H04L2209/88

Death certificate information processing techniques

A system includes at least one processor and at least one memory communicatively coupled to the at least one processor, where the at least one memory stores instructions. When executed by the at least one processor, the instructions are configured to receive death certificate information from a node of a distributed ledger system, determine, a record to be updated based at least in part on the death certificate information, and update the record. The death certificate information and the record are associated with an individual.

SYSTEM AND METHOD FOR EXAMINING TEST SAMPLES ON A VIRTUAL PLATFORM

Disclosed is a system for authentication of medical certificates using a distributed ledger (100) including a code generation module (110), a medical certificate generation module (120), a medical certificate authentication module (130), an identity authentication module (150), and a central server (160). Further is disclosed a method for authentication of medical certificates using a distributed ledger (200) utilising the above mentioned components of the system for authentication of medical certificates using a distributed ledger (100) along with a user module (170).

Health safety system, service, and method

A health safety method executed by a processor includes receiving, by the processor, from a medical facility, a certificate of vaccination for a particular disease for an individual, the vaccination conferring immunity to the individual for the disease; receiving by the processor an access request from a venue for the individual; and responding to the venue access request by providing a health safety certification including the certificate of vaccination for the individual and an effective date range of the certificate of vaccination.

BLOCKCHAIN BASED VERIFIABILTY OF USER STATUS

An example operation may include one or more of extracting a data object from a machine-readable code, where the data object comprises fields of data signed with a digital signature of a private key, detecting an identifier of an issuer of the data object from the extracted data object, retrieving a public key from a blockchain based on the identifier of the issuer detected from the field of the extracted data object, and verifying the digital signature of the private key based on the fetched public key

Method for building cloud-based medical image database for protection of patient information and reading medical image therefrom
11327943 · 2022-05-10 · ·

A method for building a cloud-based medical image database for the protection of patient information. A method for building a cloud-based medical image database and reading a medical image therefrom includes a acquiring a medical image of a patient by a medical device; separating patient information data from medical information data in the medical image; encrypting the patient information data using a block chain technique; separately transmitting the encrypted patient information data and the medical information data to a cloud database and storing the same in the cloud database; decrypting the encrypted patient information data stored in the cloud database, using the block chain technique; and reading the medical image to perform diagnosis and consulting for the patient.

Systems and methods for insurance fraud detection

Systems and methods are described for automatically identifying fraud, waste or abuse in health insurance claims submitted to insurance companies by healthcare providers. Insurance claim information and at one image associated with the insurance claim may be received, where the image has been submitted by a healthcare provider to an insurance carrier as supporting evidence of a medical service performed by the healthcare provider. The system may generate a digital signature representing the image, then may compare the digital signature generated for the image to previously generated digital signatures of other images that have been submitted in association with other insurance claims. The system may then determine a likelihood that the given insurance claim is associated with fraud, waste or abuse, based in part on whether the digital signature is identical or close to one or more of the previously generated digital signatures.

CREATION AND USE OF LEDGER FILES
20230261885 · 2023-08-17 ·

The creation and use of ledger files can support the association of an asset in real-space to a virtual/digital form as things change with the asset over time. An example process can include receiving a request to create a ledger file for an asset related to a physical entity and having associated initial attribute data and a digital model; creating the ledger file, the ledger file being identified by a first object identifier and storing the associated initial attribute data and the digital model; generating a first security tag for the digital model comprising information of a first block hash to the digital model and a first timestamp; generating a second security tag for the initial attribute data comprising information of a second block hash to the initial attribute data and a second timestamp; and updating an index of the ledger file by storing the first and second security tags.

METHOD, SYSTEM AND COMPUTER PROGRAM FOR STORING MR IMPLANT INFORMATION DATA AND FOR STORING MR DEVICE DATA AND MACHINE-READABLE STORAGE MEDIUM
20230258753 · 2023-08-17 · ·

A method for storing MR implant information data, comprises: receiving a request for storing MR implant information data for an implant; determining a hash for the MR implant information data; generating a block for a blockchain, wherein the block includes the hash and a reference to a previous block in the blockchain; storing the MR implant information data in a memory; and registering the block in the blockchain.

DISTRIBUTED MEDICAL TESTING FRAMEWORK
20220139566 · 2022-05-05 ·

A system includes a first database to store assessments of genomic tests; a second database to store evaluations of the assessments; one or more processors, and storage media storing instructions that, when executed, cause the processors to perform operations including: receiving information about a genomic test; sending, to a group of clinical experts, notification about availability of the information; receiving, from one or more clinical experts, assessments of the information; storing the assessments in the first database; processing the assessments by applying one or more functions on an aggregate of the assessments, including comparing an output of the functions to a threshold; determining a result indicating a status of the genomic test; and storing one or more of the result or the information about the genomic test in the second database. Consumers are enabled to access one or more of the result or the information about the genomic test.

HIGHLY SECURE NETWORKED SYSTEM AND METHODS FOR STORAGE, PROCESSING, AND TRANSMISSION OF SENSITIVE PERSONAL INFORMATION
20230252186 · 2023-08-10 · ·

A highly secure networked system and methods for storage, processing, and transmission of sensitive information are described. Sensitive, e.g. personal/private, information is cleansed, salted, and hashed by data contributor computing environments. Cleansing, salting, and hashing by multiple data contributor computing environments occurs using the same processes to ensure output hashed values are consistent across multiple sources. The hashed sensitive information is hashed a second time by a secure facility computing environment. The second hashing of the data involves a private salt inaccessible to third parties. The second hashed data is linked to previously hashed data (when possible) and assigned a unique ID. Data dictionaries are created for particular individuals provided access to the highly secure information, e.g. researchers. Prior to a data dictionary being accessible by a researcher computing device, the data dictionary undergoes compliance and statistical analyses regarding potential re-identification of the source unhashed data. The data dictionaries are viewable by researchers as certified views via a secure VPN.