Patent classifications
H04L2209/88
Collecting apparatus and method
A collecting method records medical transaction declarations by: inputting private information of a patient; requiring two immediate and simultaneous fingerprints, one from each of two persons; displaying prompts for camera photographic images; acquiring the camera photographic images; recording a response through an apparatus display and user-selectable response; prompting for biometric reader activation; recording biometric fingerprints from each of the two persons on each of two physical reader devices, respectively; time-stamping a first fingerprint and a second fingerprint and electronically determining that the two fingerprints are recorded within a time period; computing an electronic decision about the physical proximity of the two persons based upon at least a time-stamp of the first fingerprint and a time-stamp of the second fingerprint; merging biometric signatures from the two persons into an electronic agreement; generating a signed electronic agreement; and outputting the signed electronic agreement to permanent storage to memorialize the medical transaction declaration.
Diabetes management partner interface for wireless communication of analyte data
Systems, devices, and methods are disclosed for wireless communication of analyte data. In embodiments, a method of using a diabetes management partner interface to configure an analyte sensor system for wireless communication with a plurality of partner devices is provided. The method includes the analyte sensor system receiving authorization to provide one of the partner devices with access to a set of configuration parameters via the diabetes management partner interface. The set of configuration parameters is stored in a memory of the analyte sensor system. The method also includes, responsive to input received from the one partner device via the diabetes management partner interface, the analyte sensor system setting or causing a modification to the set of configuration parameters, according to a system requirement of the one partner device.
SYSTEM AND METHOD FOR REWARDING HEALTHY BEHAVIORS AND EXCHANGING HEALTH RELATED DATA
The disclosed systems and methods improve on the current landscape surrounding rewards for healthy behaviors, creates a social community around various stakeholders in the healthcare system and implements discussions around preventative medicine and healthy lifestyles. Using either a traditional network or decentralized architecture, the present system creates a community around all stakeholders and facilitates recommendations and rewards in exchange for targeted lifestyle changes, such as modifications to diet, exercise, nutrition, lifestyle, psychology, rest management, hydration, and the inclusion of vitamins and supplements. The present invention further incorporates a third party marketplace that provides incentives to patient communities for accessing information and taking active steps towards living a healthier life.
Secure initial provisioning of a system on a chip
Securely provisioning a System on a Chip (SoC) includes generating a public/private key pair having a public key and a private key, securely storing the private key external to the SoC, embedding the public key in Resistor Transistor Logic (RTL) of the SoC during manufacture of the SoC, encrypting provisioning data using the private key to create encrypted provisioning data, and programming the SoC using the encrypted provisioning data. The secure provisioning may further include generating a secret shared key, embedding the secret shared key in the RTL of the SoC during manufacture of the SoC, and encrypting the provisioning data using the secret shared key. The RTL may be the boot Read Only Memory (ROM) of the SoC. The secure provisioning technique may also be used for subsequent provisioning after the SoC is deployed.
HEARING DEVICE SYSTEM, DEVICES AND METHOD OF CREATING A TRUSTED BOND BETWEEN A HEARING DEVICE AND A USER APPLICATION
A method, performed by a user application, of creating a trusted bond between a hearing device and the user application is disclosed, wherein the method comprises obtaining first authentication material; transmitting a first authentication request comprising first authentication data to the hearing device; receiving a first authentication response comprising a sound signal from the hearing device; deriving second authentication material based on the sound signal; determining second authentication data based on the second authentication material; transmitting a second authentication request comprising the second authentication data to the hearing device; receiving a second authentication response comprising an authentication key identifier from the hearing device; storing an authentication key and the authentication key identifier, wherein the authentication key is based on the first authentication material; and connecting the user application to the hearing device using the authentication key and the authentication key identifier.
BLOCKCHAIN SYSTEMS AND METHODS FOR REMOTE MONITORING
Methods and systems are provided to generate and obtain data from mobile medical devices such as nebulizers and mobile monitors such as pacemakers and to store provenance parameters for the data in a distributed ledger for use in verifying the source and accuracy of the data. The methods and systems may further be used to reduce readmittance rates at healthcare facilities.
IDENTITY-BASED SECURE MEDICAL DEVICE COMMUNICATIONS
The present disclosure is directed managing the operation of devices using identity-based cryptography. These techniques may include provisioning a master public key to each system that will communicate with a medical device using device-identifier specific cryptography. A master secret key is provisioned in a trusted processor of the medical device, and the medical device provisions its own device identifier-specific secret key using the master secret key. This setup facilitates several management features, including automatic initial configuration, signed logging, signed backup files, and secure binding of medication containers to the medical device.
DYNAMIC DATA COMPLIANCE CONTROLS AT THE HIGHEST DIRECTIVES AND STANDARDS APPLICABLE WITH A NET-SUM FORMULA AS A ZERO-KNOWLEDGE PROOF COMPLIANCE VALIDATION KEY
A software mechanism for controlling data use in compliance with applicable legal standards and directives via a symbolic instruction set that additionally creates a mathematical net-sum to provide a data compliance validation key for use of that data in software, firmware and hardware. In some embodiments, the software mechanism identifies and tags via a symbolic instruction set the standards and directives applicable to data elements as a result of laws, technical and industry standards, contractual obligations, and other sources of norms, in order to streamline data compliance in forthcoming uses of that data. In other embodiments, a symbolic instruction set creates compliance-validation keys utilizing a net-sum method across applicable data norms to provide cryptographic zero-knowledge proof of the compliance of such data for software, firmware and hardware uses.
Dialysis machine, external medical equipment and methods for establishing secure communication between a dialysis machine and external medical equipment
The present disclosure relates to a dialysis machine, external medical equipment and to methods for establishing an authenticated connection between a dialysis machine and external medical equipment. The dialysis machine is caused to establish a short-range wireless connection between the dialysis machine and external medical equipment. A first shared key is associated with the short-range wireless connection. The dialysis machine is further configured to obtain a second shared key generated using the first shared key and to generate a first signature, using the obtained second shared key. The dialysis machine is further configured to send, to the external medical equipment, an authentication request comprising the generated first signature and to receive in return an authentication accept comprising a second signature. Furthermore, the dialysis machine is configured to verify the authenticity of the external medical equipment using the second signature.
Secure access to individual information
A facility for accessing information relating to a person is described. In a reader device, the facility accesses first credentials stored in a first storage device, second credentials stored in a second storage device, and third credentials stored in the reader device. In the reader device, the facility uses a combination of the first credentials, second credentials, and third credentials to decrypt information relating to the person stored in the first storage device.