CA2867765A1 - A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint - Google Patents
A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint Download PDFInfo
- Publication number
- CA2867765A1 CA2867765A1 CA2867765A CA2867765A CA2867765A1 CA 2867765 A1 CA2867765 A1 CA 2867765A1 CA 2867765 A CA2867765 A CA 2867765A CA 2867765 A CA2867765 A CA 2867765A CA 2867765 A1 CA2867765 A1 CA 2867765A1
- Authority
- CA
- Canada
- Prior art keywords
- checkpoint
- file
- electronic file
- information
- clearance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Infectious diseases commonly have incubation periods. The ability for an individual to demonstrate the absence of both the primary symptoms and disease exposure through a time duration longer than the incubation period prior to (or at) a checkpoint is a social benefit. Disclosed is a method for collecting and making available electronic documentation representing the measurement result(s) over a period of time of key vital signs along with location, time and personal identification at acquisition. The method allows for confidence that the documented information is authentic without the requirement of a trusted third party. The electronic documentation(s) can contain(s) the required information in the regular file contents or in the metadata of the file. The file may contain more information than is required at a given checkpoint and in this instance, a secure method for parsing the file or its metadata partially or to the required information of the checkpoint may be performed.
Description
A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint Infectious diseases commonly have incubation periods. The ability for an individual to demonstrate the absence of both the primary symptoms and disease exposure through a time duration longer than the incubation period prior to (or at) a checkpoint is a social benefit.
Disclosed is a method for collecting and making available electronic documentation representing the measurement result(s) over a period of time of key vital signs along with location, time and personal identification at acquisition. The method allows for confidence that the documented information is authentic without the requirement of a trusted third party.
The electronic documentation(s) can contain(s) the required information in the regular file contents or in the metadata of the file. The file may contain more information than is required at a given checkpoint and in this instance, a secure method for parsing the file or its metadata partially or to the required information of the checkpoint may be performed.
FIELD OF INVENTION
The present invention relates to providing information at a checkpoint and more particularly providing information that does not exist at a trusted third party or the checkpoint.
The information being acceptable for clearance at the checkpoint.
BACKGROUND OF INVENTION AND RELATED ART
Along with many other innovations, the introduction of Bitcoin and its wide adoption has facilitated methods of record keeping, transacting and authenticating that do not require a trusted third party. The benefits and utility of not requiring a trusted third party are numerous.
Privacy legislation exists in most countries. This invention discloses a method for disclosing private time dependent information at a checkpoint.
The following documents define many of the features utilized in this invention.
Global positioning systems and cell phone triangulation methods are well known and referred to hereon as GPS and with regards to a determined location, GPS location.
The applicable art of building blockchains and transacting on a blockchains are known and documented in the following references: Bitcoin: A Peer-to-Peer Electronic Cash System (https://bitcoin.org/bitcoin.pdf), Litecoin (https://github.com/litecoin-project/litecoin).
The application of the art of using the blockchain and the OP_RETURN code is detailed and provided as services at these references: https://bitcoin.org/en/developer-reference#block-chain, http://proof of existence.com/about, http://blockchain.info/.
Secure methods of local and central document storage that provides document access solely to the holder of defined keys that are typically a password, user name and optionally a time dependent password (TOP) are disclosed in US8543836 B2 and its references. These methods do not provide for registration of a hash on a blockchain or presentation of the documentation at a checkpoint.
Methods for collecting and processing data on an individual at a checkpoint that includes user-generated information regarding the security checkpoint is known, CA2859365A1.
There exists a need for an individual to provide information to a checkpoint for clearance where the information is a collection of measurements over time. There also exists a need for an individual to have control over their information.
SUMMARY OF INVENTION
It is the principal objectives of the present invention to provide improved checkpoint utility by providing both new capabilities for checkpoint control and improved privacy for individuals using the checkpoint.
The above objectives, features and advantages of the present invention are basically attained by the method detailed as follows:
An application that generates a electronic document including identifying parameter(s) of an individual such as capturing the individual's image during the measurement of the vital sign readings while recording the GPS location and preferably a time stamp. Taking hashes of the electronic documentation. Adding the hash of the electronic documentation to a blockchain. Making the electronic documentation or some data thereof available for processing, or on agreement retention, at or prior to arrival at a checkpoint.
DETAILED DESCRIPTION
A software or hardware application that generates a electronic document with identifying parameter(s) of an individual such as capturing the individual's image from a cell phone camera during the measurement of the parameters required to determine existence or absence of medical symptoms while recording the GPS location and preferably a time stamp. Taking hashes of the electronic documentation. Adding the hash of the electronic documentation to a blockchain. The addition is preferably close in time to the collection of the measurements. Making the electronic documentation available for processing, or on agreement retention. The electronic documentation or some data thereof may be provided prior to the time of arrival at the Checkpoint. A checkpoint is any location physical or virtual at which an individual makes available electronic documents for the purpose of clearance.
The electronic documentation can be reviewed for absence of negative indicators or presence of positive indicators preferably, and often contractually, with regards to the purpose of the checkpoint. An electronic document is the object on which a hash function is executed to generate the hash of the document over and can include both the content and the metadata of the electronic document. The electronic documentation may be stored as encrypted files. The hash stored on the blockchain may be of the encrypted electronic document.
Authentication criteria may be met by examination of the electronic documentation content and metadata. Proof that the document existed prior to a point can be verified by taking the hash of the document and locating the time at which the block that contains the hash was added to the blockchain.
The hash is preferably stored in a transactions OP_RETURN code.
The information provided is reviewed to determine absence of symptoms during the expected incubation period and can be used cross reference the GPS data which may be present in the electronic documentation or provided by other means to determine possible exposure at known infectious locations.
WITHOUT LIMITATION TO THE INVENTION; EXAMPLES FOR DEMONSTRATION OF THE
INVENTION
For proof and demonstration purposes the data provided in these examples can be cross referenced through https://blockchain.info/, http://www.proofofexistence.com/, http://webbtc.com/
SHA256 can also be calculated by hand or using a program such as FileHash.
Example 1: A file, jws-vitalsNoMeta.JPG, with limited metadata. The file is the output from a Philips VitalSigns software program that includes a snap image of the individual with superimposed vital signs including a colour display slider to indicate if vitals are within a normal range.
The SHA256 hash of the file is provided. The transaction code as stored on the Bitcoin blockchain. The OP_RETURN code from the Bitcoin blockchain which includes the SHA256 hash of the file. The time the request as register at Proof of Existence. The time at which Proof of Existence broadcast the transaction to the Bitcoin network. The time the block which includes the OP_RETURN code as added to the Bitcoin blockchain. The actual time and date of the proof of electronic documents existence can be taken as a confidence interval. The confidence interval can be determined and defined for use by the checkpoint authority, administrator or appropriate entity. The block in which the transaction is coded is a useful reference from which time can be referenced. GPS data is not believed to exist in the electronic documentation listed in this file.
jws-vitalsNoMeta.JPG
5HA256: 197c42f67bdeael0d7268545b36c3e9d564a23ee25eaf48b08a25c0d9f45c928 Transaction: 20bb59a20b2191a2708077e031ea4554386cf1b784e29cb187db89876f747b2e OP_RETURN:
444f4350524f4f46197c42f67bdeae10d7268545b36c3e9d564a23ee25eaf48b08a25c0d9f45c92 (Proof of Existence)Registered in our servers since: 2014-10-13 17:19:54 (Proof of Existence)Transaction broadcast timestamp: 2014-10-13 17:23:43 (Blockchain.info)Received Time: 2014-10-13 17:31:07 Blockchain.info (Blockchain.info)Included in Blocks 325175 (2014-10-13 17:31:07 +0 minutes) Example 2: A file, jws-vitalsMeta.jpg, which includes metadata including the GPS location of the individual at the time the individual's vitals were measured. The file was generated by taking a picture of with iphone 4s of an ipad while the ipad had on its display the result of taking vital signs with the Phillips VitalSigns software. The iphone was using Koredoko 4.4.0 ¨ Exif and GPS Viewer software which records the GPS location and other information as determined by the iphone to the metadata of the file. The metadata of the file can be viewed by using a Exif viewer such as Exif Viewer 2.00 running as a addon in Firefox.
jws-vitalsMeta.jpg SHA256: 0762fd19c397797675675832b18c1b74d2812088fdbc416193ed8dcaf7299d07 Transaction: 82d3015cfc53acdf9255d7a3a0e5fe36b50c4445a8e75c7fe4b4abd54806e8c2 OP_RETURN:
444f4350524f4f460762fdl9c397797675675832b18c1b74d2812088fdbc416193ed8dcaf7299d0 (Proof of Existence)Registered in our servers since: 2014-10-13 17:32:44 (Proof of Existence)Transaction broadcast timestamp: 2014-10-13 17:34:47 (Blockchain.info)Received Time: 2014-10-13 17:41:47 (Blockchain.info)Included in Blocks 325176 (2014-10-13 17:41:47 +0 minutes) Example 3: A file, jws-vitalsHistoryMeta.jpg, which was generated by the same method as in example
Disclosed is a method for collecting and making available electronic documentation representing the measurement result(s) over a period of time of key vital signs along with location, time and personal identification at acquisition. The method allows for confidence that the documented information is authentic without the requirement of a trusted third party.
The electronic documentation(s) can contain(s) the required information in the regular file contents or in the metadata of the file. The file may contain more information than is required at a given checkpoint and in this instance, a secure method for parsing the file or its metadata partially or to the required information of the checkpoint may be performed.
FIELD OF INVENTION
The present invention relates to providing information at a checkpoint and more particularly providing information that does not exist at a trusted third party or the checkpoint.
The information being acceptable for clearance at the checkpoint.
BACKGROUND OF INVENTION AND RELATED ART
Along with many other innovations, the introduction of Bitcoin and its wide adoption has facilitated methods of record keeping, transacting and authenticating that do not require a trusted third party. The benefits and utility of not requiring a trusted third party are numerous.
Privacy legislation exists in most countries. This invention discloses a method for disclosing private time dependent information at a checkpoint.
The following documents define many of the features utilized in this invention.
Global positioning systems and cell phone triangulation methods are well known and referred to hereon as GPS and with regards to a determined location, GPS location.
The applicable art of building blockchains and transacting on a blockchains are known and documented in the following references: Bitcoin: A Peer-to-Peer Electronic Cash System (https://bitcoin.org/bitcoin.pdf), Litecoin (https://github.com/litecoin-project/litecoin).
The application of the art of using the blockchain and the OP_RETURN code is detailed and provided as services at these references: https://bitcoin.org/en/developer-reference#block-chain, http://proof of existence.com/about, http://blockchain.info/.
Secure methods of local and central document storage that provides document access solely to the holder of defined keys that are typically a password, user name and optionally a time dependent password (TOP) are disclosed in US8543836 B2 and its references. These methods do not provide for registration of a hash on a blockchain or presentation of the documentation at a checkpoint.
Methods for collecting and processing data on an individual at a checkpoint that includes user-generated information regarding the security checkpoint is known, CA2859365A1.
There exists a need for an individual to provide information to a checkpoint for clearance where the information is a collection of measurements over time. There also exists a need for an individual to have control over their information.
SUMMARY OF INVENTION
It is the principal objectives of the present invention to provide improved checkpoint utility by providing both new capabilities for checkpoint control and improved privacy for individuals using the checkpoint.
The above objectives, features and advantages of the present invention are basically attained by the method detailed as follows:
An application that generates a electronic document including identifying parameter(s) of an individual such as capturing the individual's image during the measurement of the vital sign readings while recording the GPS location and preferably a time stamp. Taking hashes of the electronic documentation. Adding the hash of the electronic documentation to a blockchain. Making the electronic documentation or some data thereof available for processing, or on agreement retention, at or prior to arrival at a checkpoint.
DETAILED DESCRIPTION
A software or hardware application that generates a electronic document with identifying parameter(s) of an individual such as capturing the individual's image from a cell phone camera during the measurement of the parameters required to determine existence or absence of medical symptoms while recording the GPS location and preferably a time stamp. Taking hashes of the electronic documentation. Adding the hash of the electronic documentation to a blockchain. The addition is preferably close in time to the collection of the measurements. Making the electronic documentation available for processing, or on agreement retention. The electronic documentation or some data thereof may be provided prior to the time of arrival at the Checkpoint. A checkpoint is any location physical or virtual at which an individual makes available electronic documents for the purpose of clearance.
The electronic documentation can be reviewed for absence of negative indicators or presence of positive indicators preferably, and often contractually, with regards to the purpose of the checkpoint. An electronic document is the object on which a hash function is executed to generate the hash of the document over and can include both the content and the metadata of the electronic document. The electronic documentation may be stored as encrypted files. The hash stored on the blockchain may be of the encrypted electronic document.
Authentication criteria may be met by examination of the electronic documentation content and metadata. Proof that the document existed prior to a point can be verified by taking the hash of the document and locating the time at which the block that contains the hash was added to the blockchain.
The hash is preferably stored in a transactions OP_RETURN code.
The information provided is reviewed to determine absence of symptoms during the expected incubation period and can be used cross reference the GPS data which may be present in the electronic documentation or provided by other means to determine possible exposure at known infectious locations.
WITHOUT LIMITATION TO THE INVENTION; EXAMPLES FOR DEMONSTRATION OF THE
INVENTION
For proof and demonstration purposes the data provided in these examples can be cross referenced through https://blockchain.info/, http://www.proofofexistence.com/, http://webbtc.com/
SHA256 can also be calculated by hand or using a program such as FileHash.
Example 1: A file, jws-vitalsNoMeta.JPG, with limited metadata. The file is the output from a Philips VitalSigns software program that includes a snap image of the individual with superimposed vital signs including a colour display slider to indicate if vitals are within a normal range.
The SHA256 hash of the file is provided. The transaction code as stored on the Bitcoin blockchain. The OP_RETURN code from the Bitcoin blockchain which includes the SHA256 hash of the file. The time the request as register at Proof of Existence. The time at which Proof of Existence broadcast the transaction to the Bitcoin network. The time the block which includes the OP_RETURN code as added to the Bitcoin blockchain. The actual time and date of the proof of electronic documents existence can be taken as a confidence interval. The confidence interval can be determined and defined for use by the checkpoint authority, administrator or appropriate entity. The block in which the transaction is coded is a useful reference from which time can be referenced. GPS data is not believed to exist in the electronic documentation listed in this file.
jws-vitalsNoMeta.JPG
5HA256: 197c42f67bdeael0d7268545b36c3e9d564a23ee25eaf48b08a25c0d9f45c928 Transaction: 20bb59a20b2191a2708077e031ea4554386cf1b784e29cb187db89876f747b2e OP_RETURN:
444f4350524f4f46197c42f67bdeae10d7268545b36c3e9d564a23ee25eaf48b08a25c0d9f45c92 (Proof of Existence)Registered in our servers since: 2014-10-13 17:19:54 (Proof of Existence)Transaction broadcast timestamp: 2014-10-13 17:23:43 (Blockchain.info)Received Time: 2014-10-13 17:31:07 Blockchain.info (Blockchain.info)Included in Blocks 325175 (2014-10-13 17:31:07 +0 minutes) Example 2: A file, jws-vitalsMeta.jpg, which includes metadata including the GPS location of the individual at the time the individual's vitals were measured. The file was generated by taking a picture of with iphone 4s of an ipad while the ipad had on its display the result of taking vital signs with the Phillips VitalSigns software. The iphone was using Koredoko 4.4.0 ¨ Exif and GPS Viewer software which records the GPS location and other information as determined by the iphone to the metadata of the file. The metadata of the file can be viewed by using a Exif viewer such as Exif Viewer 2.00 running as a addon in Firefox.
jws-vitalsMeta.jpg SHA256: 0762fd19c397797675675832b18c1b74d2812088fdbc416193ed8dcaf7299d07 Transaction: 82d3015cfc53acdf9255d7a3a0e5fe36b50c4445a8e75c7fe4b4abd54806e8c2 OP_RETURN:
444f4350524f4f460762fdl9c397797675675832b18c1b74d2812088fdbc416193ed8dcaf7299d0 (Proof of Existence)Registered in our servers since: 2014-10-13 17:32:44 (Proof of Existence)Transaction broadcast timestamp: 2014-10-13 17:34:47 (Blockchain.info)Received Time: 2014-10-13 17:41:47 (Blockchain.info)Included in Blocks 325176 (2014-10-13 17:41:47 +0 minutes) Example 3: A file, jws-vitalsHistoryMeta.jpg, which was generated by the same method as in example
2 except the software program on the ipad has been adjusted to include a history of vital sign measurements along with the date, time and how long ago the measurement was taken.
jws-vitalsHistoryMeta.jpg SHA256: 2b84e35b42663e484ad0154ca16602ee5fe48a82f3db35b33edaa54caf3643ab Transaction: d3823b8e13a9becf7fe790c161435b7e143dfl7b74a5454329b083086741dcdd OP_RETURN:
444f4350524f4f462b84e35b42663e484ad0154ca16602ee5fe48a82f3db35b33edaa54caf3643a b (Proof of Existence)Registered in our servers since: 2014-10-13 17:35:50 (Proof of Existence)Transaction broadcast timestamp: 2014-10-13 17:36:49 (Blockchain.info)Received Time: 2014-10-13 17:41:47 (Blockchain.info)Included in Blocks 325176 (2014-10-13 17:41:47 +0 minutes) http://webbtc.com/tx/d3823b8e13a9becf7fe790c161435b7e143df17b74a5454329b0830867 41dcdd EMBODIMENTS OF THE INVENTION IN WHICH AN EXCLUSIVE PROPERTY OR
PRIVILIEGE IS CLAIMED ARE DEFINED AS FOLLOWS:
1. A method composed of the following steps: (1) capturing within an electronic file one or more individuals information which includes vital signs, identification and location. (2) Generating a hash of the electronic file. (3) Committing the hash to a transaction on a blockchain.
(4) Providing the electronic file for the purpose of clearance at a checkpoint.
2. Method of claim 1 where step 1, 2 and 3 are performed multiple times over a period of time less than twice the gestation period of an infectious disease targeted by the checkpoint.
jws-vitalsHistoryMeta.jpg SHA256: 2b84e35b42663e484ad0154ca16602ee5fe48a82f3db35b33edaa54caf3643ab Transaction: d3823b8e13a9becf7fe790c161435b7e143dfl7b74a5454329b083086741dcdd OP_RETURN:
444f4350524f4f462b84e35b42663e484ad0154ca16602ee5fe48a82f3db35b33edaa54caf3643a b (Proof of Existence)Registered in our servers since: 2014-10-13 17:35:50 (Proof of Existence)Transaction broadcast timestamp: 2014-10-13 17:36:49 (Blockchain.info)Received Time: 2014-10-13 17:41:47 (Blockchain.info)Included in Blocks 325176 (2014-10-13 17:41:47 +0 minutes) http://webbtc.com/tx/d3823b8e13a9becf7fe790c161435b7e143df17b74a5454329b0830867 41dcdd EMBODIMENTS OF THE INVENTION IN WHICH AN EXCLUSIVE PROPERTY OR
PRIVILIEGE IS CLAIMED ARE DEFINED AS FOLLOWS:
1. A method composed of the following steps: (1) capturing within an electronic file one or more individuals information which includes vital signs, identification and location. (2) Generating a hash of the electronic file. (3) Committing the hash to a transaction on a blockchain.
(4) Providing the electronic file for the purpose of clearance at a checkpoint.
2. Method of claim 1 where step 1, 2 and 3 are performed multiple times over a period of time less than twice the gestation period of an infectious disease targeted by the checkpoint.
3. A method of claim 1 or 2 where the electronic files contains some or all of the information required for clearance in the metadata of the file.
Claims (9)
PRIVILIEGE IS CLAIMED ARE DEFINED AS FOLLOWS:
1. A method composed of the following steps: (1) capturing within an electronic file one or more individuals information which includes vital signs, identification and location. (2) Generating a hash of the electronic file. (3) Committing the hash to a transaction on a blockchain.
(4) Providing the electronic file for the purpose of clearance at a checkpoint.
(4) Providing the electronic file for the purpose of clearance at a checkpoint.
2. Method of claim 1 where step 1, 2 and 3 are performed multiple times over a period of time less than twice the gestation period of an infectious disease targeted by the checkpoint.
3. A method of claim 1 or 2 where the electronic files contains some or all of the information required for clearance in the metadata of the file.
4. Method of claim 1, 2, or 3 where the data of consideration is not medical data.
5. A method of claim 1,2 ,3 or 4 where the data of consideration is not for the purpose of clearance or admission at a checkpoint.
6. A method of claim 1, 2, 3, 4 or 5 where location data is not provided in a electronic file that was hashed and the hash stored on a blockchain.
7. A method of claim 1, 2, 3, 4, 5 or 6 where one or more of the steps of claim 1 are fully or partially automated and securely abstracted from tampering.
8. A method of claim 1, 2, 3, 4, 5, 6 or 7 where some or all of the software used to execute the steps is open source.
9. A method of claim 1, 2, 3, 4, 5, 6, 7 or 8 where step 4 of claim 1 is (4) Providing the electronic file or a cryptographically provable information reduction of the electronic file for the purpose of clearance at a checkpoint.
4. Method of claim 1, 2, or 3 where the data of consideration is not medical data.
5. A method of claim 1,2 ,3 or 4 where the data of consideration is not for the purpose of clearance or admission at a checkpoint.
6. A method of claim 1, 2, 3, 4 or 5 where location data is not provided in a electronic file that was hashed and the hash stored on a blockchain.
7. A method of claim 1, 2, 3, 4, 5 or 6 where one or more of the steps of claim 1 are fully or partially automated and securely abstracted from tampering.
8. A method of claim 1, 2, 3, 4, 5, 6 or 7 where some or all of the software used to execute the steps is open source.
9. A method of claim 1, 2, 3, 4, 5, 6, 7 or 8 where step 4 of claim 1 is (4) Providing the electronic file or a cryptographically provable information reduction of the electronic file for the purpose of clearance at a checkpoint.
4. Method of claim 1, 2, or 3 where the data of consideration is not medical data.
5. A method of claim 1,2 ,3 or 4 where the data of consideration is not for the purpose of clearance or admission at a checkpoint.
6. A method of claim 1, 2, 3, 4 or 5 where location data is not provided in a electronic file that was hashed and the hash stored on a blockchain.
7. A method of claim 1, 2, 3, 4, 5 or 6 where one or more of the steps of claim 1 are fully or partially automated and securely abstracted from tampering.
8. A method of claim 1, 2, 3, 4, 5, 6 or 7 where some or all of the software used to execute the steps is open source.
9. A method of claim 1, 2, 3, 4, 5, 6, 7 or 8 where step 4 of claim 1 is (4) Providing the electronic file or a cryptographically provable information reduction of the electronic file for the purpose of clearance at a checkpoint.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2867765A CA2867765A1 (en) | 2014-10-15 | 2014-10-15 | A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2867765A CA2867765A1 (en) | 2014-10-15 | 2014-10-15 | A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2867765A1 true CA2867765A1 (en) | 2016-04-15 |
Family
ID=55702205
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2867765A Abandoned CA2867765A1 (en) | 2014-10-15 | 2014-10-15 | A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2867765A1 (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106100981A (en) * | 2016-08-22 | 2016-11-09 | 布比(北京)网络技术有限公司 | Social network data exchange method and device |
CN107610279A (en) * | 2017-08-11 | 2018-01-19 | 北京云知科技有限公司 | A kind of vehicle starting control system, method and Intelligent key |
CN107818817A (en) * | 2017-01-22 | 2018-03-20 | 平安医疗健康管理股份有限公司 | The prescription side of continuing method and system based on block chain |
CN109065136A (en) * | 2018-08-22 | 2018-12-21 | 泰康保险集团股份有限公司 | Portable medical approaches to IM and device based on block chain |
CN110019516A (en) * | 2017-11-10 | 2019-07-16 | 华为技术有限公司 | A kind of approaches to IM, apparatus and system |
CN111275857A (en) * | 2016-06-21 | 2020-06-12 | 创新先进技术有限公司 | Control method of intelligent lock and intelligent lock |
US11120437B2 (en) | 2016-02-23 | 2021-09-14 | nChain Holdings Limited | Registry and automated management method for blockchain-enforced smart contracts |
US11126976B2 (en) | 2016-02-23 | 2021-09-21 | nChain Holdings Limited | Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts |
US11182782B2 (en) | 2016-02-23 | 2021-11-23 | nChain Holdings Limited | Tokenisation method and system for implementing exchanges on a blockchain |
US11194898B2 (en) | 2016-02-23 | 2021-12-07 | nChain Holdings Limited | Agent-based turing complete transactions integrating feedback within a blockchain system |
US11308486B2 (en) | 2016-02-23 | 2022-04-19 | nChain Holdings Limited | Method and system for the secure transfer of entities on a blockchain |
US11349645B2 (en) | 2016-02-23 | 2022-05-31 | Nchain Holdings Ltd. | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
US11356280B2 (en) | 2016-02-23 | 2022-06-07 | Nchain Holdings Ltd | Personal device security using cryptocurrency wallets |
US11373152B2 (en) | 2016-02-23 | 2022-06-28 | nChain Holdings Limited | Universal tokenisation system for blockchain-based cryptocurrencies |
US11410145B2 (en) | 2016-02-23 | 2022-08-09 | nChain Holdings Limited | Blockchain-implemented method for control and distribution of digital content |
US11455378B2 (en) | 2016-02-23 | 2022-09-27 | nChain Holdings Limited | Method and system for securing computer software using a distributed hash table and a blockchain |
US11606219B2 (en) | 2016-02-23 | 2023-03-14 | Nchain Licensing Ag | System and method for controlling asset-related actions via a block chain |
US11621833B2 (en) | 2016-02-23 | 2023-04-04 | Nchain Licensing Ag | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
US11625694B2 (en) | 2016-02-23 | 2023-04-11 | Nchain Licensing Ag | Blockchain-based exchange with tokenisation |
US11727501B2 (en) | 2016-02-23 | 2023-08-15 | Nchain Licensing Ag | Cryptographic method and system for secure extraction of data from a blockchain |
US12032677B2 (en) | 2016-02-23 | 2024-07-09 | Nchain Licensing Ag | Agent-based turing complete transactions integrating feedback within a blockchain system |
-
2014
- 2014-10-15 CA CA2867765A patent/CA2867765A1/en not_active Abandoned
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11621833B2 (en) | 2016-02-23 | 2023-04-04 | Nchain Licensing Ag | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
US11606219B2 (en) | 2016-02-23 | 2023-03-14 | Nchain Licensing Ag | System and method for controlling asset-related actions via a block chain |
US11308486B2 (en) | 2016-02-23 | 2022-04-19 | nChain Holdings Limited | Method and system for the secure transfer of entities on a blockchain |
US11972422B2 (en) | 2016-02-23 | 2024-04-30 | Nchain Licensing Ag | Registry and automated management method for blockchain-enforced smart contracts |
US11349645B2 (en) | 2016-02-23 | 2022-05-31 | Nchain Holdings Ltd. | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
US11755718B2 (en) | 2016-02-23 | 2023-09-12 | Nchain Licensing Ag | Blockchain implemented counting system and method for use in secure voting and distribution |
US11727501B2 (en) | 2016-02-23 | 2023-08-15 | Nchain Licensing Ag | Cryptographic method and system for secure extraction of data from a blockchain |
US11625694B2 (en) | 2016-02-23 | 2023-04-11 | Nchain Licensing Ag | Blockchain-based exchange with tokenisation |
US11120437B2 (en) | 2016-02-23 | 2021-09-14 | nChain Holdings Limited | Registry and automated management method for blockchain-enforced smart contracts |
US11126976B2 (en) | 2016-02-23 | 2021-09-21 | nChain Holdings Limited | Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts |
US11182782B2 (en) | 2016-02-23 | 2021-11-23 | nChain Holdings Limited | Tokenisation method and system for implementing exchanges on a blockchain |
US11194898B2 (en) | 2016-02-23 | 2021-12-07 | nChain Holdings Limited | Agent-based turing complete transactions integrating feedback within a blockchain system |
US12032677B2 (en) | 2016-02-23 | 2024-07-09 | Nchain Licensing Ag | Agent-based turing complete transactions integrating feedback within a blockchain system |
US11936774B2 (en) | 2016-02-23 | 2024-03-19 | Nchain Licensing Ag | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
US11455378B2 (en) | 2016-02-23 | 2022-09-27 | nChain Holdings Limited | Method and system for securing computer software using a distributed hash table and a blockchain |
US11356280B2 (en) | 2016-02-23 | 2022-06-07 | Nchain Holdings Ltd | Personal device security using cryptocurrency wallets |
US11373152B2 (en) | 2016-02-23 | 2022-06-28 | nChain Holdings Limited | Universal tokenisation system for blockchain-based cryptocurrencies |
US11410145B2 (en) | 2016-02-23 | 2022-08-09 | nChain Holdings Limited | Blockchain-implemented method for control and distribution of digital content |
US11347838B2 (en) | 2016-02-23 | 2022-05-31 | Nchain Holdings Ltd. | Blockchain implemented counting system and method for use in secure voting and distribution |
CN111275857A (en) * | 2016-06-21 | 2020-06-12 | 创新先进技术有限公司 | Control method of intelligent lock and intelligent lock |
CN106100981A (en) * | 2016-08-22 | 2016-11-09 | 布比(北京)网络技术有限公司 | Social network data exchange method and device |
CN107818817A (en) * | 2017-01-22 | 2018-03-20 | 平安医疗健康管理股份有限公司 | The prescription side of continuing method and system based on block chain |
CN107610279A (en) * | 2017-08-11 | 2018-01-19 | 北京云知科技有限公司 | A kind of vehicle starting control system, method and Intelligent key |
CN107610279B (en) * | 2017-08-11 | 2020-05-05 | 北京云知科技有限公司 | Vehicle starting control system and method and intelligent key |
US11610019B2 (en) | 2017-11-10 | 2023-03-21 | Huawei Technologies Co., Ltd. | Information management method, apparatus, and information management system |
CN110019516B (en) * | 2017-11-10 | 2021-08-20 | 华为技术有限公司 | Information management method, device and system |
CN110019516A (en) * | 2017-11-10 | 2019-07-16 | 华为技术有限公司 | A kind of approaches to IM, apparatus and system |
CN109065136A (en) * | 2018-08-22 | 2018-12-21 | 泰康保险集团股份有限公司 | Portable medical approaches to IM and device based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2867765A1 (en) | A trustless method of qualifying an individual for absence of medical symptoms at a checkpoint | |
US10607726B2 (en) | System for anonymizing and aggregating protected health information | |
US10200198B2 (en) | Making cryptographic claims about stored data using an anchoring system | |
US8190903B2 (en) | Method and apparatus for verifying authenticity of digital data using trusted computing | |
EP3096258A1 (en) | System for anonymizing and aggregating protected information | |
Angelopoulos et al. | DHP Framework: Digital Health Passports Using Blockchain--Use case on international tourism during the COVID-19 pandemic | |
EP4221074A1 (en) | Controlled cryptographic private key release | |
AU2017350176A1 (en) | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features | |
US9805216B2 (en) | Privacy compliance event analysis system | |
CN109241352A (en) | The acquisition methods and server of Profile information | |
WO2020087877A1 (en) | Privacy information tracing and evidence collection method, apparatus, and system | |
JP2019509571A5 (en) | ||
AU2018100478A4 (en) | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features | |
Luo et al. | A data hiding approach for sensitive smartphone data | |
Benil et al. | Blockchain based secure medical data outsourcing with data deduplication in cloud environment | |
US8984288B1 (en) | Electronic signing of content | |
CN109246376B (en) | Anti-counterfeiting electronic signature method and electronic signature device thereof | |
JP2007043321A (en) | Authenticity verification method and system of electronic document | |
Shahaab et al. | Managing gender change information on immutable blockchain in context of GDPR | |
KR102530982B1 (en) | Providing method, apparatus and computer-readable medium of sign and management of labor contracts using kiosks | |
JP2012531641A5 (en) | ||
TW201626284A (en) | Process security and storage protection method of privacy data and the system thereof | |
Wen et al. | Blockchain-empowered contact tracing for COVID-19 using crypto-spatiotemporal information | |
CN102509041A (en) | Content filing system and method used for registering digital content work copyright | |
Saito et al. | Privacy-Preserving infection exposure notification without trust in third parties |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Dead |
Effective date: 20201015 |