SYSTEMS AND METHODS FOR PROTECTING AND GOVERNING GENOMIC AND OTHER INFORMATION
First Claim
Patent Images
1. A method for performing trusted computations on human genomic data, the method comprising:
- receiving a set of genomic data and a computer program designed to operate on genomic data;
with a processing system, evaluating authenticity of the computer program;
with a processing system, evaluating authenticity of at least a portion of the set of genomic data;
with a processing system, evaluating a policy associated with the genomic data to determine whether to allow the computer program to operate on the genomic data; and
when the authenticity and policy evaluations are satisfactory, executing the computer program upon at least a portion of the set of genomic data.
4 Assignments
0 Petitions
Accused Products
Abstract
Trusted, privacy-protected systems and method are disclosed for processing, handling, and performing tests on human genomic and other information. According to some embodiments, a system is disclosed that is a cloud-based system for the trusted storage and analysis of genetic and other information. Some embodiments of the system may include or support some or all of authenticated and certified data sources; authenticated and certified diagnostic tests; and policy-based access to data.
-
Citations
21 Claims
-
1. A method for performing trusted computations on human genomic data, the method comprising:
-
receiving a set of genomic data and a computer program designed to operate on genomic data; with a processing system, evaluating authenticity of the computer program; with a processing system, evaluating authenticity of at least a portion of the set of genomic data; with a processing system, evaluating a policy associated with the genomic data to determine whether to allow the computer program to operate on the genomic data; and when the authenticity and policy evaluations are satisfactory, executing the computer program upon at least a portion of the set of genomic data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A trusted medical computing system comprising:
-
a secure storage system configured to store at least a portion of a set of genomic data, and a computer program; and a secure processing system programmed and configured to evaluate authenticity of the computer program, to evaluate authenticity of at least a portion of the set of genomic data, and to evaluate a permission of the computer program to operate on at least a portion of the set genomic data, and when the authenticity evaluations and the permission evaluation are satisfactory, to execute the computer program upon at least a portion of the set of genomic data. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method of generating packaged genomic data comprising:
-
receiving genomic data from a DNA-sequencing device; encrypting the received genomic data; generating a digital signature which will facilitate subsequent verification of the genomic data; associating policy information with the genomic data, the policy information being configured for use in governing access to or use of the genomic data; and packaging the digital signature with the encrypted genomic data. - View Dependent Claims (18, 19, 20)
-
-
21. A method for performing trusted computations, the method comprising:
-
receiving a first set of data from a first entity; receiving a second set of data from a second entity; receiving, from at least a third entity, a computer program designed to operate on a set of data that includes at least a portion of the first set of data and at least a portion of the second set of data; with a processing system, evaluating authenticity of the computer program; with a processing system, evaluating authenticity of at least a portion of the first set of data and the second set of data; with a processing system, evaluating a first policy associated with the first set of data to determine whether to allow the computer program to operate on the first set of data; with a processing system, evaluating a second policy associated with the second set of data to determine whether to allow the computer program to operate on the second set of data; and when the authenticity and policy evaluations are satisfactory, executing the computer program upon at least a portion of the first set of data and at least a portion of the second set of data to generate a result dependent on said at least a portion of the first set of data and said at least a portion of the second set of data.
-
Specification