data access request from the first requesting system at step 401,data track computing platform 110 may receive the first data accessrequest from a first reader-writer system (e.g., enterprise usercomputing device 140, enterprise user computing device 150).

In some embodiments, receiving the first data access request from thefirst requesting system may include receiving the first data accessrequest from a data sub-processing computing platform that interfaceswith an additional data track computing platform which maintains asecond data track different from the first data track. For example, inreceiving the first data access request from the first requesting systemat step 401, data track computing platform 110 may receive the firstdata access request from a data sub-processing computing platform (e.g.,data sub-processing computing platform 120) that interfaces with anadditional data track computing platform (e.g., data track computingplatform 130) which maintains a second data track different from thefirst data track.

At step 402, data track computing platform 110 may authenticate thefirst requesting system. For example, at step 402, based on receivingthe first data access request from the first requesting system (e.g.,data sub-processing computing platform 120, enterprise user computingdevice 140, enterprise user computing device 150), data track computingplatform 110 may authenticate the first requesting system (e.g., datasub-processing computing platform 120, enterprise user computing device140, enterprise user computing device 150) using a first data containerobject. For instance, data track computing platform 110 may authenticatethe first requesting system (e.g., data sub-processing computingplatform 120, enterprise user computing device 140, enterprise usercomputing device 150) using a first data container object, as in theexamples discussed above.

At step 403, data track computing platform 110 may load first sourcedata using the first data container. For example, at step 403, afterauthenticating the first requesting system (e.g., data sub-processingcomputing platform 120, enterprise user computing device 140, enterpriseuser computing device 150) using the first data container object, datatrack computing platform 110 may load, using the first data containerobject, first source data from a first data track maintained by thecomputing platform (e.g., data track computing platform 110). Inaddition, the first data track maintained by the computing platform(e.g., data track computing platform 110) may include a plurality ofdatasets. For instance, data track computing platform 110 may maintain adata track as in the examples discussed above, and data track computingplatform 110 may load data from the data track, similar to how datatrack computing platform 110 may load data from a data track in theexamples discussed above.

In some embodiments, loading the first source data from the first datatrack maintained by the computing platform using the first datacontainer object may include rotating the first data track to align afirst dataset of the plurality of datasets with the first data containerobject. For example, in loading the first source data from the firstdata track maintained by the computing platform (e.g., data trackcomputing platform 110) using the first data container object, datatrack computing platform 110 may rotate the first data track to align afirst dataset of the plurality of datasets with the first data containerobject. For instance, data track computing platform 110 may rotate itsdata track, similar to how data track computing platform 110 may rotatea data track in the examples discussed above.

At step 404, data track computing platform 110 may send the first sourcedata to a second data container. For example, at step 404, data trackcomputing platform 110 may send the first source data loaded using thefirst data container object to a second data container object differentfrom the first data container object. For instance, referring to FIG.1G, data collected via a first data container (e.g., “Data Container 1”)may be sent to a second data container (e.g., “Data Container 2”). Asillustrated below, this process may be repeated several times, withseveral layer of data containers, before a compilation of data isreturned to a particular reader-writer system (e.g., reader-writersystem 182).

Referring to FIG. 4B, at step 405, data track computing platform 110 mayload second source data using the second data container. For example, atstep 405, data track computing platform 110 may load, using the seconddata container object, second source data from the first data trackmaintained by the computing platform (e.g., data track computingplatform 110). For instance, data track computing platform 110 may loadsource data from the data track, as in the examples described above.

In some embodiments, loading the second source data from the first datatrack maintained by the computing platform using the second datacontainer object may include loading the second source data from thefirst data track maintained by the computing platform using the seconddata container object based on re-authenticating the first requestingsystem using the second data container object. For example, in loadingthe second source data from the first data track maintained by thecomputing platform (e.g., data track computing platform 110) using thesecond data container object at step 405, data track computing platform110 may load the second source data from the first data track maintainedby the computing platform (e.g., data track computing platform 110)using the second data container object based on re-authenticating thefirst requesting system (e.g., data sub-processing computing platform120, enterprise user computing device 140, enterprise user computingdevice 150) using the second data container object. For instance, datatrack computing platform 110 may re-authenticate the first requestingsystem (e.g., data sub-processing computing platform 120, enterpriseuser computing device 140, enterprise user computing device 150) using asecond data container object, similar to how data track computingplatform 110 may authenticate the first requesting system (e.g., datasub-processing computing platform 120, enterprise user computing device140, enterprise user computing device 150) using a first data containerobject, as in the examples discussed above.

In some embodiments, loading the second source data from the first datatrack maintained by the computing platform using the second datacontainer object may include rotating the first data track to align asecond dataset of the plurality of datasets with the second datacontainer object. For example, in loading the second source data fromthe first data track maintained by the computing platform (e.g., datatrack computing platform 110) using the second data container object atstep 405, data track computing platform 110 may rotate the first datatrack to align a second dataset of the plurality of datasets with thesecond data container object. For instance, data track computingplatform 110 may rotate its data track, similar to how data trackcomputing platform 110 may rotate a data track in the examples discussedabove.

At step 406, data track computing platform 110 may combine the secondsource data and the first source data. For example, at step 406, datatrack computing platform 110 may combine, at the second data containerobject, the second source data loaded using the second data containerobject and the first source data loaded using the first data containerobject to produce a first combined dataset. For instance, in combiningthe second source data loaded using the second data container object andthe first source data loaded using the first data container object, datatrack computing platform 110 may compile and/or otherwise merge thefirst data and the second data, which may result in the creation of thefirst combined dataset.

In some embodiments, combining the second source data loaded using thesecond data container object and the first source data loaded using thefirst data container object to produce the first combined dataset mayinclude filtering the second source data loaded using the second datacontainer object and the first source data loaded using the first datacontainer object to remove redundant data. For example, in combining thesecond source data loaded using the second data container object and thefirst source data loaded using the first data container object toproduce the first combined dataset at step 406, data track computingplatform 110 may filter the second source data loaded using the seconddata container object and the first source data loaded using the firstdata container object to remove redundant data. For instance, data trackcomputing platform 110 may remove duplicative content from the firstcombined dataset (which may, e.g., result from overlapping data existingin both the first source data and the second source data).

At step 407, data track computing platform 110 may send the firstcombined dataset to a third data container. For example, at step 407,data track computing platform 110 may send the first combined dataset toa third data container object different from the first data containerobject and the second data container object. For instance, data trackcomputing platform 110 may send the first combined dataset to a thirddata container object, similar to how data track computing platform 110may send the first source data loaded using the first data containerobject to the second data container object in the examples describedabove.

In some embodiments, sending the first combined dataset to the thirddata container object different from the first data container object andthe second data container object may include sending the first combineddataset to the third data container object based on the first datacontainer object having a first ruleset associated with a first datatype, the second data container object having a second rulesetassociated with a second data type, and the third data container objecthaving a third ruleset associated with a third data type. For example,in sending the first combined dataset to the third data container objectdifferent from the first data container object and the second datacontainer object, data track computing platform 110 may send the firstcombined dataset to the third data container object based on the firstdata container object having a first ruleset associated with a firstdata type, the second data container object having a second rulesetassociated with a second data type, and the third data container objecthaving a third ruleset associated with a third data type. For instance,each data container may have individual, container-specific rulesdictating what types of data the particular data container can read,write, and/or otherwise interact with. For instance, the first datacontainer may have a ruleset that allows for loading of transactionidentifiers and transaction amounts from a source data track, the seconddata container may have a ruleset that allows for loading of accountnumbers from the source data track, and the third data container mayhave a ruleset that allows for loading of merchant names from the sourcedata track.

At step 408, data track computing platform 110 may load third sourcedata using the third data container. For example, at step 408, datatrack computing platform 110 may load, using the third data containerobject, third source data from the first data track maintained by thecomputing platform (e.g., data track computing platform 110). Forinstance, data track computing platform 110 may load source data fromthe data track, as in the examples described above.

In some embodiments, loading the third source data from the first datatrack maintained by the computing platform using the third datacontainer object may include loading the third source data from thefirst data track maintained by the computing platform using the thirddata container object based on re-authenticating the first requestingsystem using the third data container object. For example, in loadingthe third source data from the first data track maintained by thecomputing platform (e.g., data track computing platform 110) using thethird data container object at step 408, data track computing platform110 may load the third source data from the first data track maintainedby the computing platform (e.g., data track computing platform 110)using the third data container object based on re-authenticating thefirst requesting system (e.g., data sub-processing computing platform120, enterprise user computing device 140, enterprise user computingdevice 150) using the third data container object. For instance, datatrack computing platform 110 may re-authenticate the first requestingsystem (e.g., data sub-processing computing platform 120, enterpriseuser computing device 140, enterprise user computing device 150) usingthe third data container object, similar to how data track computingplatform 110 may authenticate the first requesting system (e.g., datasub-processing computing platform 120, enterprise user computing device140, enterprise user computing device 150) using the first datacontainer object, as in the examples discussed above.

In some embodiments, loading the third source data from the first datatrack maintained by the computing platform using the third datacontainer object may include rotating the first data track to align athird dataset of the plurality of datasets with the third data containerobject. For example, in loading the third source data from the firstdata track maintained by the computing platform (e.g., data trackcomputing platform 110) using the third data container object at step408, data track computing platform 110 may rotate the first data trackto align a third dataset of the plurality of datasets with the thirddata container object. For instance, data track computing platform 110may rotate its data track, similar to how data track computing platform110 may rotate a data track in the examples discussed above.

Referring to FIG. 4C, at step 409, data track computing platform 110 maycombine the third source data with the first combined dataset. Forexample, at step 409, data track computing platform 110 may combine, atthe third data container object, the third source data loaded using thethird data container object and the first combined dataset to produce asecond combined dataset. For instance, in combining the third sourcedata loaded using the third data container object and the first combineddataset, data track computing platform 110 may compile and/or otherwisemerge the third data and the first combined dataset, which may result inthe creation of the second combined dataset.

In some embodiments, combining the third source data loaded using thethird data container object and the first combined dataset to producethe second combined dataset may include filtering the third source dataloaded using the third data container object and the first combineddataset to remove redundant data. For example, in combining the thirdsource data loaded using the third data container object and the firstcombined dataset to produce the second combined dataset at step 409,data track computing platform 110 may filter the third source dataloaded using the third data container object and the first combineddataset to remove redundant data. For instance, data track computingplatform 110 may remove duplicative content from the second combineddataset (which may, e.g., result from overlapping data existing in boththe third source data and the first combined dataset).

At step 410, data track computing platform 110 may send the secondcombined dataset to the requesting system. For example, at step 410,data track computing platform 110 may send, via the communicationinterface (e.g., communication interface 113), to the first requestingsystem (e.g., data sub-processing computing platform 120, enterpriseuser computing device 140, enterprise user computing device 140), thesecond combined dataset.

At step 411, data track computing platform 110 may receive a second dataaccess request (e.g., from data sub-processing computing platform 120,enterprise user computing device 140, enterprise user computing device140). For instance, at step 411, data track computing platform 110 mayreceive a second data access request, similar to how data trackcomputing platform 110 may receive the first data access request as inthe examples described above. At step 412, data track computing platform110 may process the second data access request. For instance, at step412, data track computing platform 110 may process the second dataaccess request (e.g., by performing steps similar to those describedabove in connection with data track computing platform 110 processingthe first data access request).

FIG. 9 depicts an illustrative method for controlling access to secureinformation resources using rotational datasets and dynamicallyconfigurable data containers in accordance with one or more exampleembodiments. Referring to FIG. 9, at step 905, a computing platformhaving at least one processor, a communication interface, and memory mayreceive, via the communication interface, from a first reader-writersystem, a first data access request. At step 910, based on receiving thefirst data access request from the first reader-writer system, thecomputing platform may authenticate the first reader-writer system usinga first data container object. At step 915, after authenticating thefirst reader-writer system using the first data container object, thecomputing platform may rotate a first data track comprising a pluralityof datasets to align a first dataset of the plurality of datasets withthe first data container object. At step 920, after rotating the firstdata track comprising the plurality of datasets to align the firstdataset of the plurality of datasets with the first data containerobject, the computing platform may retrieve first information from thefirst dataset using the first data container object. At step 925, thecomputing platform may send, via the communication interface, to thefirst reader-writer system, the first information retrieved from thefirst dataset using the first data container object.

FIG. 10 depicts another illustrative method for controlling access tosecure information resources using rotational datasets and dynamicallyconfigurable data containers in accordance with one or more exampleembodiments. Referring to FIG. 10, at step 1005, a computing platformhaving at least one processor, a communication interface, and memory mayreceive, via the communication interface, from a first enterprise usercomputing device, a first data transfer request comprising informationscheduling a first data transfer operation. At step 1010, based onreceiving the first data transfer request from the first enterprise usercomputing device, the computing platform may retrieve first informationfrom a first data track computing platform. At step 1015, the computingplatform may configure a second data track computing platform to receivethe first information retrieved from the first data track computingplatform. At step 1020, after configuring the second data trackcomputing platform to receive the first information retrieved from thefirst data track computing platform, the computing platform may send,via the communication interface, to the second data track computingplatform, the first information retrieved from the first data trackcomputing platform. In addition, sending the first information retrievedfrom the first data track computing platform to the second data trackcomputing platform may cause the second data track computing platform tostore the first information retrieved from the first data trackcomputing platform.

FIG. 11 depicts another illustrative method for controlling access tosecure information resources using rotational datasets and dynamicallyconfigurable data containers in accordance with one or more exampleembodiments. Referring to FIG. 11, at step 1105, a computing platformhaving at least one processor, a communication interface, and memory mayreceive, via the communication interface, from a first requestingsystem, a first data access request. At step 1110, based on receivingthe first data access request from the first requesting system, thecomputing platform may authenticate the first requesting system using afirst data container object. At step 1115, after authenticating thefirst requesting system using the first data container object, thecomputing platform may load, using the first data container object,first source data from a first data track maintained by the computingplatform, where the first data track maintained by the computingplatform comprises a plurality of datasets. At step 1120, the computingplatform may send the first source data loaded using the first datacontainer object to a second data container object different from thefirst data container object. At step 1125, the computing platform mayload, using the second data container object, second source data fromthe first data track maintained by the computing platform. At step 1130,the computing platform may combine, at the second data container object,the second source data loaded using the second data container object andthe first source data loaded using the first data container object toproduce a first combined dataset. At step 1135, the computing platformmay send the first combined dataset to a third data container objectdifferent from the first data container object and the second datacontainer object. At step 1140, the computing platform may load, usingthe third data container object, third source data from the first datatrack maintained by the computing platform. At step 1145, the computingplatform may combine, at the third data container object, the thirdsource data loaded using the third data container object and the firstcombined dataset to produce a second combined dataset. At step 1150, thecomputing platform may send, via the communication interface, to thefirst requesting system, the second combined dataset.

One or more aspects of the disclosure may be embodied in computer-usabledata or computer-executable instructions, such as in one or more programmodules, executed by one or more computers or other devices to performthe operations described herein. Generally, program modules includeroutines, programs, objects, components, data structures, and the likethat perform particular tasks or implement particular abstract datatypes when executed by one or more processors in a computer or otherdata processing device. The computer-executable instructions may bestored as computer-readable instructions on a computer-readable mediumsuch as a hard disk, optical disk, removable storage media, solid-statememory, RAM, and the like. The functionality of the program modules maybe combined or distributed as desired in various embodiments. Inaddition, the functionality may be embodied in whole or in part infirmware or hardware equivalents, such as integrated circuits,application-specific integrated circuits (ASICs), field programmablegate arrays (FPGA), and the like. Particular data structures may be usedto more effectively implement one or more aspects of the disclosure, andsuch data structures are contemplated to be within the scope of computerexecutable instructions and computer-usable data described herein.

Various aspects described herein may be embodied as a method, anapparatus, or as one or more computer-readable media storingcomputer-executable instructions. Accordingly, those aspects may takethe form of an entirely hardware embodiment, an entirely softwareembodiment, an entirely firmware embodiment, or an embodiment combiningsoftware, hardware, and firmware aspects in any combination. Inaddition, various signals representing data or events as describedherein may be transferred between a source and a destination in the formof light or electromagnetic waves traveling through signal-conductingmedia such as metal wires, optical fibers, or wireless transmissionmedia (e.g., air or space). In general, the one or morecomputer-readable media may be and/or include one or more non-transitorycomputer-readable media.

As described herein, the various methods and acts may be operativeacross one or more computing servers and one or more networks. Thefunctionality may be distributed in any manner, or may be located in asingle computing device (e.g., a server, a client computer, and thelike). For example, in alternative embodiments, one or more of thecomputing platforms discussed above may be combined into a singlecomputing platform, and the various functions of each computing platformmay be performed by the single computing platform. In such arrangements,any and/or all of the above-discussed communications between computingplatforms may correspond to data being accessed, moved, modified,updated, and/or otherwise used by the single computing platform.Additionally or alternatively, one or more of the computing platformsdiscussed above may be implemented in one or more virtual machines thatare provided by one or more physical computing devices. In sucharrangements, the various functions of each computing platform may beperformed by the one or more virtual machines, and any and/or all of theabove-discussed communications between computing platforms maycorrespond to data being accessed, moved, modified, updated, and/orotherwise used by the one or more virtual machines.

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof. Numerous other embodiments, modifications, andvariations within the scope and spirit of the appended claims will occurto persons of ordinary skill in the art from a review of thisdisclosure. For example, one or more of the steps depicted in theillustrative figures may be performed in other than the recited order,and one or more depicted steps may be optional in accordance withaspects of the disclosure.

What is claimed is:
 1. A computing platform, comprising: at least oneprocessor; a communication interface communicatively coupled to the atleast one processor; and a computer-readable medium storingcomputer-readable instruction that, when executed by the at least oneprocessor, cause the computing platform to: receive, via thecommunication interface, from a first requesting system, a first dataaccess request; based on receiving the first data access request fromthe first requesting system, authenticate the first requesting systemusing a first data container object; after authenticating the firstrequesting system using the first data container object, load, using thefirst data container object, first source data from a first data trackmaintained by the computing platform, wherein the first data trackmaintained by the computing platform comprises a plurality of datasets;send the first source data loaded using the first data container objectto a second data container object different from the first datacontainer object; and load, using the second data container object,second source data from the first data track maintained by the computingplatform.
 2. The computing platform of claim 1, wherein thecomputer-readable medium storing computer-readable instructions that,when executed by the at least one processor, cause the computingplatform to: combine, at the second data container object, the secondsource data loaded using the second data container object and the firstsource data loaded using the first data container object to produce afirst combined dataset
 3. The computing platform of claim 2, wherein thecomputer-readable medium storing computer-readable instructions that,when executed by the at least one processor, cause the computingplatform to: send the first combined dataset to a third data containerobject different from the first data container object and the seconddata container object; and load, using the third data container object,third source data from the first data track maintained by the computingplatform.
 4. The computing platform of claim 1, wherein receiving thefirst data access request from the first requesting system comprisesreceiving the first data access request from a first reader-writersystem.
 5. The computing platform of claim 1, wherein receiving thefirst data access request from the first requesting system comprisesreceiving the first data access request from a data sub-processingcomputing platform that interfaces with an additional data trackcomputing platform which maintains a second data track different fromthe first data track.
 6. The computing platform of claim 1, whereinloading the first source data from the first data track maintained bythe computing platform using the first data container object comprisesrotating the first data track to align a first dataset of the pluralityof datasets with the first data container object.
 7. The computingplatform of claim 1, wherein loading the second source data from thefirst data track maintained by the computing platform using the seconddata container object comprises loading the second source data from thefirst data track maintained by the computing platform using the seconddata container object based on re-authenticating the first requestingsystem using the second data container object.
 8. The computing platformof claim 1, wherein loading the second source data from the first datatrack maintained by the computing platform using the second datacontainer object comprises rotating the first data track to align asecond dataset of the plurality of datasets with the second datacontainer object.
 9. The computing platform of claim 2, whereincombining the second source data loaded using the second data containerobject and the first source data loaded using the first data containerobject to produce the first combined dataset comprises filtering thesecond source data loaded using the second data container object and thefirst source data loaded using the first data container object to removeredundant data.
 10. The computing platform of claim 3, wherein sendingthe first combined dataset to the third data container object differentfrom the first data container object and the second data containerobject comprises sending the first combined dataset to the third datacontainer object based on the first data container object having a firstruleset associated with a first data type, the second data containerobject having a second ruleset associated with a second data type, andthe third data container object having a third ruleset associated with athird data type.
 11. The computing platform of claim 3, wherein loadingthe third source data from the first data track maintained by thecomputing platform using the third data container object comprisesloading the third source data from the first data track maintained bythe computing platform using the third data container object based onre-authenticating the first requesting system using the third datacontainer object.
 12. The computing platform of claim 3, wherein loadingthe third source data from the first data track maintained by thecomputing platform using the third data container object comprisesrotating the first data track to align a third dataset of the pluralityof datasets with the third data container object.
 13. A method,comprising: at a computing platform comprising at least one processor, acommunication interface, and memory: receiving, by the at least oneprocessor, via the communication interface, from a first requestingsystem, a first data access request; based on receiving the first dataaccess request from the first requesting system, authenticating, by theat least one processor, the first requesting system using a first datacontainer object; after authenticating the first requesting system usingthe first data container object, loading, by the at least one processor,using the first data container object, first source data from a firstdata track maintained by the computing platform, wherein the first datatrack maintained by the computing platform comprises a plurality ofdatasets; sending, by the at least one processor, the first source dataloaded using the first data container object to a second data containerobject different from the first data container object; loading, by theat least one processor, using the second data container object, secondsource data from the first data track maintained by the computingplatform; and combining, by the at least one processor, at the seconddata container object, the second source data loaded using the seconddata container object and the first source data loaded using the firstdata container object to produce a first combined dataset.
 14. Themethod of claim 13, further comprising: sending, by the at least oneprocessor, the first combined dataset to a third data container objectdifferent from the first data container object and the second datacontainer object; and loading, by the at least one processor, using thethird data container object, third source data from the first data trackmaintained by the computing platform.
 15. The method of claim 13,wherein receiving the first data access request from the firstrequesting system comprises receiving the first data access request froma first reader-writer system.
 16. The method of claim 13, whereinreceiving the first data access request from the first requesting systemcomprises receiving the first data access request from a datasub-processing computing platform that interfaces with an additionaldata track computing platform which maintains a second data trackdifferent from the first data track.
 17. The method of claim 13, whereinloading the first source data from the first data track maintained bythe computing platform using the first data container object comprisesrotating the first data track to align a first dataset of the pluralityof datasets with the first data container object.
 18. The method ofclaim 13, wherein loading the second source data from the first datatrack maintained by the computing platform using the second datacontainer object comprises loading the second source data from the firstdata track maintained by the computing platform using the second datacontainer object based on re-authenticating the first requesting systemusing the second data container object.
 19. One or more non-transitorycomputer-readable media storing instructions that, when executed by acomputing platform comprising at least one processor, a communicationinterface, and memory, cause the computing platform to: receive, via thecommunication interface, from a first requesting system, a first dataaccess request; based on receiving the first data access request fromthe first requesting system, authenticate the first requesting systemusing a first data container object; after authenticating the firstrequesting system using the first data container object, load, using thefirst data container object, first source data from a first data trackmaintained by the computing platform, wherein the first data trackmaintained by the computing platform comprises a plurality of datasets;send the first source data loaded using the first data container objectto a second data container object different from the first datacontainer object; load, using the second data container object, secondsource data from the first data track maintained by the computingplatform; and combine, at the second data container object, the secondsource data loaded using the second data container object and the firstsource data loaded using the first data container object to produce afirst combined dataset.
 20. The one or more non-transitorycomputer-readable media of claim 19 further storing instructions that,when executed by the computing platform, cause the computing platformto: send the first combined dataset to a third data container objectdifferent from the first data container object and the second datacontainer object; and load, using the third data container object, thirdsource data from the first data track maintained by the computingplatform.