H04L2209/88

Protecting study participant data for aggregate analysis

Embodiments of the invention include systems and methods for protecting study participant data for aggregate analysis. Aspects include sending a broker encryption key to a plurality of subjects. Aspects also include receiving double-encrypted subject data from the plurality of subjects. Aspects also include decrypting the double-encrypted subject data with a broker decryption key to generate single-encrypted subject data for the plurality of subjects. Aspects also include aggregating the single-encrypted subject data for the plurality of subjects to generate an aggregated single-homomorphically encrypted data set. Aspects also include including a plurality of random factors in the aggregated single-encrypted data set. Aspects also include sending the aggregated single-homomorphically encrypted data set to a researcher.

Secure machine learning analytics using homomorphic encryption
11196541 · 2021-12-07 · ·

Provided are methods and systems for performing a secure machine learning analysis over an instance of data. An example method includes acquiring, by a client, an homomorphic encryption scheme, and at least one machine learning model data structure. The method further includes generating, using the encryption scheme, at least one homomorphically encrypted data structure, and sending the encrypted data structure to at least one server. The method includes executing a machine learning model, by the at least one server based on the encrypted data structure to obtain an encrypted result. The method further includes sending, by the server, the encrypted result to the client where the encrypted result is decrypted. The machine learning model includes neural networks and decision trees.

HOMOMORPHIC ENCRYPTION IN A HEALTHCARE NETWORK ENVIRONMENT, SYSTEM AND METHODS

A system and method for homomorphic encryption in a healthcare network environment is provided and includes receiving digital data over the healthcare network at a data custodian server in a plurality of formats from various data sources, encrypting the data according to a homomorphic encryption scheme, receiving a query at the data custodian server from a data consumer device concerning a portion of the encrypted data, initiating a secure homomorphic work session between the data custodian server and the data consumer device, generating a homomorphic work space associated with the homomorphic work session, compiling, by the data custodian server, a results set satisfying the query, loading the results set into the homomorphic work space, and building an application programming interface (API) compatible with the results set, the API facilitating encrypted analysis on the results set in the homomorphic work space.

Unbiased Drug Selection for Audit Using Distributed Ledger Technology
20210374184 · 2021-12-02 ·

A computer-implemented method of auditing drug supply chain data gathered from a distributed ledger is disclosed. The method includes receiving a population of drug product records from the distributed ledger. The method includes receiving a first set of drug product criteria. The method includes determining a weighted probability for one or more drug product records of the population of drug product records. The method includes generating a randomized first subset of drug product records from the population of drug product records based on the weighted probability of the one or more drug product records. Other methods, systems, and the like for unbiased drug selection for audit are also disclosed.

SYSTEM FOR ENCODING GENOMICS DATA FOR SECURE STORAGE AND PROCESSING

A system is provided for encoding genomics data for secure storage and processing. In particular, the system may comprise a client and server operating environment that uses a unique encoding algorithm to transform genomics data and/or metadata to produce encoded genomics data and/or metadata. In some embodiments, the encoded genomics data and/or metadata may be encrypted using one or more encryption algorithms. The encoded and/or encrypted genomics data may be stored on a secure server (e.g., a cloud environment) that may perform subsequent processing steps on the encoded and/or encrypted genomics data. Once the processing steps have been completed, the server may transmit one or more outputs associated with the genomics data and/or metadata to a client device. In this way, the system provides an efficient and secure way to store and process genomics data.

System and method for authenticating wireless programming devices in programmable medical systems

A medical device of a medical system is configured for communicating with an external programmer over a wireless communications link. The medical device comprises a wireless communications module configured for receiving a first unencrypted version of a random number and a first encrypted version of the random number from the external programmer over the wireless communications link. The medical device further comprises control circuitry configured for performing an authentication procedure on the external programmer based on the first unencrypted version of the random number and the first encrypted version of the random number, and preventing the external programmer from commanding the medical device to perform an action unless the authentication procedure is successful.

Multi-Sensor Platform for Health Monitoring
20220199235 · 2022-06-23 ·

A mechanism is provided in a data processing system to implement a multi-sensor health monitoring platform. The mechanism applies a machine learning model to predict patient needs and patient activity trends based on physiological features and activity features of the patient. The mechanism applies the machine learning model to predict energy requirements for a plurality of medical sensors based on the predicted patient needs and patient activity trends. The mechanism schedules recharging of the plurality of medical sensors based on the predicted energy requirements and identifying one or more sensors to set to an activate state based on the predicted patient needs and patient activity trends. The mechanism collecting sensor data from the one or more sensors and applies the machine learning model to generate a point-of-care recommendation based on the collected sensor data.

Method and system for secure applications using blockchain
11366910 · 2022-06-21 ·

Electronic network include multiple users. Each user operates Wallet software application on his/her endpoint devices (special purpose, computer or smartphone). Each Wallet integrates with Cloud-based Identification-as-a-Service(s) (IDaaS) In context of present invention—IDaaS provides real-time, multi-factor, malware-resilient, context-sensitive Strong Identification-as-a-Service of the user and enables Cryptographic Keys Management of the Wallet. Each Wallet provides various Cryptographic functionalities. Each Wallet may be connected with multiple centralized Marketplace software applications, thus allowing these Cryptographic functionalities to interact with specific Marketplace software application. Each Wallet may be connected with multiple decentralized peer-to-peer software applications, thus allowing these Cryptographic functionalities to interact with specific peer-to-peer software application. These software applications may include Information Technology, Financial, Manufacturing, Retail, Insurance, Government, Healthcare and other verticals of Global Economy. The present invention prevents “Bad Actors” from using or attacking these applications. The present invention also enables Identification of participants of transactions recorded on Blockchain.

ESTABLISHING AN AD-HOC SECURE CONNECTION BETWEEN TWO ELECTRONIC COMPUTING DEVICES USING A SELF-EXPIRING LOCALLY TRANSMITTED INFORMATION PACKET
20220191190 · 2022-06-16 ·

Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.

Safeguarding Mechanism for the Operation of Medical Apparatuses Using Disposables in a Dialysis Environment
20220189616 · 2022-06-16 ·

The disclosure relates to a safeguarding module, a method, and a system for safeguarding an apparatus in the medical environment against an unauthorised operation of the apparatus, wherein the authorisation is dependent upon a linking event between two linking partners within the framework of an operation of the apparatus, wherein the apparatuses are connected via a network, and wherein one of the linking partners is an item which is used during the operation of the apparatus. The system comprises a plurality of apparatuses, wherein in each case an apparatus comprises a safeguarding module, comprising: a read-in interface for reading-in a first identifier and a second identifier; a processing unit which is designed to perform the safeguarding method; a memory for storing the calculated documentation value in a distributed ledger structure; and an interface to the network, via which the apparatuses exchange data.