Unlock instant, AI-driven research and patent intelligence for your innovation.

Control access to clinical data analyzed by remote computing resources

A remote computing and clinical data technology, applied in computing, digital data protection, electronic clinical trials, etc., can solve the problem that intruders cannot read or modify clinical data

Active Publication Date: 2018-10-26
KONINKLJIJKE PHILIPS NV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically, communicating clinical data is encrypted to protect the content of transmitted messages so that an intruder cannot read or modify the clinical data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control access to clinical data analyzed by remote computing resources
  • Control access to clinical data analyzed by remote computing resources
  • Control access to clinical data analyzed by remote computing resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] refer to figure 1 , a block diagram illustrating one embodiment of an information technology (IT) infrastructure 10 of a system for controlling access to clinical data analyzed by remote computing resources. The IT infrastructure 10 suitably includes one or more healthcare systems and providers 12, remote computing resources 14, etc. interconnected via a communication network 16. It is envisioned that communication network 16 includes one or more of an intranet, local area network, wide area network, wireless network, wired network, cellular network, data bus, personal area network, and the like. Healthcare provider 12 collects clinical data related to patients 18 under the care of a healthcare system or medical facility, which is analyzed by remote computing resource 14 . In one embodiment, the healthcare system or medical facility is located in a cloud infrastructure. In other embodiments, the system may be located at a single location. In yet another embodiment, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for controlling access to data being processed by a remote computing resource includes issuing a public encryption key for a creator of the data from a public certificate authority, detecting a rendezvous with the data owner, and responding to detecting the rendezvous to create private encryption keys for the data creator and the data owner, using the public encryption key, the data creator's private encryption key, and the data owner's private encryption key to data being sent to a remote computing resource is encrypted based on public verification of the public encryption key at the remote computing resource and the data creator's private encryption key and the data owner's private encryption local verification of the key to decrypt the data, and to control the data creator's access to the data by altering the permission of at least one of the public encryption key and the data creator's private encryption key Access.

Description

technical field [0001] This application relates to the analysis of clinical data by remote computing resources. This application finds application in connection with, and will be described with particular reference to, systems and methods for controlling access by healthcare providers to clinical data analyzed by remote computing resources. However, it should be understood that the present application is also applicable to other usage scenarios and is not necessarily limited to the above-mentioned applications. Background technique [0002] It is necessary to ensure the secure protection of information transmitted through and between clinical resources. Because patient medical information is confidential and protected by federal and state laws and regulations, such as HIPAA in the United States, it is important to protect the communicated clinical data during its transmission and storage. Security of communications between clinical resources is typically achieved by contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62H04L9/08G16H10/20G16H10/60G16H40/67
CPCG06F21/6245G06F2221/2147H04L9/083H04L9/321H04L2209/88H04L9/3263G16H10/20G16H10/60G16H40/67G06F21/62H04L9/14H04L9/32H04L2209/24H04L2209/64H04L63/0428
Inventor B·D·格罗斯
Owner KONINKLJIJKE PHILIPS NV