Patent classifications
H04L2209/88
SECURE COMMUNICATION LINK BETWEEN MEDICAL APPARATUSES OF A DATA-MANAGEMENT DEVICE
Implementations relate to a method for establishing an end-to-end encrypted data communication link between a portable medical apparatus and a data-management device. The method comprises at least the following steps: out-of-band transmission of a public key from the medical apparatus to the data-management device, wherein the transmission does not take place via Bluetooth; setting up an encrypted Bluetooth data communication link between the medical apparatus and the data-management device; transmitting a public key from the data-management device to the medical apparatus via the Bluetooth link that has been set up; calculating a combined key on the data-management device and on the medical apparatus; setting up an end-to-end encrypted link between the medical apparatus and the data-management device using the combined key, such as a symmetrical, key.
Method for Securely Storing and Retrieving Medical Data
A gateway and a method are provided for securely storing (and/or securely retrieving) medical data the method for storing comprising at least steps of: obtaining, in a secure environment, medical data which include patient property data as well as patient identifier data wherein the patient identifier data indicate at least one patient to which the patient property data correspond; generating, in the secure environment de identified medical data by replacing the patient identifier data in the medical data with non-patient-identifying coded identifiers; generating, in the secure environment, a re-identifying database indicating correspondences between the non-patient-identifying coded identifiers and the patient identifier data; generating n encrypted re-identifying database by applying, in the secure environment, at least one symmetric and/or asymmetric encryption method to the re-identifying database; storing the encrypted re-identifying database and the de-identified medical data on a cloud storage outside of the secure environment.
SYSTEMS, METHODS, AND APPARATUSES FOR SECURELY AUTHENTICATING DEVICE USAGE AND ACCESS
Provided herein are embodiments of systems, methods, apparatuses, computer program products, and techniques associated with authenticating usage of, and access to, various target devices. In some embodiments, these systems, methods, apparatuses, computer program products, and techniques may be configured to facilitate compliance with predetermined requirements or restrictions, for example age restrictions, associated with the use or sale of certain devices and products.
Data authorization based on decentralized identifiers
Disclosed herein are methods, systems, and apparatus for controlling authorization of access to user data. One of the methods includes generating a first decentralized identifier based on information about a second decentralized identifier and information about a third decentralized identifier; registering a first set of records and the first decentralized identifier at a second blockchain, the second blockchain includes one or more blockchain contracts configured to, upon execution, perform one or more operations associated with the first decentralized identifier, and registering the first set of records includes storing a hash value for each record in the first set of records in the second blockchain; and controlling authorization of access to the first set of records based on the first decentralized identifier, including in response to receiving a request to grant a second user access to a particular record in the first set of records, determining whether the request includes the first decentralized identifier.
Centralized and decentralized individualized medicine platform
The subject disclosure relates to systems, devices, and methods for executing operations related to procurement of individualized medicine therapies. Also disclosed are embodiments systems, methods, and devices for accessing a wide range of individualized medicine platform modules. Furthermore, disclosed herein are individualized medicine platform systems, methods and devices communicatively coupled to blockchain computing systems comprising several nodes. The disclosed systems, methods, and devices also generate chain of custody and chain of identity event data.
SECURED COMMUNICATIONS IN MEDICAL MONITORING SYSTEMS
In one embodiment, a method for secured communication between a medical sensor and a computing device includes receiving, by the medical sensor, an authentication request from the computing device. The method includes generating, based on values provided in the authentication request, a challenge-response message for the computing device. The method includes receiving, from the computing device, a responsive challenge-response message. The method includes verifying that the responsive challenge-response message includes an expected value and corresponds to an expected format. The method includes, in response to verifying the responsive challenge-response message, sending a sensor secret value to the computing device.
AUTOMATED SYSTEM AND METHOD FOR PROVIDING RADIOLOGICAL SECOND OPINIONS
A computer-implemented method for providing a radiological opinion includes the steps of: (a) receiving an order for a radiological opinion by means of a web-based application accessible to a user; (b) launching an upload/scan application accessible to the user; (c) scanning a user-selected folder or drive for DICOM images; (d) parsing the DICOM images found in step (c); (e) uploading the DICOM images parsed in step (d); (f) routing the uploaded DICOM images to a picture archiving communication system; (g) generating a radiology order; (h) routing the radiology order to a radiology information system; (i) receiving a radiological opinion; (j) routing the radiological opinion to the user and (k) receiving electronic payment from the user following a successful upload of the radiological opinion, the electronic payment being governed by blockchain technology.
Data-at-rest encryption and key management in unreliably connected environments
Techniques are disclosed for securing data-at-rest at an internet-of-things (IoT) site with an unreliable or intermittent connectivity to the key manager operating at a corporate data center. The IoT site deploys one or more IoT devices/endpoints that generate IoT data according to the requirements of the site. The IoT data generated by these devices is collected/aggregated by one or more gateway devices. The gateways encrypt their data-at-rest gathered from the IoT devices using cryptographic keys. In the absence of a reliable connection to a backend corporate key manager, the design employs LAN key managers deployed locally at the IoT site. The gateways obtain keys from the LAN key managers to encrypt the IoT data before storing it in their local storage. The LAN key managers may periodically download keys from the corporate key manager or generate their own keys and then later synchronize with the corporate key manager.
Systems and Methods for Privacy-Reserving Data Hiding
Described in detail herein is a method for encrypting or encoding time-stamped location data associated with a computing device. The method converts time and location information associated with the computing device into a vector format. The method generates a code vector based on the converted time and location vector. The method sorts entries in the code vector based at least in part on a predetermined ordering scheme. The method executes a random modification to each of the sorted entries. The method compares the code vector to at least one other code vector associated with another computing device. The method identifies other code vectors within a specified distance of the given code vector. The method concludes that the computing device and the at least one other computing device were in proximity to each other during a time period corresponding to the time information.
SECURE REMOTE HEALTH DATA
The disclosure relates to methods and systems of providing secure remote health data routing for diagnostics, treatment, monitoring, and/or other health data. The system may use an anonymized identification (ID) token that may protect privacy and ensure security. The ID token may be attached with additional data such as electronic medical record (EMR) data. As such, the system may digitize and securely transmit EMR data to appropriate constituents. The system may apply routing rules and routing tables to identify the appropriate constituents. The system may also route the EMR data for storage at a user's personal device, which may include a chip card or a user device. As such, the user's personal device may store an EMR based on the EMR data, including proof of health, such as vaccination, and other health data relating to the user.