H04L2209/88

PRE-AUTHORIZATION PROCESS USING BLOCKCHAIN

A method, computer system, and a computer program product for pre-authorization is provided. The present invention may include identifying a treatment for a medical condition that yields a positive outcome. The present invention may also include identifying a plurality of key features in the identified treatment. The present invention may then include identifying a plurality of features within the plurality of key features that can be applied to a patient. The present invention may further include identifying a stakeholder based on the identified plurality of features applied to the patient. The present invention may also include authorizing the identified stakeholder. The present invention may then include creating a new block based on the authorized stakeholder. The present invention may further include adding the new block to a blockchain network for processing authorizations.

METHODS FOR DECENTRALIZED GENOME STORAGE, DISTRIBUTION, MARKETING AND ANALYSIS
20200073560 · 2020-03-05 ·

Techniques for storing omics data that indicates long sequences of elements associated with a particular biological molecule include receiving digital omics data comprising over two kilobytes. The digital omics data is split into multiple partitions. The maximum partition size is much less than then a number of elements in a typical instance of the particular biological molecule. Each partition is encrypted. Each encrypted partition is inserted into a corresponding data packet that includes an owner field that uniquely indicates an owner of the omics data. Each data packet is uploaded into a non-centralized, peer-to-peer distributed storage network. Thus, genome data is encrypted and stored in a distributed, scalable, fully decentralized, fast, and highly secure network. The network further provides for decentralized computing, trustless validation of the genomes by way of oracles and trustless genome analysis by third party providers through smart contracts.

Blockchain-backed device and user provisioning

A blockchain is used to track chain of custody associated with devices and user entities associated with those devices. In an embodiment, an identity engine traverses a blockchain to determine one or more transactions associated with a device and, in some cases, one or more users of that device. Based at least in part on the content of an authentication or provisioning request and that of the chain of custody, the identity engine provisions the device for a given user.

ESTABLISHING AN AD-HOC SECURE CONNECTION BETWEEN TWO ELECTRONIC COMPUTING DEVICES USING A SELF-EXPIRING LOCALLY TRANSMITTED INFORMATION PACKET
20200067914 · 2020-02-27 ·

Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.

Establishing an Ad-Hoc Secure Connection Between Two Electronic Computing Devices Using a Self-Expiring Locally Transmitted Information Packet
20200053072 · 2020-02-13 ·

Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.

Impedance-based physical unclonable function
10560095 · 2020-02-11 · ·

According to various aspects, systems and methods for providing a soft-decoding physical unclonable function are provided. According to one embodiment, PUF circuitry includes circuit elements with impedance values that are used to generate a PUF value. For example, one or more resistors may be connected to a voltage source. The resistors may generate a resulting voltage signal that is measured and indicates a ratio of the impedance values of the resistors. Due to manufacturing variations, each impedance value may be unique, such that the impedance values may be used to provide a unique number sequence. Each ratio value may be converted into a single bit or multi-bit digital value through digitization, for example with a comparator and/or an analog to digital converter, and the series of digital values may represent or be used to generate a unique number sequence.

Multimodal cryptographic data communications in a remote patient monitoring environment
10554632 · 2020-02-04 · ·

A system provides cryptographic means for securing the transmission of health data from devices of varying processing power and over various network protocols. The system is configured to transmit and receive packets to and from a remote patient monitoring device over multiple types of communication sessions. The system authenticates at least some of the data packet payloads and headers using multiple message authentication codes. The system can, for one type of communication session, the simulate or intercept acknowledgement packets generated for use with another type of communication session.

BLOCKCHAIN SECURITY SYSTEM FOR SECURE RECORD ACCESS ACROSS MULTIPLE COMPUTER SYSTEMS
20200035339 · 2020-01-30 ·

A computer system and method that implements data security with the use of blockchain key encryption for healthcare records that can be accessed across multiple computer systems. The use of one or more blockchain ledgers allows the securing of data with different sets of keys between the computer platforms such that data can ultimately be secured only by the entity that controls the computer system with the healthcare records, with the security system itself only verifying and securing the user's identification data. The system therefore allows the healthcare provider to maintain mandated levels of data security for their stored records, but also allows a user of the system to provide access to other healthcare providers to the records for that user which are resident across multiple computer systems.

Self-authenticating intravascular device and associated devices, systems, and methods

A method of authorizing a limited use intravascular device can include determining if the intravascular device is in communication with a clinical system; determining if the intravascular device is authorized for clinical operation without providing the clinical system access to intravascular device data stored on the intravascular device; and providing an authorization signal to the clinical system. An intravascular device can include a flexible elongate member including a sensing component at a distal portion and a connector at a proximal portion, the connector including: a memory component configured to store a parameter value; a processing component; and a charge storage component configured to power the memory component and/or the processing component; wherein the processing component is configured to determine if the flexible elongate member is authorized for clinical operation using the parameter value without providing the parameter value to a clinical system.

Method and apparatus for configuration for monitoring patient information
10542075 · 2020-01-21 · ·

A method, apparatus and computer program product are provided to facilitate reconfiguration of a patient monitoring device. In one method, an indication of an anticipated utilization of a patient monitoring device for which the patient monitoring device is not configured is received. The method also includes accessing device configuration information relating to a configuration associated with the anticipated utilization and causing provision of the device configuration information relating to the configuration associated with the anticipated utilization. In another method, information regarding a configuration of a patient monitoring device is received. The method also determines whether to differently configure the patient monitoring device in accordance with an anticipated utilization of the patient monitoring device for which the patient monitoring device is not configured. If the patient monitoring device is to be differently configured, the method causes information related to the configuration associated with the anticipated utilization to be provided.