Patent classifications
H04L2209/88
METHOD AND APPARATUS FOR CONFIGURATION FOR MONITORING PATIENT INFORMATION
A method, apparatus and computer program product are provided to facilitate reconfiguration of a patient monitoring device. In one method, an indication of an anticipated utilization of a patient monitoring device for which the patient monitoring device is not configured is received. The method also includes accessing device configuration information relating to a configuration associated with the anticipated utilization and causing provision of the device configuration information relating to the configuration associated with the anticipated utilization. In another method, information regarding a configuration of a patient monitoring device is received. The method also determines whether to differently configure the patient monitoring device in accordance with an anticipated utilization of the patient monitoring device for which the patient monitoring device is not configured. If the patient monitoring device is to be differently configured, the method causes information related to the configuration associated with the anticipated utilization to be provided.
Homomorphic encryption in a healthcare network environment, system and methods
A system and method for homomorphic encryption in a healthcare network environment is provided and includes receiving digital data over the healthcare network at a data custodian server in a plurality of formats from various data sources, encrypting the data according to a homomorphic encryption scheme, receiving a query at the data custodian server from a data consumer device concerning a portion of the encrypted data, initiating a secure homomorphic work session between the data custodian server and the data consumer device, generating a homomorphic work space associated with the homomorphic work session, compiling, by the data custodian server, a results set satisfying the query, loading the results set into the homomorphic work space, and building an application programming interface (API) compatible with the results set, the API facilitating encrypted analysis on the results set in the homomorphic work space.
Managing telemetry communication modes of a device
Systems, apparatus, methods and computer-readable storage media facilitating management of operation of an implantable medical device (“IMD”) using a number of communication modes are provided. An IMD is configured to operate in a disabled mode wherein radio frequency (RF) telemetry communication is disabled, or operate in a first advertising mode using the RF telemetry communication. The IMD receives a clinician session request from a clinician device via an induction telemetry protocol while operating in the disabled mode or the first advertising mode, and transitions to operating from the disabled mode or the first advertising mode to operating in a second advertising mode based on receiving the clinician session request. From the second advertising mode, the IMD can establish a clinician telemetry session with the clinician device using the RF telemetry communication and a unique security mechanism facilitated by an identifier for the clinician device included in the clinician session request.
METHOD AND APPARATUS FOR LOGGING INTO MEDICAL DEVICES
The invention relates to a method for logging a service technician into an electrical device (20), comprising the following steps: production (3, 4) of a secret key (SKY) as an encrypted login password (LPW) by the electrical device (20), displaying (5) of the secret key (SKY) on a display unit (23) of the electrical device (20) as a QR code (QRC), optical sensing (6) of the QR code (QRC) by means of a mobile device (22), decryption (9) of the login password (LPW) from the secret key (SKY) of the sensed QR code (QRC) by the mobile device (22), displaying of the login password (LPW) on a screen unit (24) of the mobile device (22), entering of the login password (LPW) into the electrical device (20) by the service technician, comparison (10) of the entered login password (LPW) with the produced login password (LPW) by the electrical device (20), release of the login by the electrical device (20) if the two login passwords (LPW) match. The invention further relates to an associated apparatus. The advantage of the invention lies in the combination of the high strength of the cryptographic security with the user friendliness of the QR code and of the relatively short login password to be entered.
Authenticating and authorizing users with JWT and tokenization
Techniques are provided for using tokenization in conjunction with “behind-the-wall” JWT authentication. “Behind-the-wall” JWT authentication refers to JWT authentication techniques in which the JWT stays exclusively within the private network that is controlled by the web application provider. Because the JWT stays within the private network, the security risk posed by posting the JWT in a client cookie is avoided. However, because JWT is used behind-the-wall to authenticate a user with the services requested by the user, the authentication-related overhead is significantly reduced.
Performing computations on sensitive data while guaranteeing privacy
A method, system and computer program product for performing computations on sensitive data while guaranteeing privacy. A service provider receives a first and a second ciphertext from a medical provider that homomorphically encrypts matrices A and B, respectively, using an encryption key, where the matrices A and B include medical data encoded as vectors. The service provider performs a homomorphic matrix multiplication on the first and second ciphertexts without decrypting the first and second ciphertexts. An encrypted result from the performed homomorphic matrix multiplication on the first and second ciphertexts is generated and transmitted to the medical provider to decrypt which matches a result of performing a matrix multiplication on unencrypted matrices A and B thereby enabling computations to be performed on the medical data in a secure manner.
GEOSPATIAL-TEMPORAL PATHOGEN TRACING
Techniques for geospatial-temporal pathogen tracing include: obtaining, from multiple mobile devices in association with a first time, first contact tracing data including at least first geospatial traffic data and first values of a set of attributes associated with a pathogen; obtaining, from the multiple mobile devices in association with a second time, second contact tracing data including at least second geospatial traffic data and second values of the set of attributes associated with the pathogen; and applying at least the first contact tracing data and the second contact tracing data to a machine learning model, to obtain actionable intelligence associated with the pathogen.
Secure and usable authentication for health care information access
Embodiments of the invention relate to providing a health care provider access to an electronic record of a patient may be provided. A determination is made as to whether the health care provider is logged onto a computer system in a physical area assigned to the patient. Whether the health care provider is logged onto the computer system during working hours of the provider is also ascertained. The health care provider is provided with access to the electronic record of the patient via the computer system if the determining resolves to true and the ascertaining resolves to true.
Computerized Network System for Initiating, Facilitating, Auditing, and Managing Communications and Documents Involving Professional Expertise
A computerized network links individual lay users, referred to as “standard users,” with qualified professionals in one or more disciplines, such as law, medicine, engineering, accounting and architecture, who are referred to as “participating professionals.” Business entities, such as corporations, partnerships and limited liability companies, can also participate as “enterprise users,” with linkage through the network to both standard users and participating professionals. The network enables standard users, participating professionals and enterprise users to communicate, share information, conduct studies, and negotiate and/or create documents relating to the professional disciplines.
Data encryption in medical devices with limited computational capability
A medical device with limited computational capability includes medical hardware, a first register to store a static, substantially unique identifier of the medical device, a second register to store a static encryption key, an interface to receive and transmit data over a short-range communication link, and processing hardware. The processing hardware is configured to apply the static encryption key to the identifier of the medical device to generate an encrypted identifier, transmit the encrypted identifier of to another device via the interface, receive an encrypted identifier of the other device, decrypt the encrypted identifier of the other device using the static encryption key to determine an identifier of the other device, generate a dynamic encryption key using the identifier of the medical device and the identifier of the other device, and apply the dynamic encryption key to medical data transmitted between the medical device and the other device.