Patents by Inventor Jan T. Liphardt
Jan T. Liphardt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11461499Abstract: Methods, systems and computer program products for health data protection. Embodiments commence upon receiving a data access request message from a participant in a health ecosystem. The data access request message comprises an indication of one or more health data sets that are held by or at least potentially of interest to the participant. System components are configured to receive the message and to identify the participant. Based on parameter values corresponding to a data protection policy of the participant, a data protection scheme is generated. The scheme includes parameter values derived from the data protection policy. The parameter values of the scheme are used to generate a variation of the health data set that is formed by applying one or more data anonymization, data obfuscation or other data protection techniques to the health data set. A balance among the parameters is calculated so as to achieve a desired outcome.Type: GrantFiled: March 19, 2020Date of Patent: October 4, 2022Assignee: Enya Inc.Inventors: Brian Jun, Jan T. Liphardt
-
Publication number: 20210256162Abstract: A computer with data (the “source”) establishes communication channels to other computers with available computing resources (the “workers”). The computers exchange information to negotiate alternative sets of encryption techniques and security settings. The source calculates a response by negotiating a data reduction scheme that is applied to form heterogeneous data payloads. Some of the data are encrypted using a fully homomorphic encryption algorithm to form a multi-segment response, whereas other data are encrypted using an encryption algorithm other than fully homomorphic encryption. Security-relevant parameters of the invoked encryption schemes are varied to achieve a negotiated optimal data reduction scheme. Candidate reduction schemes to apply to the user data are negotiated based on then-current communication bandwidth availability and/or computer processing resources at the source and/or at the workers.Type: ApplicationFiled: December 28, 2020Publication date: August 19, 2021Inventors: Jan T. LIPHARDT, Alan N. CHIU
-
Publication number: 20210257063Abstract: Methods, systems, and computer program products for health data management. A user obtains a biomaterial collection kit that provides a unique identifier that is matched to a biomaterial specimen container. The identity of any user is not associated with any unit of the biomaterial kit. The user retains their unique identifier and mails their biomaterial (e.g., hair, saliva, etc.) anonymously to a lab. The lab analyzes the biomaterial sample to produce anonymous analysis results. The lab broadly publishes the anonymous analysis results to a publicly-accessible network location (e.g., the Internet). At will, users access the publicly-accessible repository to initiate compute operations on the published entries. If a particular user's identifier matches a published entry (e.g., if the entry can be decrypted using that particular user's unique identifier), then that user can gain access to that published entry while being unable to match to or decrypt any other user's published entries.Type: ApplicationFiled: May 5, 2021Publication date: August 19, 2021Inventors: Jan T. LIPHARDT, Brian JUN
-
Publication number: 20210043284Abstract: Methods, systems, and computer program products for health data management. A user obtains a biomaterial collection kit that provides a unique identifier that is matched to a biomaterial specimen container. The identity of any user is not associated with any unit of the biomaterial kit. The user retains their unique identifier and mails their biomaterial (e.g., hair, saliva, etc.) anonymously to a lab. The lab analyzes the biomaterial sample to produce anonymous analysis results. The lab broadly publishes the anonymous analysis results to a publicly-accessible network location (e.g., the Internet). At will, users access the publicly-accessible repository to initiate compute operations on the published entries. If a particular user's identifier matches a published entry (e.g., if the entry can be decrypted using that particular user's unique identifier), then that user can gain access to that published entry while being unable to match to or decrypt any other user's published entries.Type: ApplicationFiled: August 11, 2019Publication date: February 11, 2021Inventors: Jan T. LIPHARDT, Brian JUN
-
Patent number: 10878950Abstract: Methods, systems and computer program products for data analytics. An information ecosystem comprises a plurality of participants and a plurality of data sets associated with the participants. An event initiates performance of a computation over different obfuscated data sets to determine an obfuscated computational result. An integrity value pertaining to constituent data of the different obfuscated data sets and, correspondingly, an integrity value pertaining to the computational result itself, is quantified by checking if the earlier offered data set or any constituents thereof are consistent with one or more aspects of later retrieved data. Certain variations of methods, systems and computer program products are used for verifying data accuracy in privacy-preserving computations that are performed in a health ecosystem where the data sets pertain to health information associated with the participants.Type: GrantFiled: August 9, 2019Date of Patent: December 29, 2020Inventors: Brian Jun, Jan T. Liphardt
-
Publication number: 20200349288Abstract: Methods, systems and computer program products for health data protection. Embodiments commence upon receiving a data access request message from a participant in a health ecosystem. The data access request message comprises an indication of one or more health data sets that are held by or at least potentially of interest to the participant. System components are configured to receive the message and to identify the participant. Based on parameter values corresponding to a data protection policy of the participant, a data protection scheme is generated. The scheme includes parameter values derived from the data protection policy. The parameter values of the scheme are used to generate a variation of the health data set that is formed by applying one or more data anonymization, data obfuscation or other data protection techniques to the health data set. A balance among the parameters is calculated so as to achieve a desired outcome.Type: ApplicationFiled: March 19, 2020Publication date: November 5, 2020Applicant: Healthblock, Inc.Inventors: Brian JUN, Jan T. LIPHARDT
-
Publication number: 20200311136Abstract: Methods, systems and computer program products for data analytics. Multiple components are interconnected to carry out operations for said data analytics. A method commences upon establishing a connection with a user device that is associated with a user. The user operates the user device to produce a plurality of datasets that correspond to a plurality of differing data regimes. The plurality of datasets from the different data regimes are analyzed to determine spatial and temporal correlations between the datasets. The quality score is in turn based on the determined spatial and temporal correlations. To improve the quality score, specific action requests are sent to the user device. The specific action requests are based on a comparison between the quality score and a quality score threshold. To protect against spoofing, capture time windows of respective datasets selected from the differing data regimes are analyzed to verify the provenance of the datasets.Type: ApplicationFiled: March 25, 2019Publication date: October 1, 2020Inventors: Brian JUN, Jan T. LIPHARDT
-
Patent number: 10635837Abstract: Methods, systems and computer program products for health data protection. Embodiments commence upon receiving a data access request message from a participant in a health ecosystem. The data access request message comprises an indication of one or more health data sets that are held by or at least potentially of interest to the participant. System components are configured to receive the message and to identify the participant. Based on parameter values corresponding to a data protection policy of the participant, a data protection scheme is generated. The scheme includes parameter values derived from the data protection policy. The parameter values of the scheme are used to generate a variation of the health data set that is formed by applying one or more data anonymization, data obfuscation or other data protection techniques to the health data set. A balance among the parameters is calculated so as to achieve a desired outcome.Type: GrantFiled: April 30, 2019Date of Patent: April 28, 2020Assignee: HealthBlock, Inc.Inventors: Brian Jun, Jan T. Liphardt
-
Publication number: 20110256605Abstract: Methods and procedures for designing and constructing microbes with the ability to harvest light energy are described. In certain embodiments, these methods and procedures are used to construct a photosynthetic yeast based on proteorhodopsin (PR) expression. Proteorhodopsin is a light powered proton pump used by some ocean bacteria to scavenge light energy. By illuminating single yeast cells expressing PR, controlled amounts of energy can be delivered to these cells. A light-harvesting yeast is a unique bioenergetics research platform for investigating the interplay of biofuel production, cellular ATP levels, and the proton-motive-force (pmf). Also, a strain of yeast with light-boosted biomass to biofuel conversion efficiency possesses direct industrial and commercial utility.Type: ApplicationFiled: March 10, 2011Publication date: October 20, 2011Applicant: The Regents of the University of California, a California corporationInventors: Jan T. Liphardt, Jessica M. Walter, Jasper Rine, Carlos Bustamante