H04L2209/88

Secure transmission of electronic health records via blockchain

The present disclosure provides a method for securely transmitting electronic healthcare records between computing devices in communication. A request is received to access a database of electronic health records, checking for an authorization requirement, and generating a token associated with the authorization requirement and the received request. The token corresponds to a block in a Blockchain. The block includes a cryptographic hash of a previous block, a timestamp, and transaction data related to the received request, and the at least one authorization requirement. The token can be sent to allow access to at least one electronic health record in the database of electronic health records.

SYSTEM AND METHOD WHICH USING BLOCKCHAIN PROTECTS THE PRIVACY OF ACCESS CODE AND THE IDENTITY OF AN INDIVIDUAL SEEKING ONLINE ACCESS
20210273804 · 2021-09-02 ·

This invention relates to personal identity management and verifiable and authenticable methods and systems for mobile personal credentials. A critical problem is knowing the true identity of counterparties while using electronic messaging or conducting online transactions. Existing security measures can be bypassed when identity is presented in electronic form. The inventors address these issues by providing digital ID document in conjunction with data that permits the other party to verify ID. Further, the inventors either link the electronic ID to its physical counterpart or to the actual physical individual presenting the ID. Immutable digital ledger technology, such as blockchain, is used to provide trustworthy authentication of digital identity along with assurance that the identity presented belongs to the individual presenting it.

ELECTRONIC PATIENT CREDENTIALS

An issuer client of a service provider establishes a trusted, private, and cryptographically secured connection with a wallet application of a user through a cloud-based agent and provides credential information to the wallet application via the private connection. The credential information is encrypted using a public key of the wallet application dedicated for the private connection with the cloud-based agent. Upon receiving the encrypted credential information, the wallet application decrypts it using a private key to obtain the credential information. The cloud-based agent digitally signs the credential information using a private key of the issuer client, which can be verified by a public key of the issuer client stored in a public identity ledger.

SECURELY TRANSMITTING DATA DURING AN AUDIO CALL
20210288825 · 2021-09-16 ·

Sharing data by defining a data encoding table, maintaining a data record database, defining a data encryption code, providing the data encryption code with an outgoing call, receiving an audio response including encrypted data, decrypting the encrypted data, and updating the data record database according to the data.

System and method of trustless confidential positive identification and de-anonymization of data using blockchain
20210266170 · 2021-08-26 ·

A system and method for enrollment and matching of a positive biometric identification belonging to an individual that has a biometric template of the individual cryptographically encrypted and masked to others. Data relating to the individual can be connected to the biometric identification in a way that others may access the data without being able to identify the individual or access the biometric template; hence privacy is preserved. The biometric template is completely controlled by the individual in the sense that the data is available and anonymized, but can only be de-anonymized by the individual.

DATA SYSTEM WITH INFORMATION PROVENANCE
20210273812 · 2021-09-02 ·

A secure, integrated data system and method users both blockchain and Trusted Execution Environment (TEE) technologies to achieve information provenance for data, particularly, mobile health device data. Using a blockchain to record and enforce data access policies removes the need to trust a single entity with gatekeeping the health data. Instead, participants form a consortium and collectively partake in verifying and enforcing access policies for data stored in private data silos. Data access and computation takes place inside of TEEs, which preserves data confidentiality and provides a verifiable attestation that can be stored on the blockchain for the purpose of information provenance.

Biometric Authentication for Access to Medical Information on a Distributed Ledger

A permissioned blockchain network can include a plurality of peer nodes and an orderer node. A first peer node of the plurality of peer nodes can be associated with a plurality of patients. A second peer node of the plurality of peer nodes can be associated with a plurality of medical professionals. A third peer node of the plurality of peer nodes can be associated with a plurality of caregivers. A plurality of channels can be used by the plurality of peer nodes to communicate and to update a plurality of ledgers. A first ledger of the plurality of ledgers can include medical history data associated with the plurality of patients. A second ledger of the plurality of ledgers can include prescription history data associated with the plurality of patients. A third ledger of plurality of ledgers can include remote patient monitoring device data associated with the plurality of patients.

PLASTIC ARTICLES MADE FROM THE SEGREGATION, DECONTAMINATION, AND PURIFICATION OF BIOMEDICAL WASTE PLASTICS IN A SYSTEM LEVERAGING WASTE PRODUCTION DATA TO MODIFY MATERIAL PURIFICATION AND PRODUCT MANUFACTURING
20210182801 · 2021-06-17 · ·

A process for the segregation, sterilization, and purification of recycled plastic medical waste with the subsequent production of plastic products made therefrom is disclosed. Also disclosed is a method for the front-end segregation of recycled plastic medical waste into a polypropylene waste stream and a mixed plastic waste stream. These segregated streams are further purified through a processing method that removes contaminating fibrous, metal and other waste products. Polypropylene and mixed plastic streams isolated using these methods yield a homogenous material that can be blended with other materials for the production of raw plastic or for extrusion to form commercial plastic products. A method for tracking regulated and non-regulated medical waste stream production kinetics and chain of custody from discrete waste disposal sites is also disclosed.

Pairing and synchronizing a mobile phone application with a handheld glucose meter

A diabetes management system includes a handheld medical device, a mobile computing device, and a diabetes management application. The handheld medical device is configured to determine, in response to a port receiving a test strip, whether an auto-send feature is enabled on the handheld medical device, determine whether the handheld medical device is paired with a mobile computing device, and selectively instruct a wireless transceiver to establish a wireless connection and communicate a glucose measurement and identifying information to the mobile computing device. The mobile computing device is configured to execute the diabetes management application. The diabetes management application is configured to process a plurality of glucose measurements and identifying information associated with each of a plurality of glucose measurements.

EVALUATION OF A MONITORING FUNCTION
20210157937 · 2021-05-27 ·

According to one aspect, there is provided a server for use in evaluating a monitoring function to determine if a trigger condition is satisfied. The server comprises a processing unit and a memory unit. The memory unit is for storing a current monitoring state (Ss) of the server or an encrypted current monitoring state (S) of the monitoring function, the current monitoring state (Ss) of the server relating to the current monitoring state (S) of the monitoring function that is based on an evaluation of one or more previous events. The processing unit is configured to receive an indication of a first event from a first client node and evaluate the monitoring function to determine if the first event satisfies the trigger condition. The evaluation is performed using a privacy-preserving computation (PPC), with the server providing the current monitoring state (Ss) of the server as a first private input to the PPC or the encrypted current monitoring state (S) of the monitoring function as a first input to the PPC, and the first client node providing the first event or an encryption thereof as a private input to the PPC. The evaluation of the monitoring function provides an encrypted updated monitoring state (S′) of the monitoring function or an updated monitoring state (Ss′) of the server as an output of the monitoring function and an indication of whether the first event satisfies the trigger condition.