Patent classifications
H04L2209/88
Establishing an AD-HOC secure connection between two electronic computing devices using a self-expiring locally transmitted information packet
Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.
Data analysis method and data analysis system
According to a data analysis method by which time required for data analysis is shortened and practicality is improved, a client terminal requests institution terminals to perform analysis of a matching attribute; each of the institution terminals encrypts an element belonging to the matching attribute within a database and sends the converted data to an outsource terminal; the outsource terminal integrates the plurality of converted data sent from the institution terminals and sends the integrated converted data to the institution terminals; and each of the institution terminals compares each matching attribute of a plurality of the elements within the database of the institution terminal against the integrated converted data, thereby identifying, as a common element, an element associated with the matching attribute and held in common by the institution terminals.
System and method which using blockchain protects the privacy of access code and the identity of an individual seeking online access
This invention relates to personal identity management and verifiable and authenticable methods and systems for mobile personal credentials. A critical problem is knowing the true identity of counterparties while using electronic messaging or conducting online transactions. Existing security measures can be bypassed when identity is presented in electronic form. The inventors address these issues by providing digital ID document in conjunction with data that permits the other party to verify ID. Further, the inventors either link the electronic ID to its physical counterpart or to the actual physical individual presenting the ID. Immutable digital ledger technology, such as blockchain, is used to provide trustworthy authentication of digital identity along with assurance that the identity presented belongs to the individual presenting it.
Apparatus, systems and methods for storing user profile data on a distributed database for anonymous verification
In some embodiments, a method can include retrieving, from a data management server, a public key associated with a relying party. The method can further include encrypting and using the public key, a user profile data to define encrypted user profile data. The method can further include transmitting, via the data management server, the encrypted user profile data to a compute device associated with the relying party that (1) decrypts the encrypted user profile data using a private key corresponding to the public key to define decrypted user profile data, (2) generates a hash value of the decrypted user profile data, and (3) compares the hash value of the decrypted user profile data and a hash value of the user profile data stored in a distributed database to determine integrity of the decrypted user profile data.
Systems and methods for tracking patient events
A system for tracking adverse events may include at least one processing device programmed to receive a request from a user to record an adverse event experienced by a patient; receive a search term input by the user; identify, in an adverse event database and based on the search term, at least one database record for an adverse event, wherein the at least one database record includes an adverse event type and at least one characteristic; receive, via an input field, a rating of the at least one characteristic for the patient; generate an adverse event record based on the adverse event type and the rating; and store the adverse event record in an adverse event log.
DATA AUTHORIZATION BASED ON DECENTRALIZED IDENTIFIERS
Disclosed herein are methods, systems, and apparatus for controlling authorization of access to user data. One of the methods includes generating a first decentralized identifier based on information about a second decentralized identifier and information about a third decentralized identifier; registering a first set of records and the first decentralized identifier at a second blockchain, the second blockchain includes one or more blockchain contracts configured to, upon execution, perform one or more operations associated with the first decentralized identifier, and registering the first set of records includes storing a hash value for each record in the first set of records in the second blockchain; and controlling authorization of access to the first set of records based on the first decentralized identifier, including in response to receiving a request to grant a second user access to a particular record in the first set of records, determining whether the request includes the first decentralized identifier.
Multimodal cryptographic data communications in a remote patient monitoring environment
A system provides cryptographic means for securing the transmission of health data from devices of varying processing power and over various network protocols. The system is configured to transmit and receive packets to and from a remote patient monitoring device over multiple types of communication sessions. The system authenticates at least some of the data packet payloads and headers using multiple message authentication codes. The system can, for one type of communication session, the simulate or intercept acknowledgement packets generated for use with another type of communication session.
System and method for rewarding healthy behaviors and exchanging health related data
The disclosed systems and methods improve on the current landscape surrounding rewards for healthy behaviors, creates a social community around various stakeholders in the healthcare system and implements discussions around preventative medicine and healthy lifestyles. Using either a traditional network or decentralized architecture, the present system creates a community around all stakeholders and facilitates recommendations and rewards in exchange for targeted lifestyle changes, such as modifications to diet, exercise, nutrition, lifestyle, psychology, rest management, hydration, and the inclusion of vitamins and supplements. The present invention further incorporates a third party marketplace that provides incentives to patient communities for accessing information and taking active steps towards living a healthier life.
Systems and methods for dynamic travel planning
A system including one or more memory devices having instructions stored thereon, that, when executed by one or more processors, cause the one or more processors to receive travel data associated with a travel plan of a user indicating one or more travel destinations. The instructions cause the one or more processors to receive destination risk data indicating a destination risk of the one or more travel destinations associated with transmission of an infectious disease, receive personal risk data indicating a risk of the user associated with the infectious disease, and generate an infection travel risk score for the user based on the destination risk data and the personal risk data.
SYSTEM AND METHOD FOR BLOCKCHAIN BASED DIGITAL THERAPEUTIC DEVICES TO PREDICT FOOD-DRUG CONSTITUENT INTERACTION
A system for blockchain based digital therapeutic devices to predict food-drug constituent interaction. This uses a set of Algorithms to collect, process, cluster, structure and analyze User input data, and a set of Algorithms to collect, process, cluster, structure and analyze Scientific Modules of Drug, Food data and associated literature. There is a also a set of Algorithms to establish credible correlation and relationship between input data sources by various advanced machines learning models to fetch the required outputs by processing, analyzing and structuring input data. A set of Algorithms is used to interact the user data with Drug-Food Scientific modules and Literature. Machine learning models to predict Drug-Food Interactions and learn user preferences and habits.