H04L2209/88

HIGHLY SECURE NETWORKED SYSTEM AND METHODS FOR STORAGE, PROCESSING, AND TRANSMISSION OF SENSITIVE PERSONAL INFORMATION
20200349290 · 2020-11-05 · ·

A highly secure networked system and methods for storage, processing, and transmission of sensitive information are described. Sensitive, e.g. personal/private, information is cleansed, salted, and hashed by data contributor computing environments. Cleansing, salting, and hashing by multiple data contributor computing environments occurs using the same processes to ensure output hashed values are consistent across multiple sources. The hashed sensitive information is hashed a second time by a secure facility computing environment. The second hashing of the data involves a private salt inaccessible to third parties. The second hashed data is linked to previously hashed data (when possible) and assigned a unique ID. Data dictionaries are created for particular individuals provided access to the highly secure information, e.g. researchers. Prior to a data dictionary being accessible by a researcher computing device, the data dictionary undergoes compliance and statistical analyses regarding potential re-identification of the source unhashed data. The data dictionaries are viewable by researchers as certified views via a secure VPN.

DISPOSABLE STICKER WITHIN AUGMENTED REALITY ENVIRONMENT

A sticker system includes at least a head-mounted device and a sticker. In an embodiment, the sticker system receives an image of the sticker captured by an imaging sensor. The sticker system determines registration information by processing a fiducial marker of the sticker shown in the image. The sticker system determines location information of the HMD. Additionally, the sticker system determines a position of the sticker relative to the HMD using the registration information and the location information. The sticker system provides a (e.g., augmented reality) graphic to the HMD for presentation to the user based on the position of the sticker.

RESEARCH DATABASE
20200342965 · 2020-10-29 ·

A biobank and database system for storage of and interactions with biological samples in vitro is disclosed. The system comprises incubators for living tissue, and a number of biological samples where each biological sample is either an organoid or a sample containing live tissue, supported by or containing cellulose derived from tunicates. The system further comprises means for monitoring and manipulating each biological sample, a chronologic ledger with automatic registration of all relevant data pertaining to provenance and pre-history of each biological sample as well as information on all manipulations performed on each biological sample and results obtained. The system further comprises one or more nodes arranged to communicate with the incubators, and control access to the chronologic ledger and to the biological samples in the incubators. The chronologic ledger may be structured as a blockchain.

COGNITIVE ITEM SELECTION WITH DATA MINING

Methods, computer program products, and systems are presented. The methods include, for instance: ascertaining a user state of a user based on user state data for a cognitive menu selection service from an eatery by use of an electronic menu system. Selection criteria to request one or more items from menus of the eatery is determined based on the user state. A request including the selection criteria is sent and the one or more items corresponding to the selection criteria is obtained and presented to the user by use of a customized virtual reality interface on a personal device of the user.

Product Tracking System and Method
20200344046 · 2020-10-29 ·

A product tracking and authentication method and system using the cryptographic security of the blockchain, smart contracts, and information sent from scanned encrypted QR codes assigned to the product. Each product is registered and labeled with a unique QR code created by the HazeChain server. A private key and a public key are generated for each product. The QR code is embedded with a public key specific to a product. When the product moves in a supply chain it is scanned by various actors. The scanned data and the time, date and location data are sent to the server automatically and verified. The scanned data is added to an Ethereum smart contract and added to the blockchain for permanent immutable storage. Product seller and customers are now guaranteed to be presented with date that matches the exact product in their hand.

Technique to ensure security for connected implantable medical devices

An implantable medical device (IMD) includes communication circuitry that enables the IMD to communicate via a network such as the Internet. A security routine is executed on the IMD to determine whether the IMD is capable over communicating via the network. If so, the IMD requests an identifier of current firmware stored on a server that is connected to the communication network. The identifier of the current firmware is compared to an identifier of firmware that is installed on the IMD. If the installed firmware is the same as the current firmware on the server, a timer is reset, but if the installed firmware cannot be verified as matching the current firmware on the server (e.g., because the IMD is not capable of communicating via the network), the timer continues to run. When the timer expires, the IMD is prevented from communicating via the network until further action is taken.

MULTIVARIATE ENCRYPTION SYSTEMS AND METHODS
20200336307 · 2020-10-22 ·

Multivariate encryption systems and methods are provided herein. An example method includes receiving a multivariate input set that includes a plurality of sensitive data objects arranged according to a record template, encrypting the multivariate input set into an encrypted representation, receiving a request for at least a portion of the plurality of sensitive data objects, extracting the at least a portion of the plurality of sensitive data object from the encrypted representation and generating a response message that includes only the at least a portion of the plurality of sensitive data objects that were extracted from the encrypted representation.

ELECTRONIC DEVICE AND METHOD FOR SHARING MEDICAL INFORMATION BY ELECTRONIC DEVICE
20200329017 · 2020-10-15 ·

An electronic device for sharing medical information, and a method therefor are provided. The electronic device includes a communication circuit, a memory configured to store instructions, and at least one processor, wherein the instructions are configured, when executed, to cause at least one processor to, obtain first medical information, encrypt the first medical information, obtain information of at least one recipient allowed to receive the encrypted first medical information, transmit, to an external electronic device, the encrypted first medical information and information of the at least one recipient using the communication circuit, obtain, from the external electronic device, access information for accessing the encrypted first medical information, and provide the obtained access information to the at least one recipient.

SYSTEMS, APPARATUSES, AND METHODS FOR ASSESSING, MANAGING, PRESENTING AND INDICATING HEALTH STATUS THROUGH PHYSICAL OBJECTS
20200327990 · 2020-10-15 ·

Apparatuses and methods for physically holding, presenting, verifying, exchanging and/or displaying the health status of an individual which may include a human interface to physically present and/or display the value of at least one set of health metrics the apparatuses represent. The apparatuses may include a set of logical circuits coupled with a specialized memory to temporary or permanently store the health metrics and/or health data information and determine the display variation of their the wearer's health status on the human interface based on the health metric type and value. The apparatuses may also include a set of connectors to access the sources of the health metrics and update the health index value the apparatuses represent. The apparatuses may also include a power source to power and enable the capabilities mentioned above.

PARTIALLY PRIVATE AND VERIFIABLE DATA EXCHANGE

A transactional medical data exchange provides a combination of public and private communication channels through which parties to a transaction, such as a medical care provider and a health insurance provider, may exchange information. When such an exchange is needed, the parties create records on the public communication channel that serve as a publicly viewable record that communication has begun. Information from these public records are used to share messages, along with messages, files, and other information related to care, via a private communication channel. Each private communication is sent and stored with unique authenticating data to form a chain of verifiable transactions. When communication is done, each party creates records on the public communication that request and acknowledge that communication is now complete and provide publicly viewable information that can be used to verify and authenticate each private message by itself, or in combination with others.