Patent classifications
H04L2209/88
BLOCKCHAIN-BASED MECHANISMS FOR SECURE HEALTH INFORMATION RESOURCE EXCHANGE
Technologies are disclosed herein to secure flexible access to the healthcare information resources (HIR) contained within electronic health records (EHR) systems. By managing access permissions with certified self-sovereign identities and distributed ledger techniques, HIR may be secured. Patients and other users may be registered to access a distributed ledger, such as a healthcare blockchain, employed to set, host and adjudicate permissions to access HIR. Authorized owners and/or patients with rights to their own HIR may be able to grant fine-grained and conditional access permissions to third-parties. Information transfers and transactions occurring according to these permissions may be logged within smart contracts incorporated in the healthcare blockchain.
Hearing device system, devices and method of creating a trusted bond between a hearing device and a user application
A method, performed by a user application, of creating a trusted bond between a hearing device and the user application is disclosed, wherein the method comprises obtaining first authentication material; transmitting a first authentication request comprising a first authentication type identifier and first authentication data to the hearing device; receiving a first authentication response comprising a sound signal from the hearing device; deriving second authentication material based on the sound signal; determining second authentication data based on the second authentication material; transmitting a second authentication request comprising the second authentication data to the hearing device; receiving a second authentication response comprising an authentication key identifier from the hearing device; storing an authentication key and the authentication key identifier, wherein the authentication key is based on the first authentication material; and connecting the user application to the hearing device using the authentication key and the authentication key identifier.
SYSTEMS AND METHODS FOR GENERATING IDENTITY ATTESTATIONS ATTRIBUTABLE TO INTERNALLY GENERATED DATA COLLECTED AT THE EDGE
A microelectronic device that includes a sensor die, compute fabric dies each having processing components and data storage components, and storage component dies. Within each compute fabric die at least one of the processing components is coupled to at least one of the data storage components. Each storage component die is coupled to at least one compute fabric die. A least one of a data processing component and a storage component of the microelectronic device is electrically coupled to a sensor of the sensor die. At least one processing component is constructed to select an intrinsic properties component and generate identifying information by: changing biasing and control parameters of the selected intrinsic properties component, and generating the identifying information based on the results of the changing of the biasing and control parameters.
Microspring structure for hardware trusted platform module
A secured system includes at least one semiconductor chip comprising information processing circuitry. An array of contact pads is disposed on a surface of the chip and is electrically coupled to the information processing circuitry. The secured system includes one or more semiconductor chiplets. Each chiplet comprises at least a portion of at least one hardware trusted platform module that cryptographically secures the information processing circuitry. An array of electrically conductive microsprings is disposed on a surface of the chiplet and is electrically coupled between the hardware trusted platform module and the contact pads.
System and method for securing data communication between computers
An aspect of the present disclosure generally relates to a computer system (100) and method (200) for securing data communication between a first computer (110) and a second computer (120). The method (200) comprises: cooperatively executing (202), by the first computer (110) and the second computer (120), a first data communication instruction for communicating first data from the first computer (110) to the second computer (120); generating (204) a first session key by the first computer (110); encrypting (206), by the first computer (110) the first data using the first session key; encrypting (208), by the first computer (110) the first session key using a first public key, the first public key paired with a first private key which are generated for the second computer (120); sending (210) the encrypted first data and first session key from the first computer (110) to the second computer (120); decrypting (212), by the second computer (120), the encrypted first session key using the first private key; decrypting (214), by the second computer (120) the encrypted first data using the decrypted first session key; and processing (216), by the second computer (120), the decrypted first data based on the first data communication instruction.
Medical image transfer system
A transfer module, such as a single board computer having wireless communication capabilities, may be attached to an image guided surgery (“IGS”) navigation system. Images, video, and data stored on the IGS navigation system may be moved to and stored on the transfer module in an encrypted format. The transfer module may connect to a secure network or other secure wireless communication and transfer encrypted IGS medical procedure data to a physician device, a hospital system device, or other device. After validation, the physician device or other device may decrypt and display the data. The transfer module may be useful for IGS navigation systems having no preexisting wireless capabilities; and for those having wireless capabilities that are less secure than those provided by the modified IGS navigation system. The transfer module may also wirelessly transmit IGS medical procedure data to a cloud storage system for subsequent access by end users.
SYSTEM AND METHOD FOR MULTIPARTY SECURE COMPUTING PLATFORM
Systems, methods, and corresponding non-transitory computer readable media describe a proposed system adapted as a platform governing the loading of data in a multiparty secure computing environment. In the multiparty secure computing environment described herein, multiple parties are able to load their secure information into a data warehouse having specific secure processing adaptations that limit both access and interactions with data stored thereon.
SYSTEM AND METHOD FOR DATA PROVIDER TRACKING AND MONETIZATION
A data provider tracking and monetization system is disclosed that can provide data aggregation infrastructure, tracking, and monetization. The present disclosure achieves the technological advantage of organizing data that is received from multiple data providers for a single person to provide any missing data. The data providers can be tracked via the provision of their data, such that they can be incentivized for providing the data. The present disclosure improves traditional systems by generating a data structure that includes metadata to identify data providers and data requestors to minimize network congestion, uncategorized data, and stale data that ravages traditional systems. Further by publishing the transactions on a distributed ledger, such as a blockchain, the request for data and all of the contributions thereto provide an open, verifiable, and immutable record of the transaction.
MEDICAL CONDITION DIAGNOSIS BASED ON SEPARATE DATA SETS
An approach for detecting potential medical conditions may be provided. Privacy laws and healthcare regulations may prevent healthcare entities from sharing data or acknowledging even seeing a patient. Secure multi-party computation can allow for the analysis of or more patient's private health data in a secure database. The private health data will only be visible to the health entity which owns or controls the data. Further, a system with oblivious random access memory may be presented which allows for the analysis of one or more patient's multiple private healthcare records. A medical condition diagnosis may be made from the analysis of the multiple private healthcare records by the secure multi-party computation using oblivious random access memory, without divulging information any private healthcare data to unauthorized parties.
Systems and methods for managing a trusted service provider network
A system including one or more memory devices having instructions thereon, that, when executed by one or more processors, cause the one or more processors to receive a request from a service provider to be added to a trusted network of service providers, receive health safety data of a health data stream associated with the service provider and risk data of a risk data stream indicating risk levels associated with the service provider, determine that the service provider meets a level of heath safety by correlating the health safety data of the health data stream with the risk data of the risk data stream, receive a request from a device for a service provider recommendation of the trusted network of service providers, and provide an indication of the service provider to the device in response to a reception of the request for the service provider recommendation.