Today's Spotlight Applications continue our theme of blockchain (distributed ledger) and digital rights management broadly construed. Assigned to Synchronous Health, the first application discloses techniques for predictive modeling and adjustment of behavioral health. Assigned to the pro se inventor Steiner, the second application discloses a portable electronic device for authentication and encryption communicably attached to a computer system.
20180025126, "System and method for predictive modeling and adjustment of behavioral health," assigned to Synchronous Health, Inc.
A cloud-based system and method for predictive modeling and positive adjustment of behavioral health are disclosed. The system includes sensors collecting data associated with subject location and activity, and linked to a subject computing device. The system translates data aggregated from the data sources into state information, and iteratively updates, via the translated state information, a de-identified contextual model for the subject which in an embodiment may be a Life Context Graph as described herein. An end point server compares the de-identified contextual model to a de-identified aggregate of peer-based contextual models, wherein data security and privacy is preserved, and the system further iteratively updates the subject contextual model based thereon. The system accordingly identifies behavioral trigger actions based on the collected data and/or the updated subject contextual model, and generates a predetermined clinical response corresponding to the identified behavioral trigger action.
20180034804, "Portable authentication and encryption device and system," assigned to Steiner.
A portable electronic device for authentication and encryption communicably attached to a computer system is provided. The portable device may generate and automatically output authentication data for a plurality of accounts on request by a user. The output generated by the device is variable and customizable data that matches the data required by websites, applications, and other computer based systems to function as a universal authentication device. The device may include means to encrypt, decrypt, sign, verify and hash data including emails, images, documents and other files on request by a user. The device further having means to require physical user presence in order to generate authentication, encryption, decryption, signature, verification or hash data. The device includes a keypad having a plurality of buttons, a power and data connector, a data processing unit, a keyring hole, a light emitting diode, and a reset button.