Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication of medical device computing system by using metadata signatures

A computing system and metadata technology, applied in the field of computing systems, can solve problems such as endangering device data security

Pending Publication Date: 2022-04-12
FRESENIUS MEDICAL CARE HLDG INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unauthorized manipulation of the code of such medical devices may seriously compromise the data security of these devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication of medical device computing system by using metadata signatures
  • Authentication of medical device computing system by using metadata signatures
  • Authentication of medical device computing system by using metadata signatures

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The same reference numerals in the various figures denote the same elements.

[0031] Computer code embedded in electronic components (e.g., processors, sensors, etc.) of a medical device, such as a dialysis machine, can be obtained by signing metadata derived from the computer code of the electronic component with the pre-authentication code associated with the electronic component. The key exported in is compared to authenticate. The metadata signature can be derived by running an error checking / error correcting algorithm (eg, SHA256) on the computer code of the electronic component. The use of metadata signatures enables the detection of any unauthorized changes to computer code in contrast to pre-certified code.

[0032] A dialysis machine that may be used in connection with the treatment of kidney disease may include one or more subsystems (eg, PCBs) each including one or more electronic components (eg, processors, sensors, etc.). The authentication process is pe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computer code embedded in an electronic component (e.g., a processor, a sensor, etc.) of a medical device, such as a dialysis machine, may be authenticated by comparing a metadata signature derived from the computer code of the electronic component with a key derived from a pre-authentication code associated with the electronic component. The metadata signature may be derived by running an error check / error correction algorithm (e.g., SHA256) on computer code of the electronic component. The use of the metadata signature enables detection of any unauthorized changes to the computer code as compared to the pre-authenticated code.

Description

technical field [0001] The present invention relates to authentication of electronic components of computing systems, such as computing systems of medical devices. Background technique [0002] Data security is of paramount importance in computing systems. This is especially true for medical devices such as dialysis machines including peritoneal dialysis machines and hemodialysis machines. Official bodies such as the US Food and Drug Administration (FDA: Food and Drug Administration) require a high level of cybersecurity for medical and drug delivery devices. Unauthorized manipulation of the code of such medical devices could seriously compromise the data security of these devices. Contents of the invention [0003] Embodiments of the present disclosure include computer-implemented methods for verifying and authenticating computer systems including multiple programmable subsystems (eg, PCBs) and / or electronic components (eg, processors, sensors, FPGAs, etc.). For exampl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L9/14H04L9/40G06F21/30G06F21/57G06F21/70G06F21/71G06F21/73G06F21/76
CPCG06F21/30H04L63/083H04L9/3226H04L63/0876H04L9/0866H04L2209/34G06F21/73H04L9/0819H04L9/0861H04L9/0894H04L9/14G06F21/70G06F21/71G06F21/57G06F21/76
Inventor N·莱因费尔纳J·E·I·马纳基尔P·波琴多费尔
Owner FRESENIUS MEDICAL CARE HLDG INC