WO2022133171A1 - Systèmes et procédés de notification d'exposition à base de balise - Google Patents

Systèmes et procédés de notification d'exposition à base de balise Download PDF

Info

Publication number
WO2022133171A1
WO2022133171A1 PCT/US2021/063957 US2021063957W WO2022133171A1 WO 2022133171 A1 WO2022133171 A1 WO 2022133171A1 US 2021063957 W US2021063957 W US 2021063957W WO 2022133171 A1 WO2022133171 A1 WO 2022133171A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
exposure
computer
generation device
beacon generation
Prior art date
Application number
PCT/US2021/063957
Other languages
English (en)
Inventor
Sameer Halai
James Petrie
Original Assignee
Wehealth
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wehealth filed Critical Wehealth
Publication of WO2022133171A1 publication Critical patent/WO2022133171A1/fr

Links

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • G16H40/60ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices
    • G16H40/67ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/80ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for detecting, monitoring or modelling epidemics or pandemics, e.g. flu
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0295Proximity-based methods, e.g. position inferred from reception of particular signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Definitions

  • the subject disclosure is directed to beacon-based exposure notification systems and methods and, more specifically, to an exposure notification system that utilizes persistent keys that correspond to beacon generation devices at predetermined locations within a network.
  • the infectious disease caused by the SARS-CoV-2 virus as a pandemic has created the need for an exposure notification solution that can be implemented through various computer systems and computing devices.
  • Existing exposure notification solutions utilize wireless connections and mobile devices to aid in contact tracing efforts.
  • Such systems can use beacons that are emitted through mobile devices that are not tied to the identity of the mobile device user.
  • Such beacons include can include exposure notification information.
  • Computing devices that receive such beacons can access a wireless network to determine whether the computing device has been in proximity to a person that has been exposed to and/or diagnosed with the SARS-CoV-2 virus.
  • the user can be notified and advised of the next steps that need to be taken to prevent further transmission and to effect contact tracing.
  • a computer-implemented method provides infectious disease exposure notification within a network.
  • a persistent key is stored on a reporting server within the network with the persistent key corresponding to a beacon generation device and the location of the beacon generation device.
  • Input identifying an infectious disease exposure at the location of the beacon generation device and a time of exposure is received through the network.
  • the persistent key is matched to the location of the beacon generation device.
  • a temporary exposure key is generated using the persistent key and the time of exposure. The temporary exposure key is transmitted through the network.
  • FIG. 1 represents a schematic diagram of an exposure notification system in accordance with the subject disclosure.
  • FIG. 2 is an exemplary process in accordance with the subject disclosure.
  • FIG. 3 is a computer architecture diagram illustrating an illustrative computer hardware and software architecture for a computing system in accordance with the subject disclosure.
  • FIG. 4 is a diagram illustrating a computing environment in accordance with the subject disclosure.
  • the subject disclosure is directed to beacon-based exposure notification systems and methods and, more specifically, to an exposure notification system that utilizes persistent keys that correspond to beacon generation devices at predetermined locations within a network. Exposure information can be transmitted through the network that indicates when a potential infection has occurred at one of the locations using temporary exposure keys. Such keys can be generated using one of the persistent keys and the time of exposure.
  • references to “one embodiment,” “an embodiment,” “an example embodiment,” “one implementation,” “an implementation,” “one example,” “an example” and the like, indicate that the described embodiment, implementation or example can include a particular feature, structure or characteristic, but every embodiment, implementation or example can not necessarily include the particular feature, structure or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment, implementation or example. Further, when a particular feature, structure or characteristic is described in connection with an embodiment, implementation or example, it is to be appreciated that such feature, structure or characteristic can be implemented in connection with other embodiments, implementations or examples whether or not explicitly described.
  • the disclosed subject matter can be implemented within the Google Apple Exposure Notification (GAEN) system.
  • the GAEN system represents a privacy-preserving Bluetooth® protocol to support exposure notification, specifically for combatting the spread of SARS-CoV-2 (i.e., the pathogen that causes COVID-19).
  • the GAEN system makes it possible to alert participants about possible exposure to SARS-CoV-2.
  • the GAEN system can use temporary exposure keys to generate rolling proximity identifiers to transmit exposure notification information through a network.
  • Bluetooth® is a registered trademark of Bluetooth Sig, Inc. of Kirkland, Washington.
  • the temporary exposure keys are generated every hour.
  • the rolling proximity identifiers are generated every ten minutes.
  • the rolling proximity identifiers can be associated with associated encrypted metadata.
  • the GAEN system has been implemented as a tool to fight the SARS-CoV-2 pandemic.
  • the GAEN system provides the ability to alert people, through an app installed on mobile device, when they have been in close proximity to someone who is suspected of been infected, been diagnosed with an infection, and/or has been positively tested for an infection.
  • the GAEN system can be implemented on ANDROID® and/or or iOS smartphones that are equipped with Bluetooth® technology.
  • ANDROID is a registered technology of Google, LLC of Mountain View, California.
  • iOS is a mobile operating system created and developed by Apple Inc. of Cupertino, California.
  • the disclosed subject matter can be implemented as a system, a method, and/or a computer program product at any possible technical detail level of integration
  • the computer program product can include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out embodiments and features of the subject disclosure.
  • the system, method, and/or computer program can be implemented with mobile devices and smartphones, as well as other types of computer systems and/or computing devices, such as handheld computers, tablets, PCs, desktops, workstations, or any other similar device.
  • the operating environment 100 implements systems and methods to facilitate exposure notification within a network 110.
  • the network 110 can be the GAEN system or another computer network that connects to or cooperates with the GAEN system.
  • the operating environment 100 is intended to complement the existing GAEN system architecture.
  • the operating environment 100 includes a computer system 112 configured for infectious disease exposure notification within the network 110.
  • the computer system 112 includes one or more server(s) 114 connected to a memory device 116 that stores a database 118.
  • the database 118 can store metadata, such as the date and time that a device is installed, a unique device name, or other device-related information.
  • the computer system 112 can enable a web portal or a website 120 that can be utilized to access the server(s) 114.
  • the web portal or website 120 can be coupled to the server(s) 114, so that a contact tracer or other user can access certain information stored on the server(s) through the website 120.
  • the server(s) 114 can include a reporting server or key server that stores one or more persistent keys 122A-122E.
  • the persistent keys 122A-122E are pre-shared and can be allocated to a plurality of beacon generation devices 124A-124E at a plurality of locations 126A-126E within a region 128 to provide a top-level of encryption.
  • the beacon generation devices 124A-124E can be computing devices. In some embodiments, the beacon generation devices 124A-124E can be computing devices that are configured with flash drives. In this exemplary embodiment, the persistent keys 122A-122E can be dedicated keys. The beacon generation devices 124A-124E can be activated with the persistent keys 122A-122E.
  • the beacon generation devices 124A-124E can be microcontrollers with Bluetooth® capability. In such embodiments the beacon generation devices 124A-124E include adapters for emitting a radio signal that includes shortwavelength UHF radio waves and a microcontroller.
  • the website 120 can be configured for access by a contact tracer or other user 130 through a computing device 132. Through the website 120, the user 130 can send input through the website 120 to the server(s) 114. The input can identify one of the locations 126A at which a possible exposure to an infectious disease has occurred. The input can also include the time of the exposure. Then, the server(s) 114 can be utilized to determine the persistent key 122 A that corresponds to the location 126 A.
  • a temporary exposure key 134 can be generated with the persistent key 122A and the time of exposure.
  • the temporary exposure key 134 can be derived from the persistent key 124 A and the time of exposure with a oneway function.
  • the time of exposure is rounded off in ten minute increments.
  • the one-way function can be a hash function or other function that is easy to compute on every input, but hard to invert given an image of a random input.
  • the one- function can be a hash function, message digest, fingerprint or compression function or other mathematical function that takes a variable-length input string and converts it into a fixed- length binary sequence.
  • An exemplary one-way hash function includes a hash based key derivation function that is set forth in the following code: void compute_tek(const uint8_t *pek, uint32_t rolling start interval number, uint8_t *tek) ⁇
  • ⁇ int ret mbedtls_hkdf(mbedtls_md_info_from_type(
  • MBEDTLS MD SHA256 NULL, 0, pek, PEK SIZE, info, sizeof(info), tek, TEK SIZE);
  • the temporary exposure key 134 can be transmitted through the network 110.
  • information relating to a potential exposure can be sent through the network 110 even when one or more of the beacon generation devices 124A-124E are offline, as indicated by the broken line 136 shown in FIG. 1.
  • the temporary exposure key 134 can be sent with encrypted diagnosis information.
  • the encrypted diagnosis information can include information relating to a confirmed test, a clinician diagnosis, and/or a self-reported diagnosis.
  • an exemplary process for sharing test results for an infectious disease test.
  • the process 200 can be performed within the operating environment 100 shown in FIG. 1.
  • a persistent key is stored on a reporting server within a network with the persistent key corresponding to a beacon generation device and the location of the beacon generation device.
  • the network can be the network 110 shown in FIG. 1.
  • the persistent key can be one of the persistent keys 122A-122E.
  • the beacon generation device can be one of the beacon generation devices 124A-124E.
  • the location can be one of the locations 126A-126E.
  • input identifying an infectious disease exposure at the location of the beacon generation device and a time of exposure is received through the network.
  • the input can be sent by the user 130 through the computing device 132 over the network 110 to the website 120, as shown in FIG. 1.
  • the persistent key is matched to the location of the beacon generation device.
  • the persistent key can be the persistent key 122A
  • the location can be the location 126A
  • the beacon generation device can be the beacon generation device 124 A, as shown in FIG. 1
  • a temporary exposure key is generated using the persistent key and the time of exposure.
  • the temporary exposure key can be the temporary exposure key 134 shown in FIG. 1.
  • the temporary exposure key is transmitted through the network.
  • the temporary exposure key 134 can be transmitted over the network 110, as shown in FIG. 1.
  • computer architecture generally designated by the numeral 300, includes a central processing unit 302 (“CPU”), a system memory 304, including a random access memory 306 (“RAM”) and a read-only memory (“ROM”) 308, and a system bus 310 that couples the memory 304 to the CPU 302.
  • CPU central processing unit
  • RAM random access memory
  • ROM read-only memory
  • the computer architecture 300 further includes a mass storage device 312 for storing an operating system 307, and one or more application programs including, but not limited to, a tracking module 105 and contextual data 330, image data 331, calibration data 332, and sensor data 333.
  • the mass storage device 312 is connected to the CPU 302 through a mass storage controller (not shown) connected to the bus 310.
  • the mass storage device 312 and its associated computer-readable media provide non-volatile storage for the computer architecture 300.
  • computer-readable media can be any available computer storage media or communication media that can be accessed by the computer architecture 300.
  • Communication media includes computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any delivery media.
  • modulated data signal means a signal that has one or more of its characteristics changed or set in a manner as to encode information in the signal.
  • communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer-readable media.
  • computer storage media can include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data.
  • computer media includes, but is not limited to, RAM, ROM, EPROM, EEPROM, flash memory or other solid state memory technology, CD-ROM, digital versatile disks (“DVD”), HD-DVD, BLU-RAY, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer architecture 300.
  • DVD digital versatile disks
  • HD-DVD high definition digital versatile disks
  • BLU-RAY blue ray
  • computer storage medium does not include waves, signals, and/or other transitory and/or intangible communication media, per se.
  • the computer architecture 300 can operate in a networked environment using logical connections to remote computers through the network 356 and/or another network (not shown).
  • the computer architecture 300 can connect to the network 356 through a network interface unit 314 connected to the bus 310. It should be appreciated that the network interface unit 314 also can be utilized to connect to other types of networks and remote computer systems.
  • the computer architecture 300 also can include an input/output controller 316 for receiving and processing input from a number of other devices, including a keyboard, mouse, or electronic stylus (not shown in FIG. 3). Similarly, the input/output controller 316 can provide output to a display screen, a printer, or other type of output device (also not shown in FIG. 3).
  • the software components described herein can, when loaded into the CPU 302 and executed, transform the CPU 302 and the overall computer architecture 300 from a general -purpose computing system into a special-purpose computing system customized to facilitate the functionality presented herein.
  • the CPU 302 can be constructed from any number of transistors or other discrete circuit elements, which can individually or collectively assume any number of states. More specifically, the CPU 302 can operate as a finite-state machine, in response to executable instructions contained within the software modules disclosed herein. These computer-executable instructions can transform the CPU 302 by specifying how the CPU 302 transitions between states, thereby transforming the transistors or other discrete hardware elements constituting the CPU 302.
  • Encoding the software modules presented herein also can transform the physical structure of the computer-readable media presented herein.
  • the specific transformation of physical structure can depend on various factors, in different implementations of this description. Examples of such factors can include, but are not limited to, the technology used to implement the computer-readable media, whether the computer-readable media is characterized as primary or secondary storage, and the like.
  • the computer- readable media is implemented as semiconductor-based memory
  • the software disclosed herein can be encoded on the computer-readable media by transforming the physical state of the semiconductor memory.
  • the software can transform the state of transistors, capacitors, or other discrete circuit elements constituting the semiconductor memory.
  • the software also can transform the physical state of such components in order to store data thereupon.
  • the computer-readable media disclosed herein can be implemented using magnetic or optical technology.
  • the software presented herein can transform the physical state of magnetic or optical media, when the software is encoded therein. These transformations can include altering the magnetic characteristics of particular locations within given magnetic media. These transformations also can include altering the physical features or characteristics of particular locations within given optical media, to change the optical characteristics of those locations. Other transformations of physical media are possible without departing from the scope and spirit of the present description, with the foregoing examples provided only to facilitate this discussion.
  • the server(s) 114 and the computing device 132 shown in FIG. 1 can be implemented within the computer architecture 300.
  • the network(s) 110 shown in FIG. 1 can be implemented as network 356 to connect the server(s) 114 to the computing device 132.
  • the method 200 shown in FIG. 2 can be implemented through the computer architecture 300, at least partially.
  • the computer architecture 300 can include other types of computing devices, including hand-held computers, embedded computer systems, personal digital assistants, and other types of computing devices known to those skilled in the art. It is also contemplated that the computer architecture 300 cannot include all of the components shown in FIG. 3, can include other components that are not explicitly shown in FIG. 3, or can utilize an architecture completely different than that shown in FIG. 3.
  • FIG. 4 an illustrative computing environment, generally designated by the numeral 400, is shown.
  • the computing environment 400 is capable of executing the software components described herein for providing context-aware recommendations of relevant presentation content displayed in mixed environments, among other aspects.
  • the computing environment 400 illustrated in FIG. 4 can be utilized to execute any aspects of the software components presented herein.
  • the computing environment 400 can be utilized to execute aspects of the techniques disclosed herein.
  • the computing environment 400 includes a computing environment 402 operating on, in communication with, or as part of the network 404.
  • the network 404 can be or can include the network(s) 110 shown in FIG. 1 and/or the network 356 shown in FIG. 3.
  • the server(s) 114 and the computing device 132 shown in FIG. 1 can be implemented within the computing environment 400.
  • the method 200 shown in FIG. 3 can be implemented through the computing environment 400.
  • the network 404 also can include various access networks.
  • One or more client devices 406A-406N can communicate with the computing environment 402 via the network 404 and/or other connections (not illustrated in FIG. 4).
  • the clients 406 include a computing device 406A such as a laptop computer, a desktop computer, or other computing device; a slate or tablet computing device (“tablet computing device”) 406B; a mobile computing device 406C such as a mobile telephone, a smart phone, or other mobile computing device; a server computer 406D; and/or other devices 406N.
  • any number of clients 406 can communicate with the computing environment 402.
  • the illustrated clients 406 and computing architectures illustrated and described herein are illustrative, and should not be construed as being limited in any way.
  • the computing environment 402 includes application servers 408, data storage 410, and one or more network interfaces 412.
  • the functionality of the application servers 408 can be provided by one or more server computers that are executing as part of, or in communication with, the network 404.
  • the application servers 408 can host various services, virtual machines, portals, and/or other resources.
  • the application servers 408 host one or more virtual machines 414 for hosting applications or other functionality.
  • the virtual machines 414 host one or more applications and/or software modules for providing context-aware recommendations of relevant presentation content displayed in mixed environments. It should be understood that this configuration is illustrative, and should not be construed as being limiting in any way.
  • the application servers 408 also host or provide access to one or more portals, link pages, Websites, and/or other information (“Web portals”) 416.
  • the application servers 408 also include one or more mailbox services 418 and one or more messaging services 420.
  • the mailbox services 418 can include electronic mail (“email”) services.
  • the mailbox services 418 also can include various personal information management (“PEM”) services including, but not limited to, calendar services, contact management services, collaboration services, and/or other services.
  • PEM personal information management
  • the messaging services 420 can include, but are not limited to, instant messaging services, chat services, forum services, and/or other communication services.
  • the application servers 408 also can include one or more social networking services 422.
  • the social networking services 422 can include various social networking services including, but not limited to, services for sharing or posting status updates, instant messages, links, photos, videos, and/or other information; services for commenting or displaying interest in articles, products, blogs, or other resources; and/or other services.
  • the social networking services 422 also can include commenting, blogging, and/or micro blogging services. It should be appreciated that the above lists of services are not exhaustive and that numerous additional and/or alternative social networking services 422 are not mentioned herein for the sake of brevity. As such, the above configurations are illustrative, and should not be construed as being limited in any way.
  • the social networking services 422 can host one or more applications and/or software modules for providing the functionality described herein for providing context- aware recommendations of relevant presentation content displayed in mixed environments.
  • any one of the application servers 408 can communicate or facilitate the functionality and features described herein.
  • the application servers 408 also can host other services, applications, portals, and/or other resources (“other resources”) 424.
  • the other resources 424 can include, but are not limited to, document sharing, rendering or any other functionality. It thus can be appreciated that the computing environment 402 can provide integration of the concepts and technologies disclosed herein provided herein with various mailbox, messaging, social networking, and/or other services or resources.
  • the computing environment 402 can include the data storage 410.
  • the functionality of the data storage 410 is provided by one or more databases operating on, or in communication with, the network 404.
  • the functionality of the data storage 410 also can be provided by one or more server computers configured to host data for the computing environment 402.
  • the data storage 410 can include, host, or provide one or more real or virtual data stores 426A-426N (hereinafter referred to collectively and/or generically as “data stores 426”).
  • the data stores 426 are configured to host data used or created by the application servers 408 and/or other data.
  • the data stores 426 also can host or store web page documents, word processer documents, presentation documents, data structures, algorithms for execution by a recommendation engine, and/or other data utilized by any application program or another module. Aspects of the data stores 426 can be associated with a service for storing files.
  • the computing environment 402 can communicate with, or be accessed by, the network interfaces 412.
  • the network interfaces 412 can include various types of network hardware and software for supporting communications between two or more computing devices including, but not limited to, the clients 406 and the application servers 408. It should be appreciated that the network interfaces 412 also can be utilized to connect to other types of networks and/or computer systems.
  • the computing environment 400 described herein can provide any aspects of the software elements described herein with any number of virtual computing resources and/or other distributed computing functionality that can be configured to execute any aspects of the software components disclosed herein.
  • the computing environment 400 provides the software functionality described herein as a service to the clients 406.
  • the clients 406 can include real or virtual machines including, but not limited to, server computers, web servers, personal computers, mobile computing devices, smart phones, and/or other devices.
  • various configurations of the concepts and technologies disclosed herein enable any device configured to access the computing environment 400 to utilize the functionality described herein for providing context-aware recommendations of relevant presentation content displayed in mixed environments, among other aspects.
  • supported embodiments include a computer-implemented method for infectious disease exposure notification within a network, the method comprising: storing a persistent key on a reporting server within the network with the persistent key corresponding to a beacon generation device and the location of the beacon generation device, receiving, through the network, input identifying an infectious disease exposure at the location of the beacon generation device and a time of exposure, matching the persistent key to the location of the beacon generation device, generating a temporary exposure key using the persistent key and the time of exposure, and transmitting the temporary exposure key through the network.
  • Supported embodiments include the foregoing computer-implemented method, further comprising: deriving the temporary exposure key from the persistent key and the time of exposure.
  • Supported embodiments include any of the foregoing computer-implemented methods, further comprising: deriving the temporary exposure key with a one-way function.
  • Supported embodiments include any of the foregoing computer-implemented methods, wherein the one-way function is a hash function.
  • Supported embodiments include any of the foregoing computer-implemented methods, wherein the hash function is a hash based key derivation function.
  • Supported embodiments include any of the foregoing computer-implemented methods, further comprising: allocating a plurality of dedicated keys to a plurality of computing devices at a plurality of locations with one of the plurality of dedicated keys being the persistent keys and one of the plurality of computing devices being the beacon generation device.
  • Supported embodiments include any of the foregoing computer-implemented methods, further comprising: activating the beacon generation device with the dedicated key. [0065] Supported embodiments include any of the foregoing computer-implemented methods, further comprising: sending encrypted diagnosis information with the temporary exposure key over the network.
  • Supported embodiments include any of the foregoing computer-implemented methods, wherein the encrypted diagnosis information includes at least one of a confirmed test, a clinician diagnosis, and a self-reported diagnosis.
  • Supported embodiments include any of the foregoing computer-implemented methods, wherein the beacon generation device includes a computing device.
  • Supported embodiments include any of the foregoing computer-implemented methods, wherein the computing device includes an adapter for emitting a radio signal that includes short- wavelength UHF radio waves and a microcontroller.
  • Supported embodiments include a system, an apparatus, a computer-readable storage medium, a computer-implemented method, and/or means for implementing any of the foregoing methods or portions thereof.
  • Supported embodiments include a computer system for infectious disease exposure notification within a network, the computer system having memory with computer readable instructions and a processor for executing the computer readable instructions, the computer readable instructions including instructions for: storing a persistent key with the persistent key corresponding to a beacon generation device and the location of the beacon generation device, receiving, through the network, input identifying an infectious disease exposure at the location of the beacon generation device and a time of exposure, matching the persistent key to the location of the beacon generation device, generating a temporary exposure key using the persistent key and the time of exposure, and transmitting the temporary exposure key through the network.
  • Supported embodiments include the foregoing system, further comprising instructions for: deriving the temporary exposure key from the persistent key and the time of exposure.
  • Supported embodiments include any of the foregoing systems, further comprising instructions for: deriving the temporary exposure key with a one-way function.
  • Supported embodiments include any of the foregoing systems, further comprising instructions for: allocating a plurality of dedicated keys to a plurality of computing devices at a plurality of locations with one of the plurality of dedicated keys being the persistent keys and one of the plurality of computing devices being the beacon generation device.
  • Supported embodiments include any of the foregoing systems, further comprising instructions for: activating the beacon generation device with the persistent key.
  • Supported embodiments include any of the foregoing systems, further comprising instructions for: sending encrypted diagnosis information with the temporary exposure key over the network.
  • Supported embodiments include any of the foregoing systems, wherein the encrypted diagnosis information includes at least one of a confirmed test, a clinician diagnosis, and a self-reported diagnosis.
  • Supported embodiments include any of the foregoing systems, wherein the beacon generation device includes a computing device.
  • Supported embodiments include any of the foregoing systems, wherein the computing device includes an adapter for emitting a radio signal that includes shortwavelength UHF radio waves and a microcontroller.
  • Supported embodiments include any of the foregoing systems, further comprising: a database for storing the persistent key with the persistent key being associated with the beacon generation device and the location of the beacon generation device.
  • Supported embodiments include any of the foregoing systems, further comprising: a website coupled to the database through the computer system, wherein the website is accessible over the network to receive input identifying the infectious disease exposure at the location of the beacon generation device and a time of exposure.
  • Supported embodiments include any of the foregoing systems, wherein the website is a web portal.
  • Supported embodiments include a method, an apparatus, a computer-readable storage medium, a computer-implemented method, and/or means for implementing any of the foregoing systems or portions thereof.
  • Supported embodiments can provide various attendant and/or technical advantages in terms of providing a system that can notify users of one or more locations of possible exposure to infectious disease with a beacon generation device, even when the device is offline.

Abstract

L'invention concerne une clé persistante stockée sur un serveur de rapport à l'intérieur du réseau avec la clé persistante correspondant à un dispositif de génération de balise et à l'emplacement du dispositif de génération de balise. Une entrée identifiant une exposition de maladie infectieuse au niveau de l'emplacement du dispositif de génération de balise et un temps d'exposition est reçue à travers le réseau. La clé persistante est mise en correspondance avec l'emplacement du dispositif de génération de balise. Une clé d'exposition temporaire est générée à l'aide de la clé persistante et du temps d'exposition. La clé d'exposition temporaire est transmise à travers le réseau.
PCT/US2021/063957 2020-12-18 2021-12-17 Systèmes et procédés de notification d'exposition à base de balise WO2022133171A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202063127318P 2020-12-18 2020-12-18
US63/127,318 2020-12-18

Publications (1)

Publication Number Publication Date
WO2022133171A1 true WO2022133171A1 (fr) 2022-06-23

Family

ID=82058156

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2021/063957 WO2022133171A1 (fr) 2020-12-18 2021-12-17 Systèmes et procédés de notification d'exposition à base de balise

Country Status (1)

Country Link
WO (1) WO2022133171A1 (fr)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060178567A1 (en) * 2003-07-17 2006-08-10 Zenton Goh Method and system for capturing and monitoring a physiological parameter and movement within an area of at least one person
US20120244386A1 (en) * 2011-03-25 2012-09-27 Hon Hai Precision Industry Co., Ltd. Coated article having antibacterial effect and method for making the same
US9043602B1 (en) * 2014-06-10 2015-05-26 Google Inc. Generating and using ephemeral identifiers and message integrity codes
US20170013450A1 (en) * 2015-07-09 2017-01-12 Google Inc. Security for wireless broadcasts
US20210365445A1 (en) * 2020-05-25 2021-11-25 Fortior Solutions, Llc Technologies for collecting, managing, and providing contact tracing information for infectious disease response and mitigation
US11226392B1 (en) * 2020-08-21 2022-01-18 Juniper Networks, Inc. Estimating user risk based on wireless location determination
US20220022821A1 (en) * 2020-07-24 2022-01-27 Tato Llc Anonymous contact tracing system and method
US20220051808A1 (en) * 2020-07-31 2022-02-17 Technische Universitaet Darmstadt Anonymous distributed contact tracing and verification system
US20220053324A1 (en) * 2020-08-16 2022-02-17 The Uab Research Foundation Anonymous verification process for exposure notification in mobile applications
US20220104008A1 (en) * 2020-09-28 2022-03-31 Cypress Semiconductor Corporation Devices, systems and methods for close contact tracing with strong privacy protection
US20220102012A1 (en) * 2020-09-30 2022-03-31 Arizona Board Of Regents On Behalf Of The University Of Arizona Systems and methods for predictive modeling of people movement and disease spread under covid and pandemic situations

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060178567A1 (en) * 2003-07-17 2006-08-10 Zenton Goh Method and system for capturing and monitoring a physiological parameter and movement within an area of at least one person
US20120244386A1 (en) * 2011-03-25 2012-09-27 Hon Hai Precision Industry Co., Ltd. Coated article having antibacterial effect and method for making the same
US9043602B1 (en) * 2014-06-10 2015-05-26 Google Inc. Generating and using ephemeral identifiers and message integrity codes
US20170013450A1 (en) * 2015-07-09 2017-01-12 Google Inc. Security for wireless broadcasts
US20210365445A1 (en) * 2020-05-25 2021-11-25 Fortior Solutions, Llc Technologies for collecting, managing, and providing contact tracing information for infectious disease response and mitigation
US20220022821A1 (en) * 2020-07-24 2022-01-27 Tato Llc Anonymous contact tracing system and method
US20220051808A1 (en) * 2020-07-31 2022-02-17 Technische Universitaet Darmstadt Anonymous distributed contact tracing and verification system
US20220053324A1 (en) * 2020-08-16 2022-02-17 The Uab Research Foundation Anonymous verification process for exposure notification in mobile applications
US11226392B1 (en) * 2020-08-21 2022-01-18 Juniper Networks, Inc. Estimating user risk based on wireless location determination
US20220104008A1 (en) * 2020-09-28 2022-03-31 Cypress Semiconductor Corporation Devices, systems and methods for close contact tracing with strong privacy protection
US20220102012A1 (en) * 2020-09-30 2022-03-31 Arizona Board Of Regents On Behalf Of The University Of Arizona Systems and methods for predictive modeling of people movement and disease spread under covid and pandemic situations

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SIMMHAN YOGESH, ET AL: "GoCoronaGo: Privacy Respecting Contact Tracing for COVID-19 Management", JOURNAL OF THE INDIAN INSTITUTE OF SCIENCE, INDIAN INSTITUTE OF SCIENCE, BANGALORE, IN, vol. 100, no. 4, 1 October 2020 (2020-10-01), IN , pages 623 - 646, XP055950559, ISSN: 0970-4140, DOI: 10.1007/s41745-020-00201-5 *

Similar Documents

Publication Publication Date Title
US11252256B2 (en) System for association of customer information across subscribers
US10552238B2 (en) Secure inter-process communications for mobile devices
US20170041259A1 (en) Instant message processing method, apparatus, and system
US20210365445A1 (en) Technologies for collecting, managing, and providing contact tracing information for infectious disease response and mitigation
US10969971B2 (en) Data storage method and apparatus
US11055492B2 (en) Privatized apriori algorithm for sequential data discovery
US10608811B2 (en) Private set intersection encryption techniques
US11425571B2 (en) Device configuration method, apparatus and system
KR20120036831A (ko) 갱신들의 소셜 네트워킹 서비스 내로의 통합
CN113079068A (zh) 用于监测计算机网络连接的生命周期的方法、系统以及计算机存储设备
US11356498B2 (en) Method and a device for sharing a hosted application
US20230045553A1 (en) Privacy safe joint identification protocol
US10608960B2 (en) Techniques for batched bulk processing
US20190207888A1 (en) Techniques for message indexing
US20190207899A1 (en) Techniques for messaging conversation indexing
WO2022133171A1 (fr) Systèmes et procédés de notification d'exposition à base de balise
US9680874B1 (en) Containerized examination of sensitive data
US20220385643A1 (en) End-to-end encryption for location sharing
JP2022504575A (ja) ブロックチェーンを用いたメッセージの伝送および取得のためのシステムおよび方法
US11646982B2 (en) Multichannel messaging system and method
CN117999764A (zh) 使用succinct过滤器的私有集合成员资格
WO2017129068A1 (fr) Procédé d'exécution d'événements et dispositif et système associés
CN106778353B (zh) 用于保存消息的方法和装置
WO2022133167A1 (fr) Systèmes et procédés d'analyses anonymes
US9680908B1 (en) Identifying a signer of an electronically signed electronic resource

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21907869

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21907869

Country of ref document: EP

Kind code of ref document: A1