Patent classifications
H04L9/30
Medicine administering system including injection pen and companion device
Methods, systems, and devices are disclosed for administering a medicament to a patient. In one aspect, a system includes an injection pen device in wireless communication with a mobile communication device. The injection pen device includes a housing including a chamber to encase a cartridge containing medicine, a dose setting and dispensing mechanism to set the mechanism to dispense a particular dose of the medicine from the loaded cartridge, a sensor unit to detect a dispensed dose based on positions and/or movements of the dose setting and dispensing mechanism, and an electronics unit in communication with the sensor unit to process the detected dispensed dose and time data associated with a dispensing event and to wirelessly transmit the dose data to a user's device. The mobile communication device provides a software application to provide the user with health information using the processed dose data.
METHOD AND SYSTEM FOR ENCRYPTED MESSAGING
A method and system for encrypted messaging includes first and second client devices and a quantum key device having a quantum random number generator. The generator provides a first quantum random signal, and the key device provides a symmetric first master key from the first quantum random signal. The master key is transmitted to the first client device and stored. The key device uses the master key to generate an encrypted package by encrypting one of a plurality of keys. The key device generates a second encrypted package. The first pairing key is provided to the first client device by decrypting the first encrypted package using the first master key and providing the first pairing key in the second client device by decrypting the second encrypted package using the second master key to establish an encrypted connection between the first and second client devices.
Computer implemented method for secure management of data generated in an EHR during an episode of care and a system therefor
There is provided a computer implemented method for secure management of data generated in an Electronic Health Record (EHR) during an episode of care, for a user, wherein the EHR is being maintained in a medical database (140) comprised within a Healthcare Service Provider (HSP) server (130), the computer implemented method comprising the steps of sending an identification hash corresponding to the user to an Application Program Interface (API) server (150) from a first client device (110a); extracting the data from the HSP server (130) and de-identifying the data to obtain de-identified data at the API server (150); generating a record hash at the API server (150); transmitting the identification hash, the record hash and the de-identified data from the API server (150) to a core server (160); receiving the identification hash, the record hash and the de-identified data at the core server (160) and transmitting the identification hash, the record hash and the de-identified data from the core server (160) to a repository database (170) to generate a record identification; transmitting the de-identified data, the record hash and the record identification from the repository database (170) to the first client device (110a), via the core server (160); generating a data hash by hashing the de-identified data and a plurality of attributes corresponding to the de-identified data; generating at the core server (160) a register package based on the data hash, the identification hash and the record hash; storing the register package, from the core server (160), on to a blockchain (180) to generate a transaction identification; transmitting the data hash and the transaction identification from the core server (160) to the repository database (170); and transmitting the transaction identification and the data hash from the repository database (170) to the first client device (110a), via the core server (160).
Computer implemented method for secure management of data generated in an EHR during an episode of care and a system therefor
There is provided a computer implemented method for secure management of data generated in an Electronic Health Record (EHR) during an episode of care, for a user, wherein the EHR is being maintained in a medical database (140) comprised within a Healthcare Service Provider (HSP) server (130), the computer implemented method comprising the steps of sending an identification hash corresponding to the user to an Application Program Interface (API) server (150) from a first client device (110a); extracting the data from the HSP server (130) and de-identifying the data to obtain de-identified data at the API server (150); generating a record hash at the API server (150); transmitting the identification hash, the record hash and the de-identified data from the API server (150) to a core server (160); receiving the identification hash, the record hash and the de-identified data at the core server (160) and transmitting the identification hash, the record hash and the de-identified data from the core server (160) to a repository database (170) to generate a record identification; transmitting the de-identified data, the record hash and the record identification from the repository database (170) to the first client device (110a), via the core server (160); generating a data hash by hashing the de-identified data and a plurality of attributes corresponding to the de-identified data; generating at the core server (160) a register package based on the data hash, the identification hash and the record hash; storing the register package, from the core server (160), on to a blockchain (180) to generate a transaction identification; transmitting the data hash and the transaction identification from the core server (160) to the repository database (170); and transmitting the transaction identification and the data hash from the repository database (170) to the first client device (110a), via the core server (160).
Calculation device for encryption using public key and encryption method thereof
Disclosed are a calculation device for encryption using a public key and an encryption method thereof. The present method comprises: a step for setting a secret key, and generating a public key using the secret key and an error extracted from a discrete Gaussian distribution or a distribution that is within a short statistical distance thereto; and a step for applying the public key to a message, and then performing a rounding process to encrypt the message. Accordingly, encryption efficiency can be enhanced.
On-device bitstream validation
A programmable logic device verifies that configuration data permissibly programs the programmable logic device. The programmable logic device includes a programmable fabric having partitions to be programmed by the configuration data, a secure device manager that may generate masks based on the configuration data, and a local sector manager. The masks determine that the configuration data is configured to permissibly program the permitted partitions or that the permitted partitions have been permissibly programmed. The local sector manager applies the masks to generate an interleaved result, compares the interleaved result to an expected result, and sends an indication that the configuration data is configured to permissibly program the permitted partitions or permissibly programmed the permitted partitions in response to determining that the interleaved result is the expected result, or sends an alert to stop programming in response to determining that the interleaved result is not the expected result.
EMBEDDED TLS PROTOCOL FOR LIGHTWEIGHT DEVICES
The disclosure relates to improvements in secure channel establishment. In some aspects, the techniques described herein relate to a method including: issuing, by a client device to a server, a request to establish a secure connection; receiving, by the client device, a response to the request to establish a secure connection from the server, the response including a digital certificate associated with a public key stored by the server, the public key used to establish a symmetric key; validating, by the client device, the digital certificate; and computing, by the client device, a shared secret using the public key stored by the server and a private key generated by the client device.
Communication device and non-transitory computer-readable recording medium storing computer-readable instructions for communication device
A communication device may receive a specific signal from a first external device; display a first instruction screen; in a case where it is instructed that the target process is to be executed in a situation where the first instruction screen is displayed, send a public key to the first external device, wherein in a case where it is not instructed that the target process is to be executed in the situation where the first instruction screen is displayed, the public key is not sent; after the public key has been sent to the first external device, receive an authentication request from the first external device; send an authentication response to the first external device; receive connection information from the first external device; and establish, by using the connection information, a wireless connection between the communication device and a second external device.
Communication device and non-transitory computer-readable recording medium storing computer-readable instructions for communication device
A communication device may receive a specific signal from a first external device; display a first instruction screen; in a case where it is instructed that the target process is to be executed in a situation where the first instruction screen is displayed, send a public key to the first external device, wherein in a case where it is not instructed that the target process is to be executed in the situation where the first instruction screen is displayed, the public key is not sent; after the public key has been sent to the first external device, receive an authentication request from the first external device; send an authentication response to the first external device; receive connection information from the first external device; and establish, by using the connection information, a wireless connection between the communication device and a second external device.
COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR TRANSFERRING ACCESS TO A DIGITAL ASSET
A method of digitally signing a message is disclosed. The method comprises distributing first shares of a first secret value among a plurality of participants, wherein the first secret value is a private key accessible by means of a first threshold number of the first shares, and is inaccessible to less than the first threshold number of the first shares; distributing second shares of a second secret value among the participants, wherein the second secret value is an ephemeral key, wherein said ephemeral key is inaccessible to less than said first threshold number of said second shares; and distributing third shares of a third secret value among the participants, wherein each third share is adapted to be applied to a message to generate a respective fourth share of a fourth secret value, wherein the fourth secret value is the message signed with the private key and using the ephemeral key.