This disclosure relates generally to health-based screening and, more particularly, to digital pass verification systems and methods.
In recent years, there has been a rise in outbreaks of infectious diseases (e.g., viral diseases, bacterial diseases, etc.) such as the COVID-19 virus, Ebola virus, H1N1pdm09 virus, Middle East respiratory syndrome coronavirus (MERS-CoV), and Severe Acute Respiratory Syndrome (SARS), to name a few. These infectious diseases are often contagious and easily transmitted from person-to-person in close proximity or through indirect contact via objects and surfaces. To curb the spread of infectious diseases, many entities (e.g., companies, schools, retailers, governments, facility managers, etc.) restrict people with symptoms of infectious diseases from accessing their locations or facilities.
The figures are not to scale. In general, the same reference numbers will be used throughout the drawing(s) and accompanying written description to refer to the same or like parts.
Unless specifically stated otherwise, descriptors such as “first,” “second,” “third,” etc. are used herein without imputing or otherwise indicating any meaning of priority, physical order, arrangement in a list, and/or ordering in any way, but are merely used as labels and/or arbitrary names to distinguish elements for ease of understanding the disclosed examples. In some examples, the descriptor “first” may be used to refer to an element in the detailed description, while the same element may be referred to in a claim with a different descriptor such as “second” or “third.” In such instances, it should be understood that such descriptors are used merely for identifying those elements distinctly that might, for example, otherwise share a same name.
Disclosed herein are example apparatus, systems, methods, and articles of manufacture that enable entities or persons, referred to herein as verifiers, to verify whether a person has recently tested negative for an infectious disease (e.g., a pathogen, a virus, a bacteria, etc.) before granting the person access to a particular location or area. This enables a verifier to maintain a safe environment for the people in the particular area and reduce the likelihood of infection. Example verifiers may include airlines, offices, malls, libraries, sporting arenas, schools, theatres, retailers, utilities, employers, governments, facility managers, and/or any other entity or person that desires to control access to a particular location. Many examples disclosed herein are described in connection with testing for pathogens, viruses, and other infectious diseases. However, it is understood that any examples disclosed herein can be implemented in connection with testing for any analyte of interest.
In examples disclosed herein, a person, referred to herein as a user, may be tested for a particular infectious disease. If the results are negative, a digital pass (which may also be referred to as an electronic pass, a digital health pass, an electronic health pass, a health pass, a digital health card, an electronic health card, or a health card) is generated that can be stored on the user's electronic device, such as, for example, his/her smartphone, smartwatch, etc. In some examples, the digital pass includes a code such as, for example, a Data Matrix Code, a Quick Response (QR) code, a bar code, and/or other machine-readable code. In some examples, the digital pass code includes a user identification (e.g., a user account ID) and a test kit identification associated with a test kit used to test the user. In other examples, the digital pass code can include other information. When the user arrives at a verifier location, a verifier can scan the digital pass code of the digital pass on the user's electronic device to confirm the user has been tested and the test was negative (i.e., the user is not infected with the pathogen subject to the test). In some examples, the verifier uses a verifier device, such as a smartphone, a handheld scanner, or a mounted scanner communicatively coupled to a computer to scan the digital pass code. In some examples, the scanner is a camera. In some examples, a record of the user's test result is stored in a digital pass management system. The verifier can check the identity of the user and their test result with the digital pass management system. The digital pass code enables the verifier to quickly and accurately obtain identifying information about the user that can be used to confirm whether the user has recently been tested and whether the test result was negative for the infectious disease. If the digital pass is valid, the verifier can allow the user to access the location. However, if the user does not have a digital pass, or the digital pass is invalid or expired, the verifier can deny the user access to the location, thereby reducing the risk of infection to others in the location.
In some examples, the user is tested by a tester (e.g., medical professional such as a nurse, a doctor, etc.) at a testing facility (e.g., a doctor's office, hospital, medical clinic, etc.). In some examples, the user's electronic device generates a unique identity code to identify the user. The tester can scan the identity code (e.g., with a tester electronic device such as a tablet or smartphone) to create a record of the user and the test with the digital pass management system. The results of the test are stored with the user's record in the digital pass management system.
In some examples, each user device, tester device, and verifier device operates an application that enables the persons and devices to interface with the digital pass management system. The digital pass management system stores account information, test results, and other information. The digital pass management system provides an interface between the various entities.
In some examples, the verifier is a workplace that desires to keep their employees safe. The verifier may require that the employees have a valid digital pass every day the employees enter the workplace. In some examples, the digital pass expires after a certain period of time after being tested (e.g., 5 days, 7 days, 10 days, etc.). Therefore, the employees may need to be tested multiple times and/or on a regular basis.
The examples disclosed herein benefit all parties, including the employees, the employers (the verifiers), and the testers. From an employee standpoint, for example, the examples disclosed herein enable the employee to safely return to work, which could be a more effective and productive environment than working remotely or could be the employee's only option to work if they cannot perform their duties remotely. This also encourages employees to be better citizens by maintaining awareness of their health and risk to others. From an employer standpoint, for example, the examples disclosed herein can be used to reinforce the importance of employee safety at the workplace, have confidence in the safety of the workplace, manage risk to employees at the workplace, understand who has access to a site, verify employee's pass ad-hoc, act locally based on high frequency data, and access data that may inform access policies to the workplace. From a tester standpoint, for example, the examples disclosed herein enable testers to administer tests and record results efficiently, manage throughput of employees in a reasonable fashion, and maintain the safety of employees awaiting testing and results. These and other benefits are similarly achieved in connection with other types of verifier organizations, such as schools, malls, airlines, sports arenas, etc.
The verifier 106 can represent any person or entity that desires to verify a health status of a person (e.g., the user 102) before granting access to a physical location. The health status includes information related to a person's health such as, for example, a positive or negative result from a diagnostic test for an infectious disease. The verifier 106 may be an airline, an office, a school, a mall, a library, other businesses, a government, a park ranger, other facility managers, etc. For example, the verifier 106 may be an airline gate agent who checks tickets and digital passes of the user 102 prior to boarding a plane. In another example, the verifier 106 may be a security agent or other person who checks the pass of the user 102 prior to the user entering an office building. The verifier 106 uses the verifier device 112 to check the health status of the user 102, as disclosed in further detail herein. In some examples, the verifier device 112 is a mobile electronic device, such as a smartphone, a tablet, a laptop computer, a handheld code scanner, etc. In other examples, the verifier device 112 can be implemented as a non-mobile electronic device, such as a desktop computer, a kiosk, a non-mobile interne connected device capable of scanning a QR code, Data Matrix Code, and/or a barcode, etc.
The user 102 can represent any person that desires to access the location regulated by the verifier 106. The user 102 can interact with the user device 108 to create a digital pass account, receive and view results of a diagnostic test, and/or display a digital pass, as disclosed in further detail herein. The user device 108 is an electronic device that is carried by the user 102. In this example, the user device 108 is a smartphone. However, in other examples, the user device 108 can be implemented by any type of mobile or non-mobile electronic device, such as a tablet, a smartwatch, a laptop computer, a desktop computer, etc.
The tester 104 can represent any person or entity, such as a nurse, a doctor, a testing facility, a hospital, a clinic, etc. that tests a sample from a person/user to be tested for an infectious disease (e.g., a disease caused by a virus, a bacteria, etc.). The tester 104 can interact with the tester device 110 to match the user 102 with a testing kit, enter the test results, etc., as disclosed in further detail herein. In this example, the tester device 110 is a tablet. However, in other examples, the tester device 108 can be implemented by any type of mobile or non-mobile electronic device, such as a smartphone, a laptop computer, a desktop computer, etc.
The digital pass management system 100, the user device 108, the tester device 110, and the verifier device 112 communicate via a network 114, such as, for example, the Internet. In some examples, each of the user device 108, the tester device 110, and the verifier device 112 downloads an application through which the digital pass management system 100, the user device 108, the tester device 110, and the verifier device 112 can communicate. The applications may be specific to the type of entity. For example, as shown in
While many of the example operations disclosed herein are described in connection with functions performed by the specific applications, these operations are not limited to functions performed by an application downloaded onto a device. Instead, the operations can be performed via a web browser or web-based applications. In some such examples, one or more of the operations can be performed remotely, such as by the digital pass management system 100, and displayed on the respective devices. Also, in some examples, the operations of the applications disclosed herein are cloud based, partially cloud based, or edge based.
The verifier organizations may have separate accounts within the digital pass management system 100. The verifier organizations may be able to access their account information (e.g., via an application on a device, such as a computer) to add, remove, edit, etc. users or user profiles as well as modify various parameters (e.g., digital pass expiration times, testing frequency, verification rules, approved testing sites, etc.) associated with the digital pass verification system for the respective verifier organization. The verifier organizations can also sync the digital passes with employment records so that digital passes of employees that have left employment can be deactivated. The verifier organizations may be operated by one or more designated persons from the verifier organization (e.g., a human resources (HR) personnel).
In some examples, the digital pass management system 100 enables the verifier organization to view its list of users/participants and their associated information (e.g., ID, digital pass statuses, statuses of creating an account, statuses of getting tested, etc.) and generate reports (e.g., a report indicating people who are able to work). For example, the verifier organization can generate reports of the users that tested positive, negative, and/or invalid, and/or can be filtered by certain dates or ranges (e.g., all users that tested positive between two dates). In some examples, the verifier organization can send the reports to a local, state, or federal government agency (e.g., the Center for Disease Control (CDC)), another business, another verifier organization, and/or any other entity (e.g., a parent-teacher association). In some examples, the verifier organization manually generates and sends (e.g., via email) the reports. In other examples, the digital pass management system 100 automatically generates and sends the reports (e.g., once a week, once a month, etc.). In some examples, the report generation and/or sending could be triggered by an event, such as a request by an outside entity (e.g., a request from the CDC). In some examples, the digital pass management system 100 accesses results of diagnostic tests, receives sets of user identifications and test kit identifications from one or more second devices (e.g., tester devices), generates a report based on the results and receipt of the sets of user identifications and test kit identifications and transmits the report to a government agency.
In some examples, the digital pass management system 100 may send out invites to the users to be added to the verifier organization. For example, a place of employment (a verifier organization) can create a verifier organization account and send out invites to all of its employees (users) to create user accounts via the user application 116. Invitations may also be sent to new hires. The invites may be sent via email or text, for example. The invites may include a unique link or token code to link/associate the user's account with the verification organization account. Additionally or alternatively, a user may be able to search for certain verifier organizations via the user application 116 and then associate his/her account with the verification organization's account. In some examples, one or more of the users may be granted administrative control to access and/or modify the verifier organization account information. In some examples, a verifier organization can assign different levels of access to different users based on various roles. The digital pass management system 100 can be remote to the tester 104 and/or the verifier 106. One or more operations disclosed herein as being implemented by the applications can be partially or fully executed at the digital pass management system 100.
An example of a digital pass verification process is described below in connection with the interface screens in
As disclosed above, the user 102 may download the user application 116 on the user device 108. In some examples, the user 102 opens the user application 116 on the user device 108 and creates an account with the digital pass management system 100, such as by agreeing to terms and conditions, agreeing to test consent and privacy conditions, entering identifying information (e.g., name, age, email, etc.), and creating a username and password. In some examples, the user 102 creates an account in response to receiving an invite from a verifier organization and/or a tester. For example, the user's employer may send out invites (e.g., via email, via text, etc.) to all employees to create an account using the user application 116. The unique link or token code may cause the application to open on the user device 108, or if not installed, prompt the user 102 to install the user application 116 on the user device 108. Additionally or alternatively, invite may include a unique link or token code to associate with the verifier organization. An example of this is shown in
The user application 116 uses the transceiver 204 to send the account information to the digital pass management system 100 (e.g., via the Internet). The record generator 504 of the digital pass management system 100 creates an account for the user 102 in the database 502. An example record or data entry 510 for the user account is shown in
The user 102 then gets tested for the infectious disease or pathogen. In some examples, the user 102 schedules an appointment with the tester 104. In some examples, the user 102 uses the scheduler 208 in the user application 116 on the user device 108 to search for testing facility, to schedule an appointment with a testing facility, and/or schedule a telehealth session. The scheduler 208 may provide an interface that allows the user to search for testing facilities within a certain geographical location. In some examples, the scheduler 208 automatically returns testing facilities within a certain radius (e.g., 20 miles) of the user's zip code or location, which was obtained during the account setup process. In some examples only certain testing facilities that are approved by the verifier 106 are displayed (e.g., partner testing facilities). In some examples, the scheduler 208 interfaces with the testing facilities' schedule applications or programs to enable the user 102 to schedule an appointment through the user application 116. Additionally or alternatively, the scheduler 208 may provide a link to access the testing facilities' sites for scheduling. The scheduler 208 can provide a link to telehealth services to order tests and/or schedule a telehealth session. The scheduler 208 may save the scheduled appointment with the user account in the memory 202 of the user device 108 and/or in the database 502 with the user's account. In some examples, the notifier 210 in the user application 116 provides reminders or alerts to the user when an appointment is approaching. In other examples, the user 102 can use another application to schedule the test or schedules the test without an application such as, for example, by calling the tester 104 or testing facility. In still other examples, the user 102 does not schedule an appointment, but merely arrives at the testing facility to be tested. In some examples, the tester application 118 provides the tester 102 with a schedule of all the scheduled tests. In some examples, the tester application 118 supports appointments from within the organization and/or from outside of the organization.
In some examples, to help identify the user 102 and link the user's test to the user's account, the code generator 212 of the user application 116 generates an identity code, such as a machine-readable code. In some examples, the identity code may be a 1D code such as a bar code. In some examples, the identity code may be a 2D code such as a Data Matrix Code or a QR code. Other examples may use other types of codes or combinations of codes including, for example, other machine-readable codes. In some examples, the identity represented in the code contains the user account ID for the user 102. In particular, the code generator 212 of the user application 116 converts the user account ID into the code format. The identity code is displayed on the user device 108 so that the user 102 can present the identity code to the tester 104.
In some examples, details related to the user's symptoms, user's travel history, health conditions and/or history, family health history, lifestyle, etc. are presented to the user 102 via the user application 116 and stored in the memory 202 of the user device 108. In some examples, some or all of this information may be shared between the user application 116 and the tester application 118. In some examples, some or all of this information may be shared between the user application 116 and digital pass management system 100.
To identify the user 102, the tester 104 uses the camera 308 of the tester device 110 to scan the identity code 1200 on the user device 108. For example,
In some examples, the tester 104 uses the camera 308 to scan the user's driver's license or other ID (e.g., take a picture of the ID, scan a code (e.g., a barcode) on the ID, etc.). The record generator 310 can create a record based on data obtained from the scanned ID and/or communicate with the digital pass management system 100 to obtain a record based on data obtained from the scanned ID. Additionally or alternatively, in some examples, the user 102 can scan his/her driver's license or other ID with the user device 108 (e.g., with the camera 207 of the user device 108). In such an example, the user application 116 can create a record with data obtained from the scanned ID and/or communicate data to the tester device 110 and/or digital pass management system 100.
The test to be performed is a medical diagnostic test including, for example, a rapid diagnostic test (RDT). The diagnostic test detects a presence or an absence of an analyte of interest, such as an infectious disease, a pathogen, an antibody, etc. The test can be performed using any type of testing kit, device, and/or equipment. Different tests may require different types of samples from a user. A sample can include a nasal swab, an oral fluid swab, blood, urine, etc.
The test or assay can be any test or assay able to detect an analyte of interest. The analyte can be monovalent (monoepitopic) or polyvalent (polyepitopic), synthetic or natural, antigenic or haptenic, and may be a single compound or plurality of compounds which share at least one common epitopic or determinant site. The analyte can be a nucleic acid, a protein, a nucleocapsid protein, an antibody or an antigen. The analyte can be a part of a cell such as bacteria or a cell bearing a blood group antigen such as A, B, D, etc., or an HLA antigen, plasma membrane receptors or a microorganism, e.g., bacterium, fungus, protozoan, or virus. The analyte can also be a chemical compound, such as a drug or a metabolite thereof. In some examples, the test is an assay to detect an analyte associated with an infectious disease.
In some examples, the test is performed using a disposable test kit, such as a disposable lateral flow test kit. An example disposable lateral flow test kit that may be used is the BinaxNOW® test kit manufactured by Abbott Laboratories, having headquarters in Abbott Park, Ill., USA. In some examples, each test kit contains a unique test kit ID (e.g., a serial number), which may be generated by the manufacturer and/or distributer. The test kit ID may be displayed as a test kit code (e.g., a machine-readable code, such as a QR code) on the test kit. In other examples, the test may be performed using a laboratory analyzer device (e.g., a molecular or clinical chemistry analyzer device). In some examples, the test may be performed using a point of care laboratory analyzer device such as the ID NOW™ analyzer manufactured by Abbott Laboratories. In some examples, test cartridges are used with the laboratory analyzer device. In some such examples, each cartridge contains a unique test kit ID generated by the manufacturer and/or distributer.
In some examples, the test selector 312 of the tester application 118 analyzes the information provided including, for example, user symptoms, travel history, health conditions and/or history, family health history, lifestyle, etc. to determine what diagnostic tests should be performed. For example, the test selector 312 may determine what analyte of interest or infectious diseases a user may have been exposed to based on the data derived from the user's information. The sample indicator 314 prompts the tester 104 as to what sample or samples to gather from the user 102 based on the test determined by the test selector 312. For example, if the test selector 312 determine that the user 102 should be tested for COVID-19, the sample indicator 314 prompts the tester 104 to gather a sample of nasal secretions using, for example, a nasopharyngeal swab.
When the tester 104 is ready to perform the test, the tester 104 can scan a code on the test kit. In some examples, the tester 104 selects an option on the screen of the tester device 110 such as, for example, “Scan Test Kit” as shown in
The test kit code 2000 contains the test kit ID (e.g., a serial ID, lot ID, and/or expiration date from the manufacturer) associated with the test kit 2002. As disclosed herein, each test kit may include a unique test kit ID that is generated for every test kit. The record generator 310 of the tester application 118 detects and interprets the test kit code 2000 to obtain the test kit ID. The tester application 118 sends the test kit ID to the digital pass management system 100, which stores the test kit ID with the user's account. For example, as shown in
In some examples, the validator 506 of the digital pass management system 100 verifies or authenticates the validity of the test kit by comparing the test kit ID with a list of valid test kit IDs from the manufacturer. Test kits with IDs that are not included in a list of valid test kit IDs may be counterfeit. In some examples, the validator 506 of the digital pass management system 100 verifies the validity of the test kit by evaluating an expiration date of the test kit. In some examples, the validator 506 of the digital pass management system 100 verifies the validity of the test kit by evaluating a recall status of the test kit. In some examples, the validator 506 of the digital pass management system 100 verifies the validity of the test kit by evaluating if the test kit has already been used. If the validator 506 determines that a test kit is not a valid test kit, the digital pass management system 100 notifies the tester 104 (e.g., by exchanging communications between the transceiver 508 and the transceiver 304). After a test kit is used, the record generator 504 records the test kit as being used. Any attempt to use the test kit again will result in the validator 506 indicating that the test kit is not valid.
In some examples, before or after scanning the test kit code 2000, the tester application 118 displays instructions for how to obtain a sample from the user 102 and/or use the test kit 2000. The instructions are based on what sample type the sample indicator 314 selected for the test. For example,
In some examples, the test is performed at the point of care. That is, the test is performed at the location where the sample was gathered from the user, such as for example, at the testing facility or a medical office or clinic. In some examples, a sample is gathered and a test is performed at the user's home. In other examples, the sample is shipped to a remote location, and the test is performed at the remote location. For example, the testing facility may obtain the sample from the user 102 and ship the sample to the remote testing facility. As another example, the user 102 may obtain his/her own sample (e.g., from an at-home sample kit) and ship the sample the remote testing facility. In some examples, such as with a disposable lateral flow test kit, the results are provided via a visual indication (e.g., one or more lines or colors) on the test kit. In other examples, such as with a laboratory analyzer device, the results are provided on a digital screen of the laboratory analyzer device.
When the test is complete, the tester 104 interprets the test results. For example, via the tester application 118, the tester 104 can select “Interpret New Test” as shown in
In some examples, when viewing and/or interpreting the results, the tester 104 scans the test kit code 2000 on the test kit 2002 again, as shown in
In some examples, the tester application 118 provides a notification for the interpretation and entry of the result of the diagnostic test. For example, the tester application 118 can present the tester 104 with selectable options for the results of the test, as shown in
In other examples, the camera 308 can be used to obtain an image of the test kit 2002, and the reader 318 of the tester application 118 analyzes the image to automatically interpret the results. In such examples, the tester 104 does not need to enter the results into the tester device 110. In other examples, such as with a diagnostic test performed by a laboratory analyzer device, the laboratory analyzer device may automatically send the results to the tester application 118 and/or the digital pass management system 100.
In some examples, the tester 104 takes a picture of the used test kit 2002 (or at least a portion of the test kit 2002) as evidence of the results. In some such examples, the picture of the used test kit 2002 is saved in the database 502 with the user's account (as shown in
The record generator 504 of the digital pass management system 100 adds the results to the user account. For example, the data entry 510 in
The user application 116 can then access the test results. In some examples, the test results are sent to the user device 108 via a text, an email, a URL link, etc. In other examples, the test results are pushed to the user application 116. For example,
The analyzer 216 of the user application 116 determines what the test results are (e.g., positive, negative, or invalid/inconclusive). In some examples, in addition to displaying the results, the notifier 210 of the user application 116 on the user device 108 can present instructions or guidelines (e.g., the CDC guidelines) relating to the infectious disease and/or the results. If the results are negative, for example, the post-testing instructions may be minimal. For example,
If the analyzer 216 determines that the results are negative, the code generator 212 of the user application 116 on the user device 108 generates a digital pass 2800, as shown in
If the analyzer 216 determines that the results are positive or invalid (inconclusive), no digital pass is generated. In some examples, the notifier 210 may alert the user 102 that no digital pass is to be generated because of the test results. In some examples, the notifier 210 provides an indication within the user application 116 that there is no valid digital pass.
If analyzer 216 determines the results are negative, the code generator 212 of the user application 116 generates the digital pass 2800 and saves the digital pass 2800 on the user device 108 (e.g., in the memory 202). In some examples, the digital pass 2800 is saved as part of a digital wallet on the user device 108 that can be accessed with or without the user application 116. In some examples, the digital wallet contains other digital passes (e.g., for the same infectious disease and/or other infectious diseases) and/or other types of passes (e.g., airline boarding passes, movie tickets, etc.).
In some examples, the digital pass 2800 includes a digital pass code 2802. The code generator 212 of the user application 116 generates the digital pass code 2802. The digital pass code 2802 can be a machine-readable code. In this example, the digital pass code 2802 is a QR code. In other examples, the digital pass code 2802 can be another type of code, such as, for example, a bar code, a Data Matrix Code, and/or other types of machine-readable codes. In some examples, to generate the digital pass 2800, the code generator 212 communicates (via the transceiver 204) with the tester 104 and/or the digital pass management system 100 to access data related to the test kit ID and an object ID. The object ID is the ID of the user account. In some examples, the digital pass code 2802 includes the user account ID and the test kit ID associated with the diagnostic test. Thus, in some examples, the digital pass code 2802 includes information to identify the user 102. In other examples, the digital pass code 2802 can include other identifying information in addition to or as an alternative to the user account ID and the test kit ID. The digital pass code 2802 enables the verifier 106 to quickly, accurately, and safely obtain information from the user 102 that can be used to verify the user 102. The code generator 212 embeds the QR code (or other type of machine-readable code) into the digital pass 2800. In some examples, the code generator 212 adds further details to the digital pass 2800 including, for example, the user's name and an expiration date of the digital pass 2800. The output 218 sends the digital pass 2800 to the display 206 for presentation by the user 102.
In some examples, the digital pass 2800 has an expiration date or time, which represents a threshold number of days or time that the digital pass 2800 is still valid. After the expiration date or time, the digital pass 2800 is no longer valid. In some examples, the example time comparator 214 monitors time to determine when an expiration date or time is approaching or has passed. The expiration date may be a predetermined number of days after the test, such as five days, seven days, ten days, etc., for example. In other examples, the expiration may be based on a certain time (e.g., 30 hours from the diagnostic test). In some examples, the expiration date or time is based on a pathogen incubation period or contagious period. In some examples, the expiration date or time is set by the organization or entity associated with the verifier 106. The scheduler 208 monitors the dates and/or times of expiration of the digital passes. In some examples, as shown in
In some examples, after the user application 116 receives the test result, and prior to generating the digital pass 2800, the time comparator 214 determines whether the expiration time or date has already passed. This may occur, for example, if there was a delay in testing or sending the results. In some examples, if the expiration has already passed, the code generator 212 does not generate the digital pass 2800. If the expiration date has not already passed, the code generator 212 generates the digital pass 2800 as disclosed herein. Therefore, in some examples, the code generator 212 generates the digital pass 2800 in response to the result being negative and the number of days (or time) since the diagnostic test being below a threshold number of days (or time).
As disclosed above, in some examples, the code generator 212 may create additional digital passes (e.g., for the same infectious disease and/or other infectious diseases). In some examples, a single digital pass may include information related to a number of tests infectious disease and/or other infectious diseases.
When the user 102 decides to enter the location monitored by the verifier 106, the user 102 displays the digital pass 2800 on the user device 108 to the verifier 106. For example, if the verifier 106 is an airline, the user 102 may display the digital pass 2800 to a gate agent before boarding the plane. As another example, if the verifier 106 is an office (e.g., the user's place of employment), the user 102 can display the digital pass 2800 to a person (e.g., a security officer or representative of the employer) in the lobby of the office. In some examples, the user application 116 on the user device 108 may send the digital pass 2800 to another device to be displayed. For example, if the user has a smartwatch with a display screen, the transceiver 204 may transmit the digital pass 2800 to the user's smartwatch to be displayed.
The verifier 106 uses the camera 408 of the verifier device 112 to read or scan the digital pass code 2802 on the user device 108. For example,
The validator 506 of the digital pass management system 100 inspects the records to determine whether the user account ID and test kit ID match the user account and are still valid (e.g., not expired and still associated with the verifier organization). For example, the validator 506 may verify the result of the diagnostic test based on the user account ID and the test kit ID. In other words, the validator 506 may match user account ID and the test kit ID to the result of the diagnostic test. The validator 506 may also determine the number of days since the diagnostic test and compare the number of days since the diagnostic test to a threshold number of days. The validator 506 may transmit a verification outcome (indicating whether the digital pass 2800 is valid, invalid, or not found) based on the verification of the result and the number of days. For example, if the diagnostic test result is negative and the number of days since the diagnostic test satisfies (e.g., is below) the threshold number of days, the validator 506 transmits a first notice, notification, or message indicating the digital pass 2800 is valid.
If the number of days since the diagnostic since does not satisfy (e.g., is greater than) the threshold number of days, the validator 506 transmits a second notice, notification, or message indicating the digital pass 2800 is expired or not valid. In some examples, the validator 506 may also transmit the second notice, notification, or message if the user account ID has been inactivated or removed from a verifier organization associated with the verifier 106 (e.g., if an employee no longer works with the employer) or another reason. Additionally or alternatively, the validator 506 may transmit the second notice, notification, or message if the test result was positive or inconclusive. This helps prevent against fraudulent generation of a digital pass. If validator 506 could not find a diagnostic test associated/matched with the user account ID and/or the test kit ID, the validator 506 transmits a third notice, notification, or message indicating the digital pass 2800 is not found. In some examples, if the result was inconclusive (e.g., the sample was contaminated or an insufficient amount of sample was gathered to effectively conduct the diagnostic test), the validator 506 transmits a fourth notice, notification, or message indicating the result was inconclusive.
In some examples, in addition to or as an alternative to using the number of days to determine if the digital pass 2800 has expired, the validator 506 may use an amount of time (e.g., 30 hours). For example, the validator 506 may determine an amount of time between performance of the diagnostic test and receipt of the user account ID and test kit ID from the verifier device 112. When the amount of time satisfies (e.g., is below) a threshold amount of time, for example, the validator 506 may transmit the first notice, notification, or message disclosed above to indicate the digital pass 2800 is still valid. When the amount of time does not satisfy (e.g., is greater) than the threshold amount of time, for example, the validator 506 may transmit the second notice, notification, or message disclosed above to indicate the digital pass 2800 is expired or not valid.
In some examples, the threshold number of days and/or threshold amount of time is set by the verifier organization. Additionally or alternatively, the threshold number of days and/or the threshold amount of time may be based on a biological characteristic of the analyte of interest, such as an incubation period of the pathogen and/or a contagious period of the pathogen.
If the digital pass 2800 is valid, the notifier 414 of the verifier application 120 displays a positive or an acceptance message (e.g., a first notice), such as, for example, the valid message shown in
In some examples, instead of or in addition to the validator 506 checking whether the digital pass has expired, the digital pass management system 100 confirms the result was negative and then sends the date of the diagnostic test to the verifier device 112. Then, the verifier application 120 compares the number of days or amount of time since the diagnostic test to a threshold number of days or amount of time. Depending on the outcome, the verification application 120 can present one of the interfaces shown in
In some examples, different verifiers can have different expiration times or thresholds. For example, a first verifier may have a first expiration threshold of seven days and a second verifier may have a second expiration threshold of five days. These expiration thresholds can be saved with the digital pass management system 100 and/or in their corresponding verification applications. When the digital pass 2800 is scanned by the first verifier, the number of days or time since the diagnostic test is compared to the first expiration threshold, and when the digital pass 2800 is scanned by the second verifier, the number of days or time since the diagnostic test is compared to the second expiration threshold. This enables verifier organizations to set their preferred expiration thresholds.
In addition to or as an alternative to displaying the verification outcome on the verifier device 112, the verifier device 112 can automatically unlock at least one of a door, a gate, or a turnstile based on the verification outcome. For example, the user 102 may present his/her digital pass 2800 to the verification device 112 (e.g., a scanner at a gate) at a gate of a location managed by the verification organization. If the digital pass 2800 is valid, the verification application 120 can unlock the gate to enable the user 102 to access the location. If not, the verification application 120 enables the gate to remain locked to deny the user 102 access to the location.
As disclosed above, the user application 116 can be used to manage multiple digital passes for the user 102. Each digital pass can be generated using the example digital pass verification process disclosed above. The digital passes can be associated with diagnostic tests for the same or different analyte of interest. Each diagnostic test may be used to detect a presence or an absence of a certain analyte of interest. For example, the user application 116 may store a first digital pass with a first digital pass code associated with a first diagnostic test for a first analyte of interest (e.g., COVID-19) and a second digital pass with a second digital pass code associated with a second diagnostic test for a second analyte of interest (e.g., influenza), which may be the same or different than the first analyte of interest.
In some examples, when a digital pass expires, the user 102 can get re-tested for the same analyte of interest to generate a new digital pass for that analyte of interest. In some examples, the second or subsequent diagnostic test may be a different type of test than the first diagnostic test. For example, the first diagnostic test may be an antigen test and the second diagnostic test may be an antibody test. In other examples, other types of tests may be used, such as polymerase chain reaction (PCR)/molecular tests, antigen tests, etc. In some examples, the first diagnostic test is performed with a first type of testing equipment (e.g., a disposable test kit) and the second diagnostic test is performed with a second type of testing equipment (e.g., a laboratory analyzer device) that is different than the first type of testing equipment.
The digital passes can be read by different verifier organizations. For example, a first digital pass can be read by a first verifier device of a first verifier (e.g., a school) when the user 102 desires to enter a location managed by the first verifier, and a second digital pass can be read by a second verifier device of a second verifier (e.g., an employer) when the user 102 desires to enter a location managed by the second verifier.
In some examples, the user 102 can use the user application 116 to manage digital passes associated with multiple verifier organizations or entities. For example, various organizations or entities may require a digital pass for access, such as the user's place of employment, the user's school, an airline, etc. The user 102 can use the user application 116 to add organizations to and/or remove organizations from the user's account. The user application 116 may store (e.g., in a digital wallet) the digital passes for the user 102 associated with the various organizations.
In some examples, the digital pass management system 100 stores information associated with each scan of a digital pass such as the time/date, the person who scanned the pass, the location, the result of the scan (e.g., valid, invalid) etc. This may help prevent fraudulent use of the digital pass (e.g., if a second user attempts to use the same digital pass in a different location at the same time).
In some examples, in addition to the expiration date of the digital pass 2800, other constraints can be placed on a valid digital pass. For example, the organization associated with the verifier 106 may desire to prevent or prohibit access to the verifier location on certain days and/or to allow or prevent access to specific buildings or areas of buildings controlled by the organization. In some examples, the organization may set limits such that the digital pass 2800 is only valid on certain days, within certain time ranges, and/or to certain locations including, for example, specific turnstiles, elevators, doors, etc. For example, the user's employer may desire to only allow certain employees on the premises on certain days of the week to stagger the employees to reduce likelihood of virus transmission. In such an example, the digital pass 2800 may be invalid on certain days of the week, which prevents the user 102 from gaining access to the office on those days. These specific days and/or time ranges can be set by the verifier 106 (e.g., via the verification application 120) and saved with the user's account in the database 502 and/or on the user application 116 with the digital pass 2800. Therefore, the verifier application 120 can display different notices including, for example, the first notice (
In some examples, a verifier organization, such as an employer, can deactivate a user's digital pass in the digital pass management system 100 when the user leaves the company (e.g., is fired or voluntarily quits). Then, if the digital pass code 2802 is scanned, the validator 506 invalidates the digital pass code 2802 even when the number of days since the diagnostic test is below the threshold number of days. In such an instance, the validator 506 transmits an invalid message to the verifier device 112. Therefore, the verifier application 120 can display the first notice (
In some examples, after the user 102 has received a digital pass, the user application 116 may require the user 102 to answer a daily health questionnaire to ensure the user 102 has not become sick. For example, the analyzer 216 may cause the user application 116 to display a list of health questions to check whether the user has had any recent symptoms (e.g., “Have you had a temperature over 103° F. in the last 24 hours?”, “Have you developed a cough in the last 24 hours?”, etc.). In some examples, based on the user 102 answers to one or more of the questions, the analyzer 216 deactivates the digital pass 2800 (e.g., prevents the digital pass 2800 from being displayed), which prevents the user 102 from gaining access to the verifier location. If later (e.g., the next day) the user 102 answers the questions differently, the analyzer 216 may re-activate the digital pass such as, for example, when the user 102 no longer displays symptoms of an illness. In some examples, depending on the answers to the health questions, the analyzer 216 may recommend that a user 102 take a test or, in some situations, that a user does not take a test.
In some examples, each time the user 102 accesses (e.g., opens) the user application 116, the user 102 is required to log in with their account name and password. In some example, the user application 116 may use one or more biometrics of the user 102 to grant access (e.g., via facial recognition using the camera 207, via a thumb print scan, etc.). In some examples, the user application 116 requires multi-factor authentication (MFA). In some such examples, the MFA is associated with the user's phone number, which may be stored with the user's account in the database 502.
In some examples, testers or testing facilities can create accounts with the digital pass management system 100. This enables users to search for testers or testing facilities near the users. In some examples, certain ones of the tester or testing facilities may be registered or approved by certain verifier organizations.
In some examples, the user application 116 can be used to manage one or more profile(s)/account(s) and/or digital pass(es) associated with other persons related to or associated with the user 102. For example, the user 102 may be able create and access user accounts(s) and/or digital pass(es) for younger dependents (e.g., people under the age of 18), such as the user's children, and/or older dependents, such as the user's parents or grandparents, via the user application 116. The user application 116 may enable the user 102 to add dependents, remove dependents, edit dependent account information, etc. The dependent's account ID may be linked to the user's account ID in the digital pass management system 100. The user application 116 may also store all current and/or prior test results and digital passes associated with the dependents. The user 102 can view all prior tests and present digital passes associated with the dependents via the user application 116, similar to the tests and digital passes associated with the user 102 as disclosed herein. The user 102 can use the user application 116 to present the dependent's digital passes to certain verifiers to enable access. For example, the user 102 may use the user application 116 to manage a digital pass associated with the user's child. In such an example, the user 102 may use the user application 116 to present a digital pass for the child to a certain verifier, such as a school when dropping the child off at school or to an airline when boarding an airplane.
For example,
As disclosed above, the user 102 can connect or register himself/herself and/or one or more dependents to one or more verifier organization accounts in the digital pass management system 100. This enables the verifier organizations to have access to the user's account information and/or dependent account information. The verifier organization can control certain parameters (e.g., expiration time) associated with the user's digital passes for the verifier organization. The user 102 can connect with an organization via the user application 116. For example,
At step 3902, the user 102 downloads the user application 116 onto the user device 108 and registers with the digital pass management system 100. In some examples, the user device 108 initially receives a communication (e.g., a text, an email, etc.) to download the user application 116. For example, the verifier 106 may send communications to users (e.g., employees, future passengers, etc.) that intend to access the verifier location(s). At step 3904, the user 102 schedules a test. In some examples, the user 102 schedules the test via the user application 116. In such an example, the scheduler 208 books an appointment with a testing facility. In some examples, the notifier 210 provides alerts or reminders about the upcoming appointment.
At step 3906, the user 102 travels to the testing facility and notifies the tester 104. At step 3908, the user 102 provides their identification and consent for the test. For example, the code generator 212 may generate the identity code 1200 (as shown in
At step 3912, the user device 108 receives the results and the user 102 can review the results on the user device 108. In some examples, the notifier 210 provides an indication (e.g., a push notification) that the results have been received. At step 3914, if the results are negative, the code generator 212 generates the digital pass 2800 and the digital pass code 2082 and saves the digital pass 2800 to a digital wallet on the user device 108. In some examples, the code generator 212 creates an expiration date associated with the digital pass 2800. The user 102 can then use the digital pass 2800 until the digital pass 2800 has expired.
At step 3916, the time comparator 214 and scheduler 208 determines whether the digital pass 2800 has expired (e.g., by comparing the current date to the expiration date of the digital pass 2800). If the digital pass 2800 has expired, the notifier 210 may provide an alert to remind the user 102 to get tested again, and the example cycle may be repeated.
At step 4002, the tester 104 downloads the tester application 118 onto the tester device 110 and registers with the digital pass management system 100. In some examples, the tester device 110 initially receives a communication (e.g., a text, an email, etc.) to download the tester application 118. At step 4004, the tester 104 starts the test process by selecting the next patient. At step 4006, the tester 104 verifies the patient identity and creates a test record. For example, the reader 318 can detect and interpret the identity code 1200 on the user device 108. The record generator 310 creates a record for the test and may send the user information to the digital pass management system 100 to store with the user account.
At step 4008, the tester 104 selects a test kit or test cartridge to be used. In some examples, the test kit selector 312 determines which test kit or test cartridge should be used. The tester 104 can use the tester device 110 to scan a test kit code on the test kit. The reader 318 detects and interprets the test kit code on the test kit to obtain the test kit ID. The tester application 118 and/or the digital pass management system 100 can verify the authenticity of the test kit (e.g., to ensure the test kit has not been used before, is manufactured by a list of approved manufacturers, has not expired, etc.). The record generator 310 can save the test kit code and/or send the test kit code to the digital pass management system 100 to be saved with the user's account.
At step 4010, the tester 104 collects a sample from the user 102 and performs the test. At step 4012, the tester 104 captures the test results. In some examples, the tester 104 enters the results into the tester application 118 (e.g., by selecting one of a plurality of predefined options). In some examples, the tester 104 uses the tester device 110 to take a picture of at least a portion of the used test kit as evidence. At step 4014, the record generator 310 saves and publishes the results (e.g., sends the results to the user device 108). In some examples, the record generator 310 sends the results and/or the picture(s) to the digital pass management system 100, which sends the results to the user device 108. In some examples, in addition to viewing the results, the user 102 can view the picture of the test kit via the user application 116. In some examples, the user application 116 saves and presents all historical pictures of the test kits associated with the user 102.
If the results are negative, the example cycle can be repeated when the user 102 comes back to get retested again (e.g., after expiration of the digital pass) or an additional test could be ordered and performed to determine a presence of another analyte of interest, confirm results of an initial test or determine possible immunity. If the results are positive, the tester 104 may recommend the user 102 has a consultation with a licensed physician, at step 4016. At step 4018, additional testing may be performed to verify the results. In some examples, a serology test is performed and the test results are sent to a lab. In some examples, the user 102 is quarantined (e.g., via self-quarantining, quarantined in a medical facility, etc.) for a period of time, as step 4020.
Similar to the timeline or sequence of events in
At step 4028, the tester 104 verifies the patient identity and creates a test record. For example, the reader 318 can detect and interpret the identity code 1200 on the user device 108. The record generator 310 creates a record for the test and may send the user information to the digital pass management system 100 to store with the user account.
At step 4030, the tester 104 selects a test cartridge to be used in the ID NOW™ analyzer. The tester 104 can use the tester device 110 to scan a test kit code on the test cartridge. The reader 318 detects and interprets the test kit code on the test cartridge to obtain the test kit ID. The tester application 118 and/or the digital pass management system 100 can verify the authenticity of the test cartridge (e.g., to ensure the test cartridge has not been used before, is manufactured by a list of approved manufactures, has not expired, etc.). The record generator 310 can save the test kit code and/or send the test kit code to the digital pass management system 100 to be saved with the user's account.
At step 4032, the tester 104 collects a sample from the user 102 and performs the test. At step 4034, the tester 104 for the test to be completed. In some examples, the ID NOW™ analyzer has a digital screen that displays the results of the test. At step 4036, the tester 104 records and publishes the results. In some examples, the tester 104 enters the results into the tester application 118 (e.g., by selecting one of a plurality of predefined options). In some examples, the tester 104 uses the tester device 110 to take a picture of the digital screen as evidence. The record generator 310 saves and publishes the results (e.g., sends the results to the user device 108). In some examples, the record generator 310 sends the results and/or the picture(s) to the digital pass management system 100, which sends the results to the user device 108. The example cycle can then be repeated with the next patient.
At step 4102, the verifier 106 downloads the verifier application 120 onto the verifier device 112 and registers with the digital pass management system 100. In some examples, the verifier device 112 initially receives a communication (e.g., a text, an email, etc.) to download the verifier application 120. At step 4104, the verifier application 120 can display instructions on the verifier device 112 for how to use the verification application 120.
At step 4106, the verifier 106 uses the verifier device 112 to scan the digital pass code 2802 on the user device 108. The detector 410 detects the digital pass code 2802 and the certifier 412 interprets the digital pass code 2802 to obtain identifying information (e.g., the user account ID and test kit ID) embedded in the digital pass code 2802. The verifier application 120 records the digital pass details (e.g., date, time, location) and/or sends the details to the digital pass management system 100 to be saved with the user account (step 4108). If the pass is valid, the verifier 106 can grant the user 102 access to the location (step 4110). If not, the verifier 106 can deny the user 102 access to the location.
The timeline in
The timeline in
The timeline in
At step 4302, the verifier 106 (e.g., the school) performs an onboarding process. The verifier 106 (e.g., the school) creates a school organization account with the digital pass management system 100. The verifier 106 (e.g., the school) can create the account using via the verifier application 120 on the verifier device 112 and/or another electronic device (e.g., a computer). The verifier 106 (e.g., the school) can log into the digital pass management system 100 to access and modify information associated with the school organization account. This may be referred to as a school portal. The verifier 106 (e.g., the school) can create administrative controls and privileges for certain people (e.g., human resources (HR) personnel).
At step 4304, the verifier 106 (e.g., the school) can load a school roster into the digital pass management system 100. The school roster may include the names and other identifying information (e.g., parent's names, email addresses, phone numbers, etc.) associated with each of the students. At step 4306, the digital pass management system 100 generates a unique invitation ID for each student. The unique invitation ID can be used to link the student's account or his/her parent's account to the school organization account. At step 4308, the digital pass management system 100 sends the invitation IDs to the parents (e.g., via email, via text message, via regular mail, etc.).
At steps 4310-4314, the user 102 (e.g., a parent) can create a user account for himself/herself and/or a dependent account/profile for the student via the user application 116 and connect their account(s) to the school organization account. Examples of this process are disclosed above in connection with
At step 4316, the user 102 (e.g., a parent) can use the user application 116 to find a testing location and schedule a test (e.g., via the scheduler 208) to have the child tested. In some examples, only testing center approved by the verifier 106 (e.g., the school) are to be used. At step 4318, the child is tested. An example of the testing process is disclosed in connection with
At step 4320, the digital pass management system 100 releases the results of the tests to the verifier 106 (e.g., the school) and the associated users 102 (e.g., the parents). At step 4322, the verifier 106 (e.g., the school) can log into their account with the digital pass management system 100 to review the results of the students connected to the school organization account. At step 4324, the user 102 (e.g., a parent) can access the result of the test for his/her child in the user application 116. If the user's child tested negative, the user application 116 can generate a digital pass for the child, as disclosed in connection with
If the user 102 does not have an electronic mobile device (e.g., a phone) to display a digital pass or does not have an electronic mobile device capable of displaying a digital pass, a similar digital pass verification process can be implemented in which certain information is mailed or emailed to the user 102. For example,
While in some of the examples disclosed herein the tester 104 performs the test, in other examples, the user 102 can perform the test themselves. For example, the test may be performed via an at-home disposable test kit (e.g., a lateral flow test strip). In some examples, the user application 116 presents instructions to inform the user 102 on how to collect the sample for the diagnostic test. In some examples, after the test, the user 102 can then enter the results of the test into the user application 116. For example, the user application 116 can provide a notification similar to
As disclosed above, in some examples, rather than going to a testing facility to get tested, the user 102 may perform the diagnostic test himself/herself. In some examples, the user 102 may perform the test while being virtually monitored by the tester 104 (which may be referred to, in this example, as telehealth, telemed, telemedicine, electronic medicine, and/or virtual testing) to ensure the fidelity of the testing process. For example, the user application 116 can electronically connect the user device 108 with a telehealth service provide prior to collection of the sample. In some examples, the user device 108 and the tester device 110 connect via a video conference session. In such an example, the tester 104 can monitor and watch the user 102 while the user 102 collects his/her sample and performs the diagnostic. In some examples, the user 102 can use the user device 108 to can scan the test kit code on the test kit to obtain the test kit ID. The user application 116 transmits the test kit ID to the digital pass management system 100 to be stored with the user's account. When the test is completed, the user 102 can show the test kit with the result to the tester 104 via the video call. For example, the test kit may include a visual indication (e.g., lines) that indicate the result of the test. The tester 104 can then enter the results into the tester application 118 and transmit the results to the digital pass management system 100.
At step 4502, the manufacturer of the test kits creates serial numbers, lot IDs and expiration dates for the test kits. At step 4504, the manufacture updates a test kit lot manifest. The manufacturing prints and labels the test kits the test kit codes (e.g., QR codes) (step 4506) and distributes the test kits (step 4508). In some examples, the test kit codes include the serial IDs, the lot IDs, and/or the expiration dates.
In some examples, the lot manifest is encrypted and the data is encoded (step 4510) and a secure registry is created (step 4512). In some examples, this secure registry is saved with the digital pass management system 100 and/or otherwise accessible for checking by the digital pass management system 100.
At step 4514, a new test kit is scanned by the tester application 118, which may correspond to steps 4008 and 4030 of
While an example manner of implementing the example user application 116 and the example user device 108, the example tester application 118 and the example tester device 110, the example verifier application 120 and the example verifier device 112, and the example digital pass management system 100 are illustrated in
In the illustrated example of
In the illustrated example of
In the illustrated example of
In the illustrated example of
In the illustrated example of
A flowchart representative of example hardware logic, machine readable instructions, hardware implemented state machines, and/or any combination thereof for implementing the user application 116 of
A flowchart representative of example hardware logic, machine readable instructions, hardware implemented state machines, and/or any combination thereof for implementing the tester application 118 of
A flowchart representative of example hardware logic, machine readable instructions, hardware implemented state machines, and/or any combination thereof for implementing the verifier application 120 of
A flowchart representative of example hardware logic, machine readable instructions, hardware implemented state machines, and/or any combination thereof for implementing the digital pass management system 100 of
The machine readable instructions described herein may be stored in one or more of a compressed format, an encrypted format, a fragmented format, a compiled format, an executable format, a packaged format, etc. Machine readable instructions as described herein may be stored as data or a data structure (e.g., portions of instructions, code, representations of code, etc.) that may be utilized to create, manufacture, and/or produce machine executable instructions. For example, the machine readable instructions may be fragmented and stored on one or more storage devices and/or computing devices (e.g., servers) located at the same or different locations of a network or collection of networks (e.g., in the cloud, in edge devices, etc.). The machine readable instructions may require one or more of installation, modification, adaptation, updating, combining, supplementing, configuring, decryption, decompression, unpacking, distribution, reassignment, compilation, etc. in order to make them directly readable, interpretable, and/or executable by a computing device and/or other machine. For example, the machine readable instructions may be stored in multiple parts, which are individually compressed, encrypted, and stored on separate computing devices, wherein the parts when decrypted, decompressed, and combined form a set of executable instructions that implement one or more functions that may together form a program such as that described herein.
In another example, the machine readable instructions may be stored in a state in which they may be read by processor circuitry, but require addition of a library (e.g., a dynamic link library (DLL)), a software development kit (SDK), an application programming interface (API), etc. in order to execute the instructions on a particular computing device or other device. In another example, the machine readable instructions may need to be configured (e.g., settings stored, data input, network addresses recorded, etc.) before the machine readable instructions and/or the corresponding program(s) can be executed in whole or in part. Thus, machine readable media, as used herein, may include machine readable instructions and/or program(s) regardless of the particular format or state of the machine readable instructions and/or program(s) when stored or otherwise at rest or in transit.
The machine readable instructions described herein can be represented by any past, present, or future instruction language, scripting language, programming language, etc. For example, the machine readable instructions may be represented using any of the following languages: C, C++, Java, C#, Perl, Python, JavaScript, HyperText Markup Language (HTML), Structured Query Language (SQL), Swift, etc.
As mentioned above, the example processes of
“Including” and “comprising” (and all forms and tenses thereof) are used herein to be open ended terms. Thus, whenever a claim employs any form of “include” or “comprise” (e.g., comprises, includes, comprising, including, having, etc.) as a preamble or within a claim recitation of any kind, it is to be understood that additional elements, terms, etc. may be present without falling outside the scope of the corresponding claim or recitation. As used herein, when the phrase “at least” is used as the transition term in, for example, a preamble of a claim, it is open-ended in the same manner as the term “comprising” and “including” are open ended. The term “and/or” when used, for example, in a form such as A, B, and/or C refers to any combination or subset of A, B, C such as (1) A alone, (2) B alone, (3) C alone, (4) A with B, (5) A with C, (6) B with C, and (7) A with B and with C. As used herein in the context of describing structures, components, items, objects and/or things, the phrase “at least one of A and B” is intended to refer to implementations including any of (1) at least one A, (2) at least one B, and (3) at least one A and at least one B. Similarly, as used herein in the context of describing structures, components, items, objects and/or things, the phrase “at least one of A or B” is intended to refer to implementations including any of (1) at least one A, (2) at least one B, and (3) at least one A and at least one B. As used herein in the context of describing the performance or execution of processes, instructions, actions, activities and/or steps, the phrase “at least one of A and B” is intended to refer to implementations including any of (1) at least one A, (2) at least one B, and (3) at least one A and at least one B. Similarly, as used herein in the context of describing the performance or execution of processes, instructions, actions, activities and/or steps, the phrase “at least one of A or B” is intended to refer to implementations including any of (1) at least one A, (2) at least one B, and (3) at least one A and at least one B.
As used herein, singular references (e.g., “a”, “an”, “first”, “second”, etc.) do not exclude a plurality. The term “a” or “an” entity, as used herein, refers to one or more of that entity. The terms “a” (or “an”), “one or more”, and “at least one” can be used interchangeably herein. Furthermore, although individually listed, a plurality of means, elements or method actions may be implemented by, e.g., a single unit or processor. Additionally, although individual features may be included in different examples or claims, these may possibly be combined, and the inclusion in different examples or claims does not imply that a combination of features is not feasible and/or advantageous.
At block 4604, the user application 116 transmits (e.g., communicates with the transceiver 204 via the internet) the user account information to the digital pass management system 100 for registration. The record generator 504 of the digital pass management system 100 creates and stores a record of the user account in the database 502. The record generator 504 of the digital pass management system 100 creates a user account ID for the user account. The digital pass management system 100 transmits (e.g., communicates with the transceiver 508) the user account ID to the user device 102. At block 4606, the transceiver 204 receives the user account ID, and the user application 116 stores the user account ID (e.g., in the memory 202).
At block 4608, the code generator 212 of the user application 116 generates the identity code 1200 (e.g., a QR code, a Data Matrix Code, other machine-readable codes) with the user account ID. The identity code 1200 can be used to confirm the identity of the user 102 when the user 102 is tested. The user application 116 stores the identity code 1200 (e.g., in the memory 202).
In some examples, to get tested for an infectious disease, the user 102 can schedule an appointment. For example, at block 4610, the user 102 uses the scheduler 208 of the user application 116 to schedule a test with a testing facility. In other examples, the user 102 can proceed to the testing facility without an appointment.
The user 102 shows the identity code 1200 to the tester 104. For example, at block 4612, the user application 116 presents the identity code 1200 on the display 206 of the user device 108 (e.g.,
In some examples, the user 102 may perform the test themselves. In some such examples, the user application 116 may present instructions to inform the user device 108 how to collect the sample and/or perform the test. In some examples, the user 102 may enter his/her results into the user application 116. For example, the user application 116 can provide a notification similar to
Referring to
At block 4616, the analyzer 216 of the user application 116 determines if the result was negative for the infectious disease. In some examples, if the result was not negative (i.e., the result was positive or invalid), the example process may end, and a digital pass is not generated. In other examples, if the analyzer 216 of the user application 116 determines that the result was not negative, the example process may continue with the user 102 scheduling another test (block 4610). If the result was negative, at block 4618, the code generator 212 of the user application 116 generates the digital pass 2800 including the digital pass code 2802 (e.g., a QR code, a Data Matrix Code, and/or other types of machine-readable codes). In some examples, the digital pass code 2802 includes the account ID associated with the user's account and the test kit ID of the test kit used to perform the test. Therefore, the user application 116 accesses the user account ID (e.g., stored in the memory 202) and the test kit ID (e.g., stored in the memory 202) and generates the digital pass code 2802 based on the user account ID and the test kit ID. Example digital passes 2800, 2804 and digital pass codes 2802, 2806 are shown in
The user 102 can then present the digital pass 2800 to one or more verifiers as needed. At block 4622, the user application 116 presents or displays the digital pass 2800 (including the digital pass code 2802) on the display 206 of the user device 108. The digital pass 2800 can be used to enable the user 102 to gain entry into a location. The digital pass 2800 can be used multiple times with the same verifier or different verifiers.
At block 4624, the time comparator 214 of the user application 116 determines whether the digital pass 2800 has expired. If the digital pass 2800 has not expired, the digital pass 2800 is still valid and can continue to be used. If the digital pass 2800 has expired, the user 102 can get re-tested (e.g., proceeding to block 3810) and the example process continues from there.
The example process shown in
In some examples, before testing the user 102, the tester 104 creates a new test record by identifying the user 102. As disclosed above, the user 102 can present the identity code 1200 on the user device 108 to the tester 104. The tester 104 uses the tester device 110 to scan the identity code 1200. For example, the tester device 110 may include the camera 308, which can be used to scan the identity code 1200. In some examples, the tester application 118 displays the video feed from the camera 308 to enable the tester 104 to align the identity code 1200 in view of the camera 308. An example of this interface is shown in
At block 4704, the tester application 118 transmits the user account ID to the digital pass management system 100 using, for example, the transceiver 304. In some examples, the digital pass management system 100 returns the name and/or other identifying information associated with the user 102 so that the tester 104 can confirm the identity of the user 102. At block 4706, the tester application 118 receives (e.g. via the transceiver 304) and presents the user identification information on the tester device 110. An example user interface showing the user identification information on the tester device 110 is shown in
Depending on the type of test, the test kit or test cartridge contains a test kit code with a unique test kit ID. The tester 104 uses the tester device 110 to scan the test kit code on the test kit or test cartridge. In some examples, the tester application 118 displays the video feed from the camera 308 to enable the tester 104 to align the test kit code in view of the camera 308. An example of this interface is shown in
In some examples, at block 4710, the tester application 118 presents instructions on how to perform the test. An example of this interface is shown in
At block 4714, the tester application 118 presents a user interface with selectable options for the results of the test. An example of this user interface is shown in
At block 4718, the tester application 118 transmits the user account ID, the test kit ID (from one or both scans), and the test results to the digital pass management system 100 (using, for example, the transceiver 304). The results are saved in the database 502 with the user account and sent to the user device 108. In some examples, the tester application 118 transmits an image of the test kit used in the diagnostic device to be saved in the database 502. In addition to or as an alternative to sending the information to the digital pass management system 100, the tester application 118 can also send the information directly to the user device 108.
When the user 102 intends to gain access to the location monitored by the verifier 106, the user 102 can present the digital pass 2800 on the user device 108. The verifier 106 uses the verifier device 112 to scan the digital pass code 2802. For example, the verifier device 112 may include the camera 408, which can be used to scan the digital pass code 2802. In some examples, the verifier application 120 displays the video feed from the camera 408 to enable the verifier 106 to align the digital pass code 2802 in view of the camera 408. An example of this interface is shown in
At block 4804, the verifier application 120 transmits the user account ID and test kit ID to the digital pass management system 100 (e.g., using the transceiver 404). In some examples, the validator 506 of the digital pass management system 100 determines whether the user account ID and the test kit ID match in the user account. The validator 506 of the digital pass management system 100 also confirms that the result of the test was negative. In some examples, the validator 506 of the digital pass management system 100 also confirms that the expiration date has not passed. The digital pass management system 100 transmits a verification outcome based on whether the digital pass 2800 is determined to be valid, invalid (e.g., expired), or not found to the verifier device 112 (e.g., using the transceiver 508). At block 4806, the verifier application 120 receives (e.g., via the transceiver 404) the verification outcome from the digital pass management system 100. The notifier 414 of the verifier application 120, at block 4808, presents the results. If the digital pass 2800 is valid and not expired, the certifier 412 of the verifier application 120 indicates that the digital pass 2800 is valid. An example of this interface is shown in
If the digital pass 2800 is expired or not valid (e.g., because the user 102 has been removed from the verifier organization), the certifier 412 of the verifier application 120 may indicate the digital pass 2800 is expired or not valid. An example of this interface is shown in
If the digital pass is not found, such as if no user account is found, the certifier 412 of the verifier application 120 may indicate the pass is not found. An example of this interface is shown in
As disclosed above, when the user 102 is at the testing facility, the tester 104 scans the identity code 1200 on the user device 108 to obtain the user account ID. The tester application 118 sends the user account ID to the digital pass management system 100. At block 4908, the digital pass management system 100 receives the user account ID from the tester device 110 (e.g., via the tester application 118) and the validator 506 identifies the associated user account. At block 4910, the digital pass management system 100 transmits the user name (and/or other identifying information) to the tester device 110 (e.g., using the transceiver 508). The tester 104 can use the user name to confirm the identity of the user 102 before or after performing the test.
As disclosed above, after the test is performed, the test kit ID and result information is/are sent to the digital pass management system 100. At block 4912, the digital pass management system 100 receives and stores the test kit ID and result of the test associated with the user account. In particular, when the digital pass management system 100 receives the test kit ID and the result, the processor 500 associates the test kit ID and result of the diagnostic test with the user account ID and saves this information in the database 502 with the user account (e.g., in the data entry 510). Thereafter, the processor 500 can access the result of the diagnostic test associated with the test kit ID. At block 4914, the digital pass management system 100 transmits the result of the test to the user device 108 (e.g., using the transceiver 508). In some examples, in addition to the result, the digital pass management system 100 transmits the test kit ID to the user device 108. The test kit ID may be used in the digital pass code 2802, as disclosed herein. In some examples, the digital pass management system 100 verifies at least one of an expiration date of the test kit or a recall status of the test kit based on the test kit prior to transmitting the result of the diagnostic test and the test kit ID. In some examples, the digital pass management system 100 verifies an authenticity of the test kit based on the test kit ID prior to transmitting the result of the diagnostic test and the test kit ID to the user device 108. Additionally or alternatively, the digital pass management system 100 can transmit other information to the user device 108, such as the date of the diagnostic test, the type of test, etc. As disclosed above, the result can be used to create a digital pass on the user device 108.
As disclosed above, the verifier 106 can scan the digital pass code 2802 on the user device 108 to obtain the user account ID and test kit ID. The verifier application 120 sends the user account ID and test kit ID to the digital pass management system 100. At block 4916, the digital pass management system 100 receives the user account ID and the test kit ID from the verifier device 112 (e.g., via the verifier application 120). At block 4918, the validator 506 of the digital pass management system 100 determines whether the digital pass 2800 for the user account is still valid. In some examples, the validator 506 of the digital pass management system 100 confirms that the test kit ID matches the test kit ID associated with the user account. The validator 506 verifies the result of the test based on the user account ID and the test kit ID. In other words, the validator 506 matches the user account ID and the test kit ID with the test result of the diagnostic test. For example, the validator 506 of the digital pass management system 100 determines whether the result of the test associated with the user account for that test kit ID is negative. In some examples, the validator 506 of the digital pass management system 100 confirms whether the digital pass 2800 has not expired. For example, the validator 506 can determine a number of days since the diagnostic test and compare the number of days to a threshold number of days. If the number of days satisfies the threshold (e.g., is at or below the threshold), the validator 506 determines the digital pass 2800 is still valid. If the number of days does not satisfy the threshold (e.g., is above the threshold), the validator 506 determines the digital pass 2800 is not valid. In some examples, even if the number of days satisfies the threshold, the validator 506 can invalidate the digital pass 2800, such as if the user 102 is no longer employed at the verifier organization and the verifier organization has deactivated the user's passes.
At block 4920, the digital pass management system 100 transmits a verification outcome (e.g., valid, invalid (expired), or not found), indicating the validity of the digital pass 2800, to the verifier device 112 (e.g., using the transceiver 508). The verification outcome can include a first notice when the result of the diagnostic test is negative and the number of days since the diagnostic test is below the threshold number of days, a second notice when the number of days since the diagnostic test is greater than the threshold, or a third notice when the digital pass is not found. The verifier application 120 displays a message associated with the verification outcome, as shown in
The processor platform 5000 of the illustrated example includes a processor 5012. The processor 5012 of the illustrated example is hardware. For example, the processor 5012 can be implemented by one or more integrated circuits, logic circuits, microprocessors, GPUs, DSPs, or controllers from any desired family or manufacturer. The hardware processor may be a semiconductor based (e.g., silicon based) device. In this example, the processor 5012 can represent the processor 200 and implements the example user application 116.
The processor 5012 of the illustrated example includes a local memory 5013 (e.g., a cache). The processor 5012 of the illustrated example is in communication with a main memory including a volatile memory 5014 and a non-volatile memory 5016 via a bus 5018. The volatile memory 5014 may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS® Dynamic Random Access Memory (RDRAM®) and/or any other type of random access memory device. The non-volatile memory 5016 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory 5014, 5016 is controlled by a memory controller.
The processor platform 5000 of the illustrated example also includes an interface circuit 5020. The interface circuit 5020 may be implemented by any type of interface standard, such as an Ethernet interface, a universal serial bus (USB), a Bluetooth® interface, a near field communication (NFC) interface, and/or a PCI express interface.
In the illustrated example, one or more input devices 5022 are connected to the interface circuit 5020. The input device(s) 5022 permit(s) a user to enter data and/or commands into the processor 5012. In some examples, the input device(s) 5022 can include the display 206, which may be a touchscreen, and/or the camera 207. Additionally or alternatively, the input device(s) can be implemented by, for example, an audio sensor, a microphone, a keyboard, a button, a mouse, a touchscreen, a track-pad, a trackball, isopoint and/or a voice recognition system.
One or more output devices 5024 are also connected to the interface circuit 5020 of the illustrated example. The output devices 5024 can include the display 206 and can be implemented, for example, by display devices (e.g., a light emitting diode (LED), an organic light emitting diode (OLED), a liquid crystal display (LCD), a cathode ray tube display (CRT), an in-place switching (IPS) display, a touchscreen, etc.), a tactile output device, a printer and/or speaker. The interface circuit 5020 of the illustrated example, thus, typically includes a graphics driver card, a graphics driver chip and/or a graphics driver processor.
The interface circuit 5020 of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver (e.g., the transceiver 204), a modem, a residential gateway, a wireless access point, and/or a network interface to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network 5026 (e.g., the network 114, such as the internet). The communication can be via, for example, an Ethernet connection, a digital subscriber line (DSL) connection, a telephone line connection, a coaxial cable system, a satellite system, a line-of-site wireless system, a cellular telephone system, etc.
The processor platform 5000 of the illustrated example also includes one or more mass storage devices 5028 for storing software and/or data. Examples of such mass storage devices 5028 include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, redundant array of independent disks (RAID) systems, and digital versatile disk (DVD) drives.
The machine executable instructions 5032 of
The processor platform 5100 of the illustrated example includes a processor 5112. The processor 5112 of the illustrated example is hardware. For example, the processor 5112 can be implemented by one or more integrated circuits, logic circuits, microprocessors, GPUs, DSPs, or controllers from any desired family or manufacturer. The hardware processor may be a semiconductor based (e.g., silicon based) device. In this example, the processor 5112 can represent the processor 300 and implements the example tester application 118.
The processor 5112 of the illustrated example includes a local memory 5113 (e.g., a cache). The processor 5112 of the illustrated example is in communication with a main memory including a volatile memory 5114 and a non-volatile memory 5116 via a bus 5118. The volatile memory 5114 may be implemented by SDRAM, DRAM, RDRAM® and/or any other type of random access memory device. The non-volatile memory 5116 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory 5114, 5116 is controlled by a memory controller.
The processor platform 5100 of the illustrated example also includes an interface circuit 5120. The interface circuit 5120 may be implemented by any type of interface standard, such as an Ethernet interface, a USB, a Bluetooth® interface, an NFC interface, and/or a PCI express interface.
In the illustrated example, one or more input devices 5122 are connected to the interface circuit 5120. The input device(s) 5122 permit(s) a user to enter data and/or commands into the processor 5112. In some examples, the input device(s) 5122 can include the display 306, which may be a touchscreen, and/or the camera 308. Additionally or alternatively, the input device(s) can be implemented by, for example, an audio sensor, a microphone, a keyboard, a button, a mouse, a track-pad, a trackball, isopoint and/or a voice recognition system.
One or more output devices 5124 are also connected to the interface circuit 5120 of the illustrated example. The output devices 5124 can include the display 306 and can be implemented, for example, by display devices (e.g., an LED, an OLED, an LCD display, a CRT display, an IPS display, a touchscreen, etc.), a tactile output device, a printer and/or speaker. The interface circuit 5120 of the illustrated example, thus, typically includes a graphics driver card, a graphics driver chip and/or a graphics driver processor.
The interface circuit 5120 of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver (e.g., the transceiver 304), a modem, a residential gateway, a wireless access point, and/or a network interface to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network 5126 (e.g., the network 114, such as the internet). The communication can be via, for example, an Ethernet connection, a DSL connection, a telephone line connection, a coaxial cable system, a satellite system, a line-of-site wireless system, a cellular telephone system, etc.
The processor platform 5100 of the illustrated example also includes one or more mass storage devices 5128 for storing software and/or data. Examples of such mass storage devices 5128 include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, RAID systems, and DVD drives.
The machine executable instructions 5132 of
The processor platform 5200 of the illustrated example includes a processor 5212. The processor 5212 of the illustrated example is hardware. For example, the processor 5212 can be implemented by one or more integrated circuits, logic circuits, microprocessors, GPUs, DSPs, or controllers from any desired family or manufacturer. The hardware processor may be a semiconductor based (e.g., silicon based) device. In this example, the processor 5212 can represent the processor 400 and implements the example verifier application 120.
The processor 5212 of the illustrated example includes a local memory 4413 (e.g., a cache). The processor 5212 of the illustrated example is in communication with a main memory including a volatile memory 5214 and a non-volatile memory 5216 via a bus 5218. The volatile memory 5214 may be implemented by SDRAM, DRAM, RDRAM® and/or any other type of random access memory device. The non-volatile memory 5216 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory 5214, 5216 is controlled by a memory controller.
The processor platform 5200 of the illustrated example also includes an interface circuit 5220. The interface circuit 5220 may be implemented by any type of interface standard, such as an Ethernet interface, a USB, a Bluetooth® interface, an NFC interface, and/or a PCI express interface.
In the illustrated example, one or more input devices 5222 are connected to the interface circuit 5220. The input device(s) 5222 permit(s) a user to enter data and/or commands into the processor 5212. In some examples, the input device(s) 5222 can include the display 406, which may be a touchscreen, and/or the camera 408. Additionally or alternatively, the input device(s) can be implemented by, for example, an audio sensor, a microphone, a keyboard, a button, a mouse, a track-pad, a trackball, isopoint and/or a voice recognition system.
One or more output devices 5224 are also connected to the interface circuit 5220 of the illustrated example. The output devices 5224 can include the display 406 and can be implemented, for example, by display devices (e.g., an LED, an OLED, an LCD display, a CRT display, an IPS display, a touchscreen, etc.), a tactile output device, a printer and/or speaker. The interface circuit 5220 of the illustrated example, thus, typically includes a graphics driver card, a graphics driver chip and/or a graphics driver processor.
The interface circuit 5220 of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver (e.g., the transceiver 404), a modem, a residential gateway, a wireless access point, and/or a network interface to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network 5226 (e.g., the network 114, such as the internet). The communication can be via, for example, an Ethernet connection, a DSL connection, a telephone line connection, a coaxial cable system, a satellite system, a line-of-site wireless system, a cellular telephone system, etc.
The processor platform 5200 of the illustrated example also includes one or more mass storage devices 5228 for storing software and/or data. Examples of such mass storage devices 5228 include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, RAID systems, and DVD drives.
The machine executable instructions 5232 of
The processor platform 5300 of the illustrated example includes a processor 5312. The processor 5312 of the illustrated example is hardware. For example, the processor 5312 can be implemented by one or more integrated circuits, logic circuits, microprocessors, GPUs, DSPs, or controllers from any desired family or manufacturer. The hardware processor may be a semiconductor based (e.g., silicon based) device. In this example, the processor 5312 can implement the example record generator 504 and the example validator 506.
The processor 5312 of the illustrated example includes a local memory 5313 (e.g., a cache). The processor 5312 of the illustrated example is in communication with a main memory including a volatile memory 5314 and a non-volatile memory 5316 via a bus 5318. The volatile memory 5314 may be implemented by SDRAM, DRAM, RDRAM® and/or any other type of random access memory device. The non-volatile memory 5316 may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory 5314, 5316 is controlled by a memory controller.
The processor platform 5300 of the illustrated example also includes an interface circuit 5320. The interface circuit 5320 may be implemented by any type of interface standard, such as an Ethernet interface, a USB, a Bluetooth® interface, an NFC interface, and/or a PCI express interface.
In the illustrated example, one or more input devices 5322 are connected to the interface circuit 5320. The input device(s) 5322 permit(s) a user to enter data and/or commands into the processor 5312. The input device(s) can be implemented by, for example, an audio sensor, a microphone, a camera (still or video), a keyboard, a button, a mouse, a touchscreen, a track-pad, a trackball, isopoint and/or a voice recognition system.
One or more output devices 5324 are also connected to the interface circuit 5320 of the illustrated example. The output devices 5324 can be implemented, for example, by display devices (e.g., an LED, an OLED, an LCD display, a CRT display, an IPS display, a touchscreen, etc.), a tactile output device, a printer and/or speaker. The interface circuit 5320 of the illustrated example, thus, typically includes a graphics driver card, a graphics driver chip and/or a graphics driver processor.
The interface circuit 5320 of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver, a modem, a residential gateway, a wireless access point, and/or a network interface to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network 5326 (e.g., the network 114, such as the internet). The communication can be via, for example, an Ethernet connection, a DSL connection, a telephone line connection, a coaxial cable system, a satellite system, a line-of-site wireless system, a cellular telephone system, etc.
The processor platform 5300 of the illustrated example also includes one or more mass storage devices 5328 for storing software and/or data. Examples of such mass storage devices 5328 include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, RAID systems, and DVD drives.
The machine executable instructions 5332 of
A block diagram illustrating an example software distribution platform 5400 to distribute software such as the example computer readable instructions 5032, 5132, 5232, and 5332 of
In the illustrated example, the software distribution platform 5400 includes (or is implemented by) one or more servers to distribute the example computer readable instructions 5032, 5132, 5232, and 5332 to the corresponding processor platforms 5000, 5100, 5200, and 5300 of
From the foregoing, it will be appreciated that example methods, apparatus, systems, and articles of manufacture have been disclosed that enable verifiers to quickly, easily, and accurately verify whether a user (e.g., an employee, a passenger, a spectator, a patient, or other person) has recently tested negative for an infectious diseases before allowing the person access to a particular area or location. As such, the examples, disclosed herein can help reduce the risk of spreading an infectious disease and, thus, improve safety.
The examples disclosed herein also increase communication bandwidth among the user application 116, the tester application 118, the verifier application 120, and the digital pass management system 100 because the digital passes are produced on the user device 108 and do not have to be transmitted over the Internet or computed in the cloud. Furthermore, the user application 116 constructs the digital pass based on a negative result. Therefore, user devices do not expend operating resources to construct a digital pass for every test that is performed.
In some examples, the verifier application 120 communicates directly with the digital pass management system 100. In such examples, the verifier 106 may receive test results without communication with a user. For example, an employer may receive an employee's test result before an employee arrives at work. In this example, the employer may preemptively contact the employee and notify them that they have been restricted from attendance at work.
In some examples, the tester 104 and/or the digital pass management system 100 develop a sequence of tests to recommend to a user. For example, the sequence of tests may be based on a pathogen life cycle and/immune response. In such examples, a first type of test may be recommended at a first time period. Based on an incubation period, the pathogen life cycle, and/or immune response, a second instance of the first type of test and/or a second type of test may be recommended at a second time period. The tester 104 and/or the digital pass management system 100 can transmit a notification of the sequence of diagnostic tests to the user device 108. The scheduler 208 of the user application 116 causes the user device 108 to display the notification of the recommended testing sequence.
In some examples, the tester 104 and/or the digital pass management system 100 may publish test results. In some examples, geographic data regarding where digital pass codes have been scanned is gathered. In some examples, geographic data regarding where positive tests have occurred (e.g., user residential and work data is gathered. The user application 116, the tester application 118, the verifier application 120, and the digital pass management system 100 may work in concert to aggregate geographic data related to positive tests, negative tests, user travel history, and user movement. The aggregated data may be used to create heat maps that identify regions or smaller geographic locations (e.g., a particular school or business) that are areas of relatively higher positivity rates.
Example digital pass verification systems, methods, apparatus, devices, and articles of manufacture are disclosed herein. Further examples and combinations thereof include the following:
Example 1 includes one or more servers to distribute first instructions, second instructions, third instructions, and fourth instructions, on a network. The one or more servers include at least one storage device including fifth instructions and at least one processor to execute the fifth instructions to transmit the first instructions, the second instructions, the third instructions, and the fourth instructions over the network. The first instructions, when executed, cause a first device carried by a person to at least: access a result of a diagnostic test performed on the person, the result provided by a second device; generate a machine-readable code in response to the result being negative; and display the machine-readable code on a display of the first device to enable the person to gain access to a location. The second instructions, when executed, cause the second device to at least: receive input indicative of the result of the diagnostic test; and transmit the result to a third device. The third instructions, when executed, cause a fourth device to at least: detect the machine-readable code from the first device; determine a user identification associated with the person based on the machine-readable code; determine a test identification associated with the diagnostic test based on the machine-readable code; transmit the user identification and the test identification to the third device, the third device remote from the fourth device; and receive a verification outcome from the third device. The fourth instructions, when executed, cause the third device to at least: transmit the result of the diagnostic test to the first device; receive the user identification and the test identification from the fourth device; verify the result of the diagnostic test based on the user identification and the test identification; determine a number of days since the diagnostic test; and transmit the verification outcome to the fourth device. The verification outcome includes a first notice when the result of the diagnostic test is negative and the number of days since the diagnostic test is below a threshold number of days, and the verification outcome includes a second notice when the number of days since the diagnostic test is greater than the threshold.
Example 2 includes the one or more servers of Example 1, wherein the result is a first result, the diagnostic test is a first diagnostic test, and the machine-readable code is a first machine-readable code. The first instructions, when executed, cause the first device to: access a second result of a second diagnostic test performed on the person; and generate a second machine-readable code in response to the second result being negative.
Example 3 includes the one or more servers of Example 2, wherein the first diagnostic test is to detect a presence or an absence of a first analyte of interest, and the second diagnostic test is to detect a presence or an absence of a second analyte of interest. The second analyte of interest is different than the first analyte of interest.
Example 4 includes the one or more servers of Example 2, wherein the first diagnostic test is to detect a presence or an absence of an analyte of interest, and the second diagnostic test is to detect a presence or an absence of the analyte of interest. The second diagnostic test performed is subsequent to the first diagnostic test.
Example 5 includes the one or more servers of any of Examples 2-4, wherein the second diagnostic test is a different type of diagnostic test than the first diagnostic test.
Example 6 includes the one or more servers of Example 5, wherein the first diagnostic test is an antigen test and the second diagnostic test is an antibody test.
Example 7 includes the one or more servers of an of Examples 2-6, wherein the first diagnostic test is to be performed with a first type of testing equipment and the second diagnostic test is to be performed with a second type of testing equipment. The second type is different than the first type.
Example 8 includes the one or more servers of any of Examples 2-7, wherein the second machine-readable code is to be read by a fifth device. The fifth device is remote from the third device.
Example 9 includes the one or more servers of any of Examples 1-8, wherein the fourth instructions, when executed, enable the third device to invalidate the machine-readable code when the number of days since the diagnostic test is below the threshold number of days.
Example 10 includes the one or more servers of any of Examples 1-9, wherein the diagnostic test is to detect a presence or an absence of a pathogen and the threshold is based on an incubation period of the pathogen.
Example 11 includes the one or more servers of any of Examples 1-10, wherein the diagnostic test is a first diagnostic test, and the first instructions, when executed, cause the first device to display a notification to the person to schedule a second diagnostic test based on the number of days since the first diagnostic test and the threshold number of days.
Example 12 includes the one or more servers of any of Examples 1-11, wherein the third instructions, when executed, cause the fourth device to display the first notice or the second notice to grant or deny the person access to the location based on the verification outcome and a location of the fourth device.
Example 13 includes the one or more servers of any of Examples 1-12, wherein the third instructions, when executed, cause the fourth device to display the first notice or the second notice to grant or deny the person access to the location based on the verification outcome and at least one of a time of day or a day of the week.
Example 14 includes the one or more servers of any of Examples 1-13, wherein the third instructions, when executed, cause the fourth device to automatically unlock at least one of a door, a gate, or a turnstile based on the verification outcome.
Example 15 includes the one or more servers of any of Examples 1-14, wherein the fourth instructions, when executed, cause the third device to: develop a sequence of diagnostic tests based on at least one of a pathogen incubation period, a pathogen life cycle, or an immune response; and transmit a notification of the sequence of diagnostic tests to the first device. The first instructions, when executed, cause the first device to display the notification of the sequence of diagnostic tests to the person on the first device.
Example 16 includes one or more non-transitory computer readable medium including instructions that, when executed, cause one or more processors in a first device carried by a person to at least: access a result of a diagnostic test performed on the person; generate a machine-readable code in response to the result being negative; and display the machine-readable code on a display of the first device to enable the person to gain access to a location. The instructions, when executed, cause one or more processors in a second device to at least: detect the machine-readable code from the first device; determine a user identification associated with the person based on the machine-readable code; determine a test identification associated with the diagnostic test based on the machine-readable code; transmit the user identification and the test identification to a third device, the third device remote from the second device; and receive a verification outcome from the third device. The instructions, when executed, cause one or more processors in the third device to at least: transmit the result of the diagnostic test to the first device; receive the user identification and the test identification from the second device; verify the result of the diagnostic test based on the user identification and the test identification; determine a number of days since the diagnostic test; and transmit the verification outcome to the second device. The verification outcome includes a first notice when the result of the diagnostic test is negative and the number of days since the diagnostic test is below a threshold number of days, and the verification outcome includes a second notice when the number of days since the diagnostic test is greater than the threshold.
Example 17 includes the one or more non-transitory computer readable medium of Example 16, wherein the instructions, when executed, cause one or more processors in a fourth device to at least: automatically determine the result of the diagnostic test; and transmit the result of the diagnostic test to the third device.
Example 18 includes the one or more non-transitory computer readable medium of Examples 16 or 17, wherein the instructions, when executed, cause one or more processors in a fourth device to at least: provide a notification for the interpretation and entry of the result of the diagnostic test; and transmit the result of the diagnostic test to the third device.
Example 19 includes the one or more non-transitory computer readable medium of an of Examples 16-18, wherein the instructions, when executed, cause one or more processors in a fourth device to transmit an image of at least a portion of a test kit used in the diagnostic test to the first device.
Example 20 includes the one or more non-transitory computer readable medium of any of Examples 16-19, wherein the instructions cause the one or more processors of the second device to display the first notice or the second notice to grant or deny the person access to the location based on the verification outcome and at least one of: a location of the second device, a time of day, a day of the week, or an employment status.
Example 21 includes a server to distribute first instructions on a network. The server includes at least one storage device including second instructions and at least one processor to execute the second instructions to transmit the first instructions over the network. The first instructions, when executed, are to cause a mobile device carried by a person to at least: access a user identification associated with the person; access a result of a diagnostic test performed on a sample gathered from the person; display the result on a display of the mobile device; and generate an interface including the user identification and an indicator. The indicator is generated in response to the result being negative and a number of days since the diagnostic test being below a threshold number of days. The first instructions, when executed, are also to cause the mobile device to display the interface on the display to enable the person to gain entry into a location.
Example 22 includes the server of Example 21, wherein the result is a first result, the diagnostic test is a first diagnostic test, the interface is a first interface, and the indicator is a first indicator. The first instructions, when executed, cause the mobile device to: access a second result of a second diagnostic test; display the second result on the display of the mobile device; and generate a second interface including a second indicator. The second indicator is generated in response to the second result being negative and a number of days since the second diagnostic test being below the threshold number of days.
Example 23 includes the server of Example 22, wherein the person is a first person and the second diagnostic test is performed on a second person.
Example 24 includes the server of any of Examples 21-23, wherein the diagnostic test is to detect a presence or an absence of a pathogen and the threshold number of days is based on an incubation period of the pathogen.
Example 25 includes the server of any of Examples 21-24, wherein the diagnostic test is a first diagnostic test, and the first instructions, when executed, cause the mobile device to display a notification to the person to schedule a second diagnostic test based on the number of days since the diagnostic test and the threshold number of days.
Example 26 includes the server of any of Examples 21-25, wherein the first instructions, when executed, cause the mobile device to inform the person how to collect the sample for the diagnostic test.
Example 27 includes the server of any of Examples 21-26, wherein the first instructions, when executed, cause the mobile device to detect and interpret a test kit code on a test kit to obtain a test kit identification associated with the test kit.
Example 28 includes the server of any of Examples 21-27, wherein the first instructions, when executed, cause the mobile device to provide a notification for interpretation and entry of the result of the diagnostic test.
Example 29 includes the server of any of Examples 21-28, wherein the first instructions, when executed, enable the person to schedule an appointment to provide the sample for the diagnostic test.
Example 30 includes the server of any of Examples 21-29, wherein the first instructions, when executed, cause the mobile device to electronically connect with a telehealth service provider prior to collection of the sample.
Example 31 includes at least one non-transitory computer readable medium including instructions that, when downloaded to a mobile device and executed, cause a processor of the mobile device to at least: access a result of a diagnostic test performed on a sample gathered from a person; generate a machine-readable code in response to the result being negative; and display the machine-readable code on a display of the mobile device to enable the person to gain entry into a location.
Example 32 includes the at least one non-transitory computer readable medium of Example 31, wherein the machine-readable code includes a user identification and a test kit identification associated with a test kit used to perform the diagnostic test.
Example 33 includes the at least one non-transitory computer readable medium of Examples 31 or 32, wherein the result is a first result, the diagnostic test is a first diagnostic test, the sample is a first sample, and the machine-readable code is a first machine-readable code. The instructions, when executed, cause the processor of the mobile device to: access a second result of a second diagnostic test performed on a second sample gathered from the person; and generate a second machine-readable code in response to the second result being negative.
Example 34 includes the at least one non-transitory computer readable medium of Example 33, wherein the first diagnostic test is to detect a presence or an absence of a first analyte of interest, and the second diagnostic test is to detect a presence or an absence of a second analyte of interest. The second analyte of interest is different than the first analyte of interest.
Example 35 includes the at least one non-transitory computer readable medium of Example 33, wherein the first diagnostic test is to detect a presence or an absence of an analyte of interest, and the second diagnostic test is to detect a presence or an absence of the analyte of interest. The second diagnostic test is performed subsequent to the first diagnostic test.
Example 36 includes the at least one non-transitory computer readable medium of Example 36, wherein the first diagnostic test is an antigen test and the second diagnostic test is an antibody test.
Example 37 includes the at least one non-transitory computer readable medium of any of Examples 31-36, wherein the instructions, when executed, cause the processor of the mobile device to: receive a notification of a sequence of diagnostic tests based on at least one of a pathogen incubation period, a pathogen life cycle, or an immune response; and display the notification of the sequence of diagnostic tests to the person on the display of the mobile device.
Example 38 includes the at least one non-transitory computer readable medium of any of Examples 31-37, wherein the instructions, when executed, cause the processor of the mobile device to electronically connect with a telehealth service provider prior to collection of the sample.
Example 39 includes the at least one non-transitory storage medium of any of Examples 31-38, wherein the instructions, when executed, cause the processor of the mobile device to: inform the person how to collect the sample for the diagnostic test; and automatically determine the result of the diagnostic test.
Example 40 includes the at least one non-transitory computer readable medium of any of Examples 31-39, wherein the instructions, when executed, cause the processor of the mobile device to: inform the person how to collect the sample for the diagnostic test; and provide a notification for interpretation and entry of the result of the diagnostic test into the mobile device.
Example 41 includes an apparatus including processor circuitry and memory including instructions which, when executed, cause the processor circuitry to: access a result of a diagnostic test associated with a test kit identification; associate the result of the diagnostic test with a user identification; transmit the result of the diagnostic test and the test kit identification to a first device to cause the first device to generate a machine-readable pass on a display of the first device; receive the user identification and the test kit identification from a second device that is communicatively coupled to a scanner of the second device when the scanner reads the machine-readable pass, and, when the test kit identification and the user identification match the result of the diagnostic test: transmit a first notification to the second device when a number of days since the diagnostic test is less than a threshold number of days to cause the second device to present a first display; and transmit a second notification to the second device when the number of days since the diagnostic test is greater than the threshold number of days to cause the second device to present a second display, the second display different from the first display.
Example 42 includes the apparatus of Example 41, wherein the instructions, when executed, cause the processor circuitry to transmit the second notification to the second device when the user identification has been inactivated from a verifier organization associated with the second device.
Example 43 includes the apparatus of Examples 41 or 42, wherein the instructions, when executed, cause the processor circuitry to transmit a third notification to the second device when at least one of the user identification or the test kit identification is not matched to the result to cause the second device to present a third display. The third display is different from the first display and the second display.
Example 44 includes the apparatus of any of Examples 41-43, wherein the instructions, when executed, cause the processor circuitry to receive the result of the diagnostic test from the first device.
Example 45 includes the apparatus of any of Examples 41-44, wherein the instructions, when executed, cause the processor circuitry to receive the result of the diagnostic test from a third device, the third device remote from the first device and the second device.
Example 46 includes the apparatus of any of Examples 41-45, wherein the threshold number of days is set by a verifier organization associated with the second device.
Example 47 includes the apparatus of any of Examples 41-46, wherein the threshold number of days is based on a biological characteristic of an analyte of interest to be tested in the diagnostic test.
Example 48 includes the apparatus of any of Examples 41-47, wherein the instructions, when executed, cause the processor circuitry to: access results of diagnostic tests; receive sets of user identifications and test kit identifications from one or more second devices; generate a report based on the results and receipt of the sets of user identifications and test kit identifications; and transmit the report to a government agency.
Example 49 includes the apparatus of any of Examples 41-48, wherein the instructions, when executed, cause the processor circuitry to verify at least one of an expiration date of a test kit or a recall status of the test kit based on the test kit identification prior to transmitting the result of the diagnostic test and the test kit identification to the first device.
Example 50 includes the apparatus of any of Examples 41-49, wherein the instructions, when executed, cause the processor circuitry to verify an authenticity of a test kit based on the test kit identification prior to transmitting the result of the diagnostic test and the test kit identification to the first device.
Example 51 includes at least one non-transitory storage medium including instructions that, when executed, cause a machine to: access a result of a diagnostic test associated with a test kit identification; associate the result of the diagnostic test with a user identification; transmit the result of the diagnostic test and the test kit identification to a first device to cause the first device to generate a digital pass code on a display of the first device; receive the user identification and the test kit identification from a second device that is communicatively coupled to a scanner of the second device when the scanner reads the digital pass code; and, when the test kit identification and the user identification match the result of the diagnostic test: transmit a first notification to the second device when an amount of time since the diagnostic test is below a threshold amount of time to cause the second device to present a first display; and transmit a second notification to the second device when the amount of time since the diagnostic test is greater than the threshold amount of time to cause the second device to present a second display, the second display different from the first display.
Example 52 includes the storage medium of Example 51, wherein the instructions, when executed, cause the machine to transmit the second notification to the second device when the user identification has been removed from a verifier organization associated with the second device.
Example 53 includes the storage medium of Examples 51 or 52, wherein the instructions, when executed, cause the machine to transmit a third notification to the second device when at least one of the user identification or the test kit identification is not matched to the result to cause the second device to present a third display. The third display is different from the first display and the second display.
Example 54 includes the storage medium of any of Examples 51-53, wherein the instructions, when executed, cause the machine to receive the result of the diagnostic test from the first device.
Example 55 includes the storage medium of any of Examples 51-54, wherein the instructions, when executed, cause the machine to receive the result of the diagnostic test from a third device, the third device remote from the first device and the second device.
Example 56 includes the storage medium of any of Examples 51-55, wherein the threshold amount of time is set by a verifier organization associated with the second device.
Example 57 includes the storage medium of any of Examples 51-56, wherein the threshold amount of time is based on a biological characteristic of an analyte of interest to be tested in the diagnostic test.
Example 58 includes the storage medium of any of Examples 51-57, wherein the instructions, when executed, cause the machine to: access results of diagnostic tests; receive sets of user identifications and test kit identifications from one or more second devices; generate a report based on the results and receipt of the sets of user identifications and test kit identifications; and transmit the report to a government agency.
Example 59 includes the storage medium of any of Examples 51-58, wherein the instructions, when executed, cause the machine to verify at least one of an expiration date of a test kit or a recall status of the test kit based on the test kit identification prior to transmitting the result of the diagnostic test and the test kit identification to the first device.
Example 60 includes the storage medium of any of Examples 51-59, wherein the instructions, when executed, cause the machine to verify an authenticity of a test kit based on the test kit identification prior to transmitting the result of the diagnostic test and the test kit identification to the first device.
Example 61 is a device to generate a digital pass. The device includes an analyzer to determine a result of a diagnostic test and a code generator to: access a test identification based on the result, access a user identification based on the result, construct a machine-readable code based on the test identification and the user identification, and incorporate the code into a digital pass. The device further includes an output to display the digital pass.
Example 62 includes the device of Example 61, wherein the code generator is to incorporate an expiration date into the digital pass. The device further includes a scheduler to determine a validity of the digital pass based on the expiration date, and a notifier to prompt scheduling of a test when the time comparator determines the digital pass is not valid.
Example 63 is a device to generate a digital pass. The device includes means for determining a result of a diagnostic test, means for generating a code, the generating means to: access a test identification based on the result, access a user identification based on the result, construct a machine-readable code based on the test identification and the user identification, and incorporate the code into a digital pass, and means for displaying the digital pass.
Example 64 includes the device of Example 63, wherein the generating means is to incorporate an expiration date into the digital pass. The device further includes means for determining a validity of the digital pass based on the expiration date, and means for prompting scheduling of a test when the time comparator determines the digital pass is not valid.
Example 65 is an apparatus to generate a digital pass. The apparatus includes processor circuitry and a memory including instructions which, when executed, cause the processor circuitry to: determine a result of a diagnostic test, generate a code, the generating means to: access a test identification based on the result, access a user identification based on the result, construct a machine-readable code based on the test identification and the user identification, and incorporate the code into a digital pass, and display the digital pass.
Example 66 includes the apparatus of Example 65, wherein the instructions, when executed, cause the processor circuitry to: incorporate an expiration date into the digital pass, determine a validity of the digital pass based on the expiration date, and prompt scheduling of a test when the time comparator determines the digital pass is not valid.
Example 67 includes a non-transitory computer readable storage medium including instructions which, when executed, cause one or more processors to at least: determine a result of a diagnostic test, generate a code, the generating means to: access a test identification based on the result, access a user identification based on the result, construct a machine-readable code based on the test identification and the user identification, incorporate the code into a digital pass, and display the digital pass.
Example 68 includes the computer readable storage medium of Example 67, wherein the instructions, when executed, cause the one or more processors to: incorporate an expiration date into the digital pass; determine a validity of the digital pass based on the expiration date, and prompt scheduling of a test when the time comparator determines the digital pass is not valid.
Example 69 includes a method to create a digital pass. The method includes determining, by executing instructions with a processor, a result of a diagnostic test, generating, by executing instructions with the processor, a code, the generating means to: accessing, by executing instructions with the processor, a test identification based on the result, accessing, by executing instructions with the processor, a user identification based on the result, constructing, by executing instructions with the processor, a machine-readable code based on the test identification and the user identification, incorporating, by executing instructions with the processor, the code into a digital pass, and displaying, by executing instructions with the processor, the digital pass.
Example 70 includes the method of Example 69, further including: incorporating, by executing instructions with the processor, an expiration date into the digital pass, determining, by executing instructions with the processor, a validity of the digital pass based on the expiration date, and prompting, by executing instructions with the processor, scheduling of a test when the time comparator determines the digital pass is not valid.
Example 71 is a server to distribute first instructions on a network. The server includes at least one storage device including second instructions, and at least one processor to execute the second instructions to transmit the first instructions over the network. The first instructions, when executed, to cause at least one device to at least: determine a result of a diagnostic test, generate a code, the generating means to: access a test identification based on the result, access a user identification based on the result, construct a machine-readable code based on the test identification and the user identification, incorporate the code into a digital pass, and display the digital pass.
Example 72 includes the server of Example 71, wherein the first instructions, when executed, to cause at least one device to further: incorporate an expiration date into the digital pass, determine a validity of the digital pass based on the expiration date, and prompt scheduling of a test when the time comparator determines the digital pass is not valid.
Example 73 includes a system that includes a first non-transitory computer readable storage medium including a first set of instructions which, when executed, cause at least a first processor to at least: generate a record of a test result of a medical diagnostic test of a biological sample from a user, and transmit the test result to a second processor. The system also includes a second non-transitory computer readable storage medium including a second set of instructions which, when executed, cause at least the second processor to at least: generate a machine-readable code based on the test result and user identification, incorporate the code into a digital pass, and display the digital pass. The system further includes a third non-transitory computer readable storage medium including a third set of instructions which, when executed, cause at least a third processor to at least: scan the digital pass, and verify the test result.
Example 74 includes the system of Example 73, wherein the machine-readable code is a first machine readable code, the second instructions, when executed, cause the second device to: generate a second machine-readable code based on the user identification, and display the second machine-readable code; and the first instructions, when executed, cause a fourth device to: scan the second-machine readable code, and associate the user identification is a test kit and the biological sample.
Example 75 is a server to distribute first, second, and third instructions over a network. The server includes at least one storage device including fourth instructions, and at least one processor to execute the fourth instructions to: transmit the first instructions over the network to a first device, transmit the second instructions over the network to a second device, and transmit the third instructions over the network to a third device. The first instructions, when executed, to cause the first device to: generate a record of a test result of a medical diagnostic test of a biological sample from a user, and transmit the test result to the second device. The second instructions, when executed, to cause the second device to: generate a machine-readable code based on the test result and user identification, incorporate the code into a digital pass, and display the digital pass. The third instructions, when executed, to cause the third device to: scan the digital pass, and verify the test result.
Example 76 includes the server of Example 75, wherein the wherein the machine-readable code is a first machine readable code, the second instructions, when executed, cause the second device to: generate a second machine-readable code based on the user identification, and display the second machine-readable code; and the first instructions, when executed, cause a fourth device to: scan the second-machine readable code, and associate the user identification is a test kit and the biological sample.
Example 77 is device including any feature described, either individually or in combination with any feature, in any configuration.
Example 78 is a system including any feature described, either individually or in combination with any feature, in any configuration.
Example 79 is a server to transmit instructions to perform any method disclosed herein.
Example 80 is a method to operate any device, system, processor, or server disclosed herein.
Example 71 is a non-transitory computer readable storage medium including instructions which, when executed, cause at least one or more processors to perform any method or function disclosed herein.
Although certain example methods, apparatus, systems, and articles of manufacture have been disclosed herein, the scope of coverage of this patent is not limited thereto. On the contrary, this patent covers all methods, apparatus, systems, and articles of manufacture fairly falling within the scope of the claims of this patent.
The following claims are hereby incorporated into this Detailed Description by this reference, with each claim standing on its own as a separate embodiment of the present disclosure.
This patent arises from a continuation of U.S. application Ser. No. 17/240,644, titled “DIGITAL PASS VERIFICATION SYSTEMS AND METHODS,” filed Apr. 26, 2021, which is a continuation of U.S. application Ser. No. 17/068,599 (U.S. Pat. No. 10,991,185), titled “DIGITAL PASS VERIFICATION SYSTEMS AND METHODS,” filed Oct. 12, 2020. U.S. application Ser. No. 17/068,599 claims the benefit under 35 U.S.C. § 119(e) to U.S. Provisional Application No. 63/054,170, titled “ELECTRONIC HEALTH PASS VERIFICATION SYSTEMS AND METHODS,” filed Jul. 20, 2020, and to U.S. Provisional Application No. 63/080,391, titled “ELECTRONIC HEALTH PASS VERIFICATION SYSTEMS AND METHODS,” filed Sep. 18, 2020. Thus, priority to U.S. application Ser. No. 17/240,644; U.S. application Ser. No. 17/068,599; U.S. Provisional Application No. 63/054,170; and U.S. Provisional Application No. 63/080,391 is claimed. U.S. application Ser. No. 17/240,644; U.S. application Ser. No. 17/068,599; U.S. Provisional Application No. 63/054,170; and U.S. Provisional Application No. 63/080,391 are incorporated herein by this reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
4347568 | Giguere et al. | Aug 1982 | A |
4803625 | Fu et al. | Feb 1989 | A |
4835372 | Gombrich et al. | May 1989 | A |
4838275 | Lee | Jun 1989 | A |
5171977 | Morrison | Dec 1992 | A |
5301105 | Cummings, Jr. | Apr 1994 | A |
5502636 | Clarke | Mar 1996 | A |
5619991 | Sloane | Apr 1997 | A |
5730124 | Yamauchi | Mar 1998 | A |
5827180 | Goodman | Oct 1998 | A |
5841975 | Layne et al. | Nov 1998 | A |
5868669 | Iliff | Feb 1999 | A |
6032119 | Brown et al. | Feb 2000 | A |
6057758 | Dempsey et al. | May 2000 | A |
6454709 | Kleinschmidt et al. | Sep 2002 | B1 |
6702988 | Sagona et al. | Mar 2004 | B1 |
6944767 | Judson | Sep 2005 | B1 |
7092891 | Maus et al. | Aug 2006 | B2 |
7097108 | Zellner et al. | Aug 2006 | B2 |
7278579 | Loffredo et al. | Oct 2007 | B2 |
7315825 | Rosenfeld et al. | Jan 2008 | B2 |
7392167 | Brown | Jun 2008 | B2 |
7565132 | Ben Ayed | Jul 2009 | B2 |
7625763 | Panotopoulos | Dec 2009 | B2 |
7657396 | Brown et al. | Feb 2010 | B1 |
7809816 | Johnson et al. | Oct 2010 | B2 |
7811824 | Lamont et al. | Oct 2010 | B2 |
7860725 | Gopinathan et al. | Dec 2010 | B2 |
7903152 | Kim | Mar 2011 | B2 |
7908153 | Scherpbier et al. | Mar 2011 | B2 |
7917377 | Rao et al. | Mar 2011 | B2 |
7943381 | Lappe et al. | May 2011 | B2 |
7945670 | Nakamura | May 2011 | B2 |
7977103 | Martin et al. | Jul 2011 | B2 |
7993266 | Colston, Jr. et al. | Aug 2011 | B2 |
8043224 | Sarel | Oct 2011 | B2 |
8111151 | Zhu et al. | Feb 2012 | B2 |
8131478 | Kai | Mar 2012 | B2 |
8147426 | Neel et al. | Apr 2012 | B2 |
8211715 | Royds | Jul 2012 | B1 |
8234222 | Thompson et al. | Jul 2012 | B2 |
8306831 | Eisenberger et al. | Nov 2012 | B2 |
8380541 | Holmes | Feb 2013 | B1 |
8423385 | Radoccia et al. | Apr 2013 | B2 |
8423435 | Poteet et al. | Apr 2013 | B1 |
8510129 | Morris | Aug 2013 | B2 |
8527209 | Hyde et al. | Sep 2013 | B2 |
8531291 | Tran | Sep 2013 | B2 |
8560339 | Khan | Oct 2013 | B2 |
8577697 | Demopulos | Nov 2013 | B2 |
8597190 | Rule et al. | Dec 2013 | B2 |
8603832 | Whitesides et al. | Dec 2013 | B2 |
8651383 | Litz et al. | Feb 2014 | B2 |
8737971 | van Rooyen et al. | May 2014 | B2 |
8764655 | Yoo | Jul 2014 | B2 |
8805698 | Stiles et al. | Aug 2014 | B2 |
8821810 | Whitesides et al. | Sep 2014 | B2 |
8881040 | Li | Nov 2014 | B2 |
8899478 | Rowlandson et al. | Dec 2014 | B2 |
8930178 | Pestian et al. | Jan 2015 | B2 |
8954719 | Dicks et al. | Feb 2015 | B2 |
8996314 | Ohnemus et al. | Mar 2015 | B2 |
9041530 | Sprigg et al. | May 2015 | B2 |
9060683 | Tran | Jun 2015 | B2 |
9072425 | Bogema | Jul 2015 | B1 |
9076142 | Adolphe | Jul 2015 | B2 |
9083546 | Sadhu | Jul 2015 | B2 |
9141762 | Lev et al. | Sep 2015 | B2 |
9147092 | Jeng et al. | Sep 2015 | B2 |
9161716 | Estocado | Oct 2015 | B2 |
9185200 | Cunningham | Nov 2015 | B2 |
9208672 | Patil et al. | Dec 2015 | B2 |
9241663 | Jena et al. | Jan 2016 | B2 |
9268911 | Sia et al. | Feb 2016 | B2 |
9310300 | Alt et al. | Apr 2016 | B2 |
9390458 | Sarkis, Jr. et al. | Jul 2016 | B2 |
9414776 | Sillay et al. | Aug 2016 | B2 |
9436924 | Kokic et al. | Sep 2016 | B2 |
9460263 | Holmes et al. | Oct 2016 | B2 |
9485345 | Dantu et al. | Nov 2016 | B2 |
9489703 | Kauniskangas et al. | Nov 2016 | B2 |
9500865 | Chen | Nov 2016 | B2 |
9524372 | Hengstler et al. | Dec 2016 | B2 |
9597016 | Stone et al. | Mar 2017 | B2 |
9653002 | Alberts et al. | May 2017 | B2 |
9658152 | Zimmerle et al. | May 2017 | B2 |
9713425 | Gross et al. | Jul 2017 | B2 |
9715579 | Hengstler et al. | Jul 2017 | B2 |
9727702 | Kass-Hout et al. | Aug 2017 | B2 |
9782075 | Redei | Oct 2017 | B2 |
9787815 | Erickson et al. | Oct 2017 | B2 |
9805165 | Xiang et al. | Oct 2017 | B2 |
9857373 | Pulitzer et al. | Jan 2018 | B1 |
9886750 | Price et al. | Feb 2018 | B2 |
9903857 | Polwart et al. | Feb 2018 | B2 |
9974485 | Robertson | May 2018 | B2 |
9977870 | Hanina et al. | May 2018 | B2 |
9983197 | Lin et al. | May 2018 | B2 |
9989952 | Ghazizadeh | Jun 2018 | B2 |
9999385 | Copeland et al. | Jun 2018 | B2 |
10012019 | Veerasamy et al. | Jul 2018 | B2 |
10026508 | Silva et al. | Jul 2018 | B2 |
10031076 | Mucci et al. | Jul 2018 | B2 |
10042016 | Hanada et al. | Aug 2018 | B2 |
10043590 | Karvela et al. | Aug 2018 | B2 |
10052010 | Feddema | Aug 2018 | B2 |
10062020 | Oron | Aug 2018 | B2 |
10078875 | Powell et al. | Sep 2018 | B2 |
10092007 | Pierce et al. | Oct 2018 | B2 |
10102017 | Ganguly et al. | Oct 2018 | B2 |
10122010 | Tajima et al. | Nov 2018 | B2 |
10129450 | Nabhan | Nov 2018 | B2 |
10132743 | Lenigk et al. | Nov 2018 | B2 |
10132794 | Chou et al. | Nov 2018 | B2 |
10152013 | Kusano et al. | Dec 2018 | B2 |
10152702 | Ingber | Dec 2018 | B2 |
10182770 | Asianto et al. | Jan 2019 | B2 |
10188323 | Sales et al. | Jan 2019 | B2 |
10202015 | Halbauer | Feb 2019 | B2 |
10202020 | Hattori | Feb 2019 | B2 |
10219739 | Mestha et al. | Mar 2019 | B2 |
10242515 | Novero et al. | Mar 2019 | B2 |
10252011 | Garde et al. | Apr 2019 | B2 |
10267742 | Khan | Apr 2019 | B2 |
10269451 | Walker | Apr 2019 | B2 |
10271998 | LaVon et al. | Apr 2019 | B2 |
10272020 | Jolliff et al. | Apr 2019 | B2 |
10297354 | Craine et al. | May 2019 | B2 |
10303843 | Bitran et al. | May 2019 | B2 |
10303851 | Nguyen et al. | May 2019 | B2 |
10312017 | Huang et al. | Jun 2019 | B2 |
10321065 | Shi | Jun 2019 | B2 |
10324009 | Chou et al. | Jun 2019 | B2 |
10325070 | Beale et al. | Jun 2019 | B2 |
10331924 | Pulitzer et al. | Jun 2019 | B2 |
10349893 | Lee et al. | Jul 2019 | B2 |
10352920 | Ehrenkranz | Jul 2019 | B2 |
10372877 | Merkin | Aug 2019 | B2 |
10410308 | Abousy et al. | Sep 2019 | B2 |
10430552 | Mihai | Oct 2019 | B2 |
10470670 | Smith | Nov 2019 | B2 |
10473659 | Pulitzer et al. | Nov 2019 | B2 |
10475533 | Hanina et al. | Nov 2019 | B2 |
10534116 | Darty | Jan 2020 | B2 |
10534903 | Trelin | Jan 2020 | B2 |
10561317 | Kambham | Feb 2020 | B2 |
10586617 | Mair | Mar 2020 | B1 |
10602987 | Khachaturian et al. | Mar 2020 | B2 |
10605816 | Koo et al. | Mar 2020 | B1 |
10607732 | Xing et al. | Mar 2020 | B2 |
10613082 | Ehrenkranz | Apr 2020 | B2 |
10629311 | Shaya | Apr 2020 | B2 |
10632342 | Quy | Apr 2020 | B2 |
10635870 | Pulitzer et al. | Apr 2020 | B2 |
10636527 | Pulitzer et al. | Apr 2020 | B2 |
10638957 | Mirza | May 2020 | B2 |
10641766 | Mudanyali et al. | May 2020 | B2 |
10645472 | Manzella et al. | May 2020 | B1 |
10650916 | Moturu et al. | May 2020 | B2 |
10660522 | Redei | May 2020 | B2 |
10663466 | Ozcan et al. | May 2020 | B2 |
10664486 | Fonesca et al. | May 2020 | B2 |
10681516 | Zin et al. | Jun 2020 | B2 |
10706966 | Hengstler et al. | Jul 2020 | B2 |
10712199 | Won et al. | Jul 2020 | B2 |
10732169 | Leung | Aug 2020 | B2 |
10734099 | Evans et al. | Aug 2020 | B2 |
10753861 | Zaccari et al. | Aug 2020 | B2 |
10768185 | Klapperich et al. | Sep 2020 | B2 |
10769489 | Nahum et al. | Sep 2020 | B2 |
10772552 | Bedell, Jr. | Sep 2020 | B2 |
10776772 | Vityaz | Sep 2020 | B2 |
10776804 | Avallone et al. | Sep 2020 | B2 |
10777308 | Kutty | Sep 2020 | B2 |
10777325 | Li | Sep 2020 | B1 |
10777326 | Shaya | Sep 2020 | B2 |
10780224 | Handler | Sep 2020 | B2 |
10783546 | Llewelyn | Sep 2020 | B2 |
10783988 | Atkin | Sep 2020 | B1 |
10789555 | Experton | Sep 2020 | B2 |
10796559 | Kusens | Oct 2020 | B2 |
10810518 | Block et al. | Oct 2020 | B2 |
10818379 | Krishnan et al. | Oct 2020 | B2 |
10824825 | Jinedatha | Nov 2020 | B2 |
10830761 | Chou et al. | Nov 2020 | B2 |
10835122 | Pulitzer et al. | Nov 2020 | B2 |
10841737 | Millius | Nov 2020 | B2 |
10841775 | Barash et al. | Nov 2020 | B2 |
10867700 | Marshall | Dec 2020 | B2 |
10887104 | Jayachandran et al. | Jan 2021 | B1 |
10888283 | Benjauthrit et al. | Jan 2021 | B1 |
10890534 | Pulitzer et al. | Jan 2021 | B2 |
10902308 | Gire et al. | Jan 2021 | B2 |
10915505 | Soni et al. | Feb 2021 | B2 |
10923216 | White et al. | Feb 2021 | B1 |
10923231 | Kelly et al. | Feb 2021 | B2 |
10929509 | Raja | Feb 2021 | B2 |
10930381 | Pulitzer et al. | Feb 2021 | B2 |
10931643 | Neumann | Feb 2021 | B1 |
10936698 | Hodge | Mar 2021 | B2 |
10937296 | Kukreja et al. | Mar 2021 | B1 |
10991185 | Luthra et al. | Apr 2021 | B1 |
10991190 | Luthra et al. | Apr 2021 | B1 |
11151820 | Klein et al. | Oct 2021 | B1 |
20010039502 | Case | Nov 2001 | A1 |
20010041991 | Segal et al. | Nov 2001 | A1 |
20020059030 | Otworth et al. | May 2002 | A1 |
20020099572 | Dyckman et al. | Jul 2002 | A1 |
20020177759 | Schoenberg et al. | Nov 2002 | A1 |
20030036683 | Kehr et al. | Feb 2003 | A1 |
20030196097 | Korosec et al. | Oct 2003 | A1 |
20030217037 | Bicker et al. | Nov 2003 | A1 |
20040010425 | Wilkes et al. | Jan 2004 | A1 |
20040157612 | Kim | Aug 2004 | A1 |
20040166550 | Sullivan et al. | Aug 2004 | A1 |
20040225527 | Holz | Nov 2004 | A1 |
20050060174 | Heyward et al. | Mar 2005 | A1 |
20050137481 | Sheard et al. | Jun 2005 | A1 |
20050203353 | Ma et al. | Sep 2005 | A1 |
20050277872 | Colby, Jr. et al. | Dec 2005 | A1 |
20060009702 | Iwaki et al. | Jan 2006 | A1 |
20060022834 | Rosenfeld et al. | Feb 2006 | A1 |
20060031101 | Ross | Feb 2006 | A1 |
20060036619 | Fuerst et al. | Feb 2006 | A1 |
20060094028 | Danna et al. | May 2006 | A1 |
20060106646 | Squilla et al. | May 2006 | A1 |
20060154642 | Scannell, Jr. | Jul 2006 | A1 |
20060165040 | Rathod et al. | Jul 2006 | A1 |
20060218010 | Michon et al. | Sep 2006 | A1 |
20060222567 | Kloepfer et al. | Oct 2006 | A1 |
20070002791 | Kasprzyk et al. | Jan 2007 | A1 |
20070004969 | Kong et al. | Jan 2007 | A1 |
20070043694 | Sawafta et al. | Feb 2007 | A1 |
20070078689 | Zubak et al. | Apr 2007 | A1 |
20070092871 | Lodes et al. | Apr 2007 | A1 |
20070138253 | Libin et al. | Jun 2007 | A1 |
20070156456 | McGillin et al. | Jul 2007 | A1 |
20070179810 | Goodman | Aug 2007 | A1 |
20070222599 | Coveley et al. | Sep 2007 | A1 |
20070229290 | Kahn et al. | Oct 2007 | A1 |
20070239487 | Abraham-Fuchs et al. | Oct 2007 | A1 |
20070276702 | Dani | Nov 2007 | A1 |
20070298436 | Lappe | Dec 2007 | A1 |
20090180927 | Petruno et al. | Jul 2009 | A1 |
20090221059 | Williams et al. | Sep 2009 | A1 |
20090325276 | Battrell et al. | Dec 2009 | A1 |
20100021937 | Greenberg et al. | Jan 2010 | A1 |
20100039259 | Hazzani | Feb 2010 | A1 |
20100042394 | Khan | Feb 2010 | A1 |
20100169220 | Choing et al. | Jul 2010 | A1 |
20100255795 | Rubinsky et al. | Oct 2010 | A1 |
20100257027 | Greenberg et al. | Oct 2010 | A1 |
20100268057 | Firminger et al. | Oct 2010 | A1 |
20100279718 | Borve | Nov 2010 | A1 |
20110004488 | Benja-Athon | Jan 2011 | A1 |
20110084132 | Tofighbakhsh | Apr 2011 | A1 |
20110172550 | Martin et al. | Jul 2011 | A1 |
20110183351 | Hyde et al. | Jul 2011 | A1 |
20110270631 | Cambray et al. | Nov 2011 | A1 |
20120035279 | Miller | Feb 2012 | A1 |
20120091202 | Cohen | Apr 2012 | A1 |
20120109688 | Yoo | May 2012 | A1 |
20120123686 | Xiang et al. | May 2012 | A1 |
20120190132 | McAleer | Jul 2012 | A1 |
20120190936 | Rao et al. | Jul 2012 | A1 |
20120265702 | Maher | Oct 2012 | A1 |
20120284046 | Baym et al. | Nov 2012 | A1 |
20120284047 | Baym et al. | Nov 2012 | A1 |
20130013333 | Gopinathan et al. | Jan 2013 | A1 |
20130138451 | Shiono et al. | May 2013 | A1 |
20130203043 | Ozcan et al. | Aug 2013 | A1 |
20130218588 | Kehr et al. | Aug 2013 | A1 |
20130310671 | Goodnow | Nov 2013 | A1 |
20140006051 | Vuong et al. | Jan 2014 | A1 |
20140012599 | Weiss | Jan 2014 | A1 |
20140014720 | Sarkis, Jr. et al. | Jan 2014 | A1 |
20140016977 | Kakitani et al. | Jan 2014 | A1 |
20140017643 | Sady | Jan 2014 | A1 |
20140186294 | Gardai et al. | Jul 2014 | A1 |
20140210968 | Kauniskangas et al. | Jul 2014 | A1 |
20140242612 | Wang et al. | Aug 2014 | A1 |
20140249394 | Maus et al. | Sep 2014 | A1 |
20140250205 | Kauniskangas et al. | Sep 2014 | A1 |
20140257047 | Sillay et al. | Sep 2014 | A1 |
20140257058 | Clarysse et al. | Sep 2014 | A1 |
20140272928 | Rey et al. | Sep 2014 | A1 |
20140315229 | Karlsson et al. | Oct 2014 | A1 |
20140324373 | Xiang et al. | Oct 2014 | A1 |
20140330579 | Cashman et al. | Nov 2014 | A1 |
20140335505 | Holmes | Nov 2014 | A1 |
20150036131 | Salsman | Feb 2015 | A1 |
20150070187 | Wiesner et al. | Mar 2015 | A1 |
20150106118 | Melo et al. | Apr 2015 | A1 |
20150119652 | Hyde et al. | Apr 2015 | A1 |
20150164323 | Holtzclaw | Jun 2015 | A1 |
20150177147 | Mangan et al. | Jun 2015 | A1 |
20150223057 | Dellarciprete et al. | Aug 2015 | A1 |
20150269325 | Ohta et al. | Sep 2015 | A1 |
20150324526 | Cambray et al. | Nov 2015 | A1 |
20150379206 | Villare | Dec 2015 | A1 |
20160029957 | Faybishenko et al. | Feb 2016 | A1 |
20160063215 | Zamer | Mar 2016 | A1 |
20160077091 | Tyrrell et al. | Mar 2016 | A1 |
20160178607 | Husheer et al. | Jun 2016 | A1 |
20160189174 | Heath | Jun 2016 | A1 |
20160196391 | Peak et al. | Jul 2016 | A1 |
20160210416 | Whitehurst | Jul 2016 | A1 |
20160262689 | Batista | Sep 2016 | A1 |
20160267295 | Gervais et al. | Sep 2016 | A1 |
20160292393 | Balwani | Oct 2016 | A1 |
20160300021 | Abbott | Oct 2016 | A1 |
20160321480 | Hamlin et al. | Nov 2016 | A1 |
20160365006 | Minturn | Dec 2016 | A1 |
20160367188 | Malik et al. | Dec 2016 | A1 |
20160367194 | Murphy | Dec 2016 | A1 |
20170000359 | Kohli et al. | Jan 2017 | A1 |
20170007126 | Shahar | Jan 2017 | A1 |
20170021356 | Dority et al. | Jan 2017 | A1 |
20170023542 | Wang et al. | Jan 2017 | A1 |
20170023556 | Shevkoplyas et al. | Jan 2017 | A1 |
20170024531 | Malaviya | Jan 2017 | A1 |
20170027424 | Ferren et al. | Feb 2017 | A1 |
20170027482 | Zilberstein et al. | Feb 2017 | A1 |
20170055111 | Nazareth et al. | Feb 2017 | A1 |
20170055878 | Chon et al. | Mar 2017 | A1 |
20170068785 | Experton et al. | Mar 2017 | A1 |
20170068794 | Pagels et al. | Mar 2017 | A1 |
20170124263 | Crafts, Jr. et al. | May 2017 | A1 |
20170140120 | Thrower | May 2017 | A1 |
20170168051 | Lui et al. | Jun 2017 | A1 |
20170177797 | Kumiawan et al. | Jun 2017 | A1 |
20170188938 | Toh et al. | Jul 2017 | A1 |
20170193198 | Kamatani et al. | Jul 2017 | A1 |
20170248592 | Wang et al. | Aug 2017 | A1 |
20170262604 | Francois | Sep 2017 | A1 |
20170270253 | Haider | Sep 2017 | A1 |
20170293730 | Fish et al. | Oct 2017 | A1 |
20170308679 | Murray | Oct 2017 | A1 |
20170308779 | Thuries et al. | Oct 2017 | A1 |
20170323070 | Hodge | Nov 2017 | A1 |
20170323285 | Nov 2017 | A1 | |
20170323441 | Shah et al. | Nov 2017 | A1 |
20180004910 | Xiang et al. | Jan 2018 | A1 |
20180011973 | Fish et al. | Jan 2018 | A1 |
20180032757 | Michael | Feb 2018 | A1 |
20180042559 | Cabrera, Jr. et al. | Feb 2018 | A1 |
20180046772 | Mitteldorf | Feb 2018 | A1 |
20180089376 | Tucker et al. | Mar 2018 | A1 |
20180106789 | Pulitzer et al. | Apr 2018 | A1 |
20180107802 | Satterwhite et al. | Apr 2018 | A1 |
20180108430 | Vo et al. | Apr 2018 | A1 |
20180108434 | Freedman | Apr 2018 | A1 |
20180121625 | Barker | May 2018 | A1 |
20180143215 | Chang et al. | May 2018 | A1 |
20180150600 | Astigarraga et al. | May 2018 | A1 |
20180165417 | Hall et al. | Jun 2018 | A1 |
20180166155 | Pulitzer et al. | Jun 2018 | A1 |
20180166171 | Pulitzer et al. | Jun 2018 | A1 |
20180166177 | Pulitzer et al. | Jun 2018 | A1 |
20180174689 | Pulitzer et al. | Jun 2018 | A1 |
20180196193 | Ozcan et al. | Jul 2018 | A1 |
20180197623 | Sim | Jul 2018 | A1 |
20180218124 | Gorelick et al. | Aug 2018 | A1 |
20180226158 | Fish et al. | Aug 2018 | A1 |
20180267759 | Llewelyn | Sep 2018 | A1 |
20180276651 | Gauli et al. | Sep 2018 | A1 |
20180277252 | Drenkard et al. | Sep 2018 | A1 |
20180278691 | Vergara, Jr. | Sep 2018 | A1 |
20180299468 | Kelleher | Oct 2018 | A1 |
20180303344 | Huber et al. | Oct 2018 | A1 |
20180305773 | Abudayyeh et al. | Oct 2018 | A1 |
20180308569 | Luellen | Oct 2018 | A1 |
20180308585 | Holmes et al. | Oct 2018 | A1 |
20180317769 | Khan | Nov 2018 | A1 |
20180330804 | Hiruta et al. | Nov 2018 | A1 |
20180356407 | Ehrenkranz et al. | Dec 2018 | A1 |
20180358117 | Neagle | Dec 2018 | A1 |
20180360675 | Darrah et al. | Dec 2018 | A1 |
20180364224 | Pulitzer et al. | Dec 2018 | A1 |
20180366230 | Pulitzer et al. | Dec 2018 | A1 |
20180372669 | Javitt et al. | Dec 2018 | A1 |
20180372755 | Gehrke et al. | Dec 2018 | A1 |
20180374582 | Holmes et al. | Dec 2018 | A1 |
20190014996 | Qian et al. | Jan 2019 | A1 |
20190019578 | Vaccaro | Jan 2019 | A1 |
20190027250 | Pulitzer et al. | Jan 2019 | A1 |
20190027251 | Pulitzer et al. | Jan 2019 | A1 |
20190027258 | Pulitzer et al. | Jan 2019 | A1 |
20190027259 | Pulitzer et al. | Jan 2019 | A1 |
20190034591 | Mossin et al. | Jan 2019 | A1 |
20190035491 | Pulitzer et al. | Jan 2019 | A1 |
20190035499 | Daya | Jan 2019 | A1 |
20190038148 | Valys et al. | Feb 2019 | A1 |
20190054347 | Saigh et al. | Feb 2019 | A1 |
20190080789 | Kloosterman | Mar 2019 | A1 |
20190086400 | Ehrenkranz | Mar 2019 | A1 |
20190088373 | Sarmentero | Mar 2019 | A1 |
20190095587 | Warner et al. | Mar 2019 | A1 |
20190095957 | Ibarria et al. | Mar 2019 | A1 |
20190096516 | Pulitzer et al. | Mar 2019 | A1 |
20190108898 | Gulati | Apr 2019 | A1 |
20190113520 | Blume et al. | Apr 2019 | A1 |
20190117069 | Johnson | Apr 2019 | A1 |
20190122768 | Pulitzer et al. | Apr 2019 | A1 |
20190122771 | Pulitzer et al. | Apr 2019 | A1 |
20190128816 | Chou et al. | May 2019 | A1 |
20190147997 | Pulitzer et al. | May 2019 | A1 |
20190156937 | Shimomura et al. | May 2019 | A1 |
20190170734 | Chou et al. | Jun 2019 | A1 |
20190187140 | Kamei et al. | Jun 2019 | A1 |
20190229907 | Nicolson et al. | Jul 2019 | A1 |
20190237195 | Berberian et al. | Aug 2019 | A1 |
20190244695 | Dejima et al. | Aug 2019 | A1 |
20190279777 | Conlin et al. | Sep 2019 | A1 |
20190287671 | Mako et al. | Sep 2019 | A1 |
20190294919 | Nahum et al. | Sep 2019 | A1 |
20190320900 | Majmudar | Oct 2019 | A1 |
20190343386 | Pulitzer et al. | Nov 2019 | A1 |
20190346369 | Ozcan et al. | Nov 2019 | A1 |
20190355451 | Clark | Nov 2019 | A1 |
20190362841 | Aysin et al. | Nov 2019 | A1 |
20190362852 | Von Berg et al. | Nov 2019 | A1 |
20190369126 | Nguyen et al. | Dec 2019 | A1 |
20190370576 | Surendran et al. | Dec 2019 | A1 |
20190374152 | Wayne et al. | Dec 2019 | A1 |
20190376966 | Pulitzer et al. | Dec 2019 | A1 |
20190384890 | Pulitzer et al. | Dec 2019 | A1 |
20200026401 | Krimsky et al. | Jan 2020 | A1 |
20200029837 | Joudi | Jan 2020 | A1 |
20200043586 | Teucher et al. | Feb 2020 | A1 |
20200066381 | Johnson | Feb 2020 | A1 |
20200066415 | Hettig et al. | Feb 2020 | A1 |
20200090794 | Jung et al. | Mar 2020 | A1 |
20200090801 | Scott et al. | Mar 2020 | A1 |
20200090805 | Bowers et al. | Mar 2020 | A1 |
20200098461 | Macoviak et al. | Mar 2020 | A1 |
20200105409 | Kochar et al. | Apr 2020 | A1 |
20200107787 | Sarkaria et al. | Apr 2020 | A1 |
20200118164 | DeFrank et al. | Apr 2020 | A1 |
20200125965 | Benja-Athon | Apr 2020 | A1 |
20200132662 | Hengstler et al. | Apr 2020 | A1 |
20200150049 | Pulitzer et al. | May 2020 | A1 |
20200152339 | Pulitzer et al. | May 2020 | A1 |
20200159957 | Reimers | May 2020 | A1 |
20200164373 | Khattak et al. | May 2020 | A1 |
20200167871 | Basu et al. | May 2020 | A1 |
20200176124 | Chatterjea et al. | Jun 2020 | A1 |
20200183137 | Hu et al. | Jun 2020 | A1 |
20200204370 | Wisniewski | Jun 2020 | A1 |
20200204377 | Wisniewski | Jun 2020 | A1 |
20200254445 | Chou et al. | Aug 2020 | A1 |
20200257103 | Fletcher et al. | Aug 2020 | A1 |
20200260992 | Mirza | Aug 2020 | A1 |
20200278297 | Karlovac et al. | Sep 2020 | A1 |
20200279339 | Akutagawa et al. | Sep 2020 | A1 |
20200279464 | Llewelyn | Sep 2020 | A1 |
20200279585 | Rothschild | Sep 2020 | A1 |
20200279631 | Bass et al. | Sep 2020 | A1 |
20200279642 | Lee et al. | Sep 2020 | A1 |
20200279657 | Lee et al. | Sep 2020 | A1 |
20200281469 | Redei | Sep 2020 | A1 |
20200286606 | Sy | Sep 2020 | A1 |
20200291490 | Jolly et al. | Sep 2020 | A1 |
20200303044 | Stephen | Sep 2020 | A1 |
20200304944 | Millius et al. | Sep 2020 | A1 |
20200312428 | Reeves et al. | Oct 2020 | A1 |
20200321090 | Sonbol et al. | Oct 2020 | A1 |
20200327986 | Kurniawan et al. | Oct 2020 | A1 |
20200330029 | Chou et al. | Oct 2020 | A1 |
20200330979 | Cyr et al. | Oct 2020 | A1 |
20200333312 | Islam | Oct 2020 | A1 |
20200334811 | Mansi et al. | Oct 2020 | A1 |
20200335219 | Fogel | Oct 2020 | A1 |
20200337794 | Hall et al. | Oct 2020 | A1 |
20200340988 | Ehrenkranz | Oct 2020 | A1 |
20200340989 | Rurack et al. | Oct 2020 | A1 |
20200342980 | Westin et al. | Oct 2020 | A1 |
20200345316 | Noel | Nov 2020 | A1 |
20200350079 | Thomas et al. | Nov 2020 | A1 |
20200350989 | Llewelyn | Nov 2020 | A1 |
20200357497 | Kamber Todd | Nov 2020 | A1 |
20200357512 | Coghlan | Nov 2020 | A1 |
20200357526 | Odiz et al. | Nov 2020 | A1 |
20200363408 | Chou et al. | Nov 2020 | A1 |
20200397935 | Church et al. | Dec 2020 | A1 |
20200402671 | Shaw | Dec 2020 | A1 |
20210012869 | Kotlarz et al. | Jan 2021 | A1 |
20210043288 | Nakanishi | Feb 2021 | A1 |
20210043326 | Janssen | Feb 2021 | A1 |
20210043330 | Ikeshima | Feb 2021 | A1 |
20210050116 | Sabeti et al. | Feb 2021 | A1 |
20210056639 | Eberting | Feb 2021 | A1 |
20210057074 | Wearne | Feb 2021 | A1 |
20210057111 | Barkol et al. | Feb 2021 | A1 |
20210058736 | Ghazzaoui et al. | Feb 2021 | A1 |
20210248853 | Vilhelmsen | Aug 2021 | A1 |
20210286864 | Burke | Sep 2021 | A1 |
20210287768 | Craig | Sep 2021 | A1 |
20210326474 | Sparks et al. | Oct 2021 | A1 |
20210350649 | Jafri | Nov 2021 | A1 |
20210358068 | Boszczyk et al. | Nov 2021 | A1 |
20220020236 | Luthra et al. | Jan 2022 | A1 |
20220020237 | Luthra et al. | Jan 2022 | A1 |
20220020481 | Luthra et al. | Jan 2022 | A1 |
20220165423 | Luber et al. | May 2022 | A1 |
Number | Date | Country |
---|---|---|
2003226069 | Oct 2003 | AU |
2011292257 | Jan 2013 | AU |
2013100344 | May 2013 | AU |
2014100086 | Feb 2014 | AU |
2015218578 | Aug 2016 | AU |
2016206364 | Feb 2017 | AU |
2019200625 | Feb 2019 | AU |
2019204791 | Jul 2019 | AU |
2020201726 | Mar 2020 | AU |
2020100481 | May 2020 | AU |
2020101208 | Aug 2020 | AU |
2020101336 | Aug 2020 | AU |
2020101728 | Sep 2020 | AU |
2020102044 | Oct 2020 | AU |
2020103842 | Feb 2021 | AU |
1007141 | Feb 2018 | BR |
0818877 | Jun 2019 | BR |
112020008334 | Oct 2020 | BR |
2342977 | Oct 2002 | CA |
2468483 | Nov 2005 | CA |
2716575 | Aug 2008 | CA |
2745107 | Jul 2009 | CA |
2757599 | Oct 2010 | CA |
2698078 | Sep 2011 | CA |
2840871 | Jan 2013 | CA |
2977384 | Feb 2019 | CA |
711954 | Jun 2017 | CH |
1700879 | Nov 2005 | CN |
100361133 | Jan 2008 | CN |
101129257 | Feb 2008 | CN |
102539735 | Jul 2012 | CN |
102762152 | Oct 2012 | CN |
102157023 | Dec 2012 | CN |
203153725 | Aug 2013 | CN |
104198482 | Dec 2014 | CN |
103091486 | Feb 2015 | CN |
104718557 | Jun 2015 | CN |
204428014 | Jul 2015 | CN |
104838264 | Aug 2015 | CN |
103248681 | Apr 2016 | CN |
105675854 | Jun 2016 | CN |
105740322 | Jul 2016 | CN |
205404383 | Jul 2016 | CN |
106198538 | Dec 2016 | CN |
106250668 | Dec 2016 | CN |
106339857 | Jan 2017 | CN |
106771286 | May 2017 | CN |
106872341 | Jun 2017 | CN |
106872538 | Jun 2017 | CN |
106909796 | Jun 2017 | CN |
103997951 | Jul 2017 | CN |
107022650 | Aug 2017 | CN |
107211097 | Sep 2017 | CN |
107239655 | Oct 2017 | CN |
107255712 | Oct 2017 | CN |
107330524 | Nov 2017 | CN |
206772947 | Dec 2017 | CN |
107610745 | Jan 2018 | CN |
107655889 | Feb 2018 | CN |
104756093 | Mar 2018 | CN |
108053134 | May 2018 | CN |
207408411 | May 2018 | CN |
104732468 | Jun 2018 | CN |
207457253 | Jun 2018 | CN |
107121542 | Aug 2018 | CN |
108461158 | Aug 2018 | CN |
108562741 | Sep 2018 | CN |
108614100 | Oct 2018 | CN |
108615214 | Oct 2018 | CN |
109147916 | Jan 2019 | CN |
105572110 | Mar 2019 | CN |
109587337 | Apr 2019 | CN |
109658303 | Apr 2019 | CN |
106645116 | Jun 2019 | CN |
109900893 | Jun 2019 | CN |
110021415 | Jul 2019 | CN |
110038652 | Jul 2019 | CN |
110045106 | Jul 2019 | CN |
105898217 | Aug 2019 | CN |
110189823 | Aug 2019 | CN |
110349641 | Oct 2019 | CN |
106659484 | Nov 2019 | CN |
110444296 | Nov 2019 | CN |
209678887 | Nov 2019 | CN |
110546638 | Dec 2019 | CN |
110570918 | Dec 2019 | CN |
110580953 | Dec 2019 | CN |
110796422 | Feb 2020 | CN |
110827997 | Feb 2020 | CN |
210071666 | Feb 2020 | CN |
210199118 | Mar 2020 | CN |
110957032 | Apr 2020 | CN |
111027525 | Apr 2020 | CN |
111161812 | May 2020 | CN |
111210886 | May 2020 | CN |
111220801 | Jun 2020 | CN |
111243150 | Jun 2020 | CN |
111247422 | Jun 2020 | CN |
111261302 | Jun 2020 | CN |
111276257 | Jun 2020 | CN |
111311018 | Jun 2020 | CN |
111312406 | Jun 2020 | CN |
111340442 | Jun 2020 | CN |
111354119 | Jun 2020 | CN |
111354443 | Jun 2020 | CN |
111354473 | Jun 2020 | CN |
111369721 | Jul 2020 | CN |
111370135 | Jul 2020 | CN |
111370136 | Jul 2020 | CN |
111403045 | Jul 2020 | CN |
111430023 | Jul 2020 | CN |
111444444 | Jul 2020 | CN |
111461272 | Jul 2020 | CN |
111462460 | Jul 2020 | CN |
111465882 | Jul 2020 | CN |
211015833 | Jul 2020 | CN |
111484929 | Aug 2020 | CN |
111513691 | Aug 2020 | CN |
111540427 | Aug 2020 | CN |
111540476 | Aug 2020 | CN |
111540477 | Aug 2020 | CN |
111550880 | Aug 2020 | CN |
111552000 | Aug 2020 | CN |
111554404 | Aug 2020 | CN |
111564209 | Aug 2020 | CN |
111582097 | Aug 2020 | CN |
111582660 | Aug 2020 | CN |
111598134 | Aug 2020 | CN |
111601541 | Aug 2020 | CN |
106874632 | Sep 2020 | CN |
111370139 | Sep 2020 | CN |
111403006 | Sep 2020 | CN |
111627562 | Sep 2020 | CN |
111627565 | Sep 2020 | CN |
111629334 | Sep 2020 | CN |
111630604 | Sep 2020 | CN |
111639272 | Sep 2020 | CN |
111640228 | Sep 2020 | CN |
111640513 | Sep 2020 | CN |
111643121 | Sep 2020 | CN |
111651216 | Sep 2020 | CN |
111652104 | Sep 2020 | CN |
111654825 | Sep 2020 | CN |
111667390 | Sep 2020 | CN |
111667902 | Sep 2020 | CN |
111681727 | Sep 2020 | CN |
111693694 | Sep 2020 | CN |
111710401 | Sep 2020 | CN |
211454690 | Sep 2020 | CN |
211454692 | Sep 2020 | CN |
106999041 | Oct 2020 | CN |
111755124 | Oct 2020 | CN |
111785393 | Oct 2020 | CN |
111798607 | Oct 2020 | CN |
111798951 | Oct 2020 | CN |
111798970 | Oct 2020 | CN |
111798982 | Oct 2020 | CN |
111816294 | Oct 2020 | CN |
111835762 | Oct 2020 | CN |
111863168 | Oct 2020 | CN |
111863223 | Oct 2020 | CN |
111863224 | Oct 2020 | CN |
111867672 | Oct 2020 | CN |
211674200 | Oct 2020 | CN |
211776141 | Oct 2020 | CN |
211787238 | Oct 2020 | CN |
211787265 | Oct 2020 | CN |
107133901 | Nov 2020 | CN |
111879769 | Nov 2020 | CN |
111882164 | Nov 2020 | CN |
111918797 | Nov 2020 | CN |
111935203 | Nov 2020 | CN |
111968730 | Nov 2020 | CN |
211858162 | Nov 2020 | CN |
211883765 | Nov 2020 | CN |
211906967 | Nov 2020 | CN |
112017342 | Dec 2020 | CN |
112102945 | Dec 2020 | CN |
112119469 | Dec 2020 | CN |
212061244 | Dec 2020 | CN |
112368782 | Feb 2021 | CN |
10248682 | May 2004 | DE |
69731901 | Dec 2005 | DE |
102005010094 | Sep 2006 | DE |
102007010757 | Apr 2010 | DE |
102012102918 | Oct 2013 | DE |
202015100937 | Jun 2015 | DE |
102014105937 | Oct 2015 | DE |
202015006405 | Feb 2016 | DE |
202016105331 | Nov 2016 | DE |
202015009440 | Aug 2017 | DE |
102016202428 | Jun 2018 | DE |
202020002331 | Jul 2020 | DE |
202020104079 | Jul 2020 | DE |
202020004020 | Oct 2020 | DE |
359623 | Mar 1990 | EP |
761160 | Mar 1997 | EP |
1027459 | Aug 2000 | EP |
1327215 | Jul 2003 | EP |
1575010 | Sep 2005 | EP |
1688086 | Aug 2006 | EP |
1883345 | Feb 2008 | EP |
1583585 | Jun 2008 | EP |
1952162 | Aug 2008 | EP |
2094153 | Sep 2009 | EP |
2416702 | Feb 2012 | EP |
2415243 | Jan 2015 | EP |
2912626 | Sep 2015 | EP |
3061062 | Aug 2016 | EP |
2753917 | Mar 2017 | EP |
3207472 | Aug 2017 | EP |
3218715 | Sep 2017 | EP |
3317865 | May 2018 | EP |
3454341 | Mar 2019 | EP |
3397744 | Aug 2019 | EP |
2946198 | Oct 2019 | EP |
3552018 | Oct 2019 | EP |
3026874 | Nov 2019 | EP |
3607321 | Feb 2020 | EP |
3420713 | May 2020 | EP |
3647900 | May 2020 | EP |
3662259 | Jun 2020 | EP |
3311163 | Aug 2020 | EP |
3691788 | Aug 2020 | EP |
3559849 | Sep 2020 | EP |
3701543 | Sep 2020 | EP |
3702988 | Sep 2020 | EP |
3711062 | Sep 2020 | EP |
3714459 | Sep 2020 | EP |
3729335 | Oct 2020 | EP |
3257026 | Nov 2020 | EP |
3737947 | Nov 2020 | EP |
2327385 | Oct 2009 | ES |
201305093 | Aug 2014 | FI |
3087918 | May 2020 | FR |
2347503 | Sep 2000 | GB |
2533066 | Sep 2017 | GB |
2553512 | Mar 2018 | GB |
1200186 | Jul 2015 | HK |
1206426 | Jan 2016 | HK |
290952 | Apr 2010 | IN |
201001258 | Jun 2010 | IN |
201200846 | Aug 2015 | IN |
201811043670 | Dec 2018 | IN |
201711027532 | Mar 2019 | IN |
201917036547 | Nov 2019 | IN |
202011012796 | Mar 2020 | IN |
202041015755 | May 2020 | IN |
202041024780 | Jun 2020 | IN |
202021024064 | Jul 2020 | IN |
202041028143 | Jul 2020 | IN |
201811030959 | Aug 2020 | IN |
201917027562 | Sep 2020 | IN |
202017033677 | Sep 2020 | IN |
202038032228 | Sep 2020 | IN |
202041040216 | Sep 2020 | IN |
202011041126 | Oct 2020 | IN |
202021044172 | Oct 2020 | IN |
202041043957 | Oct 2020 | IN |
202041044040 | Oct 2020 | IN |
2002511965 | Apr 2002 | JP |
2007200107 | Aug 2007 | JP |
4076386 | Apr 2008 | JP |
2009031887 | Feb 2009 | JP |
2010190867 | Sep 2010 | JP |
2011065540 | Mar 2011 | JP |
2012002435 | Jan 2012 | JP |
5928332 | Jun 2016 | JP |
5946030 | Jul 2016 | JP |
2017042601 | Mar 2017 | JP |
2017204214 | Nov 2017 | JP |
2018000278 | Jan 2018 | JP |
6275876 | Feb 2018 | JP |
6329627 | May 2018 | JP |
6356141 | Jul 2018 | JP |
2019188162 | Oct 2019 | JP |
2019528092 | Oct 2019 | JP |
2019209203 | Dec 2019 | JP |
6669658 | Mar 2020 | JP |
2020042685 | Mar 2020 | JP |
2020067939 | Apr 2020 | JP |
2020080083 | May 2020 | JP |
2020514775 | May 2020 | JP |
2020516999 | Jun 2020 | JP |
2020101571 | Jul 2020 | JP |
2020102249 | Jul 2020 | JP |
2020520690 | Jul 2020 | JP |
2020128995 | Aug 2020 | JP |
2020128999 | Aug 2020 | JP |
2020524806 | Aug 2020 | JP |
6765777 | Oct 2020 | JP |
2020169999 | Oct 2020 | JP |
6786906 | Nov 2020 | JP |
2019130494 | Nov 2020 | JP |
2019561485 | Nov 2020 | JP |
2020184290 | Nov 2020 | JP |
2020184379 | Nov 2020 | JP |
100514036 | Sep 2005 | KR |
100700219 | Mar 2007 | KR |
100955002 | Apr 2010 | KR |
20120016877 | Feb 2012 | KR |
20130047776 | May 2013 | KR |
20150138244 | Dec 2015 | KR |
2016096455 | Aug 2016 | KR |
101773416 | Sep 2017 | KR |
1789208 | Oct 2017 | KR |
1798818 | Nov 2017 | KR |
1837081 | Mar 2018 | KR |
2018132914 | Dec 2018 | KR |
2034352 | Oct 2019 | KR |
20190134314 | Dec 2019 | KR |
20200041458 | Apr 2020 | KR |
2020047457 | May 2020 | KR |
20200054203 | May 2020 | KR |
20200082445 | Jul 2020 | KR |
2152030 | Aug 2020 | KR |
2020095041 | Aug 2020 | KR |
2159722 | Sep 2020 | KR |
2020111292 | Sep 2020 | KR |
20200105711 | Sep 2020 | KR |
20200121808 | Oct 2020 | KR |
102190872 | Dec 2020 | KR |
102190873 | Dec 2020 | KR |
1022161480000 | Feb 2021 | KR |
362826 | Feb 2019 | MX |
171637 | Oct 2019 | MY |
2564832 | Feb 2014 | RU |
2015115133 | Nov 2016 | RU |
2639731 | Dec 2017 | RU |
10201914077 | Mar 2020 | SG |
I377046 | Dec 1999 | TW |
537880 | Jun 2003 | TW |
200835465 | Sep 2008 | TW |
201400813 | Jan 2014 | TW |
M523925 | Jun 2016 | TW |
560437 | Dec 2016 | TW |
698221 | Jul 2020 | TW |
00033259 | Jun 2000 | WO |
01027857 | Apr 2001 | WO |
0165443 | Sep 2001 | WO |
01097050 | Dec 2001 | WO |
2004001640 | Dec 2003 | WO |
2004042596 | May 2004 | WO |
2004114180 | Dec 2004 | WO |
2005034008 | Apr 2005 | WO |
2008119182 | Oct 2008 | WO |
2009012585 | Jan 2009 | WO |
2011049886 | Apr 2011 | WO |
2012154488 | Nov 2012 | WO |
2013006615 | Jan 2013 | WO |
2013026999 | Feb 2013 | WO |
2013120199 | Aug 2013 | WO |
2013155002 | Oct 2013 | WO |
2014178062 | Nov 2014 | WO |
2014196535 | Dec 2014 | WO |
2015073878 | May 2015 | WO |
2015143309 | Sep 2015 | WO |
2016057786 | Apr 2016 | WO |
2016201595 | Dec 2016 | WO |
2017079849 | May 2017 | WO |
2018035147 | Feb 2018 | WO |
2018044894 | Mar 2018 | WO |
2018082257 | May 2018 | WO |
2018163207 | Sep 2018 | WO |
2018208820 | Nov 2018 | WO |
2018227256 | Dec 2018 | WO |
2019130494 | Jul 2019 | WO |
2019140334 | Jul 2019 | WO |
2019144112 | Jul 2019 | WO |
2019175660 | Sep 2019 | WO |
2019200148 | Oct 2019 | WO |
2019215199 | Nov 2019 | WO |
2019222081 | Nov 2019 | WO |
2020000598 | Jan 2020 | WO |
2020008192 | Jan 2020 | WO |
2020009900 | Jan 2020 | WO |
2020012476 | Jan 2020 | WO |
2020016616 | Jan 2020 | WO |
2020028837 | Feb 2020 | WO |
2020038461 | Feb 2020 | WO |
2020041528 | Feb 2020 | WO |
2020051365 | Mar 2020 | WO |
2020091155 | May 2020 | WO |
2020102223 | May 2020 | WO |
2020118152 | Jun 2020 | WO |
2020128146 | Jun 2020 | WO |
2020141346 | Jul 2020 | WO |
2020150403 | Jul 2020 | WO |
2020171448 | Aug 2020 | WO |
2020186231 | Sep 2020 | WO |
2020198511 | Oct 2020 | WO |
2020263745 | Dec 2020 | WO |
2021252571 | Dec 2021 | WO |
2022112843 | Jun 2022 | WO |
Entry |
---|
United States Patent and Trademark Office, “Notice of Allowance and Fee(s) Due,” issued in connection with U.S. Appl. No. 17/208,754, dated Jul. 5, 2022, 9 pages. |
United States Patent and Trademark Office, “Notice of Allowance and Fee(s) Due,” issued in connection with U.S. Appl. No. 17/240,644, dated Jul. 28, 2022, 8 pages. |
United States Patent and Trademark Office, “Non-Final Office Action,” issued in connection with U.S. Appl. No. 17/240,644, dated Jun. 20, 2022, 6 pages. |
“Abbott's New NAVICA App: What You Need to Know” Abbott, dated Aug. 26, 2020, 2 pages, <https://www.abbott.com/corpnewsroom/diagnostics-testing/abbotts-new-NAVICA-app-what-you-need-to-know.html>. |
Virki, “Estonia starts testing digital immunity passport for workplaces” Reuters, dated May 23, 2020, 2 pages. < https://www.reuters.com/article/health-coronavirus-estonia-digital/estonia-starts-testing-digital-immunity-passport-for-workplaces-idUSKBN22WOGE>. |
United States Patent and Trademark Office, “Notice of Allowance,” issued in connection with U.S. Appl. No. 17/068,608, dated Dec. 4, 2020, 10 pages. |
United States Patent and Trademark Office, “Non-Final Office Action,” issued in connection with U.S. Appl. No. 17/068,601, dated Dec. 30, 2020, 13 pages. |
Nadeem Ahmed et al., “A Survey of Covid-19 Contact Tracing Apps,” in IEEE Access, vol. 8, pp. 134577-134601, published Jul. 20, 2020, 25 pages. |
Qing Ye et al., “Using Information Technology to Manage the COVID-19 Pandemic: Development of a Technical Framework Based on Practical Experience in China,” National Library of Medicine, JMIR Medical Informatics, Jun. 8, 2020, 2 pages. |
Weimin Xin et al., “Fighting COVID-19 and helping economy reopen by using blockchain technology,” IEEE/CIC International Conference on Communications in China (ICCC Workshops), Chongqing, China, pp. 102-105, 2020, 4 pages. |
United States Patent and Trademark Office, “Notice of Allowance,” issued in connection with U.S. Appl. No. 17/068,599, dated Dec. 16, 2020, 9 pages. |
International Searching Authority, “Search Report and Written Opinion,” issued in connection with Application No. PCT/US2021/023488, dated May 17, 2021, 15 pages. |
Hicks et al., “SecureABC: Secure AntiBody Certificates for COVID-19,” arXiv: 2005.1183 3, last revised Oct. 12, 2020, 11 pages. |
Icaomid, “Travel Pass,” IATA, Third Middle East Directions General of Civil Aviation DGGA-MID/3 Virtual Meeting, Dec. 7, 2020, 19 pages. |
United States Patent and Trademark Office, “Final Office Action,” issued in connection with U.S. Appl. No. 17/068,601, dated May 13, 2021, 19 pages. |
Marc Eisenstadt et al., “COVID-19 Antibody Test/Vaccination Certification: There's an App for That,” in IEEE Open Journal of Engineering in Medicine and Biology, vol. 1, pp. 148-155, published online on Jun. 1, 2020, 13 pages. |
Jessica X. H. Wong et al. “Direct Reading of Bona Fide Barcode Assays for Diagnostics with Smartphone Apps.” Scientific reports vol. 5:11727, published Jun. 30, 2015, 11 pages. |
Giovanni Rateni et al. “Smartphone-Based Food Diagnostic Technologies: A Review.” Sensors (Basel, Switzerland) vol. 17, 1453, published Jun. 20, 2017, 22 pages. |
United States Patent and Trademark Office, “Non-Final Office Action,” issued in connection with U.S. Appl. No. 17/208,754, dated Dec. 27, 2021, 8 pages. |
Number | Date | Country | |
---|---|---|---|
20220020239 A1 | Jan 2022 | US |
Number | Date | Country | |
---|---|---|---|
63080391 | Sep 2020 | US | |
63054170 | Jul 2020 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 17240644 | Apr 2021 | US |
Child | 17476223 | US | |
Parent | 17068599 | Oct 2020 | US |
Child | 17240644 | US |