Skip to main content

Patents · Accurate as of 2026-05-07

One filed. Many planned.

We have one real patent filing — U.S. Provisional 63/921,717 — covering the Master Equation and the eight-axis CH scoring system. This page is honest about exactly what that filing covers, breaks it down into every underlying patentable claim, documents the additional inventions we need to file, and timestamps new first-disclosed inventions so the record is clear. Every entry is accurate. Nothing is fabricated.

0
Granted
None yet
0
Pending utility
None yet filed
1
Provisional
US 63/921,717
33
New disclosures
Timestamped 2026-05-05 · 2026-05-07

The real filing

What we actually filed.

A U.S. provisional application establishes a priority date but is never examined and never becomes a patent on its own. It gives us 12 months to file one or more non-provisional utility applications that claim priority back to the provisional date. The filing below is that provisional. The claims listed are the coverage we intend to fully develop in non-provisional filings — they are not yet examined claims.
Provisional No.
US 63/921,717
Filed · 2025
Assignee · Conceptual Healthcare Corporation
Inventors · Raymond M. Lahti et al.
Priority year expires · 2026 (12 months from filing)

✓ Priority window open. Non-provisional utility application(s) must be filed within 12 months of the provisional date to claim priority. Confirm exact filing date via USPTO Patent Center and engage patent counsel to begin non-provisional drafting.

System and method for computing a composite Conceptual Health score from eight validated axis sub-scores under a non-linear multiplicative function with behavioral exponents

A method for computing a patient's composite health index (CH) from eight independently-derived sub-scores spanning Physical Output, Neurological/Mental, Emotional Regulation, Social Connection, Religious/Spiritual, Economic Stability, Time/Activity, and Preventive/Vital status — combined under a multiplicative formula with consistency exponent C (a behavioral persistence factor, 0–1) and purpose exponent p (a self-reported motivational alignment factor, 0–1), such that behavioral consistency amplifies the score non-linearly, creating an incentive structure that rewards sustained health behavior over one-time actions.

The formula (as filed):
CH = (S × Sp)C × (T + E)p × (ER × RS)C/3
Where:
  • S = physical + social axis composite (PO, SC)
  • Sp = spiritual + emotional axis composite (RS, ER)
  • T = time/activity axis (TA)
  • E = economic stability axis (ES)
  • C = consistency exponent — behavioral persistence measured over a rolling window
  • p = purpose exponent — motivational alignment, patient-reported
  • ER = emotional regulation sub-score
  • RS = religious/spiritual sub-score
Coverage intended by this provisional:
  • The specific multiplicative (vs additive) formula structure where health axes interact, not merely sum
  • The behavioral consistency exponent C that amplifies sustained behavior over one-time events
  • The purpose alignment exponent p as a patient-reported motivational dimension
  • The eight named axes (PO, NM, ER, SC, RS, ES, TA, PV) and their role in the formula
  • The 9-bracket scoring output system: DEAD · CRITICAL · SEVERE · POOR · BELOW AVERAGE · AVERAGE · GOOD · VERY GOOD · EXCELLENT
  • Token-issuance events triggered when ΔCH ≥ threshold τ over observation window W
● Provisional filed

Claim coverage breakdown

What the provisional covers — and what needs its own filing.

A provisional that covers the formula does not automatically cover every system built on top of it. Each independent invention below is a separate patentable subject matter requiring its own application.

Covered by 63/921,717
The CH composite formula
The multiplicative structure, C exponent, p exponent, and 8-axis inputs. This is the core mathematical claim.
Covered by 63/921,717
8-axis measurement system
The specific selection and definition of PO, NM, ER, SC, RS, ES, TA, PV as the 8 independently-scored health dimensions.
Covered by 63/921,717
Behavioral consistency exponent
C as a rolling-window behavioral persistence factor that amplifies health scores for sustained action, creating non-linear compounding.
Covered by 63/921,717
9-bracket output classification
The named bracket system mapping CH score to DEAD → CRITICAL → … → EXCELLENT, with clinical significance mapped to each bracket.
Separate filing needed
Proof-of-Health blockchain consensus
Using verified clinical actions as the "proof" object in a distributed ledger consensus mechanism. Architecturally distinct from PoW and PoS.
Separate filing needed
Dual-token settlement (HCR + HCC)
Two cryptographically distinct tokens: HCR earned by health actions (body earns), HCC earned by data consent (data earns). Separate issuance, separate economic flow.
Separate filing needed
Network Clinic validator model
Clinics as BFT validator nodes that certify patient health actions and earn mining yield, staking clinical reputation rather than compute or capital.
Separate filing needed
Consent-gated DataVault marketplace
Per-study, per-patient, IRB-gated consent with cryptographic revocation propagation within configurable SLA across all active cohort queries.
Separate filing needed
5-multiplier HCC yield function
Token yield Y = base × ∏ m_i where multipliers are rarity, recency, data depth, longitudinal continuity, and cohort-fit bonus — all bounded and published per-cycle.
Separate filing needed
AI scribe with axis-aware co-emission
Ambient clinical AI that, upon generating a SOAP note, simultaneously emits structured axis-update events mapped to instruments referenced in the encounter.
Separate filing needed
Family-pool CH aggregation
Combining axis lifts across a household of related patient identifiers under per-member contribution caps, guardian co-signature for minors, and provable per-cycle reset.
Separate filing needed
Hardware-rooted health identity with recovery quorum
Multi-device biometric identity binding with Shamir-shared recovery quorum, patient-elected guardian co-signers, and atomic cross-device revocation.

Patent roadmap

Next filings.

These are the non-provisional and additional provisional applications we intend to file. Listed here to establish a public record of intent and to document the inventions we built.

Target filing
Non-provisional conversion of 63/921,717
Target · Q3 2026
Claims · 20+ independent + dependent

Composite health index computation with behavioral consistency amplification under eight validated sub-score axes

Non-provisional conversion of the filed provisional. Will include expanded dependent claims covering the normalization layer, rolling-window consistency calculation, the specific 9-bracket classification table, and the token-issuance trigger at ΔCH ≥ τ.

Priority claim: Derives from US 63/921,717 (filed 2023-10-23). Why novel: No prior art found for a multiplicative (vs. additive) composite health score where a behavioral consistency exponent non-linearly amplifies all axis contributions. Additive scores (PROMIS Global, SF-36, HOS) are the existing standard; this formula is structurally different.
Planned Q3 2026
Target filing
New provisional
Target · Q2 2026
Claims · Method + System

Proof-of-Health consensus protocol: using verified clinical action attestations as the distributed ledger proof object

A consensus mechanism where validator nodes (licensed healthcare institutions) attest to verified clinical actions — completed encounters, filled prescriptions, validated axis improvements — and these attestations serve as the "proof" object for block inclusion, replacing compute-intensive proof-of-work and capital-staked proof-of-stake with clinically-verified behavioral proof.

Why novel: US20150332283A1 (Hashing Health) covers blockchain validation of healthcare transactions using proof-of-work computation. Our method uses the verified health action itself as proof — the clinical attestation IS the mining work. No prior art found for this specific consensus design.
Planned Q2 2026
Target filing
New provisional
Target · Q2 2026
Claims · Method + System + Apparatus

Dual-token healthcare settlement: separate issuance and economic flows for health-action tokens (HCR) and data-consent tokens (HCC)

A settlement protocol issuing two cryptographically distinct tokens: an activity token (HCR) minted when a verified health action meets threshold criteria, and a consent token (HCC) minted when a patient grants per-study, IRB-governed data consent — with separate issuance schedules, separate hard caps, separate marketplace clearing, and no cross-token peg.

Why novel: US11942195B2 (Humana) covers a single-token health data market. Single-token NFT patient data systems exist in academic literature. The specific dual-token separation — body earns one coin, data consent earns a different coin — with separate hard caps and no price peg between them is not found in prior art. The separation prevents data-monetization from diluting the activity-reward signal.
Planned Q2 2026
Target filing
New provisional
Target · Q3 2026
Claims · Method + System

Per-consent, per-study data marketplace with stacked multiplier yield and cryptographic revocation propagation SLA

A research data marketplace where per-patient, per-study consent grants carry a computed token yield based on five stacked multipliers (cohort rarity, data recency, measurement depth, longitudinal continuity, cohort-fit bonus), and where consent revocation propagates to all active query sessions within a contractual SLA, triggering cohort rebuild.

Why novel: Adds the specific five-multiplier yield function and the SLA-bounded revocation propagation to the Humana data market model. The stacked-multiplier yield structure (Y = base × ∏ m_i) provides patient-differentiating incentives not present in prior art.
Planned Q3 2026

First-published disclosures · 2026-05-05–2026-05-07

Inventions we built. Publicly timestamped.

Under 35 U.S.C. § 102(b)(1), a public disclosure by the inventor starts a 12-month grace period to file a patent. These entries, published on 2026-05-05, establish Conceptual Healthcare Corporation as the first to publicly disclose each invention. They also prevent third parties from patenting the same thing. We intend to file provisional applications for each within the 12-month window.

2026-05-05 First public disclosure

Network Clinic as healthcare blockchain validator: reputation-staked attestation nodes

A blockchain validator model in which licensed healthcare institutions ("Network Clinics") participate as BFT validator nodes by staking their clinical licensure and reputation — not compute power or capital — and earn token yield ("mining yield") by attesting to verified patient health actions. Each validator vote is signed by the institution's credentialing certificate. Malicious attestation results in stake slash via reputation-scoring reduction, not monetary penalty.

⟶ Why patentable: Novel consensus principal type (licensed institution) and novel stake type (professional reputation + licensure) not found in existing blockchain validator prior art.
CH-IP-001 sha256:537a6f82adb871f4… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Axis-lift delta gating: token issuance triggered by improvement threshold across multi-window behavioral evidence

A token issuance mechanism where a mint event is triggered only when the CH composite score increases by threshold Δτ across at least one observation window W, with evidence drawn from multiple validated instruments per axis and a minimum N-measurement evidence floor. Single-measurement spikes cannot trigger issuance; sustained multi-point improvement is required. The window W is configurable per axis based on the clinical literature on behavior change timescales for that domain.

⟶ Why patentable: Existing health-token systems (where they exist) issue tokens per completed transaction or per data upload. This is a score-delta gating mechanism with multi-window evidence requirements — architecturally distinct.
CH-IP-002 sha256:262624e0c0625ce8… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Ambient clinical AI scribe with simultaneous axis-update co-emission from SOAP note instruments

An AI-powered clinical documentation system that, upon generating a structured SOAP note, concurrently emits a machine-readable axis-update event set. The axis updates are derived by mapping clinical observations in the note to validated instruments associated with each CH axis (e.g., a documented exercise history updates PO; a PHQ-9 referenced in the note updates NM). The co-emission is atomic with the note save and is signed by the same session credential. The axis-update events are consumed by the scoring service without requiring a separate data-entry step by the clinician.

⟶ Why patentable: Clinical documentation systems (Epic, Cerner) do not emit structured health-score updates alongside notes. The specific axis-mapping vocabulary and atomic co-emission architecture is novel.
CH-IP-003 sha256:3754e82d3dda8978… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Hardware-rooted patient health identity with multi-device Shamir recovery quorum and guardian co-signature for minors

A patient identity system binding a hardware security element (Secure Enclave or equivalent) to a biometric envelope and a cryptographic identity credential. Recovery is handled via a Shamir Secret Sharing scheme across up to 4 patient-owned devices (maximum enforced by the protocol) plus patient-elected human guardians. For minor patients, a guardian co-signature is required for identity recovery, clinical consent, and data marketplace participation. The system includes a court-order disclosure workflow with tamper-evident logging distinct from the guardian path.

⟶ Why patentable: Existing healthcare identity systems (FHIR SMART, CMS Blue Button) do not use hardware-rooted credentials with Shamir recovery and clinical-context guardian differentiation. The minor-specific guardian co-signature path and the court-order workflow are novel combinations.
CH-IP-004 sha256:aade0a786141a2e0… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Family-pool CH score aggregation with per-member contribution caps and guardian-bounded participation for minor household members

A method for aggregating CH axis lifts across a household of related patient identifiers into a shared family-pool score. Per-member contribution caps prevent a single high-performer from dominating the pool. Minor household members require a guardian co-signature for axis-lift contributions to be counted. The pool resets on a configurable per-cycle basis with a provable on-chain reset attestation. Token yield from pool-attributed lifts is distributed to all participating household members proportionally to their cap-limited contributions.

⟶ Why patentable: No prior art found for a family-pool health scoring mechanism with guardian-bounded caps, minor co-signature gates, and on-chain provable per-cycle resets.
CH-IP-005 sha256:db9cb5cce41ded6d… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Guardian Orb: GPU-rendered real-time health score visualization encoding axis data in sphere surface properties

A real-time GPU-rendered three-dimensional sphere (rendered via Metal shader on Apple platforms) that encodes the patient's current CH score and individual axis sub-scores as visual properties of the sphere surface: overall luminosity maps to CH composite; surface color maps to dominant axis; pulse animation frequency maps to consistency exponent C; texture detail level maps to data completeness; and halo radius maps to purpose exponent p. The rendering uses analytical ray-sphere intersection with multi-step detail marching, enabling real-time 60fps rendering on mobile hardware with no pre-baked textures.

⟶ Why patentable: Health data visualizations exist (ring charts, dashboards). A GPU-rendered sphere where each visual property (color, luminosity, pulse frequency, texture, halo) independently encodes a clinical axis score in real time is novel. The specific encoding schema is the claim.
CH-IP-006 sha256:954d87e957506f14… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Economic stability axis (ES) as a clinical health determinant within a composite health scoring formula

A method for treating economic stability — measured via configurable instruments including spending behavior, savings rate, financial stress self-report, and debt-to-income indicators — as a formally-scored health axis within a composite health index, with the axis score contributing to the patient's overall CH score and to token issuance eligibility. The axis is scored on the same 0–100 scale as clinical axes and is weighted within the composite formula alongside physical, mental, and social axes.

⟶ Why patentable: Social determinants of health (SDOH) are documented in clinical literature. Including economic stability as a formally scored, token-eligible, equal-weight axis within a composite health index formula is novel. No prior art found for this specific incorporation.
CH-IP-007 sha256:379436aa1fbe2482… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Religious and spiritual health axis (RS) as a formally scored, equal-weight dimension in a composite clinical health index

A method for measuring and formally scoring a patient's religious and spiritual health — using validated instruments such as FACIT-Sp, RCOPE, and daily spiritual practice self-reports — as a first-class axis within a composite health index with equal computational weight to physical, mental, and social axes. The axis contributes directly to the composite CH formula and to token issuance eligibility under the same thresholding mechanism as all other axes.

⟶ Why patentable: Spiritual wellbeing is measured in palliative care (FICA, FACIT-Sp) but not included as a formally scored equal-weight axis in any known composite health index formula with economic/incentive implications.
CH-IP-008 sha256:d97f03ea0308d0ca… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

21-billion hard-cap health token supply with era-based issuance scheduling and reserve attestation

A health token (HCR) issuance protocol with a fixed 21-billion token hard cap and era-based issuance rate scheduling: the issuance rate per verified health action decreases on a configurable schedule as cumulative supply approaches the cap, analogous to Bitcoin's halving but triggered by supply percentage rather than block count. Each era transition requires a reserve attestation published by the issuing entity confirming alignment between the current supply, the issuance schedule, and the era parameters. Attestation signatures are recorded on-chain.

⟶ Why patentable: Fixed-cap token supply schedules exist in cryptocurrency. The specific application to health action tokens with clinical-event-based issuance triggers, era-based rate scheduling, and quarterly reserve attestation is novel in the healthcare context.
CH-IP-009 sha256:eee868a3cce44ca8… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

The Circular Health Economy: earned health tokens redeemed for clinical care costs that generate more earned tokens

A closed-loop healthcare economic model in which a patient earns health tokens (HCR) through verified health actions and axis improvements, redeems those tokens directly against clinical encounter costs, copays, prescription fees, and other care expenses — and the care encounters themselves generate further axis improvements and therefore further token issuance. The loop is: healthy behavior → mint HCR → apply HCR to care cost → care validates and improves axes → mint more HCR. The system is designed so that a patient with consistently good health behaviors can approach net-zero out-of-pocket costs. Settlement is peer-to-peer between patient wallet and Network Clinic wallet via on-chain transaction, with no insurance intermediary required for the HCR-denominated portion of payment.

⟶ Why patentable: Existing wellness reward programs (Vitality, Hinge Health, Rally) give gift cards or insurance discounts for completing health activities. No prior art found for a system where: (1) tokens earned from health directly pay for care costs, (2) the care itself generates more tokens through axis scoring, and (3) settlement is peer-to-peer on a permissioned blockchain. The circular closed-loop structure and the peer-to-peer settlement without insurance intermediary are novel.
CH-IP-010 sha256:6cacf7936e1b424d… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Pharmacy Rx copay settlement via earned health tokens with dispensing-event token issuance

A method for settling prescription drug copays using patient-earned HCR tokens, where the patient's connected wallet is debited the token-denominated copay equivalent at point of dispensing. Additionally, certain prescription fills — particularly maintenance medications for chronic conditions — trigger a token issuance event tied to the PV (Preventive/Vital) or NM (Neurological/Mental) axis, representing verified medication adherence. The dispensing event is attested by the pharmacist validator node and recorded on-chain, with the PHI of the prescription stored off-chain and linked via hash.

⟶ Why patentable: Cryptocurrency payment at pharmacies has been piloted (Bitcoin at independent pharmacies) but involves no health-axis feedback loop. The specific combination of: (1) HCR earned from health actions paying the Rx copay, and (2) the dispensing event itself triggering an axis-improvement token issuance, creates a novel bidirectional pharmacy-health-token integration not found in prior art.
CH-IP-011 sha256:346d189de6ae2fbf… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Real-time wearable sensor stream mapped to CH axis sub-scores with per-instrument confidence weighting

A method for continuously mapping physiological data streams from wearable sensors to the eight CH axis sub-scores: heart rate variability and VO₂ proxy → PO (Physical Output); sleep architecture stages → NM and TA axes; continuous glucose monitoring trends → PO and PV axes; HRV stress markers → ER axis; step count and circadian alignment → TA axis. Each wearable data point is assigned a per-instrument confidence weight derived from published clinical validation studies for that sensor-measure pair (e.g., consumer optical HRV carries confidence 0.62 vs. medical-grade chest ECG at 0.95). Axis sub-score updates from wearables are weighted by confidence score before contributing to the CH composite, preventing low-quality sensor readings from disproportionately affecting the overall score.

⟶ Why patentable: Wearable composite health scoring (Apple Watch, Fitbit wellness score) aggregates sensor data to a single metric. No prior art found for: (1) mapping wearable streams specifically to named CH axes, and (2) weighting axis contributions by per-instrument clinical confidence scores that are published and auditable. The confidence-weighted axis mapping is the novel claim.
CH-IP-012 sha256:1f768cf33bfe4c8e… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

HIPAA-compliant dual-layer blockchain architecture: on-chain economic events with off-chain PHI linked by cryptographic hash

A blockchain architecture designed specifically for HIPAA compliance, in which: (1) all economic events (token issuance amounts, encounter settlement amounts, timestamps, axis types) are recorded publicly on-chain with no PHI present; and (2) the clinical records and PHI that generated those events are stored off-chain in a HIPAA-compliant encrypted store, with only a cryptographic hash of each clinical record included in the on-chain economic event. A verifier can confirm that the off-chain record produced the on-chain economic event by hashing the clinical record and comparing to the on-chain hash — without the clinical record needing to be on-chain. This architecture achieves blockchain transparency and auditability for economic events while maintaining HIPAA minimum-necessary access controls for PHI.

⟶ Why patentable: Off-chain storage with hash pointers is a known pattern (WO2018039312A1). The specifically HIPAA-motivated design where economic events (not clinical data) are the on-chain primitive, combined with the dual-layer audit path (economic auditor sees token amounts, clinical auditor sees PHI under HIPAA authorization, neither sees both without authorization) is a novel legal-technical combination not found in prior art.
CH-IP-013 sha256:d7cae83c928c3b11… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

AI-interpreted dream journal as a clinical neurological/mental health axis data input

A method for using AI-generated interpretations of patient-authored dream journal entries as structured clinical data inputs to the NM (Neurological/Mental) axis sub-score. The patient records a dream journal entry in natural language; an AI model (e.g., Grok-2 or equivalent) generates a structured interpretation mapping the dream content to mental health indicators (emotional valence, stress markers, identity themes, trauma processing signals); the structured output is then scored by a validated mapping to NM axis instruments (e.g., PHQ-9 adjacent scoring, sleep quality markers). Dream entries are treated as patient-generated health data under HIPAA, with PHI handling and consent requirements identical to clinical notes. No dream entry is used for AI training without explicit patient consent.

⟶ Why patentable: AI dream interpretation tools exist (journaling apps). Clinical mental health scoring tools exist. No prior art found for using AI-structured dream journal interpretations as a formal, axis-mapped, consent-gated clinical health data input that contributes to a composite health score and token issuance eligibility.
CH-IP-014 sha256:70e16357b222d18b… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

CH score bracket threshold as automated clinical escalation trigger with configurable outreach SLA

A clinical workflow method in which a patient's CH composite score bracket transition (e.g., dropping from AVERAGE to POOR, or from BELOW AVERAGE to SEVERE) automatically triggers a configurable clinical outreach event: a care coordinator message, a provider inbox alert, or an automated appointment booking request. The trigger is bracket-boundary crossing, not a specific score value, making it robust to scoring fluctuations within a bracket. Each bracket boundary carries a configurable outreach SLA (e.g., POOR → contact within 72 hours, SEVERE → contact within 24 hours, CRITICAL → contact within 4 hours). The escalation record is written to the audit log with the triggering score delta and the assigned SLA.

⟶ Why patentable: Clinical escalation systems (sepsis early warning scores, MEWS) trigger on specific vital sign thresholds. CH bracket-based escalation on a composite behavioral/clinical score — with SLA-tiered response requirements and audit-logged bracket transitions — is a novel clinical workflow automation pattern for preventive and chronic care management.
CH-IP-015 sha256:2e15586075fb287c… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Live research cohort recruitment via real-time CH axis score matching against researcher-specified inclusion criteria

A research recruitment method in which a researcher specifies inclusion and exclusion criteria using CH axis scores as filters (e.g., "NM axis ≥ 45, ER axis ≤ 60, age 35–55, consented to longitudinal studies") and the system matches consented patients in real time based on their current computed axis scores — not static EHR fields. The match is computed continuously as axis scores update from new clinical encounters and wearable data. When a consented patient transitions from non-matching to matching, the researcher receives a notification. The patient is never identified to the researcher until they independently consent to the specific study via the DataVault consent flow. The axis-score matching layer operates on de-identified scores only.

⟶ Why patentable: Clinical trial recruitment systems match patients on static EHR criteria (diagnosis codes, age, lab values). No prior art found for a system matching patients on continuously-computed composite health axis sub-scores that update in real time from both clinical and behavioral data streams, with de-identified score matching followed by explicit per-study consent before identity disclosure.
CH-IP-016 sha256:6d7b58bcfded894c… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Per-axis HCR token yield differentiation weighted by axis-specific clinical outcome evidence

A token issuance method in which the base HCR yield per unit of axis improvement differs by axis, with yield weights derived from published clinical evidence for the mortality and morbidity impact of improvement in that axis. Axes with stronger clinical outcome evidence (e.g., PV — preventive care completion reduces all-cause mortality; PO — physical activity reduces cardiovascular risk) receive higher base yield weights than axes with weaker or emerging evidence. Yield weights are published per-cycle in a parameter file signed by the clinical advisory board, and are updated annually as new evidence emerges. This prevents gamification of low-clinical-impact behaviors at the expense of high-impact health improvements.

⟶ Why patentable: Wellness reward programs pay flat rates per activity regardless of clinical significance. Evidence-weighted token yield — where the yield per axis-point-improved is calibrated to published clinical outcome evidence for that axis — creates a health-economic incentive structure aligned to clinical evidence. No prior art found for this specific evidence-weighted yield differentiation mechanism.
CH-IP-017 sha256:6a79a58e26918400… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

HMAC-SHA256 chain-signed audit log: each entry signs its predecessor, creating a tamper-evident immutable chain

A healthcare audit logging system in which each log entry contains the HMAC-SHA256 signature of the previous entry, creating a hash-chained sequence. Any modification of any historical entry invalidates all signatures of all subsequent entries, making tampering detectable by signature verification. The HMAC key is derived via HKDF from a root key that is split across multiple custodians. The system is purpose-built for HIPAA audit log integrity requirements: access to PHI, authentication events, prescription actions, and token transactions are all logged as entries in the chain. The chain can be verified independently by a third-party auditor using the public hash sequence without requiring access to the content of the log entries.

⟶ Why patentable: Hash-chained logging structures exist (blockchain, certificate transparency logs). The specific application to HIPAA audit logs — where the chain-signature architecture satisfies HIPAA integrity requirements while allowing third-party verification without PHI exposure, and where the HMAC root key is Shamir-split across custodians — is a novel combination for healthcare compliance logging.
CH-IP-018 sha256:7db21258fefebc18… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

AES-256-GCM field-level PHI encryption with QR-payload cross-device key transfer and atomic revocation on device unlink

A method for encrypting each PHI field individually — rather than encrypting records or storage at rest — using AES-256-GCM, so that a data recipient who decrypts one field cannot decrypt others without the field-specific key. Keys are derived per-device and per-account using HKDF from a root key. When a patient links a second device, the root key is transferred via an authenticated QR code payload (HMAC-SHA256-signed, with 5-minute expiration and single-use nonce) so both devices can decrypt all fields. When a device is unlinked, its derived keys are destroyed atomically — any field encrypted with that device's key becomes inaccessible on that device, while remaining accessible on other linked devices. The QR transfer is gated behind biometric authentication and rate-limited (5 attempts → 15-minute lockout).

⟶ Why patentable: Field-level encryption for health records exists in research. Device-linked key derivation with QR-based key transfer (HMAC-signed, expiring, nonce-protected) followed by atomic destruction on device unlink — specifically designed for iOS Secure Enclave + CloudKit architecture — is a novel combination addressing the multi-device patient health data access problem without a central key escrow.
CH-IP-019 sha256:4557bcefa96e02d4… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Healthcare mesh VPN with clinical-event-triggered key rotation and multi-tenant protocol extension

A 100% in-house VPN protocol built on the Noise IK handshake framework that extends the wire format with a 16-bit tenant ID field enabling multi-clinic routing without a central relay, implements a purpose-built EmergencyRevoke packet type that revokes a peer's tunnel within a single round-trip upon detection of a PHI breach or credential compromise, and triggers key rotation not only on a time schedule but on clinical events (patient session start/end, shift change, administrative audit trigger). The clinic-node role runs on a dedicated Linux sub-hub that terminates device tunnels, forwards to the corporate gateway, and maintains site-to-site bridges to peer clinics — all coordinated by a peer authority microservice that maintains the mesh graph. Every tunnel event is logged to the Conceptual Chain audit trail as a HIPAA access record.

⟶ Why patentable: Existing VPN protocols (WireGuard, OpenVPN, IPSec) have no tenant routing layer, no clinical-event-triggered rotation, and no blockchain-integrated audit trail at the protocol level. WireGuard specifically has no concept of multi-tenant routing within a single endpoint. The combination of (a) 16-bit tenant ID in the Noise IK wire format, (b) clinical-event triggers for key rotation, (c) EmergencyRevoke packet type, and (d) per-tunnel blockchain audit emission is novel in healthcare VPN design. No prior art found for healthcare-specific VPN protocol with embedded tenant routing and clinical-event key lifecycle management.
CH-IP-020 sha256:b53316c8e1e4563c… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Apple Silicon Secure Enclave as hardware-rooted validator node for healthcare blockchain record attestation

A blockchain validation architecture in which Apple Silicon Mac Studio workstations serve as clinic-grade validator nodes, using the on-device Secure Enclave coprocessor as the root of trust for validator signing keys. When a validator node attests a new medical record block, the attestation signature is generated inside the Secure Enclave — the private signing key never enters main memory and cannot be extracted by software, even with root access to the host OS. Each validator node registers its Secure Enclave public key with the Conceptual Chain peer authority during enrollment. Clinical work performed on the system — EHR entries, billing events, prescriptions, lab results — is hashed and submitted as candidate blocks; validator nodes reach consensus before committing. This hardware-rooted attestation creates a chain of custody from the clinical event to the immutable block record, with the Secure Enclave guarantee that no node can sign fraudulent attestations without physical hardware compromise.

⟶ Why patentable: TPM-based and HSM-based blockchain validators exist in enterprise settings. Using Apple Silicon's Secure Enclave — specifically its hardware-enforced key isolation, Secure Boot chain, and anti-replay counter — as the signing engine for healthcare blockchain validators in a clinic deployment is novel. No prior art found for Apple Silicon Secure Enclave as the trust anchor for HIPAA-grade distributed ledger validator nodes. The combination of Secure Enclave attestation + clinical work proof objects + HIPAA audit binding is a new architecture.
CH-IP-021 sha256:da372916b96981f2… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Clinical EHR work actions as proof objects minting company treasury tokens for employee compensation, insurance, and operational costs

A system in which verified clinical work actions performed by employees on the EHR — SOAP note creation, billing code completion, medication dispensing, lab result entry, care plan updates — are recorded on the Conceptual Chain as proof-of-work objects attributed to the performing employee and their clinical role. Each proof object is assigned a work-unit value calibrated to the clinical complexity and regulatory weight of the action (a completed E/M billing encounter scores higher than a routine vitals entry). The sum of all proof objects minted in a pay period determines the total HCC token issuance to the company treasury for that period. The company's HCC treasury is then used to fund employee wages, performance bonuses, health insurance premiums, and utility costs — creating a circular economy in which the value employees produce on the platform directly funds their compensation. Employees may also receive a portion of minted HCC as a productivity bonus credited to their personal wallet.

⟶ Why patentable: Labor tokenization concepts exist in general (time-based DAOs, task bounties). Clinical EHR work-action proof objects that (a) mint company treasury tokens calibrated to clinical complexity, (b) fund FICA-compliant employee payroll and insurance from the minted pool, and (c) create a closed-loop circular economy where healthcare labor value directly finances the healthcare workforce — is a structurally novel system. No prior art found for EHR-action-triggered token minting used to fund employee compensation in a regulated healthcare environment. This is a first in both blockchain labor economics and healthcare workforce finance.
CH-IP-022 sha256:44a6ef997b609ba5… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Photo-based meal analysis with medication interaction screening and CH health formula axis impact prediction

A method in which a patient photographs a meal and the system performs: (1) food item identification and nutritional decomposition via computer vision and a validated nutritional database; (2) automated cross-reference of identified foods against the patient's active medication list to flag food-drug interactions (e.g., warfarin + dark leafy greens → INR impact, MAOI + tyramine-rich foods → hypertensive crisis risk, grapefruit + statin → cytochrome P450 inhibition); (3) projection of the meal's nutritional impact onto each of the eight CH health axes (e.g., macronutrient composition mapped to PO — physical output; micronutrient density mapped to ES — eating and sleep quality; omega-3 index mapped to NM — neural and mental performance); and (4) computation of the predicted delta to the patient's CH composite health score if the meal is consumed, displayed as a before/after axis radar with a net CH score change. The system surfaces the interaction alerts and axis impacts before the patient eats, enabling an informed decision rather than a retrospective nutritional log.

⟶ Why patentable: Photo-based food logging apps (MyFitnessPal, Lose It!) identify foods and estimate calories. AI meal analysis apps (Google Lens, Bitesnap) identify items. Drug-food interaction checkers exist in clinical pharmacology databases. However, no prior art found for: (a) a unified pipeline from photo capture → food ID → medication interaction alert → CH formula axis impact projection → composite health score delta — as a pre-meal decision-support tool. The mapping of identified foods to the specific CH axis structure, combined with real-time medication interaction screening integrated into the patient's live medication list, constitutes a novel clinical nutrition + pharmacology + health-scoring integration.
CH-IP-023 sha256:75a550078bb9b778… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Proof-of-Health consensus mechanism: verified clinical event records as block validation proof objects in a purpose-built healthcare distributed ledger

A purpose-built distributed ledger consensus protocol — Proof-of-Health (PoH) — in which block validation does not require computational work (Proof-of-Work), economic stake (Proof-of-Stake), or pre-designated authority attestation (Proof-of-Authority). Instead, the consensus proof object is a verified clinical event: a physician-signed EHR entry, a lab result attested by a CLIA-certified laboratory, a confirmed biometric measurement from a calibrated wearable device, a completed clinical encounter with a billing code, or a verified health axis improvement delta crossing a clinically significant threshold. Validator nodes are healthcare institutions (hospitals, clinics, labs) that have completed HIPAA Business Associate Agreement enrollment with the peer authority. Each proposed block must contain at least one valid clinical event proof object; blocks without valid proof objects are rejected by consensus. The block header stores a health event metadata index (event type, institutional validator ID, patient account hash, axis affected, axis delta, timestamp) alongside the standard cryptographic fields. The complete blockchain system — including the peer authority, enrollment protocol, block format, consensus rules, and token issuance trigger — was designed and coded entirely in-house by Conceptual Healthcare Corporation without forking, deriving from, or modifying any existing blockchain codebase (Bitcoin, Ethereum, Hyperledger, Solana, Cosmos, Polkadot, or other public chain). No smart contract runtime, no EVM, no UTXO model — a clean-room healthcare-native ledger architecture.

⟶ Why patentable: Blockchain systems for healthcare records exist (US20150332283A1 — PoW for healthcare transactions; Hyperledger Fabric permissioned networks). None uses a purpose-built consensus where the healthcare event itself IS the proof object replacing all compute and stake requirements. The PoH mechanism — where clinical event validity determines block acceptance rather than hash difficulty or validator stake — is a novel consensus protocol distinct from all existing mechanisms. The clean-room implementation (no derivative code from any existing chain) further strengthens the novelty claim. The combination of: (a) PoH consensus, (b) HIPAA-enrolled institutional validators, (c) health event metadata in block headers, (d) dual-token issuance triggered by consensus acceptance, and (e) zero dependency on any existing chain standard — constitutes a patent-eligible system and method claim under 35 U.S.C. § 101 as a specific implementation addressing concrete technical problems in healthcare data integrity, not abstract math.
CH-IP-024 sha256:bafa1c9c2f7ed52d… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

HIPAA-aware selective PHI redaction at the blockchain consensus read layer via role-verified field projection

A system and method for enforcing HIPAA minimum-necessary access (45 CFR § 164.514) directly within the blockchain's query and read path, rather than at an application layer above the chain. When a caller requests a block or event record from the Conceptual Chain, the chain's read API resolves the caller's HIPAA authorization level against an on-chain role registry. Authorized callers (treating clinician, patient account holder, billing authorized staff) receive the full field set. Unauthorized callers (anonymous auditors, research consumers, cross-chain observers) receive a projected view in which PHI fields — diagnosis codes, medication names, patient identifiers, lab values — are replaced with standardized redaction markers ([PHI-REDACTED]), while non-PHI metadata (block hash, event type, institutional validator ID, timestamp, axis delta) remains fully exposed. Critically, the block hash commitment is computed over the complete unredacted record and published regardless of caller authorization; this allows any observer to independently verify the block's existence, timestamp, and chain integrity without accessing PHI. A secondary cryptographic proof (a commitment scheme over the redacted fields) is included in the block header so that an authorized party can subsequently prove to an auditor that the redacted-view hash is consistent with the full committed hash — without re-exposing PHI. This architecture resolves the fundamental tension between blockchain immutability (data cannot be deleted once written) and HIPAA's minimum-necessary standard (PHI must be disclosed only to the extent necessary for the authorized purpose).

⟶ Why patentable: Field-level encryption on blockchain (US10616239B2; Hyperledger Fabric private data collections) is the closest prior art — but these systems use binary key access: you either hold the decryption key and see everything, or you hold no key and see nothing. No prior art implements role-resolved minimum-necessary field projection at the consensus/read layer itself, where the chain actively strips PHI fields at query time based on verified caller role and produces two independently verifiable views (full and minimum-necessary) of the same committed block. The combination of: (a) on-chain role registry consulted at read time, (b) field-level projection producing a redacted view without any key material, (c) hash commitment over the full record enabling integrity proof from the redacted view, and (d) HIPAA minimum-necessary semantics expressed as chain access control — constitutes a novel system addressing the concrete technical problem of reconciling HIPAA disclosure obligations with blockchain immutability. Not abstract: it is a specific data-access enforcement mechanism embedded in the chain's network layer.
CH-IP-025 sha256:bed8e20320de727a… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Role-differentiated clinical communication platform with on-chain HIPAA audit receipts spanning phone, messaging, and job-function dashboards

A unified healthcare communication infrastructure in which every communication channel — VoIP phone calls (SIP/Asterisk), encrypted direct messaging, and email threads — generates an immutable, timestamped receipt written to the Conceptual Chain at the moment of communication. Each on-chain receipt records: hashed communicant identities (no plaintext PII), communication type (voice/message/email), duration or byte count, a PHI-involvement flag (set by keyword detection or explicit sender marking), the clinical context anchor (patient account hash if applicable), and the institutional validator ID of the sending facility. The system presents role-differentiated communication dashboards: a clinician interface surfaces patient-linked communications and clinical context; a billing coordinator interface surfaces insurance, claim status, and payer communications; an administrative interface surfaces operational and scheduling communications; a corporate interface surfaces executive and board communications — all driven by the same underlying communication stack but with UI projections defined by the user's verified chain role. Each on-chain communication receipt serves two simultaneous functions: (1) a HIPAA-compliant audit record satisfying 45 CFR § 164.528 (accounting of disclosures) and 45 CFR § 164.312(b) (audit controls), and (2) a Work-to-Earn proof object (per CH-IP-022) that triggers HCC token minting when the communication constitutes a billable clinical work unit (e.g., a physician-patient phone consult, a billing coordinator insurance call, a care coordinator referral message). The phone subsystem uses a SIP middleware chain-writer service; the messaging and email subsystems use an end-to-end encrypted relay with a chain-anchored delivery confirmation. All code — SIP integration, chain writer, dashboard UI, role resolver — was written entirely in-house.

⟶ Why patentable: HIPAA-compliant messaging platforms exist (Imprivata Cortext, Klara, Epic MyChart messaging). VoIP in healthcare exists (Cisco CUCM, Avaya). None ties all communication channels to an on-chain immutable receipt, and none uses those receipts simultaneously as HIPAA audit evidence AND as Work-to-Earn proof objects for token minting. The role-differentiated dashboard system — where verified chain roles drive which communication view is presented, not just which data is filtered — is architecturally novel. The dual-function receipt (HIPAA audit trail + work-proof object) creates a new class of on-chain artifact that serves regulatory compliance and economic incentive simultaneously, using a single write event. This addresses the concrete technical problem of maintaining HIPAA communication audit trails across heterogeneous channels (voice, message, email) without requiring manual documentation, while simultaneously enabling clinical labor to generate verifiable work proofs. Under 35 U.S.C. § 101, it is a specific system solving specific healthcare infrastructure problems — not abstract.
CH-IP-026 sha256:4c76c7caac68756c… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Health-behavior-verified token accumulation as zero-premium, zero-copay patient care funding mechanism with closed-loop treasury and formula-linked mint rate

A healthcare financing system and method in which patient care costs — premiums, co-payments, deductibles, prescription costs, and ancillary service fees — are progressively offset toward zero exclusively through the patient's accumulated balance of HEALTHCOIN (HCR), a native cryptocurrency earned only by completing on-chain-verified health improvement events across eight clinically defined axes: Physical Output (PO), Neurological Mastery (NM), Emotional Resilience (ER), Social Connection (SC), Rest & Sleep (RS), Environmental Symbiosis (ES), Toxin Avoidance (TA), and Preventive Vitals (PV). HCR is never issued from a reserve, purchased, or awarded by an employer or insurer; every token in circulation entered the patient's wallet as a direct consequence of a verified axis-improvement event. The verification pipeline is multi-source and cryptographically sealed: raw sensor data (wearable, continuous glucose monitor, spirometer, heart-rate variability sensor) is collected by the Guardian Orb™ application, cross-referenced against clinical attestations (lab results, physician-signed EHR entries, pharmacy adherence records), and written as an immutable event record to the Conceptual Chain before HCR is minted to the patient's wallet. No health improvement event is accepted as a valid mint trigger unless it meets per-axis evidence thresholds (e.g., A1c reduction ≥0.5 requires a CLIA-certified lab result; VO₂ max improvement requires sustained wearable trace plus clinical review). Daily per-axis mint caps and progressive improvement thresholds prevent gaming: a patient cannot indefinitely earn HCR by repeating the same action at the same fitness level; the marginal HCR earned per health action decreases as the corresponding axis score rises toward its ceiling. The HCR mint rate for any given axis-improvement event is scaled by the patient's CH formula score delta: CH = (S × Sp)^C × (T + E)^p, where improvement on a lower-scoring axis yields a higher marginal HCR mint because its clinical impact on the aggregate CH score is greater. Patients with lower baseline scores — who face greater barriers to health improvement — earn more HCR per unit of improvement than patients already near peak health, creating an equity-adjusted incentive structure. Patients in higher-burden environments (elevated PM2.5, food deserts, high-stress zip codes) receive a contextual adjustment to the ES axis mint rate to reflect the additional effort required to achieve the same improvement. HCR redeems directly against care costs at point-of-service within any Conceptual Health® facility or network pharmacy. As the patient's HCR balance crosses defined thresholds (tied to CH score tier), their care cost tier changes: standard rates → reduced co-pays → zero co-pays → zero premiums. The care costs that HCR offsets are funded by the company's HCC (Health Data Coin) treasury — a separate token earned exclusively through Work-to-Earn (CH-IP-022) clinical labor events on the same chain. This creates a closed-loop where healthier patients generate less care cost AND the clinical labor required to care for them generates the HCC that funds the offset, without any external subsidy, employer contribution, or government program. The patient never pays to earn HCR; clinics never see a bill for hosting the mint system; the company does not mint HCR or HCC for its own account.

⟶ Why patentable: Value-based care and pay-for-performance programs exist (CMS MSSP, HEDIS) — but they pay providers for outcomes, not patients. Health savings accounts (HSAs) are funded with pre-tax employer/employee dollars, not earned by health behavior. Wellness reward programs (Virgin Pulse, Vitality, Oscar Health $1/day walking, Cigna Healthy Rewards) grant employer-funded points or small cash incentives for single activities — they are add-on subsidy layers, not primary care cost funding mechanisms, and none is on-chain. Sweatcoin earns tokens for steps but they cannot redeem for actual clinical care and there is no multi-axis formula. No prior art combines: (a) 8-axis cryptographically-verified health improvement as the exclusive HCR mint trigger, (b) CH-formula-linked marginal mint rates that resist gaming and encode equity adjustment, (c) direct care cost offset (not just discount) reaching $0 co-pay and $0 premium thresholds, (d) closed-loop treasury funding from the same chain's Work-to-Earn mechanism (CH-IP-022) with no external subsidy, and (e) Guardian Orb multi-source attestation as the verification engine. The result is a complete healthcare financing architecture — not a wellness incentive program — where health behavior IS the payment mechanism, self-funded by the economic activity of the clinical system. Under 35 U.S.C. § 101, this solves concrete technical and economic problems (healthcare affordability without subsidy; gaming-resistant verified health measurement; self-funding care economics) through a specific, non-abstract technical system. Under 35 U.S.C. § 102 and § 103, no prior art teaches this combination of on-chain verification, formula-linked mint rate, care cost elimination, and closed-loop treasury funding.
CH-IP-027 sha256:fdb2f8b2f6cd1139… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Schema-embedded multi-framework real-time compliance enforcement with synchronous pre-response audit, automated 50-state law update, and cross-framework gap deduplication

A healthcare information system architecture and method in which regulatory compliance obligations across simultaneously active federal and state frameworks are enforced at the data schema layer — embedded directly in the data field definition — rather than in a separate compliance application layer above the data. Each data field in the system's data contracts carries a compliance array listing every regulatory framework control citation applicable to that field (e.g., ["HIPAA-164.312(b)", "SOC2-CC7.2", "21CFR-11.10(e)", "ONC-170.315(g)(10)"]). When any field with a non-empty compliance array is read by any caller, the data-layer adapter simultaneously: (1) writes an append-only audit log entry identifying the caller identity, field ID, framework tags triggered, timestamp, response hash, and access result — and does so synchronously, before the field value is returned to the caller (asynchronous audit logging is architecturally forbidden; if the audit write fails, the field access is denied and the caller receives a closed-failure response); (2) evaluates the caller's session credentials against every framework tag present and enforces the strictest applicable control (mask, deny, or permit with logging); (3) records the multi-framework control citations that fired, enabling a single access event to satisfy evidence requirements under all applicable frameworks from a single write operation. The system simultaneously monitors and enforces compliance obligations across the following regulatory and standards frameworks as a unified posture — not one at a time: HIPAA (45 CFR §164.312, §164.514, §164.528, §164.530), HITECH (42 U.S.C. §17931), ONC Cures Act (§170.315(g)(10)), FDA 21 CFR Part 11 (electronic records and signatures), SOC 2 Type II (AICPA TSC CC-series), HITRUST CSF, FISMA (44 U.S.C. §3554), Section 508 of the Rehabilitation Act, 42 CFR Part 2 (substance abuse records), CLIA (42 CFR Part 493), NCPDP SCRIPT standard, FinCEN/BSA/AML requirements, CMS Conditions of Participation (42 CFR §482, §485), and 50-state medical records retention and minor consent laws. The 50-state coverage is maintained through a dedicated state_compliance_profiles database relation (one record per state, storing all applicable statutes and their effective enforcement parameters), a state_law_update_checks automated monitoring system that detects state statute changes and pushes updated profiles to all active clinic instances without requiring a code deployment, and a state_minor_consent_rules relation encoding jurisdiction-specific age thresholds and parental disclosure exceptions. Cross-framework gap analysis is performed by the compliance_gap_assessments engine, which maps each identified compliance gap to every framework it affects simultaneously. A single remediation action closing one control gap is credited against all framework requirements it satisfies — deduplicating remediation work and producing a consolidated compliance posture score that reflects the cross-framework effect of each change. When a security incident is recorded in incident_record, the system automatically evaluates the incident's scope against all active framework obligations and generates the required notifications and response timelines for each: HIPAA Breach Notification Rule (45 CFR §164.400), HITECH notification, state breach notification statutes, and SOC 2 incident response evidence simultaneously, from a single incident record. Infrastructure compliance enforcement is further extended through: (a) a Terraform module (compliance/baa-tracker) that enforces Business Associate Agreement coverage at deploy time — a deploy without a BAA on file for every subprocessor cannot proceed; (b) a security_advisory_feeds and threat_intelligence subsystem that ingests external security advisories and CVEs in real time and evaluates each advisory's impact across all active framework obligations simultaneously; (c) a per-session PHI watermark (watermark_seed embedded in the session JWT) that renders a translucent session-identifying overlay on every PHI surface, enabling screenshot attribution to a specific authenticated session as a HIPAA Safeguards Rule compliance artifact; (d) a governance changelog (governance_changelog, governance_proposals, governance_votes) that records every change to compliance policies as an immutable governance artifact, enabling retroactive demonstration of when and why any compliance control was modified. All 6 domain APIs (Core :8000, Clinical :8001, Corporate :8002, University :8003, Church :8004, Blockchain :8005) share a single HIPAA middleware layer (backend/domains/shared.py), ensuring that compliance enforcement is applied consistently across every data domain without per-domain reimplementation.

⟶ Why patentable: GRC platforms (Vanta, Drata, Secureframe, Lacework) operate above the data layer: they pull audit evidence after the fact, assess compliance against one framework at a time, and do not enforce compliance at the moment of data access. AWS Security Hub and Azure Defender assess cloud infrastructure configuration but do not perform data-field-level multi-framework enforcement and have no healthcare-specific regulatory coverage. Epic Systems and other EHR vendors implement HIPAA audit trails for a single framework; they do not simultaneously enforce SOC2, FISMA, 21 CFR Part 11, 42 CFR Part 2, FinCEN, and 50-state laws from a single field-access event. No prior art combines: (a) regulatory citations embedded in the data schema itself as enforcement-normative tags, (b) synchronous pre-response multi-framework audit logging that cannot be bypassed without denying the access, (c) automated 50-state law update detection with zero-deploy profile propagation, (d) cross-framework gap deduplication that maps a single remediation to all frameworks it satisfies simultaneously, (e) unified incident response across all applicable notification frameworks from a single incident record, (f) deploy-time BAA enforcement via infrastructure-as-code, (g) session-JWT-embedded PHI watermarking as a per-session compliance artifact, and (h) a governance changelog as an immutable compliance-control-change record. This is a complete, enforcement-first compliance architecture — not a monitoring or evidence-gathering layer — spanning more regulatory frameworks simultaneously than any known prior system. Under 35 U.S.C. § 101, it is a specific technical system solving the concrete technical problem of enforcing obligations under simultaneously applicable, partially overlapping regulatory frameworks without requiring separate compliance enforcement code per framework. Under § 102 and § 103, no prior art teaches this schema-embedded, synchronous, multi-framework, 50-state approach.
CH-IP-028 sha256:cb849dd472a98de3… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

AI-driven contextual clinical display on hardware phone via real-time call transcription with dual-channel provider workstation co-navigation

A system and method for automatically navigating a hardware-based clinical display telephone (Yealink T58W Pro, 7" Android touchscreen, 1024×600) through contextually relevant patient record panels in real-time, based on live speech-to-text transcription of an active patient–provider telephone call, without any manual touch input from the provider. The system comprises: (1) an Asterisk AMI event listener that detects incoming calls, resolves the calling party to a registered patient account via caller ID verification, and pushes initial patient summary data to the phone display via a persistent WebSocket connection; (2) an audio fork service (MixMonitor) that captures the bidirectional call audio stream and routes it to an embedded Whisper speech-to-text engine; (3) a two-tier Clinical Context Engine that classifies the transcription stream into clinical topic categories using a keyword fast-path (sub-millisecond latency, hardcoded clinical vocabulary) with an LLM inference fallback (200–500ms) for context requiring semantic understanding beyond keyword matching; (4) a display navigation controller that translates detected clinical topics to one of nine predefined clinical screen configurations (patient orb summary, vital signs, laboratory results, active medications, appointments, immunization records, allergy history, medical history, and patient identity verification) and pushes navigation commands to the phone WebSocket, with a 3-second debounce and hysteresis logic to prevent screen flicker on topic transitions; (5) a backend orchestrator that coordinates all five components and maintains call session state in-memory for the duration of each call. A companion feature — Call Assist Mode — simultaneously auto-navigates the provider's clinical workstation browser to the same panel as the phone display, using a separate WebSocket endpoint (/api/v1/phone/assist), so that both the hardware phone screen and the provider's EHR view track the conversation without manual navigation. Call Assist Mode is toggleable per-provider and defaults to the value of CALL_ASSIST_DEFAULT_ENABLED. The phone display is served as a React single-page application at /phone-display, rendered inside an Android WebView APK shell installed on the phone. All patient data displayed is fetched through authenticated API calls scoped to the resolved patient context; no PHI is embedded in the WebSocket navigation commands themselves.

⟶ Why patentable: Hardware phone displays in healthcare show static caller ID (Cisco CUCM, Polycom), call routing menus (Avaya), or at most a manual EHR lookup shortcut. No existing product auto-navigates a clinical phone display — or a provider workstation — through structured patient record panels based on live call transcription content. The two-tier detection architecture (keyword fast-path + LLM fallback on the same transcription stream) is a novel inference pattern that balances latency and accuracy for real-time clinical context detection. The dual-channel co-navigation (phone hardware screen + provider workstation) from a single clinical context inference event creates a new category of zero-touch clinical workflow automation. Under 35 U.S.C. § 101: a specific machine (hardware phone + AMI + Whisper + LLM + WebSocket + 9-screen React SPA) solving the concrete clinical problem of navigation overhead during patient calls. Under § 102 and § 103: no prior art teaches live call transcription driving hardware phone screen navigation in a healthcare context, and no system links phone display navigation to simultaneous workstation co-navigation.
CH-IP-029 sha256:591673aa0430fd32… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Per-session JWT-seeded PHI surface watermarking with forensic screenshot tracing, keyboard-toggle instant redaction, and recipient-embedded export watermarking

A multi-layer protected health information (PHI) visual security system comprising three complementary mechanisms deployed across all PHI-rendering surfaces of a healthcare platform. First: a per-session screen watermark (ch-watermark.js) that extracts a cryptographic watermark_seed value from the authenticated user's session JWT and uses it to render a unique, session-specific translucent diagonal grid overlay on every PHI surface. The rendered pattern is deterministically derived from the seed — meaning any screenshot of a PHI surface can be forensically matched back to the exact authenticated session that produced it, through a lookup of the watermark_id field in the admin.audit_log. The watermark is invisible at normal viewing distances but detectable by forensic image analysis, providing a deterrent against unauthorized screenshot distribution without degrading clinical usability. The watermark_seed is provisioned server-side at JWT issuance and is unique per session, not per user — a single user's screenshots from different sessions produce different recoverable watermarks. Second: an instant over-shoulder redaction toggle (ch-redact.js) activated by a single keyboard shortcut (Cmd+Shift+H on macOS, Ctrl+Shift+H on Windows/Linux) that applies a CSS body class causing all elements marked with PII or PHI span classes to be replaced with mask characters — transitioning from a fully populated patient record view to a completely masked view in a single keypress, without a page load or API call, for over-shoulder safety when a non-authorized person approaches the workstation. The redaction state is local and non-persistent; it does not generate an audit event, does not modify data, and reverses immediately on the next keypress. Third: an export-mode watermark escalation that embeds an invisible, space-steganography-encoded recipient identity and timestamp into every PDF export and document share generated from the platform, enabling recipient identification in the event of unauthorized redistribution. The three mechanisms operate independently and are loaded on every PHI surface across the Clinical EHR, DataVault, Guardian Orb, and Provider AI properties via the shared ui_kits/_shared/ kit.

⟶ Why patentable: Static document watermarking is prior art (Adobe Acrobat, Workshare, Vera). User-account watermarks (per-user, not per-session) appear in some document management systems. No prior art implements: (a) session-derived (not user-derived) watermarking from a JWT-embedded seed, ensuring that different sessions of the same authorized user produce forensically distinguishable watermarks; (b) a keyboard-shortcut body-class PHI redaction toggle in a clinical EHR, operating entirely client-side without a server round-trip or audit event; (c) the combination of all three mechanisms (screen watermark + keyboard redaction + export embedding) deployed as a unified shared kit across multiple clinical application surfaces. The forensic traceability chain — screenshot → watermark pattern → watermark_seed → session JWT → audit log → identity + time — is a complete evidence chain not found in any existing clinical system. Under § 101: specific mechanisms solving concrete HIPAA Safeguards Rule compliance problems. Under § 102 and § 103: per-session JWT-seeded forensic screen watermarking in a healthcare EHR has no prior art.
CH-IP-030 sha256:d064bb5f23f818d0… CH Chain · attested 2026-05-05
2026-05-05 First public disclosure

Cryptographic multi-device healthcare account binding via HMAC-signed time-bound QR payload with in-payload AES key transfer, biometric gate, and Keychain-surviving identity recovery

A system and protocol for securely linking additional devices (up to four) to a single healthcare account, enabling cross-device synchronization of both account identity and AES-256-GCM encryption keys for protected health information, without server-intermediated key exchange. The linking initiator (primary device) presents a QR code containing a version 2 payload with the following schema: {accountMemberID, primaryDeviceUserID, orgName, encryptionKey, createdAt, nonce, schemaVersion, hmac}, where encryptionKey is the device's AES-256 PHI encryption key encoded for transfer, createdAt is an ISO 8601 timestamp, nonce is a UUID generated per QR display, and hmac is an HMAC-SHA256 signature computed over all other payload fields using a key derived from the encryptionKey via HKDF. The QR code is only displayed after the presenting device completes a local biometric authentication challenge (Face ID or Touch ID); if biometric authentication fails, the QR is not rendered. The QR payload has a 5-minute expiration window (payload createdAt plus 300 seconds); payloads outside this window are rejected. Each nonce is consumed by the first scan and invalidated; a background process removes expired nonces every 10 minutes, preventing replay attacks indefinitely. Receiving devices validate the HMAC signature before processing the payload; mismatched signatures or wrong schema versions are rejected with a user-visible error. Failed linking attempts are rate-limited: five consecutive failures within a session trigger a 15-minute lockout. Upon successful linking, the receiving device stores the accountMemberID, primaryDeviceUserID, and derived encryption key to the iOS Keychain (with NSFileProtectionComplete protection class) — a storage location that persists across application reinstalls and full device restores from backup, enabling complete identity and encryption key recovery after reinstall without requiring re-enrollment through a server.

⟶ Why patentable: OAuth 2.0 device authorization flow (RFC 8628) links devices via server-intermediated authorization codes — the server holds the key. FIDO2/WebAuthn device binding creates per-device credentials but does not transfer symmetric encryption keys between devices. WhatsApp Web QR linking authenticates a secondary device but transfers a session credential, not an AES encryption key for stored PHI. No prior art combines: (a) AES-256 PHI encryption key embedded directly in a QR payload (no server intermediation of the key material), (b) HMAC-SHA256 signature over the payload using an HKDF-derived key from the embedded encryption key (self-authenticating payload — no server needed to verify integrity), (c) biometric authentication gate before QR display (protecting the key material from unauthorized access), (d) time-bound nonce with replay protection (preventing QR reuse beyond a 5-minute window), and (e) Keychain-based identity and key persistence across iOS app reinstalls in a healthcare context (HIPAA-compliant account recovery without re-enrollment). The protocol is specifically designed for healthcare PHI synchronization — the encryption key embedded in the QR is the key used to encrypt-at-rest PHI in a separate CloudKit health container — which is architecturally distinct from general-purpose device linking protocols. Under § 101: a specific cryptographic system solving healthcare account recovery and PHI key synchronization. Under § 102 and § 103: no prior art teaches in-QR AES PHI encryption key transfer with HMAC-self-authentication in a healthcare context.
CH-IP-031 sha256:41b12b74f938cd7c… CH Chain · attested 2026-05-05
2026-05-06 First public disclosure

GuardianOrb Hearth — household federated health AI compute appliance with HCC compute mining, hardware-rooted PHI compartment, and consent-gated patient sandbox

A residential AI compute appliance (~$999 retail) sized for the corner of a household, that (i) runs Conceptual Health-branded language and vision models locally on accelerated silicon, (ii) joins a Conceptual Health® federated training mesh over an authenticated mesh-VPN tunnel, (iii) earns Healthcare Coin (HCC) tokens proportional to verifiable accelerator-TOPS contributed, household uptime, served-inference quality, and federated-round participation, (iv) hardware-roots a protected health information (PHI) compartment via a TPM 2.0-bound LUKS-encrypted volume with a per-device endorsement key tied to a Conceptual Health-issued device certificate, (v) exposes a sandboxed patient-AI tier inside firecracker microVMs where household members compose personal AI applications (meal planning, dream interpretation, voice journaling, family scheduling, fitness coaching, mental health companionship) with consent-mediated read access to the patient's clinical record published by the Conceptual Health network, (vi) automatically routes psychiatric-crisis or medication-change queries through a clinician-gated path with E911-grade location metadata to a licensed CH-network clinician, and (vii) participates in a spot-inference marketplace where idle household compute serves PHI-stripped requests from busy households or from the central CH fleet, paid in HCC, with token issuance gated on a per-instrument quality-attestation score.

⟶ Why patentable: Generic home AI hubs (Alexa, Google Home, Apple HomePod) sell user data as the revenue model and have no clinical-record integration, no HIPAA scope, no federated training contribution, and no token-paid compute marketplace. Federated-learning research platforms (Flower, FedML, NVIDIA FLARE) provide the federation primitive but do not combine it with consumer hardware ownership, household-level token economics, or clinician-gated crisis routing. Healthcare-AI appliances (NVIDIA Clara, edge pathology boxes) target clinics, not households, and do not include a patient-creation sandbox or tokenized compute mining. No prior art combines: (a) household-scale federated health AI participation, (b) HCC-denominated compute mining tied to verified federated rounds and accelerator-TOPS, (c) a hardware-rooted PHI compartment using TPM 2.0 + LUKS bound to a CH-issued device certificate, (d) a sandboxed patient-AI tier with mediated consent broker over a clinical record, (e) clinician-routed crisis primitive at the household edge with E911 metadata, and (f) a spot-inference marketplace with quality-attestation-gated token issuance. The novel combination forms a new product category that we call the "household health AI node," with consumer-grade hardware ($999 BoM target), enterprise-grade security (TPM-rooted, mesh-VPN authenticated), and patient-empowerment economics (households earn rather than being monetized).
CH-IP-032 sha256:43bc791a551ea606… CH Chain · attested 2026-05-06 · trust-ledger 86574ac2
2026-05-06 First public disclosure

Guardian Workspace — dual-profile cryptographically-isolated healthcare workstation with role-aware admin-managed app catalog and signed cross-device session handoff

A desktop client for healthcare workers that enforces hard isolation between Business and Personal browsing profiles via per-profile WebView partitions — separate cookie jars, separate localStorage, separate audit-chain segments. The application bundles a Conceptual Health-issued Root CA at compile time and forces all DNS resolution through DNS-over-HTTPS to a single CH-controlled resolver, eliminating MITM surfaces. App tiles are role-gated and fetched at runtime from a server-managed catalog endpoint, with admin-controlled per-user grants and revokes auditable to the same HMAC-chained log used for clinical events. Switching profiles wipes in-memory session state and forces a passkey re-auth, cryptographically preventing credentials and tokens from one profile reaching the other. A short-lived HMAC-signed handoff token lets a phone client (with bundled CA) move an authenticated session to the workstation (or vice versa) without ever exposing the underlying access token in transit.

⟶ Why patentable: Citrix Workspace, VMware Horizon, Microsoft Intune Mobile Application Management, and BlackBerry Dynamics all provide work-vs-personal containerization, but none combine: (a) a single signed binary that bundles its own root certificate authority and forces DoH resolution to one operator-controlled resolver, (b) per-profile WebView partitions that segment the audit chain itself (so business and personal browsing histories cannot be cross-correlated even by a forensic operator), (c) a passkey re-auth gate on every profile switch, (d) a server-managed app catalog with admin-controlled per-user grant/revoke that writes every change to the same HMAC chain as clinical events, and (e) an HMAC-signed cross-device handoff token that's bound to the destination device's CA fingerprint. The combination is novel; the application to a healthcare-worker workstation specifically (where the same person is often a patient AND a clinician at the same institution) is the new contribution.
CH-IP-033 trust-ledger 2ab29640-3ced… CH Chain · attested 2026-05-06
2026-05-06 First public disclosure

Multi-monitor healthcare-workstation layouts with cryptographically-isolated per-profile persistence, monitor-aware restoration, and cross-device synchronization

An extension to CH-IP-033's dual-profile workspace that adds named snapshots of every open application window — including each window's monitor index, position, and size — and persists those snapshots in a per-profile data directory cryptographically isolated from the other profile. A restore operation re-spawns every saved window in its remembered place across the user's current display set, with graceful fallback when the physical monitor topology has changed (fewer screens, different ordering, different DPI). Each saved layout is bound to exactly one of the user's profiles and inherits that profile's WebView partition on restore, preserving the patent's hard isolation guarantee even as providers move between contexts. Layouts can replicate to other devices belonging to the same Conceptual Health passport via the existing handoff channel, allowing a clinician's imaging-shift arrangement at the office to follow them home without exposing any session token. Audit-chain entries are appended for every save, restore, and delete — a forensic record of which arrangements a provider used during which encounters, useful for HIPAA Security Rule attestations and post-incident workflow reconstruction.

⟶ Why patentable: macOS Mission Control "Spaces", Windows Virtual Desktops, Stage Manager, and clinical-radiology workstation managers like Sectra IDS7 / GE PACS Workstation all provide multi-monitor layout memory, but none combine: (a) layouts cryptographically bound to a profile-keyed data directory that inherits the dual-profile isolation guarantee of CH-IP-033 (so a "Business · imaging shift" layout physically cannot resurrect cookies or storage from a "Personal · trading desk" layout), (b) deterministic monitor-index → live-display mapping that gracefully collapses N-monitor arrangements onto fewer screens with relative-offset preservation, (c) cross-device replication via the same HMAC-signed handoff token used for session transfer (no new credential surface), and (d) every save / restore / delete event written to the same HMAC-chained audit log as clinical events — producing a record of which physical workstation arrangement a clinician was using during a given encounter. The combination is novel; the application to a healthcare-worker workstation specifically — where reading-room ergonomics, telehealth visit setups, and audit-review arrangements all need to follow a clinician across home, office, and remote sites — is the new contribution.
CH-IP-034 trust-ledger 09806afa-29de… CH Chain · attested 2026-05-06 · builds on CH-IP-033
2026-05-07 First public disclosure

Per-tile network capability firewall: CSP enforcement for healthcare app tiles in Guardian Workspace

Per-tile network capability manifest compiled into Content Security Policy and injected at documentStart in tile WebView before tile page JavaScript executes. Connection attempts to unlisted hosts are blocked and logged to workspace audit chain with full context.

⟶ Why patentable: No prior art for per-tile network capability manifests compiled into CSP injected before tile JavaScript executes, with every blocked connection logged to a HIPAA audit chain with tile identity context.
CH-IP-035 sha256:48e38826cbd04fa6… CH Chain · attested 2026-05-07
2026-05-07 First public disclosure

Post-factory-reset SIP identity reinstall recovery with idempotent Asterisk re-provisioning from authenticated browser

After server factory-reset or PJSIP configuration file wipe, a provider triggers Asterisk PJSIP stanza re-provisioning directly from their authenticated browser session without requiring administrator intervention. SIP credentials stored encrypted in the database are decrypted server-side and re-written to the Asterisk PJSIP configuration file; Asterisk is reloaded via AMI. The phone UI monitors for SIP 403 REGISTER failures and surfaces a Reconnect button.

⟶ Why patentable: No prior art for regular authenticated user triggering idempotent Asterisk PJSIP stanza re-provisioning from a healthcare browser session, with the phone UI detecting 403 failure and offering self-service recovery without requiring admin credentials.
CH-IP-036 sha256:acae67c3f81c2d7f… CH Chain · attested 2026-05-07
2026-05-07 First public disclosure

Healthcare PBX outside-line prefix: dial-9 PSTN routing with automatic number prefixing in CH SIP dialplan

Provider softphones include an outside-line toggle. When activated, any dialed number whose digit count exceeds the internal extension length threshold is automatically prefixed with the outside-line access code before submission to the Asterisk dialplan for PSTN routing via Telnyx. Internal extensions detected by digit length are never prefixed.

⟶ Why patentable: PBX dial-9 conventions are standard in legacy TDM telephony but have no standardized implementation in healthcare SIP WebRTC softphone systems built from scratch on Asterisk. The combination of browser-side toggle, digit-length detection, automatic prefix injection, Asterisk dialplan context separation, and Telnyx PSTN egress is novel.
CH-IP-037 sha256:69f64009cc75b0be… CH Chain · attested 2026-05-07
2026-05-07 First public disclosure

Post-call AI transcript with structured topic extraction, task detection, and physician-to-patient email workflow with pre-send edit gate

After a call ends, a browser-captured Web Speech API transcript is processed by a client-side topic extraction engine that maps transcript phrases to ten named clinical categories: medications, follow-up, lab work, symptoms, billing, referrals, procedures, mental health, allergies, and general. A task-detection pass identifies action sentences. An email template is generated pre-populated with call date, duration, detected topic list, action item checklist, and full transcript text. The provider reviews the draft in an in-page modal before the mailto link is activated. The entire pipeline runs client-side with no PHI leaving the browser.

⟶ Why patentable: Clinical documentation tools require server-side AI processing with PHI transmission. No prior art for browser-native SpeechRecognition pipeline mapping transcript phrases to named clinical topic categories via regex, extracting action items, rendering in editable provider-review modal, and generating a mailto with clinical context, operating entirely client-side for a healthcare SIP WebRTC softphone.
CH-IP-038 sha256:02e6311feafede91… CH Chain · attested 2026-05-07
2026-05-07 First public disclosure

Unified CH communications hub with context-aware section switching between phone, messaging, email, video, and contacts in HIPAA workspace

A single workspace tile presents all Conceptual Health communication modalities via a persistent navigation strip with sections for Phone, Messages, Email, Video, and Contacts. Section switching preserves active call state. Business profile sections present corporate contacts and organization phone lines; Personal profile sections present personal CH lines and consumer health contacts, enforced by the workspace profile layer. Each section transition is logged to the workspace audit chain with profile identifier, previous section, and new section.

⟶ Why patentable: Unified communications platforms provide multi-modality tabs but operate as monolithic applications, not as a tile within a profile-aware healthcare workspace where the profile layer enforces per-section access rules independently of the application. No prior art for unified healthcare communications hub where section switching preserves live call state, per-section access rules are enforced by the workspace profile, and each transition is audit-logged.
CH-IP-039 sha256:3a858173fd504606… CH Chain · attested 2026-05-07
2026-05-07 First public disclosure

CHPhone: in-house SIP-over-WebSocket softphone engine with HIPAA-native call state machine and cryptographic provider identity binding

A ground-up SIP-over-WebSocket softphone engine (class CHPhone, User-Agent CHPhone/2.0) written entirely in-house for the Conceptual Health provider communications platform, implementing RFC 3261 and RFC 7118 natively in JavaScript with no third-party SIP library dependency. Components: (1) MD5 digest authentication per RFC 2617 computed client-side; (2) custom SIP message parser handling INVITE, BYE, CANCEL, REFER, NOTIFY; (3) direct RTCPeerConnection management for WebRTC media negotiation; (4) CHMedia module for audio track management, mute/hold state, DTMF injection via RTCDTMFSender; (5) call state machine (IDLE, CALLING, RINGING, ACTIVE, HOLDING, TRANSFERRING, ENDED) with each transition emitting an auditable record; (6) CH-XXXXXXXXXX SIP AOR format binding every call to the provider's cryptographically-verified CH member ID; (7) Asterisk PJSIP backend over wss:// with Telnyx PSTN egress. The patient-facing softphone currently uses a third-party SIP library, flagged for future rewrite to the CHPhone engine per CH IP policy.

⇾ Why patentable: No production healthcare softphone implements the full SIP signaling stack from scratch in a browser environment without a third-party SIP library. Novel combination: (a) zero-dependency SIP/WebSocket implementation eliminating supply-chain risk for PHI-adjacent code; (b) call state machine transitions emitting HIPAA audit chain entries attributable to a verified clinician identity; (c) SIP AOR bound to CH member ID making every call cryptographically attributed to a specific verified clinician, not just a device or phone number; (d) PHI surface controls enforced at the engine API level via RTCTrack.enabled, not merely at the UI layer, preventing accidental PHI transmission during muted segments.
SHA3-256: 217799678eaab1ddbad4ec135d162544ec65c358aa4ce8c0f248ca030f78ebb4
CH-IP-040 sha256:217799678eaab1dd… CH Chain · attested 2026-05-07 · CHPhone/2.0
2026-05-07 First public disclosure

CH Integrated Telehealth Architecture: Universal-Identity Per-Member Auto-Provisioned DTLS-SRTP SIP Extension Natively Embedded in a HIPAA Healthcare Operating System with Single-Identity Binding Across Voice, EHR Chart, Messaging, Blockchain Wallet, and Profile-Isolated Workspace Context

A complete, native, zero-configuration healthcare telephony system where each authenticated platform member (patient, provider, or staff) receives a globally unique SIP endpoint and encrypted media identity automatically on first authentication — no administrator provisioning, no external PBX, no UCaaS contract required. Universal identity: the CH-XXXXXXXXXX member handle simultaneously serves as the SIP AOR (sip:CH-XXXXXXXXXX@conceptualhealth.com), platform email, EHR chart ID, HCC blockchain wallet pointer, and instant messenger address. Auto-provisioning pipeline (GET /api/v1/comms/phone/my-extension): (a) derive CH handle from member_number; (b) allocate internal dialplan extension 1000-9999; (c) generate 20-char cryptographically random SIP password AES-256-GCM encrypted at rest; (d) write Asterisk PJSIP endpoint/auth/AOR stanza; (e) hot-reload Asterisk — atomically in one HTTP call. PJSIP stanza enforces per-user: webrtc=yes, media_encryption=dtls, dtls_auto_generate_cert=yes, dtls_verify=fingerprint, ice_support=yes, direct_media=no — each user gets a unique auto-generated DTLS certificate with fingerprint binding, ICE-negotiated path, and SRTP-encrypted audio (RFC 5764); no shared media paths. Provider UI: PHI masking via CSS phi-mask class applied at DOM render time for HIPAA-safe screensharing; chartContact() one-click EHR chart access during active call in same workspace tile; profile-aware dual-line (business CHO line vs personal CH-XXXXXXXXXX line, cryptographically isolated); live caption + clinical topic extraction (CH-IP-038). AuditLog written on every DID provisioning and number assignment event.

⇾ Why patentable: No commercial EHR or published academic system auto-provisions per-user DTLS-SRTP SIP identities bound to a universal cross-modality health identity at registration time with zero administrator interaction, natively inside the EHR OS. Closest commercial: Epic + Zoom Contact Center (GA April 2026) — Zoom is an external PBX (SIP logic not inside Epic), uses shared pool DIDs not per-patient DIDs, shared infrastructure not per-session DTLS tunnels, no cryptographic chain audit on call events. Closest patent: US20240127969A1 (2024) — no SIP stack, no per-patient DID, no per-session SRTP/DTLS claim. Oracle Health uses external Teams/Webex UCaaS bridges. No HL7 FHIR profile or IHE ITI integration profile covers per-patient voice channel provisioning or call-metadata audit chaining. Novel combination: (a) one CH-XXXXXXXXXX handle = SIP AOR + email + EHR chart + blockchain wallet; (b) zero-touch PJSIP auto-provisioning on first API call; (c) per-user auto-generated DTLS cert with fingerprint binding; (d) profile-isolated dual-line contexts; (e) PHI masking at CSS render layer; (f) live bidirectional EHR access during active call via chartContact(); (g) immutable AuditLog write on every provisioning and DID assignment. First-in-class for healthcare.
SHA3-256: d2bec40f512f84f2e4385c472ee2548a7b9064dc9b607e322233e82fe9011a43
CH-IP-041 sha256:d2bec40f512f84f2… CH Chain · attested 2026-05-07 · DTLS-SRTP EHR Telehealth
2026-05-07 First public disclosure

Profile-Isolated Dual-Line Identity Display: Cryptographically Distinct Personal CH Member Number and Business SIP Extension Rendered Per Workspace Profile Context in a HIPAA Healthcare Communications Platform

A healthcare communications platform in which a single authenticated user simultaneously holds two numerically and cryptographically distinct telephony identities that are selectively rendered based on the active workspace profile context, with no cross-context leakage. Personal identity: the CH member number (e.g. 9043389732) derived deterministically from the user record at account creation time, serving as the universal personal health network address usable for scheduling, patient-facing communication, and health data attribution. Business identity: the internally-assigned SIP extension (e.g. 1000 for CEO role, 1001–9999 for other staff) auto-provisioned by the PJSIP engine and bound to the organization dial-plan, usable for corporate telephony, inter-department routing, and ACD queue membership. Profile resolver: reads the Guardian Workspace tile URL parameter ?profile=business|personal at render time, falling back to localStorage key ch_active_profile, defaulting to personal. Display logic: in personal context, the identity element shows the member number with a copy-to-clipboard action targeting the member number string; in business context, it shows the SIP extension with the copy action targeting the full SIP URI (sip:CH-XXXXXXXXXX@conceptualhealth.com). Identity card in business context shows both identities simultaneously (Ext 1000 · CH# 9043389732) for operator reference. Backend: personal_number field added to ExtensionWithCredsOut response model and populated from current_user.member_number at the /comms/phone/my-extension endpoint, keeping the two identities server-authoritative and not client-computed. The two numbers have different entropy profiles, revocation paths, and audit attribution: member number tracks personal health events; SIP extension tracks organizational call events.

⇾ Why patentable: All commercial UCaaS platforms (Microsoft Teams, Zoom Phone, RingCentral, Cisco Webex) assign a single identity per user that is either personal or business, requiring separate accounts for true separation. Our architecture assigns both identity types to the same authenticated session and resolves which to display at the workspace tile URL parameter layer — not the application layer — making the profile gate enforceable by the workspace operator independently of the communication application. Novel combination: (a) dual server-authoritative identity values (member_number vs SIP extension) returned in a single API response; (b) profile resolver operates at workspace context URL parameters, not within the communication application itself; (c) business profile identity card renders a compound view showing both identities simultaneously for operator reference without cross-context exposure; (d) copy-to-clipboard action targets a different string per profile (member number vs SIP URI); (e) the two identities have independent audit chains, revocation paths, and entropy sources. No prior art found for dual-identity healthcare communication display resolved at workspace profile context layer with server-authoritative separation of identity values.
SHA3-256: 630823d3870d02fe2afc87d1b81589a92b0f0781ed7999d59ddf059cfe224ec9
CH-IP-042 sha256:630823d3870d02fe… CH Chain · attested 2026-05-07 · Dual-Line Profile Identity
2026-05-08 First public disclosure

Cryptographic Binding of Business Associate Agreements to Distributed Compute Network Endpoints via X.509 Certificate Extensions and Public Transparency Ledger Anchoring with Runtime Pre-Dispatch Compliance Gate

A method for legally and cryptographically binding a signed Business Associate Agreement (BAA) under HIPAA to a remote inference endpoint participating in a distributed healthcare compute network, such that the network scheduler refuses to dispatch any workload containing PHI to any endpoint whose mTLS client certificate does not carry a verifiable, unrevoked, unexpired BAA hash extension that resolves to a record published on a public transparency ledger. Components: (1) a canonical versioned BAA template hashed with SHA-256 once countersigned; (2) an X.509 OID extension under a registered IANA Private Enterprise Number embedded in every short-lived (24h) mTLS client certificate carrying that exact hash; (3) a public transparency ledger to which the BAA hash, operator identity, signing date, and template version are written at signing time; (4) a runtime can_dispatch function consulted on every PHI-bearing workload that requires the destination certificate's OID to resolve to an unrevoked, unexpired BAA registry entry; (5) revocation effective network-wide within one certificate validity period via short-lived certs without explicit Certificate Revocation Lists; (6) tiered conformance (CH-EP0/EP1/EP2) mapping to HITRUST CSF e1/i1/r2 and profiled against NIST SP 800-66 Rev 2 and 800-53 Rev 5; (7) tier escalation through evidence accumulation requiring hardware-backed key attestation for EP1 and per-session Trusted Execution Environment remote attestation (NVIDIA Confidential Computing, AMD SEV-SNP, Intel TDX, AWS Nitro Enclaves) for EP2.

⇾ Why patentable: Prior art in BAA management consists exclusively of contract-lifecycle-management platforms (Ironclad, Sirion, PandaDoc) that automate drafting, routing, and storage of the signed PDF but do not bind the agreement to a runtime cryptographic identity or gate compute scheduling on its presence. Prior art in distributed compute (Akash, io.net, Render Network, Bittensor, Aethir) handles tenant authentication via API keys but has no concept of legal-instrument-bound dispatch and explicitly forbids PHI in their terms of service. Prior art in healthcare federated learning (NVIDIA FLARE, MELLODDY, Owkin, Truveta) sidesteps PHI by moving gradients or operating as named consortia rather than binding it cryptographically. The combination of (a) a canonical BAA template hash, (b) embedded as an X.509 extension OID, (c) anchored on a public transparency ledger, (d) checked by a runtime scheduler gate per task, with (e) tiered conformance levels mapping to HITRUST and NIST controls and (f) automatic tier downgrade on evidence staleness, is not present in any published standard, academic paper, patent application, or production system as of the priority date of this disclosure. GuardianOrb is the first HIPAA-compliant volunteer/distributed compute network with a BAA-binding enrollment flow.
SHA3-256: f3735bb374983d7e2ebc1fc9e076431d5ca12a0ef3979b1ece182f3a05ce41fd
CH-IP-043 sha256:f3735bb374983d7e… CH Chain · attested 2026-05-08 · BAA-as-Code Binding
2026-05-08 First public disclosure

Tenant-Tagged Mesh-Capable Wire Protocol for Healthcare Virtual Private Networks with Multi-Clinic Routing Through a Single Listener and Peer-to-Peer Encrypted Container Transport for Distributed Inference Endpoints

A virtual private network protocol and wire format ("CH VPN") that embeds a 16-bit tenant identifier in every encrypted packet header, allowing a single network gateway to multiplex traffic for thousands of independently-administered healthcare tenants through a single UDP listening port without per-tenant socket separation, while supporting both hub-and-spoke topology (device→clinic-server→corporate gateway) and full peer-to-peer mesh topology (device→device, clinic-server→clinic-server) with cryptographic isolation between tenants enforced by the wire format itself. Components: (1) a 16-byte authenticated header with a 16-bit tenant identifier in the AAD (authenticated-but-unencrypted) portion; (2) a healthcare-specialized authority service issuing 24h-rotated device certificates that bind a peer's X25519 public key to a specific tenant identifier and role (patient device, provider device, clinic sub-hub, corporate gateway, partner-mesh peer); (3) a Noise IK handshake with a CH-original modification in which the responder validates the tenant identifier against the issuing certificate's tenant binding before completing the handshake, preventing tenant cross-routing even with valid peer keys; (4) mesh routing logic in the clinic-node sub-hub daemon applying per-(source-tenant, destination-tenant)-pair forwarding policies, supporting consented inter-clinic patient transfer and revocation-aware mesh bridges; (5) a FIPS build-tag mechanism that swaps ChaCha20-Poly1305 AEAD for AES-256-GCM within a FIPS 140-3 module while preserving the wire format byte-for-byte; (6) Redis pub/sub fleet-wide emergency revocation propagating to every connected peer within seconds; (7) when deployed as transport for the CH Endpoint Standard distributed inference network, the tenant tag in every packet allows the inference scheduler to verify workload routing matches the BAA scope of the destination tenant without an additional registry lookup. Implementation runs in production on UDP 51820 (chvpn-echo) with 100% CH-original Go core (WebOrb/ch-vpn/) compiled to native libraries via gomobile bind, zero third-party VPN dependencies in any shipping artifact.

⇾ Why patentable: Multi-tenant VPN deployments today rely on per-tenant infrastructure separation (separate ports, namespaces, or concentrators). The combination of (a) a 16-bit tenant identifier in the AEAD-authenticated header, (b) tenant-binding certificates issued by a healthcare-specialized authority, (c) Noise-IK handshake validation against tenant binding, (d) mesh-aware sub-hub forwarding with per-tenant-pair policies, (e) FIPS build-tag with byte-identical wire format, and (f) integration with a HIPAA distributed-compute scheduler that uses the tenant tag for BAA-scope verification, is not present in WireGuard, OpenVPN, IPsec, Tailscale, Cloudflare Magic WAN, Twingate, or any published academic or industrial multi-tenant VPN architecture. The mesh peer-to-peer topology with tenant-tag enforcement is the basis for the encrypted-container endpoint isolation model in the CH Endpoint Standard and is the wire-format foundation that distinguishes CH VPN from prior-art point-to-point VPN protocols.
SHA3-256: 39e18e6898942a10bf02597e5e2ed2b6bdf2b6cba7cfe541feaa08bc4e91a7c0
CH-IP-044 sha256:39e18e6898942a10… CH Chain · attested 2026-05-08 · Tenant-Tagged Mesh VPN
2026-05-08 First public disclosure

Hierarchical Endpoint Conformance Standard with Runtime Cryptographic Gate for Tiered Dispatch of Healthcare Workloads to Heterogeneous Compute Endpoints Including Confidential-Computing-Attested Hardware

A three-tier conformance standard ("CH Endpoint Standard" or CH-EPS) for a distributed healthcare compute network in which heterogeneous endpoints — patient personal devices, volunteer consumer hardware, hardened clinic workstations, and Trusted-Execution-Environment-equipped partner servers — declare a tier (CH-EP0, CH-EP1, or CH-EP2), each tier carrying a defined set of technical safeguards mapped to HIPAA Security Rule technical specifications (45 CFR § 164.312), NIST SP 800-66 Rev 2, NIST SP 800-53 Rev 5, and HITRUST CSF assurance levels (e1, i1, r2 respectively). The network workload scheduler enforces tier ordering and per-tier evidence requirements at dispatch time via a single function (can_dispatch) that may refuse dispatch even if all standard authentication checks pass. Tier definitions: CH-EP0 (de-identified compute on volunteer hardware: full-disk encryption, Secure Boot, in-house tenant-tagged VPN with mTLS overlay, signed audit log shipping; HITRUST e1); CH-EP1 (limited PHI under signed BAA on hardened workstation: all CH-EP0 controls plus FIPS 140-3 module, hardware-backed key storage, 5-min auto-logoff, account lockout after 5 failures, embedded BAA hash in mTLS certificate per CH-IP-043; HITRUST i1); CH-EP2 (full PHI inference under signed BAA with TEE attestation: all CH-EP1 controls plus per-session remote attestation from NVIDIA Confidential Computing, AMD SEV-SNP, Intel TDX, or AWS Nitro Enclaves, ephemeral memory protection with mlock + memset zeroization, no persistent PHI storage, HSM-rooted private keys; toward HITRUST r2). Additional novel elements: (a) attestation evidence registry storing per-heartbeat measurements from heterogeneous TEE vendors with per-vendor verifier modules invoked based on declared attestation type; (b) tier escalation through evidence accumulation rather than re-enrollment; (c) automatic tier downgrade on evidence staleness, BAA expiration, or audit log integrity failure without operator intervention.

⇾ Why patentable: HITRUST CSF, NIST SP 800-66 Rev 2, NIST SP 800-53 Rev 5, HIPAA 45 CFR § 164.312, and ISO 27001 are static control catalogs intended for organizational compliance assessment, not runtime dispatch decisions. SOC 2 Type II reports document compliance posture as of an audit date but are not consulted at workload-dispatch time. The combination of (a) three tiers explicitly mapping to existing HITRUST levels, (b) a single can_dispatch function consulted on every PHI-bearing workload, (c) automatic tier downgrade on evidence staleness, (d) a unified attestation registry across heterogeneous TEE vendors, and (e) integration with the BAA cryptographic binding layer of CH-IP-043, is not present in any published standard, certification framework, or production compliance product as of the priority date of this disclosure.
SHA3-256: e8ad5b55485c42cb97d9533d43510b12661baf7c40707b9d890d1c70e359448f
CH-IP-045 sha256:e8ad5b55485c42cb… CH Chain · attested 2026-05-08 · Tiered Endpoint Conformance Standard
2026-05-08 First public disclosure

Patient-Bound Container Identity, Witness, and Patch-Attribution Protocol for Healthcare Software Updates with Per-Patient Cryptographic Sovereignty Over Compute

A method for patient-sovereign software lifecycle management in containerized healthcare systems processing Protected Health Information (PHI), wherein: (1) Each containerized service that processes PHI for an identified patient derives a per-patient cryptographic container identity as HKDF of (a) the SHA3-256 hash of the container image manifest including the operator's Ed25519 signature, (b) the patient's biometric-bound consent commitment retrieved from the patient's hardware-rooted GuardianOrb wallet device, (c) a Business Associate Agreement (BAA) hash bound to the operator key per the BAA-as-code binding (CH-IP-043), and (d) a time window. Container settlement events emitted to the chain audit ledger MUST be signed under this derived identity; events lacking the patient's consent commitment in their derivation are rejected at chain consensus. (2) The patient's hardware-rooted wallet device participates as a co-signing witness on every container instance that processes the patient's PHI; the wallet emits a witness attestation when a container starts a patient session; settlement events from a container whose witness signature is missing or staler than a configurable freshness window are rejected at chain consensus, blocking the container from completing payable work for that patient. (3) Software patches (new container image versions) cannot be swapped on a per-patient basis until each patient's wallet co-signs the new image manifest; the orchestrator runs both versions side by side during a transition window, routing each patient to the version their wallet has accepted. (4) Automatic patient-bound patch-attribution-by-outcome: the chain's per-patient audit lane records, alongside every clinical AI suggestion, the SHA3-256 of the container version that produced the suggestion; if a clinical bug, model recall, or correction notice is later issued, the chain emits a per-patient notification event signed by the operator, derived deterministically from the immutable container-version-to-patient-data audit ledger without requiring a backfill query. (5) Patient-triggered cold storage: the patient's wallet may emit a chain transaction signaling "freeze" for any subset of consent classes; thereafter no container may decrypt the patient's PHI scope without a multi-party re-authorization quorum (patient + clinician + legal officer). (6) Patient-salted inference session keys: per-session encryption key is derived as HKDF(operator_root_key, patient_wallet_session_key, container_image_hash, request_nonce); the patient's wallet must be live during session-key derivation, preventing replay of patient data even by an insider holding a cloned container image. (7) Patient-visible container lineage in wallet UI: the GuardianOrb patient wallet renders, for every active consent class, a real-time list of every container image version currently authorized to process the patient's data, with revoke / freeze / pin actions propagating via chain transaction within one block (~5 seconds).

⇾ Why patentable: No prior art binds a containerized service identity to BOTH the operator's code hash AND the patient's biometric-bound consent commitment AND the operator's BAA hash simultaneously. No prior art uses a patient's hardware wallet as a co-signing witness for software patch deployment. No prior art ties container-version-to-patient-data audit to automatic patient notification of clinical bug correction. No prior art derives inference session keys from a live patient device participation requirement. No prior art renders the runtime software supply chain to the patient at consent-class granularity. The combination — patient sovereignty over compute, not just data, with cryptographic enforcement at every layer (container identity, settlement consensus, key derivation, notification) — is not present in HashiCorp Vault, Kubernetes admission controllers, AWS Nitro / Confidential Computing attestation services, Apple's Private Cloud Compute, Microsoft Azure Health Data Services, Epic Cosmos, Google Health AI, or any published academic or industrial healthcare software-supply-chain or container-orchestration architecture as of the priority date. The novelty centers on the inversion of the trust model: in prior art the patient is the object of computation; in this disclosure the patient's device is a first-class participant in every computational decision, including which code is allowed to run.
SHA3-256: 8f84fb3e58168f4296b970c9eb6795a147d8e2214f0e24171f6ec3cf3764ec98
CH-IP-046 sha256:8f84fb3e58168f42… CH Chain · attested 2026-05-08 · Patient-Bound Container Sovereignty
2026-05-08 First public disclosure

Healthcare-Record Spoliation-Defense System Using Immutable Encounter Ledgering, Content-Hash Anchoring, Merkle-Rooted Patient Delivery Receipts, and Witnessed Dual-Signature Informed-Deletion Ceremony with State-Aware Retention Enforcement and Litigation Cross-Check API

A patient-controlled health record system in which the patient retains the §164.524 right of access and the §164.526 right of amendment / deletion, but where the destruction of underlying PHI cannot eliminate the malpractice-defense evidence that providers and the operating corporation need to defend against later claims. Five interlocking layers: (1) an append-only Medical Event Ledger that records, for every encounter, metadata only – provider NPI, encounter type, timestamps, code counts, and a SHA-256 hash of the clinical content at the moment of creation, with append-only enforced at the database role level plus by trigger; (2) a chain anchor of every content hash to a healthcare-purpose blockchain so any document later presented as evidence can be re-hashed and compared against the on-chain value; (3) a Merkle-rooted patient delivery receipt anchored to the same chain, with per-record inclusion proofs the patient or defense counsel can verify independently; (4) a two-person witnessed deletion ceremony that consults a state-keyed retention-rules table (NY PHL §18, CA H&S §123100, TX 22 TAC §165.1, IL 210 ILCS 85/6.17, etc.; HIPAA federal default 45 CFR 164.530(j) for states without specific rules) to enforce legal retention floors, presents a versioned spoliation-warning text whose hash is recorded in the attestation, requires a configurable cool-off period during which the patient may cancel, and requires a second authenticator (automated corporate custodian or patient-designated guardian) to co-sign before the ceremony executes; and (5) a role-gated litigation cross-check API for defense counsel exposing the immutable encounter ledger with selective-omission detection and document-hash verification, where every legal-side query is itself anchored to the chain.

⇾ Why patentable: No prior art combines HIPAA-compliant patient-deletable PHI alongside immutable healthcare-specific encounter metadata + content hashes, two-party informed-deletion ceremony with on-chain spoliation warning and state-aware retention enforcement, Merkle-rooted patient delivery receipt, and a litigation cross-check API exposing selective omission. HL7 FHIR AuditEvent / Provenance is mutable and EHR-internal; Epic and Cerner audit trails are internal forensics not shared with patients; OpenTimestamps / Tierion / Chainpoint are generic timestamping with no FHIR semantic, no two-party deletion, and no retention engine; Medibloc / Patientory are content-addressable storage without metadata/content separation; 21 CFR Part 11 audit trails are mutable. The novel combination produces a defense system in which no single layer failure leaves any party (patient, provider, operating corporation) exposed under FRCP 37(e) spoliation, selective-presentation tactics, exhibit tampering, or right-of-access denial claims.
SHA-256: d3e1728f8c19bdd108314ebe7251474714ba4be57dd5921cd3aedfc767b2f80e
CH-IP-047 sha256:d3e1728f8c19bdd1… CH Chain · attested 2026-05-08 · Spoliation Defense (P1-P4 shipped)
Note on these disclosures: Publication on this page by Conceptual Healthcare Corporation on 2026-05-05 (and additions on 2026-05-06, 2026-05-07, 2026-05-08, and 2026-05-08 evening) constitutes a first public disclosure under 35 U.S.C. § 102(b)(1). We will file provisional patent applications for each item within 12 months. These disclosures do not grant any license or right to use the described inventions. All inventions are the property of Conceptual Healthcare Corporation. For licensing inquiries, contact ip@conceptualhealth.com.

Prior art landscape

What we found. Why we're different.

Prior art found
US20150332283A1 — Hashing Health
Healthcare transaction validation via blockchain PoW. Distinction: Uses compute-based PoW to validate healthcare records. Our PoH uses the verified clinical action itself as the proof object — no compute mining required.
Prior art found
US11942195B2 — Humana data market
Health data marketplace with blockchain rewards to participants (Humana, priority 2018). Distinction: Single-token, no per-study consent gating, no 5-multiplier yield, no dual-token separation, no revocation SLA propagation.
Prior art found
US10991463B2 — AI health prediction + blockchain
AI-based health/therapeutic behavior prediction using smart contracts. Distinction: Predictive model, not a composite scoring formula. No axis structure, no consistency exponent, no token issuance trigger.
No prior art found
Multiplicative composite health formula with behavioral exponents
All known composite health indices (PROMIS Global, SF-36, HOS, HEDIS) are linear-weighted additive sums. Our multiplicative structure with C and p exponents is structurally distinct.
No prior art found
Dual health/consent token separation
No patent or publication found for a two-token system where one token tracks health action and a separate token tracks data consent — each with independent issuance schedules and no peg between them.
No prior art found
Proof-of-Health consensus (clinical attestation as proof object)
No patent found for a blockchain consensus where the "work" is a verified clinical action signed by a licensed institution's credential. The institution-as-validator, reputation-as-stake model is novel.

The covenant

We file these patents so we can give them away.

Conceptual Health files patents to keep the network's core primitives defensible and unencumbered. We do not assert these patents against good-faith implementers of open health. Specifically:

  • We grant a perpetual, worldwide, royalty-free license to any HIPAA-covered entity, IRB-approved researcher, public-health agency, or accredited educational institution implementing the patented methods for non-extractive purposes.
  • We grant the same license to any open-source implementation released under an OSI-approved license, provided the implementation does not bundle our patents with offensive-assertion clauses targeting healthcare entities.
  • We retain the right to assert these patents defensively against parties who file healthcare-data patent suits against us, our Network Clinics, our patients, or our researcher partners.
  • If Conceptual Healthcare Corporation is acquired, the covenant binds the successor entity. The covenant text is embedded in the corporate charter.
  • These disclosures are published freely so that even if we fail to file, no one else can patent these ideas and hold healthcare hostage with them.

Patent counsel: For the full non-assertion pledge text, contact ip@conceptualhealth.com. For USPTO filings, search Application No. 63/921,717 at ppubs.uspto.gov.