Trust dHealthNetwork.io Ivan Jasenovic - Founder - CEO of - - PowerPoint PPT Presentation

trust
SMART_READER_LITE
LIVE PREVIEW

Trust dHealthNetwork.io Ivan Jasenovic - Founder - CEO of - - PowerPoint PPT Presentation

Trust dHealthNetwork.io Ivan Jasenovic - Founder - CEO of Sicoor.com Paradigms and tools change Leveraging the power of Blockchain Decentralised Decentralised Secure - immutable - verifiable bioinformatic and Secure - immutable - verifiable


slide-1
SLIDE 1

dHealthNetwork.io

Ivan Jasenovic - Founder - CEO of Sicoor.com

Trust

slide-2
SLIDE 2

Paradigms and tools change

slide-3
SLIDE 3

Leveraging the power of Blockchain

Decentralised Secure - immutable - verifiable bioinformatic and financial information Decentralised Secure - immutable - verifiable bioinformatic and financial information

slide-4
SLIDE 4

Quotes

“As revolutionary as it sounds, Blockchain truly is a mechanism to bring everyone to the highest degree of accountability. No more missed transactions, human or machine errors, or even an exchange that was not done with the consent of the parties involved. Above anything else, the most critical area where Blockchain helps is to guarantee the validity of a transaction by recording it not

  • nly on a main register but a connected distributed system of registers, all of which are connected

through a secure validation mechanism.”

Ian Khan, TEDx Speaker | Author | Technology Futurist

slide-5
SLIDE 5

Quotes

“Blockchain solves the problem of manipulation. When I speak about it in the West, people say they trust Google, Facebook, or their banks. But the rest of the world doesn’t trust organizations and corporations that much — I mean Africa, India, the Eastern Europe, or Russia. It’s not about the places where people are really rich. Blockchain’s opportunities are the highest in the countries that haven’t reached that level yet.”

Vitalik Buterin, inventor of Ethereum

slide-6
SLIDE 6

dHealthNetwork.io

Ivan Jasenovic - Founder - CEO of Sicoor.com

slide-7
SLIDE 7

Avionics Engineer - Entrepreneur

Steve is a serial entrepreneur, investor, business owner and engineer. He has sourced start-up financing for companies such as Cyberdefender, International Silver and Playsino. He is co-founder of Sicoor. He is also co-founder and Managing Member of Dilato Point Capital, Founder and President of SEBA Ventures and Ancillatech. As a business owner, he is a partner at Kona Beri Frozen Yogurt. As an Electrical/Mechanical Engineer, Steve consults for companies in the aerospace/defense industry, such as Lockheed-Martin, Rocketdyne, Raytheon and Northrop-Grumman.

Steve Asetre

slide-8
SLIDE 8

Trusted Friends

History

slide-9
SLIDE 9

Trusted Friends

History

slide-10
SLIDE 10

Trust Me Yet?

slide-11
SLIDE 11

Stennis Space Center Director

Richard J. Gilbrech serves as director of NASA’s John C. Stennis Space Center near Bay St. Louis, MS, since his appointment to the position in 2012. As director, he provides executive leadership, overall direction and management of the center. He is responsible for implementing NASA's mission in the area of rocket propulsion testing, developing and maintaining NASA's world-class rocket propulsion test

  • facilities. He serves as a federal manager hosting an integrated multi-agency

federal laboratory. Stennis is a unique federal city that is home to more than 40 federal, state, academic and private organizations and numerous technology-based companies.

  • Dr. Richard J. Gilbrech
slide-12
SLIDE 12

Professor, Astronaut, PhD

Gregory Errol Chamitoff born 6 August 1962 in Montreal, Quebec, Canada is an engineer and NASA astronaut. He was assigned to Expedition 17 and flew to the International Space Station on STS-124, launching 31 May 2008. He was in space 198 days, joining Expedition 18 after Expedition 17 left the station, and returned to Earth 30 November 2008 on STS-126. Chamitoff served as a mission specialist on the STS-134 mission, which was the last flight of Space Shuttle Endeavour and delivered the Alpha Magnetic Spectrometer. Now with over 200 days in space, Professor Chamitoff spends half the year in Australia and the other half in Texas teaching Aeronautical and engineering students.

Gregory Chamitoff

slide-13
SLIDE 13
slide-14
SLIDE 14

What does the blockchain do?

Functionally, blockchains are..

  • A database (Ledger)

○ Record of transactions

  • A compute platform

○ “Smart Contracts”

  • Distributed, and no central owner

Central Trust Using a Third-Party Distributed Trust Using a Blockchain

slide-15
SLIDE 15

Network Blockchain

Proof of Work - dHt -Identity Proof of Stake - Storage Keys Side Chain - Voting Tokens Proof of Stake - Research Data Membership - Ledger

slide-16
SLIDE 16

A Network of Nodes

A network of so-called computing “nodes” make up the blockchain. Node (computer connected to the blockchain network using a client that performs the task of validating and relaying transactions) gets a copy of the blockchain, which gets downloaded automatically upon joining the blockchain network.

slide-17
SLIDE 17

A GLOBAL CONCERN

OUR HEALTH

AND

THE HEALTH OF OUR FAMILIES

slide-18
SLIDE 18

Who will use the Blockchain

Membership Investment Services Research

slide-19
SLIDE 19

Blockchain & Conventional Medicine

slide-20
SLIDE 20

Health Record Keeping - EMR

slide-21
SLIDE 21

EMR - Bioinformatics - History

slide-22
SLIDE 22

Flat Earth Payment

The Payment Problem:

All the players in the healthcare universe communicating and getting paid

slide-23
SLIDE 23

Global Health Jurisdiction

Consumers Medical Service Providers Researchers Investors

slide-24
SLIDE 24

Action Projects

slide-25
SLIDE 25

Action Projects

slide-26
SLIDE 26

Action Projects = Taxi Hires

slide-27
SLIDE 27
slide-28
SLIDE 28

dHealthNetwork app

slide-29
SLIDE 29

Proof of Stake

Proof of Stake (PoS) happens by a miner putting up a stake, or locking up an amount of their coins, to verify a block of transactions. The cryptographic calculations in PoS are much simpler for computers to solve: you only need to prove you own a certain percentage of all coins available in a given currency. For example, if you somehow owned 2% of all Ether (ETH), you’d be able to mine 2%

  • f all transactions across Ethereum.
slide-30
SLIDE 30

Proof of Work

Proof of Work happens through miners trying to solve exceptionally difficult math

  • problems. Finding a solution is basically a guessing game, but checking if a

solution is correct is easy. Miners aren’t able to cheat the system because it takes real-world resources to work out these solutions.

slide-31
SLIDE 31

Hyperledger

Hyperledger Fabric is a platform for distributed ledger solutions, underpinned by a modular architecture delivering high degrees of confidentiality, resiliency, flexibility and scalability. It is designed to support pluggable implementations of different components, and accommodate the complexity and intricacies that exist across the economic ecosystem.

slide-32
SLIDE 32

Token Release

slide-33
SLIDE 33

Key Considerations

  • 1. What are the pain points in the current system?
  • 2. What do you want to achieve?
  • 3. Who are the key stakeholders?
  • 4. What are the key relationships?
  • 5. Are there other “smart” initiatives?
  • 6. What are the logic paths?
  • 7. How can the blockchain architecture be built into the existing transaction

framework?

slide-34
SLIDE 34

CIA Information Security Properties

  • Confidentiality

○ Only Disclosed to authorised parties (Control Reading)

  • Integrity

○ Only updated by authorised parties: accurate, well-formed (Control writing)

  • Availability

○ Can access when required

  • Etc (Anonymity, Privacy, Non-repudiation, ...)
slide-35
SLIDE 35

Many Kinds of “Healthcare” Systems

  • Overall national system of hospitals, government, professionals,

supply/suppliers, insurers, etc

  • Hospital management systems
  • Practice management systems
  • Pharmaceutical supply chain systems
  • Adverse event reporting and management systems
  • Medical insurance and payment systems
  • Complex medical devices
slide-36
SLIDE 36

Security for Health Information?

  • Threat model

■ “The main threat the medical privacy is abuse of authorised access by insiders, and the most common threat vector is social engineering.” (Anderson, 2008) ○ Centralised data increases both value and number of people with access ○ Reidentification attacks won’t stop just because they are illegal

  • What Security Properties are Key for Clinical Information Systems

○ Privacy? Consent?

  • What is a good Security Policy Model?
slide-37
SLIDE 37

Generic Privacy Policies Are Not Enough?

  • Lots of the people think they have the right to access your medical data

○ Public health benefit from the access to data by medical researchers ○ Public economic benefit from access to date by government, admin, (insurers?) ○ BUT there are public health harms if patients lose trust in privacy of data

  • Healthcare is complex, and is held to higher ethical standards

○ “The Collection, linking and use of data in biomedical research and health care: ethical issues” (Nuffield Council on Bioethics,2015) ○ “Donation” of data may be limited to purposes ○ Consent is complicated by shared genetics/family history

slide-38
SLIDE 38

Blockchain Non-Functional Trade-Offs

  • Compared to conventional database & script engines, blockchains have:

○ (+) Integrity, Non-repudiation ○ (-) Confidentiality, Privacy ○ (-) Modifiability ○ (-) Throughput/ Scalability/ Big Data ○ (+/ -) Availability/ Latency

slide-39
SLIDE 39

Potential Blockchain Use Cases

  • Financial Services

○ Digital Currency ○ (International) Payment ○ Reconciliation ○ Settlement ○ Markets ○ Trade finance

  • Government Services

○ Registry & Identity ○ Grants & Social security ○ Quota management ○ Taxation

  • Enterprise and

Industry

○ Supply chain ○ IoT ○ Metered access ○ Digital rights and IP ○ Data management ○ Attesation ○ Inter-divisional accounting

slide-40
SLIDE 40

When to Use a Blockchain?

  • You’ll use a blockchain as part of a broader solution, for data storage,

compute, and/or communication

  • Benefit from blockchain’s advantages

○ Logically-centralised, but administratively and physically distributed

  • Deal with blockchain’s limitations

○ Work around limitations with other mechanisms ○ Choose a use case where limitations don’t matter

slide-41
SLIDE 41

Building a blockchain in the Health Industry

  • Design Issues

○ How is the blockchain being used? ○ Is this use efficient?

  • Tech issues

○ What blockchain is being used? ○ Is this type of blockchain safe?

  • Data issues

○ How does the blockchain use data? ○ Is it using data properly?

  • Governance issues

○ How is the blockchain run? ○ Is the operation fair

  • Legal issues

○ Is the blockchain’s operation supported by law

  • Systemic issues

○ Will the blockchain affect others? ○ Will it affect system stability?

slide-42
SLIDE 42

Blockchain Efficient Fair Safe Stable Proper Lawful

  • Design Issues

○ How is the blockchain being used? ○ Is this use efficient?

  • Tech issues

○ What blockchain is being used? ○ Is this type of blockchain safe?

  • Data issues
  • Governance issues

○ How is the blockchain run? ○ Is the operation fair

  • Legal issues

○ Is the blockchain’s

  • peration supported

by law

  • Systemic issues

○ Will the blockchain

King & Wood Mallesons / www.kwm.com

slide-43
SLIDE 43

The code is not law. Really.

  • Contract
  • Property
  • Privacy
  • Regulation
  • Public Law
  • Private Law
  • International Law

Legal Issues Legal Framework

Legal Landscape

King & Wood Mallesons / www.kwm.com

slide-44
SLIDE 44

Standards of care

Public, Private & International Law BCBS ISDA CPSS- IOSCO UNIDROIT UNCITRAL FSB ICMA AFMA

Identification Recognition Harmonisation

  • Identifying

the actions which need to work with laws.

  • Recognizing

those actions under local laws.

  • Harmonizing

those local laws so that actions can be taken across borders. King & Wood Mallesons / www.kwm.com

slide-45
SLIDE 45

The Blockchain & Enhanced security

By storing data across its network, the blockchain eliminates the risks that come with data being held centrally. Its network lacks centralized points of vulnerability that computer hackers can exploit. Today’s internet has security problems that are familiar to everyone. We all rely on the “username/password” system to protect our identity and assets

  • nline. Blockchain security methods use encryption technology.

The basis for this are the so-called public and private “keys”. A “public key” (a long, randomly-generated string of numbers) is a users’ address on the blockchain. Bitcoins sent across the network gets recorded as belonging to that address. The “private key” is like a password that gives its owner access to their Bitcoin or other digital assets. Store your data on the blockchain and it is incorruptible. This is true, although protecting your digital assets will also require safeguarding of your private key by printing it out, creating what’s referred to as a paper wallet.

slide-46
SLIDE 46

Centralized Decentralized Distributed Ledgers

Distributed ledgers can be public or private and vary in their structure and size Public blockchains Require computer processing power to confirm transactions (“Mining”)

The New Networks

  • Users are anonymous
  • Each user has a copy
  • f the ledger and

participates in confirming transactions independently

  • Users are not anonymous
  • Permission is required for

users to have a copy of the ledger and participate in confirming transactions

slide-47
SLIDE 47

tokenrelease.dhealthnetwork.io/pledge