US20220129999A1 - Systems and methods for dynamic travel planning - Google Patents
Systems and methods for dynamic travel planning Download PDFInfo
- Publication number
- US20220129999A1 US20220129999A1 US17/515,844 US202117515844A US2022129999A1 US 20220129999 A1 US20220129999 A1 US 20220129999A1 US 202117515844 A US202117515844 A US 202117515844A US 2022129999 A1 US2022129999 A1 US 2022129999A1
- Authority
- US
- United States
- Prior art keywords
- user
- travel
- risk
- data
- manifest
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims description 76
- 208000015181 infectious disease Diseases 0.000 claims abstract description 195
- 208000035473 Communicable disease Diseases 0.000 claims abstract description 75
- 230000005540 biological transmission Effects 0.000 claims abstract description 6
- 230000036541 health Effects 0.000 claims description 147
- 238000012545 processing Methods 0.000 claims description 66
- 230000004044 response Effects 0.000 claims description 41
- 230000009471 action Effects 0.000 claims description 15
- 230000008859 change Effects 0.000 claims description 12
- 201000010099 disease Diseases 0.000 description 56
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 56
- 230000000694 effects Effects 0.000 description 36
- 230000008569 process Effects 0.000 description 34
- 230000005548 health behavior Effects 0.000 description 24
- 230000004308 accommodation Effects 0.000 description 22
- 230000006399 behavior Effects 0.000 description 21
- 231100000279 safety data Toxicity 0.000 description 21
- 238000010586 diagram Methods 0.000 description 16
- 230000015654 memory Effects 0.000 description 15
- 238000004659 sterilization and disinfection Methods 0.000 description 11
- 238000004458 analytical method Methods 0.000 description 9
- 230000037406 food intake Effects 0.000 description 7
- 238000011012 sanitization Methods 0.000 description 6
- 230000007480 spreading Effects 0.000 description 6
- 238000012360 testing method Methods 0.000 description 6
- 238000012795 verification Methods 0.000 description 6
- 238000004140 cleaning Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 238000012552 review Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 239000011449 brick Substances 0.000 description 4
- 239000004570 mortar (masonry) Substances 0.000 description 4
- 208000006673 asthma Diseases 0.000 description 3
- 230000010006 flight Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- LFQSCWFLJHTTHZ-UHFFFAOYSA-N Ethanol Chemical compound CCO LFQSCWFLJHTTHZ-UHFFFAOYSA-N 0.000 description 2
- 241000700605 Viruses Species 0.000 description 2
- 238000009529 body temperature measurement Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 235000020803 food preference Nutrition 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000033001 locomotion Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 238000005406 washing Methods 0.000 description 2
- 208000035143 Bacterial infection Diseases 0.000 description 1
- 241000593989 Scardinius erythrophthalmus Species 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 208000022362 bacterial infectious disease Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000009937 brining Methods 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000249 desinfective effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000006806 disease prevention Effects 0.000 description 1
- 238000011534 incubation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000010339 medical test Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 238000013349 risk mitigation Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 208000024891 symptom Diseases 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 235000020806 vegan diet Nutrition 0.000 description 1
- 235000003563 vegetarian diet Nutrition 0.000 description 1
- 238000009423 ventilation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/14—Travel agencies
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01C—MEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
- G01C21/00—Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
- G01C21/26—Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00 specially adapted for navigation in a road network
- G01C21/34—Route searching; Route guidance
- G01C21/3453—Special cost functions, i.e. other than distance or default speed limit of road segments
- G01C21/3461—Preferred or disfavoured areas, e.g. dangerous zones, toll or emission zones, intersections, manoeuvre types, segments such as motorways, toll roads, ferries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2365—Ensuring data consistency and integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/04—Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
- G06Q10/047—Optimisation of routes or paths, e.g. travelling salesman problem
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
- G06Q30/0204—Market segmentation
- G06Q30/0205—Location or geographical consideration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H50/00—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
- G16H50/30—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for calculating health indices; for individual health risk assessment
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H50/00—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
- G16H50/80—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/024—Guidance services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/02—Reservations, e.g. for tickets, services or events
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/88—Medical equipments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- the present disclosure relates generally to risk analysis systems for disease related risks.
- Some diseases e.g., viruses, bacterial infections, etc. can significantly affect the health of people, or certain classes of people, who contract the disease. It may be beneficial to take measures that restrict the ability of a healthy person from contracting the disease or an infected person from spreading the disease. For example, behaviors such as wearing masks, practicing social distancing techniques, using alcohol based hand sanitizers, washing hands, self-quarantining when sick, avoiding high infection areas, and other behaviors can reduce the spread of the disease.
- One implementation of the present disclosure is a system including one or more memory devices having instructions stored thereon, that, when executed by one or more processors, cause the one or more processors to receive travel data associated with a travel plan of a user indicating one or more travel destinations.
- the instructions cause the one or more processors to receive destination risk data indicating a destination risk of the one or more travel destinations associated with transmission of an infectious disease, receive personal risk data indicating a risk of the user associated with the infectious disease, and generate an infection travel risk score for the user based on the destination risk data and the personal risk data.
- the instructions cause the one or more processors to generate one or more suggestions to the travel plan based on the infection travel risk score increasing to a value greater than a particular amount caused by at least one of a first change to the destination risk data or a second change to the personal risk data.
- the instructions cause the one or more processors to generate travel routes from an originating location to the one or more travel destinations, generate infection route risk scores for the travel routes and perform at least one of generating a suggestion for the user to travel on one of the travel routes associated with a lowest infection route risk score, generating a user interfacing including an indication of the travel routes and the infection route risk scores, or generating a list including the travel routes ranked according to the infection route risk scores associated with the travel routes.
- the personal risk data indicates whether the user has previously contracted and recovered from the infectious disease.
- the instructions cause the one or more processors to receive a request for the infection travel risk score from an external system, wherein the external system sends the request to the one or more processors in response to a user device of the user requesting access from the external system to a service or location and communicate the infection travel risk score to the external system in response to receiving the request from the external system.
- the instructions cause the one or more processors to receive a request to share the infection travel risk score from a user device of the user with a second user device or an external system and responsive to receiving the request, perform at least one of sending the infection travel risk score to the user device, second user device, or the second external system or generating a shareable link to a data source storing the infection travel risk score and send the link to the user device.
- the instructions cause the one or more processors to receive a manifest from a user device of the user representing a travel activity performed by the user, receive a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the travel activity performed by the user, validate the manifest received from the user device with the second manifest of the blockchain, and generate the infection travel risk score for the user based on the travel activity represented by the manifest.
- the second manifest includes a first signature of the user device and a second signature of the external system.
- the instructions cause the one or more processors to determine that the first signature is authentic with a first public key of the user device and determine that the second signature is authentic with a second public key of the external system.
- the second manifest is hashed by the external system.
- the instructions cause the one or more processors to validate the manifest received from the user device by determining that the manifest matches the second manifest by hashing the manifest received from the user device and comparing a hash of the manifest received from the user device to the second manifest hashed by the external system.
- the instructions cause the one or more processors to generate a travel itinerary for the user based on the travel data and risk data associated with the travel plan and provide the travel itinerary to the user via a user interface of a user device, generate one or more suggested updates to the travel itinerary based on changes in the risk data to dynamically account for changes in the risk data as the user is traveling, and provide the one or more suggested updates to the user via the user interface of the user device.
- the instructions cause the one or more processors to generate the travel itinerary based on disparate factors including travel modes, travel destinations, and stops along a travel route.
- the risk data indicates disease infection risk indicating a likelihood of the user contracting the infectious disease.
- the risk data is received by the one or more processors as risk events from at least one of an event notification system, a contact tracing system, or a health authority system.
- the risk data is contact tracing data, wherein the contact tracing data indicates at least one of one or more past locations or one or more future locations of a person infected by the infectious disease.
- the instructions cause the one or more processors to perform at least one of generating the travel itinerary to include one or more transportation selections that avoid at least one of the one or more past locations or the one or more future locations of the person infected by the infectious disease or updating a value of the infection travel risk score based on the contact tracing data.
- the instructions cause the one or more processors to determine risk values associated with dining options, select one or more dining options from the dining options based on the risk values associated with the dining options, and cause the travel itinerary to include the one or more dining options.
- the instructions cause the one or more processors to determine risk values associated with overnight stay accommodation options, select one or more overnight stay accommodations from the overnight stay accommodation options based on the risk values associated with the overnight stay accommodation options, and cause the travel itinerary to include the one or more overnight stay accommodations.
- the risk data indicates a threat level associated with geographic areas.
- the instructions cause the one or more processors to generate the travel itinerary by determining one or more travel routes through one or more low risk geographic areas associated with threat levels less than one or more other high risk geographic areas.
- the threat levels associated with the geographic areas indicate a disease infection level of people within the geographic areas.
- the travel itinerary includes one or more transportation selections.
- the instructions cause the one or more processors to select the one or more transportation selections from transportation options based on transportation risk data associated with the transportation options.
- the one or more transportation selections include one or more car rental selections.
- the instructions cause the one or more processors to select the one or more car rental selections from car rental options based on a health safety ratings of the car rental options.
- the one or more transportation selections include one or more flight transportation selections.
- the transportation risk data associated with the transportation options includes one or more of a length of a flight layover, a distance between two flight gates of a connecting flight, a likelihood of the user needing to eat during the traveling of the user, or an indication of infected individuals booked for a particular flight.
- Another implementation of the present disclosure is a method including receiving, by a processing circuit, travel data associated with a travel plan of a user indicating one or more travel destinations and receiving, by the processing circuit, destination risk data indicating a destination risk of the one or more travel destinations associated with transmission of an infectious disease.
- the method includes receiving, by the processing circuit, personal risk data indicating a risk of the user associated with the infectious disease and generating, by the processing circuit, an infection travel risk score for the user based on the destination risk data and the personal risk data.
- the method includes generating, by the processing circuit, one or more suggestions to the travel plan based on the infection travel risk score increasing to a value greater than a particular amount caused by at least one of a first change to the destination risk data or a second change to the personal risk data.
- the method includes generating, by the processing circuit, travel routes from an originating location to the one or more travel destinations, generating, by the processing circuit, infection route risk scores for the travel routes, and performing, by the processing circuit, at least one of generating a suggestion for the user to travel on one of the travel routes associated with a lowest infection route risk score, generating a user interfacing including an indication of the travel routes and the infection route risk scores, or generating a list including the travel routes ranked according to the infection route risk scores associated with the travel routes.
- the method includes generating, by the processing circuit, a travel itinerary for the user based on the travel data and risk data associated with the travel plan and provide the travel itinerary to the user via a user interface of a user device, generating, by the processing circuit, one or more suggested updates to the travel itinerary based on changes in the risk data to dynamically account for changes in the risk data as the user is traveling, and providing, by the processing circuit, the one or more suggested updates to the user via the user interface of the user device.
- the risk data indicates disease infection risk indicating a likelihood of the user contracting the infectious disease.
- the risk data is received by the processing circuit as risk events from at least one of an event notification system, a contact tracing system, or a health authority system.
- Another implementation of the present disclosure is a system including one or more memory devices having instructions stored thereon and one or more processors configured to execute the instructions.
- the instructions cause the one or more processors to receive travel data associated with a travel plan of a user indicating one or more travel destinations, receive destination risk data indicating a destination risk of the one or more travel destinations associated with transmission of an infectious disease, receive personal risk data indicating a risk of the user associated with the infectious disease, and generate an infection travel risk score for the user based on the destination risk data and the personal risk data.
- the instructions cause the one or more processors to generate one or more suggestions to the travel plan based on the infection travel risk score increasing to a value greater than a particular amount caused by at least one of a first change to the destination risk data or a second change to the personal risk data.
- the instructions cause the one or more processors to generate travel routes from a originating location to the one or more travel destinations, generate infection route risk scores for the travel routes, and perform at least one of generating a suggestion for the user to travel on one of the travel routes associated with a lowest infection route risk score, generating a user interface including an indication of the travel routes and the infection route risk scores, or generating a list including the travel routes ranked according to the infection route risk scores associated with the travel routes.
- the instructions cause the one or more processors to receive a manifest from a user device of the user representing a travel activity performed by the user, receive a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the travel activity performed by the user, validate the manifest received from the user device with the second manifest of the blockchain, and generate the infection travel risk score for the user based on the travel activity represented by the manifest.
- One implementation of the present disclosure is a system including one or more memory devices having instructions thereon, that, when executed by one or more processors, cause the one or more processors to receive a request from a service provider to be added to a trusted network of service providers and receive health safety data of a health data stream associated with the service provider and risk data of a risk data stream indicating risk levels associated with the service provider.
- the instructions cause the one or more processors to determine that the service provider meets a level of heath safety by correlating the health safety data of the health data stream with the risk data of the risk data stream, receive a request from a device for a service provider recommendation of the trusted network of service providers, and provide an indication of the service provider to the device in response to a reception of the request for the service provider recommendation.
- the health data stream indicates factors that reduce a likelihood of a spread of a disease to users at a physical location of the service provider.
- the risk data stream indicates risk factors that increase the likelihood of the spread of the disease at the physical location of the service provider.
- the device is a user device of a user, wherein the user requests the service provider to procure a product or service of the service provider.
- the device is a service provider device of a second service provider of the trusted network of service providers, wherein the second service provider requests the service provider to partner with the service provider.
- the instructions cause the one or more processors to add the service provider to a list of the trusted network of service providers in response to a determination that the service provider meets the level of heath safety, receive second health safety data associated with a second service provider of the trusted network of service providers, determine, based on an analysis of the second heath safety data, that the second service provider has a particular health safety level less than the level of heath safety, and remove the second service provider from the list of the trusted network of service providers.
- the health safety data associated with the service provider indicates a health level of each of employees associated with the service provider.
- the health safety data associated with the service provider indicates one or more cleaning procedures performed at a physical location of the service provider.
- the health safety data associated with the service provider is received from a health inspector user device of a health inspector, wherein the health safety data indicates a result of a health inspection performed by the health inspector.
- the health safety data includes surveillance video data of a physical location associated with the service provider, wherein the surveillance video data indicates whether one or more health procedures are followed at the physical location.
- the health safety data indicates whether one or more restricted shopping times are offered at a physical location of the service provider for customers associated with a level of personal health safety above a predefined amount.
- the trusted network of service providers include at least one of an airline, a hotel, a car rental service, a brick and mortar retail store, or a commercial business.
- the risk data indicates disease infection levels in a geographic area associated with the service provider.
- the risk data indicates a number of infected individuals within a physical location of the service provider.
- the health safety data indicates whether the employees have previously contracted and recovered from an infectious disease.
- the instructions cause the one or more processors to receive a manifest from the service provider, the manifest indicating at least one of the health safety data or the risk data, receive a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the health safety data or the risk data, validate the manifest received from the service provider with the second manifest of the blockchain, and determine that the service provider meets a level of heath safety by correlating the health safety data with the risk data in response to validating the manifest.
- the second manifest includes a first signature of the service provider and a second signature of the external system.
- the instructions cause the one or more processors to determine that the first signature is authentic with a first public key of the service provider and determine that the second signature is authentic with a second public key of the external system.
- the second manifest is hashed by the external system.
- the instructions cause the one or more processors to validate the manifest received from the service provider by determining that the manifest matches the second manifest by hashing the manifest received from the service provider and comparing a hash of the manifest received from the service provider to the second manifest hashed by the external system.
- Another implementation of the present disclosure is a system including one or more memory devices having instructions thereon, that, when executed by one or more processors, cause the one or more processors to store a trusted network of service providers in the one or more memory devices, the trusted network of service providers including service providers and receive a request by a first service provider of the service providers for risk data of a second service provider of the service providers.
- the instructions cause the one or more processors to determine that the first service provider is assigned access to the risk data of the second service provider and provide the first service provider the risk data of the second service provider in response to a determination that the first service provider is assigned access to the risk data of the second service provider.
- the instructions cause the one or more processors to receive a request by the second service provider for first risk data of the first service provider, determine that the second service provider is assigned access to the first risk data of the first service provider, and provide the second service provider the first risk data of the first service provider in response to a particular determination that the second service provider is assigned access to the first risk data of the first service provider.
- the risk data indicates a risk level associated with an asset of the second service provider.
- the risk level indicates risk associated with a physical room associated with the second service provider, a physical location associated with the second service provider, or a vehicle associated with the second service provider.
- the risk data includes health data that indicates factors that reduce a likelihood of a spread of a disease to users at a physical location of the second service provider. In some embodiments, the risk data includes risk related data that indicates risk factors that increase the likelihood of the spread of the disease at the physical location of the second service provider.
- the trusted network of service providers indicates that the first service provider is granted access to a first set of service providers of the service providers and is denied access to a second set of service providers of the service providers.
- Another implementation of the present disclosure is a method including receiving, by a processing circuit, a request from a service provider to be added to a trusted network of service providers and receiving, by the processing circuit, health safety data of a health data stream associated with the service provider and risk data of a risk data stream indicating risk levels associated with the service provider.
- the method includes determining, by the processing circuit, that the service provider meets a level of heath safety by correlating the health safety data of the health data stream with the risk data of the risk data stream, receiving, by the processing circuit, a request by the service provider for risk data of a second service provider of the trusted network of service providers, determining, by the processing circuit, that the service provider is assigned access to the risk data of the second service provider, and providing, by the processing circuit, the service provider the risk data of the second service provider in response to a determination that the service provider is assigned access to the risk data of the second service provider.
- the health data stream indicates factors that reduce a likelihood of a spread of a disease to users at a physical location of the service provider.
- the risk data stream indicates risk factors that increase the likelihood of the spread of the disease at the physical location of the service provider.
- the method includes adding, by the processing circuit, the service provider to a list of the trusted network of service providers in response to a second determination that the service provider meets the level of heath safety, receiving, by the processing circuit, second health safety data associated with the second service provider of the trusted network of service providers, determining, by the processing circuit, based on an analysis of the second heath safety data, that the second service provider has a particular health safety level less than the level of heath safety, and removing, by the processing circuit, the second service provider from the list of the trusted network of service providers.
- the method includes receiving, by the processing circuit, a manifest from the service provider, the manifest indicating at least one of the health safety data or the risk data, receiving, by the processing circuit, a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the health safety data or the risk data, validating, by the processing circuit, the manifest received from the service provider with the second manifest of the blockchain, and determining, by the processing circuit, that the service provider meets a level of heath safety by correlating the health safety data with the risk data in response to validating the manifest.
- One implementation of the present disclosure is a system including one or more memory devices having instructions stored thereon, that, when executed by one or more processors, cause the one or more processors to receive a request from a user device of a user to add the user to a trusted user service associated with a provider of goods or services and receive health behavior data of a health behavior data stream associated with behavior relating to a spread of an infectious disease at a physical location.
- the instructions cause the one or more processors to determine whether the user meets one or more health safety levels based on the health behavior data stream, add the user to the trusted user service in response to a determination that the user meets the one or more health safety levels, and generate an access indication of access to the physical location at one or more particular times in response to the determination that the user meets the one or more health safety levels.
- the instructions cause the one or more processors to provide the access indication to a user device of the user, wherein the access indication is at least one of a credential, an access password, or an identifier.
- the instructions cause the one or more processors to add the user to a trusted shopper list of trusted shoppers in response to the determination that the user meets one or more health safety rules, receive second health behavior data associated with a second user of the trusted shopper list of trusted shoppers, determine, based on an analysis of the second heath behavior data, that the second user has broken one or more health safety rules, and remove the second user from the trusted shopper list of trusted shoppers in response to a second determination that the second user has broken one or more health safety rules.
- the instructions cause the one or more processors to receive a service provider request for a particular service provider of a list of trusted service providers from the user device, verify that the user of the user device has access to the list of trusted service provider, and provide an indication of the particular service provider to the user device.
- the instructions cause the one or more processors to receive risk data of a risk data stream indicating risk levels associated with the user. In some embodiments, the instructions cause the one or more processors to determine whether the user meets one or more health safety levels by correlating the health behavior data of the health behavior data stream with the risk data of the risk data stream.
- the risk data indicates at least one of disease infection levels of one or more geographic areas that the user has been present within during a particular period of time or contact of the user with one or more infected persons.
- the access indication is associated with access to the physical location at one or more restricted hours restricted for members of the trusted user service.
- the instructions cause the one or more processors to provide an identity of the user to a physical location system of the physical location, wherein the physical location system is configured to receive the identity of the user via one or more sensing devices of the physical location and operate one or more doors to provide the user access to the physical location based on the identity of the user.
- the health behavior data is received from a surveillance system and is video data of the user at the physical location.
- the instructions cause the one or more processors to determine whether the health behavior data meets one or more health safety levels by analyzing the video data to determine whether the user follows one or more health safety rules within the physical location.
- the one or more health safety rules include one or more social distancing guidelines, use of a mask, or use of sanitization within the physical location.
- the instructions cause the one or more processors to receive a manifest from a user device of the user representing a travel activity performed by the user, receive a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the travel activity performed by the user, validate the manifest received from the user device with the second manifest of the blockchain, and determine whether the user meets one or more health safety levels based on the health behavior data stream and the travel activity.
- the second manifest includes a first signature of the user device and a second signature of the external system.
- the instructions cause the one or more processors to determine that the first signature is authentic with a first public key of the user device and determine that the second signature is authentic with a second public key of the external system.
- the second manifest is hashed by the external system.
- the instructions cause the one or more processors to validate the manifest received from the user device by determining that the manifest matches the second manifest by hashing the manifest received from the user device and comparing a hash of the manifest received from the user device to the second manifest hashed by the external system.
- Another implementation of the present disclosure is a method including receiving, by a processing circuit, a request from a user device of a user to add the user to a trusted user service associated with a provider of goods or services, receiving, by the processing circuit, health behavior data of a health behavior data stream associated with behavior relating to a spread of an infectious disease at a physical location, determining, by the processing circuit, whether the user meets one or more health safety levels based on the health behavior data, adding, by the processing circuit, the user to the trusted user service in response to a determination that the user meets the one or more health safety levels, and generating, by the processing circuit, an access indication for access to the physical location at one or more particular times in response to the determination that the user meets the one or more health safety levels.
- the method includes adding, by the processing circuit, the user to a trusted shopper list of trusted shoppers in response to the determination that the user meets one or more health safety rules, receiving, by the processing circuit, second health behavior data associated with a second user of the trusted shopper list of trusted shoppers, determining, by the processing circuit, based on an analysis of the second heath behavior data, that the second user has broken one or more health safety rules, and removing, by the processing circuit, the second user from the trusted shopper list of trusted shoppers in response to a second determination that the second user has broken one or more health safety rules.
- the method includes receiving, by the processing circuit, a service provider request for a particular service provider of a list of trusted service providers from the user device, verifying, by the processing circuit, that the user of the user device has access to the list of trusted service providers, and providing, by the processing circuit, an indication of the particular service provider to the user device.
- the risk data indicates at least one of disease infection levels of one or more geographic areas that the user has been present within during a particular period of time or contact of the user with one or more infected persons.
- the access indication is associated with access to the physical location at one or more restricted hours restricted for members of the trusted user service.
- the health behavior data is received from a surveillance system and is video data of the user at the physical location.
- the method further includes determining, by the processing circuit, whether the health behavior data meets the one or more health safety levels by analyzing the video data to determine whether the user follows one or more health safety rules within the physical location.
- the one or more health safety rules include one or more social distancing guidelines, use of a mask, or use of sanitization within the physical location.
- the system includes one or more processors configured to execute the instructions to receive a request from a user device of a user to add the user to a trusted user service associated with a provider of goods or services, receive a travel history of the user indicating destinations that the user has traveled to, determine whether the user meets one or more health safety levels by analyzing the travel history of the user, add the user to the trusted user service in response to a determination that the user meets the one or more health safety levels, and generate an access indication for the user to access the physical location at one or more particular times in response to the determination that the user meets the one or more health safety levels.
- the instructions cause the one or more processors to add the user to a trusted shopper list of trusted shoppers in response to the determination that the user meets one or more health safety rules, receive second health behavior data associated with a second user of the trusted shopper list of trusted shoppers, determine, based on an analysis of the second heath behavior data, that the second user has broken the one or more health safety rules, and remove the second user from the trusted shopper list of trusted shoppers in response to a second determination that the second user has broken the one or more health safety rules.
- the personal risk data indicates whether the user has previously contracted and recovered from the infectious disease.
- the instructions cause the one or more processors to receive a manifest from a user device of the user representing a travel activity performed by the user, receive a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the travel activity performed by the user, and validate the manifest received from the user device with the second manifest of the blockchain.
- the second manifest includes a first signature of the user device and a second signature of the external system.
- the instructions cause the one or more processors to determine that the first signature is authentic with a first public key of the user device and determine that the second signature is authentic with a second public key of the external system.
- the second manifest is hashed by the external system.
- the instructions cause the one or more processors to validate the manifest received from the user device by determining that the manifest matches the second manifest by hashing the manifest received from the user device and comparing a hash of the manifest received from the user device to the second manifest hashed by the external system.
- FIG. 1 is a block diagram of a system including a risk analytics system that receives health data streams and risk data streams for analyzing disease related risk including a travel application, a consumer service application, and a trusted service provider application, according to an exemplary embodiment.
- FIG. 2 is a block diagram of the travel application of FIG. 1 in greater detail, according to an exemplary embodiment.
- FIG. 3 is a flow diagram of a process of generating and dynamically updating a travel itinerary based on disease related risk that can be performed by the travel application of FIGS. 1-2 , according to an exemplary embodiment.
- FIG. 4 is a block diagram of the trusted service provider application of FIG. 1 in greater detail, according to an exemplary embodiment.
- FIG. 5 is a flow diagram of a process of managing a trusted network of service providers based on disease related risk that can be performed by the trusted service provider application of FIGS. 1 and 4 , according to an exemplary embodiment.
- FIG. 6 is a block diagram of the consumer service application of FIG. 1 in greater detail, according to an exemplary embodiment.
- FIG. 7 is a flow diagram of a process of managing a trusted consumer service based on disease related risk that can be performed by the consumer service application of FIGS. 1 and 6 , according to an exemplary embodiment.
- FIG. 8 is a flow diagram of a process of generating an infection travel risk score for a user by the travel application of FIG. 1 , according to an exemplary embodiment.
- FIG. 9 is a block diagram of the risk analytics system of FIG. 1 performing risk scoring for an external system, according to an exemplary embodiment.
- FIG. 10 is a flow diagram of a process of performing risk scoring by the risk analytics system of FIG. 1 for the external system of FIG. 9 , according to an exemplary embodiment.
- FIG. 11 is a block diagram of the risk analytics system of FIG. 1 sharing infectious disease data with another user device or the external system of FIG. 9 based on a command received from a user device, according to an exemplary embodiment.
- FIG. 12 is a flow diagram of a process of sharing infectious disease data with another user device or the external system of FIG. 9 based on a command received from the user device of FIG. 11 , according to an exemplary embodiment.
- FIG. 13 is a block diagram of a manifest indicating user activity of the user of the user device of FIG. 11 being added to a blockchain database, according to an exemplary embodiment.
- FIG. 14 is a flow diagram of a process where the manifest of FIG. 13 is added to the blockchain database of FIG. 13 and used to verify user activity of the user of the user device of FIG. 11 , according to an exemplary embodiment.
- the systems and methods described herein relate to dynamic travel planning based on disease related risk.
- the systems can generate an itinerary that plans a trip for a user in such a manner that the health of the user is taken into account with respect to disease related risks.
- the systems can generate the itinerary to include plans that utilize transportation options, overnight accommodation options, and/or other travel decisions that pose a low risk level to the user.
- the itinerary can be updated dynamically by the system so that as factors affecting a risk level of the user change during the traveling of the user, suggested updates to the travel itinerary can be received and acted upon by the user.
- the system can evaluate risk levels associated with the travel of the user while the user is traveling. This can result in an evolving indication of risk that is easily understandable by a user. Furthermore, because the system can cause user interfaces to display indicators such as the evolving risk and the suggested updates to the travel itinerary, a user can easily understand what actions the user can take to reduce the infection risk that the user is exposed to during their trip.
- the systems and methods can further relate to managing a trusted service provider network based on disease related risk.
- the system can receive health related data streams associated with a particular service provider.
- the health related data streams can indicate the social distancing, disinfection, and/or screening procedures that a service provider uses for their rental cars, hotel rooms, physical shopping stores, etc.
- the system can receive risk data of a risk data stream.
- the risk data can indicate risk levels associated with the service provider, for example, disease infection levels in a geographic area that the service provider operations, number of infected individuals that have visited a physical store or used a car or hotel room of the service provider, and/or any other risk related data.
- the system can determine whether to add or remove the service provider from a trusted service provider network.
- the system can correlate the health and risk data streams. This correlation can allow for a determination of risk levels of the service provider that allows for more accurate and granular insights into the risk of the service provider than would be identified from the health data stream or the risk data stream individually.
- the trusted service provider network can include highly reliable service providers that follow protocols and pose a low risk to customer or business partners, other entities that wish to use a reliable service provider can consult the trusted service provider network to find a safe and reliable service provider. For example, a customer looking for a car rental service could query the trusted network of service providers to identify a safe car rental service.
- the systems and methods described herein relate to a preferred consumer service application.
- the system can be configured to receive a request from a user to be added to a preferred consumer service to acquire benefits offered to members of the preferred consumer service, e.g., price discounts, access to restricted shopping times at a physical store, etc.
- the system can be configured to receive data of a health data stream associated with the user and risk data of a risk data stream associated with the user. Again, the correlation of health and risk data can uncover greater insight into risk levels associated with the user that would not be identified with the health or risk data individually.
- the health data stream can indicate whether the user follows social distancing practices, disinfection and hand washing practices, mask wearing policies, etc.
- the risk data can be data of a risk data stream can indicate whether the user has come into contact with infected individuals, lives or works in a high infection geographic area, has recently visited a country with a high infection level, and/or any other risk factor. Based on the health data stream and the risk data stream, the systems and methods can add or remove users from the preferred consumer service.
- a system 100 including a risk analytics system 110 that receives health data streams and risk data streams for analyzing disease related risk including a travel application 124 , a preferred consumer service application 126 , and a trusted service provider application 128 is shown, according to an exemplary embodiment.
- the risk analytics system 110 includes a data ingestion service 130 and risk application 118 that include the travel application 124 , the preferred consumer service application 126 , and the trusted service provider application 128 .
- the data ingestion service 130 can be configured to ingest health data of health data streams and risk data of risk data streams. Furthermore, the data ingestion service can ingest threat events. The ingested data can be provide to the risk application 118 .
- the data ingestion service can include one or more memories 132 and one or more processors 134 .
- the processors 134 can be a general purpose or specific purpose processor, an application specific integrated circuit (ASIC), one or more field programmable gate arrays (FPGAs), a group of processing components, or other suitable processing components.
- the processors 134 may be configured to execute computer code and/or instructions stored in the memories 132 or received from other computer readable media (e.g., CDROM, network storage, a remote server, etc.).
- the memories 132 can include one or more devices (e.g., memory units, memory devices, storage devices, etc.) for storing data and/or computer code for completing and/or facilitating the various processes described in the present disclosure.
- the memories 132 can include random access memory (RAM), read-only memory (ROM), hard drive storage, temporary storage, non-volatile memory, flash memory, optical memory, or any other suitable memory for storing software objects and/or computer instructions.
- the memories 132 can include database components, object code components, script components, or any other type of information structure for supporting the various activities and information structures described in the present disclosure.
- the memories 132 can be communicably connected to the processors 134 and can include computer code for executing (e.g., by the processors 134 ) one or more processes described herein.
- the data ingestion service 130 can receive the threat events, the health data streams, and the risk data streams via network 104 .
- the network 104 can communicatively couple the devices and systems of system 100 .
- the network 104 is at least one of and/or a combination of a Wi-Fi network, a wired Ethernet network, a ZigBee network, a Bluetooth network, and/or any other wireless network.
- the network 104 may be a local area network or a wide area network (e.g., the Internet, a building WAN, etc.) and may use a variety of communications protocols (e.g., BACnet, IP, LON, etc.).
- the network 104 may include routers, modems, servers, cell towers, satellites, and/or network switches.
- the network 104 may be a combination of wired and wireless networks.
- the system 100 includes a contact tracing system 116 , user devices 115 , transportation systems 106 , building meeting systems 108 , health data systems 111 , physical store system 112 , surveillance system 114 , and threat event data sources 102 .
- the threat event data sources 102 can be data sources that provide a notification of a threat occurring.
- the threat event data sources 102 could be dataminr, NC4, Twitter, social media data, a news outlet, etc.
- the threat event data sources 102 can provide indications of threat events to the data ingestion service 130 , for example, an indication of a disease outbreak, an indication of a protest occurring, an indication of a natural disaster, that a user has caught a disease, that a sporting event is occurring, etc.
- the contact tracing system 116 can be a system or group of systems that monitor and track infected individuals and monitor and track other individuals who come into contact with the infected individuals.
- the contact tracing system 116 can be a centralized system that aggregates and stores data or a distributed system, e.g., multiple user devices running a local application.
- the contact tracing system 116 can be a user opt-in system where users allow for their location to be tracked and provide an indication to the contact tracing system 116 regarding whether they are experiencing disease symptoms, have been hospitalized due to a disease, and/or have tested positive for a disease.
- the contact tracing system 116 can be managed by the risk analytics system 110 or external to the contact tracing system 116 .
- the contact tracing system 116 can be managed by another system, e.g., the contact tracing system 116 could be a Google contact tracing system or an Apple contact tracing system.
- the internal or external contact tracing could provide contact tracing data that the contact tracing system 116 is configured to use to generate risk scores for users and/or locations, in some embodiments.
- the contact tracing can be performed through peer to peer communication, e.g., ad-hoc communication between two user devices that identify an interaction between two users.
- the contact tracing can be performed with badges that communicate with building scanning systems.
- a the contact tracing system uses vehicle tracking data, e.g., GPS data of the vehicle and/or driver detection and/or identification.
- the user devices 115 can be personal device of a user.
- the user devices can be smart phones, laptops, tablets, etc.
- the user devices 115 can be carried by a user and configured by the user to provide location data indicating a location of a user device to the data ingestion service 130 .
- the user devices 115 can include display devices, e.g., touch-screens, light emitting diode (LED) displays, organic light emitting diode (OLED) display, a liquid crystal display (LCD), etc.
- the user devices 115 can further include interface devices, e.g., capacitive or resistive touch inputs, keyboards, mouse, a remote, etc.
- the transportation systems 106 can provide transportation data to the risk analytics system 110 .
- the transportation systems 106 can be an airline system, a train system, a bus system, a taxi system, a car rental system, a ride share system, and/or any other type of system.
- the transportation system is an airline system
- the airline system can provide risk data, e.g., data that indicates an increased risk of infection, such as an indication of flight lengths, layovers, distances between terminals and/or gates, number of booked passengers, etc. to the risk analytics system 110 .
- the building meeting systems 108 can be a system that books meeting rooms within a building and/or buildings.
- the building meeting systems 108 can provide the risk analytics system 110 with risk data regarding building meeting rooms of a building, e.g., room size, room ventilation rates, room capacity, time since the room was last occupied, etc.
- the building meeting systems 108 can provide health data associated with the meeting rooms, room cleaning or disinfection frequency, time since last disinfection, etc.
- the health data systems 111 can be systems that aggregate disease related infection levels for geographic areas (e.g., risk data streams) and provide the information to the risk analytics system 110 .
- the health data systems 111 can be Center For Disease Control And Prevention (CDC) systems, data published by John Hopkins University systems, data published by the World Health Organization (WHO), and/or any other health data system.
- the data published by the health data system 100 can be real-time data that changes as disease infections are detected and reported by hospitals and/or disease testing facilities.
- the physical store system 112 can be systems of a physical place of business, e.g., a retail store, a restaurant, a car rental facility, and/or any other type of physical brick and mortar store.
- the physical store system 112 can provide health related data, e.g., indications of social distancing practiced at the store, signs and instructions for customers to follow within the building (e.g., standing six feet apart, wearing a mask, etc.), indications of cleaning and disinfection practices, etc.
- the surveillance system 114 can be a system of one or more cameras, video storage and/or analysis systems, etc.
- the surveillance system 114 can integrate with and/or communicate to the physical store system 112 .
- the surveillance system 114 can be located at a building, e.g., a physical store.
- the surveillance system 114 can identify, based on captured video data, whether employees and/or customers follow social distancing practices, cleaning and/or disinfection practices, wear masks, etc.
- the risk application 118 include the travel application 124 , the preferred consumer service application 126 , and the trusted service provider application 128 . These application 124 - 128 can be executed by one or more processors 122 and stored on one or more memories 120 .
- the one or more processors 122 can be the same as or similar to the one or more processors 134 while the one or more memories 120 can be the same as or similar to the memories 132 .
- the travel application 124 can be a system for planning travel for a user, an employee of a company, a subscribed individual, etc.
- the travel application 124 can be configured to generate and/or analyze travel plans based on real time risk to facilitate proper travel planning and/or mid-travel plan deviation.
- the travel application 124 can receive an indication of one or more destinations and time data from the user devices 115 and generate a travel itinerary (e.g., a data set including one or more selected transportation methods, one or more selected overnight stay reservations, one or more selected restaurants, etc.).
- a travel itinerary e.g., a data set including one or more selected transportation methods, one or more selected overnight stay reservations, one or more selected restaurants, etc.
- the travel application 124 can provide the travel itinerary to the contact tracing system 116 for the contact tracing system 116 to operate one or contact tracing purposes.
- the travel application 124 can analyze the health data streams and/or risk data streams received from the network 104 to determine whether any deviations should be taken to the travel itinerary while the user is traveling.
- the health data streams and/or the risk data streams are combined within a single data stream.
- real-time risk related data or threat event data can indicate that a deviation in travel would lower a risk score of the user.
- the travel application 124 could calculate a risk score associated with the user flying a particular airline through a particular airport, dining at a restaurant, and sleeping at a hotel.
- the travel application 124 could generate a suggested alternative restaurant for the user to dine in and cause a user interface of a user device to display the suggestion to be accepted or rejected by the user via one or more accept or reject interface elements displayed on the user interface. Furthermore, the travel application 124 could reschedule a meeting room from a first room to a second room in response to a detection that the first room has not been sanitized, an infected individual has recently been present in the first room, etc.
- the travel application 124 can score multiple routes of travel based on the mode of transportation and a destination. One or multiple routes and/or the score for each route can be provided to a user for review to select a route that is safest where it is unlikely that the user will catch an infectious disease. Each route can be scored based on the travel mode itself in addition to restaurants, hotels, rest stops, etc. along the route. The route with the lowest risk score or the highest safety score can be provided to the user. In some embodiments, the travel application 124 can recommend that the user skip having dinner at a certain hotel or in a certain city, stay in a hotel outside of a city with a high infection rate, skip visiting a city, etc.
- the travel application 124 can generate a travel itinerary based on multiple disparate factors, the travel mode itself (e.g., plane, train, bus, car), the hotels along the routes, the restaurants, along the routes, the infection levels of the various cities along the routes and/or the destinations, etc.
- the travel mode itself (e.g., plane, train, bus, car)
- the hotels along the routes e.g., the restaurants, along the routes, the infection levels of the various cities along the routes and/or the destinations, etc.
- the preferred consumer service application 126 can manage a service that one or more users subscribe to, e.g., via the user devices 115 .
- the service can be a subscription service that provides benefits to subscribed users, e.g., price discounts on products or service, access to restricted shopping hours in a physical store, exclusive product or service previews, early product or service access, etc.
- the access to the restricted shopping hours, or other access to an asset of a goods or service provider could be a credential, a password or an identifier of the user.
- the preferred consumer service application 126 can receive health data streams and/or risk data streams associated with a user to determine whether the user should be added to the preferred consumer service and/or granted the discounts of the preferred consumer service.
- the surveillance system 114 can indicate whether the user has worn a mask when visiting a physical store, has practiced social distancing in the physical store, etc. and should be granted access to price discounts.
- the contact tracing system 116 can provide risk data that indicates whether the user has been in contact with infected individuals and should be provided access to the restricted shopping hours.
- the preferred consumer service application 126 can generate utilize a travel history (e.g., a collection of travel data, contact tracing data, hotel receipts, restaurant receipts, user reported data, etc.) of a user to determine whether to classify the user as a preferred consumer.
- a travel history e.g., a collection of travel data, contact tracing data, hotel receipts, restaurant receipts, user reported data, etc.
- the preferred consumer service application 126 is configured to determine an expected risk level of a user of a planned trip to an actual risk level resulting from actual travel decisions made during the trip (e.g., what the user did during the trip, where the user traveled, where the user stayed, who the user came into contact with, etc.). Based on the difference between the expected risk level and the actual risk level, the preferred consumer service application 126 can determine whether the user should be added to, retained in, or removed from a preferred consumer list.
- the trusted service provider application 128 can manage a network of trusted service providers based on health data streams and/or risk data streams associated with the trusted service providers.
- the application 128 can analyze data associated with the service provider, e.g., what disinfection practices are performed by the service provider for their store, rental cars, hotel rooms, etc. Whether the service provider is located in a high infection area or a low infection area (e.g., is located in a geographic area associated with an infection level above or below particular amounts), etc. If the trusted service provider meets one or more requirements as determined by the health data streams and the risk data streams, the trusted service provider can be added by the trusted service provider application 128 to a network of trusted service providers list. Partnering systems and/or consumer systems can query the trusted service provider application 128 for a trusted service provider and can be recommended a trusted service provider by the trusted service provider application 128 .
- the trusted service provider application 128 scores a building or buildings of a service provider to determine whether to add the service provide to the trusted service provider application 128 .
- the application 128 can generate a safety score associated with communities, buildings, etc.
- the application 128 can be configured to generate a score for a building based on building sanitation practices, HVAC air handling practices, fire system practices, screening practices, etc.
- the applications 124 - 128 can communicate with each other to exchange data.
- the travel data of users stored by the travel application 124 can be provided to the preferred consumer service application 126 to monitor user movement if the user has given approval for their movement to be tracked.
- the travel application 124 can make travel determinations based on whether transportation, hotels, car rental services, restaurants, etc. are trusted and safe as can be indicated by the trusted service provider application 128 .
- the risk application 118 can exchange data with the systems 106 - 116 .
- This can form a community of companies, e.g., companies that are trusted services as identified by the trusted service provider application 128 .
- This can create a group of partner companies and/or a consortium of companies.
- travel data of the travel application 124 can be shared with the contact tracing system 116 .
- the travel application 124 can receive user input from a user device 210 .
- the user device 210 can be one of, or similar to the user devices 115 .
- the user device 210 can be a smartphone and can include a touchscreen for viewing data and/or providing input.
- a user can define one or more travel destinations, one or more travel dates and/or times, departure times, arrival times, food preferences, overnight stay accommodation preferences, etc. This data can be provided as the user input to the travel application 124 .
- An itinerary generator 202 of the travel application 124 can receive transportation data from the transportation systems, 106 , threat events from the threat event data sources 102 , and location based health data from the health data systems 111 .
- the itinerary generator 202 can generate a travel itinerary 206 based on the destinations provided by the user and the data received from the systems 106 - 115 .
- the itinerary generator 202 can analyze legs of a flight, legs of a travel plan, real time contact tracing of other people in an area, risk factors associated with varying layovers, length of layovers, distance between flight gates, likelihood of needing to eat, social distancing practice scores in airports, infection levels of various geographic locations, etc. to select transportation options for the itinerary 208 .
- the itinerary generator 202 can calculate a risk score associated with multiple possible transportation options and weight each score based on risk factors such as a number of stops since each stop increases contact risk, e.g., waiting in new lines with new people. Furthermore, for rideshare or car rental options, the length of the ride may be considered in risk that affects the risk score of the itineraries. Furthermore, an age of a user associated with the user device 210 and/or the presence of preexisting conditions can be considered by the itinerary generator 202 in generating the itinerary 206 . Some users, e.g., young users without any preexisting health conditions, may have a higher risk tolerance than older users with preexisting health conditions.
- the risk data is contact tracing data received from the contact tracing system 116 .
- the contact tracing data indicates one or more past locations and one or more future planned locations of one or multiple different people infected by a disease.
- the itinerary generator 202 can be configured to generate the travel itinerary 206 to include one or more transportation selections, transportation routes, and/or hotel accommodations that avoid the one or more past locations and the one or more future locations of the person infected by the disease. This reduces a risk level of the traveling user.
- the real-time suggestion generator 200 can generate updates to the itinerary 206 that avoid the locations of the infected individuals, e.g., avoid getting on a plane that an infected individuals is on, avoid a hotel that a high number of infected individuals are staying at, etc.
- the itinerary generator 202 can be configured to generate a risk value associated with each of the dining options and select a dining option with a lowest risk value and/or with a risk value less than a predefined amount.
- the itinerary generator 202 can select the dining option based on a risk toleration level of a user and one or more dining preferences of the user.
- the risk data can indicate numbers of infections in a geographic area that the restaurant is located in, whether infected individuals have or will go to the restaurant, etc.
- the real-time suggestion generator 200 can generate real-time travel suggestions 204 that recommend different restaurants in response a risk level for a planned restaurant exceeds a particular level.
- the itinerary generator 202 can be configured to generate a risk value for each of multiple overnight stay accommodation options.
- the itinerary generator 202 can cause the itinerary 206 to include selected overnight stay accommodations that reflect risk values less than a particular amount.
- the itinerary generator 202 can identify multiple price ranges for accommodation options in a desired geographic destination regions and rank the accommodation options in terms of risk.
- the risk data can indicate infection levels in the area that each accommodation is located, whether infected individuals have, are, or will be staying the accommodation, etc.
- health data such as disinfection policies of each accommodation can be taken into account by the itinerary generator 202 .
- the real-time suggestion generator 200 can generate updates to the accommodations, e.g., replacement accommodations.
- the itinerary generator 202 can generate a travel plan that avoids stopping in, or traveling through, one or more high infection geographic areas. For example, based on the location based health data received from the health data systems 111 , the itinerary generator 202 can identify what flights, busses, or trains that stop, transfer, or move through geographic areas associated with high risk. The itinerary generator 202 can generate a travel plan including transportation selections that avoid the geographic areas with infection levels above a particular amount and instead route transportation through low risk geographic areas, geographic areas that have a lower level of infection risk than the high risk geographic areas.
- the real-time suggestion generator 200 can be configured to generate the real-time travel suggestions 204 during travel of the user associated with the user device 210 .
- the real-time suggestion generator 200 can receive real-time risk data streams, e.g., from the systems 106 - 116 that indicates changes or developments in risk.
- the real-time travel suggestions 204 can indicate one or more changes to transportation, restaurants, hotels, etc. that mitigate or reduce risk levels for the itinerary 206 of the user associated with the user device 210 .
- the real-time suggestion generator 200 can determine that the user will have an overlapping contact in an airport, on a plane, within a hotel within an infected person. To avoid making contact with the infected person or persons, the real-time suggestion generator 200 can recommend alternative transportation, restaurants, or overnight accommodations that avoid contact with individuals or reduce a number of infected individuals that the user associated with the user device 210 may come into contact with.
- the real-time suggestion generator 200 can be configured to predictive a level of separation from infected persons during travel to determine a risk score and, based on the risk score, generate the real-time travel suggestions 204 .
- the real-time travel suggestions 204 are based on location data received from the user device 210 and the location based health data received from the health data systems 111 . For example, if a user stops at a restaurant in a geographic area associated with high infection rates (e.g., there is a hospital blocks from the restaurants with a high number of hospitalized infected persons) which can be determined by the real-time suggestion generator 200 from the location data of the user device 210 and the location based health data of the health data systems 111 , the real-time suggestion generator 200 can generate a suggestion to avoid the restaurant.
- high infection rates e.g., there is a hospital blocks from the restaurants with a high number of hospitalized infected persons
- the real-time travel suggestions 204 are suggestions to adjust certain legs of travel, change a travel time (e.g., shift by a day or week), or utilize risk mitigation (e.g., use of a mast, sanitization, social distancing, etc.)
- the travel application 124 can receive a planned activity from the user device 210 and score the activity with a risk score. For example, the user may ask a question, “How risky is it to dine downtown in Chicago tonight?” and the travel application 124 can respond to the question by calculating a risk score for Chicago dining based on infection levels in the city, based on contact traces in an area, whether the user plans to dine indoors or outdoors, sanitizing scores for restaurants, ratings for social distancing practices, levels of law enforcement, predicted weather (e.g., whether indoor or outdoor seating will be available).
- the risk score for the activity can provide an indication of how risky planned behaviors are.
- FIG. 3 a flow diagram of a process 300 of generating and dynamically updating a travel itinerary based on disease related risk that can be performed by the travel application 124 is shown, according to an exemplary embodiment.
- the travel application 124 is configured to perform some or all of the steps of the process 300 .
- any computing device as described herein can be configured to perform the process 300 .
- the travel application 124 can receive travel data associated with a travel plan of a user, the travel plan indicating one or more travel locations.
- the travel plan can indicate one or more destinations that the user will be visiting and approximate or definite times and/or days that the user needs to arrive in each destination.
- the travel plan can indicate preferred transportation options (e.g., rental car, airplane, bus, etc.), food preferences (e.g., vegan or vegetarian dining, preference for certain types of food, etc.), and/or any other travel preference of the user.
- the travel application 124 can receive risk data associated with one or more transportation methods to the one or more travel locations. For example, the travel application 124 can determine that a direct bus route from a first city to another city is less risky than a flight with multiple connections from the first city to the second city. The travel application 124 could select a first flight over a second flight in response to determining that infected individuals are booked for the second flight. Furthermore, the travel application 124 can select hotels and/or restaurants based on risk data associate with the hotels and restaurants.
- the travel application 124 generates the travel itinerary for the user.
- the travel itinerary can include one or more selected travel methods (e.g., a flight, a rental car, a bus, etc.), one or more restaurants, one or more over night stay accommodations, etc.
- the user can review and edit the itinerary. Any changes the user makes to the itinerary can be associated with risk scores that the travel application 124 can provide to the user so that the user understands increases or decreases in risk associated with the actions.
- the user can accept the travel itinerary and the travel application 124 can book the travel methods, restaurants, and hotels for the user.
- the travel application 124 generates an infection travel risk score.
- the infection travel risk score can be displayed to a user via the user device 210 to provide a user with an indication of their travel risk.
- the infection travel risk score can be a value, level, or other indicator that indicates a risk associated with catching a disease.
- the infection travel risk score can be generated based on risk data indicating levels of risk associated with travel destinations of the user.
- the risk data can indicate infection levels associated with the travel destinations, population levels of the destinations, disease prevention practices performed at the destinations (e.g., lockdowns, use of masks, etc.), etc.
- the travel application 124 can generate the travel risk score.
- the travel application 124 can generate the travel risk score based on personal risk data associated with the user.
- the personal risk data can indicate a risk associated with the user of the user device 210 .
- the personal risk data can indicate the age of the user, the body mass index (BMI) of the user, medical conditions of the user (e.g., asthma, heart related problems), and/or activities performed by the user (e.g., whether the user frequently exercises, smokes, adheres to a vegan or vegetarian diet, consumes alcohol, etc.).
- BMI body mass index
- the travel risk score may be higher for a user that has asthma and is older than a particular age.
- an infection travel risk scores of a user that exercises frequently and is younger than the particular age may have a lower risk score.
- the infection travel risk score changes overtime as data is collected.
- the travel application 124 can generate suggestions to update the travel plan of the user based on change in the infection risk score. For example, if the infection travel risk score increases to a value greater than a particular amount caused by change in the destination risk data or the personal risk data, the travel application 124 can generate a suggested update to the travel plan.
- the travel application 124 can generate multiple different travel routes from a travel plan of a user indicating an originating location and one or more travel destinations.
- the travel application 124 can score each route with an infection route risk score indicating the level of risk that a user experiences when traveling on the route.
- the infection route risk score can indicate infection risk levels associated with each travel route and/or personal risk data associated with the user.
- the travel application 124 can generate a suggestion to travel on one route of the routes associated with a lowest infection route risk score, can generate a user interface indicating each travel route and the score of each route, and/or can generate a list of the routes sorted in order of lowest risk score to highest risk score.
- the travel application 124 can receive risk updates associated with the travel itinerary during travel by the user.
- the updates may be threat events such as the rapid spread of a disease in a geographic area, an indication that an infected user has booked a hotel room in a hotel that the user is staying in, and/or any other update to risk levels associated with the itinerary of the user.
- the travel application 124 can generate one or more travel suggestions for the user that mitigate or reduce the risk updates. For example, if the user plans to stop at a restaurant in a geographic area that has greatly increased in infection levels, the suggestion could be to dine in a geographic area with a lower infection level. Similarly, if a flight is cancelled and a user will need to dwell in an airport for an extended period of time, the suggestion may be to take a direct bus to the destination instead of waiting in the airport. In step 312 , the travel application 124 can update the travel itinerary based on the one or more suggestions in response to receiving user approval of the changes.
- the travel application 124 can generate a summary page.
- the summary page can indicate an original risk score for the tip of the user generated by the travel application 124 and a concluding risk score based on deviations that the user has performed.
- the concluding risk score can indicate what a user has done while traveling, where they have stayed, where they have eaten, and/or what other people the user has come into contact with.
- the trusted service provider application 128 can communicate with service provider systems 400 and 402 .
- the service provider systems 400 and 402 can be retail businesses, car rental businesses, airlines, airports, bus companies, restaurants, catering companies, and/or any other type of service provider.
- the trusted service provider application 128 can receive service provider data from the service provider systems 400 .
- the service provider data can be data of a health data stream associated with the service provider systems 400 and/or risk data streams.
- the service provider data could indicate whether one or more social distancing practices, disinfection practices, and/or any other health related practices are performed by the service provider systems 400 to reduce the risk of spreading disease.
- the risk related data can be an indication of infection levels for geographic areas that stores of the service provider are located, numbers of infected individuals frequenting the stores, and/or any other risk related data.
- the performance analyzer 404 can be configured to analyze the service provider data, e.g., correlate the health data streams and the risk data streams, to determine whether the service provider systems 400 are trusted or are not trusted. Trusted service provider systems can be added or maintained in a trusted provider list 406 while service providers that are not trusted can be removed from the trusted provider list 406 . Furthermore, in some embodiments, the performance analyzer 404 can analyze the health data indicating health practices by each of the service provider systems 400 . Inspection data received form an inspector system 410 can confirm that the health practices that the service provider systems 400 claims to practice are actually practiced.
- a hotel might score each room that people have stayed within based on contact tracing data, temperature measurements, and/or a survey. Each room could be rated based on risk and only low risk rooms rented out to individuals.
- a heat map view could be provided by the hotel to users to determine whether or not to book room sin the hotel and/or what rooms that user would like to book. Based on these health practices, the performance analyzer 404 can determine that the hotel is a trusted service and can add the hotel to the trusted provider list 406 .
- the trusted service providers of the trusted provider list 406 can be configured to share disease related information with each other, facilitate contact tracing, etc. Furthermore, since the service providers of the trusted provider list may all perform health related tests for employees, sanitization of their physical stores, etc., other service providers may likely wish to do business with the service providers since they have been verified as being low health risk businesses. For example, a car service that rents cars can rate each car with a health risk score. If a service provider of the trusted provider list 406 wishes to rent cars from the service provider, as part of the trusted provider list 406 , the car service may rent the service provider low risk score cars.
- the service provider systems 402 and/or the user device 210 may access the trusted provider list 406 if the service provider systems 402 and/or the user of the user device 210 are subscribed to the trusted provider list 406 .
- the service provide selector 408 can receive a query from the service provider systems 402 and/or the user device 210 for a recommended service provider. For example, the query could request recommended hotels or recommended airlines.
- the service provider selector 408 can query the trusted provider list 406 and return the recommended service provider to the service provider systems 402 and/or the user device 210 .
- the service provider systems 402 may consult the trusted provider list 406 to help identify business partners while the user device 210 may consult the list to identify a service provider to purchase a product or service from.
- service providers of the trusted provider list 406 share risk data with each other.
- the risk data could be the health data streams or the risk data streams described with reference to FIG. 1 and elsewhere herein.
- the risk data can indicate the precautions or risks associated with assets of the service providers, e.g., what types of cleaning or health policies are performed at a physical store, whether infected individuals have visited physical sites, rented cars, stayed in hotel rooms, etc.
- one service provider of the trusted provider list 406 can provide a request for risk data for another service provider of the trusted provider list 406 to the application 128 .
- the application 128 can determine whether the one service provider has access to the risk data of the other service provider and response to the one service provider with the risk data in response to determining that the one service provider has access to the other service provider.
- the trusted provider list 406 indicates one or more services providers that each service provider does and does not have risk data access for.
- the risk data that the services providers share indicate risk levels associated with assets of each service provider. For example, the risk level associated with a hotel room, a physical brick and mortar store, a conference room, a rental car, etc. In this regard, one service provider would have the data to make decisions such as reserve the safest hotel rooms, the safest conference rooms, visit the safest physical brick and mortar stores, etc.
- a process 500 of managing a trusted network of service providers based on disease related risk that can be performed by the trusted service provider application 128 is shown, according to an exemplary embodiment.
- the trusted service provider application 128 is configured to perform some or all of the steps of the process 500 .
- any computing device as described herein can be configured to perform the process 500 .
- the trusted service provider application 128 receives a request from a service provider system to be added to a trusted network of service providers.
- the service provider may be an airline, a hotel chain, a hotel location, an airport, a retail store, a retail chain, etc.
- the trusted service provider application 128 can receive health safety performance data associated with the service provider.
- the health safety performance data can include health data of a health data stream and risk data of a risk data stream.
- the health data can indicate performance of the service provider with respect to practicing social distancing, disinfection practices performed by the service provider, employee health testing, etc.
- the risk data can indicate whether the service provider is located in a high infection area, whether the service provider has been frequented by infected individuals, etc.
- the health data and the risk data can be included within, or otherwise indicated by, a manifest.
- the manifest can be the manifest described with reference to FIGS. 13-14 and can be stored by the service provider.
- the trusted service provider application 128 is configured to validate the manifest received from the service provider, in some embodiments, based on another copy of the manifest stored in a blockchain and created by an external system.
- the trusted service provider application 128 can verify a hashed copy of the manifest stored in the blockchain, verify signatures of the service provider and/or the external system, etc. as described with reference to FIGS. 13-14 .
- the trusted service provider application 128 can analyze the safety performance data to determine whether the service provider meets a level of health safety.
- the trusted service provider application 128 can correlate the health data of the health data stream with the risk data of the risk data stream to determine whether the service provider meets the level of safety.
- the trusted service provider application 128 in response to a determination that the service provider meets the safety level, can add the service provider to the trusted network of service providers.
- the trusted service provider application 128 can receive a request from a device for a recommended service provider of the trusted network of service providers.
- the device may be a user device of a user that wishes to purchase a product or service from a trusted service provider.
- the device is a device of another service provider that would like to partner with a trusted service provider of the trusted service provider network.
- the trusted service provider application 128 in response to receiving the request, can provide an indication of the service provider of the trusted network of service providers to the device.
- the preferred consumer service application 126 can be an opt-in application that a user subscribes to.
- the preferred consumer service application 126 can offer users dynamic pricing and/or access to the service providers of the trusted provider list 406 .
- the preferred consumer service application 126 is subscribed to by a user for a family.
- the preferred consumer service application 126 can provide a family member, or all family members, with risk data for each family member, real-time tracking, and/or risk levels for each family member.
- the user device 210 can provide a request to be added to the consumer service and approval to access private data associated with the user of the user device 210 to the preferred consumer service application 126 .
- a safety behavior analyzer 604 can receive consumer behavior data from a physical store system 112 .
- the consumer behavior data can further be received from any of the systems 106 - 116 .
- the consumer behavior data is consumer data of a surveillance system 114 that indicates actions performed by a user within a physical store, e.g., wearing a mask, practicing social distancing, disinfecting, etc.
- the safety behavior analyzer 604 can receive health data associated with the user from a private health data system 602 .
- the health data indicates whether the user has tested positive or negative for a disease, a recent body temperature measurement, etc.
- the safety behavior analyzer 604 can analyze the consumer behavior, the health data, and/or various streams of risk data to determine a safety rating for the user.
- the risk data may indicate what geographic areas the user has visited and what infection levels are associated with those geographic areas, whether the user has come into contact with infected individuals, etc.
- the risk score can be provided to the consumer list updater 608 .
- the consumer list updater 608 can add the user to the consumer list 610 and/or remove the consumer from the consumer list 610 based on the safety rating. If the safety rating is above a particular amount, the user can be added to the consumer list 610 . If the safety rating is less than the particular amount, the user can be withheld from or removed from the consumer list 610 .
- the consumer discount generator 606 can generate a price discount for the user and provide the discount to the user device 210 . Furthermore, if the user has been added to the consumer list 610 , the user may have access to restricted store hours.
- the restricted store hour provider 612 can provide restricted store hours of the trusted provider list 614 to the user device 210 . In some embodiments, the restricted store hour provider 612 can provide an identify or a credential of the user that has access to the restricted store hours to the physical store system 112 for automatic access to the physical store during restricted store hours.
- a process 700 of managing a trusted consumer service based on disease related risk that can be performed by the preferred consumer service application 126 , according to an exemplary embodiment.
- the trusted service provider application 128 is configured to perform some or all of the steps of the process 700 .
- any computing device as described herein can be configured to perform the process 700 .
- the preferred consumer service application 126 receives a request to be added to a consumer service and approval to access private date from a user device of a user.
- the user in some embodiments, may provide payment information to subscribe themselves, and/or their family members to the consumer service.
- the preferred consumer service application 126 can receive consumer health behavior data from a physical store system.
- the consumer health behavior data may be data of a health data stream that indicates the precautions that the user is taking within the physical store, e.g., social distancing, opting in to contact tracing, using disinfection, wearing a mask, etc.
- the health behavior data can be a written survey that a user fills out to indicate what precautions the user has or is taking to avoid contracting or spreading a disease.
- the health behavior data could be video surveillance data indicating that the user has or is taking precautions to avoid contracting or spreading a disease in a physical store of a service provider.
- the preferred consumer service application 126 can determine whether the behavior of the user meets one or more health safety rules. Furthermore, the preferred consumer service application 126 can receive risk data associated with the user. The risk data may indicate whether the user has recently been located in high infection geographic areas, has opted into a trusted traveler program that tracks activity of a user, has come into contact with infected individuals, etc. The preferred consumer service application 126 can correlate the risk data stream with the health data stream to determine whether the user poses a health risk to the physical building.
- the consumer health behavior data is travel history data of a user.
- the travel history may indicate one or multiple geographic locations that the user has been present at, one or multiple restaurants that the user has eaten at, and/or one or more hotels that the user has stayed at, etc.
- the analysis to determine whether the user should be added to a trusted consumer list and/or determine whether the user meets the one or more health safety rules can be performed based on the travel history data.
- the analysis can include determining a risk level for a user and comparing the risk level to a threshold by the travel application 124 .
- the travel history data can be stored in a manifest of the user device and can be validated based on a copy of the manifest stored in the blockchain.
- the preferred consumer service application 126 can be configured to receive the manifest from the user device and validate the manifest based on a hashed copy of the manifest stored in the blockchain.
- the consumer service application 126 can verify a signature of the manifest of the user device and/or an external system that records the activity of the user. The verification of the manifest is described in greater detail with reference to FIGS. 13-14 .
- the preferred consumer service application 126 can provide a discount to the user device for the user.
- the discount can incentive the user to continue practicing social distancing techniques while in the physical store, wearing a mask, etc.
- the preferred consumer service application 126 can provide the user via the user device with access to the physical store at one or more restricted hours.
- the restricted hours may be hours only available to users that have a risk score less than a particular amount.
- a process 800 of generating an infection travel risk score for a user by the travel application 124 is shown, according to an exemplary embodiment.
- the travel application 124 is configured to perform some or all of the steps of the process 800 .
- any computing device as described herein can be configured to perform the process 800 .
- the travel application 124 receives travel data for a travel plan of a user indicating one or more travel destinations.
- the travel data can indicate a departure location, a departure time, a destination, and/or a destination time.
- the travel data can further include travel preferences, e.g., flight times (e.g., morning flights vs. red eye flights), preferred modes of travel (e.g., preference for using a bus), and/or any other indication of travel.
- the travel data can indicate a single travel destination or a sequence of travel destinations that a user plans on visiting, e.g., a set of cities that the user is traveling to for a vacation and/or a business trip.
- the travel application 124 receives destination risk data indicating a destination risk of one or more travel destinations associated with a transmission of an infectious disease.
- the destination risk data can indicate a level of risk that a user may experience in a particular geographic area.
- the city may have particular percentage of infected individuals that are infected with the infectious disease. The higher number of infected individuals, and/or a higher the rate of increase in the number of infected individuals, can indicate risk data for the destination.
- the destination is a particular hotel, a particular business campus, etc.
- the destination risk data can indicate the number of infected individuals at the destination. In some embodiments, the destination risk data can indicate a time since which an infected individual was last at the destination.
- the travel application 124 receives personal risk data indicating a risk of the user associated with the infectious disease.
- the personal risk data can indicate characteristics of a user that is traveling. For example, the health of the user, the age of the user, and/or other information of the user.
- the personal risk data could indicate health conditions of the user, e.g., whether the user has asthma, whether the user has a heart problem, whether the user has had a stroke, etc.
- the personal risk data can further indicate whether the user exercises frequently, has had a medical checkup recently, etc.
- the personal risk data can indicate whether the user is immune to a disease.
- the personal risk data could indicate the results of an antibody test indicating that the user has previously caught and recovered from a disease. This can indicate that the user is immune to catching the disease.
- the travel application 124 can generate an infection travel risk score for the user based on the destination risk data received in the step 804 and/or the personal risk data received in the step 806 .
- the travel application 124 can weigh the personal risk data against the destination risk data. For example, the travel application 124 can generate a higher infection travel risk score for the user when the user is susceptible to an infectious disease. For example, for a user that is at a particular age susceptible to a disease, the infection travel risk score can be set to a high value in response to the user traveling to, or being present, at a destination or location where an infected individual has recently been present.
- the system 900 includes a private information database 902 , a user device 904 , an external system 906 , and the risk analytics system 110 .
- the private information database 902 can be a database of disease risk related data, e.g., the health data streams, the risk data streams, antibody data of a user, infection travel risk scores (e.g., as determined by the travel application 124 ) and/or the threat events described with reference to FIG. 1 .
- the private information database 902 can be any type of database, e.g., a private or public blockchain database (e.g., as described with reference to FIGS. 13-14 ), a Structured Query Language (SQL) database, a Relational Database Management System (RDMS) database, a relational database, a non-SQL (NoSQL) database, a non-relational database, etc.
- SQL Structured Query Language
- RDMS Relational Database Management System
- the external system 906 can be a system external to the risk analytics system 110 .
- the external system 906 can be managed by a third party entity separate from the risk analytics system 110 .
- the external system 906 can be a government customs system 908 .
- the user device 904 may send an access request to the government customs system 908 .
- the government customs system 908 can request an infectious disease risk level for the user of the user device 904 and receive a risk scoring result from the risk analytics system 110 .
- the government customs system 908 which may be a domestic or international system, can use the score to determine whether to grant the user entry into a country or location within a country.
- the score can be a credential, a trusted passport, and/or e-passport indicating that the user does not pose a threat to the country and/or the location within the country.
- the first country could use the risk scoring to make exceptions for travelers from the second country if the travelers are scored at a low risk score, a risk score less than a particular amount indicating that the user poses a low risk of brining an infectious disease into the country.
- Various governments, government agencies e.g., military, customs, etc. can use the risk scoring provided by the risk analytics system 110 .
- the external system 906 includes an overnight accommodations system 910 , a physical store system 912 , a hospital system 914 , and/or a meeting scheduling system 916 .
- the systems 910 - 916 could communicate with the risk analytics system 110 to determine risk scores that can be used to determine whether a user should have access to an overnight accommodation, access to shopping at a physical store, entry into a hospital, determine whether an employee can work on premises instead of remotely and/or can attend a meeting in person or should alternatively attend the meeting online.
- the meeting scheduling system 916 communicating with the user device 904 .
- the risk analytics system 110 can act as a clearing house that validates threshold risk scores without exposing private information.
- the risk scoring result can be a numerical value of risk for a user and/or a pass fail binary value.
- the request for infectious disease risk level review by the external system 906 includes a set of criterion of the external system 906 .
- the risk analytics system 110 can be configured to query the private information of the user from the private information database 902 and determine whether the user meets the criterion.
- the risk analytics system 110 can return the score and/or a binary result of the analysis.
- the risk analytics system 110 can be configured to score the private data of the user to determine a risk score of the user.
- the risk analytics system 110 can be configured to compare the risk score to a threshold to determine whether the risk score of the user is greater or less than the threshold. If the risk score is greater than the threshold, the risk may be too great.
- the risk score may be a probability of the user having the infectious disease. The score can be based on historical activities of the user, whether the user has come into contact with infected individuals, whether the user has been tested for the infectious disease, whether the user has been present in high infection areas, etc.
- a process 1000 of performing risk scoring by the risk analytics system of FIG. 1 for the external system of FIG. 9 is shown, according to an exemplary embodiment.
- the process 1000 can be performed by the components of FIG. 9 , e.g., the user device 904 , the external system 906 , and/or the risk analytics system 110 .
- the process 1000 can be performed by any computer system or device described herein.
- the external system 906 receives an access request from a user device 904 .
- the access request can be triggered by a user requesting some sort of access, e.g., entry into a country, entry into a building, approval to work on-premises, inclusion in a physical meeting, etc.
- the external system 906 requests an infectious disease risk level of the user of the user device 904 to be reviewed by the risk analytics system 110 .
- the request can further indicate the review or approval criteria that should be applied by the risk analytics system 110 .
- the risk analytics system 110 can receive personal risk data indicating a risk of the user associated with the infectious disease from the private information database 902 .
- the risk analytics system 110 can generate a risk score based on the personal risk data received in the step 1006 .
- the risk analytics system 110 can determine what level of risk the user poses based on where the user has recently been located (e.g., in high infection geographic areas or low infection geographic areas), has come into contact with an infected individual, etc.
- the risk analytic system 110 can provide a score and/or a result of a comparison of the score to a threshold to the external system 906 .
- the risk scoring can include generating an infection travel risk score by the travel application 124 .
- FIG. 11 a system 1100 of the risk analytics system 110 sharing infectious disease data with another user device 1102 or the external system 906 based on a command received from the user device 1102 is shown, according to an exemplary embodiment.
- the data sharing of FIG. 11 illustrates a user device sharing infectious disease data to another user device or another external system.
- the data sharing can be performed between two employees (e.g., peer to peer), an employer and a partner system, a user and an airline, a user and a hospitality entity, etc.
- the system 110 can facilitate a sharing feature for the user device 904 via a message (e.g., a text message, an email, etc.).
- the user deice 904 shares a risk score or disease data with other users, e.g., the user device 1102 .
- the risk analytics system 110 can facilitate data sharing with outside systems, e.g., the external system 906 . For example, if the user associated with the user device 904 is visiting a campus, the user may share their infectious disease risk data with the external system of the campus.
- a healthcare facility could receive infectious disease data from the risk analytics system 110 to help identify what is wrong with a patient. For example, if a user has been present in a particular country where an infectious disease is present, the infectious disease data received from the risk analytics system 110 could be used by a doctor or nurse to identify what is wrong with the patient.
- the system 1100 facilitates bi-directional data sharing between a testing lab, a hospital, and/or a user.
- the infectious disease data shared by the risk analytics system 110 is a credential of a user of the user device 904 .
- the credential can be a credential that gives an anonymized risk score for the user of the user device 904 that the user can share with other systems or devices.
- the risk analytics system 110 issues an enhanced credential that includes a description of personal data of the user.
- the external system 906 first receives a normal credential to determine whether the user meets a threshold. After the system determines that the user meets the threshold, the risk analytics system 110 can expose more information of the user to the system in the form of the enhanced credential.
- the normal and enhanced credentials can be opted into or opted out of by a user of the user device 904 .
- the risk analytics system 110 may issue an antibody credential for a user. If the user has previously caught an infectious disease but has built up the antibodies to be immune to the infectious disease, the risk analytics system 110 may issue an antibody credential to the user that can be shared with other systems.
- the antibody credential can be generated in response to receiving antibody data from a medical testing system that may process an antibody test result of a user.
- the risk analytics system 110 can be configured to collect infectious disease data from the private information database 902 .
- the infectious disease data can be associated with a user of the user device 904 , e.g., indicate a travel history of the user, indicate a risk level of the user, indicate what other individuals the user has come into contact with, include the health data streams, the risk data streams, etc.
- the risk analytics system 110 can share the infectious disease data with the user device 904 in response to receiving a request.
- the risk analytics system 110 generates a link to the infectious disease data and provides the user device 904 with the link so that the user device 904 can share the link with other devices, e.g., the user device 1102 .
- the risk analytics system 110 performs scoring based on the infectious disease data to generate a risk level or risk credential for the user of the user device 904 .
- the risk scoring can be the same or similar to the risk scoring described with reference to FIGS. 9-10 .
- FIG. 12 a flow diagram of a process 1200 of sharing infectious disease data with another user device or the external system 906 based on a command received from the user device 904 is shown, according to an exemplary embodiment.
- the process 1200 can be performed by the components of FIG. 11 , e.g., the user device 904 , the external system 906 , the user device 1102 , and/or the risk analytics system 110 .
- the process 1200 can be performed by any computer system or device described herein.
- the risk analytics system 110 receives a command to share infectious disease data from the user device 904 .
- the command can indicate that a user of the user device 904 has given approval to share private data of the user with other users and/or systems.
- the command indicates particular users and/or systems that the user would like to share the infectious disease data with.
- the risk analytics system 110 can collect infectious disease data in step 1204 .
- the risk analytics system 110 collects risk data of the user, e.g., travel data, what hotels the user has stayed at, whether the user has tested positive or negative for an infectious disease, etc.
- the risk data can further indicate scores, e.g., a risk score calculated by the risk analytics system 110 indicating how likely the user is to infect others with an infectious disease.
- collecting the infectious disease data includes collecting an infection travel risk score determined by the travel application 124 from the private information database 902 .
- the risk analytics system 110 can provide at least one of the infectious disease data or a link to the infectious disease to the user device 904 .
- the infectious disease data can be the data collected and/or determined in the step 1204 by the risk analytics system 110 .
- the risk analytics system 110 generates a webpage or another data storage element that stores the infectious disease data.
- the risk analytics system 110 can provide a link to the webpage or other data storage element to the user device 904 .
- any user and/or particular user accounts can access the link.
- the user of the user device 904 can share the infectious disease data and/or a link to the infectious disease data with the user device 1102 and/or the external system 906 .
- the risk analytics system 110 sends the infectious disease data directly to the external system 906 and/or the user device 1102 .
- the system 1300 includes a number of nodes 1312 - 1322 communicating via the network 104 .
- the nodes 1312 - 1322 can be various computer systems, devices, servers, etc. In some embodiments, the nodes 1312 - 1322 are the services and systems described in FIG. 1 and elsewhere herein.
- the nodes 1312 - 1322 are shown to include the blockchain 1302 .
- the blockchain 1302 can be a chain of data blocks where each data block is linked to a previous block, thus, forming a chain.
- the chain may be a chain of sequentially ordered blocks.
- the blockchain 1302 is a private blockchain that is accessible to only particular systems with proper access credentials.
- the blockchain 1302 is a public blockchain that is accessible by any system.
- the blockchain database 1302 can include any number of blocks and new blocks can be added to the blockchain database 1302 by the nodes 1312 - 1322 and/or by any other system in communication with the nodes 1312 - 1322 .
- Three blocks of the blockchain database 1302 are shown in FIG. 13 , block 1304 , block 1306 , and block 1308 .
- Each block is shown to include a nonce, data, a hash, and a hash of the previous block in the chain.
- the blockchain 1302 is illustrated right to left, that is, the rightmost block is the oldest block shown in FIG. 13 while the leftmost block is the newest block shown in FIG. 13 .
- the data of each block can be private infectious disease data of a user, travel data of the user, health data of the user, data of the health data streams, data of the risk data streams, etc.
- the blocks 1304 - 1308 are shown to include a nonce value.
- the nonce value can be a value that when hashed with the data of the block and the previous hash, in addition to other information, results in a hash that meets a difficulty requirement.
- the hashes are shown as hexadecimal numbers.
- the difficulty requirement is that the first three values of each hash are zero but any difficulty requirement for the hashes can be utilized in the system 1300 . Any of the nodes 1312 - 1322 can attempt to generate a block with a hash value that meets the difficulty requirement.
- some and/or all of nodes 1312 - 1322 operate to generate a hash value for a new block to be added to the blockchain 1302 . If one of the nodes 1312 - 1322 generates a hash that meets the difficulty requirement, that node can add the block to the blockchain 1302 and notify the other nodes of the solved block so that the other nodes can also add the solved block to the blockchain 1302 that each of the other nodes stores.
- the blockchain 1302 can be configured to store user scores, infectious disease data, and/or private data of a user.
- the blockchain 1302 can be utilized to validate risk scores and/or infectious disease data of a user.
- the blockchain 1302 is a distributed ledger for a network of systems, e.g., for restaurants, retail businesses, commercial businesses, car rental services, taxi services, rideshare services, etc. for communicating infectious disease data in a trusted network of systems.
- the blockchain 1302 can be used to distribute a history of user events or activities, risk flags, infectious disease risk scores for users, and/or a token or data that provides that a user have been avoiding risky places and risky activity.
- businesses and/or other entities may provide a user with different levels of access to locations and/or geographic areas based on a score of a user.
- the blockchain 1302 can help make private data anonymous but widely accessible and available to other systems if a user wishes for the data to be shared.
- the blockchain 1302 can be used to prove that private data of a user stored in the blockchain 1302 is not being tampered with.
- the blockchain 1302 can be a private blockchain, a public blockchain, and/or a combination of a private and a public blockchain.
- a public blockchain can be an open source blockchain while a private blockchain may have one or multiple defined entities controlling the public blockchain.
- the system 1300 can be configured to capture and store events in the blockchain 1302 .
- the events can be stored as the data within the blocks of the blockchain, e.g., each block can store one or a set of events.
- the system 1300 can add a new block including data for the event.
- the external system 906 via a blockchain service 1302 run by the external system 906 , generates a manifest for an event.
- the manifest may be a data file describing an activity that a user associated with the user device 904 has performed and/or engaged in.
- the manifest may describe a stay at a hotel, a visit to a restaurant, a ride in a car of a rideshare service, a flight taken by the user, a bus ridden by the user, etc.
- the manifest may include a description of the activity, an identification of the user performing the activity (e.g., an anonymous user identifier tied back to the user), a date of the activity, a beginning time of the activity, an ending time of the activity, and/or any other data.
- the manifest can be generated by the external system 906 for the user of the user device 904 and provided by the external system 906 to the user device 904 .
- the external system 906 can be a system for a hotel and can generate the manifest for an overnight stay of the user of the user device 904 .
- the external system 906 can be a system of a restaurant and can generate the manifest for a dining visit of the user of the user device 904 .
- the user device 904 can sign the manifest with a private key of the user device 904 .
- the private key may be linked to a public identifier, a public key, associated with the user device 904 .
- the user device 904 can return the signed manifest to the external system 906 .
- a blockchain service 1324 of the user device 904 signs the manifest received from the external system 906 and returns the manifest to the external system 906 . Furthermore, the blockchain service 1324 can maintain a log of manifests for all events of the user. When the user of the user device 904 needs to verify a past event, e.g., a particular manifest, with another system, the external system 1328 , the blockchain service 1324 can provide the manifest (or a portion of the manifest log or the entire manifest log) to the external system 1328 for verification. The verification performed by the external system 1328 can be performed by the blockchain service 1326 .
- the external system 906 can sign the manifest received from the user device 904 .
- the external system 906 can sign the manifest before providing the manifest to the user device 904 for signature by the user device 904 .
- the signature by the external system 906 can verify that the external system 906 is the source of the manifest.
- the external system 906 can sign the manifest with a private key.
- the external system 906 can hash the signed manifest.
- the external system 906 can be configured to perform any type of hashing algorithm, e.g., MD5, SHA-2, CRC32, etc.
- the external system 906 can be configured to add the hashed manifest to the blockchain 1302 .
- the user device 904 can validate a manifest with another external system. For example, the user of the user device 904 may stay in a hotel associated with the external system 906 . The user may then wish to eat a restaurant associated with the external system 1328 . However, the external system 1328 may first verify what hotel the user associated with the user device 904 has stayed in before the user associated with the user device 904 is allowed to eat at the restaurant. The user device 904 can provide the manifest to the external system 1328 .
- the external system 1328 can verify the manifest received from the user device 904 with the blockchain 1302 .
- the external system 1328 can hash the manifest received from the user device 904 to determine that the hashed manifest received from the user device 904 matches the hashed manifest stored in the blockchain 1302 .
- the external system 1328 can verify the signature of the manifest stored in the blockchain 1302 and/or the manifest received from the user device 904 with a public key of the user device 904 .
- the external system 1328 can verify a signature of the external system 906 of the manifest stored in the blockchain 1302 and/or the manifest received from the user device 904 with a public key of the external system 906 .
- the external system 1328 via the signed and hashed manifest of the blockchain 1302 , can verify that the manifest of the blockchain 1302 identifies the user of the user device 904 .
- the signature of the manifest provided by the user device 904 included within the blockchain 1302 can verify that the user associated with the user device 904 .
- the signature does not expose the identity of the user of the user device 904 but can be used by the external system 1328 to identify the user and verify that an event claimed to be associated with the user is actually associated with the user.
- the private log of manifests stored by the user device 904 can be used to validate activities with employers (e.g., to determine whether the user provides a risk of spreading an infectious disease and whether the user should return to work), health agencies (e.g., to determine whether the user provides a risk of spreading an infectious disease and/or whether the user should be allowed to enter a country or geographic district), and/or any other entity or system.
- employers e.g., to determine whether the user provides a risk of spreading an infectious disease and whether the user should return to work
- health agencies e.g., to determine whether the user provides a risk of spreading an infectious disease and/or whether the user should be allowed to enter a country or geographic district
- any other entity or system e.g., the information stored within the blockchain 1302 does not expose private information of the user of the user device 904 but only includes signed and hashed data, the user of the user device 904 can choose what systems and/or entities that the user provides their manifest log to.
- the manifest based blockchain event tracking of the system 1300 can be utilized to track a group of users.
- a company may employ the system of 1300 to track employees
- a state may use the system 1300 to track the activities of its citizens
- a hospital may use the system 1300 to track the activities of its patients, etc.
- the events can indicate the locations of a user, the restaurant visits of a user, the transit use of the user, etc.
- the risk analytics system 110 e.g., the travel application 124 performing the process 800 described with reference to FIG. 8
- the blockchain 1302 can store travel locations of a user at multiple places throughout a day, week, month, and/or year.
- the travel application 124 can generate the risk score based on the risk levels associated with various geographic locations, retail stores visited by the user, hotels stayed in, restaurants that the user has eaten in, etc.
- FIG. 14 a process 1400 where a manifest is added to the blockchain 1302 and used to verify user activity of the user of the user device 904 is shown, according to an exemplary embodiment.
- the systems, devices, and databases shown performing the process 1400 can be the systems, devices, and databases described with reference to FIG. 13 .
- FIG. 14 includes an employer system 1402 which may be a system associated with an employer of the user of the user device 904 .
- the external system 1328 , the employer system 1402 , the user device 904 , the external system 906 , and/or the blockchain 1302 can perform some and/or all of the steps of the process 1400 .
- the process 1400 can utilize the blockchain 1302 to document the traveler behavior of individuals. Due to the private nature of travel, some individuals may not want to be tracked publically but would rather prefer to be tracked indirectly and/or privately. If a user opts in for indirect tracking, the travel behavior of the user can be identified with information stored in the blockchain 1302 in combination with information carried in the user device 904 to provide a verifiable track and trace of the individual.
- the blockchain 1302 can provide a signed artifact, e.g., the manifest, the can be used to verify the activity of the user of the user device 904 .
- the external system 906 can register an identifier and credential pair with the blockchain 1302 and/or a service that manages the blockchain 1302 .
- the identifier may be a number, text, and/or an alphanumeric value that uniquely identifies the external system 906 .
- the external system 906 can further register a credential pair including a public key and a private key with the blockchain 1302 .
- the identifier of the external system 906 is the public key.
- the public key and the private key can be used to sign data and/or documents and verify the signature of the external system 906 , e.g., the external system 906 can sign the data with the private key while another entity (e.g., the external system 1328 ) can verify the signature of the data with the public key.
- the external system 906 can sign the data with the private key while another entity (e.g., the external system 1328 ) can verify the signature of the data with the public key.
- the user device 904 can register an identifier and a credential pair with the blockchain 1302 and/or a service that manages the blockchain 1302 .
- the identifier may be a number, text, and/or an alphanumeric value that uniquely identifies the user device 904 .
- the user device 904 can further register a credential pair including a public key and a private key with the blockchain 1302 .
- the identifier of user device 904 is the public key.
- the public key and the private key can be used to sign data and/or documents and verify the signature of the user device 904 , e.g., the user device 904 can sign the data with the private key while another entity (e.g., the external system 1328 ) can verify the signature of the data with the public key.
- another entity e.g., the external system 1328
- the external system generates a manifest and provides the manifest to the user device 904 .
- the user of the user device 904 may perform an event, e.g., a travel activity associated with travel of the user.
- the user of the user device 904 may stay at a hotel associated with the external system 906 .
- the manifest may be a receipt of the stay of the user of the user device 904 .
- the receipt, the manifest can include metadata describing the stay of the user, e.g., the name of the hotel, the room number of the room that the user stayed in, the check-in date, the check-out date, etc.
- the manifest is signed by the external system 906 with a private key of the external system 906 before the manifest is provided to the user device 904 .
- the user device 904 signs the manifest with the private key of the user device 904 .
- the user reviews the manifest via a display screen of the user device 904 to verify that the information of the manifest is accurate and provides the user device 904 with an authorization to sign the manifest via an input device of the user device 904 .
- the user device 904 provides the signed manifest to the external system 906 .
- the external system 906 hashes the manifest (e.g., with or without the signatures of the external system 906 and the user device 904 ) and stores the hashed manifest in the blockchain 1302 .
- the manifest can be stored with a date and time.
- the data and time may be provided by a trusted time keeping system.
- Steps 1416 and 1418 are optional and are shown in dashed lines.
- the signed manifest can be provided to the employer system 1402 . If the user is opted into a private verification/tracking system, e.g., with the employer system 1402 , the manifest could be uploaded to the employer system 1402 for record keeping and storage. The employer can verify the authenticity of the manifest if desired by looking for the date and/or time, an optional transaction identifier, and/or any other metadata, and verify, via the blockchain 1302 , that the hash was in fact stored in the blockchain for that manifest
- the employer system 1402 can analyze a behavior history of the user.
- the employer system 1402 can utilize the uploaded manifest to determine if the user has traveled to a hotspot during a respective time period (e.g., during the last two weeks if the incubation period for the virus is two weeks).
- the employer system 1402 can also use the manifest to auto-populate the expenses reporting system for the user.
- the external system 906 can provide the manifest directly to the employer system 1402 .
- the external system 906 and an employer may have a contract relationship and the external system 906 could upload the manifest to employer systems automatically and not require the user to do so.
- no user identifiable information is shared about the user of the user device 904 in the blockchain 1302 . While the identifier of the user device 904 and/or the identifier of the external system 906 may be stored in the manifest, the exact name of the user of the user deice 904 and/or the name of the external system 906 may not be stored in the manifest.
- the only information that is stored in the blockchain 1302 is the record that the external system 906 added to the blockchain, the hash of the manifest and the date and time the manifest was signed, and other relevant and non-identifying metadata.
- the external system 1328 e.g., a trusted third party such as a company
- the external system 1328 could send a request for a manifest record of a particular time and/or manifest records of a particular time period.
- the user of the user device 904 could respond to the request by the external system 1328 and send the external system 1328 the manifest (or manifest records for a requested time period) via the user device 904 (or the external system 906 could send the external system 1328 the manifest) (steps 1420 and/or 1422 ).
- the user device 904 could identify one or multiple manifests that are associated with a time within the time period specified by the external system 1328 and respond to the external system 1328 with the identified manifest or manifests.
- the external system 1328 can verify the manifest received from the user device 904 .
- the external system 1328 can use public keys of the user device 904 and/or the external system 906 to verify the authenticity of the manifest stored in the blockchain 1302 and/or the manifest received from the user device 904 .
- the external system 1328 can verify signatures of the user device 904 and/or the external system 906 with public keys of the user device 904 and/or the external system 906 respectively.
- the external system 1328 can compare the received manifest to the manifest of the blockchain 1302 to verify that the received manifest matches the copy of the manifest stored in the blockchain 1302 .
- the external system 1328 may first hash the manifest received from the user 904 and compare the received hashed manifest to the hashed manifest stored in the blockchain 1302 to verify that the two hashed manifests match.
- the hashing algorithms used by the external system 1328 and/or the external system 906 may be the same.
- the external system 1328 can analyze the behavior of the user indicated by the manifest.
- the blockchain 1302 and manifest records could also be used to provide an attestation that the user has not been exposed to a hotspot area without divulging their travel data.
- a hotel may require attestation that a user has not been in a hotspot area before the user is permitted to stay at a hotel.
- a third party attestation service could be used that would allow the user to upload their manifests during the requested time period (data only uploaded to the third party service not the company wanting the verification). The third party attestation service would verify the authenticity of the manifests and based on the location and/or date the traveler was at each location.
- This information could be compared against a database that contains information on the risk of geographic areas at the time periods when the user visited those areas (e.g., number of infected individuals that were at those locations, etc.) and a score could then be generated and securely sent to a requestor. This would allow the requestor to understand the risk profile of the traveler but in a way in which they have no information or details about where that individual has traveled but instead of an attestation from a third party service
- the present disclosure contemplates methods, systems and program products on any machine-readable media for accomplishing various operations.
- the embodiments of the present disclosure may be implemented using existing computer processors, or by a special purpose computer processor for an appropriate system, incorporated for this or another purpose, or by a hardwired system.
- Embodiments within the scope of the present disclosure include program products comprising machine-readable media for carrying or having machine-executable instructions or data structures stored thereon.
- Such machine-readable media can be any available media that can be accessed by a general purpose or special purpose computer or other machine with a processor.
- machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code in the form of machine-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer or other machine with a processor.
- a network or another communications connection either hardwired, wireless, or a combination of hardwired or wireless
- any such connection is properly termed a machine-readable medium.
- Machine-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.
- the steps and operations described herein may be performed on one processor or in a combination of two or more processors.
- the various operations could be performed in a central server or set of central servers configured to receive data from one or more devices (e.g., edge computing devices/controllers) and perform the operations.
- the operations may be performed by one or more local controllers or computing devices (e.g., edge devices), such as controllers dedicated to and/or located within a particular building or portion of a building.
- the operations may be performed by a combination of one or more central or offsite computing devices/servers and one or more local controllers/computing devices. All such implementations are contemplated within the scope of the present disclosure.
- Such computer-readable storage media and/or one or more controllers may be implemented as one or more central servers, one or more local controllers or computing devices (e.g., edge devices), any combination thereof, or any other combination of storage media and/or controllers regardless of the location of such devices.
Abstract
A system including one or more memory devices having instructions stored thereon, that, when executed by one or more processors, cause the one or more processors to receive travel data associated with a travel plan of a user indicating one or more travel destinations. The instructions cause the one or more processors to receive destination risk data indicating a destination risk of the one or more travel destinations associated with transmission of an infectious disease, receive personal risk data indicating a risk of the user associated with the infectious disease, and generate an infection travel risk score for the user based on the destination risk data and the personal risk data.
Description
- This application is a continuation of U.S. patent Ser. No. 17/067,230 filed Oct. 9, 2020 which claims the benefit of and priority to U.S. Provisional Application No. 63/044,082 filed Jun. 25, 2020, the entirety of which is incorporated by reference herein.
- The present disclosure relates generally to risk analysis systems for disease related risks. Some diseases, e.g., viruses, bacterial infections, etc. can significantly affect the health of people, or certain classes of people, who contract the disease. It may be beneficial to take measures that restrict the ability of a healthy person from contracting the disease or an infected person from spreading the disease. For example, behaviors such as wearing masks, practicing social distancing techniques, using alcohol based hand sanitizers, washing hands, self-quarantining when sick, avoiding high infection areas, and other behaviors can reduce the spread of the disease.
- One implementation of the present disclosure is a system including one or more memory devices having instructions stored thereon, that, when executed by one or more processors, cause the one or more processors to receive travel data associated with a travel plan of a user indicating one or more travel destinations. The instructions cause the one or more processors to receive destination risk data indicating a destination risk of the one or more travel destinations associated with transmission of an infectious disease, receive personal risk data indicating a risk of the user associated with the infectious disease, and generate an infection travel risk score for the user based on the destination risk data and the personal risk data.
- In some embodiments, the instructions cause the one or more processors to generate one or more suggestions to the travel plan based on the infection travel risk score increasing to a value greater than a particular amount caused by at least one of a first change to the destination risk data or a second change to the personal risk data.
- In some embodiments, the instructions cause the one or more processors to generate travel routes from an originating location to the one or more travel destinations, generate infection route risk scores for the travel routes and perform at least one of generating a suggestion for the user to travel on one of the travel routes associated with a lowest infection route risk score, generating a user interfacing including an indication of the travel routes and the infection route risk scores, or generating a list including the travel routes ranked according to the infection route risk scores associated with the travel routes.
- In some embodiments, the personal risk data indicates whether the user has previously contracted and recovered from the infectious disease.
- In some embodiments, the instructions cause the one or more processors to receive a request for the infection travel risk score from an external system, wherein the external system sends the request to the one or more processors in response to a user device of the user requesting access from the external system to a service or location and communicate the infection travel risk score to the external system in response to receiving the request from the external system.
- In some embodiments, the instructions cause the one or more processors to receive a request to share the infection travel risk score from a user device of the user with a second user device or an external system and responsive to receiving the request, perform at least one of sending the infection travel risk score to the user device, second user device, or the second external system or generating a shareable link to a data source storing the infection travel risk score and send the link to the user device.
- In some embodiments, the instructions cause the one or more processors to receive a manifest from a user device of the user representing a travel activity performed by the user, receive a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the travel activity performed by the user, validate the manifest received from the user device with the second manifest of the blockchain, and generate the infection travel risk score for the user based on the travel activity represented by the manifest.
- In some embodiments, the second manifest includes a first signature of the user device and a second signature of the external system. In some embodiments, the instructions cause the one or more processors to determine that the first signature is authentic with a first public key of the user device and determine that the second signature is authentic with a second public key of the external system.
- In some embodiments, the second manifest is hashed by the external system. In some embodiments, the instructions cause the one or more processors to validate the manifest received from the user device by determining that the manifest matches the second manifest by hashing the manifest received from the user device and comparing a hash of the manifest received from the user device to the second manifest hashed by the external system.
- In some embodiments, the instructions cause the one or more processors to generate a travel itinerary for the user based on the travel data and risk data associated with the travel plan and provide the travel itinerary to the user via a user interface of a user device, generate one or more suggested updates to the travel itinerary based on changes in the risk data to dynamically account for changes in the risk data as the user is traveling, and provide the one or more suggested updates to the user via the user interface of the user device.
- In some embodiments, the instructions cause the one or more processors to generate the travel itinerary based on disparate factors including travel modes, travel destinations, and stops along a travel route.
- In some embodiments, the risk data indicates disease infection risk indicating a likelihood of the user contracting the infectious disease.
- In some embodiments, the risk data is received by the one or more processors as risk events from at least one of an event notification system, a contact tracing system, or a health authority system.
- In some embodiments, the risk data is contact tracing data, wherein the contact tracing data indicates at least one of one or more past locations or one or more future locations of a person infected by the infectious disease. In some embodiments, the instructions cause the one or more processors to perform at least one of generating the travel itinerary to include one or more transportation selections that avoid at least one of the one or more past locations or the one or more future locations of the person infected by the infectious disease or updating a value of the infection travel risk score based on the contact tracing data.
- In some embodiments, the instructions cause the one or more processors to determine risk values associated with dining options, select one or more dining options from the dining options based on the risk values associated with the dining options, and cause the travel itinerary to include the one or more dining options.
- In some embodiments, the instructions cause the one or more processors to determine risk values associated with overnight stay accommodation options, select one or more overnight stay accommodations from the overnight stay accommodation options based on the risk values associated with the overnight stay accommodation options, and cause the travel itinerary to include the one or more overnight stay accommodations.
- In some embodiments, the risk data indicates a threat level associated with geographic areas. In some embodiments, the instructions cause the one or more processors to generate the travel itinerary by determining one or more travel routes through one or more low risk geographic areas associated with threat levels less than one or more other high risk geographic areas. In some embodiments, the threat levels associated with the geographic areas indicate a disease infection level of people within the geographic areas.
- In some embodiments, the travel itinerary includes one or more transportation selections. In some embodiments, the instructions cause the one or more processors to select the one or more transportation selections from transportation options based on transportation risk data associated with the transportation options.
- In some embodiments, the one or more transportation selections include one or more car rental selections. In some embodiments, the instructions cause the one or more processors to select the one or more car rental selections from car rental options based on a health safety ratings of the car rental options.
- In some embodiments, the one or more transportation selections include one or more flight transportation selections. In some embodiments, the transportation risk data associated with the transportation options includes one or more of a length of a flight layover, a distance between two flight gates of a connecting flight, a likelihood of the user needing to eat during the traveling of the user, or an indication of infected individuals booked for a particular flight.
- Another implementation of the present disclosure is a method including receiving, by a processing circuit, travel data associated with a travel plan of a user indicating one or more travel destinations and receiving, by the processing circuit, destination risk data indicating a destination risk of the one or more travel destinations associated with transmission of an infectious disease. The method includes receiving, by the processing circuit, personal risk data indicating a risk of the user associated with the infectious disease and generating, by the processing circuit, an infection travel risk score for the user based on the destination risk data and the personal risk data.
- In some embodiments, the method includes generating, by the processing circuit, one or more suggestions to the travel plan based on the infection travel risk score increasing to a value greater than a particular amount caused by at least one of a first change to the destination risk data or a second change to the personal risk data.
- In some embodiments, the method includes generating, by the processing circuit, travel routes from an originating location to the one or more travel destinations, generating, by the processing circuit, infection route risk scores for the travel routes, and performing, by the processing circuit, at least one of generating a suggestion for the user to travel on one of the travel routes associated with a lowest infection route risk score, generating a user interfacing including an indication of the travel routes and the infection route risk scores, or generating a list including the travel routes ranked according to the infection route risk scores associated with the travel routes.
- In some embodiments, the method includes generating, by the processing circuit, a travel itinerary for the user based on the travel data and risk data associated with the travel plan and provide the travel itinerary to the user via a user interface of a user device, generating, by the processing circuit, one or more suggested updates to the travel itinerary based on changes in the risk data to dynamically account for changes in the risk data as the user is traveling, and providing, by the processing circuit, the one or more suggested updates to the user via the user interface of the user device.
- In some embodiments, the risk data indicates disease infection risk indicating a likelihood of the user contracting the infectious disease.
- In some embodiments, the risk data is received by the processing circuit as risk events from at least one of an event notification system, a contact tracing system, or a health authority system.
- Another implementation of the present disclosure is a system including one or more memory devices having instructions stored thereon and one or more processors configured to execute the instructions. The instructions cause the one or more processors to receive travel data associated with a travel plan of a user indicating one or more travel destinations, receive destination risk data indicating a destination risk of the one or more travel destinations associated with transmission of an infectious disease, receive personal risk data indicating a risk of the user associated with the infectious disease, and generate an infection travel risk score for the user based on the destination risk data and the personal risk data.
- In some embodiments, the instructions cause the one or more processors to generate one or more suggestions to the travel plan based on the infection travel risk score increasing to a value greater than a particular amount caused by at least one of a first change to the destination risk data or a second change to the personal risk data.
- In some embodiments, the instructions cause the one or more processors to generate travel routes from a originating location to the one or more travel destinations, generate infection route risk scores for the travel routes, and perform at least one of generating a suggestion for the user to travel on one of the travel routes associated with a lowest infection route risk score, generating a user interface including an indication of the travel routes and the infection route risk scores, or generating a list including the travel routes ranked according to the infection route risk scores associated with the travel routes.
- In some embodiments, the instructions cause the one or more processors to receive a manifest from a user device of the user representing a travel activity performed by the user, receive a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the travel activity performed by the user, validate the manifest received from the user device with the second manifest of the blockchain, and generate the infection travel risk score for the user based on the travel activity represented by the manifest.
- One implementation of the present disclosure is a system including one or more memory devices having instructions thereon, that, when executed by one or more processors, cause the one or more processors to receive a request from a service provider to be added to a trusted network of service providers and receive health safety data of a health data stream associated with the service provider and risk data of a risk data stream indicating risk levels associated with the service provider. The instructions cause the one or more processors to determine that the service provider meets a level of heath safety by correlating the health safety data of the health data stream with the risk data of the risk data stream, receive a request from a device for a service provider recommendation of the trusted network of service providers, and provide an indication of the service provider to the device in response to a reception of the request for the service provider recommendation.
- In some embodiments, the health data stream indicates factors that reduce a likelihood of a spread of a disease to users at a physical location of the service provider. In some embodiments, the risk data stream indicates risk factors that increase the likelihood of the spread of the disease at the physical location of the service provider.
- In some embodiments, the device is a user device of a user, wherein the user requests the service provider to procure a product or service of the service provider.
- In some embodiments, the device is a service provider device of a second service provider of the trusted network of service providers, wherein the second service provider requests the service provider to partner with the service provider.
- In some embodiments, the instructions cause the one or more processors to add the service provider to a list of the trusted network of service providers in response to a determination that the service provider meets the level of heath safety, receive second health safety data associated with a second service provider of the trusted network of service providers, determine, based on an analysis of the second heath safety data, that the second service provider has a particular health safety level less than the level of heath safety, and remove the second service provider from the list of the trusted network of service providers.
- In some embodiments, the health safety data associated with the service provider indicates a health level of each of employees associated with the service provider.
- In some embodiments, the health safety data associated with the service provider indicates one or more cleaning procedures performed at a physical location of the service provider.
- In some embodiments, the health safety data associated with the service provider is received from a health inspector user device of a health inspector, wherein the health safety data indicates a result of a health inspection performed by the health inspector.
- In some embodiments, the health safety data includes surveillance video data of a physical location associated with the service provider, wherein the surveillance video data indicates whether one or more health procedures are followed at the physical location.
- In some embodiments, the health safety data indicates whether one or more restricted shopping times are offered at a physical location of the service provider for customers associated with a level of personal health safety above a predefined amount.
- In some embodiments, the trusted network of service providers include at least one of an airline, a hotel, a car rental service, a brick and mortar retail store, or a commercial business.
- In some embodiments, the risk data indicates disease infection levels in a geographic area associated with the service provider.
- In some embodiments, the risk data indicates a number of infected individuals within a physical location of the service provider.
- In some embodiments, the health safety data indicates whether the employees have previously contracted and recovered from an infectious disease.
- In some embodiments, the instructions cause the one or more processors to receive a manifest from the service provider, the manifest indicating at least one of the health safety data or the risk data, receive a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the health safety data or the risk data, validate the manifest received from the service provider with the second manifest of the blockchain, and determine that the service provider meets a level of heath safety by correlating the health safety data with the risk data in response to validating the manifest.
- In some embodiments, the second manifest includes a first signature of the service provider and a second signature of the external system. In some embodiments, the instructions cause the one or more processors to determine that the first signature is authentic with a first public key of the service provider and determine that the second signature is authentic with a second public key of the external system.
- In some embodiments, the second manifest is hashed by the external system. In some embodiments, the instructions cause the one or more processors to validate the manifest received from the service provider by determining that the manifest matches the second manifest by hashing the manifest received from the service provider and comparing a hash of the manifest received from the service provider to the second manifest hashed by the external system.
- Another implementation of the present disclosure is a system including one or more memory devices having instructions thereon, that, when executed by one or more processors, cause the one or more processors to store a trusted network of service providers in the one or more memory devices, the trusted network of service providers including service providers and receive a request by a first service provider of the service providers for risk data of a second service provider of the service providers. The instructions cause the one or more processors to determine that the first service provider is assigned access to the risk data of the second service provider and provide the first service provider the risk data of the second service provider in response to a determination that the first service provider is assigned access to the risk data of the second service provider.
- In some embodiments, the instructions cause the one or more processors to receive a request by the second service provider for first risk data of the first service provider, determine that the second service provider is assigned access to the first risk data of the first service provider, and provide the second service provider the first risk data of the first service provider in response to a particular determination that the second service provider is assigned access to the first risk data of the first service provider.
- In some embodiments, the risk data indicates a risk level associated with an asset of the second service provider.
- In some embodiments, the risk level indicates risk associated with a physical room associated with the second service provider, a physical location associated with the second service provider, or a vehicle associated with the second service provider.
- In some embodiments, the risk data includes health data that indicates factors that reduce a likelihood of a spread of a disease to users at a physical location of the second service provider. In some embodiments, the risk data includes risk related data that indicates risk factors that increase the likelihood of the spread of the disease at the physical location of the second service provider.
- In some embodiments, the trusted network of service providers indicates that the first service provider is granted access to a first set of service providers of the service providers and is denied access to a second set of service providers of the service providers.
- Another implementation of the present disclosure is a method including receiving, by a processing circuit, a request from a service provider to be added to a trusted network of service providers and receiving, by the processing circuit, health safety data of a health data stream associated with the service provider and risk data of a risk data stream indicating risk levels associated with the service provider. The method includes determining, by the processing circuit, that the service provider meets a level of heath safety by correlating the health safety data of the health data stream with the risk data of the risk data stream, receiving, by the processing circuit, a request by the service provider for risk data of a second service provider of the trusted network of service providers, determining, by the processing circuit, that the service provider is assigned access to the risk data of the second service provider, and providing, by the processing circuit, the service provider the risk data of the second service provider in response to a determination that the service provider is assigned access to the risk data of the second service provider.
- In some embodiments, the health data stream indicates factors that reduce a likelihood of a spread of a disease to users at a physical location of the service provider. In some embodiments, the risk data stream indicates risk factors that increase the likelihood of the spread of the disease at the physical location of the service provider.
- In some embodiments, the method includes adding, by the processing circuit, the service provider to a list of the trusted network of service providers in response to a second determination that the service provider meets the level of heath safety, receiving, by the processing circuit, second health safety data associated with the second service provider of the trusted network of service providers, determining, by the processing circuit, based on an analysis of the second heath safety data, that the second service provider has a particular health safety level less than the level of heath safety, and removing, by the processing circuit, the second service provider from the list of the trusted network of service providers.
- In some embodiments, the method includes receiving, by the processing circuit, a manifest from the service provider, the manifest indicating at least one of the health safety data or the risk data, receiving, by the processing circuit, a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the health safety data or the risk data, validating, by the processing circuit, the manifest received from the service provider with the second manifest of the blockchain, and determining, by the processing circuit, that the service provider meets a level of heath safety by correlating the health safety data with the risk data in response to validating the manifest.
- One implementation of the present disclosure is a system including one or more memory devices having instructions stored thereon, that, when executed by one or more processors, cause the one or more processors to receive a request from a user device of a user to add the user to a trusted user service associated with a provider of goods or services and receive health behavior data of a health behavior data stream associated with behavior relating to a spread of an infectious disease at a physical location. The instructions cause the one or more processors to determine whether the user meets one or more health safety levels based on the health behavior data stream, add the user to the trusted user service in response to a determination that the user meets the one or more health safety levels, and generate an access indication of access to the physical location at one or more particular times in response to the determination that the user meets the one or more health safety levels.
- In some embodiments, the instructions cause the one or more processors to provide the access indication to a user device of the user, wherein the access indication is at least one of a credential, an access password, or an identifier.
- In some embodiments, the instructions cause the one or more processors to add the user to a trusted shopper list of trusted shoppers in response to the determination that the user meets one or more health safety rules, receive second health behavior data associated with a second user of the trusted shopper list of trusted shoppers, determine, based on an analysis of the second heath behavior data, that the second user has broken one or more health safety rules, and remove the second user from the trusted shopper list of trusted shoppers in response to a second determination that the second user has broken one or more health safety rules.
- In some embodiments, the instructions cause the one or more processors to receive a service provider request for a particular service provider of a list of trusted service providers from the user device, verify that the user of the user device has access to the list of trusted service provider, and provide an indication of the particular service provider to the user device.
- In some embodiments, the instructions cause the one or more processors to receive risk data of a risk data stream indicating risk levels associated with the user. In some embodiments, the instructions cause the one or more processors to determine whether the user meets one or more health safety levels by correlating the health behavior data of the health behavior data stream with the risk data of the risk data stream.
- In some embodiments, the risk data indicates at least one of disease infection levels of one or more geographic areas that the user has been present within during a particular period of time or contact of the user with one or more infected persons.
- In some embodiments, the access indication is associated with access to the physical location at one or more restricted hours restricted for members of the trusted user service.
- In some embodiments, the instructions cause the one or more processors to provide an identity of the user to a physical location system of the physical location, wherein the physical location system is configured to receive the identity of the user via one or more sensing devices of the physical location and operate one or more doors to provide the user access to the physical location based on the identity of the user.
- In some embodiments, the health behavior data is received from a surveillance system and is video data of the user at the physical location. In some embodiments, the instructions cause the one or more processors to determine whether the health behavior data meets one or more health safety levels by analyzing the video data to determine whether the user follows one or more health safety rules within the physical location.
- In some embodiments, the one or more health safety rules include one or more social distancing guidelines, use of a mask, or use of sanitization within the physical location.
- In some embodiments, the instructions cause the one or more processors to receive a manifest from a user device of the user representing a travel activity performed by the user, receive a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the travel activity performed by the user, validate the manifest received from the user device with the second manifest of the blockchain, and determine whether the user meets one or more health safety levels based on the health behavior data stream and the travel activity.
- In some embodiments, the second manifest includes a first signature of the user device and a second signature of the external system. In some embodiments, the instructions cause the one or more processors to determine that the first signature is authentic with a first public key of the user device and determine that the second signature is authentic with a second public key of the external system.
- In some embodiments, the second manifest is hashed by the external system. In some embodiments, the instructions cause the one or more processors to validate the manifest received from the user device by determining that the manifest matches the second manifest by hashing the manifest received from the user device and comparing a hash of the manifest received from the user device to the second manifest hashed by the external system.
- Another implementation of the present disclosure is a method including receiving, by a processing circuit, a request from a user device of a user to add the user to a trusted user service associated with a provider of goods or services, receiving, by the processing circuit, health behavior data of a health behavior data stream associated with behavior relating to a spread of an infectious disease at a physical location, determining, by the processing circuit, whether the user meets one or more health safety levels based on the health behavior data, adding, by the processing circuit, the user to the trusted user service in response to a determination that the user meets the one or more health safety levels, and generating, by the processing circuit, an access indication for access to the physical location at one or more particular times in response to the determination that the user meets the one or more health safety levels.
- In some embodiments, the method includes adding, by the processing circuit, the user to a trusted shopper list of trusted shoppers in response to the determination that the user meets one or more health safety rules, receiving, by the processing circuit, second health behavior data associated with a second user of the trusted shopper list of trusted shoppers, determining, by the processing circuit, based on an analysis of the second heath behavior data, that the second user has broken one or more health safety rules, and removing, by the processing circuit, the second user from the trusted shopper list of trusted shoppers in response to a second determination that the second user has broken one or more health safety rules.
- In some embodiments, the method includes receiving, by the processing circuit, a service provider request for a particular service provider of a list of trusted service providers from the user device, verifying, by the processing circuit, that the user of the user device has access to the list of trusted service providers, and providing, by the processing circuit, an indication of the particular service provider to the user device.
- In some embodiments, receiving, by the processing circuit, risk data of a risk data stream indicating risk levels associated with the user. In some embodiments determining, by the processing circuit, whether the user meets one or more health safety levels includes correlating the health behavior data of the health behavior data stream with the risk data of the risk data stream.
- In some embodiments, the risk data indicates at least one of disease infection levels of one or more geographic areas that the user has been present within during a particular period of time or contact of the user with one or more infected persons.
- In some embodiments, the access indication is associated with access to the physical location at one or more restricted hours restricted for members of the trusted user service.
- In some embodiments, the health behavior data is received from a surveillance system and is video data of the user at the physical location. In some embodiments, the method further includes determining, by the processing circuit, whether the health behavior data meets the one or more health safety levels by analyzing the video data to determine whether the user follows one or more health safety rules within the physical location.
- In some embodiments, the one or more health safety rules include one or more social distancing guidelines, use of a mask, or use of sanitization within the physical location.
- Another implementation of the present disclosure is a system including one or more memory devices having instructions stored thereon. The system includes one or more processors configured to execute the instructions to receive a request from a user device of a user to add the user to a trusted user service associated with a provider of goods or services, receive a travel history of the user indicating destinations that the user has traveled to, determine whether the user meets one or more health safety levels by analyzing the travel history of the user, add the user to the trusted user service in response to a determination that the user meets the one or more health safety levels, and generate an access indication for the user to access the physical location at one or more particular times in response to the determination that the user meets the one or more health safety levels.
- In some embodiments, the instructions cause the one or more processors to add the user to a trusted shopper list of trusted shoppers in response to the determination that the user meets one or more health safety rules, receive second health behavior data associated with a second user of the trusted shopper list of trusted shoppers, determine, based on an analysis of the second heath behavior data, that the second user has broken the one or more health safety rules, and remove the second user from the trusted shopper list of trusted shoppers in response to a second determination that the second user has broken the one or more health safety rules.
- In some embodiments, the personal risk data indicates whether the user has previously contracted and recovered from the infectious disease.
- In some embodiments, the instructions cause the one or more processors to receive a manifest from a user device of the user representing a travel activity performed by the user, receive a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by an external system to create a record of the travel activity performed by the user, and validate the manifest received from the user device with the second manifest of the blockchain.
- In some embodiments, the second manifest includes a first signature of the user device and a second signature of the external system. In some embodiments, the instructions cause the one or more processors to determine that the first signature is authentic with a first public key of the user device and determine that the second signature is authentic with a second public key of the external system.
- In some embodiments, the second manifest is hashed by the external system. In some embodiments, the instructions cause the one or more processors to validate the manifest received from the user device by determining that the manifest matches the second manifest by hashing the manifest received from the user device and comparing a hash of the manifest received from the user device to the second manifest hashed by the external system.
- Various objects, aspects, features, and advantages of the disclosure will become more apparent and better understood by referring to the detailed description taken in conjunction with the accompanying drawings, in which like reference characters identify corresponding elements throughout. In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements.
-
FIG. 1 is a block diagram of a system including a risk analytics system that receives health data streams and risk data streams for analyzing disease related risk including a travel application, a consumer service application, and a trusted service provider application, according to an exemplary embodiment. -
FIG. 2 is a block diagram of the travel application ofFIG. 1 in greater detail, according to an exemplary embodiment. -
FIG. 3 is a flow diagram of a process of generating and dynamically updating a travel itinerary based on disease related risk that can be performed by the travel application ofFIGS. 1-2 , according to an exemplary embodiment. -
FIG. 4 is a block diagram of the trusted service provider application ofFIG. 1 in greater detail, according to an exemplary embodiment. -
FIG. 5 is a flow diagram of a process of managing a trusted network of service providers based on disease related risk that can be performed by the trusted service provider application ofFIGS. 1 and 4 , according to an exemplary embodiment. -
FIG. 6 is a block diagram of the consumer service application ofFIG. 1 in greater detail, according to an exemplary embodiment. -
FIG. 7 is a flow diagram of a process of managing a trusted consumer service based on disease related risk that can be performed by the consumer service application ofFIGS. 1 and 6 , according to an exemplary embodiment. -
FIG. 8 is a flow diagram of a process of generating an infection travel risk score for a user by the travel application ofFIG. 1 , according to an exemplary embodiment. -
FIG. 9 is a block diagram of the risk analytics system ofFIG. 1 performing risk scoring for an external system, according to an exemplary embodiment. -
FIG. 10 is a flow diagram of a process of performing risk scoring by the risk analytics system ofFIG. 1 for the external system ofFIG. 9 , according to an exemplary embodiment. -
FIG. 11 is a block diagram of the risk analytics system ofFIG. 1 sharing infectious disease data with another user device or the external system ofFIG. 9 based on a command received from a user device, according to an exemplary embodiment. -
FIG. 12 is a flow diagram of a process of sharing infectious disease data with another user device or the external system ofFIG. 9 based on a command received from the user device ofFIG. 11 , according to an exemplary embodiment. -
FIG. 13 is a block diagram of a manifest indicating user activity of the user of the user device ofFIG. 11 being added to a blockchain database, according to an exemplary embodiment. -
FIG. 14 is a flow diagram of a process where the manifest ofFIG. 13 is added to the blockchain database ofFIG. 13 and used to verify user activity of the user of the user device ofFIG. 11 , according to an exemplary embodiment. - Referring generally to the FIGURES, systems and methods are shown that operate based on disease related risk, according to various exemplary embodiments. First, the systems and methods described herein relate to dynamic travel planning based on disease related risk. The systems can generate an itinerary that plans a trip for a user in such a manner that the health of the user is taken into account with respect to disease related risks. For example, the systems can generate the itinerary to include plans that utilize transportation options, overnight accommodation options, and/or other travel decisions that pose a low risk level to the user. Furthermore, the itinerary can be updated dynamically by the system so that as factors affecting a risk level of the user change during the traveling of the user, suggested updates to the travel itinerary can be received and acted upon by the user.
- The system can evaluate risk levels associated with the travel of the user while the user is traveling. This can result in an evolving indication of risk that is easily understandable by a user. Furthermore, because the system can cause user interfaces to display indicators such as the evolving risk and the suggested updates to the travel itinerary, a user can easily understand what actions the user can take to reduce the infection risk that the user is exposed to during their trip.
- The systems and methods can further relate to managing a trusted service provider network based on disease related risk. The system can receive health related data streams associated with a particular service provider. For example, the health related data streams can indicate the social distancing, disinfection, and/or screening procedures that a service provider uses for their rental cars, hotel rooms, physical shopping stores, etc. Furthermore, the system can receive risk data of a risk data stream. The risk data can indicate risk levels associated with the service provider, for example, disease infection levels in a geographic area that the service provider operations, number of infected individuals that have visited a physical store or used a car or hotel room of the service provider, and/or any other risk related data.
- Based on the health data streams and the risk data streams associated with the service provider, the system can determine whether to add or remove the service provider from a trusted service provider network. The system can correlate the health and risk data streams. This correlation can allow for a determination of risk levels of the service provider that allows for more accurate and granular insights into the risk of the service provider than would be identified from the health data stream or the risk data stream individually. By managing the trusted service provider network to include highly reliable service providers that follow protocols and pose a low risk to customer or business partners, other entities that wish to use a reliable service provider can consult the trusted service provider network to find a safe and reliable service provider. For example, a customer looking for a car rental service could query the trusted network of service providers to identify a safe car rental service.
- Furthermore, the systems and methods described herein relate to a preferred consumer service application. The system can be configured to receive a request from a user to be added to a preferred consumer service to acquire benefits offered to members of the preferred consumer service, e.g., price discounts, access to restricted shopping times at a physical store, etc. The system can be configured to receive data of a health data stream associated with the user and risk data of a risk data stream associated with the user. Again, the correlation of health and risk data can uncover greater insight into risk levels associated with the user that would not be identified with the health or risk data individually.
- The health data stream can indicate whether the user follows social distancing practices, disinfection and hand washing practices, mask wearing policies, etc. The risk data can be data of a risk data stream can indicate whether the user has come into contact with infected individuals, lives or works in a high infection geographic area, has recently visited a country with a high infection level, and/or any other risk factor. Based on the health data stream and the risk data stream, the systems and methods can add or remove users from the preferred consumer service.
- Referring now to
FIG. 1 , asystem 100 including arisk analytics system 110 that receives health data streams and risk data streams for analyzing disease related risk including atravel application 124, a preferredconsumer service application 126, and a trustedservice provider application 128 is shown, according to an exemplary embodiment. Therisk analytics system 110 includes adata ingestion service 130 andrisk application 118 that include thetravel application 124, the preferredconsumer service application 126, and the trustedservice provider application 128. - The
data ingestion service 130 can be configured to ingest health data of health data streams and risk data of risk data streams. Furthermore, the data ingestion service can ingest threat events. The ingested data can be provide to therisk application 118. The data ingestion service can include one ormore memories 132 and one ormore processors 134. - The
processors 134 can be a general purpose or specific purpose processor, an application specific integrated circuit (ASIC), one or more field programmable gate arrays (FPGAs), a group of processing components, or other suitable processing components. Theprocessors 134 may be configured to execute computer code and/or instructions stored in thememories 132 or received from other computer readable media (e.g., CDROM, network storage, a remote server, etc.). - The
memories 132 can include one or more devices (e.g., memory units, memory devices, storage devices, etc.) for storing data and/or computer code for completing and/or facilitating the various processes described in the present disclosure. Thememories 132 can include random access memory (RAM), read-only memory (ROM), hard drive storage, temporary storage, non-volatile memory, flash memory, optical memory, or any other suitable memory for storing software objects and/or computer instructions. Thememories 132 can include database components, object code components, script components, or any other type of information structure for supporting the various activities and information structures described in the present disclosure. Thememories 132 can be communicably connected to theprocessors 134 and can include computer code for executing (e.g., by the processors 134) one or more processes described herein. - The
data ingestion service 130 can receive the threat events, the health data streams, and the risk data streams vianetwork 104. Thenetwork 104 can communicatively couple the devices and systems ofsystem 100. In some embodiments, thenetwork 104 is at least one of and/or a combination of a Wi-Fi network, a wired Ethernet network, a ZigBee network, a Bluetooth network, and/or any other wireless network. Thenetwork 104 may be a local area network or a wide area network (e.g., the Internet, a building WAN, etc.) and may use a variety of communications protocols (e.g., BACnet, IP, LON, etc.). Thenetwork 104 may include routers, modems, servers, cell towers, satellites, and/or network switches. Thenetwork 104 may be a combination of wired and wireless networks. - The
system 100 includes acontact tracing system 116,user devices 115,transportation systems 106, building meetingsystems 108,health data systems 111,physical store system 112,surveillance system 114, and threat event data sources 102. The threatevent data sources 102 can be data sources that provide a notification of a threat occurring. The threatevent data sources 102 could be dataminr, NC4, Twitter, social media data, a news outlet, etc. The threatevent data sources 102 can provide indications of threat events to thedata ingestion service 130, for example, an indication of a disease outbreak, an indication of a protest occurring, an indication of a natural disaster, that a user has caught a disease, that a sporting event is occurring, etc. - The
contact tracing system 116 can be a system or group of systems that monitor and track infected individuals and monitor and track other individuals who come into contact with the infected individuals. Thecontact tracing system 116 can be a centralized system that aggregates and stores data or a distributed system, e.g., multiple user devices running a local application. Thecontact tracing system 116 can be a user opt-in system where users allow for their location to be tracked and provide an indication to thecontact tracing system 116 regarding whether they are experiencing disease symptoms, have been hospitalized due to a disease, and/or have tested positive for a disease. - In some embodiments, the
contact tracing system 116 can be managed by therisk analytics system 110 or external to thecontact tracing system 116. Thecontact tracing system 116 can be managed by another system, e.g., thecontact tracing system 116 could be a Google contact tracing system or an Apple contact tracing system. The internal or external contact tracing could provide contact tracing data that thecontact tracing system 116 is configured to use to generate risk scores for users and/or locations, in some embodiments. The contact tracing can be performed through peer to peer communication, e.g., ad-hoc communication between two user devices that identify an interaction between two users. In some embodiments, the contact tracing can be performed with badges that communicate with building scanning systems. In some embodiments, a the contact tracing system uses vehicle tracking data, e.g., GPS data of the vehicle and/or driver detection and/or identification. - The
user devices 115 can be personal device of a user. For example, the user devices can be smart phones, laptops, tablets, etc. Theuser devices 115 can be carried by a user and configured by the user to provide location data indicating a location of a user device to thedata ingestion service 130. Theuser devices 115 can include display devices, e.g., touch-screens, light emitting diode (LED) displays, organic light emitting diode (OLED) display, a liquid crystal display (LCD), etc. Theuser devices 115 can further include interface devices, e.g., capacitive or resistive touch inputs, keyboards, mouse, a remote, etc. - The
transportation systems 106 can provide transportation data to therisk analytics system 110. Thetransportation systems 106 can be an airline system, a train system, a bus system, a taxi system, a car rental system, a ride share system, and/or any other type of system. For example, if the transportation system is an airline system, the airline system can provide risk data, e.g., data that indicates an increased risk of infection, such as an indication of flight lengths, layovers, distances between terminals and/or gates, number of booked passengers, etc. to therisk analytics system 110. - The
building meeting systems 108 can be a system that books meeting rooms within a building and/or buildings. Thebuilding meeting systems 108 can provide therisk analytics system 110 with risk data regarding building meeting rooms of a building, e.g., room size, room ventilation rates, room capacity, time since the room was last occupied, etc. Furthermore thebuilding meeting systems 108 can provide health data associated with the meeting rooms, room cleaning or disinfection frequency, time since last disinfection, etc. - The
health data systems 111 can be systems that aggregate disease related infection levels for geographic areas (e.g., risk data streams) and provide the information to therisk analytics system 110. Thehealth data systems 111 can be Center For Disease Control And Prevention (CDC) systems, data published by John Hopkins University systems, data published by the World Health Organization (WHO), and/or any other health data system. The data published by thehealth data system 100 can be real-time data that changes as disease infections are detected and reported by hospitals and/or disease testing facilities. - The
physical store system 112 can be systems of a physical place of business, e.g., a retail store, a restaurant, a car rental facility, and/or any other type of physical brick and mortar store. Thephysical store system 112 can provide health related data, e.g., indications of social distancing practiced at the store, signs and instructions for customers to follow within the building (e.g., standing six feet apart, wearing a mask, etc.), indications of cleaning and disinfection practices, etc. - The
surveillance system 114 can be a system of one or more cameras, video storage and/or analysis systems, etc. Thesurveillance system 114 can integrate with and/or communicate to thephysical store system 112. Thesurveillance system 114 can be located at a building, e.g., a physical store. Thesurveillance system 114 can identify, based on captured video data, whether employees and/or customers follow social distancing practices, cleaning and/or disinfection practices, wear masks, etc. - The
risk application 118 include thetravel application 124, the preferredconsumer service application 126, and the trustedservice provider application 128. These application 124-128 can be executed by one ormore processors 122 and stored on one ormore memories 120. The one ormore processors 122 can be the same as or similar to the one ormore processors 134 while the one ormore memories 120 can be the same as or similar to thememories 132. - The
travel application 124 can be a system for planning travel for a user, an employee of a company, a subscribed individual, etc. Thetravel application 124 can be configured to generate and/or analyze travel plans based on real time risk to facilitate proper travel planning and/or mid-travel plan deviation. Thetravel application 124 can receive an indication of one or more destinations and time data from theuser devices 115 and generate a travel itinerary (e.g., a data set including one or more selected transportation methods, one or more selected overnight stay reservations, one or more selected restaurants, etc.). In some embodiments, if a user authorizes data sharing, thetravel application 124 can provide the travel itinerary to thecontact tracing system 116 for thecontact tracing system 116 to operate one or contact tracing purposes. - The
travel application 124 can analyze the health data streams and/or risk data streams received from thenetwork 104 to determine whether any deviations should be taken to the travel itinerary while the user is traveling. In some embodiments, the health data streams and/or the risk data streams are combined within a single data stream. For example, real-time risk related data or threat event data can indicate that a deviation in travel would lower a risk score of the user. For example, thetravel application 124 could calculate a risk score associated with the user flying a particular airline through a particular airport, dining at a restaurant, and sleeping at a hotel. - However, if there is a disease outbreak associated with the restaurant while the user is on their flight, the
travel application 124 could generate a suggested alternative restaurant for the user to dine in and cause a user interface of a user device to display the suggestion to be accepted or rejected by the user via one or more accept or reject interface elements displayed on the user interface. Furthermore, thetravel application 124 could reschedule a meeting room from a first room to a second room in response to a detection that the first room has not been sanitized, an infected individual has recently been present in the first room, etc. - In some embodiments, the
travel application 124 can score multiple routes of travel based on the mode of transportation and a destination. One or multiple routes and/or the score for each route can be provided to a user for review to select a route that is safest where it is unlikely that the user will catch an infectious disease. Each route can be scored based on the travel mode itself in addition to restaurants, hotels, rest stops, etc. along the route. The route with the lowest risk score or the highest safety score can be provided to the user. In some embodiments, thetravel application 124 can recommend that the user skip having dinner at a certain hotel or in a certain city, stay in a hotel outside of a city with a high infection rate, skip visiting a city, etc. Thetravel application 124 can generate a travel itinerary based on multiple disparate factors, the travel mode itself (e.g., plane, train, bus, car), the hotels along the routes, the restaurants, along the routes, the infection levels of the various cities along the routes and/or the destinations, etc. - The preferred
consumer service application 126 can manage a service that one or more users subscribe to, e.g., via theuser devices 115. The service can be a subscription service that provides benefits to subscribed users, e.g., price discounts on products or service, access to restricted shopping hours in a physical store, exclusive product or service previews, early product or service access, etc. The access to the restricted shopping hours, or other access to an asset of a goods or service provider, could be a credential, a password or an identifier of the user. The preferredconsumer service application 126 can receive health data streams and/or risk data streams associated with a user to determine whether the user should be added to the preferred consumer service and/or granted the discounts of the preferred consumer service. - For example, the
surveillance system 114 can indicate whether the user has worn a mask when visiting a physical store, has practiced social distancing in the physical store, etc. and should be granted access to price discounts. Furthermore, thecontact tracing system 116 can provide risk data that indicates whether the user has been in contact with infected individuals and should be provided access to the restricted shopping hours. - In some embodiments, the preferred
consumer service application 126 can generate utilize a travel history (e.g., a collection of travel data, contact tracing data, hotel receipts, restaurant receipts, user reported data, etc.) of a user to determine whether to classify the user as a preferred consumer. In some embodiments, the preferredconsumer service application 126 is configured to determine an expected risk level of a user of a planned trip to an actual risk level resulting from actual travel decisions made during the trip (e.g., what the user did during the trip, where the user traveled, where the user stayed, who the user came into contact with, etc.). Based on the difference between the expected risk level and the actual risk level, the preferredconsumer service application 126 can determine whether the user should be added to, retained in, or removed from a preferred consumer list. - The trusted
service provider application 128 can manage a network of trusted service providers based on health data streams and/or risk data streams associated with the trusted service providers. Theapplication 128 can analyze data associated with the service provider, e.g., what disinfection practices are performed by the service provider for their store, rental cars, hotel rooms, etc. Whether the service provider is located in a high infection area or a low infection area (e.g., is located in a geographic area associated with an infection level above or below particular amounts), etc. If the trusted service provider meets one or more requirements as determined by the health data streams and the risk data streams, the trusted service provider can be added by the trustedservice provider application 128 to a network of trusted service providers list. Partnering systems and/or consumer systems can query the trustedservice provider application 128 for a trusted service provider and can be recommended a trusted service provider by the trustedservice provider application 128. - In some embodiments, the trusted
service provider application 128 scores a building or buildings of a service provider to determine whether to add the service provide to the trustedservice provider application 128. Theapplication 128 can generate a safety score associated with communities, buildings, etc. For example, theapplication 128 can be configured to generate a score for a building based on building sanitation practices, HVAC air handling practices, fire system practices, screening practices, etc. - In some embodiments, the applications 124-128 can communicate with each other to exchange data. For example, the travel data of users stored by the
travel application 124 can be provided to the preferredconsumer service application 126 to monitor user movement if the user has given approval for their movement to be tracked. Furthermore, thetravel application 124 can make travel determinations based on whether transportation, hotels, car rental services, restaurants, etc. are trusted and safe as can be indicated by the trustedservice provider application 128. - Furthermore, the
risk application 118 can exchange data with the systems 106-116. This can form a community of companies, e.g., companies that are trusted services as identified by the trustedservice provider application 128. This can create a group of partner companies and/or a consortium of companies. For example, travel data of thetravel application 124 can be shared with thecontact tracing system 116. - Referring now to
FIG. 2 , thetravel application 124 ofFIG. 1 shown in greater detail, according to an exemplary embodiment. Thetravel application 124 can receive user input from auser device 210. Theuser device 210 can be one of, or similar to theuser devices 115. Theuser device 210 can be a smartphone and can include a touchscreen for viewing data and/or providing input. A user can define one or more travel destinations, one or more travel dates and/or times, departure times, arrival times, food preferences, overnight stay accommodation preferences, etc. This data can be provided as the user input to thetravel application 124. - An
itinerary generator 202 of thetravel application 124 can receive transportation data from the transportation systems, 106, threat events from the threatevent data sources 102, and location based health data from thehealth data systems 111. Theitinerary generator 202 can generate atravel itinerary 206 based on the destinations provided by the user and the data received from the systems 106-115. Theitinerary generator 202 can analyze legs of a flight, legs of a travel plan, real time contact tracing of other people in an area, risk factors associated with varying layovers, length of layovers, distance between flight gates, likelihood of needing to eat, social distancing practice scores in airports, infection levels of various geographic locations, etc. to select transportation options for theitinerary 208. - The
itinerary generator 202 can calculate a risk score associated with multiple possible transportation options and weight each score based on risk factors such as a number of stops since each stop increases contact risk, e.g., waiting in new lines with new people. Furthermore, for rideshare or car rental options, the length of the ride may be considered in risk that affects the risk score of the itineraries. Furthermore, an age of a user associated with theuser device 210 and/or the presence of preexisting conditions can be considered by theitinerary generator 202 in generating theitinerary 206. Some users, e.g., young users without any preexisting health conditions, may have a higher risk tolerance than older users with preexisting health conditions. - In some embodiments, wherein the risk data is contact tracing data received from the
contact tracing system 116. The contact tracing data indicates one or more past locations and one or more future planned locations of one or multiple different people infected by a disease. Theitinerary generator 202 can be configured to generate thetravel itinerary 206 to include one or more transportation selections, transportation routes, and/or hotel accommodations that avoid the one or more past locations and the one or more future locations of the person infected by the disease. This reduces a risk level of the traveling user. Furthermore, as new locations of infected individuals is received by thetravel application 124, the real-time suggestion generator 200 can generate updates to theitinerary 206 that avoid the locations of the infected individuals, e.g., avoid getting on a plane that an infected individuals is on, avoid a hotel that a high number of infected individuals are staying at, etc. - Based on risk data associated with various dining options, the
itinerary generator 202 can be configured to generate a risk value associated with each of the dining options and select a dining option with a lowest risk value and/or with a risk value less than a predefined amount. In some embodiments, theitinerary generator 202 can select the dining option based on a risk toleration level of a user and one or more dining preferences of the user. The risk data can indicate numbers of infections in a geographic area that the restaurant is located in, whether infected individuals have or will go to the restaurant, etc. As the risk data changes for the restaurants, the real-time suggestion generator 200 can generate real-time travel suggestions 204 that recommend different restaurants in response a risk level for a planned restaurant exceeds a particular level. - In some embodiments, the
itinerary generator 202 can be configured to generate a risk value for each of multiple overnight stay accommodation options. Theitinerary generator 202 can cause theitinerary 206 to include selected overnight stay accommodations that reflect risk values less than a particular amount. For example, theitinerary generator 202 can identify multiple price ranges for accommodation options in a desired geographic destination regions and rank the accommodation options in terms of risk. The risk data can indicate infection levels in the area that each accommodation is located, whether infected individuals have, are, or will be staying the accommodation, etc. Furthermore, health data such as disinfection policies of each accommodation can be taken into account by theitinerary generator 202. Furthermore, as the risk data changes for the accommodations, the real-time suggestion generator 200 can generate updates to the accommodations, e.g., replacement accommodations. - In some embodiments, the
itinerary generator 202 can generate a travel plan that avoids stopping in, or traveling through, one or more high infection geographic areas. For example, based on the location based health data received from thehealth data systems 111, theitinerary generator 202 can identify what flights, busses, or trains that stop, transfer, or move through geographic areas associated with high risk. Theitinerary generator 202 can generate a travel plan including transportation selections that avoid the geographic areas with infection levels above a particular amount and instead route transportation through low risk geographic areas, geographic areas that have a lower level of infection risk than the high risk geographic areas. - The real-
time suggestion generator 200 can be configured to generate the real-time travel suggestions 204 during travel of the user associated with theuser device 210. The real-time suggestion generator 200 can receive real-time risk data streams, e.g., from the systems 106-116 that indicates changes or developments in risk. The real-time travel suggestions 204 can indicate one or more changes to transportation, restaurants, hotels, etc. that mitigate or reduce risk levels for theitinerary 206 of the user associated with theuser device 210. - For example, based on contact tracing data received from the
contact tracing system 116, the real-time suggestion generator 200 can determine that the user will have an overlapping contact in an airport, on a plane, within a hotel within an infected person. To avoid making contact with the infected person or persons, the real-time suggestion generator 200 can recommend alternative transportation, restaurants, or overnight accommodations that avoid contact with individuals or reduce a number of infected individuals that the user associated with theuser device 210 may come into contact with. The real-time suggestion generator 200 can be configured to predictive a level of separation from infected persons during travel to determine a risk score and, based on the risk score, generate the real-time travel suggestions 204. - In some embodiments, the real-
time travel suggestions 204 are based on location data received from theuser device 210 and the location based health data received from thehealth data systems 111. For example, if a user stops at a restaurant in a geographic area associated with high infection rates (e.g., there is a hospital blocks from the restaurants with a high number of hospitalized infected persons) which can be determined by the real-time suggestion generator 200 from the location data of theuser device 210 and the location based health data of thehealth data systems 111, the real-time suggestion generator 200 can generate a suggestion to avoid the restaurant. In some embodiments, the real-time travel suggestions 204 are suggestions to adjust certain legs of travel, change a travel time (e.g., shift by a day or week), or utilize risk mitigation (e.g., use of a mast, sanitization, social distancing, etc.) - In some embodiments, the
travel application 124 can receive a planned activity from theuser device 210 and score the activity with a risk score. For example, the user may ask a question, “How risky is it to dine downtown in Chicago tonight?” and thetravel application 124 can respond to the question by calculating a risk score for Chicago dining based on infection levels in the city, based on contact traces in an area, whether the user plans to dine indoors or outdoors, sanitizing scores for restaurants, ratings for social distancing practices, levels of law enforcement, predicted weather (e.g., whether indoor or outdoor seating will be available). The risk score for the activity can provide an indication of how risky planned behaviors are. - Referring now to
FIG. 3 , a flow diagram of aprocess 300 of generating and dynamically updating a travel itinerary based on disease related risk that can be performed by thetravel application 124 is shown, according to an exemplary embodiment. In some embodiments, thetravel application 124 is configured to perform some or all of the steps of theprocess 300. In some embodiments, any computing device as described herein can be configured to perform theprocess 300. - In
step 302, thetravel application 124 can receive travel data associated with a travel plan of a user, the travel plan indicating one or more travel locations. The travel plan can indicate one or more destinations that the user will be visiting and approximate or definite times and/or days that the user needs to arrive in each destination. The travel plan can indicate preferred transportation options (e.g., rental car, airplane, bus, etc.), food preferences (e.g., vegan or vegetarian dining, preference for certain types of food, etc.), and/or any other travel preference of the user. - In
step 304, thetravel application 124 can receive risk data associated with one or more transportation methods to the one or more travel locations. For example, thetravel application 124 can determine that a direct bus route from a first city to another city is less risky than a flight with multiple connections from the first city to the second city. Thetravel application 124 could select a first flight over a second flight in response to determining that infected individuals are booked for the second flight. Furthermore, thetravel application 124 can select hotels and/or restaurants based on risk data associate with the hotels and restaurants. - In
step 306, thetravel application 124 generates the travel itinerary for the user. The travel itinerary can include one or more selected travel methods (e.g., a flight, a rental car, a bus, etc.), one or more restaurants, one or more over night stay accommodations, etc. In some embodiments, the user can review and edit the itinerary. Any changes the user makes to the itinerary can be associated with risk scores that thetravel application 124 can provide to the user so that the user understands increases or decreases in risk associated with the actions. The user can accept the travel itinerary and thetravel application 124 can book the travel methods, restaurants, and hotels for the user. - In some embodiments, the
travel application 124 generates an infection travel risk score. The infection travel risk score can be displayed to a user via theuser device 210 to provide a user with an indication of their travel risk. The infection travel risk score can be a value, level, or other indicator that indicates a risk associated with catching a disease. The infection travel risk score can be generated based on risk data indicating levels of risk associated with travel destinations of the user. The risk data can indicate infection levels associated with the travel destinations, population levels of the destinations, disease prevention practices performed at the destinations (e.g., lockdowns, use of masks, etc.), etc. Based on the risk destination risk data, thetravel application 124 can generate the travel risk score. - Furthermore, in addition to, or instead of generating the travel risk score based on the destination risk data, the
travel application 124 can generate the travel risk score based on personal risk data associated with the user. The personal risk data can indicate a risk associated with the user of theuser device 210. The personal risk data can indicate the age of the user, the body mass index (BMI) of the user, medical conditions of the user (e.g., asthma, heart related problems), and/or activities performed by the user (e.g., whether the user frequently exercises, smokes, adheres to a vegan or vegetarian diet, consumes alcohol, etc.). In this regard, the travel risk score may be higher for a user that has asthma and is older than a particular age. In comparison, an infection travel risk scores of a user that exercises frequently and is younger than the particular age may have a lower risk score. - In some embodiments, the infection travel risk score changes overtime as data is collected. The
travel application 124 can generate suggestions to update the travel plan of the user based on change in the infection risk score. For example, if the infection travel risk score increases to a value greater than a particular amount caused by change in the destination risk data or the personal risk data, thetravel application 124 can generate a suggested update to the travel plan. - In some embodiments, the
travel application 124 can generate multiple different travel routes from a travel plan of a user indicating an originating location and one or more travel destinations. Thetravel application 124 can score each route with an infection route risk score indicating the level of risk that a user experiences when traveling on the route. The infection route risk score can indicate infection risk levels associated with each travel route and/or personal risk data associated with the user. Thetravel application 124 can generate a suggestion to travel on one route of the routes associated with a lowest infection route risk score, can generate a user interface indicating each travel route and the score of each route, and/or can generate a list of the routes sorted in order of lowest risk score to highest risk score. - In
step 308, thetravel application 124 can receive risk updates associated with the travel itinerary during travel by the user. The updates may be threat events such as the rapid spread of a disease in a geographic area, an indication that an infected user has booked a hotel room in a hotel that the user is staying in, and/or any other update to risk levels associated with the itinerary of the user. - In
step 310, thetravel application 124 can generate one or more travel suggestions for the user that mitigate or reduce the risk updates. For example, if the user plans to stop at a restaurant in a geographic area that has greatly increased in infection levels, the suggestion could be to dine in a geographic area with a lower infection level. Similarly, if a flight is cancelled and a user will need to dwell in an airport for an extended period of time, the suggestion may be to take a direct bus to the destination instead of waiting in the airport. Instep 312, thetravel application 124 can update the travel itinerary based on the one or more suggestions in response to receiving user approval of the changes. - In some embodiments, at the end of the trip performed by the user, the
travel application 124 can generate a summary page. The summary page can indicate an original risk score for the tip of the user generated by thetravel application 124 and a concluding risk score based on deviations that the user has performed. For example, the concluding risk score can indicate what a user has done while traveling, where they have stayed, where they have eaten, and/or what other people the user has come into contact with. - Referring now to
FIG. 4 , the trustedservice provider application 128 is shown in greater detail, according to an exemplary embodiment. The trustedservice provider application 128 can communicate withservice provider systems service provider systems service provider application 128 can receive service provider data from theservice provider systems 400. - The service provider data can be data of a health data stream associated with the
service provider systems 400 and/or risk data streams. For example, the service provider data could indicate whether one or more social distancing practices, disinfection practices, and/or any other health related practices are performed by theservice provider systems 400 to reduce the risk of spreading disease. The risk related data can be an indication of infection levels for geographic areas that stores of the service provider are located, numbers of infected individuals frequenting the stores, and/or any other risk related data. - The
performance analyzer 404 can be configured to analyze the service provider data, e.g., correlate the health data streams and the risk data streams, to determine whether theservice provider systems 400 are trusted or are not trusted. Trusted service provider systems can be added or maintained in a trustedprovider list 406 while service providers that are not trusted can be removed from the trustedprovider list 406. Furthermore, in some embodiments, theperformance analyzer 404 can analyze the health data indicating health practices by each of theservice provider systems 400. Inspection data received form aninspector system 410 can confirm that the health practices that theservice provider systems 400 claims to practice are actually practiced. - For example, a hotel might score each room that people have stayed within based on contact tracing data, temperature measurements, and/or a survey. Each room could be rated based on risk and only low risk rooms rented out to individuals. In some embodiments, a heat map view could be provided by the hotel to users to determine whether or not to book room sin the hotel and/or what rooms that user would like to book. Based on these health practices, the
performance analyzer 404 can determine that the hotel is a trusted service and can add the hotel to the trustedprovider list 406. - The trusted service providers of the trusted
provider list 406 can be configured to share disease related information with each other, facilitate contact tracing, etc. Furthermore, since the service providers of the trusted provider list may all perform health related tests for employees, sanitization of their physical stores, etc., other service providers may likely wish to do business with the service providers since they have been verified as being low health risk businesses. For example, a car service that rents cars can rate each car with a health risk score. If a service provider of the trustedprovider list 406 wishes to rent cars from the service provider, as part of the trustedprovider list 406, the car service may rent the service provider low risk score cars. - The
service provider systems 402 and/or theuser device 210 may access the trustedprovider list 406 if theservice provider systems 402 and/or the user of theuser device 210 are subscribed to the trustedprovider list 406. The service provideselector 408 can receive a query from theservice provider systems 402 and/or theuser device 210 for a recommended service provider. For example, the query could request recommended hotels or recommended airlines. Theservice provider selector 408 can query the trustedprovider list 406 and return the recommended service provider to theservice provider systems 402 and/or theuser device 210. Theservice provider systems 402 may consult the trustedprovider list 406 to help identify business partners while theuser device 210 may consult the list to identify a service provider to purchase a product or service from. - In some embodiments, service providers of the trusted
provider list 406 share risk data with each other. The risk data could be the health data streams or the risk data streams described with reference toFIG. 1 and elsewhere herein. The risk data can indicate the precautions or risks associated with assets of the service providers, e.g., what types of cleaning or health policies are performed at a physical store, whether infected individuals have visited physical sites, rented cars, stayed in hotel rooms, etc. In some cases, one service provider of the trustedprovider list 406 can provide a request for risk data for another service provider of the trustedprovider list 406 to theapplication 128. Theapplication 128 can determine whether the one service provider has access to the risk data of the other service provider and response to the one service provider with the risk data in response to determining that the one service provider has access to the other service provider. In some embodiments, the trustedprovider list 406 indicates one or more services providers that each service provider does and does not have risk data access for. - In some embodiments, the risk data that the services providers share indicate risk levels associated with assets of each service provider. For example, the risk level associated with a hotel room, a physical brick and mortar store, a conference room, a rental car, etc. In this regard, one service provider would have the data to make decisions such as reserve the safest hotel rooms, the safest conference rooms, visit the safest physical brick and mortar stores, etc.
- Referring now to
FIG. 5 , aprocess 500 of managing a trusted network of service providers based on disease related risk that can be performed by the trustedservice provider application 128 is shown, according to an exemplary embodiment. In some embodiments, the trustedservice provider application 128 is configured to perform some or all of the steps of theprocess 500. In some embodiments, any computing device as described herein can be configured to perform theprocess 500. - In
step 502, the trustedservice provider application 128 receives a request from a service provider system to be added to a trusted network of service providers. The service provider may be an airline, a hotel chain, a hotel location, an airport, a retail store, a retail chain, etc. - In
step 504, the trustedservice provider application 128 can receive health safety performance data associated with the service provider. The health safety performance data can include health data of a health data stream and risk data of a risk data stream. The health data can indicate performance of the service provider with respect to practicing social distancing, disinfection practices performed by the service provider, employee health testing, etc. The risk data can indicate whether the service provider is located in a high infection area, whether the service provider has been frequented by infected individuals, etc. - The health data and the risk data can be included within, or otherwise indicated by, a manifest. The manifest can be the manifest described with reference to
FIGS. 13-14 and can be stored by the service provider. The trustedservice provider application 128 is configured to validate the manifest received from the service provider, in some embodiments, based on another copy of the manifest stored in a blockchain and created by an external system. The trustedservice provider application 128 can verify a hashed copy of the manifest stored in the blockchain, verify signatures of the service provider and/or the external system, etc. as described with reference toFIGS. 13-14 . - In
step 506, the trustedservice provider application 128 can analyze the safety performance data to determine whether the service provider meets a level of health safety. The trustedservice provider application 128 can correlate the health data of the health data stream with the risk data of the risk data stream to determine whether the service provider meets the level of safety. Instep 508, in response to a determination that the service provider meets the safety level, the trustedservice provider application 128 can add the service provider to the trusted network of service providers. - In
step 510, the trustedservice provider application 128 can receive a request from a device for a recommended service provider of the trusted network of service providers. For example, the device may be a user device of a user that wishes to purchase a product or service from a trusted service provider. In some embodiments, the device is a device of another service provider that would like to partner with a trusted service provider of the trusted service provider network. Instep 512, in response to receiving the request, the trustedservice provider application 128 can provide an indication of the service provider of the trusted network of service providers to the device. - Referring now to
FIG. 6 , the preferredconsumer service application 126 is shown in greater detail, according to an exemplary embodiment. The preferredconsumer service application 126 can be an opt-in application that a user subscribes to. The preferredconsumer service application 126 can offer users dynamic pricing and/or access to the service providers of the trustedprovider list 406. In some embodiments, the preferredconsumer service application 126 is subscribed to by a user for a family. The preferredconsumer service application 126 can provide a family member, or all family members, with risk data for each family member, real-time tracking, and/or risk levels for each family member. - The
user device 210 can provide a request to be added to the consumer service and approval to access private data associated with the user of theuser device 210 to the preferredconsumer service application 126. Asafety behavior analyzer 604 can receive consumer behavior data from aphysical store system 112. The consumer behavior data can further be received from any of the systems 106-116. In some embodiments, the consumer behavior data is consumer data of asurveillance system 114 that indicates actions performed by a user within a physical store, e.g., wearing a mask, practicing social distancing, disinfecting, etc. Furthermore, thesafety behavior analyzer 604 can receive health data associated with the user from a privatehealth data system 602. The health data indicates whether the user has tested positive or negative for a disease, a recent body temperature measurement, etc. - The
safety behavior analyzer 604 can analyze the consumer behavior, the health data, and/or various streams of risk data to determine a safety rating for the user. The risk data may indicate what geographic areas the user has visited and what infection levels are associated with those geographic areas, whether the user has come into contact with infected individuals, etc. The risk score can be provided to the consumer list updater 608. The consumer list updater 608 can add the user to theconsumer list 610 and/or remove the consumer from theconsumer list 610 based on the safety rating. If the safety rating is above a particular amount, the user can be added to theconsumer list 610. If the safety rating is less than the particular amount, the user can be withheld from or removed from theconsumer list 610. - Users of the
consumer list 610 who may practice social distancing within a store, the user can be award a price discount for a product or service. Theconsumer discount generator 606 can generate a price discount for the user and provide the discount to theuser device 210. Furthermore, if the user has been added to theconsumer list 610, the user may have access to restricted store hours. The restrictedstore hour provider 612 can provide restricted store hours of the trustedprovider list 614 to theuser device 210. In some embodiments, the restrictedstore hour provider 612 can provide an identify or a credential of the user that has access to the restricted store hours to thephysical store system 112 for automatic access to the physical store during restricted store hours. - Referring now to
FIG. 7 , aprocess 700 of managing a trusted consumer service based on disease related risk that can be performed by the preferredconsumer service application 126, according to an exemplary embodiment. In some embodiments, the trustedservice provider application 128 is configured to perform some or all of the steps of theprocess 700. In some embodiments, any computing device as described herein can be configured to perform theprocess 700. - In
step 702, the preferredconsumer service application 126 receives a request to be added to a consumer service and approval to access private date from a user device of a user. The user, in some embodiments, may provide payment information to subscribe themselves, and/or their family members to the consumer service. - In
step 704, the preferredconsumer service application 126 can receive consumer health behavior data from a physical store system. The consumer health behavior data may be data of a health data stream that indicates the precautions that the user is taking within the physical store, e.g., social distancing, opting in to contact tracing, using disinfection, wearing a mask, etc. The health behavior data can be a written survey that a user fills out to indicate what precautions the user has or is taking to avoid contracting or spreading a disease. Furthermore, the health behavior data could be video surveillance data indicating that the user has or is taking precautions to avoid contracting or spreading a disease in a physical store of a service provider. - In
step 706, based on the consumer health behavior data, the preferredconsumer service application 126 can determine whether the behavior of the user meets one or more health safety rules. Furthermore, the preferredconsumer service application 126 can receive risk data associated with the user. The risk data may indicate whether the user has recently been located in high infection geographic areas, has opted into a trusted traveler program that tracks activity of a user, has come into contact with infected individuals, etc. The preferredconsumer service application 126 can correlate the risk data stream with the health data stream to determine whether the user poses a health risk to the physical building. - In some embodiments, the consumer health behavior data is travel history data of a user. For example, the travel history may indicate one or multiple geographic locations that the user has been present at, one or multiple restaurants that the user has eaten at, and/or one or more hotels that the user has stayed at, etc. The analysis to determine whether the user should be added to a trusted consumer list and/or determine whether the user meets the one or more health safety rules can be performed based on the travel history data. The analysis can include determining a risk level for a user and comparing the risk level to a threshold by the
travel application 124. - In some embodiments, the travel history data can be stored in a manifest of the user device and can be validated based on a copy of the manifest stored in the blockchain. In this regard, the preferred
consumer service application 126 can be configured to receive the manifest from the user device and validate the manifest based on a hashed copy of the manifest stored in the blockchain. Theconsumer service application 126 can verify a signature of the manifest of the user device and/or an external system that records the activity of the user. The verification of the manifest is described in greater detail with reference toFIGS. 13-14 . - In
step 708, in response to determining that the behavior of the user meets the one or more health safety rules, the preferredconsumer service application 126 can provide a discount to the user device for the user. The discount can incentive the user to continue practicing social distancing techniques while in the physical store, wearing a mask, etc. Furthermore, instep 710, the preferredconsumer service application 126 can provide the user via the user device with access to the physical store at one or more restricted hours. The restricted hours may be hours only available to users that have a risk score less than a particular amount. - Referring now to
FIG. 8 , aprocess 800 of generating an infection travel risk score for a user by thetravel application 124 is shown, according to an exemplary embodiment. In some embodiments, thetravel application 124 is configured to perform some or all of the steps of theprocess 800. In some embodiments, any computing device as described herein can be configured to perform theprocess 800. - In
step 802, thetravel application 124 receives travel data for a travel plan of a user indicating one or more travel destinations. The travel data can indicate a departure location, a departure time, a destination, and/or a destination time. The travel data can further include travel preferences, e.g., flight times (e.g., morning flights vs. red eye flights), preferred modes of travel (e.g., preference for using a bus), and/or any other indication of travel. The travel data can indicate a single travel destination or a sequence of travel destinations that a user plans on visiting, e.g., a set of cities that the user is traveling to for a vacation and/or a business trip. - In
step 804, thetravel application 124 receives destination risk data indicating a destination risk of one or more travel destinations associated with a transmission of an infectious disease. For example, the destination risk data can indicate a level of risk that a user may experience in a particular geographic area. For example, when the destination is a particular city, the city may have particular percentage of infected individuals that are infected with the infectious disease. The higher number of infected individuals, and/or a higher the rate of increase in the number of infected individuals, can indicate risk data for the destination. - In some embodiments, the destination is a particular hotel, a particular business campus, etc. The destination risk data can indicate the number of infected individuals at the destination. In some embodiments, the destination risk data can indicate a time since which an infected individual was last at the destination.
- In
step 806, thetravel application 124 receives personal risk data indicating a risk of the user associated with the infectious disease. For example, the personal risk data can indicate characteristics of a user that is traveling. For example, the health of the user, the age of the user, and/or other information of the user. For example, the personal risk data could indicate health conditions of the user, e.g., whether the user has asthma, whether the user has a heart problem, whether the user has had a stroke, etc. The personal risk data can further indicate whether the user exercises frequently, has had a medical checkup recently, etc. The personal risk data can indicate whether the user is immune to a disease. For example, the personal risk data could indicate the results of an antibody test indicating that the user has previously caught and recovered from a disease. This can indicate that the user is immune to catching the disease. - In
step 808, thetravel application 124 can generate an infection travel risk score for the user based on the destination risk data received in thestep 804 and/or the personal risk data received in thestep 806. Thetravel application 124 can weigh the personal risk data against the destination risk data. For example, thetravel application 124 can generate a higher infection travel risk score for the user when the user is susceptible to an infectious disease. For example, for a user that is at a particular age susceptible to a disease, the infection travel risk score can be set to a high value in response to the user traveling to, or being present, at a destination or location where an infected individual has recently been present. - Referring now to
FIG. 9 , asystem 900 of therisk analytics system 110 performing risk scoring for anexternal system 906 is shown, according to an exemplary embodiment. Thesystem 900 includes aprivate information database 902, auser device 904, anexternal system 906, and therisk analytics system 110. Theprivate information database 902 can be a database of disease risk related data, e.g., the health data streams, the risk data streams, antibody data of a user, infection travel risk scores (e.g., as determined by the travel application 124) and/or the threat events described with reference toFIG. 1 . Theprivate information database 902 can be any type of database, e.g., a private or public blockchain database (e.g., as described with reference toFIGS. 13-14 ), a Structured Query Language (SQL) database, a Relational Database Management System (RDMS) database, a relational database, a non-SQL (NoSQL) database, a non-relational database, etc. - The
external system 906 can be a system external to therisk analytics system 110. For example, theexternal system 906 can be managed by a third party entity separate from therisk analytics system 110. Theexternal system 906 can be agovernment customs system 908. Theuser device 904 may send an access request to thegovernment customs system 908. In response to the access request, thegovernment customs system 908 can request an infectious disease risk level for the user of theuser device 904 and receive a risk scoring result from therisk analytics system 110. Thegovernment customs system 908, which may be a domestic or international system, can use the score to determine whether to grant the user entry into a country or location within a country. The score can be a credential, a trusted passport, and/or e-passport indicating that the user does not pose a threat to the country and/or the location within the country. - For example, if one country is blocking entry of travelers from another country, the first country could use the risk scoring to make exceptions for travelers from the second country if the travelers are scored at a low risk score, a risk score less than a particular amount indicating that the user poses a low risk of brining an infectious disease into the country. Various governments, government agencies (e.g., military, customs, etc.) can use the risk scoring provided by the
risk analytics system 110. - In some embodiments, the
external system 906 includes anovernight accommodations system 910, aphysical store system 912, ahospital system 914, and/or ameeting scheduling system 916. The systems 910-916 could communicate with therisk analytics system 110 to determine risk scores that can be used to determine whether a user should have access to an overnight accommodation, access to shopping at a physical store, entry into a hospital, determine whether an employee can work on premises instead of remotely and/or can attend a meeting in person or should alternatively attend the meeting online. For example, if a user has recently traveled to a risky location, a location with a high infection count, the user may be asked to attend a meeting remotely or quarantine before returning to work in an office by themeeting scheduling system 916 communicating with theuser device 904. - Instead of exposing the private information of the user of the
user device 904 stored in theprivate information database 902, therisk analytics system 110 can act as a clearing house that validates threshold risk scores without exposing private information. The risk scoring result can be a numerical value of risk for a user and/or a pass fail binary value. In some embodiments, the request for infectious disease risk level review by theexternal system 906 includes a set of criterion of theexternal system 906. Therisk analytics system 110 can be configured to query the private information of the user from theprivate information database 902 and determine whether the user meets the criterion. Therisk analytics system 110 can return the score and/or a binary result of the analysis. - The
risk analytics system 110 can be configured to score the private data of the user to determine a risk score of the user. Therisk analytics system 110 can be configured to compare the risk score to a threshold to determine whether the risk score of the user is greater or less than the threshold. If the risk score is greater than the threshold, the risk may be too great. The risk score may be a probability of the user having the infectious disease. The score can be based on historical activities of the user, whether the user has come into contact with infected individuals, whether the user has been tested for the infectious disease, whether the user has been present in high infection areas, etc. - Referring now to
FIG. 10 , aprocess 1000 of performing risk scoring by the risk analytics system ofFIG. 1 for the external system ofFIG. 9 is shown, according to an exemplary embodiment. Theprocess 1000 can be performed by the components ofFIG. 9 , e.g., theuser device 904, theexternal system 906, and/or therisk analytics system 110. However, theprocess 1000 can be performed by any computer system or device described herein. - In
step 1002, theexternal system 906 receives an access request from auser device 904. The access request can be triggered by a user requesting some sort of access, e.g., entry into a country, entry into a building, approval to work on-premises, inclusion in a physical meeting, etc. Instep 1004, theexternal system 906 requests an infectious disease risk level of the user of theuser device 904 to be reviewed by therisk analytics system 110. The request can further indicate the review or approval criteria that should be applied by therisk analytics system 110. - In
step 1006, therisk analytics system 110 can receive personal risk data indicating a risk of the user associated with the infectious disease from theprivate information database 902. Instep 1008, therisk analytics system 110 can generate a risk score based on the personal risk data received in thestep 1006. Therisk analytics system 110 can determine what level of risk the user poses based on where the user has recently been located (e.g., in high infection geographic areas or low infection geographic areas), has come into contact with an infected individual, etc. The riskanalytic system 110 can provide a score and/or a result of a comparison of the score to a threshold to theexternal system 906. In some embodiments, the risk scoring can include generating an infection travel risk score by thetravel application 124. - Referring now to
FIG. 11 , asystem 1100 of therisk analytics system 110 sharing infectious disease data with anotheruser device 1102 or theexternal system 906 based on a command received from theuser device 1102 is shown, according to an exemplary embodiment. The data sharing ofFIG. 11 illustrates a user device sharing infectious disease data to another user device or another external system. However, the data sharing can be performed between two employees (e.g., peer to peer), an employer and a partner system, a user and an airline, a user and a hospitality entity, etc. - In some embodiments, the
system 110 can facilitate a sharing feature for theuser device 904 via a message (e.g., a text message, an email, etc.). The user deice 904 shares a risk score or disease data with other users, e.g., theuser device 1102. Furthermore, therisk analytics system 110 can facilitate data sharing with outside systems, e.g., theexternal system 906. For example, if the user associated with theuser device 904 is visiting a campus, the user may share their infectious disease risk data with the external system of the campus. - As another example, a healthcare facility could receive infectious disease data from the
risk analytics system 110 to help identify what is wrong with a patient. For example, if a user has been present in a particular country where an infectious disease is present, the infectious disease data received from therisk analytics system 110 could be used by a doctor or nurse to identify what is wrong with the patient. In some embodiments, thesystem 1100 facilitates bi-directional data sharing between a testing lab, a hospital, and/or a user. - In some embodiments, the infectious disease data shared by the
risk analytics system 110 is a credential of a user of theuser device 904. The credential can be a credential that gives an anonymized risk score for the user of theuser device 904 that the user can share with other systems or devices. In some embodiments, therisk analytics system 110 issues an enhanced credential that includes a description of personal data of the user. In some embodiments, theexternal system 906 first receives a normal credential to determine whether the user meets a threshold. After the system determines that the user meets the threshold, therisk analytics system 110 can expose more information of the user to the system in the form of the enhanced credential. The normal and enhanced credentials can be opted into or opted out of by a user of theuser device 904. - In some embodiments, the
risk analytics system 110 may issue an antibody credential for a user. If the user has previously caught an infectious disease but has built up the antibodies to be immune to the infectious disease, therisk analytics system 110 may issue an antibody credential to the user that can be shared with other systems. The antibody credential can be generated in response to receiving antibody data from a medical testing system that may process an antibody test result of a user. - The
risk analytics system 110 can be configured to collect infectious disease data from theprivate information database 902. The infectious disease data can be associated with a user of theuser device 904, e.g., indicate a travel history of the user, indicate a risk level of the user, indicate what other individuals the user has come into contact with, include the health data streams, the risk data streams, etc. Therisk analytics system 110 can share the infectious disease data with theuser device 904 in response to receiving a request. In some embodiments, therisk analytics system 110 generates a link to the infectious disease data and provides theuser device 904 with the link so that theuser device 904 can share the link with other devices, e.g., theuser device 1102. - In some embodiments, the
risk analytics system 110 performs scoring based on the infectious disease data to generate a risk level or risk credential for the user of theuser device 904. The risk scoring can be the same or similar to the risk scoring described with reference toFIGS. 9-10 . - Referring now to
FIG. 12 , a flow diagram of aprocess 1200 of sharing infectious disease data with another user device or theexternal system 906 based on a command received from theuser device 904 is shown, according to an exemplary embodiment. Theprocess 1200 can be performed by the components ofFIG. 11 , e.g., theuser device 904, theexternal system 906, theuser device 1102, and/or therisk analytics system 110. However, theprocess 1200 can be performed by any computer system or device described herein. - In
step 1202, therisk analytics system 110 receives a command to share infectious disease data from theuser device 904. The command can indicate that a user of theuser device 904 has given approval to share private data of the user with other users and/or systems. In some embodiments, the command indicates particular users and/or systems that the user would like to share the infectious disease data with. - In response to the approval received in the
step 1202, therisk analytics system 110 can collect infectious disease data instep 1204. In some embodiments, therisk analytics system 110 collects risk data of the user, e.g., travel data, what hotels the user has stayed at, whether the user has tested positive or negative for an infectious disease, etc. The risk data can further indicate scores, e.g., a risk score calculated by therisk analytics system 110 indicating how likely the user is to infect others with an infectious disease. In some embodiments, collecting the infectious disease data includes collecting an infection travel risk score determined by thetravel application 124 from theprivate information database 902. - In
step 1206, therisk analytics system 110 can provide at least one of the infectious disease data or a link to the infectious disease to theuser device 904. The infectious disease data can be the data collected and/or determined in thestep 1204 by therisk analytics system 110. In some embodiments, therisk analytics system 110 generates a webpage or another data storage element that stores the infectious disease data. Therisk analytics system 110 can provide a link to the webpage or other data storage element to theuser device 904. In some embodiments, any user and/or particular user accounts can access the link. Instep 1208, the user of theuser device 904 can share the infectious disease data and/or a link to the infectious disease data with theuser device 1102 and/or theexternal system 906. In some embodiments, instep 1210, therisk analytics system 110 sends the infectious disease data directly to theexternal system 906 and/or theuser device 1102. - Referring now to
FIG. 13 , asystem 1300 configured to add a manifest indicating user activity of the user of the user device to ablockchain 1302 is shown, according to an exemplary embodiment. Thesystem 1300 includes a number of nodes 1312-1322 communicating via thenetwork 104. The nodes 1312-1322 can be various computer systems, devices, servers, etc. In some embodiments, the nodes 1312-1322 are the services and systems described inFIG. 1 and elsewhere herein. - The nodes 1312-1322 are shown to include the
blockchain 1302. Theblockchain 1302 can be a chain of data blocks where each data block is linked to a previous block, thus, forming a chain. The chain may be a chain of sequentially ordered blocks. In some embodiments, theblockchain 1302 is a private blockchain that is accessible to only particular systems with proper access credentials. In some embodiments, theblockchain 1302 is a public blockchain that is accessible by any system. - The
blockchain database 1302 can include any number of blocks and new blocks can be added to theblockchain database 1302 by the nodes 1312-1322 and/or by any other system in communication with the nodes 1312-1322. Three blocks of theblockchain database 1302 are shown inFIG. 13 ,block 1304,block 1306, andblock 1308. Each block is shown to include a nonce, data, a hash, and a hash of the previous block in the chain. Theblockchain 1302 is illustrated right to left, that is, the rightmost block is the oldest block shown inFIG. 13 while the leftmost block is the newest block shown inFIG. 13 . The data of each block can be private infectious disease data of a user, travel data of the user, health data of the user, data of the health data streams, data of the risk data streams, etc. - The blocks 1304-1308 are shown to include a nonce value. The nonce value can be a value that when hashed with the data of the block and the previous hash, in addition to other information, results in a hash that meets a difficulty requirement. In
FIG. 13 , the hashes are shown as hexadecimal numbers. InFIG. 13 , the difficulty requirement is that the first three values of each hash are zero but any difficulty requirement for the hashes can be utilized in thesystem 1300. Any of the nodes 1312-1322 can attempt to generate a block with a hash value that meets the difficulty requirement. In some embodiments, some and/or all of nodes 1312-1322 operate to generate a hash value for a new block to be added to theblockchain 1302. If one of the nodes 1312-1322 generates a hash that meets the difficulty requirement, that node can add the block to theblockchain 1302 and notify the other nodes of the solved block so that the other nodes can also add the solved block to theblockchain 1302 that each of the other nodes stores. - The
blockchain 1302 can be configured to store user scores, infectious disease data, and/or private data of a user. Theblockchain 1302 can be utilized to validate risk scores and/or infectious disease data of a user. In some embodiments, theblockchain 1302 is a distributed ledger for a network of systems, e.g., for restaurants, retail businesses, commercial businesses, car rental services, taxi services, rideshare services, etc. for communicating infectious disease data in a trusted network of systems. In some embodiments, theblockchain 1302 can be used to distribute a history of user events or activities, risk flags, infectious disease risk scores for users, and/or a token or data that provides that a user have been avoiding risky places and risky activity. In some embodiments, businesses and/or other entities may provide a user with different levels of access to locations and/or geographic areas based on a score of a user. - The
blockchain 1302 can help make private data anonymous but widely accessible and available to other systems if a user wishes for the data to be shared. Theblockchain 1302 can be used to prove that private data of a user stored in theblockchain 1302 is not being tampered with. Theblockchain 1302 can be a private blockchain, a public blockchain, and/or a combination of a private and a public blockchain. A public blockchain can be an open source blockchain while a private blockchain may have one or multiple defined entities controlling the public blockchain. - In some embodiments, the
system 1300 can be configured to capture and store events in theblockchain 1302. The events can be stored as the data within the blocks of the blockchain, e.g., each block can store one or a set of events. In response to an event occurring, thesystem 1300 can add a new block including data for the event. - In some embodiments, the
external system 906, via ablockchain service 1302 run by theexternal system 906, generates a manifest for an event. The manifest may be a data file describing an activity that a user associated with theuser device 904 has performed and/or engaged in. For example, the manifest may describe a stay at a hotel, a visit to a restaurant, a ride in a car of a rideshare service, a flight taken by the user, a bus ridden by the user, etc. The manifest may include a description of the activity, an identification of the user performing the activity (e.g., an anonymous user identifier tied back to the user), a date of the activity, a beginning time of the activity, an ending time of the activity, and/or any other data. - The manifest can be generated by the
external system 906 for the user of theuser device 904 and provided by theexternal system 906 to theuser device 904. Theexternal system 906 can be a system for a hotel and can generate the manifest for an overnight stay of the user of theuser device 904. In some embodiments, theexternal system 906 can be a system of a restaurant and can generate the manifest for a dining visit of the user of theuser device 904. Theuser device 904 can sign the manifest with a private key of theuser device 904. The private key may be linked to a public identifier, a public key, associated with theuser device 904. Theuser device 904 can return the signed manifest to theexternal system 906. - In some embodiments, a
blockchain service 1324 of theuser device 904 signs the manifest received from theexternal system 906 and returns the manifest to theexternal system 906. Furthermore, theblockchain service 1324 can maintain a log of manifests for all events of the user. When the user of theuser device 904 needs to verify a past event, e.g., a particular manifest, with another system, theexternal system 1328, theblockchain service 1324 can provide the manifest (or a portion of the manifest log or the entire manifest log) to theexternal system 1328 for verification. The verification performed by theexternal system 1328 can be performed by theblockchain service 1326. - In response to receiving a signed manifest from the
user device 904, theexternal system 906 can sign the manifest received from theuser device 904. In some embodiments, theexternal system 906 can sign the manifest before providing the manifest to theuser device 904 for signature by theuser device 904. The signature by theexternal system 906 can verify that theexternal system 906 is the source of the manifest. Theexternal system 906 can sign the manifest with a private key. Furthermore, theexternal system 906 can hash the signed manifest. Theexternal system 906 can be configured to perform any type of hashing algorithm, e.g., MD5, SHA-2, CRC32, etc. Theexternal system 906 can be configured to add the hashed manifest to theblockchain 1302. - In some embodiments, the
user device 904 can validate a manifest with another external system. For example, the user of theuser device 904 may stay in a hotel associated with theexternal system 906. The user may then wish to eat a restaurant associated with theexternal system 1328. However, theexternal system 1328 may first verify what hotel the user associated with theuser device 904 has stayed in before the user associated with theuser device 904 is allowed to eat at the restaurant. Theuser device 904 can provide the manifest to theexternal system 1328. - The
external system 1328 can verify the manifest received from theuser device 904 with theblockchain 1302. Theexternal system 1328 can hash the manifest received from theuser device 904 to determine that the hashed manifest received from theuser device 904 matches the hashed manifest stored in theblockchain 1302. Furthermore, theexternal system 1328 can verify the signature of the manifest stored in theblockchain 1302 and/or the manifest received from theuser device 904 with a public key of theuser device 904. Theexternal system 1328 can verify a signature of theexternal system 906 of the manifest stored in theblockchain 1302 and/or the manifest received from theuser device 904 with a public key of theexternal system 906. - The
external system 1328, via the signed and hashed manifest of theblockchain 1302, can verify that the manifest of theblockchain 1302 identifies the user of theuser device 904. The signature of the manifest provided by theuser device 904 included within theblockchain 1302 can verify that the user associated with theuser device 904. The signature does not expose the identity of the user of theuser device 904 but can be used by theexternal system 1328 to identify the user and verify that an event claimed to be associated with the user is actually associated with the user. - In some embodiments, the private log of manifests stored by the
user device 904 can be used to validate activities with employers (e.g., to determine whether the user provides a risk of spreading an infectious disease and whether the user should return to work), health agencies (e.g., to determine whether the user provides a risk of spreading an infectious disease and/or whether the user should be allowed to enter a country or geographic district), and/or any other entity or system. Furthermore, because the information stored within theblockchain 1302 does not expose private information of the user of theuser device 904 but only includes signed and hashed data, the user of theuser device 904 can choose what systems and/or entities that the user provides their manifest log to. In this regard, the history of events associated with the user of theuser device 904 are kept private but can be verified through theblockchain 1302 in response to the user providing their manifest log for verification. - In some embodiments, the manifest based blockchain event tracking of the
system 1300 can be utilized to track a group of users. For example, a company may employ the system of 1300 to track employees, a state may use thesystem 1300 to track the activities of its citizens, a hospital may use thesystem 1300 to track the activities of its patients, etc. The events can indicate the locations of a user, the restaurant visits of a user, the transit use of the user, etc. Based on the events stored within theblockchain 1302, the risk analytics system 110 (e.g., thetravel application 124 performing theprocess 800 described with reference toFIG. 8 ) can generate an infectious disease risk score indicating how likely a user is to spread an infectious disease. Theblockchain 1302 can store travel locations of a user at multiple places throughout a day, week, month, and/or year. Thetravel application 124 can generate the risk score based on the risk levels associated with various geographic locations, retail stores visited by the user, hotels stayed in, restaurants that the user has eaten in, etc. - Referring now to
FIG. 14 , aprocess 1400 where a manifest is added to theblockchain 1302 and used to verify user activity of the user of theuser device 904 is shown, according to an exemplary embodiment. The systems, devices, and databases shown performing theprocess 1400 can be the systems, devices, and databases described with reference toFIG. 13 . Furthermore,FIG. 14 includes anemployer system 1402 which may be a system associated with an employer of the user of theuser device 904. Theexternal system 1328, theemployer system 1402, theuser device 904, theexternal system 906, and/or theblockchain 1302 can perform some and/or all of the steps of theprocess 1400. - The
process 1400 can utilize theblockchain 1302 to document the traveler behavior of individuals. Due to the private nature of travel, some individuals may not want to be tracked publically but would rather prefer to be tracked indirectly and/or privately. If a user opts in for indirect tracking, the travel behavior of the user can be identified with information stored in theblockchain 1302 in combination with information carried in theuser device 904 to provide a verifiable track and trace of the individual. Theblockchain 1302 can provide a signed artifact, e.g., the manifest, the can be used to verify the activity of the user of theuser device 904. - In
step 1404, theexternal system 906 can register an identifier and credential pair with theblockchain 1302 and/or a service that manages theblockchain 1302. The identifier may be a number, text, and/or an alphanumeric value that uniquely identifies theexternal system 906. Furthermore, theexternal system 906 can further register a credential pair including a public key and a private key with theblockchain 1302. In some embodiments, the identifier of theexternal system 906 is the public key. The public key and the private key can be used to sign data and/or documents and verify the signature of theexternal system 906, e.g., theexternal system 906 can sign the data with the private key while another entity (e.g., the external system 1328) can verify the signature of the data with the public key. - In
step 1406, theuser device 904 can register an identifier and a credential pair with theblockchain 1302 and/or a service that manages theblockchain 1302. The identifier may be a number, text, and/or an alphanumeric value that uniquely identifies theuser device 904. Furthermore, theuser device 904 can further register a credential pair including a public key and a private key with theblockchain 1302. In some embodiments, the identifier ofuser device 904 is the public key. The public key and the private key can be used to sign data and/or documents and verify the signature of theuser device 904, e.g., theuser device 904 can sign the data with the private key while another entity (e.g., the external system 1328) can verify the signature of the data with the public key. - In
step 1408, the external system generates a manifest and provides the manifest to theuser device 904. The user of theuser device 904 may perform an event, e.g., a travel activity associated with travel of the user. For example, the user of theuser device 904 may stay at a hotel associated with theexternal system 906. The manifest may be a receipt of the stay of the user of theuser device 904. The receipt, the manifest, can include metadata describing the stay of the user, e.g., the name of the hotel, the room number of the room that the user stayed in, the check-in date, the check-out date, etc. In some embodiments, the manifest is signed by theexternal system 906 with a private key of theexternal system 906 before the manifest is provided to theuser device 904. - In
step 1410, theuser device 904 signs the manifest with the private key of theuser device 904. In some embodiments, the user reviews the manifest via a display screen of theuser device 904 to verify that the information of the manifest is accurate and provides theuser device 904 with an authorization to sign the manifest via an input device of theuser device 904. Instep 1412, theuser device 904 provides the signed manifest to theexternal system 906. - In
step 1414, theexternal system 906 hashes the manifest (e.g., with or without the signatures of theexternal system 906 and the user device 904) and stores the hashed manifest in theblockchain 1302. The manifest can be stored with a date and time. The data and time may be provided by a trusted time keeping system. -
Steps 1416 and 1418 are optional and are shown in dashed lines. Instep 1416, the signed manifest can be provided to theemployer system 1402. If the user is opted into a private verification/tracking system, e.g., with theemployer system 1402, the manifest could be uploaded to theemployer system 1402 for record keeping and storage. The employer can verify the authenticity of the manifest if desired by looking for the date and/or time, an optional transaction identifier, and/or any other metadata, and verify, via theblockchain 1302, that the hash was in fact stored in the blockchain for that manifest - In step 1418, the
employer system 1402 can analyze a behavior history of the user. Theemployer system 1402 can utilize the uploaded manifest to determine if the user has traveled to a hotspot during a respective time period (e.g., during the last two weeks if the incubation period for the virus is two weeks). Theemployer system 1402 can also use the manifest to auto-populate the expenses reporting system for the user. In some embodiments, theexternal system 906 can provide the manifest directly to theemployer system 1402. For example, theexternal system 906 and an employer may have a contract relationship and theexternal system 906 could upload the manifest to employer systems automatically and not require the user to do so. - In steps 1404-1414, no user identifiable information is shared about the user of the
user device 904 in theblockchain 1302. While the identifier of theuser device 904 and/or the identifier of theexternal system 906 may be stored in the manifest, the exact name of the user of theuser deice 904 and/or the name of theexternal system 906 may not be stored in the manifest. The only information that is stored in theblockchain 1302 is the record that theexternal system 906 added to the blockchain, the hash of the manifest and the date and time the manifest was signed, and other relevant and non-identifying metadata. - If the external system 1328 (e.g., a trusted third party such as a company) wanted to verify the location of an individual for a period of time, the
external system 1328 could send a request for a manifest record of a particular time and/or manifest records of a particular time period. The user of theuser device 904 could respond to the request by theexternal system 1328 and send theexternal system 1328 the manifest (or manifest records for a requested time period) via the user device 904 (or theexternal system 906 could send theexternal system 1328 the manifest) (steps 1420 and/or 1422). Theuser device 904 could identify one or multiple manifests that are associated with a time within the time period specified by theexternal system 1328 and respond to theexternal system 1328 with the identified manifest or manifests. - In
step 1424, theexternal system 1328 can verify the manifest received from theuser device 904. Theexternal system 1328 can use public keys of theuser device 904 and/or theexternal system 906 to verify the authenticity of the manifest stored in theblockchain 1302 and/or the manifest received from theuser device 904. For example, theexternal system 1328 can verify signatures of theuser device 904 and/or theexternal system 906 with public keys of theuser device 904 and/or theexternal system 906 respectively. - Furthermore, the
external system 1328 can compare the received manifest to the manifest of theblockchain 1302 to verify that the received manifest matches the copy of the manifest stored in theblockchain 1302. In some embodiments, because the copy of the manifest stored in theblockchain 1302 is hashed, theexternal system 1328 may first hash the manifest received from theuser 904 and compare the received hashed manifest to the hashed manifest stored in theblockchain 1302 to verify that the two hashed manifests match. The hashing algorithms used by theexternal system 1328 and/or theexternal system 906 may be the same. - In
step 1426, theexternal system 1328 can analyze the behavior of the user indicated by the manifest. Theblockchain 1302 and manifest records could also be used to provide an attestation that the user has not been exposed to a hotspot area without divulging their travel data. For example, a hotel may require attestation that a user has not been in a hotspot area before the user is permitted to stay at a hotel. A third party attestation service could be used that would allow the user to upload their manifests during the requested time period (data only uploaded to the third party service not the company wanting the verification). The third party attestation service would verify the authenticity of the manifests and based on the location and/or date the traveler was at each location. This information could be compared against a database that contains information on the risk of geographic areas at the time periods when the user visited those areas (e.g., number of infected individuals that were at those locations, etc.) and a score could then be generated and securely sent to a requestor. This would allow the requestor to understand the risk profile of the traveler but in a way in which they have no information or details about where that individual has traveled but instead of an attestation from a third party service - The construction and arrangement of the systems and methods as shown in the various exemplary embodiments are illustrative only. Although only a few embodiments have been described in detail in this disclosure, many modifications are possible (e.g., variations in sizes, dimensions, structures, shapes and proportions of the various elements, values of parameters, mounting arrangements, use of materials, colors, orientations, etc.). For example, the position of elements may be reversed or otherwise varied and the nature or number of discrete elements or positions may be altered or varied. Accordingly, all such modifications are intended to be included within the scope of the present disclosure. The order or sequence of any process or method steps may be varied or re-sequenced according to alternative embodiments. Other substitutions, modifications, changes, and omissions may be made in the design, operating conditions and arrangement of the exemplary embodiments without departing from the scope of the present disclosure.
- The present disclosure contemplates methods, systems and program products on any machine-readable media for accomplishing various operations. The embodiments of the present disclosure may be implemented using existing computer processors, or by a special purpose computer processor for an appropriate system, incorporated for this or another purpose, or by a hardwired system. Embodiments within the scope of the present disclosure include program products comprising machine-readable media for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media can be any available media that can be accessed by a general purpose or special purpose computer or other machine with a processor. By way of example, such machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code in the form of machine-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer or other machine with a processor. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a machine, the machine properly views the connection as a machine-readable medium. Thus, any such connection is properly termed a machine-readable medium. Combinations of the above are also included within the scope of machine-readable media. Machine-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.
- Although the figures show a specific order of method steps, the order of the steps may differ from what is depicted. Also two or more steps may be performed concurrently or with partial concurrence. Such variation will depend on the software and hardware systems chosen and on designer choice. All such variations are within the scope of the disclosure. Likewise, software implementations could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various connection steps, processing steps, comparison steps and decision steps.
- In various implementations, the steps and operations described herein may be performed on one processor or in a combination of two or more processors. For example, in some implementations, the various operations could be performed in a central server or set of central servers configured to receive data from one or more devices (e.g., edge computing devices/controllers) and perform the operations. In some implementations, the operations may be performed by one or more local controllers or computing devices (e.g., edge devices), such as controllers dedicated to and/or located within a particular building or portion of a building. In some implementations, the operations may be performed by a combination of one or more central or offsite computing devices/servers and one or more local controllers/computing devices. All such implementations are contemplated within the scope of the present disclosure. Further, unless otherwise indicated, when the present disclosure refers to one or more computer-readable storage media and/or one or more controllers, such computer-readable storage media and/or one or more controllers may be implemented as one or more central servers, one or more local controllers or computing devices (e.g., edge devices), any combination thereof, or any other combination of storage media and/or controllers regardless of the location of such devices.
Claims (21)
1-20. (canceled)
21. A system comprising one or more memory devices having instructions stored thereon, that, when executed by one or more processors, cause the one or more processors to:
receive a request from an external system that controls whether a user is granted access to a geographic area, a building, or a service, the external system providing the request to the system responsive to the user making a request to be granted access to the geographic area, the building, or the service;
retrieve travel data associated with the user indicating one or more historic travel actions taken by the user;
generate an infection risk score for the user based on the travel data, the infection risk score indicating a level of risk that the user poses to infecting users associated with the geographic area, the building, or the service with an infectious disease based on the one or more historic travel actions taken by the user; and
cause the external system to authorize the user access to the geographic area, the building, or the service based on the infection risk score being less than a predefined amount.
22. The system of claim 21 , wherein the travel data further indicates a travel plan of the user, the travel plan indicating one or more travel destinations;
wherein the instructions cause the one or more processors to:
generate a plurality of travel routes from an originating location to the one or more travel destinations;
generate infection route risk scores for the plurality of travel routes; and
perform at least one of:
generating a suggestion for the user to travel on one of the plurality of travel routes associated with a lowest infection route risk score;
generating a user interface including an indication of the plurality of travel routes and the infection route risk scores; or
generating a list including the plurality of travel routes ranked according to the infection route risk scores associated with the plurality of travel routes.
23. The system of claim 21 , wherein the instructions cause the one or more processors to:
receive a request to share the infection risk score from a user device of the user with a second user device or the external system; and
responsive to receiving the request, perform at least one of:
sending the infection risk score to the user device, the second user device, or the external system; or
generating a shareable link to a data source storing the infection risk score and sending the shareable link to the user device.
24. The system of claim 21 , wherein the instructions cause the one or more processors to:
receive personal risk data indicating whether the user has previously contracted and recovered from the infectious disease; and
generate the infection risk score further based on the personal risk data.
25. The system of claim 21 , wherein the instructions cause the one or more processors to:
communicate the infection risk score to the external system in response to generating the infection risk score.
26. The system of claim 25 , wherein the instructions cause the one or more processors to:
receive risk events from at least one of an event notification system, a contact tracing system, or a health authority system; and
generate the infection risk score further based on the risk events.
27. The system of claim 21 , wherein the travel data further indicates a travel plan of the user, the travel plan indicating one or more travel destinations;
wherein the instructions cause the one or more processors to:
receive destination risk data indicating a destination risk of the one or more travel destinations associated with transmission of the infectious disease;
receive personal risk data indicating a risk of the user associated with the infectious disease; and
generate an infection travel risk score for the user based on the destination risk data and the personal risk data.
28. The system of claim 27 , wherein the instructions cause the one or more processors to generate one or more suggestions to the travel plan based on the infection travel risk score increasing to a value greater than a particular amount caused by at least one of a first change to the destination risk data or a second change to the personal risk data.
29. The system of claim 21 , wherein the instructions cause the one or more processors to:
receive a manifest from a user device of the user representing the one or more historic travel actions;
receive a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by a particular system to create a record of the one or more historic travel actions;
validate the manifest received from the user device with the second manifest of the blockchain; and
generate the infection risk score for the user based on the one or more historic travel actions represented by the manifest.
30. The system of claim 29 , wherein the second manifest includes a first signature of the user device and a second signature of the particular system;
wherein the instructions cause the one or more processors to:
determine that the first signature is authentic with a first public key of the user device; and
determine that the second signature is authentic with a second public key of the particular system.
31. The system of claim 29 , wherein the second manifest is hashed by the particular system;
wherein the instructions cause the one or more processors to validate the manifest received from the user device by determining that the manifest matches the second manifest by hashing the manifest received from the user device and comparing a hash of the manifest received from the user device to the second manifest hashed by the particular system.
32. A method comprising:
receiving, by a processing circuit, a request from an external system that controls whether a user is granted access to a geographic area, a building, or a service, the external system providing the request to the processing circuit responsive to the user making a request to be granted access to the geographic area, the building, or the service;
retrieving, by the processing circuit, travel data associated with the user indicating one or more historic travel actions taken by the user;
generating, by the processing circuit, an infection risk score for the user based on the travel data, the infection risk score indicating a level of risk that the user poses to infecting users associated with the geographic area, the building, or the service with an infectious disease based on the one or more historic travel actions taken by the user; and
causing, by the processing circuit, the external system to authorize the user access to the geographic area, the building, or the service based on the infection risk score being less than a predefined amount.
33. The method of claim 32 , wherein the travel data further indicates a travel plan of the user, the travel plan indicating one or more travel destinations;
wherein the method further comprises:
generating, by the processing circuit, a plurality of travel routes from an originating location to the one or more travel destinations;
generating, by the processing circuit, infection route risk scores for the plurality of travel routes; and
performing, by the processing circuit, at least one of:
generating a suggestion for the user to travel on one of the plurality of travel routes associated with a lowest infection route risk score;
generating a user interface including an indication of the plurality of travel routes and the infection route risk scores; or
generating a list including the plurality of travel routes ranked according to the infection route risk scores associated with the plurality of travel routes.
34. The method of claim 32 , further comprising:
receiving, by the processing circuit, a request to share the infection risk score from a user device of the user with a second user device or the external system; and
responsive to receiving the request, performing, by the processing circuit, at least one of:
sending the infection risk score to the user device, the second user device, or the external system; or
generating a shareable link to a data source storing the infection risk score and sending the shareable link to the user device.
35. The method of claim 32 , further comprising:
receiving, by the processing circuit, personal risk data indicating whether the user has previously contracted and recovered from the infectious disease; and
generating, by the processing circuit, the infection risk score further based on the personal risk data.
36. The method of claim 32 , further comprising:
communicating, by the processing circuit, the infection risk score to the external system in response to generating the infection risk score.
37. The method of claim 32 , further comprising:
receiving, by the processing circuit, risk events from at least one of an event notification system, a contact tracing system, or a health authority system; and
generating, by the processing circuit, the infection risk score further based on the risk events.
38. The method of claim 32 , further comprising:
receiving, by the processing circuit, a manifest from a user device of the user representing the one or more historic travel actions;
receiving, by the processing circuit, a second manifest from a blockchain, wherein the second manifest is a copy of the manifest, wherein the second manifest is stored in the blockchain by a particular system to create a record of the one or more historic travel actions;
validating, by the processing circuit, the manifest received from the user device with the second manifest of the blockchain; and
generating, by the processing circuit, the infection risk score for the user based on the one or more historic travel actions represented by the manifest.
39. The method of claim 38 , wherein the second manifest includes a first signature of the user device and a second signature of the particular system;
wherein the method further comprises:
determining, by the processing circuit, that the first signature is authentic with a first public key of the user device; and
determining, by the processing circuit, that the second signature is authentic with a second public key of the particular system.
40. One or more memory devices having instructions stored thereon, that, when executed by one or more processors, cause the one or more processors to:
receive a request from an external system that controls whether a user is granted access to a geographic area, a building, or a service, the external system providing the request to the one or more processors responsive to the user making a request to be granted access to the geographic area, the building, or the service;
retrieve travel data associated with the user indicating one or more historic travel actions taken by the user;
generate an infection risk score for the user based on the travel data, the infection risk score indicating a level of risk that the user poses to infecting users associated with the geographic area, the building, or the service with an infectious disease based on the one or more historic travel actions taken by the user; and
cause the external system to authorize the user access to the geographic area, the building, or the service based on the infection risk score being less than a predefined amount.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/515,844 US20220129999A1 (en) | 2020-06-25 | 2021-11-01 | Systems and methods for dynamic travel planning |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202063044082P | 2020-06-25 | 2020-06-25 | |
US17/067,230 US11164269B1 (en) | 2020-06-25 | 2020-10-09 | Systems and methods for dynamic travel planning |
US17/515,844 US20220129999A1 (en) | 2020-06-25 | 2021-11-01 | Systems and methods for dynamic travel planning |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/067,230 Continuation US11164269B1 (en) | 2020-06-25 | 2020-10-09 | Systems and methods for dynamic travel planning |
Publications (1)
Publication Number | Publication Date |
---|---|
US20220129999A1 true US20220129999A1 (en) | 2022-04-28 |
Family
ID=78331436
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/067,211 Abandoned US20210407690A1 (en) | 2020-06-25 | 2020-10-09 | Systems and methods for a trusted consumer service |
US17/067,230 Active US11164269B1 (en) | 2020-06-25 | 2020-10-09 | Systems and methods for dynamic travel planning |
US17/067,198 Active US11276024B2 (en) | 2020-06-25 | 2020-10-09 | Systems and methods for managing a trusted service provider network |
US17/515,844 Pending US20220129999A1 (en) | 2020-06-25 | 2021-11-01 | Systems and methods for dynamic travel planning |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/067,211 Abandoned US20210407690A1 (en) | 2020-06-25 | 2020-10-09 | Systems and methods for a trusted consumer service |
US17/067,230 Active US11164269B1 (en) | 2020-06-25 | 2020-10-09 | Systems and methods for dynamic travel planning |
US17/067,198 Active US11276024B2 (en) | 2020-06-25 | 2020-10-09 | Systems and methods for managing a trusted service provider network |
Country Status (1)
Country | Link |
---|---|
US (4) | US20210407690A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023233566A1 (en) * | 2022-06-01 | 2023-12-07 | 日本電気株式会社 | Server device, system, server device control method, and storage medium |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111612558A (en) * | 2019-02-25 | 2020-09-01 | 福特全球技术公司 | Method and system for travel offers |
US20220028562A1 (en) * | 2020-07-22 | 2022-01-27 | Pandemic Insights, Inc. | Personal and corporate pathogen-risk assessment with pandemic-bio-surveillance multi pathogen systems |
US11240636B1 (en) * | 2020-07-28 | 2022-02-01 | Bank Of America Corporation | Digital passport with verified data provenance |
US20220170756A1 (en) * | 2020-12-02 | 2022-06-02 | Here Global B.V. | System and method for generating and utilizing map data indicative of health infection conditions |
US11933619B2 (en) * | 2020-12-07 | 2024-03-19 | International Business Machines Corporation | Safe zones and routes planning |
US20220188717A1 (en) * | 2020-12-15 | 2022-06-16 | International Business Machines Corporation | Determining risk mitigation measures from assessed risks |
US20220187085A1 (en) * | 2020-12-15 | 2022-06-16 | Metropolitan Life Insurance Co. | Systems, methods, and devices for generating a transit route based on a safety preference |
US11556951B1 (en) | 2021-01-12 | 2023-01-17 | Wells Fargo Bank, N.A. | Systems and methods for geolocation-based city and community promoted augmented reality rewards |
US11776004B1 (en) * | 2021-01-12 | 2023-10-03 | Wells Fargo Bank, N.A. | Systems and methods for geolocation-based city and community promoted augmented reality rewards |
US11831688B2 (en) * | 2021-06-18 | 2023-11-28 | Capital One Services, Llc | Systems and methods for network security |
US20230184558A1 (en) * | 2021-12-10 | 2023-06-15 | Here Global B.V. | System and method for generating navigation data |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170351832A1 (en) * | 2016-06-01 | 2017-12-07 | International Business Machines Corporation | Personal travel health vulnerability navigator |
US20190098013A1 (en) * | 2017-09-25 | 2019-03-28 | Walmart Apollo, Llc | System and Methods for Location Verification with Blockchain Controls |
US20190226850A1 (en) * | 2018-01-25 | 2019-07-25 | Walmart Apollo, Llc | System and method for tracking vehicle mileage using blockchain |
US20200244464A1 (en) * | 2019-01-25 | 2020-07-30 | International Business Machines Corporation | Blockchain based authentication |
US10923216B1 (en) * | 2020-06-12 | 2021-02-16 | Tensorx, Inc. | Health status system, platform, and method |
US20210174972A1 (en) * | 2018-08-21 | 2021-06-10 | Patientmd, Inc. | Secure dispersed network for improved communications between healthcare industry participants |
US20210295313A1 (en) * | 2020-03-17 | 2021-09-23 | Mastercard International Incorporated | Method and system for user-based distributed ledgers |
US20210350648A1 (en) * | 2020-05-10 | 2021-11-11 | Lalit Lodha | System and method using optical tags to conduct secure transactions and authentications |
US20210358068A1 (en) * | 2020-05-14 | 2021-11-18 | Bbl Healthcare Solutions Ltd | Method for issuing a verified health pass, use thereof for entering a venue and contact tracing method |
US20210374891A1 (en) * | 2020-05-26 | 2021-12-02 | Dish Wireless L.L.C. | Network tracking and enforcement of social distancing protocols |
US20210379425A1 (en) * | 2020-06-05 | 2021-12-09 | Bich Q. Tran | Personal protection and monitoring |
US20210391089A1 (en) * | 2020-06-15 | 2021-12-16 | Honeywell International Inc. | Methods and systems for reducing a risk of spread of an illness in a building |
US20210390812A1 (en) * | 2020-06-15 | 2021-12-16 | Honeywell International Inc. | Methods and systems for maintaining a healthy building |
Family Cites Families (156)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6148306A (en) | 1998-05-28 | 2000-11-14 | Johnson Controls Technology Company | Data structure for scheduled execution of commands in a facilities management control system |
US6293861B1 (en) | 1999-09-03 | 2001-09-25 | Kenneth M. Berry | Automatic response building defense system and method |
US6590496B2 (en) | 1999-12-06 | 2003-07-08 | Science Applications International Corporation | Rapid threat response for minimizing human casualties within a facility |
US7783500B2 (en) | 2000-07-19 | 2010-08-24 | Ijet International, Inc. | Personnel risk management system and methods |
US6909921B1 (en) | 2000-10-19 | 2005-06-21 | Destiny Networks, Inc. | Occupancy sensor and method for home automation system |
US6792319B1 (en) | 2000-10-19 | 2004-09-14 | Destiny Networks, Inc. | Home automation system and method |
AU2002252294A1 (en) | 2001-03-09 | 2002-09-24 | Radianse, Inc. | A system and method for performing object association at a tradeshow using a location tracking system |
US20040088329A1 (en) * | 2002-10-31 | 2004-05-06 | United States Postal Service. | Methods and system for collecting, tracking, and analyzing safety and health related information |
JP2004203623A (en) | 2002-12-23 | 2004-07-22 | Inventio Ag | Emergency evacuation method and system for person in building and modernization method for existing building using system |
US7366674B2 (en) | 2003-01-24 | 2008-04-29 | Diegane Dione | Occupant management method, system, and program product |
SG137652A1 (en) | 2003-05-06 | 2007-12-28 | Amplus Comm Pte Ltd | Apparatus and method of acquiring and storing data of close contacts |
US6967565B2 (en) | 2003-06-27 | 2005-11-22 | Hx Lifespace, Inc. | Building automation system |
US20050015222A1 (en) | 2003-07-14 | 2005-01-20 | Harrington Kevin J. | System and method for automated building incident response |
US7817046B2 (en) | 2004-02-11 | 2010-10-19 | Cstar Technologies Inc. | Method and apparatus for cataloging and poling movement in an environment for purposes of tracking and/or containment of infectious diseases |
CA2584466A1 (en) * | 2004-10-18 | 2006-04-27 | Bioveris Corporation | Systems and methods for obtaining, storing, processing and utilizing immunologic information of an individual or population |
US7598854B2 (en) | 2005-03-01 | 2009-10-06 | Chon Meng Wong | System and method for creating a proximity map of plurality of living beings and objects |
EP1770454A1 (en) | 2005-09-29 | 2007-04-04 | Diehl AKO Stiftung & Co. KG | Home automation system |
US7705723B2 (en) * | 2006-03-15 | 2010-04-27 | Dp Technologies, Inc. | Method and apparatus to provide outbreak notifications based on historical location data |
US7567844B2 (en) | 2006-03-17 | 2009-07-28 | Honeywell International Inc. | Building management system |
US8498879B2 (en) | 2006-04-27 | 2013-07-30 | Wellstat Vaccines, Llc | Automated systems and methods for obtaining, storing, processing and utilizing immunologic information of individuals and populations for various uses |
WO2008030889A2 (en) | 2006-09-06 | 2008-03-13 | Johnson Controls Technology Company | Space management system and method |
US8415429B2 (en) | 2006-12-11 | 2013-04-09 | Chervron Phillips Chemical Company LP | Styrene butadiene block copolymers for film applications |
US7904209B2 (en) | 2007-03-01 | 2011-03-08 | Syracuse University | Open web services-based indoor climate control system |
EP2143064A4 (en) | 2007-04-02 | 2013-01-23 | Kamran Khan | System and method to predict the global spread of infectious agents via commercial air travel |
US20080277486A1 (en) | 2007-05-09 | 2008-11-13 | Johnson Controls Technology Company | HVAC control system and method |
EP2000934A1 (en) * | 2007-06-07 | 2008-12-10 | Koninklijke Philips Electronics N.V. | A reputation system for providing a measure of reliability on health data |
US20090070134A1 (en) | 2007-09-06 | 2009-03-12 | Valence Broadband, Inc. | Tracking communicable pathogens |
CA2704577C (en) | 2007-11-05 | 2015-10-27 | Sloan Valve Company | Restroom convenience center |
JP5132334B2 (en) | 2008-01-28 | 2013-01-30 | 株式会社東芝 | Air conditioning control device and air conditioning control system using the same |
US20090210262A1 (en) | 2008-02-15 | 2009-08-20 | Remotian Systems, Inc. (Delaware Corporation) | Methods and apparatus for automated travel |
US9529974B2 (en) * | 2008-02-25 | 2016-12-27 | Georgetown University | System and method for detecting, collecting, analyzing, and communicating event-related information |
DE112009002304T5 (en) | 2008-09-29 | 2012-01-19 | Fisher-Rosemount Systems, Inc. | Efficient design and configuration of elements in a process control system |
JP5446227B2 (en) | 2008-11-28 | 2014-03-19 | 株式会社大林組 | Admission management system |
CA2745519A1 (en) * | 2008-12-08 | 2010-06-17 | Infonaut Inc. | Disease mapping and infection control system and method |
US9020647B2 (en) | 2009-03-27 | 2015-04-28 | Siemens Industry, Inc. | System and method for climate control set-point optimization based on individual comfort |
US20100280636A1 (en) | 2009-05-01 | 2010-11-04 | Johnson Controls Technology Company | Building automation system controller including network management features |
CN102804084B (en) | 2009-06-02 | 2016-08-24 | 施耐德电气美国股份有限公司 | The method of integrated multiple management domain |
US8788097B2 (en) | 2009-06-22 | 2014-07-22 | Johnson Controls Technology Company | Systems and methods for using rule-based fault detection in a building management system |
US9753455B2 (en) | 2009-06-22 | 2017-09-05 | Johnson Controls Technology Company | Building management system with fault analysis |
US8600556B2 (en) | 2009-06-22 | 2013-12-03 | Johnson Controls Technology Company | Smart building manager |
US8946924B2 (en) | 2009-07-30 | 2015-02-03 | Lutron Electronics Co., Inc. | Load control system that operates in an energy-savings mode when an electric vehicle charger is charging a vehicle |
GB2488942B (en) | 2009-09-20 | 2014-06-04 | Awarepoint Corp | Wireless tracking system and methods utilizing near-field communication devices |
US8867993B1 (en) | 2009-09-20 | 2014-10-21 | Awarepoint Corporation | Wireless tracking system and method utilizing near-field communication devices |
US9475359B2 (en) | 2009-10-06 | 2016-10-25 | Johnson Controls Technology Company | Systems and methods for displaying a hierarchical set of building management system information |
US20110087650A1 (en) | 2009-10-06 | 2011-04-14 | Johnson Controls Technology Company | Creation and use of causal relationship models in building management systems and applications |
JP5514507B2 (en) | 2009-10-21 | 2014-06-04 | 株式会社日立製作所 | In-area environment control system and in-area environment control method |
US8805707B2 (en) | 2009-12-31 | 2014-08-12 | Hartford Fire Insurance Company | Systems and methods for providing a safety score associated with a user location |
US20110313808A1 (en) | 2010-06-18 | 2011-12-22 | 4Tell Solutions | Built Environment Management System and Method |
US20130226320A1 (en) | 2010-09-02 | 2013-08-29 | Pepperdash Technology Corporation | Policy-driven automated facilities management system |
US9342072B2 (en) | 2010-09-24 | 2016-05-17 | Fisher-Rosemount Systems, Inc. | Methods and apparatus to display process control device information |
US8521676B1 (en) * | 2010-09-30 | 2013-08-27 | AE Solutions | System to build, analyze and manage a real world model in software of a safety instrumented system architecture for safety instrumented systems in a facility |
KR101820738B1 (en) | 2010-10-05 | 2018-01-23 | 삼성전자주식회사 | Method and system for provisioning energy profile in home area network |
US20130036139A1 (en) * | 2011-08-01 | 2013-02-07 | Kung Solutions, LLC | Travel Planning Decision Tool |
US20130268128A1 (en) | 2011-08-25 | 2013-10-10 | Siemens Industry, Inc. | Shared configuration data in a building automation system controller |
US9658607B2 (en) | 2011-10-03 | 2017-05-23 | Siemens Schweiz Ag | System, method and apparatus for grouping building automation objects for group communication within a building automation system |
JP2015501025A (en) | 2011-10-05 | 2015-01-08 | オプテオン コーポレーション | Method, apparatus and system for monitoring and / or controlling a dynamic environment |
US9075909B2 (en) * | 2011-11-20 | 2015-07-07 | Flurensics Inc. | System and method to enable detection of viral infection by users of electronic communication devices |
US8936944B2 (en) | 2011-11-22 | 2015-01-20 | The Boeing Company | Infectious disease detection system |
US8903870B2 (en) * | 2011-12-23 | 2014-12-02 | Aon Global Risk Research Limited | System for managing risk in employee travel |
GB2499288A (en) * | 2012-02-09 | 2013-08-14 | Sita Inf Networking Computing Usa Inc | Path determination |
US20140195664A1 (en) | 2012-02-15 | 2014-07-10 | Flybits, Inc. | Zone Oriented Applications, Systems and Methods |
US8847781B2 (en) | 2012-03-28 | 2014-09-30 | Sony Corporation | Building management system with privacy-guarded assistance mechanism and method of operation thereof |
US9087204B2 (en) | 2012-04-10 | 2015-07-21 | Sita Information Networking Computing Ireland Limited | Airport security check system and method therefor |
TW201347340A (en) | 2012-05-04 | 2013-11-16 | Nat Univ Tsing Hua | A system and method of appropriate services detection for a smart building |
US20140023363A1 (en) | 2012-07-17 | 2014-01-23 | The Procter & Gamble Company | Systems and methods for networking consumer devices |
CN104160382B (en) | 2012-08-07 | 2017-08-08 | 松下知识产权经营株式会社 | Collaboration processing execution method and collaboration processor executive system |
US9953304B2 (en) * | 2012-12-30 | 2018-04-24 | Buzd, Llc | Situational and global context aware calendar, communications, and relationship management |
US9582780B1 (en) * | 2013-01-30 | 2017-02-28 | Skyhigh Networks, Inc. | Cloud service usage risk assessment |
US20140277765A1 (en) | 2013-03-15 | 2014-09-18 | University Of Southern California | Human-building interaction framework for personalized comfort driven system operations in buildings |
EP2992692B1 (en) * | 2013-05-04 | 2018-08-29 | DECHARMS, Christopher | Mobile security technology |
KR20140144504A (en) | 2013-06-11 | 2014-12-19 | 삼성전자주식회사 | Home appliance and mobile device, home appliance control system |
US20150005900A1 (en) | 2013-06-26 | 2015-01-01 | Green Edge Technologies, Inc. | Devices and methods of function-based control in automation systems |
US9618224B2 (en) | 2013-07-26 | 2017-04-11 | Honeywell International Inc. | Air quality based ventilation control for HVAC systems |
US20150032265A1 (en) | 2013-07-29 | 2015-01-29 | Toshiba Global Commerce Solutions Holdings Corporation | Environmental condition control and monitoring systems and methods |
IN2013CH03559A (en) | 2013-10-08 | 2015-09-04 | Ajith Kariguddaiah | |
US20150100330A1 (en) * | 2013-10-08 | 2015-04-09 | Assaf Shpits | Method and system of identifying infectious and hazardous sites, detecting disease outbreaks, and diagnosing a medical condition associated with an infectious disease |
US9930519B2 (en) | 2013-11-21 | 2018-03-27 | Samsung Electronics Co., Ltd. | Method and apparatus for controlling home devices on group basis based upon history of the home devices |
EP3080922A4 (en) | 2013-12-11 | 2017-09-06 | Antisep - Tech Ltd. | Method and system for monitoring activity of an individual |
ES2966668T3 (en) | 2013-12-11 | 2024-04-23 | Siemens Schweiz Ag | Grouping for flexible room layouts |
US20150159893A1 (en) | 2013-12-11 | 2015-06-11 | International Business Machines Corporation | Intelligent thermostat control system |
US20150168926A1 (en) | 2013-12-13 | 2015-06-18 | International Business Machines Corporation | Optimizing facility space assignment |
KR102252263B1 (en) | 2014-04-04 | 2021-05-14 | 삼성전자주식회사 | Of heating, ventilation and air conditioning system |
US9703276B2 (en) | 2014-04-11 | 2017-07-11 | Johnson Controls Technology Company | Systems and methods for creating and using equipment definitions |
US9733656B2 (en) | 2014-04-16 | 2017-08-15 | Salusfin Ltd. | System and method for automated household energy management based on classification and location information |
US9918180B2 (en) | 2014-04-28 | 2018-03-13 | Johnson Controls Technology Company | Systems and methods for detecting and using occupant location in a building management system |
US9560055B2 (en) | 2014-04-30 | 2017-01-31 | Microsoft Technology Licensing, Llc | Client-side integration framework of services |
CN106537429A (en) | 2014-05-28 | 2017-03-22 | 西门子瑞士有限公司 | System and method for providing optimization or improvement measures for one or more buildings |
CN106463038A (en) | 2014-05-29 | 2017-02-22 | 奥的斯电梯公司 | Active threat mitigation control system |
US10358869B2 (en) | 2014-06-17 | 2019-07-23 | Crestron Electronics, Inc. | Shading control network using a control network |
FR3022646B1 (en) | 2014-06-20 | 2017-11-10 | Somfy Sas | METHOD FOR OPERATING A DEVICE FOR CONTROLLING A DOMOTIC INSTALLATION OF A BUILDING AND CONTROL DEVICE |
US10126009B2 (en) | 2014-06-20 | 2018-11-13 | Honeywell International Inc. | HVAC zoning devices, systems, and methods |
CA2954181C (en) | 2014-07-03 | 2023-01-24 | Zohar Laufer | Personnel proximity detection and tracking system |
US10012963B2 (en) | 2014-07-15 | 2018-07-03 | Throughtek Technology (Shenzhen) Co., Ltd. | Smart household appliance, mobile communication device, system and method for controlling smart household appliance |
US9641969B2 (en) | 2014-07-25 | 2017-05-02 | General Electric Company | Wireless bridge hardware system for active RFID identification and location tracking |
US10147256B2 (en) | 2014-08-15 | 2018-12-04 | Collateral Opportunities, Llc | Electronic identification, location tracking, communication and notification system |
FI3201696T3 (en) | 2014-09-29 | 2023-09-15 | Signify Holding Bv | Systems and methods for managing environmental conditions |
US20160117616A1 (en) | 2014-10-22 | 2016-04-28 | Google Inc. | Determining alternative travel itineraries using weather information |
US10250712B2 (en) | 2014-10-29 | 2019-04-02 | Xiaomi Inc. | Method and server of configuring scenario mode for smart devices |
US20160258641A1 (en) | 2015-03-04 | 2016-09-08 | Elwha Llc | Systems and methods for monitoring and automatically regulating an environmental variable within a target zone |
US9490996B1 (en) | 2015-04-17 | 2016-11-08 | Facebook, Inc. | Home automation device |
US10741278B2 (en) | 2015-04-20 | 2020-08-11 | Cardeya Corporation | Pathogen detection and display system |
EP3295338B1 (en) | 2015-05-12 | 2023-07-19 | Signify Holding B.V. | Method and system for managing space configurations |
US10693993B2 (en) | 2015-07-06 | 2020-06-23 | Eight Inc. Design Singapore Pte. Ltd. | Building services control |
US9435659B1 (en) | 2015-07-14 | 2016-09-06 | International Business Machines Corporation | Route planning to reduce exposure to radiation |
US10033702B2 (en) | 2015-08-05 | 2018-07-24 | Intralinks, Inc. | Systems and methods of secure data exchange |
US10274947B2 (en) | 2015-09-08 | 2019-04-30 | Nuro Technologies, Inc. | Residential sensor device platform |
US10592838B2 (en) | 2015-10-23 | 2020-03-17 | Kpmg Llp | Risk simulation and assessment tool |
US10339484B2 (en) * | 2015-10-23 | 2019-07-02 | Kpmg Llp | System and method for performing signal processing and dynamic analysis and forecasting of risk of third parties |
US10180673B2 (en) | 2015-10-28 | 2019-01-15 | Johnson Controls Technology Company | Multi-function thermostat with emergency direction features |
CA3133703C (en) | 2015-11-02 | 2023-10-24 | Pura Scents, Inc. | Scent dispensation |
US20170178037A1 (en) | 2015-12-16 | 2017-06-22 | Evan John Kaye | Flight Safety Forecasting and Hazard Avoidance |
US10091017B2 (en) | 2015-12-30 | 2018-10-02 | Echostar Technologies International Corporation | Personalized home automation control based on individualized profiling |
US10073428B2 (en) | 2015-12-31 | 2018-09-11 | Echostar Technologies International Corporation | Methods and systems for control of home automation activity based on user characteristics |
WO2017123905A1 (en) | 2016-01-14 | 2017-07-20 | Huang Stuart T F | Proximity-tracing methods and systems |
US9521009B1 (en) | 2016-01-20 | 2016-12-13 | Creston Electronics, Inc. | Auto-configuration and automation of a building management system |
US10251610B2 (en) | 2016-01-26 | 2019-04-09 | International Business Machines Corporation | Contact tracing analytics |
US10053911B2 (en) | 2016-02-17 | 2018-08-21 | King Fahd University Of Petroleum And Minerals | System, device, and method for controlling smart windows |
US20170351831A1 (en) | 2016-06-01 | 2017-12-07 | International Business Machines Corporation | Personal travel health vulnerability navigator |
US10198779B2 (en) | 2016-06-03 | 2019-02-05 | Blyncsy, Inc. | Tracking proximity relationships and uses thereof |
US10700942B2 (en) | 2016-06-21 | 2020-06-30 | Johnson Controls Technology Company | Building management system with predictive diagnostics |
WO2018000077A1 (en) | 2016-06-27 | 2018-01-04 | Novus Paradigm Technologies Corporation | System for rapid tracking of genetic and biomedical information using a distributed cryptographic hash ledger |
US10504070B2 (en) | 2016-07-01 | 2019-12-10 | Crestron Electronics, Inc. | Building automation scheduling system and method |
US20180052970A1 (en) * | 2016-08-16 | 2018-02-22 | International Business Machines Corporation | Tracking pathogen exposure |
US20180101146A1 (en) | 2016-10-06 | 2018-04-12 | International Business Machines Corporation | Environment customization through local automation services |
US10298411B2 (en) | 2016-10-24 | 2019-05-21 | Crestron Electronics, Inc. | Building management system that determines building utilization |
CN108665933B (en) | 2016-11-02 | 2020-10-16 | 旺宏电子股份有限公司 | Method for operating a non-volatile memory element and use thereof |
US10474112B2 (en) | 2016-11-02 | 2019-11-12 | Edison Labs, Inc. | Adaptive control systems for buildings with dual band slot antenna |
US10971949B2 (en) | 2016-12-31 | 2021-04-06 | Abb Schweiz Ag | Systems and methods for performing building energy management |
US10389518B2 (en) * | 2017-01-27 | 2019-08-20 | Entit Software Llc | Blockchain hash value recomputation |
EP3596562A1 (en) | 2017-03-15 | 2020-01-22 | Lutron Technology Company LLC | Configuring a load control system |
US20180276775A1 (en) | 2017-03-23 | 2018-09-27 | Honeywell International Inc. | Space utilization and building management system analysis |
CN110709786B (en) | 2017-04-13 | 2021-07-02 | 江森自控科技公司 | Building management system with spatial profiles |
US11025563B2 (en) | 2017-04-13 | 2021-06-01 | Johnson Controls Technology Company | Space-aware network switch |
US10599115B2 (en) | 2017-04-13 | 2020-03-24 | Johnson Controls Technology Company | Unified building management system with space use case profiles |
US20200294680A1 (en) | 2017-05-01 | 2020-09-17 | Health Solutions Research, Inc. | Advanced smart pandemic and infectious disease response engine |
US10802512B2 (en) | 2017-05-01 | 2020-10-13 | Johnson Controls Technology Company | HVAC device controller with integrated refrigeration controller interface |
US20180375444A1 (en) | 2017-06-23 | 2018-12-27 | Johnson Controls Technology Company | Building system with vibration based occupancy sensors |
US20190033811A1 (en) | 2017-07-27 | 2019-01-31 | Johnson Controls Technology Company | Building management system with on-demand meter roll-ups |
US11087888B2 (en) | 2017-07-28 | 2021-08-10 | Koninklijke Philips N.V. | Monitoring direct and indirect transmission of infections in a healthcare facility using a real-time locating system |
RU2020111714A (en) | 2017-08-21 | 2021-09-23 | Конинклейке Филипс Н.В. | PREDICTION, PREVENTION AND CONTROL OF INFECTION TRANSMISSION WITHIN A MEDICAL AND PREVENTIVE INSTITUTION USING A POSITIONING SYSTEM IN REAL TIME AND SEQUENCING OF A NEW GENERATION |
US11017359B2 (en) * | 2017-09-27 | 2021-05-25 | International Business Machines Corporation | Determining validity of service recommendations |
JP7043215B2 (en) | 2017-10-20 | 2022-03-29 | シスメックス株式会社 | In-facility monitoring systems, in-facility monitoring equipment, and computer programs |
US10410483B2 (en) | 2017-12-15 | 2019-09-10 | Honeywell International Inc. | Systems and methods for interactive emergency response systems |
US10901382B2 (en) | 2018-02-13 | 2021-01-26 | Tridonic Gmbh & Co Kg | Commissioning smart lighting systems |
WO2019159587A1 (en) | 2018-02-14 | 2019-08-22 | パナソニックIpマネジメント株式会社 | Risk assessment system and risk assessment method |
US11278637B2 (en) | 2018-07-03 | 2022-03-22 | Siemens Industry, Inc. | Systems and methods for intelligent disinfection of disinfection environments through use of ultra-violet lights |
US11269306B2 (en) | 2019-07-12 | 2022-03-08 | Johnson Controls Tyco IP Holdings LLP | HVAC system with building infection control |
US10885170B1 (en) * | 2018-11-20 | 2021-01-05 | Apotheka Systems Inc. | Methods, systems, and storage media for managing patient information using a blockchain network |
US11682474B2 (en) | 2018-12-12 | 2023-06-20 | International Business Machines Corporation | Enhanced user screening for sensitive services |
US20200225313A1 (en) | 2019-01-11 | 2020-07-16 | Drift Net | Security System for Detecting Hazardous Events and Occupants in a Building |
WO2020150228A1 (en) | 2019-01-15 | 2020-07-23 | Youngblood Ip Holdings, Llc | Health data exchange platform |
CN111562745A (en) | 2019-02-14 | 2020-08-21 | 开利公司 | Intelligent control system and intelligent control method |
US11615328B2 (en) * | 2019-04-12 | 2023-03-28 | The George Washington University | System and method for analyzing cloud service provider trustworthiness and for predicting cloud service level agreement performance |
US20210020285A1 (en) | 2019-07-16 | 2021-01-21 | Michael James Hall | Blockchain and cloud-based healthcare management (expert) system |
US11513486B2 (en) | 2019-07-18 | 2022-11-29 | Siemens Industry, Inc. | Systems and methods for intelligent disinfection of susceptible environments based on occupant density |
KR102399702B1 (en) | 2020-03-30 | 2022-05-19 | 주식회사 올라운드 | Trace system for Infectious people and trace method using it |
-
2020
- 2020-10-09 US US17/067,211 patent/US20210407690A1/en not_active Abandoned
- 2020-10-09 US US17/067,230 patent/US11164269B1/en active Active
- 2020-10-09 US US17/067,198 patent/US11276024B2/en active Active
-
2021
- 2021-11-01 US US17/515,844 patent/US20220129999A1/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170351832A1 (en) * | 2016-06-01 | 2017-12-07 | International Business Machines Corporation | Personal travel health vulnerability navigator |
US20190098013A1 (en) * | 2017-09-25 | 2019-03-28 | Walmart Apollo, Llc | System and Methods for Location Verification with Blockchain Controls |
US20190226850A1 (en) * | 2018-01-25 | 2019-07-25 | Walmart Apollo, Llc | System and method for tracking vehicle mileage using blockchain |
US20210174972A1 (en) * | 2018-08-21 | 2021-06-10 | Patientmd, Inc. | Secure dispersed network for improved communications between healthcare industry participants |
US20200244464A1 (en) * | 2019-01-25 | 2020-07-30 | International Business Machines Corporation | Blockchain based authentication |
US20210295313A1 (en) * | 2020-03-17 | 2021-09-23 | Mastercard International Incorporated | Method and system for user-based distributed ledgers |
US20210350648A1 (en) * | 2020-05-10 | 2021-11-11 | Lalit Lodha | System and method using optical tags to conduct secure transactions and authentications |
US20210358068A1 (en) * | 2020-05-14 | 2021-11-18 | Bbl Healthcare Solutions Ltd | Method for issuing a verified health pass, use thereof for entering a venue and contact tracing method |
US20210374891A1 (en) * | 2020-05-26 | 2021-12-02 | Dish Wireless L.L.C. | Network tracking and enforcement of social distancing protocols |
US20210379425A1 (en) * | 2020-06-05 | 2021-12-09 | Bich Q. Tran | Personal protection and monitoring |
US10923216B1 (en) * | 2020-06-12 | 2021-02-16 | Tensorx, Inc. | Health status system, platform, and method |
US20210391089A1 (en) * | 2020-06-15 | 2021-12-16 | Honeywell International Inc. | Methods and systems for reducing a risk of spread of an illness in a building |
US20210390812A1 (en) * | 2020-06-15 | 2021-12-16 | Honeywell International Inc. | Methods and systems for maintaining a healthy building |
Non-Patent Citations (2)
Title |
---|
Blockchain-enable Contact Tracing for Preserving User Privacy During COVID-19 Outbreak; Arifeen et al,; July 2020 (Year: 2020) * |
Decentralized Blockchain for Privacy-Preserving Large-Scale Contact Tracing; LV et al.; July 2020 (Year: 2020) * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023233566A1 (en) * | 2022-06-01 | 2023-12-07 | 日本電気株式会社 | Server device, system, server device control method, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
US11164269B1 (en) | 2021-11-02 |
US11276024B2 (en) | 2022-03-15 |
US20210407690A1 (en) | 2021-12-30 |
US20210406789A1 (en) | 2021-12-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11164269B1 (en) | Systems and methods for dynamic travel planning | |
Zhang et al. | Interactive COVID-19 mobility impact and social distancing analysis platform | |
US9516460B2 (en) | Systems and methods for security checkpoint condition information and sharing | |
Antonio et al. | Big data in hotel revenue management: Exploring cancellation drivers to gain insights into booking cancellation behavior | |
EP2842085B1 (en) | Database system using batch-oriented computation | |
Fone et al. | Change in alcohol outlet density and alcohol-related harm to population health (CHALICE): a comprehensive record-linked database study in Wales | |
Enayati et al. | Ambulance redeployment and dispatching under uncertainty with personnel workload limitations | |
Vichiensan et al. | COVID-19 countermeasures and passengers’ confidence of urban rail travel in Bangkok | |
Kumar et al. | Estimation and mitigation of epidemic risk on a public transit route using automatic passenger count data | |
Haratian et al. | Dataset of COVID-19 outbreak and potential predictive features in the USA | |
Babin et al. | Medicaid patient asthma-related acute care visits and their associations with ozone and particulates in Washington, DC, from 1994–2005 | |
Le-Morawa et al. | Effectiveness of a COVID-19 vaccine rollout in a highly affected American Indian community, San Carlos Apache Tribe, December 2020–February 2021 | |
Torkjazi et al. | Main contributing factors and the heuristic approach for assessing risk at mass gatherings | |
Fishe et al. | Emergency medical services bypass of the closest facility for pediatric patients | |
Bian et al. | Predicting grocery store visits during the early outbreak of COVID-19 with machine learning | |
US11822696B2 (en) | Dynamic environmental control | |
Hanchate et al. | Potential bypassing of nearest emergency department by EMS transports | |
Mashrur et al. | Joint model of transit usage frequency and in-vehicle safety perception during the COVID-19 pandemic | |
Clark et al. | Improving childhood vaccination coverage rates: the case of fourth dose of DTaP | |
Naoum-Sawaya et al. | Ridesharing for emergency evacuation | |
Wasserman et al. | A bus home: Homelessness in US transit environments | |
Smith et al. | Siting of HIV/AIDS diagnostic equipment in South Africa: a case study in locational analysis | |
Schmidt et al. | The drop box location problem | |
Verduzco Torres et al. | Public transport accessibility indicators to urban and regional services in Great Britain | |
Hsu et al. | Deployment of a computerized ward visitor registration system in coronavirus disease 2019 epidemic: experiences of a large academic medical center in Taiwan |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
AS | Assignment |
Owner name: TYCO FIRE & SECURITY GMBH, SWITZERLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JOHNSON CONTROLS TYCO IP HOLDINGS LLP;REEL/FRAME:067056/0552 Effective date: 20240201 |