Patent classifications
H04L2209/88
Zero-knowledge environment based networking engine
Methods, systems, and apparatus are described providing networking engines. Specifically, the present specification relates to a method for implementing software containers implementing network engines that may be configured to act in a zero-knowledge environment. In such implementations, all information pertaining to the network engine associated with a user that is stored in the container is solely that of a user unless explicitly shared by the user. In some implementations, the containers may be configured to participate in a publish-and-subscribe network in order to share information. In addition, the containers may be provisioned with controls so that global operators may comply with local privacy rules.
USB-BASED AUTHENTICATION DEVICE
The disclosure relates to systems, devices, and methods for authenticating users of any device requiring authentication, such as a medical device. The systems, devices, and methods can convert a standard USB mass storage device into a unique USB based authentication device that authenticates a user. The device can be programmed to grant access to one or more functions only upon verification of a user by inserting the USB based authentication device into the medical device.
SYSTEMS AND METHODS FOR A TRUSTED CONSUMER SERVICE
A system including one or more memory devices having instructions stored thereon, that, when executed by one or more processors, cause the one or more processors to receive a request from a user device of a user to add the user to a trusted user service, receive health behavior data of a health behavior data stream associated with behavior relating to a spread of an infectious disease at a physical location, determine whether the user meets one or more health safety levels based on the health behavior data stream, add the user to the trusted user service in response to a determination that the user meets the one or more health safety levels, and generate an access indication for the user to access the physical location at one or more particular times in response to the determination that the user meets the one or more health safety levels.
Biometric medical antifraud and consent system
A specialized apparatus for recording medical transactions designed to protect patient privacy when necessary to record private biometric individual data. The mechanisms and proprietary methods scramble the biometric data within the recording device, unrecoverable when leaving recording device with high assurance, yet an audit copy can forward to outside permanent storage and systems.
PERSONAL PRESCRIPTION DISPENSER
Disclosed is a method and apparatus for transporting and dispensing medications for a patient according to a medication schedule for the patient. A smart container from a pharmacy is received at the patient's site and the container is checked to make sure that the container was delivered to the correct patient site. The smart container contains a memory device that contains identification information of the patient, dosage and treatment instructions for the patient. This information and the medication were checked for compatibility before the smart container was delivered. The identity of the patient at the patient's site is then checked and the patient performs on or more biometric tests before the medication is dispensed by the smart container. Upon taking the medication and providing video proof thereof, the smart container is returned to the pharmacy.
LOW LATENCY CALCULATION TRANSCRYPTION METHOD
A method for confidentially processing data stored on a platform is described. A transcryption module, receiving a request for access to a data block, transmits the access request to an access request prediction module which returns a list of data blocks. The transcryption module determines whether a corresponding key stream block is present in the cache. The homomorphic calculation module calculates homomorphic ciphertexts of key stream blocks corresponding to the data blocks of the list. The transcryption module transcrypts the data blocks by adding them with the homomorphic ciphertexts of the corresponding key stream blocks. The transcryption module transmits the data blocks thus transcrypted to the request management module.
CLINICAL INFRASTRUCTURE WITH FEATURES FOR THE PREVENTION OF EGRESS OF PRIVATE INFORMATION
DICOM data is automatically prepared for transit outside of the clinical-data infrastructure, by examining a plurality of metadata fields in the corresponding metadata in the DICOM data; identifying a first subset of the metadata fields as containing private information; identifying a second subset of the metadata fields as private-information free; accessing at least some of the plurality of layers of the DICOM data; and transforming the accessed layers into a single transmission-image, the transmission-image being in a format i) other than DICOM and ii) that stores the second subset of the metadata fields as transmission-metadata in a scheme that is non-redundant for a given transmission-image.
Health Safety System, Service, and Method
A health safety method executed by a processor includes receiving, by the processor, from a medical facility, a certificate of vaccination for a particular disease for an individual, the vaccination conferring immunity to the individual for the disease; receiving by the processor an access request from a venue for the individual; and responding to the venue access request by providing a health safety certification including the certificate of vaccination for the individual and an effective date range of the certificate of vaccination.
Apparatus and method for providing and managing security information in communication system
The present disclosure relates to a technology for a sensor network, machine to machine (M2M) communication, machine type communication (MTC), and Internet of things (IoT). The present disclosure relates to an operation method of a first device in a communication system, the operation method comprising a step of receiving, from a server, security information of a second device associated with the first device, wherein the security information includes a first parameter associated with an operation of the second device, and attribute information associated with the first parameter.
COMPUTER VISION-BASED CLAIMS PROCESSING
Systems and methods are described for automatically evaluating a claim submitted to an insurance carrier. Claim information and at least one image associated with the claim may be received, where the image has been submitted to a carrier as supporting evidence of a service performed by a submitter of the claim. The system may provide image data and other claim information from the submitted claim as input to machine learning models configured to identify whether the image data, such as a radiograph, supports the other data in the claim submission, such as a treatment code.