H04L2209/88

Perturbation-based techniques for anonymizing datasets

In various embodiments, a dataset generation application generates a new dataset based on an original dataset. The dataset generation engine perturbs a first data item included in the original dataset to generate a second data item. The dataset generation application then generates a test dataset based on the original dataset and the second data item. The test dataset includes the second data item instead of the first data item. Subsequently, the dataset generation application determines that the test dataset is characterized by a first property value that is substantially similar to a second property value that characterizes the original dataset. The first property value and the second property value are associated with the same property. Finally, the dataset generation application generates a new dataset based on the test dataset. The new dataset conveys aspect(s) of the original dataset without revealing the first data item.

User interface log validation via blockchain system and methods
11663672 · 2023-05-30 · ·

Disclosed are apparatus, systems, computer readable media, or methods wherein user interface user interactions may be electronically logged and stored based on various inputs and outputs of data from the user interface forming a digital chain of events and interactions (e.g., a blockchain). An interaction logging system is disclosed including a user tracking or logging engine configured to derive session data and user interface data storing the same into interaction tracking chains or blockchains. A validation blockchain may co-exist with a session blockchain that may be formed independently and include version data of user interface software acting as a secure verifiable history of the versions of the user interface. In a session block of the session blockchain, a pointer may be stored with the session data, wherein the pointer indicates a particular block on the validation blockchain that may assist in the validation of information stored in the session blockchain.

Volumetric imaging technique for medical imaging processing system
11664115 · 2023-05-30 · ·

A medical imaging communication system processes medical images for being transmitted to a client device. The system receives a set of images, each image corresponding to a slice of a three-dimensional object. The system combines a first subset of the images into a first combined image and combines a second subset of the images into a second combined image. The first and second combined image are compressed using a lossless compression algorithm and transmitted to the client device.

Highly secure networked system and methods for storage, processing, and transmission of sensitive personal information
11657182 · 2023-05-23 · ·

A highly secure networked system and methods for storage, processing, and transmission of sensitive information are described. Sensitive, e.g. personal/private, information is cleansed, salted, and hashed by data contributor computing environments. Cleansing, salting, and hashing by multiple data contributor computing environments occurs using the same processes to ensure output hashed values are consistent across multiple sources. The hashed sensitive information is hashed a second time by a secure facility computing environment. The second hashing of the data involves a private salt inaccessible to third parties. The second hashed data is linked to previously hashed data (when possible) and assigned a unique ID. Prior to a data dictionary being accessible by a researcher computing device, the data dictionary undergoes compliance and statistical analyses regarding potential re-identification of the source unhashed data. The data dictionaries are viewable by researchers as certified views via a secure VPN.

Methods, systems and apparatus to track a provenance of goods

Methods, apparatus, systems and articles of manufacture are disclosed to track a provenance of goods. An example apparatus includes an unsigned block generator to generate a first unsigned block to store first processing data associated with the product by a first entity, a block signature engine to sign the first unsigned block with a first private key to generate a blockchain having a first signed block, the unsigned block generator to generate a second unsigned block in response to a second entity generating second processing data associated with the product by the second entity, the block signature engine to expand the blockchain by signing the second unsigned block with a second private key to generate a second signed block within the blockchain, and a blockchain validator to verify the product provenance by validating the first processing data and the second processing data using respective public keys associated with the first entity and the second entity.

System and method for out-of-band pairing of sterile device with non-sterile device
11627617 · 2023-04-11 · ·

System and methods for out-of-band pairing sterile medical device with non-sterile devices without compromising sterility thereof. A system includes a sterile medical device; a non-sterile computing device; at least one near field communication (NFC) tag; and a sterile packaging enclosing the sterile medical device. In one example, a sterile percutaneous needle guidance device needs to pair and communicate with a non-sterile computer. The sterile device has an NFC tag embedded in the sterile device and an NFC tag embedded in the sterile packaging. The two NFC tags include identification information duplicate of each other. Before opening the sterile packaging either NFC tag can be scanned with the non-sterile device to initiate wireless pairing. If the sterile package is opened before pairing, the NFC tag contained in the packaging can be brought out of the sterile field and scanned with the non-sterile computer thus preserving the sterility of the sterile device.

Method for validating a medical application, end user device and medical system

An inventive method for validating an end user device for use with a medical application. A medical application and a validation application are received in the end user device and the validation application is then executed, which includes: (i) determining the hardware and software environment of the end user device; (ii) providing a validation process compatible with the hardware and software environment; (iii) executing a test mode of the medical application; (iv) running the validation process during the test mode; and (v) determining from running the validation process whether the medical application is compatible with the end user device. When the medical application is determined to be compatible with the end user device, a validation report is generated and stored in the end user device and/or a server. When the medical application is determined to be incompatible with the end user device, the medical application is at least partially blocked.

SYSTEMS AND METHODS FOR REAL-TIME CONTRACT SETTLEMENT

In one embodiment, a real-time claim processing system is provided that quickly settles received claims. At each stage of the claim processing, the real-time processing system may write some or all of the claim to a distributed ledger, which may be later retrieved and used as evidence of the claim processing. In addition, the claim may be verified by a smart contract associated with the claim that may also control the pricing and settlement of the received claim. The use of a smart contract may allow the claim to be verified and settled in real, or near-real time, which is an improvement over current methods for processing claims which are slow and costly. Smart contracts also provide consistency and transparency to claims processing.

Systems and methods for privacy-reserving data hiding

Described in detail herein is a method for encrypting or encoding time-stamped location data associated with a computing device. The method converts time and location information associated with the computing device into a vector format. The method generates a code vector based on the converted time and location vector. The method sorts entries in the code vector based at least in part on a predetermined ordering scheme. The method executes a random modification to each of the sorted entries. The method compares the code vector to at least one other code vector associated with another computing device. The method identifies other code vectors within a specified distance of the given code vector. The method concludes that the computing device and the at least one other computing device were in proximity to each other during a time period corresponding to the time information.

SYSTEM AND METHOD FOR HEALTHCARE SECURITY AND INTEROPERABILITY

Embodiments facilitate interoperability and secure determination of healthcare costs. An entity may receive a first Electronic Health Record (EHR) sub-block with patient medical coverage information and first treatments and may transmit a first Device Drug Information (DIR) sub-block comprising first treatment classes corresponding to each first treatment, first treatment class members corresponding to each first treatment class, and corresponding first treatment class member cost information. In response, the entity may receive a second EHR sub-block comprising second treatments each: associated with a corresponding first treatment, and selected from corresponding first treatment class members. Upon receipt of a transaction confirmation, the entity may augment a multi-dimensional blockchain with a multi-dimensional block formed by linking: a DIR block including second treatment information, an EHR block including information based on the second EHR sub-block and a transaction block. Payment assistance information determined from the second EHR block may be transmitted to a patient.