Patent classifications
H04L2209/88
Method of facilitating imaging study interpretations between healthcare facilities and physicians
A method for facilitating selection, by a healthcare facility, of a physician from a plurality of physicians to provide interpretation of an imaging study, is provided. The method includes receiving physician credentials from at least one physician, receiving, from the healthcare facility, an imaging study and a request for interpretation of the imaging study, the request including physician selection criteria, providing access to the imaging study and the request for interpretation to qualified physicians whose credentials match the physician selection criteria, receiving an interpretation of the imaging study from those qualified physicians that have accepted the request for interpretation, comparing the physician credentials to the physician selection criteria, and selecting an imaging study interpretation from the received imaging study interpretations based on the comparing of the physician credentials to the physician selection criteria.
DATA ENCRYPTION IN MEDICAL DEVICES WITH LIMITED COMPUTATIONAL CAPABILITY
A medical device with limited computational capability includes medical hardware, a first register to store a static, substantially unique identifier of the medical device, a second register to store a static encryption key, an interface to receive and transmit data over a short-range communication link, and processing hardware. The processing hardware is configured to apply the static encryption key to the identifier of the medical device to generate an encrypted identifier, transmit the encrypted identifier of to another device via the interface, receive an encrypted identifier of the other device, decrypt the encrypted identifier of the other device using the static encryption key to determine an identifier of the other device, generate a dynamic encryption key using the identifier of the medical device and the identifier of the other device, and apply the dynamic encryption key to medical data transmitted between the medical device and the other device.
SECURE MEDICAL APPARATUS COMMUNICATION
Secure medical apparatus communication is described herein. An example apparatus can include a processor and an apparatus communication component. The apparatus communication component can be coupled to the processor and can be configured to, in response to receiving data from an external communication component, generate an apparatus private key and an apparatus public key, provide the apparatus public key and data to the external communication component, receive data from the external communication component in response to providing the apparatus public key and data to the external communication component, decrypt the received data using the apparatus private key, verify an identity of the external communication component, and in response to verifying the identity of the external communication component, perform an operation on the medical apparatus using the received data.
Data-at-rest Encryption and Key Management in Unreliably Connected Environments
Techniques are disclosed for securing data-at-rest at an internet-of-things (IoT) site with an unreliable or intermittent connectivity to the key manager operating at a corporate data center. The IoT site deploys one or more IoT devices/endpoints that generate IoT data according to the requirements of the site. The IoT data generated by these devices is collected/aggregated by one or more gateway devices. The gateways encrypt their data-at-rest gathered from the IoT devices using cryptographic keys. In the absence of a reliable connection to a backend corporate key manager, the design employs LAN key managers deployed locally at the IoT site. The gateways obtain keys from the LAN key managers to encrypt the IoT data before storing it in their local storage. The LAN key managers may periodically download keys from the corporate key manager or generate their own keys and then later synchronize with the corporate key manager.
Mutual aid network based on smart contract and blockchain
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for implementing a mutual aid network. One of the methods includes maintaining a particular blockchain specifically for handling requests for aid from a group of members; receiving transaction data encoding user responses to queries from the blockchain network for requesting the user responses regarding a particular request for aid; executing the smart contract using the particular blockchain to process the transaction data; in response to response results indicating that sufficient user responses have been received from the members of the subset of the group, and that a sufficient percentage of the subset of the group have agreed to the particular request for aid, computing an amount of contribution due to each member of the group; and instructing a gateway to trigger the amount of contribution to originate from each member of the group.
COMPUTER-IMPLEMENTED SYSTEM AND METHODS FOR PREDICTING THE HEALTH AND THERAPEUTIC BEHAVIOR OF INDIVIDUALS USING ARTIFICIAL INTELLIGENCE, SMART CONTRACTS AND BLOCKCHAIN
A computer implemented method of predicting the health and therapeutic behavior of patients and making treatment plan recommendations includes the steps of: receiving patient healthcare data having one or more conditions and limiting factors; determining a therapeutic behavior pattern of patient; determining unsuccessful therapies and successful therapies for each condition based on therapeutic behavior pattern; and calculating cost quote for successful therapies based on limiting factors for time period. A computer implemented method of providing cost effective therapy for a patient is also provided and includes the steps of: receiving patient healthcare data; determining unsuccessful therapies and successful therapies; calculating probability of disease progression; calculating possible therapies ranked by probability of successful treatment; calculate cost quote for possible therapies; and paying a smart contract for a selected therapy.
Homomorphic encryption in a healthcare network environment, system and methods
A system and method for homomorphic encryption in a healthcare network environment is provided and includes receiving digital data over the healthcare network at a data custodian server in a plurality of formats from various data sources, encrypting the data according to a homomorphic encryption scheme, receiving a query at the data custodian server from a data consumer device concerning a portion of the encrypted data, initiating a secure homomorphic work session between the data custodian server and the data consumer device, generating a homomorphic work space associated with the homomorphic work session, compiling, by the data custodian server, a results set satisfying the query, loading the results set into the homomorphic work space, and building an application programming interface (API) compatible with the results set, the API facilitating encrypted analysis on the results set in the homomorphic work space.
Multi agent consensus resolution and re-planning
Systems and methods are provided for collaborative decision-making in medicine. The systems can employ a distributed record-keeping and verification system to solicit suggested modifications to an initial healthcare regime from interested healthcare workers. The systems can aggregate the suggested modifications and use a consensus algorithm to determine the most appropriate modification.
SYSTEM AND METHOD FOR AUTHENTICATING WIRELESS PROGRAMMING DEVICES IN PROGRAMMABLE MEDICAL SYSTEMS
A medical device of a medical system is configured for communicating with an external programmer over a wireless communications link. The medical device comprises a wireless communications module configured for receiving a first unencrypted version of a random number and a first encrypted version of the random number from the external programmer over the wireless communications link. The medical device further comprises control circuitry configured for performing an authentication procedure on the external programmer based on the first unencrypted version of the random number and the first encrypted version of the random number, and preventing the external programmer from commanding the medical device to perform an action unless the authentication procedure is successful.
SECURE NETWORKED RESPIRATORY THERAPY SYSTEMS
Methods and apparatus provide communications among respiratory therapy device (TD), server and intermediary (e.g., a control device (CTLD) for the therapy device) to improve security. More secure communication channel(s) may be established using shared secrets derived with different channels. The communications may include transmitting therapy data from TD to server for authentication. The CTLD may receive the data and a nonce from a server. The CTLD receives from the TD a signing key dependent on the nonce and a secret shared by TD and server. The CTLD generates an authorisation code with received therapy data and the key for authentication of the data by the server upon its receipt of the code and data. The server computes (1) a key from the nonce and the secret known to TD, and (2) another authorisation code from received therapy data and the key. Data authentication may involve comparing received and computed codes.