Patent classifications
H04L2209/88
Identity validation and verification system and associated methods
A system and method verify and validate user identity for enrollment in a secure personal dataset accessing system, wherein a personal dataset includes identifiable attributes of a user. Authenticity of an asserted user identity includes electronically verified identifiable attributes to form the personal dataset. A biometric identifier is automatically captured for validating the identifiable attributes by confirming that the asserted identity matches identifiable attributes. A traceable e-audit trail is provided in an enterprise infrastructure and bench mark performance indicator. A generated digital security element results in the user electronically receiving a password and unique electronic address assigned to the user. The digital security element is then transmitted to the user and enables electronic access to the personal dataset, the personal dataset having been authenticated through the verification and validation. The user may use a smartphone, tablet, PC or laptop to generate their Emergency Medical and Contact DataSet.
METHODS AND SYSTEMS FOR CRYPTOGRAPHICALLY SECURED OUTPUTS FROM TELEMEDICINE SESSIONS
A system for cryptographically secured outputs from telemedicine sessions includes a computing device at a first location, the computing device configured to initiate a secure communication interface between the computing device and a client device associated with a human subject and at a second location, receive, from at least a remote sensor at the second location, a plurality of current biological data associated with the human subject, input, using the secure communication interface, an identifier of a biochemical element, determine, as a function of the plurality of current biological data, a tolerability of the biochemical element, and generate a digitally signed authorization datum as a function of the determination.
Standalone wearable device configuration and interface
Embodiments described herein provide for a satellite device that can be associated with a user account of a minor aged (e.g., child or adolescent) user that does not have a smartphone that can be used as a companion device to the satellite device. The satellite device can be configured to be used as a primary device, without reliance upon a paired smartphone. Certain information can be synchronized with the satellite device via the association with the family account. During initial configuration, a set of cryptographic keys can be generated to associate the account of the satellite device with the set of accounts in the family. The satellite device can then access calendars, media, or other data that is shared with user accounts within a family of user accounts.
SECURE DRUG DELIVERY DATA TRANSMISSION
The disclosure is concerned with privacy and integrity of personalized protected health information when transmitted to a cloud computing facility and subsequently distributed to a plurality of stakeholders. An electronic unit of a drug delivery device is configured to prepare payload data comprising data items according to an allocation scheme, and to encrypt, based on an encryption key, and transmit data including the payload data. The allocation scheme and the encryption key are defined for each of a plurality of data subscribers. Accordingly, personalized protected health information payload data is suitably protected with generator-to-subscriber or pass-through data security measures, and any intermediary node or data server in the communication network lacking a matching decryption key will not have access to unencrypted payload data.
DATA ENCRYPTION TO ENSURE DATA IS CORRECTLY BEING ACCESSED
Embodiments disclosed herein provide systems, methods, and computer readable media for encrypting data to ensure that portions of the subject data are correctly accessed. In a particular embodiment, a method provides identifying a first portion of the subject data to be accessible using a first access key. The method further provides encrypting the first portion using a subject key and encrypting the first portion using the first access key. Also, the method provides identifying a second portion of the subject data to be accessible using a second access key. The method then provides encrypting the second portion using the subject key and encrypting the second portion using the second access key.
System and method for confirming identity and authority by a patient medical device
A system and method for confirming identity and authority by a patient medical device is provided. Master credentials are issued to a requesting device and a receiving device from an authorizing agent. The master credentials include a public key of the authorizing agent and a digital signature of a root certification authority. Device credentials are issued to the requesting device from the authorizing agent. The device credentials include a public key of the requesting device and a digital signature of the authorizing agent. Identification credentials are provided to the receiving device and include the device credentials and a digital signature of the requesting device. The requesting device is authenticated. The digital signature of the authorizing agent in the device credentials is checked using the public key of the authorizing agent in the master credentials of the receiving device. The digital signature of the requesting device in the identification credentials is checked using the public key of the requesting device in the device credentials.
ANONYMOUS DISTRIBUTED CONTACT TRACING AND VERIFICATION SYSTEM
An automated contact tracing system for anonymously identifying contacts between users includes at least a tracing server; and more than one mobile device or wearable of a user comprising means for short-range proximity communication and means for carrying out a computer program for generating Encounter-Tokens, when one user spent a pre-defined amount of time in a pre-defined proximity range of another user.
Data Analytics System, Method and Program Product for Processing Health Insurance Claims and Targeted Advertisement-Based Healthcare Management
An all-inclusive blockchain-based program is provided to transform and streamline personal medical records, history and documentation of a participant in a singular portal to: seek appointments with medical practitioners; streamline flow of medical diagnostics; provide checks and balances to counteract improper medical exams, tests, over-prescription medication; and reward users with usable credits. Advertising content, paid for by a private-party advertiser, is provided to the participant to provide additional credit for consumption of the advertising content. Organ donation is coordinated immediately at least partially based on the transformed medical records of the blockchain-based program, as is facilitation of the participant to purchase medication. Organized and/or tracked shipment and a recycling program for the medication are also available. Ability to process and expedite with absolute transparency every single health insurance claim made by a citizen.
HIGHLY SECURE NETWORKED SYSTEM AND METHODS FOR STORAGE, PROCESSING, AND TRANSMISSION OF SENSITIVE PERSONAL INFORMATION
A highly secure networked system and methods for storage, processing, and transmission of sensitive information are described. Sensitive, e.g. personal/private, information is cleansed, salted, and hashed by data contributor computing environments. Cleansing, salting, and hashing by multiple data contributor computing environments occurs using the same processes to ensure out put hashed values are consistent across multiple sources. The hashed sensitive information is hashed a second time by a secure facility computing environment. The second hashing of the data involves a private salt inaccessible to third parties. The second hashed data is linked to previously hashed data (when possible) and assigned a unique ID. Data dictionaries are created for particular individuals provided access to the highly secure information, e.g. researchers. Prior to a data dictionary being accessible by a researcher computing device, the data dictionary undergoes compliance and statistical analyses regarding potential re-identification of the source unhashed data. The data dictionaries are viewable by researchers as certified views via a secure VPN.
Systems and methods for generating identifying information based on semiconductor manufacturing process variations
A microelectronic device that includes a sensor die, compute fabric dies, and storage component dies. Each compute fabric die has processing circuit components and data storage circuit components. A circuit component is selected and identifying information is generated by changing biasing and control parameters of the selected circuit component.