H04L2209/88

System and method of providing a secure inter-domain data management using blockchain technology
11144657 · 2021-10-12 · ·

A system and method of providing a secure inter-domain data management platform based on blockchain technology allows a user to access files of one or more organizations based on the credentials of the user. The system includes at least one remote server and a network of computing nodes. The remote server is used to manage at least one group. The at least one group may be one or more intelligence or government organizations. The at least one group includes a plurality of member accounts. Each member account includes a member access level. The network of computing nodes is used to manage a blockchain system and to store a plurality of files. Each file includes a file access level. A user with a member account can access a file in accordance to the member access level of the member account and the file access level of the file.

Face reattachment to brain imaging data

A cloud computing system is described that communicates with a virtual machine to reattach the face of a patient to brain imaging data before the brain imaging data is transmitted for display on a brain navigation system.

METHODS AND SYSTEMS FOR CRYPTOGRAPHICALLY SECURED DECENTRALIZED TESTING

A method of cryptographically secured decentralized testing includes receiving, by a computing device and from a secure test apparatus, an output of a cryptographic function of a secret test result identifier, authenticating the output, and recording, in a data repository, an indication of a test result as a function of the output.

SYSTEMS AND METHODS FOR ACCELERATED EPIDEMIC RECOVERY

A method comprising receiving, from a user device, a user identifier, the user identifier being associated with a user of the user device, confirming that the user's identity has been confirmed, retrieving, from a remote health record maintained by a third-party health service provider, health information regarding a virus-related test provided on the user, providing a virus-related test status based on the virus-related test results to the user device, receiving an invalidity indication from the third-party health-related entity, the invalidity indication indicating that a particular test is no longer considered valid, reviewing a record of the user to confirm if the user received the particular test, determining that the virus-related test is no longer valid based on the invalidity indication, providing a notice to the user device that the virus-related test status is no longer considered to be valid, and providing an update to the virus-related test status.

METHODS AND SYSTEMS FOR A SYNCHRONIZED DISTRIBUTED DATA STRUCTURE FOR FEDERATED MACHINE LEARNING

A system for an artificial intelligence synchronized distributed ledger. The system includes a computing device containing a receiving module, the receiving module designed and configured to receive an input from a remote device, parse the input to identify protected and non-protected data contained within the input, transform the protected data into a digitally signed assertion and convert the non-protected into an encrypted datastore. The computing device containing a processing module, the processing module designed and configured to receive the digitally signed assertion from the receiving module, insert the digitally signed assertion into an immutable sequential data structure, receive the encrypted datastore, retrieve at least an input, generate a record utilizing the at least a retrieved input, and perform a first machine-learning process utilizing the at least a retrieved input.

Secure Machine Learning Analytics Using Homomorphic Encryption
20210409191 · 2021-12-30 ·

Provided are methods and systems for performing a secure machine learning analysis over an instance of data. An example method includes acquiring, by a client, a homomorphic encryption scheme, and at least one machine learning model data structure. The method further includes generating, using the encryption scheme, at least one homomorphically encrypted data structure, and sending the encrypted data structure to at least one server. The method includes executing a machine learning model, by the at least one server based on the encrypted data structure to obtain an encrypted result. The method further includes sending, by the server, the encrypted result to the client where the encrypted result is decrypted. The machine learning model includes neural networks and decision trees.

SYSTEMS AND METHODS FOR MANAGING A TRUSTED SERVICE PROVIDER NETWORK

A system including one or more memory devices having instructions thereon, that, when executed by one or more processors, cause the one or more processors to receive a request from a service provider to be added to a trusted network of service providers, receive health safety data of a health data stream associated with the service provider and risk data of a risk data stream indicating risk levels associated with the service provider, determine that the service provider meets a level of heath safety by correlating the health safety data of the health data stream with the risk data of the risk data stream, receive a request from a device for a service provider recommendation of the trusted network of service providers, and provide an indication of the service provider to the device in response to a reception of the request for the service provider recommendation.

Systems, devices, and methods for encrypting genetic information

Systems, devices, and methods for encrypting genetic information are provided herein. Also provided herein are systems, devices, and methods for encrypting compressed genetic data, transmitting encrypted compressed genetic data, and receiving, storing, accessing encrypted compressed genetic data. In some cases, a user interface is in communication with a system or device provided herein.

Systems and methods providing centralized encryption key management for sharing data across diverse entities
11127491 · 2021-09-21 · ·

A method and apparatus provide centralized encryption key management for sharing data across diverse entities. In particular, the present invention relates to a universal and regulatory compliant system and method for sharing personal data records across diverse entities while maintaining unique identifiers at each entity for protecting the identity of any particular person. The present invention enables multiple organizations to be able to share their respective disparate data in a manner in which the disparate personal data records can be aggregated and manipulated by a single entity without putting the personal data records at risk.

Method For Providing An Authenticated Digital Identity
20210286868 · 2021-09-16 ·

A method for verifying and validating identifiable attributes of a user includes electronically receiving the attributes of a user and verifying their authenticity. The attributes are also validated by confirming each matches a corresponding evidenced based attribute. An internal identifier is assigned to each of the validated attributes and an external identifier is assigned to those attributes that were not validated. Access to the identifiable attributes having an internal identifier is only permitted by the user or a designee of the user. A level of confidence is established from a ranking of the attributes where the attributes having the internal identifiers provide a greater level of confidence than the attributes having the external identifiers. An authenticated digital identity is then formed from the identifiable attributes, and a level of confidence for the authenticated digital identity is established from the ranking.