GB2397416A - Network device storing a genetic term for secure transaction - Google Patents
Network device storing a genetic term for secure transaction Download PDFInfo
- Publication number
- GB2397416A GB2397416A GB0407474A GB0407474A GB2397416A GB 2397416 A GB2397416 A GB 2397416A GB 0407474 A GB0407474 A GB 0407474A GB 0407474 A GB0407474 A GB 0407474A GB 2397416 A GB2397416 A GB 2397416A
- Authority
- GB
- United Kingdom
- Prior art keywords
- user
- transaction
- genetic
- network
- secure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16B—BIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
- G16B30/00—ICT specially adapted for sequence analysis involving nucleotides or amino acids
- G16B30/10—Sequence alignment; Homology search
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16B—BIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
- G16B50/00—ICT programming tools or database systems specially adapted for bioinformatics
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16B—BIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
- G16B30/00—ICT specially adapted for sequence analysis involving nucleotides or amino acids
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16B—BIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
- G16B50/00—ICT programming tools or database systems specially adapted for bioinformatics
- G16B50/50—Compression of genetic data
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Bioethics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Biotechnology (AREA)
- Evolutionary Biology (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Biophysics (AREA)
- Spectroscopy & Molecular Physics (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Chemical & Material Sciences (AREA)
- Analytical Chemistry (AREA)
- Accounting & Taxation (AREA)
- Proteomics, Peptides & Aminoacids (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A secure network transaction system obtains a user-authorized genetic term, and transacts an online service according to a genetically-based user medical or other risk determined therefrom. An insurance policy, promotional offer, or other service may dynamically address a genetically-based condition. A risk profile may be calculated according to actuarial statistics, genetics and/or heredity using non-discriminatory rules specified for users in temporal or jurisdictional groups. User transactions are modifiable according to genetically-based risk increase or decrease. Data is securely processed, modulated, and stored by a network server for remote access and transaction using a secure network client device.
Description
BIOINI;ORMATIC TRANSACTION SCHEME
Field
This discussion relates generally to biointormatics, particularly to networked computer transactions using gene-relatec1 user data.
Background
Bioinfonnatics refers to an emerging discipline which combines biology and computer science. In this growing interdisciplinary field, various techniques associated with genetics and phannaceutica]s may be combined with computers, software, databases, networks, and other digital processing technologies. Increasingly genesequence databases and analysis tools are available widely through the Internet and other distributed computerized systems to automate certain promising areas of drug discovery, particularly identification, screening, and prediction of target gene and protein structure and Unction.
Present bioinfiorrnatics systems and processes, however, are highly data intensive, an:_. 1;1;. I; I, =1; 1.w.llrh of,hi,h me his i) VII 1 t 1 All Ovid I i> I I 1 I I A. I __ _.) V MA A.^. _ _ _ _ very confidential in nature. Accordingly, there is need for improved scheme to manage N'ohimiDoUS bioinforrmaiics data, as well as any sensitive transactions related thereto.
J "111111111 The method and device here described enables secure bioinformatic-based transaction, whereupon on-!ine set rice is r.^.vided according to voluntary genetic profile. For example, network message pertains to insurance policy, promotional offer, or other personalized service, dynamically considering medical or other genetic-based risk determined from confidential user profile. Bioinformatic classification of personal risk profile is authorized using logical masking procedure to filter effective user subset of reference gene sequence or related structure.
Optionally, user risk profile is calculated using actuarial statistics, genetics and/or heredity per non-discriminatory rules specified temporally or jurisdictionally. Transaction terms are modifiable dynamically in response to profile risk increase or decrease. Secure network server processes, encodes, and stores data for remote access and transaction by portable user devices.
;=rTesvlt-n arm. "'V'V't11s, Fly. I a is a system network diagram for implementing present invention; FIG. Ib is a no. chart cfsteps fori. nplementing one ormcre aspects of present invention; Fly;. Icis a furicticrial block diagram of a user module for implementing one or more aspects of present invention. FIG. is a diaL;ran iiistrating data structure according to one or more aspects of the present ieilio.
Detailed Description of Preferred Embodiment
FIG 1 a diagram shc.vc representative e]ec+ronic sisal ar,d,'or packet, cell, frame or other data fonnat switching, bridging, routing, and/or digital network or related digital system architecture 2, which may be implemented using one or more interconnectable or coupled conventional or proprietary, wired andlor wireless' electronic andlor optical5 terrestrial andlor satellite, local area network (LAN) and/or wide area network (WAN), or other network communications infrastructure equipment, electronics, software and/or related fixed or reconfigurable functionality. Network 2 serves generally for enabling local andlor remote electronic signal, file, or other data access, transfer, storage, or other lo applicable communications between network-accessible computers, processors, servers, appliances, or other addressable nodes.
As shown, network 2 may serve to interconnect nodes such as insurance or other service company server or compute device 4 having access to member terms, policy, or Is rule database or other storage repository 5; employer or other corporate server or compute device 6 having access to employee, rule, or application criteria database or other storage repository 7; public or other governmental server or compute device 8 having access to Nile, discriminatory criteria, recormnended sequence mapping segments and heuristics, genome sequence, or restricted classes database or other storage repository 9; private or JO other secure server or compute device l O having access to personal reference sequence or prop le. specialized services, or rule database or other storage repository I 1; user or other client server or compute device 12 having access to personal reference sequence or profile, transaction account records, Naples, specialized services, or sensor information database or other storage repository l 3; laboratory or other test facility server or compute device 14 having access to personal reference sequence or profile, lab test sequencing results, or rules database or other storage repository l S; and tool or other automated applications server or compute device 16 having access to analysis software, specialized applications, or simulation programs and models database or other storage repository 17.
Each compute server facility 4, 6, 8, 10, 12, '4, 16 may operate independently or cooperative processing function effectively to distribute compute loading and data storage o across scalable network resources.
Preferably, each such server is configured to run one or more conventional operating systems and programming languages and utilities, such as, Windows, fortran, Helix, Line, UC, pert, corba, cgi, etc.; one or more object-oriented or relational database management system to enable homogenous or heterogeneous data format and access, such as sql format; network communications interface management utility to enable apparently seamless file transfer and access, such as file transfer protocols, electronic mail, so-called htm/xml/java and othe media format for web browse and on- line transaction and commercial access. lo
Generally, in a secure network configuration preferably according to the present automated transaction process ar...1/or system, one or more personal or unique bioinformatic value, genetic term, DNA (deoxyribonucleic acid) sequence, folding strci,,re, or subset thereof, or other biologicaiiy, hereditarily, or genetically identifiable or classifiable data associated with one or more user, participant, client, or other designated person or associated being is determined, provided, accessed, generated, calculated, processed, computed, or otherwise obtained Preferred bioinforrnatic value or genetic term is accessed, provided or generated as digital or alphanumeric data structure, including one or more user identifier field, and ;eneiic sequence subset, mask, screen, or, filter field, effective ely such that user reference lo sequence is processable securely for authorized transaction using sequence subset or genetic mask to qualify or otherwise evaluate participating user. Identifier may include partial or complete user social security number or other unique, random, or signature code.
Additionally, such data structure may include application-specific transaction control and payload fields, deponing on user-authorized transaction basis. Optionally, data structure may be provided digitally in representative electronic signal form which may be encoded, compressed, transmitted; stored, received, and decoded, according to one or more secure signal or data modulation scheme, as spread spectrum, or other time/frequency/code-division multiple access (T/F/CDMA) scheme. s
In this encoderVdecoded manner, bioinforrnatic data, personal genetic sequences, or subsets thereof Only 1,e selectively accessed and communicated from netvvork dat.ilases with reduced risk of publicly revealing confidential data, particularly by using randomized key coding and frequency-hopping scheme for spread spectrum co.rnrnnnications and signaling techniques, as specified in any applicable published industrystandard modulation specifications, which documents are hereby incorporated by reference as appropriate Accordingly, user transmission of confidential bioinforrnatic data as encoded signals between servers through network 2 is accomplished with reduced risk of public exposure.
Further, generally in accordance with preferred bioinf.ormatic transaction scheme, transaction, communication, operation, negotiation, solicitation, or other automated service interaction with, related to, or associated with the user is initiated, triggered, modified, consternated, delivered, authorized, terminated, or otherwise responsively l conducted according to, depending on, or upon condition of one or more of the bioinformatic values, particularly user risk analysis or condition determined therefrom.
Preferably, bioinformatic value represents, or may be processed to determine or otherwise generate indication, propensity, probability, likelihood, susceptibility, to vulnerability, inclination, risk, certainty, or other deterministic or statistical metric of p uticular or identified user h acing or developing a genetically-based or related condition, such as one or more medical, genetic, mental, emotional disease or other condition, which is known, indicated, published, or suspected according to one or more specified rule set datclase, mapping criteria, approved table, or other appiicab]e heuristic or algorithm for logically, structurally, or functionally linking given bioinformatic value to particular condition, set thereof, or probability of such condition(s) occurring. s
Thus, in accordance with one or more aspects of the present scheme, bioinforrnatics-based transaction may serve remotely, securely and/or automatically to provide or enable provision of one or more users with one or more insurance or other liability policy or risk service, or promotional offer, multi-media audio/visual message, lo competitive bid, or other electronic communication, to cover or otherwise contemplate the occurrence or non-occttrrence of one or more genetically-based or linked condition or personal consequences related thereto. For example, in online auction fashion, competing insurance companies may offer separate rate bids to user according to common bioinforrnatic Tahoe, as well as same or different actuarial table or risk forrmla.
In particular, bioinforrnatic value or genetic term as used herein may refer to or mean uniquely referenceable or personally identifiable data structure, alphanumeric or text string, electronic signal, or other representative digital in:forrnation for classifying or otherwise processing as described herein of the user, preferably according to volunteered, 7o permitted, or user-authorized mask, screen, filter, or other logical criteria effectively for d efining, recognizing, identifying, or otherwise generating one or more subset or sequence portion of a more complete, reference, or generalized genetic sequence assoc;lated with flee user or other reference entity.
Hence, for example, deterministic or predictive value of user being subject OT hkeTy to contract genetically-based condition or disease is determinable loom bioinfonnatic value or genetic term. Thus, in an automated relationship, one or more parameter, term, condition, or other of specified classification for applicable user transaction(s) depends directly or indirectly on such bioinfonnatic, genetic, or predictability value. lo
In a simplified embodiment, predictive approach according to userprovided bioinformatic data is accomplished in evaluative software executed by insco server 4 which initially qualifies genetic term as valid user sequence segment(s) that contains generally recognizable code such as CGAT etc. Preferably, laser segments are provided to correspond with pre-specified segments associated with specific sequence locations for evaluating designated classes of genetic-based conditions. Then, such software further aligns one or more user segments against entire or portion of general reference sequence corresponding to accepted standard genome map.
so IN this alignment process which compares user genetic, terms against known sequence and associated conditions, server software may now evaluate actual personal genetic data that uniquely, albeit partially, describes bioinformatic profile of transaction participant. Meanwhile. user still effectively masks or screens ether non-voltmteered, presumably more confidential or less essential for transaction qualification, sequence segments from outside party review.
Such sofa may then generate comparison, mapping, analysis, or other evaluation results to indicate how such user segment revelation indicates or suggests likelihood or risk of having or developing certain genetically-based conditions that are indicated by matching certain sequence terms or groups thereof according to one or more predefined Naples or heuristics.
One or more heuristic or rule may be provided similarly to one or more actuarial or risk table or transmitted in electronic form as a computational model following one or more high-level programming or spreadsheet language, such as C/C++ or other database management syntax. F urtler, such heuristic or rule may provide numerical or statistical s instructions or groupings toassign or calculate one or more risk profile values to one or more user applicants according to individual characteristics, such as age, sex, smoker status, marriage status, prior medical history, etc. Also, such heuristic or rule may allow applicable transaction evaluation so.'vare automatically to assign or compute one or more risk profile values to one or more user applic.,nts according to prcspecified genetic mapping table or formula, particularly determining such risk profile value according to the;,resence or absence of one or niche matching or non-matching genes at designated locations, secluence segments, or sets hereof, whereupon sucks designated locations, segments, or sets thereof, correspond and indicate a certainty, likelihood, unlikelihood or other predictive value associated with one or more genetically-based condition, medical disease, or other related factor.
Hence, users may permit screening, masking, filtering, or other secured approach to recognize or identify certain differentiated or identical genetic elements or functional structures related to, as a subset of, or otherwise comparable to a personal sequence file, such as a more complete general human genome or other personal reference sequence o definition.
Additionally, such bioinformatic data or genetic term may be based on a established or calculated statistical or actuarial table or other database and genetic or heredity profile associated with the particular user or set thereof. Bioinformatic values or genetic terms may be determined by or through one or more network-accessible servers, and such values or terms are stored confidentially in one or more local or remote database associated therewith.
Processing of bioinformatic value or genetic term for enabling transaction with lo one or more user is performed dynamically in real- time according to one or more Nile set applicable to one or more users assigned, classified, or otherwise provided in one or more temporal or jurisdictional grouping or category, preferably on non-discriminatory basis or other equitable threshold or faimess-based criteria among equivalently qualified or c' as sided group iriel.bei S. Jl1 certain cases, bioinformatic value processing may indicate identical genetic terms, suggesting possible fraudulent sample data, sequence clone or twin matching, or other alert state to be reported and investigated.
Preferably, one or more public servers 8 provide updated database 11 containing acceptable or non-discriminatory sample sequence segments or index (i.e., so-called SNP) for defining user bioinformatic screening values, for example, resulting from ongoing, reliable, quality medical and scientific genetic research. Hence, in this lo organized screening scheme, various on-line transaction and other service providers may conduct more predictable analysis and evaluation of potential customers and service applicar is, as described herein.
For example, one or more user or transacting servers may generate a potential discrimination-violation or other representative signal indication or report upon comparing equivalently profiled bioinformatic data for multiple user applicants for a given transaction offer, but one or more user applicant(s) is provided substantially advantageous transaction terms or policy rates over other user applicants, particularly where genetically-based difference between such advantaged vs. disadvantaged JO applicants substantially arises in non-permitted classifications according to specified rule set or heuristics, such as racial or ethnic character.
Optionally, one or more sequence segments may be designated by transaction processing Talc sct or heu'-.stics to be block or othe',,tise disregarded from consideration for transactional risk analysis, otherwise, detection of such restricted analysis may result in discrimination indication, as described herein. s
Optionally, one or more sets of multiple bioinforrnatic values and/or genetic terms which are associated with one or more users are determined, modified, tiered, ranked, or otherwise generated accordingly. Thus, present or previous transaction with specified users) according to prior or initial bioinformatic values may be modified 0 correspondingly, for exnple, when newly-provided bioinformatic value represents increase or decrease of likelihood or risk of given user having or developing certain genetically-based condition.
Liken same or substantially equivalent bioinforrnatic value or genetic team is determined or associated with multiple users, corresponding transaction or other operation applicable with each user occurs confidentially, preferably processed separately according to each user bioinformatic value or genetic tenn on effectively non- discriminatory basis.
en Preferably, network client or device associated with particular user or group thereof may process or couple to network 2 for interactive access and transaction therewith. For example, bioinforinatic value or genetic term may be generated for one or more transaction operations in secure authenticated process by implantable or portable user device. Optionally, user account or repository provided in, or accessible to, user device is updated to identify, meters or otherwise record billing charges, aniount, Frequency, quality, or other factor or account credits regarding certain or each user i transaction or related network activity.
It is contemplated generally herein that user server or device module 12 may be implemented in various network-accessible or stand-alone personal computers, engineering workstations, personal digital assistants, processors, microcontrollers, 0 servers, network appliances, or other addressable nodes, which provide storage and processing function.
Preferably, user device 12 includes one or more memory circuits or database software stncture 13 for storing bioinforrnatic value or genetic tenn associated with one l S or more user, and microprocessor for securely controlling access to stored values and terms through network 2. Device microprocessor may enables secure access and transaction between servers 4, 6, 8, 10, 12, 14, 16. In particular, microprocessor may determine, flag, monitor, alert, or otherwise signal specified transaction conditions, such as unsecured access, multi-user transaction, same bioinformatic value condition, rule- o violation transaction discrimination, etc. FIG. lb flow clout shows network 2 operational steps generally for automating bioinfoatic transaction, -hereby on-!ine or interactive digital service or other electronic messaging is secured using user-released genetic profile or subset.
s initially, network 2 is configured 20 to couple various addressable compute nodes 4, 6, 8, 10, 12, 14, l 6, inchding associated corresponding heterogeneous or homogeneous databases 6, 7, 9, I l, 13, 15, l 7 for appropriate client- server or peer-peer communications, control, and file-transfer relationships. Preferably, each server 4, 6, 8, 10, 12, 14, 16 coupled thereto is checked for secure authorization and appropriate i o participation or file access levels. As necessary to support and scale for increased network transaction load, additional servers and database may couple and be registered as users or service providers for one or more probable or qualified transaction groups.
One or more client or user 12 node may then be set-up 21 as well for network s configuration and subscription for one or more specie ed network transaction categories or access groups. User device and software testing may be performed remotely for current calibration. Preferably, one or more network server provides transaction management control and overall servicing to coordinate messaging between transaction providers and various active or possible user devices coupled thereto. go
One or more databases 5, 7, 9, 1 1, 13, 15, 17 may then be recognized, initialized, updated, or otherwise defined 22 as part, currently or potentially, for one or more specified network transaction categories or access groups. Heuristics or other rule sets as wel! are recognized, initialized, updated, or otherwise refiled within one Or more stich databases for network access.
Preferably, any applicable bioinformatic or biogenetics-related database, heuristic, or rule format, specification, and interface or access requirements, for example, as used in conjunction with electronic data, signal, file or network transfer and communication, which complies with one or more published or industry-adopted standards or syntax, as well as conventional extensions thereof, are hereby incorporated by reference.
One or more software programs, application-speciEc programs, automation tools, or other transaction code are recognized, initialized, updated, or otherwise defined 23 as part, currently or potentially, for one or more specified network transaction categories or access groups.
One or more transaction or other operational message is transmitted or initiated 24 between client or user server and one or more other server accessible thereto through network 2. For example, representative initial message may be provided through network browser or other applications screen to introduce, advertise, remind, suggest, alert, or no otherwise relate to medical or health insurance policy, marketing promotional offer for certain merchandise, or other personalized service communication.
In accordance with one aspect of bioinformatics-based transaction model, user profile or genetic risk mapping 25 occurs, dynamically deter mining or analyzing medical or other genetic-based exposure, for exnple, by comparing confidential user data or vo]tutteered sequence subset to specified actuarial tables, heredity background and propensity, transaction pre-quailhcation rule set for assigning one or more user risk determinations to corresponding present or absent genetic sequence or other heuristic analysis tools to predict or calculate user likelihood of having or being predisposed to one or more genetically-based conditions.
o In particular, bioinformatic classification of personal risk profile Is securely authorized using logical masking or screening procedure to Miter effective user subset of reference gene sequence or related structure, relatively efficiently without necessarily identifying, transmitting, or storing complete or significant portion of content of confidential laser genetic sequence data. i5
Selective segment revelation, preferably limiting disclosure deliberately by user only to personal gene sequence locations associated with transaction evaluation and related personal risk, particularly where established research data confirms high correlation between certain subsegment sequencing and occurrence or likelihood of certain medical or disease conditions, significantly reduces exposure of confidential bioinformatic data, and general data size for transmitting, storing, and analyzing such data, since more complete personal gene sequence or genome is not disclosed or processed.
Hence, upon laser profile mapping 257 secure network transaction system obtains user-authorized genetic tenn or hioinforrnatic profile, and responsively transacts 26 on- line service or other transactional operation, for example, according to genetically-based user medical or other risk determined therefrom.
As further illustration, certain insurance company transaction server 4 may 0 detemine for particular user applicant that provided and authorized bioinformatics value, as detennined from selected sequence masking of reference genome results in 0-5% likelihood or risk profile that such candidate insuree be exposed to serious health condition or diseases (such as heart problem) within given temporal range of 5-year policy and California jurisdictional residence, and additionally that such applicant's s hereditary and other non-genetic profile (e.g., non-smoker, no family cancer) does not significantly contribute to calculated risk.
Advantageously, insurance company may benefit t from having more accurate determination of applicant risk profile, while applicant benefits as well Mom potentially JO lower policy rates due to favorable bioinformatic value submission.
User transactions and/or corresponding services are modifiable 27 according to biornfollliatic data representing genetical'y-based risk increase o. decrease. Data is securely processed, modulated, and- stored by one or more network server for remote access and transaction using various portable user devices. Insurance policy, promotional I. offer, or other service may dynamically address Ad be modified accordingly based upon genetically-based condition in virtually real-time.
After current transaction or servicing is completed 27, new transaction messaging operations 24 may be re-started 28 to accorrmodate new or revised transaction lo requirements. Various transaction applications may continue with one or more related messaging or signaling between transaction server and user, as appropriate to conduct particular transaction.
Moreover. after user profile mapping 25 is completed, user setup and testing 21 s may be restarted 29 to accommodate new or revised user or client network participation.
Accordingly, present bioinformatics-based transaction scheme may continue on ongoing basis, responding dynamically to user requests, modifications, or signals.
his described herein, bioinforrnatic data classifies user per personal mask which JO filters subset of user genetic sequence, and risk profile is calculated according to actuarial statistics, genetics andior heredity, preferably using non-discriminatory rules specified for users in temporal or jurisdictional groups. Temporal grouping may be according to age, relevant time/day/weeklmonth/year etc. Jurisdictional grouping may be according to address/comm,-i','lcit/st.,tc/coun. to etc. FIG. I c diagram shows preferred functional configuration of user module 30, s which nay include network communications interface 3 l for coupling user mod le to network 2 for remote signaling and data access; processor and storage 32 for computing and storing digital instructions, signals, and data; database manager 33 for controlling and managing read, write, modify, and delete access to database 13; one or more user mixed- signal sensors 34 for electronically detecting one or more biometric or bioinformatic 0 values, or conditions associated with user; secure identification checker 35 for authenticating correct user via text, signature, voice, retinal, fingerprint, or other identifiable objective input; visual and/or audio display screen/speaker media output interface 36 for communicating transaction messages with user; user monitor input 37 for mcntoring user video and/or sound input for communication therewith; and applications peripheral and related interface or bus or signaling structure 38 for coupling user module to other specific or general digital or analog devices for communication or signaling therewith. It is contemplated herein that user device may be more simplified, including merely storage and processing function to handle secure bioinforrnatic data access.
As described herein, riser module 12, 30 is embodied preferably in any portable network-accessible device which may store user bicinformatic dataand control network access to stored data.
F IG. 2 diagram shows sample bioinformatic data structures, including reference sequence 40 (partial), mask subset 42 as well as indexing flags 44 aligned therewith, and classification object 46. Optionally, flags 44 may correspond with one or more so-calleci single n-ncleotiIe pclymcrplisms ("TIPSY, aced thereby associate, mark, link, Illap Or otherwise indicate user propensity for illness or particular disease or combination thereof.
In particular, data structure represented by mask 42, or representative or functional indication, thereof is preferably provided or released by user to authorize or otherwise permit network transaction activity, and may designate one or more bioinfonnatic value or genetic term which uniquely references or personally identifies user risk classification or other genetically-based grouping.
In this more secure methodology, predictive value of user being subject or likely Is to contract genetically-based condition or disease is determinable from bioinformatic value or genetic term. Thus, in network computer relationship, one or more parameter, term, condition, or other of specified classification for applicable user transaction(s) depends directly or indirectly on such bioinformatic, genetic, or predictability value accessible thereto electronically.
Hence' mask 42 and/or index 44 effectively enables simplified (e.g., positive exposure, or negative block) screening, filtering, or other approach to recognize or idcrtify certain differentiated or identical genetic elements or functional stracturcs r elated to, as a subset of, or otherwise comparable to a personal sequence file, such as a more cornplere genera] Iranian genome or other personal reference sequence definition.
In p.-e.e. ed eml odirnen., i' is contcmlplated that one or more user or other reference human gene sequence or genome set is pre-determined anal stored as a relatively large sequential file in one or more database accessible via network 2. However, in accordance with one or more aspect of present invention, user may confidentially test using conventional gene sequencing methods his or her biological material, such as hair, ] o blood, etc., to obtain personal genetic sequence or selected segments thereof For example, user-disclosed bioinformatic data or related genetic values may be selectively revealed or authorized, depending on applicable transaction server application, i such as medical screen segmentation for insurance company considering future health s risk, and non-medical screen segmentation for potential employer considering future management capabilitites. Confidential laboratory data may lee stored or accessed, in 11 sequence or partially masked, with proper authorization from database 15 of lab server 14.
As discussed herein, one or more selected portions of such personal sequence may be defined and released preferably on confidential basis as logical screen or access key to expose or block gene sequence data from other-party transaction scn.tin S!!eh limiteil 2i exposure may adequately enable transaction party to define or modify transaction terms, such as perscnl medical risk to specify ir,s -ance policy rate;.
Foregoing described embodiments of the invention are provided as illustrations s and descriptions. They are not intended to limit the invention to precise form described.
In particular, Applicant contemplates that functional implementation of invention described herein may be implemented equivalently in hardware, software, firmware, andlor other available functional components or building blocks. Other variations and embodiments are possible in light of above teachings, and it is thus intended that the lo scope of invention not be limited by this Detailed Description, but rather by Claims following.
Claims (3)
- CLAIMS: 1. Secure network client device comprising': a memory for storinga genetic term associated with a user; and a processor for enabling, a network access to the genetic term to provide a secure transaction with the user.
- 2. The device of Claim 1 wherein: a predictability value of the user being subject to a genetically-based condition is determinable from the genetic term, a parameter ol'the transaction being dependent on the predictability value.
- 3. A secure network client device according to claim 1 wherein said processor is arranged to provide transactions with a plurality of network servers.4 A secure network client device substantially as described hereinabove with reference to Figures I C and 2 of the accompanying drawings. as \..3. Tlle device of Claim 1 wherein: the genetic term comprises a user permit et'tectively t'or screening a personal 1 5 ret'erence sequence.4. 'l'he device ot'C1aim L wherein: the genetic term comprises a revised subset of a genetic sequence associated with the user. I.j5. The device of Claim 1 wherein: the processor enabling access to provide transaction with a plurality ot' netNNork servers.6. The device of Claim 5 wherein: the processor determines a discrimination indication between a plurality of networl; transactions.7 A secure network client device substantially as herein described with reference to and as shown in the accompanying drawings. 2')Amentments t., the cl.'ins have been filed as follows 1. A secure network client device comprising: s a secure identification checker for authenticating a correct user; a memory arranged to store a user-authorised mask subset of a biological genetic sequence associated with said user, and a processor arranged to enable network access to said mask subset and to provide a secure transaction between said user and a server over said network.2. A secure network client device according to claim 1 wherein a predictability value S of the user being, subkoct to a genetically-based condition is determinable from said mask subset.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US43550499A | 1999-11-06 | 1999-11-06 | |
GB0026498A GB2363874B (en) | 1999-11-06 | 2000-10-30 | Bioinformatic transaction scheme |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0407474D0 GB0407474D0 (en) | 2004-05-05 |
GB2397416A true GB2397416A (en) | 2004-07-21 |
GB2397416B GB2397416B (en) | 2004-09-01 |
Family
ID=32599040
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0407474A Expired - Fee Related GB2397416B (en) | 1999-11-06 | 2000-10-30 | Secure network client device |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2397416B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007067078A1 (en) * | 2005-12-07 | 2007-06-14 | Synergenz Bioscience Limited | Methods of analysis of polymorphisms and uses thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0543612A2 (en) * | 1991-11-19 | 1993-05-26 | Becton, Dickinson and Company | Nucleic acid target generation |
US5935247A (en) * | 1997-09-18 | 1999-08-10 | Geneticware Co., Ltd. | Computer system having a genetic code that cannot be directly accessed and a method of maintaining the same |
US5943423A (en) * | 1995-12-15 | 1999-08-24 | Entegrity Solutions Corporation | Smart token system for secure electronic transactions and identification |
-
2000
- 2000-10-30 GB GB0407474A patent/GB2397416B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0543612A2 (en) * | 1991-11-19 | 1993-05-26 | Becton, Dickinson and Company | Nucleic acid target generation |
US5943423A (en) * | 1995-12-15 | 1999-08-24 | Entegrity Solutions Corporation | Smart token system for secure electronic transactions and identification |
US5935247A (en) * | 1997-09-18 | 1999-08-10 | Geneticware Co., Ltd. | Computer system having a genetic code that cannot be directly accessed and a method of maintaining the same |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007067078A1 (en) * | 2005-12-07 | 2007-06-14 | Synergenz Bioscience Limited | Methods of analysis of polymorphisms and uses thereof |
Also Published As
Publication number | Publication date |
---|---|
GB0407474D0 (en) | 2004-05-05 |
GB2397416B (en) | 2004-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080208916A1 (en) | Bioinformatic Transaction Scheme | |
US11900473B2 (en) | Method of personalizing, individualizing, and automating the management of healthcare fraud-waste-abuse to unique individual healthcare providers | |
EP3622660A1 (en) | Systems and methods for crowdsourcing, analyzing, and/or matching personal data | |
US8452619B2 (en) | Masked data record access | |
US8326648B2 (en) | System for secure mobile healthcare selection | |
US20100100398A1 (en) | Social network interface | |
US20130179176A1 (en) | Computer implemented method for determining the presence of a disease in a patient | |
JP2003523578A (en) | System and method for determining the validity of an interaction on a network | |
US20100076950A1 (en) | Masked Data Service Selection | |
US20100063830A1 (en) | Masked Data Provider Selection | |
US20050256740A1 (en) | Data record matching algorithms for longitudinal patient level databases | |
US20100063835A1 (en) | Method for Secure Mobile Healthcare Selection | |
WO2009042582A2 (en) | Predicted variable analysis based on evaluation variables relating to site selection | |
US20100063865A1 (en) | Masked Data Provider Profiling | |
Pasquale | Redescribing health privacy: the importance of information policy | |
CN117409913A (en) | Medical service method and platform based on cloud technology | |
US11244766B2 (en) | Systems and methods for storing, processing and utilizing proprietary genetic information | |
CN114819967A (en) | Data processing method and device, electronic equipment and computer readable storage medium | |
US20160253770A1 (en) | Systems and methods for genetic testing algorithms | |
US20240006061A1 (en) | Data currency system for digital human healthcare and medical data exchange, analytics, and applications | |
US20100004954A1 (en) | Systems for digital management of underwriting insurance contracts | |
CN116978527A (en) | DIP-based hospital data analysis method and device | |
GB2397416A (en) | Network device storing a genetic term for secure transaction | |
Norton et al. | Transitions between the public mental health system and jail for persons with severe mental illness: A Markov analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20141030 |