Patent classifications
H04L2209/88
METHODS OF OPERATING A SYSTEM FOR MANAGEMENT OF IMPLANTABLE MEDICAL DEVICES (IMDS) USING RECONCILIATION AND REVOCATION DATA
In one embodiment, a method for operating a system for management of implantable medical devices (IMDs), comprises: conducting communications sessions with a plurality of clinician programmer devices, wherein some of the communication sessions occur white the plurality of clinician programmer devices are engaged in respective programming sessions with IMDs; conducting communications sessions with a plurality of patient controller devices, wherein the communication sessions with the patient controller devices include communication of data pertaining to offline programming of IMDs; reconciling programming session data received from the plurality of clinician programmer devices with programming session data received from patient controller devices to identify instances of unauthorized IMD programming; and distributing revocation data to patient controller devices to be downloaded to corresponding IMDs, wherein the revocation data identifies cryptographic keys that are no longer trusted.
Data authorization based on decentralized identifiers
Disclosed herein are methods, systems, and apparatus for controlling authorization of access to user data. One of the methods includes generating a first decentralized identifier based on information about a second decentralized identifier and information about a third decentralized identifier; registering a first set of records and the first decentralized identifier at a second blockchain, the second blockchain includes one or more blockchain contracts configured to, upon execution, perform one or more operations associated with the first decentralized identifier, and registering the first set of records includes storing a hash value for each record in the first set of records in the second blockchain; and controlling authorization of access to the first set of records based on the first decentralized identifier, including in response to receiving a request to grant a second user access to a particular record in the first set of records, determining whether the request includes the first decentralized identifier.
METHOD AND SYSTEM FOR BLOCKCHAIN ACCREDITATION MECHANISM BASED ON CYBERSECURITY RISK
A method may include obtaining various votes for a blockchain transaction from various blockchain nodes. The method may further include determining various weighted votes using the votes and respective cybersecurity states of the blockchain nodes. The respective cybersecurity states may correspond to whether a predetermined security vulnerability is associated with the blockchain nodes. The respective cybersecurity states may be dynamic values that are updated based on changes among predetermined security vulnerabilities. The method may further include determining whether to validate the blockchain transaction based on the weighted votes.
ANONYMIZING WIRELESS MESSAGES
Features relating to a vaporizer device configured to wirelessly broadcast anonymized advertisement messages to protect the privacy and/or security of a user of the vaporizer device and/or a user equipment.
Decentralized data authentication system for creation of integrated lifetime health records
A decentralized data authentication system integrates blockchain technologies, independent verification software, a decentralized certificate authority system implemented in the cloud, and a centralized redundant database system that together form data portability systems and data longevity systems that enable the creation of integrated lifetime health records that can be accessed by the patient, provider, and payer using public/private keys. Data portability is provided through creation of a decentralized certificate authority system that allows users to sign and later verify data that has been offline. The decentralized certificate authority system also enables tracking of data and timestamping of data via a neutral timestamping mechanism, such as the blockchain, that cannot be altered.
Identity validation and verification system and associated methods
A computer implemented system and method provide an authenticated unique digital identity through a verifying and validating an asserted identity of a user for enrollment in a secure personal dataset accessing system, wherein the personal dataset includes identifiable attributes of the user. Authenticity of an asserted user identity includes electronically verified identifiable attributes to form the personal dataset. A generated digital security element results in the user electronically receiving a password and unique electronic address assigned to the user. The digital security element is then transmitted to the user and enables electronic access to the personal dataset, the personal dataset having been authenticated through the verification and validation.
Systems and methods for insurance fraud detection
Systems and methods are described for automatically identifying fraud, waste or abuse in health insurance claims submitted to insurance companies by healthcare providers. Insurance claim information and at one image associated with the insurance claim may be received, where the image has been submitted by a healthcare provider to an insurance carrier as supporting evidence of a medical service performed by the healthcare provider. The system may generate a digital signature representing the image, then may compare the digital signature generated for the image to previously generated digital signatures of other images that have been submitted in association with other insurance claims. The system may then determine a likelihood that the given insurance claim is associated with fraud, waste or abuse, based in part on whether the digital signature is identical or close to one or more of the previously generated digital signatures.
Method for hearing system communication and related devices
A method for communication in a hearing system comprising the server device and a hearing device system, the hearing device system comprising a hearing device and a user accessory device with a user application installed thereon, the method includes: obtaining hearing device data for the hearing device; securing the hearing device data using a first security scheme to obtain a first output; securing the first output using a second security scheme to obtain a second output, wherein the second security scheme is different from the first security scheme; and transmitting the second output to the user accessory device.
SECURE MEDICAL ALERT AND MEDICAL REFERRAL DELIVERY USING A CLOUD COMPUTING SERVER IN AN ONLINE/OFFLINE MODE
A method for providing secure medical alerts includes executing, using a mobile healthcare worker application executing on a mobile healthcare worker device, a Health Level 7 (HL7) compliant protocol to retrieve medical profiles from a cloud computing server. Using the mobile healthcare worker application, a medical profile of a person (e.g., child or child's mother) is identified from the medical profiles when the mobile healthcare worker device is disconnected from the cloud computing server. The identifying includes reading, using a quick response (QR) code scanner, a QR code of an immunization document of the person, or capturing, using a biometric sensor, biometric data of the person. Using the medical profile of the person, an alert is generated indicating a medical deadline for the person on a graphical user interface of the mobile healthcare worker device when the mobile healthcare worker device is disconnected from the cloud computing server.
METHOD OF FACILITATING IMAGING STUDY INTERPRETATIONS BETWEEN HEALTHCARE FACILITIES AND PHYSICIANS INCLUDING CUSTOMIZATION OF IMAGING STUDIES
A method for allowing customization of an imaging study presented to qualified physicians to allow the qualified physicians to provide interpretations of the customized imaging study. The method includes receiving, from a healthcare facility, an imaging study and a request for interpretation of the imaging study, the request including physician selection criteria; determining identities of qualified physicians by matching physician credentials to the physician selection criteria; customizing the imaging study in accordance with preferences of the qualified physicians; providing, to the qualified physicians, the request for interpretation and access to the imaging study and the customized imaging study; and receiving an interpretation of at least one of the imaging study and the customized imaging study from those qualified physicians that have accepted the request for interpretation.