Secure access to individual information

ABSTRACT

A facility for accessing information relating to a person is described. In a reader device, the facility accesses first credentials stored in a first storage device, second credentials stored in a second storage device, and third credentials stored in the reader device. In the reader device, the facility uses a combination of the first credentials, second credentials, and third credentials to decrypt information relating to the person stored in the first storage device.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application claims the benefit of the following applications, eachof which is hereby incorporated by reference in its entirety: U.S.Provisional Application No. 62/154,612 filed Apr. 29, 2015 and titledSECURE ACCESS TO INDIVIDUAL INFORMATION; U.S. Provisional ApplicationNo. 62/134,490 filed Mar. 17, 2015 and titled SECURE ACCESS TOINDIVIDUAL INFORMATION; U.S. Provisional Application No. 62/058,107,filed on Oct. 1, 2014, and titled METHOD AND APPARATUS FOR SECURED DATASTORAGE, OFFLINE DATA EXCHANGE AND GOVERNED PROTECTED DATA ACCESS; U.S.Provisional Application No. 62/066,866, filed on Oct. 21, 2014 andtitled METHOD AND APPARATUS FOR ENCRYPTED OFFLINE DATA STORAGE,PROTECTED ONLINE BACKUP AND SECURED DATA PROCESSING; and U.S.Provisional Application No. 62/110,613 filed Feb. 2, 2015 and titledMETHOD AND APPARATUS FOR PROTECTED OFFLINE DATA STORAGE AND SECURERECORDS COMPLETION AND UPDATES. In cases where material incorporatedherein by reference conflicts with the present disclosure, the presentdisclosure controls.

BACKGROUND

Various kinds of services performed with respect to individuals rely oninformation about the individual. For example, medical services providedto a patient often rely on information about the patient includinginnate patient attributes such as date of birth, weight, and height;results of tests such as blood pressure, pulse, blood panels, andradiological studies; diagnostic and interventional histories; andhealth insurance information. In some contexts, the above is referred toas “patient health information.” Financial services provided to a personoften rely on information about the person such as Social Securitynumber and other identifying information, credit score, employmenthistory, and account numbers and balances. National border regulationservices performed with respect to travelers often rely on informationabout the traveler such as identifying information, citizenship andresidency status, international travel history, and photographs.

For many of these kinds of services, the advent of cloud-based storagehas been accompanied by techniques for storing the correspondingindividual information in the cloud, often in connection with some kindof security technique designed to reduce the risk of unauthorized accessto the information. For example, cloud-based electronic medical recordsystems seek to store patient information on Internet-connected storagedevices, such that medical service providers in a variety of locationscan access the patient's electronic medical record via the Internet.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a device diagram showing components included in a data storagedevice used by the facility in some embodiments.

FIG. 2 is a device diagram showing an access keys storage device used bythe facility in some embodiments.

FIG. 3 is a device diagram showing a data access device used by thefacility in some embodiments

FIG. 4 is a data flow diagram showing data flow, data encryption anddecryption, backup and data processing techniques used by the facilityin some embodiments.

FIG. 5 is a data flow diagram showing a technique performed by thefacility in some embodiments to reencrypt a data storage device's UserKey with a newly updated Revolving Security/Encryption Certificate ofthe data access device.

FIG. 6 is a data flow diagram showing a protocol used by the data accessdevice to communicate with this smart phone in some embodiments.

FIG. 7 is a data flow diagram showing a process used by the facility insome embodiments to periodically update the revolvingsecurity/encryption certificate on the data access device.

FIG. 8 is a data flow diagram showing a record completion processperformed by the facility in some embodiments when the data storagedevice becomes disconnected, unplugged, or becomes otherwiseinaccessible before a new data record is completed.

FIG. 9 is similar to FIG. 8 discussed above, and shows the recordcompletion process where a user's smart phone 920 is used to store theuser's credentials and encrypted data.

FIG. 10 is a flow diagram that shows a first stage of a card generationprocess performed by the facility in some embodiments.

FIG. 11 is a flow diagram that shows a second stage of the cardgeneration process performed by the facility in some embodiments.

FIG. 12 is a data flow diagram showing a backup operation performed bythe facility in some embodiments to be able to replace the contents of alost or damaged data storage device.

FIG. 13 is a data flow diagram showing an aggregate data analysisprocess performed by the facility in some embodiments.

FIG. 14 shows an end-to-end high-level architecture employed by thefacility in some embodiments.

FIG. 15 is a block diagram showing some of the components typicallyincorporated in at least some of the computer systems and other deviceson which the facility operates.

DETAILED DESCRIPTION

The inventors have recognized that the sorts of detailed individualinformation used in performing many kinds of services with respect toindividuals can have significant value to data thieves, for eventual usein identity theft, blackmail, fraud, insider trading, marketingexpensive niche products and services, etc. The inventors have furtherrecognized that such unauthorized access to and exploitation of aperson's individual information can be extremely expensive or otherwisedisadvantageous to the person, and/or others.

The inventors have further recognized that there are a variety of kindsof information technology exploits and attacks available to informationthieves that can be effective in gaining unauthorized access to datastored on any Internet-connected storage devices, even those thatimplement relatively sophisticated security techniques, despite ongoingefforts to protect such stored data.

Accordingly, the inventors have concluded that individual informationstored in an Internet-accessible storage device to facilitate retrievalby a service provider is vulnerable to theft by information thieves,even when sophisticated, and even state-of-the-art security techniquesare used.

For these reasons, the inventors have conceived and reduced to practicea software and/or hardware facility for providing secure,geographically-diverse access to individual information (“thefacility”). In some embodiments, the facility enables exchange of apatient's electronic health information between healthcare providers(doctors, physicians, nurses, testing laboratories, imaging centers, andother certified individuals) via secure media that is in possession andunder control of the patient.

In some embodiments, the facility uses a portable data storage devicesuch as a smart card or other device sized similarly to a credit card tostore each user's data. Where the facility is used to store health data,for example, in some embodiments the data storage device is incorporatedinto each user's medical insurance card or healthcare organizationmembership card. In particular, a data storage device stores the user'sdata in encrypted form, as well as credentials for the user. In someembodiments, the user credentials are, e.g., a security certificateand/or one or more cryptographic keys. In some embodiments, thesecredentials for the user are originated in a physically andcommunicatively isolated location (“a vault”) into which no networkconnections pass, and are copied to the user's smart card inside thisvault. In some embodiments, user's individual information and the user'scredentials are stored separately and/or in a manner that isolates themfrom each other, such as in different physical or logical storagedevices contained within the smart card.

Typically, each of a number of different service providers—such asphysicians, medical testing or imaging centers, etc.—are outfitted withone or more data access devices, or “readers.” When the user visits aservice provider, to access the user's data, the user's data storagedevice is inserted into a reader, along with a smart card containingcredentials for a service provider (“access key storage device”). Forexample, at a doctor's office, the user's smart card may be insertedinto a reader along with a smart card containing credentials for thedoctor treating the user. In various embodiments, the reader usesvarious protocols to interact with the smart cards inserted into them,such as USB. In some embodiments, the reader is connected to a computersystem used in the service provider's practice, such as a desktopcomputer system or a laptop computer system.

Based on credentials on the user's smart card, service providercredentials on the service provider's smart card, and reader credentialsstored in the reader, the decrypts the encrypted data on the user'ssmart card and provides access to it, such as via the provider computersystem. For example, a doctor can access a user's social securitynumber, test results, treatment history, etc. Further, while both smartcards are in the reader, these credentials can be used to store on theuser's smart card new or changed information on the storage device inencrypted form, such as new diagnoses, treatment plans, etc. Theprovider computer system can be connected directly or indirectly to avariety of devices from which this new or changed information isobtained, including provider testing devices, provider storage devices,provider input devices, etc.

In some embodiments, the data access device obtains the service providercredentials in a way other than the service provider inserting a serviceprovider smart card into the data access device. In various suchembodiments, the service provider credentials are retrieved wirelesslyfrom an object carried by or on the service provider or their proxy,such as by a smart phone or other communications device, a name tag orother identification badge, a device worn in the manner of a watch orglasses, a tag sewn into clothing, etc. In various embodiments, suchwireless communication is via, for example, WiFi, Bluetooth, NFC, RFID,infrared, etc. In some embodiments, the user's credentials are providedin one or more of these alternative manners.

In some embodiments, the data access device accesses the user'sencrypted data in a manner other than reading it from a smart cardinserted into the data access device. In various such embodiments, thedata access device reads and writes the user's encrypted datawirelessly, such as on a smart phone or other communications devicecarried by the user. In some embodiments, the data access device readsand writes the user's encrypted data on an Internet server.

In some embodiments, the credentials possessed by each reader that allowthe reader to decrypt the contents of the user's smart card include arevolving reader certificate. This revolving reader certificate is abasis for disabling readers that are being used improperly. In thenormal course of events, a new revolving reader certificate isperiodically generated and distributed to all of the readers. Eachreader retains all received revolving reader certificates for use indecrypting user smart card data encrypted by a reader using whatevercertificate the encrypting reader had most recently received at the timeof encryption, and uses the most recent revolving reader certificate toencrypt the user smart card data. However, where it is determined that aparticular reader is being used improperly, the facility can deny thatreader future revolving reader certificates, making it impossible forthat reader to read user smart cards whose contents were encrypted usingnewer revolving reader certificates.

In some embodiments, the reader is configured to connect to a serviceprovider's computer system as a standard removable storage device as away for the service provider's computer system to store new data on theuser's smart card in encrypted form. In some embodiments, the reader isfurther configured to connect to a service provider's computer system asa printer, so that even service provider computer systems that are notconfigured to store data on removable storage devices can store data onthe user's smart card.

In some embodiments, at certain points when the user's smart card is ina reader, the encrypted data stored in the user's smart card isforwarded to a backup store via a strictly one-way connection—that is,because of physical limitations of how the backup store is connected tothe Internet, data can only flow towards the backup store, never awayfrom the backup store. Where a user loses his or her smart card, thefacility creates a new card; within the vault, copies the user'scredentials to the new card; and, at the site of the backup store,copies to the new card the user's encrypted data from the backup store.Until the user's encrypted data from the backup store is loaded onto thenew card, its separation from the user's credentials stored on the cardprevents its decryption.

In some embodiments, the facility enables a service provider to storedata on the user's card that is not yet available to store when theuser's card is removed from the service provider's reader. While theuser's card is in the service provider's reader, rather than storingsubstantive data, the reader stores on the user's card a very large,randomly determined session identifier. When the service providerfinishes generating the data to be stored on the user's card, theservice provider's reader uploads to a “completion server” a copy of thedata that has been encrypted with a public key associated with the user,along with the session identifier. The next time the user's smart cardis inserted in any reader, it retrieves the session identifier from theuser's smart card, and uses the session identifier to retrieve theencrypted data from the completion server and store this data on theuser's smart card.

In some embodiments, the facility performs certain forms of collectiveanalysis on the individual information stored on behalf of many or allof the users. E.g., in some embodiments, the readers aggregate user dataacross groups of users, and contribute these aggregates to an aggregateddata store. For example, an insurance company may aggregate informationabout its patients as a basis for discerning health and/or treatmenttrends among the patients.

By performing in some or all of the ways described above, the facilityfacilitates geographically-diverse access to each user's individualinformation while at the same time maintaining a high level of securityfor this individual information.

Several use cases outlined below illustrate aspects of the operation ofthe facility in some embodiments and attendant benefits.

1. A first person collapses unexpectedly and is rushed to an EmergencyRoom. Under significant time pressure, the physicians decide to treatthis patient with drug A. If, as is typical, the patient does not carryany personal medical information with her, her doctors are unable tolearn that she is taking drug B, with which drug A has negativeinteractions. This treatment results in worsening condition for thispatient, and may result in her death. These negative outcomes areavoided where her doctors are able to access a list of the patient'scurrent prescriptions stored among her medical information on a portablestorage device carried with her.

2. A second person encounters a serious chest pain, goes to see adoctor. Because he does not have personal health records with him, he isunable to identify two medications recently prescribed for him by acardiologist. The doctor seeks from that cardiologist the identities ofthe prescribed medications, but the cardiologist is vacationing in aremote location beyond communications. The doctor orders exams andtests, then diagnoses the condition, and prescribes new medications. Itturns out that all the same exams and tests had been done by thecardiologist earlier, and result in exactly the same prescriptions. Hadthis patient been carrying his medical information on a portable storagedevice, the prior testing, its results, and the resulting prescriptionswould all have been available to the new doctor, and a substantialamount of effort on behalf of both the doctor and patient would havebeen avoided, along with significant expense.

3. A third person breaks his leg while on vacation. At an urgent carefacility, he is diagnosed, using X-Rays, and is released with crutchesand a CD-ROM containing the X-Ray images. A few days later, he feelssudden major pain and is quickly driven to a hospital Emergency Room.Due to rush, the patient forgets to bring the CD-ROM containing hisX-Ray images. As is typical, the electronic health records system ofthis hospital does not exchange any information with the urgent carefacility visited days earlier. The Emergency Room physicians obtain newX-Ray images, and base their treatment on them, which mirror those ofthe earlier X-Ray study. Here also, the effort, time, and expense ofredundant testing are avoided where the results of earlier tests arestored in a portable storage device carried by the patient.

Such experiences are common among patients treated by modern healthcareproviders, and can often be avoided where a patient carries personalhealth information with him or her in a secure form.

FIG. 1 is a device diagram showing components included in a data storagedevice used by the facility in some embodiments. FIG. 1 shows that, insome embodiments, the data storage device 100 is a smart card. The datastorage device includes both user credential storage 132 and informationstorage 122. The user credential storage is storage capacity on the datastorage device devoted to storing user security credentials, such assecurity certificates, keys, etc., that are representative of the user'sauthority to use the data storage device. The individual informationstorage contains individual information for the user, such as the user'shealth information, encrypted in such a way that user credentials,provider credentials, and reader credentials are all needed in order todecrypt them. A credential controller 131 controls and supervises accessto the user credential storage, while an information controller 121controls and supervises access to the individual information storage.The data storage device has one or both of electrical contacts 110 andan antenna 111 to communicate with the reader to permit the reader toaccess the user credentials and the individual information stored on thedata storage device.

In some embodiments, one role of the data access device is to isolatethe patient's card from being accessed directly. In some embodiments,the facility stores data on the card in a completely different formatcompared to what is presented by the data access device to serviceprovider computer systems. This enables the data access device tovalidate and enforce data contracts and schemas, which ensures theintegrity of the data, and removes the risk of unauthorized data to“travel” on the card.

In some embodiments, the data access device contains two independent,isolated areas—one handles encryption and security, while the otherexecutes applications aimed and different forms of data processing. Insome embodiments, everything related to security is “hardcoded,” suchthat it cannot be changed or updated remotely. In some embodiments,parts of the data aggregation and de-identification controlling settingsare “hardcoded” as well. For instance, when medical information isaggregated across patients, the facility can require that the readeronly report aggregates for 10 or more patients.

FIG. 2 is a device diagram showing an access keys storage device used bythe facility in some embodiments. In a manner similar to the datastorage device, the access key storage device 200 contains credentialstorage 232 for the provider's credentials. A controller 231 controlsand supervises access to the provider credentials in provider credentialstorage by the data access device. The data access device communicateswith the access keys storage device through electrical contacts 210and/or an antenna 211.

FIG. 3 is a device diagram showing a data access device used by thefacility in some embodiments. It can be seen that the data access deviceincludes a host interface 341 connecting to a service provider computersystem; electrical contacts 310 and/or an antenna 311 for communicationwith the data storage device and/or the access keys storage device;reader credential storage 322 for storing the data access device'scredentials; and a controller 331 for managing interactions.

In some embodiments, the reader logs and signs any access to the datastored on the data storage device (both read and write, including theactual changes to the data) by the access key/signature stored securelyon the access keys storage device.

In some embodiments, the data access device has a two-processorarchitecture to minimize any vulnerabilities related to its DataEncryption (or “Data Codec”) Stack. The Data Processing Stack can beupdateable (including, in some cases, remote updates) during thelifetime of the data access devices in order to support new and existingdata formats and mappings, re-configure device-level processingalgorithms and solutions including those for data filtering, setupparticular aggregations, data abstractions and abstraction frompersonally identifiable information. On the other hand, the Data CodecStack is protected from any changes or modifications as well as anyattempts to extract the security data, information and algorithms fromit; while the Data Processing Stack can be accessed, reconfigured andupgraded during the lifetime of the data access device, the Codec Stackis inaccessible after the initial initialization and virtually noinformation that may result in vulnerability can be extracted from it.

In some embodiments, the data access device performs hardware-levelvalidation of the data and its format to ensure that only expected typesof data are written and/or read from the data storage device, making itvirtually impossible to share or distribute unauthorized data, viruses,etc.

FIG. 4 is a data flow diagram showing data flow, data encryption anddecryption, backup and data processing techniques used by the facilityin some embodiments. It can be seen that a Codec Stack 411—the onlyphysical place where User Data can be decrypted and encrypted—executeson a separate processor, which is physically isolated fromapplication/processing parts of the data access device. The data accessdevice also has a data processing stack 413 for interacting with aprovider computer system 440, through which the reader can receive newhealth information, such as testing results from testing devices 451 and452. As is discussed in greater detail below, through the providercomputer system 440, the data processing stack can further submitencrypted individual information backups from the storage device thatcan be used if the storage device becomes lost or damaged to create thereplacement. While the Data Processing Stack can be accessed,reconfigured and upgraded during the lifetime of the data access device,the Codec Stack is inaccessible after the initial initialization andvirtually no information that may result in vulnerability can be pulledout of it.

FIG. 5 is a data flow diagram showing a technique performed by thefacility in some embodiments to reencrypt a data storage device's UserKey with a newly updated Revolving Security/Encryption Certificate ofthe data access device. The security certificate on the reader is issuedby the health insurance company or another operating entity. Thiscertificate is periodically renewed. Each time the patient's card isinserted into the data access device the card's security key isre-encrypted with the latest data access device's certificate. This way,readers that were de-certified by the operating entity lose the abilityto decrypt card's key/certificate and use it to decrypt the actualpayload. Since all the previous revolving certificates are stored on thedata access device (in some embodiments in encrypted form), the dataaccess device can decrypt the Encrypted User Key stored on the datastorage device no matter how long ago the last access/re-encryptionhappened. Then the data access device re-encrypts the User Key with themost recent key and returns it back to the data storage device. Thisapproach ensures that the data access devices that have not received thenewest Revolving Certificate will lose the ability to access the data onthe newly updated data storage devices.

In FIG. 5, Numbers in circles mark the sequence of steps in the dataflow. In step 1, the data access device receives from the storage devicethe user key, encrypted with the latest revolving data access devicecertificate received by the data access device to write to the storagedevice. In step 2, the Codec Stack uses the private key of the latestrevolving certificate received by the reader to attempt to decrypt theuser key. If this is not successful, then in step 3, the Codec Stackrepeats this process with each of the previously-received revolvingcertificates until the user key is decrypted. This produces, in step 4,a runtime copy 512 of the plain text user key. In steps 5 and 6, theCodec Stack uses the public key of the latest revolving certificate toreencrypt the plain text user key, and stores it in step 7 in thestorage device in place of the former encrypted user key.

In some embodiments, the user credentials and user's encrypted data arestored on a smart phone belonging to the user. FIG. 6 is a data flowdiagram showing a protocol used by the data access device to communicatewith this smart phone in some embodiments. During a first phase, thereader 610 disables WiFi communications and enables NFC communications.In this phase, the data access device 620 sends the cell phone a publickey of the reader; the cell phone sends the data access device a publickey of the user; and the data access device sends connection propertiesto the smart phone. In a second phase, the data access device turns onWiFi communications, and the smart phone uses the connection propertiessent by the access device in the first phase in order to establish aWiFi connection with the access device. In some embodiments, before thesmart phone provides the user's public key, or before the smart phoneestablishes the WiFi link, it explicitly seeks and obtains authorizationfrom the user to connect with the access device. In a third phase, theaccess device uses the established WiFi connection in order to accessthe user's credentials and encrypted data on the smart phone. Alsoduring this phase, the access device uses the user credentials togetherwith credentials from the service provider 630 and credentials of theaccess device to decrypt, read, and write the user's encrypted data.

In various embodiments, the facility uses various other protocols toestablish a secure, authenticated connection between the smart phone andthe access device, using any of a variety of wireless communicationtechniques and authentication techniques, also including, for example,Bluetooth, and Internet access via a WiFi or cellular data connection.

FIG. 7 is a data flow diagram showing a process used by the facility insome embodiments to periodically update the revolvingsecurity/encryption certificate on the data access device. The dataaccess device re-encrypts each data storage device's User Key with thelatest Revolving reader Certificate each time the data storage device isaccessed.

In some embodiments, a certificate generator 781 that executes in anisolated offline environment periodically generates a new revolvingcertificate 782, such as monthly. Then an encoder 783, which runs in thesame environment, encrypts this Security Certificate with the Public Keyof each valid (and authorized) data access device 710 listed in readerdatabase 771. The resulting list is stored on Administrating Servers720, which are directly accessed by the data access devices to receivetheir copies of new revolving certificates. By removing a data accessdevice from the database of valid readers, the facility prevents aremoved data access device from being able to retrieve the currentrevolving certificate encrypted with its public key, i.e., encrypted ina way that it is able to decrypt with its private key.

A data access device maintains a local copy 715 of the list of all validencryption/access keys (or certificates), or at least the unique IDs ofthose for the read-time validation of the changes made on the patient'scard by other parties. In some embodiments, the governing (oradministration) body of the particular organization maintains thedatabase of all and each issued (and respectfully stored on eachPhysician's RFID card) encryption/access keys (or certificates). In someembodiments, each data access device periodically synchronizes with suchcentral database.

In some embodiments, the data access device maintains whitelists and/orblacklists of keys or signatures for both users and service providers asa basis for controlling access to data storage device contents.

While FIG. 7 shows the Data Access Device sending a signed public key tothe Administrating Server, in some embodiments the Data Access Devicedoes not send a signed public key to the Administrating Server.

In some situations the data storage device can be disconnected orremoved from the data access device before the new data record iscompleted and ready to be stored on the data storage device. In thiscase one or multiple online or otherwise connected storage devices,servers or services can be used for temporarily storing the new data(and complimenting data) that hasn't yet made its way to the datastorage device.

FIG. 8 is a data flow diagram showing a record completion processperformed by the facility in some embodiments when the data storagedevice becomes disconnected, unplugged, or becomes otherwiseinaccessible before a new data record is completed.

At a first stage (shown as highlighted area #1), the data storage device820 is connected and communicating with a first data access device 810.“User ID” and “User Data” (which may be empty, or may contain previousdata records) are accessed and decrypted by the data access device. Thefirst data access device generates a “Session GUID” identifying a recordcompletion session and stores it on the data access device. The firstdata access device requests the “public” part of the asymmetricalsecurity certificate of the data storage device and temporarily cachesit inside own memory. In some embodiments, the expiration of such cacheis configurable. The first data access device allows the connected PC,Tablet or another type of connected provider computer or device 840 toaccess “User ID” and “User Data” in order to initiate a new data record.The first data access device randomly (or according to some set ofrules) selects the Static IP address (or other identification) of theserver, service, or device 891 it is planning to use for the temporarydata record storage. The data access device stores this IP address oranother identification on the data storage device. At this or laterstage (potentially before the new data record is completed), the datastorage device is disconnected from the data access device and becomestherefore inaccessible to the first data access device. The new datarecord gets completed on the same computer or device to which the dataaccess device is connected, or on another device or computer (in thesituation where data records are managed from and by a local recordsmanagement system and are getting stored in the respective DB). The dataaccess device (having ways to communicate with the computer or the DBcontaining the new data records) detects (through a particular pull orpush protocol) that the record is ready. In some embodiments, it neednot be absolutely finished at this stage, but it is in a usable form inaccordance with a particular set of definitions. In some embodiments,record completion can be initiated manually; for example, a serviceprovider can use his or her computer to explicitly notify the dataaccess device when a record is complete. The data access device encryptsthe new data record with the “public” key previously cached from thepresently inaccessible data storage device. The data access device sendsthe encrypted new record for temporary storage on the previouslyselected server, service, or device.

In a second stage (shown as highlighted area #2), the data storagedevice is connected to the same or a different data access device 810′.At this stage, the data access device detects one or more “Session ID's”each identifying a data record that was not yet complete at the lasttime the data storage device was communicating with any data accessdevice. Each such data record may now be complete, or may still beincomplete. The data access device then pulls the corresponding “ServerIP address” (or other identification) of the server, service, or devicethe respective record was originally stored on, establishes anappropriate connection, and downloads the previously stored encrypteddata record. The data access device updates the user data on the datastorage device with the new data record. The data access device pullsthe “User ID” and the “User Data” updated with the new data record fromthe data storage device, then decrypts it and verifies its validity andintegrity. Once confirmed, the data access device sends the confirmationto the server, service, or device (that was used as a temporary storage)requesting this data record be deleted and cleans up the records on thedata storage device. Where the data record is not requested from thetemporary storage location within the predefined expiration period, itcan be sent to an offline storage/backup location and deleted from thetemporary storage. In some embodiments, the facility randomly selects aserver from the collection of servers for the temporary storage of thedata record. In some embodiments, the facility randomly selects aservice from the collection of services for the temporary storage of thedata record. In some embodiments, the facility randomly selects a devicefrom the collection of devices for the temporary storage of the datarecord. In some embodiments, the facility uses temporary storage(servers, services, or storage devices) for storing only a delta ordifference between the data that was already stored on the data storagedevice at the time it was disconnected or became otherwise inaccessibleand the completion (by the variety of definitions) of the correspondingrecord. In some embodiments, the facility uses pairs of randomlyselected server, service or device identification and randomly generated“Session ID” for finding the respective record.

In some embodiments, the facility deletes the record after therespective “User Data” is confirmed correctly updated. In someembodiments, the facility uses asymmetrical encryption approaches fordelta (difference in data records) encryption for the temporary storageof such data record. In some embodiments, the facility accesses the newdata record only as a part of the “User Data” only from the data storagedevice only after it's updated with the new data record. This means thatthe data record that was downloaded from the temporary storage ismeaningless by itself; it cannot be decrypted or otherwise used as astandalone record.

FIG. 9 is similar to FIG. 8 discussed above, and shows the recordcompletion process where a user's smart phone 920 is used to store theuser's credentials and encrypted data. The technique is similar to thatshown in FIG. 8, except that the smart phone uses its own capability 990to access the Internet—e.g., via a WiFi or cellular data connection—tocommunicate directly with the completion server that was selected forthe incomplete record, via a secured tunnel.

FIG. 10 is a flow diagram that shows a first stage of a card generationprocess performed by the facility in some embodiments. In anAdministrative Portal 1010, an administrative user enters a card request1011 including parameters of a new or existing user for which a card isto be created. These parameters are typically invariant with respect tothe user, such as Name, Gender, DOB, etc. This occurs both when thefacility is generating the first data storage device for a user, andwhere the facility is generating a subsequent data storage device forthe user to replace a lost or damaged data storage device of the user.The facility uses a hashing generator 1012 to generate a unique hash forthe user (for example, a SHA2 or MD5 hash) based on the user parameters.The facility copies the unique user hash onto a blank Card 1020. Theuser parameters are used by a Card Printer 1030 to print human-readableinformation on the Card, such as user name, sex, identification number,coverage details, signature, etc. Now the Card 1040 is ready to beinitialized with the Card Certificate.

FIG. 11 is a flow diagram that shows a second stage of the cardgeneration process performed by the facility in some embodiments. A CardCertificates Collection 1151 is a database that is initialized once witha very large number of randomly generated Card Certificates, such as onebillion, each encrypted using an initial Reader Certificate. In someembodiments, the card certificates collection is stored in a physicallyand communicatively isolated vault 1150 into which no wired or wirelessnetwork connections pass. The new Card 1140 containing a User Hashidentifying the user is connected to the Card Certificates Collection.In some embodiments, the user hash is a hash value generated byperforming a consistent hashing algorithm against identifyinginformation for the user, such as social security number, normalizedname, etc. In some embodiments, the user hash is an arbitrary identifierfor the user that is otherwise mapped to from identifying informationfor the user. If this User Hash already exists in the DB (meaning we arerestoring lost/stolen/damaged Card), then the facility copies thecorresponding encrypted Card Certificate onto the Card. Now this Card isready for User Payload Data to be restored from the Backup DB. If thisUser Hash cannot be found, meaning that it is a new User, then thefacility copies the User Hash to the next “Empty” slot of the DB, andcopies the corresponding Card Certificate onto the Card. Now the Card1160 is ready to be securely conveyed to the User, such as via trackablemail, in person pick-up, etc.

FIG. 12 is a data flow diagram showing a backup operation performed bythe facility in some embodiments to be able to replace the contents of alost or damaged data storage device. After the reader performs eachPayload DB update on the Card 1220, the Reader 1210 encrypts the Delta(difference) between the new state and the previous state of the PayloadDB 1223 using Card's Public Key and sends it to the Backup DB 1271 in anisolated vault 1270 together with the Card Hash generated based on thesame Public Key via a “One Way” type of communication channel. Forexample, in some embodiments, to implement one-way communication, thefacility uses an optical communication link in which the receiving endhas an optical sensor, and only the transmitting end has a lightemitter. Only the encrypted and de-identified data payload can be copiedfrom the card for the backup processes; the key/certificate and anythingrelated to personally identifiable information cannot be extracted fromthe card. In some embodiments, the backup server signs backup copies forguaranteed verification/validation of backup transactions. This way datathat is restored from the backup can be verified for validity. In someembodiments, a delete operation can only occur on the Patient's Card ifonline backup of the respective files has succeeded. The backup serverconfirms backup transaction by returning encrypted and signedconfirmation.

For restoration from the Backup DB, a new Card 1240 with the same CardSecurity Certificate is used. A Card Hash is generated from the PublicKey of the new Card using the same hashing algorithm. Where the CardHash matches the existing entry, the encrypted Payload entries arecopied on the Card. The Card 1280 now is ready to be securelytransported to the User.

FIG. 13 is a data flow diagram showing an aggregate data analysisprocess performed by the facility in some embodiments. For example, insome embodiments, the facility performs data analysis to discern healthand/or treatment trends among patients using the facility. In this dataflow, a data access device such as data access device 1312 aggregatescertain data from among the data storage devices 1311 with which itinteracts. Periodically, the data access device sends this aggregateddata 1313 to an analysis server 1330. In some embodiments, there's alower limit on the number of patients whose data can be incorporated ina batch of aggregated data 1313 sent to the analysis server, such as 10patients. In the analysis server, the facility collects the aggregateddata 1331 from across multiple data access devices, subjects it toanalysis techniques implemented by analysis software 1332.

FIG. 14 shows an end-to-end high-level architecture employed by thefacility in some embodiments. It can be seen that de-identified,aggregated, statistical, and instrumentation data is sent to an onlineprocessing fabric for further consumption.

FIG. 15 is a block diagram showing some of the components typicallyincorporated in at least some of the computer systems and other deviceson which the facility operates. In various embodiments, these computersystems and other devices 1500 can include server computer systems,desktop computer systems, laptop computer systems, mobile phones,personal digital assistants, televisions, cameras, automobile computers,electronic media players, etc. In various embodiments, the computersystems and devices include zero or more of each of the following: acentral processing unit (“CPU”) 1501 for executing computer programs; acomputer memory 1502 for storing programs and data while they are beingused; a persistent storage device 1503, such as a hard drive or flashdrive for persistently storing programs and data; a computer-readablemedia drive 1504, such as a floppy, CD-ROM, or DVD drive, for readingprograms and data stored on a computer-readable medium; and a networkconnection 1505 for connecting the computer system to other computersystems to send and/or receive data, such as via the Internet or anothernetwork and its networking hardware. While computer systems configuredas described above are typically used to support the operation of thefacility, those skilled in the art will appreciate that the facility maybe implemented using devices of various types and configurations, andhaving various components.

In some embodiments, the facility stores individual information of avariety of types. For example, in some embodiments, the facility storesindividual information relevant to financial services. In variousembodiments, such information can include social security numbers andother identifying information, credit score, employment history, accountnumbers and balances, information about financial instruments and otherproperty presently or formally owned and its value at various times,investment strategies and histories, etc. In some such embodiments, dataaccess devices are provided to service providers such as bank branches,investment advisors, employers, loan underwriters, retirement and otherfinancial planners, etc.

In some embodiments, the facility stores individual informationcomprises travelling information. In a variety of such embodiments, suchinformation can include traveler identification information, travelercitizenship information, traveler residency status, informationregarding government-issued travel documents such as passports andvisas, travel history, photographs, licensure for automobile driving andother forms of vehicle control, etc. In some such embodiments, dataaccess devices are provided to customs and border patrol agents,government passport and visa authorities, travel agents, airlines andother travel providers, etc.

In some embodiments, the facility stores individual information relatingto education, training, and/or profession certification. In a variety ofsuch embodiments, the individual information includes educationalinformation regarding institution, classes, grades, instructors andeducational facilities, admissions examinations, completionexaminations, degrees conferred, professional certifications and theirstatuses, etc. In some such embodiments, data access devices areprovided to educational institutions and instructors, professionalcertification authorities, employers, etc.

It will be appreciated by those skilled in the art that theabove-described facility may be straightforwardly adapted or extended invarious ways.

We claim:
 1. A method of one or more computing devices for targetingindividual information to a storage device, comprising: at a time whenthe storage device is accessible by a first computing device, in thefirst computing device: (a) causing to be stored in the storage devicean identifier of individual information; at a time when the storagedevice is not accessible by the first computing device, in the firstcomputing device: (b) obtaining the individual information; (c)encrypting the individual information with a public key utilized by thestorage device; (d) causing the encrypted individual information and theindividual information identifier to be stored on an Internet-connectedserver in connection with one another; at a time when the storage deviceis accessible by a second computing device, in the second computingdevice; (e) causing the individual information identifier to beretrieved from the storage device; (f) using the retrieved individualinformation identifier to retrieve the encrypted individual informationfrom the server; and (g) causing to be stored on the storage device theretrieved encrypted individual information, the method furthercomprising: at a time when the storage device is accessible by the firstcomputing device, in the first computing device: causing to be stored inthe storage device information identifying the server, and wherein (f)uses the information identifying the server stored in the storagedevice.
 2. The method of claim 1 wherein the first and second computingdevices are the same computing device.
 3. The method of claim 1 whereinthe first and second computing devices are different computing devices.4. The method of claim 1 wherein (e) is performed in response to thestorage device becoming accessible by the second computing device. 5.One or more instances of computer-readable storage media collectivelyhaving contents that when executed by a processor are configured tocause one or more computing devices to perform a method for targetingindividual information to a storage device, none of the instances ofcomputer-readable storage media being a signal, the method comprising:at a time when the storage device is accessible by a first computingdevice, in the first computing device: (a) causing to be stored in thestorage device an identifier of individual information; at a time whenthe storage device is not accessible by the first computing device, inthe first computing device: (b) obtaining the individual information;(c) encrypting the individual information with a public key utilized bythe storage device; (d) causing the encrypted individual information andthe individual information identifier to be stored on anInternet-connected server in connection with one another; at a time whenthe storage device is accessible by a second computing device, in thesecond computing device: (e) causing the individual informationidentifier to be retrieved from the storage device; (f) using theretrieved individual information identifier to retrieve the encryptedindividual information from the server; and (g) causing to be stored onthe storage device the retrieved encrypted individual information, themethod further comprising: at a time when the storage device isaccessible by the first computing device, in the first computing device:causing to be stored in the storage device information identifying theserver, and wherein (f) uses the information identifying the serverstored in the storage device.
 6. The instances of computer-readablestorage media of claim 5 wherein the first and second computing devicesare the same computing device.
 7. The instances of computer-readablestorage media of claim 5 wherein the first and second computing devicesare different computing devices.
 8. The instances of computer-readablestorage media of claim 5 wherein (e) is performed in response to thestorage device becoming accessible by the second computing device.
 9. Acomputing system configured to target individual information to astorage device, comprising a first computing device, configured to: at atime when the storage device is accessible by the first computingdevice: (a) cause to be stored in the storage device an identifier ofindividual information and information identifying an Internet-connectedserver; at a time when the storage device is not accessible by the firstcomputing device, in the first computing device: (b) obtain theindividual information; (c) encrypt the individual information with apublic key utilized by the storage device; (d) cause the encryptedindividual information and the individual information identifier to bestored on the server in connection with one another; a second computingdevice, configured to: at a time when the storage device is accessibleby the second computing device: (e) cause the individual informationidentifier to be retrieved from the storage device; (f) use theretrieved individual information identifier to retrieve the encryptedindividual information from the server using the information identifyingthe server stored in the storage device; and (g) cause to be stored onthe storage device the retrieved encrypted individual information. 10.The computing system of claim 9 wherein the first and second computingdevices are the same computing device.
 11. The computing system of claim9 wherein the first and second computing devices are different computingdevices.
 12. The computing system of claim 9 wherein (e) is performed inresponse to the storage device becoming accessible by the secondcomputing device.