US 11,657,176 B2
Blockchain-based mechanisms for secure health information resource exchange
Douglas A. Bulleit, Atlanta, GA (US); Bharat Chand Aluri, Atlanta, GA (US); Fred Thomas Danner, III, Colorado Springs, CO (US); Charles Clifton Miller, III, Pebble Beach, CA (US); and Mark Lloyd Braunstein, New York, NY (US)
Assigned to Health Blockchain Convergence, Inc., Tysons Corner, VA (US)
Filed by BBM Health LLC, Atlanta, GA (US)
Filed on Mar. 26, 2020, as Appl. No. 16/831,208.
Application 16/831,208 is a continuation in part of application No. 15/684,173, filed on Aug. 23, 2017, granted, now 11,227,675.
Claims priority of provisional application 62/378,539, filed on Aug. 23, 2016.
Prior Publication US 2020/0226285 A1, Jul. 16, 2020
Int. Cl. G06Q 20/00 (2012.01); G06F 21/62 (2013.01); G16H 10/60 (2018.01); G06F 21/60 (2013.01); G06F 21/33 (2013.01); G06Q 50/26 (2012.01)
CPC G06F 21/6245 (2013.01) [G06F 21/33 (2013.01); G06F 21/602 (2013.01); G06Q 50/265 (2013.01); G16H 10/60 (2018.01)] 19 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
receiving, by a client systems module of a value-added certificate authorization system comprising one or more processors, from a client system, a request to verify a claimed identity of a user;
requesting, by the client systems module of the value-added certificate authorization system, and from a first resource system, a first health information resource (HIR) associated with the user;
receiving, by the client systems module of the value-added certificate authorization system and responsive to the request for the first HIR, the first HIR;
generating, by an identity authority module of the value-added certificate authorization system, a first challenge question based at least in part on the first HIR
determining an answer to the first challenge question based at least in part on the first HIR;
generating at least one false answer choice to the first challenge question;
sending, by the value-added certificate authorization system and to the client system, the first challenge question and one or more answer choices including the answer and the at least one false answer choice;
receiving, by the value-added certificate authorization system and from the client system, a first answer to the first challenge question;
determining, by a certified sovereign identity (CSI) key module of the value added certificate authorization system and based at least in part on the first answer, that the user is to be verified; and
providing, by the certified sovereign identity (CSI) key module of the value-added certificate authorization system and based at least in part on the determining that the user is to be verified, a signed verified credential.