G16B50/40

Systems and methods for crowdsourcing, analyzing, and/or matching personal data

Described herein are a secure system for sharing private data and related systems and methods for incentivizing and validating private data sharing. In some embodiments, private data providers may register to selectively share private data under controlled sharing conditions. The private data may be cryptographically secured using encryption information corresponding to one or more secure execution environments. To demonstrate to the private data providers that the secure execution environment is secure and trustworthy, attestations demonstrating the security of the secure execution environment may be stored in a distributed ledger (e.g., a public blockchain). Private data users that want access to shared private data may publish applications for operating on the private data to a secure execution environment and publish, in a distributed ledger, an indication that the application is available to receive private data. The distributed ledger may also store sharing conditions under which the private data will be shared.

Systems and methods for crowdsourcing, analyzing, and/or matching personal data

Described herein are a secure system for sharing private data and related systems and methods for incentivizing and validating private data sharing. In some embodiments, private data providers may register to selectively share private data under controlled sharing conditions. The private data may be cryptographically secured using encryption information corresponding to one or more secure execution environments. To demonstrate to the private data providers that the secure execution environment is secure and trustworthy, attestations demonstrating the security of the secure execution environment may be stored in a distributed ledger (e.g., a public blockchain). Private data users that want access to shared private data may publish applications for operating on the private data to a secure execution environment and publish, in a distributed ledger, an indication that the application is available to receive private data. The distributed ledger may also store sharing conditions under which the private data will be shared.

BLOCK CHAIN-BASED HEALTH DATA MANAGEMENT SYSTEM AND DRIVING METHOD OF SAME
20220366442 · 2022-11-17 ·

The present invention relates to a driving method of a block chain-based health data management system. When personal health data such as health examination or prescription data and the like is uploaded, a genome portal: stores the personal health data as metadata together with genetic information; provides the personal health data so that a demand agency requiring the personal health data can use Zerocoin to purchase or read the personal health data through the genome portal; provides rewards in the form of mileage to individuals who share the data in the genome portal; ranks the individuals by the number of times the individuals have shared the data; automatically presents various personalized health solutions in the portal through AI according to the shared data; provides a rapidly growing personal genome prediction/diagnosis service through a portal system by using a blockchain-based MS decentralized identity (DID) in order to enhance the security of the email addresses and IDs of users; and ascribes value to personal health big data, such as genome data, medical diagnosis information, or social data, and so as to reduce the costs of personal genetic testing and diagnosis.

ANTI-COUNTERFEIT TAGS USING BASE RATIOS OF POLYNUCLEOTIDES
20230101083 · 2023-03-30 ·

Multiple polynucleotides with random sequences are collectively used as a molecular anti-counterfeiting tag. The polynucleotides are placed on an item as a molecular identifier of authenticity. Each position within the random sequences is synthesized using a predetermined ratio of nucleoside bases. With this technique the sequence of each polynucleotide is random but the ratio of nucleoside bases over the collection of synthetic polynucleotides is not. Verification of authenticity is achieved by sequencing a portion of the polynucleotides collected from the item and calculating the ratio of nucleoside bases at each position. If these ratios are the same or similar to the ratios used for synthesizing the polynucleotides, then the item is identified as authentic. The ratios of nucleoside bases and a description of the item may be stored in an electronic record that is used for validating authenticity of the item.

ANTI-COUNTERFEIT TAGS USING BASE RATIOS OF POLYNUCLEOTIDES
20230101083 · 2023-03-30 ·

Multiple polynucleotides with random sequences are collectively used as a molecular anti-counterfeiting tag. The polynucleotides are placed on an item as a molecular identifier of authenticity. Each position within the random sequences is synthesized using a predetermined ratio of nucleoside bases. With this technique the sequence of each polynucleotide is random but the ratio of nucleoside bases over the collection of synthetic polynucleotides is not. Verification of authenticity is achieved by sequencing a portion of the polynucleotides collected from the item and calculating the ratio of nucleoside bases at each position. If these ratios are the same or similar to the ratios used for synthesizing the polynucleotides, then the item is identified as authentic. The ratios of nucleoside bases and a description of the item may be stored in an electronic record that is used for validating authenticity of the item.

Source authentication of website content
11489830 · 2022-11-01 · ·

Embodiments for authenticating a source of website content utilizing computer-generated or anonymized digital deoxyribonucleic acid (DNA) sequences include: receiving a request for a security sequence from a user device during a browser session; sending a first-generation digital DNA sequence (F1) to the device, wherein the F1 is generated from first and second DNA sequences (P1) and (P2) associated with a website; receiving a request for a second security sequence; generating a second-generation DNA sequence (F2) based on the F1 and the P1, wherein the F2 includes at least one genetic marker of the F1 and/or the P1; sending the F2 to the user device; receiving a request for security confirmation from the device; determining whether the F2 is a child DNA sequence of the F1 and/or the P1 utilizing Marker Assisted Selection techniques; and sending a response to the device indicating whether website content originates from the website.

Source authentication of website content
11489830 · 2022-11-01 · ·

Embodiments for authenticating a source of website content utilizing computer-generated or anonymized digital deoxyribonucleic acid (DNA) sequences include: receiving a request for a security sequence from a user device during a browser session; sending a first-generation digital DNA sequence (F1) to the device, wherein the F1 is generated from first and second DNA sequences (P1) and (P2) associated with a website; receiving a request for a second security sequence; generating a second-generation DNA sequence (F2) based on the F1 and the P1, wherein the F2 includes at least one genetic marker of the F1 and/or the P1; sending the F2 to the user device; receiving a request for security confirmation from the device; determining whether the F2 is a child DNA sequence of the F1 and/or the P1 utilizing Marker Assisted Selection techniques; and sending a response to the device indicating whether website content originates from the website.

Systems and methods for protecting and governing genomic and other information

Trusted, privacy-protected systems and methods are disclosed for processing, handling, and performing tests on human genomic and other information. According to some embodiments, a system is disclosed that is a cloud-based system for the trusted storage and analysis of genetic and other information. Some embodiments of the system may include or support some or all of authenticated and certified data sources; authenticated and certified diagnostic tests; and policy-based access to data.

Systems and methods for protecting and governing genomic and other information

Trusted, privacy-protected systems and methods are disclosed for processing, handling, and performing tests on human genomic and other information. According to some embodiments, a system is disclosed that is a cloud-based system for the trusted storage and analysis of genetic and other information. Some embodiments of the system may include or support some or all of authenticated and certified data sources; authenticated and certified diagnostic tests; and policy-based access to data.

Encoding data from genetic traits relevant to illness diagnosis and heritage

Methods and systems are disclosed for encoding and decoding data from genetic traits. In one embodiment, the invention provides a method of encoding data from genetic traits. The method comprises encoding genetic traits information, including using quantum dot wavelengths to identify distinct genetic traits, and using numbers of the quantum dots to represent probabilities associated with the traits. In an embodiment, the invention provides a genetic characteristics decoding system for decoding genetic information encoded using quantum dots in a carrier. The decoding system comprises a light source for charging the quantum dots in the carrier; a scanner for scanning the carrier to retrieve information from the charged quantum dots; and a processing system for processing the retrieved information to determine quantum dot wavelengths to identify distinct genetic traits, and to determine numbers of the quantum dots to identify probabilities associated with the genetic traits.