CA2867765A1 - A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint - Google Patents

A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint Download PDF

Info

Publication number
CA2867765A1
CA2867765A1 CA2867765A CA2867765A CA2867765A1 CA 2867765 A1 CA2867765 A1 CA 2867765A1 CA 2867765 A CA2867765 A CA 2867765A CA 2867765 A CA2867765 A CA 2867765A CA 2867765 A1 CA2867765 A1 CA 2867765A1
Authority
CA
Canada
Prior art keywords
checkpoint
file
electronic file
information
clearance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA2867765A
Other languages
French (fr)
Inventor
John W. Swabey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA2867765A priority Critical patent/CA2867765A1/en
Publication of CA2867765A1 publication Critical patent/CA2867765A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Treatment And Welfare Office Work (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Infectious diseases commonly have incubation periods. The ability for an individual to demonstrate the absence of both the primary symptoms and disease exposure through a time duration longer than the incubation period prior to (or at) a checkpoint is a social benefit. Disclosed is a method for collecting and making available electronic documentation representing the measurement result(s) over a period of time of key vital signs along with location, time and personal identification at acquisition. The method allows for confidence that the documented information is authentic without the requirement of a trusted third party. The electronic documentation(s) can contain(s) the required information in the regular file contents or in the metadata of the file. The file may contain more information than is required at a given checkpoint and in this instance, a secure method for parsing the file or its metadata partially or to the required information of the checkpoint may be performed.

Description

A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint Infectious diseases commonly have incubation periods. The ability for an individual to demonstrate the absence of both the primary symptoms and disease exposure through a time duration longer than the incubation period prior to (or at) a checkpoint is a social benefit.
Disclosed is a method for collecting and making available electronic documentation representing the measurement result(s) over a period of time of key vital signs along with location, time and personal identification at acquisition. The method allows for confidence that the documented information is authentic without the requirement of a trusted third party.
The electronic documentation(s) can contain(s) the required information in the regular file contents or in the metadata of the file. The file may contain more information than is required at a given checkpoint and in this instance, a secure method for parsing the file or its metadata partially or to the required information of the checkpoint may be performed.
FIELD OF INVENTION
The present invention relates to providing information at a checkpoint and more particularly providing information that does not exist at a trusted third party or the checkpoint.
The information being acceptable for clearance at the checkpoint.
BACKGROUND OF INVENTION AND RELATED ART
Along with many other innovations, the introduction of Bitcoin and its wide adoption has facilitated methods of record keeping, transacting and authenticating that do not require a trusted third party. The benefits and utility of not requiring a trusted third party are numerous.
Privacy legislation exists in most countries. This invention discloses a method for disclosing private time dependent information at a checkpoint.
The following documents define many of the features utilized in this invention.
Global positioning systems and cell phone triangulation methods are well known and referred to hereon as GPS and with regards to a determined location, GPS location.
The applicable art of building blockchains and transacting on a blockchains are known and documented in the following references: Bitcoin: A Peer-to-Peer Electronic Cash System (https://bitcoin.org/bitcoin.pdf), Litecoin (https://github.com/litecoin-project/litecoin).
The application of the art of using the blockchain and the OP_RETURN code is detailed and provided as services at these references: https://bitcoin.org/en/developer-reference#block-chain, http://proof of existence.com/about, http://blockchain.info/.
Secure methods of local and central document storage that provides document access solely to the holder of defined keys that are typically a password, user name and optionally a time dependent password (TOP) are disclosed in US8543836 B2 and its references. These methods do not provide for registration of a hash on a blockchain or presentation of the documentation at a checkpoint.
Methods for collecting and processing data on an individual at a checkpoint that includes user-generated information regarding the security checkpoint is known, CA2859365A1.
There exists a need for an individual to provide information to a checkpoint for clearance where the information is a collection of measurements over time. There also exists a need for an individual to have control over their information.
SUMMARY OF INVENTION
It is the principal objectives of the present invention to provide improved checkpoint utility by providing both new capabilities for checkpoint control and improved privacy for individuals using the checkpoint.
The above objectives, features and advantages of the present invention are basically attained by the method detailed as follows:
An application that generates a electronic document including identifying parameter(s) of an individual such as capturing the individual's image during the measurement of the vital sign readings while recording the GPS location and preferably a time stamp. Taking hashes of the electronic documentation. Adding the hash of the electronic documentation to a blockchain. Making the electronic documentation or some data thereof available for processing, or on agreement retention, at or prior to arrival at a checkpoint.
DETAILED DESCRIPTION
A software or hardware application that generates a electronic document with identifying parameter(s) of an individual such as capturing the individual's image from a cell phone camera during the measurement of the parameters required to determine existence or absence of medical symptoms while recording the GPS location and preferably a time stamp. Taking hashes of the electronic documentation. Adding the hash of the electronic documentation to a blockchain. The addition is preferably close in time to the collection of the measurements. Making the electronic documentation available for processing, or on agreement retention. The electronic documentation or some data thereof may be provided prior to the time of arrival at the Checkpoint. A checkpoint is any location physical or virtual at which an individual makes available electronic documents for the purpose of clearance.
The electronic documentation can be reviewed for absence of negative indicators or presence of positive indicators preferably, and often contractually, with regards to the purpose of the checkpoint. An electronic document is the object on which a hash function is executed to generate the hash of the document over and can include both the content and the metadata of the electronic document. The electronic documentation may be stored as encrypted files. The hash stored on the blockchain may be of the encrypted electronic document.
Authentication criteria may be met by examination of the electronic documentation content and metadata. Proof that the document existed prior to a point can be verified by taking the hash of the document and locating the time at which the block that contains the hash was added to the blockchain.
The hash is preferably stored in a transactions OP_RETURN code.
The information provided is reviewed to determine absence of symptoms during the expected incubation period and can be used cross reference the GPS data which may be present in the electronic documentation or provided by other means to determine possible exposure at known infectious locations.
WITHOUT LIMITATION TO THE INVENTION; EXAMPLES FOR DEMONSTRATION OF THE
INVENTION
For proof and demonstration purposes the data provided in these examples can be cross referenced through https://blockchain.info/, http://www.proofofexistence.com/, http://webbtc.com/
SHA256 can also be calculated by hand or using a program such as FileHash.
Example 1: A file, jws-vitalsNoMeta.JPG, with limited metadata. The file is the output from a Philips VitalSigns software program that includes a snap image of the individual with superimposed vital signs including a colour display slider to indicate if vitals are within a normal range.
The SHA256 hash of the file is provided. The transaction code as stored on the Bitcoin blockchain. The OP_RETURN code from the Bitcoin blockchain which includes the SHA256 hash of the file. The time the request as register at Proof of Existence. The time at which Proof of Existence broadcast the transaction to the Bitcoin network. The time the block which includes the OP_RETURN code as added to the Bitcoin blockchain. The actual time and date of the proof of electronic documents existence can be taken as a confidence interval. The confidence interval can be determined and defined for use by the checkpoint authority, administrator or appropriate entity. The block in which the transaction is coded is a useful reference from which time can be referenced. GPS data is not believed to exist in the electronic documentation listed in this file.
jws-vitalsNoMeta.JPG
5HA256: 197c42f67bdeael0d7268545b36c3e9d564a23ee25eaf48b08a25c0d9f45c928 Transaction: 20bb59a20b2191a2708077e031ea4554386cf1b784e29cb187db89876f747b2e OP_RETURN:
444f4350524f4f46197c42f67bdeae10d7268545b36c3e9d564a23ee25eaf48b08a25c0d9f45c92 (Proof of Existence)Registered in our servers since: 2014-10-13 17:19:54 (Proof of Existence)Transaction broadcast timestamp: 2014-10-13 17:23:43 (Blockchain.info)Received Time: 2014-10-13 17:31:07 Blockchain.info (Blockchain.info)Included in Blocks 325175 (2014-10-13 17:31:07 +0 minutes) Example 2: A file, jws-vitalsMeta.jpg, which includes metadata including the GPS location of the individual at the time the individual's vitals were measured. The file was generated by taking a picture of with iphone 4s of an ipad while the ipad had on its display the result of taking vital signs with the Phillips VitalSigns software. The iphone was using Koredoko 4.4.0 ¨ Exif and GPS Viewer software which records the GPS location and other information as determined by the iphone to the metadata of the file. The metadata of the file can be viewed by using a Exif viewer such as Exif Viewer 2.00 running as a addon in Firefox.

jws-vitalsMeta.jpg SHA256: 0762fd19c397797675675832b18c1b74d2812088fdbc416193ed8dcaf7299d07 Transaction: 82d3015cfc53acdf9255d7a3a0e5fe36b50c4445a8e75c7fe4b4abd54806e8c2 OP_RETURN:
444f4350524f4f460762fdl9c397797675675832b18c1b74d2812088fdbc416193ed8dcaf7299d0 (Proof of Existence)Registered in our servers since: 2014-10-13 17:32:44 (Proof of Existence)Transaction broadcast timestamp: 2014-10-13 17:34:47 (Blockchain.info)Received Time: 2014-10-13 17:41:47 (Blockchain.info)Included in Blocks 325176 (2014-10-13 17:41:47 +0 minutes) Example 3: A file, jws-vitalsHistoryMeta.jpg, which was generated by the same method as in example
2 except the software program on the ipad has been adjusted to include a history of vital sign measurements along with the date, time and how long ago the measurement was taken.
jws-vitalsHistoryMeta.jpg SHA256: 2b84e35b42663e484ad0154ca16602ee5fe48a82f3db35b33edaa54caf3643ab Transaction: d3823b8e13a9becf7fe790c161435b7e143dfl7b74a5454329b083086741dcdd OP_RETURN:
444f4350524f4f462b84e35b42663e484ad0154ca16602ee5fe48a82f3db35b33edaa54caf3643a b (Proof of Existence)Registered in our servers since: 2014-10-13 17:35:50 (Proof of Existence)Transaction broadcast timestamp: 2014-10-13 17:36:49 (Blockchain.info)Received Time: 2014-10-13 17:41:47 (Blockchain.info)Included in Blocks 325176 (2014-10-13 17:41:47 +0 minutes) http://webbtc.com/tx/d3823b8e13a9becf7fe790c161435b7e143df17b74a5454329b0830867 41dcdd EMBODIMENTS OF THE INVENTION IN WHICH AN EXCLUSIVE PROPERTY OR
PRIVILIEGE IS CLAIMED ARE DEFINED AS FOLLOWS:
1. A method composed of the following steps: (1) capturing within an electronic file one or more individuals information which includes vital signs, identification and location. (2) Generating a hash of the electronic file. (3) Committing the hash to a transaction on a blockchain.
(4) Providing the electronic file for the purpose of clearance at a checkpoint.
2. Method of claim 1 where step 1, 2 and 3 are performed multiple times over a period of time less than twice the gestation period of an infectious disease targeted by the checkpoint.
3. A method of claim 1 or 2 where the electronic files contains some or all of the information required for clearance in the metadata of the file.

Claims (9)

EMBODIMENTS OF THE INVENTION IN WHICH AN EXCLUSIVE PROPERTY OR
PRIVILIEGE IS CLAIMED ARE DEFINED AS FOLLOWS:
1. A method composed of the following steps: (1) capturing within an electronic file one or more individuals information which includes vital signs, identification and location. (2) Generating a hash of the electronic file. (3) Committing the hash to a transaction on a blockchain.
(4) Providing the electronic file for the purpose of clearance at a checkpoint.
2. Method of claim 1 where step 1, 2 and 3 are performed multiple times over a period of time less than twice the gestation period of an infectious disease targeted by the checkpoint.
3. A method of claim 1 or 2 where the electronic files contains some or all of the information required for clearance in the metadata of the file.
4. Method of claim 1, 2, or 3 where the data of consideration is not medical data.
5. A method of claim 1,2 ,3 or 4 where the data of consideration is not for the purpose of clearance or admission at a checkpoint.
6. A method of claim 1, 2, 3, 4 or 5 where location data is not provided in a electronic file that was hashed and the hash stored on a blockchain.
7. A method of claim 1, 2, 3, 4, 5 or 6 where one or more of the steps of claim 1 are fully or partially automated and securely abstracted from tampering.
8. A method of claim 1, 2, 3, 4, 5, 6 or 7 where some or all of the software used to execute the steps is open source.
9. A method of claim 1, 2, 3, 4, 5, 6, 7 or 8 where step 4 of claim 1 is (4) Providing the electronic file or a cryptographically provable information reduction of the electronic file for the purpose of clearance at a checkpoint.
4. Method of claim 1, 2, or 3 where the data of consideration is not medical data.
5. A method of claim 1,2 ,3 or 4 where the data of consideration is not for the purpose of clearance or admission at a checkpoint.
6. A method of claim 1, 2, 3, 4 or 5 where location data is not provided in a electronic file that was hashed and the hash stored on a blockchain.
7. A method of claim 1, 2, 3, 4, 5 or 6 where one or more of the steps of claim 1 are fully or partially automated and securely abstracted from tampering.
8. A method of claim 1, 2, 3, 4, 5, 6 or 7 where some or all of the software used to execute the steps is open source.
9. A method of claim 1, 2, 3, 4, 5, 6, 7 or 8 where step 4 of claim 1 is (4) Providing the electronic file or a cryptographically provable information reduction of the electronic file for the purpose of clearance at a checkpoint.
CA2867765A 2014-10-15 2014-10-15 A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint Abandoned CA2867765A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA2867765A CA2867765A1 (en) 2014-10-15 2014-10-15 A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA2867765A CA2867765A1 (en) 2014-10-15 2014-10-15 A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint

Publications (1)

Publication Number Publication Date
CA2867765A1 true CA2867765A1 (en) 2016-04-15

Family

ID=55702205

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2867765A Abandoned CA2867765A1 (en) 2014-10-15 2014-10-15 A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint

Country Status (1)

Country Link
CA (1) CA2867765A1 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100981A (en) * 2016-08-22 2016-11-09 布比(北京)网络技术有限公司 Social network data exchange method and device
CN107610279A (en) * 2017-08-11 2018-01-19 北京云知科技有限公司 A kind of vehicle starting control system, method and Intelligent key
CN107818817A (en) * 2017-01-22 2018-03-20 平安医疗健康管理股份有限公司 The prescription side of continuing method and system based on block chain
CN109065136A (en) * 2018-08-22 2018-12-21 泰康保险集团股份有限公司 Portable medical approaches to IM and device based on block chain
CN110019516A (en) * 2017-11-10 2019-07-16 华为技术有限公司 A kind of approaches to IM, apparatus and system
CN111275857A (en) * 2016-06-21 2020-06-12 创新先进技术有限公司 Control method of intelligent lock and intelligent lock
US11120437B2 (en) 2016-02-23 2021-09-14 nChain Holdings Limited Registry and automated management method for blockchain-enforced smart contracts
US11126976B2 (en) 2016-02-23 2021-09-21 nChain Holdings Limited Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts
US11182782B2 (en) 2016-02-23 2021-11-23 nChain Holdings Limited Tokenisation method and system for implementing exchanges on a blockchain
US11194898B2 (en) 2016-02-23 2021-12-07 nChain Holdings Limited Agent-based turing complete transactions integrating feedback within a blockchain system
US11308486B2 (en) 2016-02-23 2022-04-19 nChain Holdings Limited Method and system for the secure transfer of entities on a blockchain
US11349645B2 (en) 2016-02-23 2022-05-31 Nchain Holdings Ltd. Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
US11356280B2 (en) 2016-02-23 2022-06-07 Nchain Holdings Ltd Personal device security using cryptocurrency wallets
US11373152B2 (en) 2016-02-23 2022-06-28 nChain Holdings Limited Universal tokenisation system for blockchain-based cryptocurrencies
US11410145B2 (en) 2016-02-23 2022-08-09 nChain Holdings Limited Blockchain-implemented method for control and distribution of digital content
US11455378B2 (en) 2016-02-23 2022-09-27 nChain Holdings Limited Method and system for securing computer software using a distributed hash table and a blockchain
US11606219B2 (en) 2016-02-23 2023-03-14 Nchain Licensing Ag System and method for controlling asset-related actions via a block chain
US11621833B2 (en) 2016-02-23 2023-04-04 Nchain Licensing Ag Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
US11625694B2 (en) 2016-02-23 2023-04-11 Nchain Licensing Ag Blockchain-based exchange with tokenisation
US11727501B2 (en) 2016-02-23 2023-08-15 Nchain Licensing Ag Cryptographic method and system for secure extraction of data from a blockchain
US12032677B2 (en) 2016-02-23 2024-07-09 Nchain Licensing Ag Agent-based turing complete transactions integrating feedback within a blockchain system

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11621833B2 (en) 2016-02-23 2023-04-04 Nchain Licensing Ag Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
US11606219B2 (en) 2016-02-23 2023-03-14 Nchain Licensing Ag System and method for controlling asset-related actions via a block chain
US11308486B2 (en) 2016-02-23 2022-04-19 nChain Holdings Limited Method and system for the secure transfer of entities on a blockchain
US11972422B2 (en) 2016-02-23 2024-04-30 Nchain Licensing Ag Registry and automated management method for blockchain-enforced smart contracts
US11349645B2 (en) 2016-02-23 2022-05-31 Nchain Holdings Ltd. Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
US11755718B2 (en) 2016-02-23 2023-09-12 Nchain Licensing Ag Blockchain implemented counting system and method for use in secure voting and distribution
US11727501B2 (en) 2016-02-23 2023-08-15 Nchain Licensing Ag Cryptographic method and system for secure extraction of data from a blockchain
US11625694B2 (en) 2016-02-23 2023-04-11 Nchain Licensing Ag Blockchain-based exchange with tokenisation
US11120437B2 (en) 2016-02-23 2021-09-14 nChain Holdings Limited Registry and automated management method for blockchain-enforced smart contracts
US11126976B2 (en) 2016-02-23 2021-09-21 nChain Holdings Limited Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts
US11182782B2 (en) 2016-02-23 2021-11-23 nChain Holdings Limited Tokenisation method and system for implementing exchanges on a blockchain
US11194898B2 (en) 2016-02-23 2021-12-07 nChain Holdings Limited Agent-based turing complete transactions integrating feedback within a blockchain system
US12032677B2 (en) 2016-02-23 2024-07-09 Nchain Licensing Ag Agent-based turing complete transactions integrating feedback within a blockchain system
US11936774B2 (en) 2016-02-23 2024-03-19 Nchain Licensing Ag Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
US11455378B2 (en) 2016-02-23 2022-09-27 nChain Holdings Limited Method and system for securing computer software using a distributed hash table and a blockchain
US11356280B2 (en) 2016-02-23 2022-06-07 Nchain Holdings Ltd Personal device security using cryptocurrency wallets
US11373152B2 (en) 2016-02-23 2022-06-28 nChain Holdings Limited Universal tokenisation system for blockchain-based cryptocurrencies
US11410145B2 (en) 2016-02-23 2022-08-09 nChain Holdings Limited Blockchain-implemented method for control and distribution of digital content
US11347838B2 (en) 2016-02-23 2022-05-31 Nchain Holdings Ltd. Blockchain implemented counting system and method for use in secure voting and distribution
CN111275857A (en) * 2016-06-21 2020-06-12 创新先进技术有限公司 Control method of intelligent lock and intelligent lock
CN106100981A (en) * 2016-08-22 2016-11-09 布比(北京)网络技术有限公司 Social network data exchange method and device
CN107818817A (en) * 2017-01-22 2018-03-20 平安医疗健康管理股份有限公司 The prescription side of continuing method and system based on block chain
CN107610279A (en) * 2017-08-11 2018-01-19 北京云知科技有限公司 A kind of vehicle starting control system, method and Intelligent key
CN107610279B (en) * 2017-08-11 2020-05-05 北京云知科技有限公司 Vehicle starting control system and method and intelligent key
US11610019B2 (en) 2017-11-10 2023-03-21 Huawei Technologies Co., Ltd. Information management method, apparatus, and information management system
CN110019516B (en) * 2017-11-10 2021-08-20 华为技术有限公司 Information management method, device and system
CN110019516A (en) * 2017-11-10 2019-07-16 华为技术有限公司 A kind of approaches to IM, apparatus and system
CN109065136A (en) * 2018-08-22 2018-12-21 泰康保险集团股份有限公司 Portable medical approaches to IM and device based on block chain

Similar Documents

Publication Publication Date Title
CA2867765A1 (en) A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint
US10607726B2 (en) System for anonymizing and aggregating protected health information
US10200198B2 (en) Making cryptographic claims about stored data using an anchoring system
US8190903B2 (en) Method and apparatus for verifying authenticity of digital data using trusted computing
EP3096258A1 (en) System for anonymizing and aggregating protected information
Angelopoulos et al. DHP Framework: Digital Health Passports Using Blockchain--Use case on international tourism during the COVID-19 pandemic
EP4221074A1 (en) Controlled cryptographic private key release
AU2017350176A1 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
US9805216B2 (en) Privacy compliance event analysis system
CN109241352A (en) The acquisition methods and server of Profile information
WO2020087877A1 (en) Privacy information tracing and evidence collection method, apparatus, and system
JP2019509571A5 (en)
AU2018100478A4 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
Luo et al. A data hiding approach for sensitive smartphone data
Benil et al. Blockchain based secure medical data outsourcing with data deduplication in cloud environment
US8984288B1 (en) Electronic signing of content
CN109246376B (en) Anti-counterfeiting electronic signature method and electronic signature device thereof
JP2007043321A (en) Authenticity verification method and system of electronic document
Shahaab et al. Managing gender change information on immutable blockchain in context of GDPR
KR102530982B1 (en) Providing method, apparatus and computer-readable medium of sign and management of labor contracts using kiosks
JP2012531641A5 (en)
TW201626284A (en) Process security and storage protection method of privacy data and the system thereof
Wen et al. Blockchain-empowered contact tracing for COVID-19 using crypto-spatiotemporal information
CN102509041A (en) Content filing system and method used for registering digital content work copyright
Saito et al. Privacy-Preserving infection exposure notification without trust in third parties

Legal Events

Date Code Title Description
FZDE Dead

Effective date: 20201015