H04L2209/88

Method and apparatus for logging into medical devices
10516536 · 2019-12-24 · ·

The invention relates to a method for logging a service technician into an electrical device (20), comprising the following steps: production (3, 4) of a secret key (SKY) as an encrypted login password (LPW) by the electrical device (20), displaying (5) of the secret key (SKY) on a display unit (23) of the electrical device (20) as a QR code (QRC), optical sensing (6) of the QR code (QRC) by means of a mobile device (22), decryption (9) of the login password (LPW) from the secret key (SKY) of the sensed QR code (QRC) by the mobile device (22), displaying of the login password (LPW) on a screen unit (24) of the mobile device (22), entering of the login password (LPW) into the electrical device (20) by the service technician, comparison (10) of the entered login password (LPW) with the produced login password (LPW) by the electrical device (20), release of the login by the electrical device (20) if the two login passwords (LPW) match. The invention further relates to an associated apparatus. The advantage of the invention lies in the combination of the high strength of the cryptographic security with the user friendliness of the QR code and of the relatively short login password to be entered.

MULTIVARIATE ENCRYPTION SYSTEMS AND METHODS
20190386827 · 2019-12-19 ·

Multivariate encryption systems and methods are provided herein. An example method includes receiving a multivariate input set that includes a plurality of sensitive data objects arranged according to a record template, encrypting the multivariate input set into an encrypted representation, receiving a request for at least a portion of the plurality of sensitive data objects, extracting the at least a portion of the plurality of sensitive data object from the encrypted representation and generating a response message that includes only the at least a portion of the plurality of sensitive data objects that were extracted from the encrypted representation.

System for providing a data market for health data and for providing rewards to data market participants

A system for maintaining accurate health data and for providing rewards to data market participants. A marketplace platform based on Blockchain technology leverages smart contracts to provide rewards to sellers of data assets that provide corrections or updates to medical data, such as provider demographics. A URL API is provided to a buyer of the data with an encrypted password that is used to access the data from the URL API.

Plastic articles made from the segregation, decontamination, and purification of biomedical waste plastics in a system leveraging waste production data to modify material purification and product manufacturing

A process for the segregation, sterilization, and purification of recycled plastic medical waste with the subsequent production of plastic products made therefrom is disclosed. Also disclosed is a method for the front-end segregation of recycled plastic medical waste into a polypropylene waste stream and a mixed plastic waste stream. These segregated streams are further purified through a processing method that removes contaminating fibrous, metal and other waste products. Polypropylene and mixed plastic streams isolated using these methods yield a homogenous material that can be blended with other materials for the production of raw plastic or for extrusion to form commercial plastic products. A method for tracking regulated and non-regulated medical waste stream production kinetics and chain of custody from discrete waste disposal sites is also disclosed.

Homomorphic encryption in a healthcare network environment, system and methods

A system and method for homomorphic encryption in a healthcare network environment is provided and includes receiving digital data over the healthcare network at a data custodian server in a plurality of formats from various data sources, encrypting the data according to a homomorphic encryption scheme, receiving a query at the data custodian server from a data consumer device concerning a portion of the encrypted data, initiating a secure homomorphic work session between the data custodian server and the data consumer device, generating a homomorphic work space associated with the homomorphic work session, compiling, by the data custodian server, a results set satisfying the query, loading the results set into the homomorphic work space, and building an application programming interface (API) compatible with the results set, the API facilitating encrypted analysis on the results set in the homomorphic work space.

System and method for multiparty secure computing platform

Systems, methods, and corresponding non-transitory computer readable media describe a proposed system adapted as a platform governing the loading of data in a multiparty secure computing environment. In the multiparty secure computing environment described herein, multiple parties are able to load their secure information into a data warehouse having specific secure processing adaptations that limit both access and interactions with data stored thereon.

DATA SYNCHRONIZATION OF ELECTRONIC PATIENT CONTROLLED HEALTH RECORDS
20240087692 · 2024-03-14 · ·

A system and method that facilitates the automated replication of electronic medical record information between a patient and a health-care provider (HCP), such as a doctor, pharmacy, drug manufacturer, biologic manufacturer, or medical device manufacturer. The system uses: a cloud-based infrastructure that includes databases, mathematical models, and configuration information; a patient's electronic health record system providing personal data around a patient's individual personal electronic medical record (PEMR); and a server used to coordinate and authenticate the replication of data between the cloud-based infrastructure, the PEMR, and the EMR/EHR system of the HCP. The system provides support and security, such as by geographically distributed data fragmentation, for mobile platforms and web-based platforms and sophisticated mechanisms for the transmission of data between these systems.

Zero-Trust Cloud Development

Techniques for zero-trust cloud deployment are described herein. In accordance with various embodiments, a device including a processor and a non-transitory memory derives a key from deployment metadata of a virtual machine, where the deployment metadata change with each deployment of the virtual machine. The device then encrypts secrets using the key to bind the key to the virtual machine. The device further deploys the virtual machine in a cloud using the deployment metadata, including loading the encrypted secrets to the deployed virtual machine in the cloud.

System and method for secure relayed communications from an implantable medical device
11930126 · 2024-03-12 · ·

The present invention provides systems and methods for supporting encrypted communications with a medical device, such as an implantable device, through a relay device to a remote server, and may employ cloud computing technologies. An implantable medical device is generally constrained to employ a low power transceiver, which supports short distance digital communications. A relay device, such as a smartphone or WiFi access point, acts as a conduit for the communications to the internet or other network, which need not be private or secure. The medical device supports encrypted secure communications, such as a virtual private network technology. The medical device negotiates a secure channel through a smartphone or router, for example, which provides application support for the communication, but may be isolated from the content.

Method for providing an authenticated digital identity
11928197 · 2024-03-12 ·

A method for verifying and validating identifiable attributes of a user includes electronically receiving the attributes of a user and verifying their authenticity. The attributes are also validated by confirming each matches a corresponding evidenced based attribute. An internal unique identity number is assigned in concert with authenticated user attributes. Access to the identifiable attributes having the identifier is only permitted by the user or a designee of the user. A level of confidence is established from a ranking of the validated attributes. An authenticated digital identity is then formed from the identifiable validated attributes, and a level of confidence for the authenticated digital identity is established from the ranking.