Database system and method
First Claim
1. A method for populating a secured database with genotypic and phenotypic data using a server coupled with a world wide network of computers, the server providing a web site configured to create trust of the web site by users, the method comprising:
- inviting users to submit phenotypic data;
inviting users to submit a biological sample;
populating the secured database with received phenotypic data;
analyzing received biological samples to obtain genetic data;
populating the secured database with the genetic data obtained from biological samples;
prompting users that previously submitted phenotypic data to submit new phenotypic data; and
populating the secured database with received prompted new phenotypic data.
2 Assignments
0 Petitions
Accused Products
Abstract
A secured database is populated with genotypic and phenotypic data using a server coupled with a world wide network of computers. The server provides a web site configured to create trust of the web site by users. Users are invited to submit phenotypic data, and users are invited to submit a biological sample. The secured database is populated with received phenotypic data, and received biological samples are analyzed to obtain genetic data. The secured database is populated with the genetic data obtained from biological samples. Users that previously submitted phenotypic data are prompted to submit new phenotypic data, and the secured database is populated with the received prompted new phenotypic data. The secured database is prompted with received unprompted new phenotypic data.
-
Citations
28 Claims
-
1. A method for populating a secured database with genotypic and phenotypic data using a server coupled with a world wide network of computers, the server providing a web site configured to create trust of the web site by users, the method comprising:
-
inviting users to submit phenotypic data;
inviting users to submit a biological sample;
populating the secured database with received phenotypic data;
analyzing received biological samples to obtain genetic data;
populating the secured database with the genetic data obtained from biological samples;
prompting users that previously submitted phenotypic data to submit new phenotypic data; and
populating the secured database with received prompted new phenotypic data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for populating a secured database with genotypic and phenotypic data, the method comprising:
-
providing a server coupled with a world wide network of computers;
providing a web site configured to create trust of the web site by users;
identifying prospective volunteers from amongst the users of the web site;
inviting the prospective volunteers to submit phenotypic data and biological samples;
populating the secured database with the received phenotypic data;
analyzing received biological samples from volunteers to obtain genetic information;
populating the secured database with the genetic information;
prompting the volunteers to provide new phenotypic data; and
receiving the prompted new phenotypic data and populating the secured database with the prompted new phenotypic data. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A secure database system for maintaining genotypic and phenotypic data, the system comprising:
-
a secure database;
a server coupled with a world wide network of computers, the server configured to host a web site that creates trust of the web site by users;
a secured area of the web site configured to transmit instructions for submitting biological samples;
a module for identifying prospective volunteers from amongst the users of the web site;
a module for inviting the prospective volunteers to submit phenotypic data and biological samples;
a module for populating the secured database with the received phenotypic data from the volunteers;
a module for populating the secured database with the genetic information obtained from received biological samples of the volunteers;
a module for prompting volunteers to provide new phenotypic data; and
a module for receiving the prompted new phenotypic data and populating the secured database with the prompted new phenotypic data. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
Specification