Patent classifications
H04L2209/88
System and method for authenticating wireless programming devices in programmable medical systems
A medical device of a medical system is configured for communicating with an external programmer over a wireless communications link. The medical device comprises a wireless communications module configured for receiving a first unencrypted version of a random number and a first encrypted version of the random number from the external programmer over the wireless communications link. The medical device further comprises control circuitry configured for performing an authentication procedure on the external programmer based on the first unencrypted version of the random number and the first encrypted version of the random number, and preventing the external programmer from commanding the medical device to perform an action unless the authentication procedure is successful.
METHODS OF OPERATING A SYSTEM FOR MANAGEMENT OF IMPLANTABLE MEDICAL DEVICES (IMDS) USING RECONCILIATION OPERATIONS AND REVOCATION DATA
In one embodiment, a method for operating a system for management of implantable medical devices (IMDs), comprises: conducting communications sessions with a plurality of clinician programmer devices, wherein some of the communication sessions occur while the plurality of clinician programmer devices are engaged in respective programming sessions with IMDs; conducting communications sessions with a plurality of patient controller devices, wherein the communication sessions with the patient controller devices include communication of data pertaining to offline programming of IMDs; reconciling programming session data received from the plurality of clinician programmer devices with programming session data received from patient controller devices to identify instances of unauthorized IMD programming; and distributing revocation data to patient controller devices to be downloaded to corresponding IMDs, wherein the revocation data identifies cryptographic keys that are no longer trusted.
METHOD OF FACILITATING IMAGING STUDY INTERPRETATIONS BETWEEN HEALTHCARE FACILITIES AND PHYSICIANS
A method for facilitating selection, by a healthcare facility, of a physician from a plurality of physicians to provide interpretation of an imaging study, is provided. The method includes receiving physician credentials from at least one physician, receiving, from the healthcare facility, an imaging study and a request for interpretation of the imaging study, the request including physician selection criteria, providing access to the imaging study and the request for interpretation to qualified physicians whose credentials match the physician selection criteria, receiving an interpretation of the imaging study from those qualified physicians that have accepted the request for interpretation, comparing the physician credentials to the physician selection criteria, and selecting an imaging study interpretation from the received imaging study interpretations based on the comparing of the physician credentials to the physician selection criteria.
APPARATUS AND METHOD FOR PROVIDING AND MANAGING SECURITY INFORMATION IN COMMUNICATION SYSTEM
The present disclosure relates to a technology for a sensor network, machine to machine (M2M) communication, machine type communication (MTC), and Internet of things (IoT). The present disclosure relates to an operation method of a first device in a communication system, the operation method comprising a step of receiving, from a server, security information of a second device associated with the first device, wherein the security information includes a first parameter associated with an operation of the second device, and attribute information associated with the first parameter.
CHAOS CODING BASED COMMUNICATIONS FOR MRI COILS
A method for communicating magnetic resonance imaging (MRI) information wirelessly includes detecting an MRI system emission sequence, and identifying at least one parameter of the sequence. The at least one parameter identified is cross-correlated. A first initial condition for a first chaotic coded sequence and a second initial condition for a second chaotic coded sequence are determined based on the at least one parameter. The method further includes obtaining, from a modulation symbol mapped to MRI information generated at a local coil responsive to the sequence, a real component of the symbol and an imaginary component of the symbol. The real component of the symbol is encrypted based on the first initial condition, and the imaginary component of the symbol is encrypted based on the second initial condition. The encrypted real component and imaginary component of the symbol are wirelessly transmitted.
System and Method of Providing a Secure Inter-Domain Data Management Using Blockchain Technology
A system and method of providing a secure inter-domain data management platform based on blockchain technology allows a user to access files of one or more organizations based on the credentials of the user. The system includes at least one remote server and a network of computing nodes. The remote server is used to manage at least one group. The at least one group may be one or more intelligence or government organizations. The at least one group includes a plurality of member accounts. Each member account includes a member access level. The network of computing nodes is used to manage a blockchain system and to store a plurality of files. Each file includes a file access level. A user with a member account can access a file in accordance to the member access level of the member account and the file access level of the file.
Mobile carrier-centric data record custodian systems and methods
A system for mobile carrier-centric data record custodians is provided and includes cellular network interfaces that transmit and receive wireless communication over a cellular network, an electronic medical record (EMR) database that stores EMRs, and a mobile account management server coupled with the cellular network interfaces and the EMR database, the mobile account management server receiving an EMR request associated with a mobile user account over the cellular network, querying the EMR database for a results set having EMRs satisfying the query, generating a plurality of EMR responses to the EMR request as a function of the results set and state information associated with the cellular network, and transmitting the plurality of EMR responses over the plurality of cellular network interfaces to the mobile device via the cellular network, the plurality of EMR responses being formatted for wireless protocols of the cellular network interfaces over which they are transmitted.
Verification of data provenance for existing computer systems
A proof of provenance system receives database logs from an existing system that does not natively provide data provenance verification. The system produces a local representation of the database (or a portion thereof). The system periodically or in response to another triggering event flattens the local representation of the database to generate an aggregated slice, which is stored in an aggregated slice store. A reduced representation of the aggregated slice (e.g., a hash or checksum) is determined and appended to a distributed ledger, such as a blockchain. The provenance of data from the existing system can then be verified by redetermining the reduced representation and comparing it to the version appended to the distributed ledger.
Computer architecture incorporating blockchain based immutable audit ledger for compliance with data regulations
A computer system architecture and method for providing compliance with data regulations, by: (a) collecting a data input stream with a data collection terminal; (b) using a compliance device driver resident in the data collection terminal to: (1) select data corresponding to pre-identified data compliance fields, and (2) apply a compliance markup language parser to generate pseudonymized data; and (c) using an automated compliance network appliance and an automated compliance server to: (1) transmit the pseudonymized data into immutable audit ledger, wherein the immutable audit ledger is assembled and verified by blockchain, and (2) transmit the data input stream into a data lake; (d) hosting access portals for accessing data: (1) stored in the data lake, and (2) stored in the immutable audit ledger.
System and method utilizing facial recognition with online (social) network to access casualty health information in an emergency situation
A system, method, and computer program product for automatically identifying a casualty and matching an electronic health record (EHR) to the casualty. A casualty identification is determined by matching a presenting image of the casualty with one of a master image or a social media profile image of the casualty. A recognized patient broadcast module (RPBM) is configured to query one or more electronic health records (EHR) service providers for the existence of an EHR corresponding the identified casualty and automatically communicate the existence of the EHR to the EMS provider. A blockchain trusted identification module (BTIM) is configured to establish a trust relationship between the EMS provider and the one or more EHR service providers to establish a trusted pathway for delivery of the casualty's EHR to the EMS provider. With the casualty's EHR emergency responders to can provide better care for the casualty in an emergency situation.