Representative areas where a Secure Web Fabric is applicable

Medical
Media
Crypto
Distributed Storage
Other
Barterist Manifesto

Medical Sector

Secure medical records. Ubivault shreds patient records, hashes and replicates them, then distributes parts of the file to multiple locations. Even if a hacker does get some fragments, there is no way to make use of them: the data is not all there. And, because the data is replicated, even if one or more storage locations are damaged or offline, the data can still be recovered. Moreover, all transmissions are protected by military-grade encryption.

Blockchain and smart contracts. In addition to using Ubivault as a secure communications and storage system for sharing among providers, it can also be combined with blockchains and smart contracts through an API. With blockchain, all transactions are immediately logged to an immutable shared ledger that tracks any kind of activity. 

Advanced authentication. Ubivault supports any combination of authentication methods. Mobile phones can be particularly useful, providing location authentication, fingerprints, facial recognition, iris scans, voice recognition, and many other means. Combining a number of methods greatly reduces the chance of unauthorized access, whether by hack or phishing attack.

Malware and Ransom-ware. Ubivault data is constantly being incremented, so even if your devices are infected or frozen, simply re-install your data because Ubivault keeps it safe.

Inter-facility sharing. Clinics and hospitals. Ubivault's storage and transmission is secure over the open internet, with no need for VPNs or firewalls. This means that collaborating parties can easily and safely share data whenever the owner authorizes. Ubivault enables granular control of data, so a clinic can share any part of a record with a specialist in a different organization. The owner can chose whether data itself is shared, or just a view of it from the owner's medical equipment.

Post-merger in-network sharing. Most large healthcare organizations have grown through a series of mergers. Patient records are largely standardized in the process. A patient moving from San Francisco to southern California within the same provider network cannot have his records electronically accessed from his new clinic. With Ubivault, data extracts can be standardized at each location, and queried from anywhere else. This can be outside the EMR systems, greatly lowering the cost of sharing data.

Inter-network sharing. Ubivault's secure transport and storage using standardized data extracts simplifies record sharing as a patient travels between local providers and centers of excellence. Not only do the records move to the centers of excellences, but they can be incremented as a patient moves among providers throughout treatment.

Medical IOT. Wards such as Intensive Care Units have many medical monitoring devices, but few interoperate. It is still normal for staff to try to weigh the data output by many machines, making mistakes particularly easy. Ubivault can connect the devices, with AI plug-ins on each device that manage which data to ignore, and what to share with the unit's swarm of devices. Swarm-level AI can assess the various inputs from any and all machines, providing a more reliable reporting basis, and much more sophisticated alarms.

Query in place. The data extracts created at each location can either hold data in a standardized format, or a local format that can be accessed with a standard query converter. Unlike earlier attempts to use big-data that required large-scale, centralized aggregation, the intrinsic analytics designed into Ubivault allow authorized users to query data on any and all connected nodes, and then aggregating only the query results. All queries and results set are logged, and can be metered for tolling if desired.

Social determinants of health. Ubivault's query-in-place methodology goes far beyond clinical support. Researchers investigating the social determinants of health can connect Ubivault extracts world-wide, encompassing not only medical data, but environmental and social data as well. This greatly simplifies the process of analysis, and builds data sets well formatted for external AI pattern discovery. That advanced centralized learning can be securely fed back to clinical nodes in a process of continuous improvement.

Telemedicine. Ubivault's end-to-end secure connections can simultaneously link many people and machines for highly sophisticated collaboration in a data-rich environment. Remote control, screen share, video, voice, whiteboards, messaging, medical device access and other software can be shared among standard computers and even mobile devices.

Tele-research. Ubivault's collaboration tools are useful beyond clinical applications. Specialized researchers around the world can join in examining data sets and best practices. Query-in-place can be combined with live interaction in an entirely secure environment over the open internet without the use of expensive hardware.

Remote access. Care team members can access medical data systems securely from home, on the road, or even unsecured Wi-Fi. In addition to EMR access, streaming is also possible for video data such as MRI or ultrasound. Multiple team members can observe -- each from different locations.

Patient-controlled whole-health records. Ubivault simpifies the federation of data, and gives control to the data owner. Personal health records can be combined in Ubivault without worry of hacking. Whenever part of the record needs to be shared with a new provider, it can easily be extracted and shared -- or exported.

 

 

Media

Virtual conferences. Multifactor authentication verifies attendees, and the secure sharing of any kind of content is perfect for remote conference attendance, and education credit management.

Edge CDN. Content delivery at the edge in a P2P Internet. Migrate from a client-server content delivery network to a peer-to-peer content exchange, with secure, authenticated blockchains using AI logical routing

 

Crypto Currency

Insurance. Permits Insurance carriers to protect valid cryptocurrency transactions from Mobile Wallets and Exchanges

Smart contracts. ICO recording of token investor transactions using offchain secure ZKP.

Micropayments. Granular tracking and recording of asset backed commodity stable tokens

Reward points. Cryptocurrency can also be interpreted as reward points, useful for encouraging staff to meet certain metrics, or reward for achieving certain goals.

 

Byzantine Redundant Distributed Sharded Storage

Perfect Secrecy. A double-blind distributed data mechanism using object fragmentation that allows secure data storage across cloud services. Uses perfect forward secrecy to create secure peer to peer communications network to manage data at rest. All data objects belonging to a source are independently encrypted and fragmented where results are stored on network of nodes.

Double-blind. The fragmentation process can recreate the target objects stored as fragments on a storage network without knowing where any fragments are stored. The storage nodes have no knowledge of which fragments belongs to a data object.

 

Other

Promotion without spam. Ubivault is an anti-spam solution that can help patients find products and prices that they actually desire. A diabetic might appreciate low-glycemic food introductions. Our AI plug-ins can match conditions to products. Rather than pushing products on patients, it allows patients to elect to see selected categories without revealing identity to advertisers.

 

Barterist Economy

Preface     [pdf 246kb]
Manifesto [pdf 1.5mb]