H04L2209/88

MEDICAL IMAGE TRANSFER SYSTEM
20190349755 · 2019-11-14 ·

A transfer module, such as a single board computer having wireless communication capabilities, may be attached to an image guided surgery (IGS) navigation system. Images, video, and data stored on the IGS navigation system may be moved to and stored on the transfer module in an encrypted format. The transfer module may connect to a secure network or other secure wireless communication and transfer encrypted IGS medical procedure data to a physician device, a hospital system device, or other device. After validation, the physician device or other device may decrypt and display the data. The transfer module may be useful for IGS navigation systems having no preexisting wireless capabilities; and for those having wireless capabilities that are less secure than those provided by the modified IGS navigation system. The transfer module may also wirelessly transmit IGS medical procedure data to a cloud storage system for subsequent access by end users.

SYSTEMS AND METHODS FOR MANAGING DATA PRIVACY
20190348158 · 2019-11-14 ·

This disclosure provides systems and methods for managing data privacy. Consent information can be received including a first patient identifier, a plurality of health organization identifiers, and an indication that a patient corresponding to the first patient identifier consents to sharing of health information by a plurality of health organizations corresponding to the plurality of health organization identifiers. A consent record can be stored in a database based on the consent information. A query can be received from a data sharing organization including a second patient identifier. It can be determined that data sharing organization has permission to share health information related to the patient, based on the query and the consent record. A response to the query can be generated based on the determination that the data sharing organization has permission to share health information related to the patient. The response can be transmitted to the data sharing organization.

Homomorphic encryption in a healthcare network environment, system and methods

A system and method for homomorphic encryption in a healthcare network environment is provided and includes receiving digital data over the healthcare network at a data custodian server in a plurality of formats from various data sources, encrypting the data according to a homomorphic encryption scheme, receiving a query at the data custodian server from a data consumer device concerning a portion of the encrypted data, initiating a secure homomorphic work session between the data custodian server and the data consumer device, generating a homomorphic work space associated with the homomorphic work session, compiling, by the data custodian server, a results set satisfying the query, loading the results set into the homomorphic work space, and building an application programming interface (API) compatible with the results set, the API facilitating encrypted analysis on the results set in the homomorphic work space.

Food Supply Tracking, Authentication, and Feedback System

Food supply may be tracked, authenticated, and evaluated by a variety of systems, processes, and techniques. In certain implementations, computer systems at various animal producers in the food supply chain (e.g., ranch and feedlot) may record and generate data regarding an animal (e.g., breed, age, location, hydration regimen, health history, etc.) and report this to a server system, which may process the data in an authenticated manner. Entities further down the chain (e.g., retailers) may access the server system to retrieve information about meat products and use this in sales efforts. Consumers may also retrieve information about meat products so that they may make informed buying decisions. Additionally, feedback may be provided to animal producers regarding the meat, which may encourage them to continue producing quality animals. Data may also be monetized, and a portion reinvested back to the food producer to assist in labor costs associated with system compliance.

Encryption system for medical devices

Certain aspects relate to encryption systems and methods for medical devices. A medical device can include a connectivity module for establishing a communication channel with a cloud system. After obtaining a test result, the device can generate an unencrypted data block comprising a device identifier and an encrypted data block comprising a serial number of the device and the test result using an encryption key associated with the device identifier. The device can securely send the test result to the cloud system by transmitting the unencrypted data block and the encrypted data block to the cloud system via the communication channel.

Electronic transaction security system and method
11966913 · 2024-04-23 · ·

A system and method for generating a limited use login credential associated with an account maintained by an institution, where the credential facilitates secure access to the account.

SYSTEMS, METHODS, AND APPARATUSES FOR SECURELY AUTHENTICATING DEVICE USAGE AND ACCESS
20240126282 · 2024-04-18 ·

Provided herein are embodiments of systems, methods, apparatuses, computer program products, and techniques associated with authenticating usage of, and access to, various target devices. In some embodiments, these systems, methods, apparatuses, computer program products, and techniques may be configured to facilitate compliance with predetermined requirements or restrictions, for example age restrictions, associated with the use or sale of certain devices and products.

Authentication of a ventilator

Method for authenticating at least one ventilator with at least one remote station, wherein the ventilator can connect itself via at least one interface to the remote station, at least one authentication file is stored on the ventilator, the authentication file contains at least one signature code of a signing authority, and a public keycode of the signing authority is known to the remote station, the ventilator sends the authentication file to the remote station when establishing the connection to the remote station, the remote station checks the signature code of the authentication file using the public keycode as to whether the signature code originates from the signing point and the ventilator is authenticated when the remote station recognizes the signature code as originating from the signing authority.

Method to determine a degree of abnormality, a respective computer readable medium and a distributed cancer analysis system
11954593 · 2024-04-09 · ·

Current cancer screening methods are not suitable to be applied on a broad scale and are not transparent to the patient. The problem is solved by a method to determine a degree of abnormality, the method comprising the following steps: receiving a whole slide image, the whole slide image depicting at least a portion of a cell, classifying at least one image tile of the whole slide image using a neural network to determine a local abnormality degree value associated with the at least one image tile, the local abnormality degree value indicating a likelihood that the associated at least one segment depicts at least a part of a cancerous cell, and determining a degree of abnormality for the whole slide image based on the local abnormality degree value for the at least one image tile.

Centralized and decentralized individualized medicine platform

The subject disclosure relates to systems, devices, and methods for executing operations related to procurement of individualized medicine therapies. Also disclosed are embodiments systems, methods, and devices for accessing a wide range of individualized medicine platform modules. Furthermore, disclosed herein are individualized medicine platform systems, methods and devices communicatively coupled to blockchain computing systems comprising several nodes. The disclosed systems, methods, and devices also generate chain of custody and chain of identity event data.