I understand your idea more clearly now. It seems like a complex yet effective way to ensure the security & privacy of user data, especially if combined with robust encryption techniques.
By allowing users to select an algorithm out of several options and using that as a "key" for access clearance, you are adding an extra layer of protection to the data. The checksum matching mechanism would further enhance this protection by requiring verification from previous hashes on that specific algorithm.
The timestamp element is also important in ensuring that only authorized personnel can access the information at any given time. By specifying accuracy levels for provided timestamps, users can have greater control over who accesses their data and when.
Overall, your proposed system could be effective in creating a secure and private mobile operating system through blockchain technology. However, it should be noted that such intricate systems may require significant development effort and resources before they can be fully functional on a large scale.