Secure Relational Jump (SRJ)

Data soverignity-in-progess

SRJ Demonstration

Welcome

SRJ uses two types of SRJ keys. One for data owners and custodians, who assemble files in an SRJ package using their SRJ-root key. Data recipients can access files using an SRJ-access key.

Data Stewards

Create Package

Upload files, define access terms and conditions, notices, and generate SRJ-access keys for recipients.

Get Started

Data Recipients

Access Key

Access files using SRJ-access keys, review metadata, and agree to terms and conditions of use.

Get Started

Data Custodians

Root Key

Fetch SRJ package access history using your SRJ-root key. Delete your data using your SRJ-root key.

Get Started

Highlights

  • SRJ combines multimedia files and documents into one governed file package.
  • SRJ ensures future access, sharing and reuse records are linked to SRJ-root keys.
  • Recipients use an SRJ-access key, accept terms and conditions of use, before unlocking access to files inside an SRJ package.

Capabilites

  1. 1. SRJ packages embed data goverance protocols in file manifests.
  2. 2. SRJ packages generates a file manifest with package ID, access timestamps, and terms and conditions of use.
  3. 3. Recipients unlocks the SRJ package, accepts terms and conditions, and receives copies of original files, embedded with data governace protocols.