Patent classifications
H04L2209/88
Face reattachment to brain imaging data
A cloud computing system is described that communicates with a virtual machine to reattach the face of a patient to brain imaging data before the brain imaging data is transmitted for display on a brain navigation system.
Systems and methods for creating a universal record
A method for tracking multiple classes of records in a single blockchain is disclosed. Class identifiers can used for each record entry to distinguish between classes within the blockchain.
Personal prescription dispenser
Disclosed is a method and apparatus for transporting and dispensing medications for a patient according to a medication schedule for the patient. A smart container from a pharmacy is received at the patient's site and the container is checked to make sure that the container was delivered to the correct patient site. The smart container contains a memory device that contains identification information of the patient, dosage and treatment instructions for the patient. This information and the medication were checked for compatibility before the smart container was delivered. The identity of the patient at the patient's site is then checked and the patient performs on or more biometric tests before the medication is dispensed by the smart container. Upon taking the medication and providing video proof thereof, the smart container is returned to the pharmacy.
Secure electronic health record access during an emergency medical event
Access to Electronic Health Records (EHR) is protected by law in many countries, including the US through HIPAA. During an emergency medical situation however, access to this information by the Emergency Care Team (ECT) may save the life of the Person In Distress (PID). The present invention describes a system and method for managing the access to EHRs based on the membership in a pre-established ECT and the communication status of the ECT Members during an Emergency Event. This invention includes a method of Encryption key exchange to ensure EHRs are only shared with authorized participants during the emergency event. This system and method further provides for the secure and immutable recording of the individuals who accessed the EHRs during this emergency event.
Securely transmitting data during an audio call
Sharing data by defining a data encoding table, maintaining a data record database, defining a data encryption code, providing the data encryption code with an outgoing call, receiving an audio response including encrypted data, decrypting the encrypted data, and updating the data record database according to the data.
System and method for use of filters within a cryptographic process
A method for encrypting plaintext data is enclosed that includes operations of receiving the plaintext data, the plaintext data including a plurality of data portions, encrypting each of the plurality of data portions using a specific key for each data portion, merging each of the plurality of data portions together to form a single data stream, generating a data map of the single data stream, appending the data map to the single data stream, and performing a master cipher to form an encrypted distributable stream. Operations of the encrypting include: an additive operation on each byte of the first data portion using the additive table, an XOR operation on each byte of the first data portion as modified by the additive operation, a substitution operation on each byte of the first data portion using the substitution table as modified by the XOR operation.
Healthcare monitoring method and system for secure communication of patient data
There is provided a method in a healthcare monitoring system for anonymous communication of patient data associated with a patient from an electronic user device, using a patient application implemented in the electronic user device, to a host server, using a host application implemented in the host server, via a wireless network, and identification of the patient associated with the patient data after the patient data is received in the host server. There is further provided a corresponding system, computer program and non-volatile data carrier containing the computer program.
System and method for use of filters within a cryptographic process
A method for encrypting plaintext data is enclosed that includes operations of receiving the plaintext data, the plaintext data including a plurality of data portions, encrypting each of the plurality of data portions using a specific key for each data portion, merging each of the plurality of data portions together to form a single data stream, generating a data map of the single data stream, appending the data map to the single data stream, and performing a master cipher to form an encrypted distributable stream. Operations of the encrypting include: an additive operation on each byte of the first data portion using the additive table, an XOR operation on each byte of the first data portion as modified by the additive operation, a substitution operation on each byte of the first data portion using the substitution table as modified by the XOR operation.
Evaluation of a monitoring function
According to one aspect, there is provided a server for use in evaluating a monitoring function to determine if a trigger condition is satisfied. The server comprises a processing unit and a memory unit. The memory unit is for storing a current monitoring state (Ss) of the server or an encrypted current monitoring state (S) of the monitoring function, the current monitoring state (Ss) of the server relating to the current monitoring state (S) of the monitoring function that is based on an evaluation of one or more previous events. The processing unit is configured to receive an indication of a first event from a first client node and evaluate the monitoring function to determine if the first event satisfies the trigger condition. The evaluation is performed using a privacy-preserving computation (PPC), with the server providing the current monitoring state (Ss) of the server as a first private input to the PPC or the encrypted current monitoring state (S) of the monitoring function as a first input to the PPC, and the first client node providing the first event or an encryption thereof as a private input to the PPC. The evaluation of the monitoring function provides an encrypted updated monitoring state (S′) of the monitoring function or an updated monitoring state (Ss′) of the server as an output of the monitoring function and an indication of whether the first event satisfies the trigger condition.
Computerized network system for initiating, facilitating, auditing, and managing communications and documents involving professional expertise
A computerized network links individual lay users, referred to as “standard users,” with qualified professionals in one or more disciplines, such as law, medicine, engineering, accounting and architecture, who are referred to as “participating professionals.” Business entities, such as corporations, partnerships and limited liability companies, can also participate as “enterprise users,” with linkage through the network to both standard users and participating professionals. The network enables standard users, participating professionals and enterprise users to communicate, share information, conduct studies, and negotiate and/or create documents relating to the professional disciplines.