Authentication of medical device computing system by using metadata signatures
A computing system and metadata technology, applied in the field of computing systems, can solve problems such as endangering device data security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The same reference numerals in the various figures denote the same elements.
[0031] Computer code embedded in electronic components (e.g., processors, sensors, etc.) of a medical device, such as a dialysis machine, can be obtained by signing metadata derived from the computer code of the electronic component with the pre-authentication code associated with the electronic component. The key exported in is compared to authenticate. The metadata signature can be derived by running an error checking / error correcting algorithm (eg, SHA256) on the computer code of the electronic component. The use of metadata signatures enables the detection of any unauthorized changes to computer code in contrast to pre-certified code.
[0032] A dialysis machine that may be used in connection with the treatment of kidney disease may include one or more subsystems (eg, PCBs) each including one or more electronic components (eg, processors, sensors, etc.). The authentication process is pe...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


