Patents by Inventor James F. Chen
James F. Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240086414Abstract: A method is provided for managing event access policies using a user interface. The method includes defining event access policies to be applied to incoming transactions, where each policy identifies a field identifier. The method further includes applying the event access policies to incoming transactions, resulting in the generation of event access records for each policy determined to apply to the incoming transactions. The event access records include field values captured from the transaction and a corresponding group identifier generated for the transaction. Additionally, event blocks are written to an event graph for the incoming transactions, independent of applying the event access policies. Each event block includes a group identifier, content, and a hash for the transaction. The method enables efficient and flexible management of event access policies that facilitate later transaction querying.Type: ApplicationFiled: June 16, 2023Publication date: March 14, 2024Inventors: Zilong Tang, James F. Chen
-
Publication number: 20230315894Abstract: Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.Type: ApplicationFiled: December 23, 2022Publication date: October 5, 2023Inventors: Zilong Tang, James F. Chen, Chen Qian
-
Publication number: 20230252424Abstract: Systems and methods provide an infrastructure for supporting wholly or partially virtual visits. Example methods include instantiating a virtual visit object for a subject participant, assigning a virtual room in the virtual visit object to a first room status, assigning at least a service team member to the virtual room based on room access rules applicable to the first room status. The method may also include providing a first user interface to the subject participant configured according to room participant access rules for the first room status to collect a data element from the subject participant. Changing the room status to a second room status may change the user interface, add a second service team member to the room participants for the virtual room based on a second room access rule applicable to the second room status and may remove the first service team member from the room participants.Type: ApplicationFiled: June 28, 2021Publication date: August 10, 2023Inventors: James F. Chen, Linda Fischer
-
Patent number: 11681719Abstract: Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.Type: GrantFiled: May 13, 2021Date of Patent: June 20, 2023Assignee: DrFirst.com, Inc.Inventors: Zilong Tang, James F. Chen
-
Patent number: 11537738Abstract: Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.Type: GrantFiled: August 28, 2020Date of Patent: December 27, 2022Assignee: DrFirst.com, Inc.Inventors: Zilong Tang, James F. Chen, Chen Qian
-
Publication number: 20210406841Abstract: Systems and methods provide an infrastructure for supporting wholly or partially virtual visits. Example methods include instantiating a virtual visit object for a subject participant, assigning a virtual room in the virtual visit object to a first room status, assigning at least a service team member to the virtual room based on room access rules applicable to the first room status. The method may also include providing a first user interface to the subject participant configured according to room participant access rules for the first room status to collect a data element from the subject participant. Changing the room status to a second room status may change the user interface, add a second service team member to the room participants for the virtual room based on a second room access rule applicable to the second room status and may remove the first service team member from the room participants.Type: ApplicationFiled: December 11, 2020Publication date: December 30, 2021Inventors: James F. Chen, Linda Fischer
-
Patent number: 11107015Abstract: A health information exchange (HIE) system and related methods for sharing patient medical data among a plurality of users. In one embodiment, the HIE system includes a processor executing a software application and one or more databases. Medical data may be downloaded by a first user to the system in a source file format. The system converts and stores the medical data in a data record such as an object having a different type of data structure. Upon receiving a request from a second user for the medical data in a specified destination file format, the system retrieves and converts the object containing the medical data into the specified destination file format, and sends the destination file to the second user. The source and destination file formats may be the same or different. In one embodiment, users may access and communicate with the HIE system via the Internet.Type: GrantFiled: May 1, 2017Date of Patent: August 31, 2021Assignee: DrFirst.com, Inc.Inventors: James F. Chen, Peter N. Kaufman, Glenn Cameron Deemer, Eric Rosenfeld, Brandon Anthony Brylawski, Jesus Cardozo Ramirez, Prasith Govin, Plamen Gurov, ChihSheng Tsai
-
Publication number: 20210263927Abstract: Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.Type: ApplicationFiled: May 13, 2021Publication date: August 26, 2021Inventors: Zilong Tang, James F. Chen
-
Patent number: 11010394Abstract: Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.Type: GrantFiled: February 15, 2019Date of Patent: May 18, 2021Assignee: DrFirst.com, Inc.Inventors: Zilong Tang, James F. Chen
-
Publication number: 20210049295Abstract: Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.Type: ApplicationFiled: August 28, 2020Publication date: February 18, 2021Inventors: Zilong Tang, James F. Chen, Chen Qian
-
Publication number: 20200356659Abstract: The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.Type: ApplicationFiled: July 30, 2020Publication date: November 12, 2020Inventors: James F. Chen, Chen Qian, Zilong Tang, Eric Rosenfeld
-
Patent number: 10783237Abstract: The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.Type: GrantFiled: December 21, 2018Date of Patent: September 22, 2020Assignee: DRFIRST.COM, INC.Inventors: James F. Chen, Chen Qian, Zilong Tang, Eric Rosenfeld
-
Patent number: 10762232Abstract: Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.Type: GrantFiled: December 13, 2018Date of Patent: September 1, 2020Assignee: DrFirst.com, Inc.Inventors: Zilong Tang, James F. Chen, Chen Qian
-
Publication number: 20200265046Abstract: Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.Type: ApplicationFiled: February 15, 2019Publication date: August 20, 2020Inventors: Zilong Tang, James F. Chen
-
Publication number: 20190370485Abstract: Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.Type: ApplicationFiled: December 13, 2018Publication date: December 5, 2019Inventors: Zilong Tang, James F. Chen, Chen Qian
-
Publication number: 20190220589Abstract: The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.Type: ApplicationFiled: December 21, 2018Publication date: July 18, 2019Inventors: James F. CHEN, Chen QIAN, Zilong TANG
-
Patent number: D916773Type: GrantFiled: August 13, 2018Date of Patent: April 20, 2021Assignee: DrFirst.com, Inc.Inventors: James F. Chen, G. Cameron Deemer, David Giambarresi
-
Patent number: D930675Type: GrantFiled: September 4, 2020Date of Patent: September 14, 2021Assignee: DrFirst.com, Inc.Inventors: James F. Chen, G. Cameron Deemer, David Giambarresi
-
Patent number: D944267Type: GrantFiled: September 4, 2020Date of Patent: February 22, 2022Assignee: DrFirst.com, Inc.Inventors: James F. Chen, G. Cameron Deemer, David Giambarresi
-
Patent number: D993271Type: GrantFiled: January 14, 2022Date of Patent: July 25, 2023Assignee: DrFirst.com, Inc.Inventors: James F. Chen, G. Cameron Deemer, David Giambarresi