[go: up one dir, main page]

US20160103964A1 - Methods and systems for secure acquisition, interpretation and transmission of data under hipaa compliant protocol - Google Patents

Methods and systems for secure acquisition, interpretation and transmission of data under hipaa compliant protocol Download PDF

Info

Publication number
US20160103964A1
US20160103964A1 US14/879,193 US201514879193A US2016103964A1 US 20160103964 A1 US20160103964 A1 US 20160103964A1 US 201514879193 A US201514879193 A US 201514879193A US 2016103964 A1 US2016103964 A1 US 2016103964A1
Authority
US
United States
Prior art keywords
patient
volatile memory
memory space
patient identifier
mobile device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/879,193
Inventor
Federico Osorio
Andres Gutierrez Ovalles
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MD Cloud Pratice Solutions LLC
Original Assignee
MD Cloud Pratice Solutions LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MD Cloud Pratice Solutions LLC filed Critical MD Cloud Pratice Solutions LLC
Priority to US14/879,193 priority Critical patent/US20160103964A1/en
Assigned to MD Cloud Practice Solutions, L.L.C. reassignment MD Cloud Practice Solutions, L.L.C. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: OSORIO, FEDERICO, OVALLES, ANDRES GUTIERREZ
Publication of US20160103964A1 publication Critical patent/US20160103964A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G06F19/328
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • G06F19/322
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H30/00ICT specially adapted for the handling or processing of medical images
    • G16H30/20ICT specially adapted for the handling or processing of medical images for handling medical images, e.g. DICOM, HL7 or PACS
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • G16H40/20ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/143Termination or inactivation of sessions, e.g. event-controlled end of session
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • the disclosure relates to methods and systems for secure acquisition, interpretation and transmission of data under HIPAA compliant protocol.
  • HIPAA Health Insurance Portability and Accountability Act
  • healthcare providers e.g., physicians, hospitals
  • health insurance companies and other businesses associated with the healthcare industry to implement control of access to mobile devices, computer systems and networks that process and store patient health information (PHI).
  • PHI patient health information
  • HIPAA requires that mobile devices and computer systems that process and store PHI are protected from intrusion.
  • HIPAA requires any communication containing PHI transmitted electronically over open networks is encrypted to prevent unauthorized interception.
  • Various disclosed embodiments provide methods and systems, executable on a mobile device, for acquiring a machine-readable optical code, decoding the optical code into a patient identifier, and receiving from a database a billing record filled with patient data corresponding to the patient identifier.
  • the method includes reading by a mobile device a machine-readable optical code and decoding the optical code into a patient identifier.
  • the method includes transmitting the patient identifier to a database.
  • the method includes receiving from the database at least partially filled billing record with patient data corresponding to the patient identifier, and displaying on the mobile device the at least partially filled billing record.
  • the patient identifier is an ASCII code that identifies a patient.
  • the machine-readable optical code may be a Quick Response Code or a standard one-dimensional barcode.
  • the method includes searching the database using the patient identifier, and retrieving the patient data corresponding to the patient identifier.
  • the method includes at least partially filling a billing record with the patient data, and transmitting the at least partially filled billing record to the mobile device.
  • the method includes allocating a volatile memory space in the mobile device for a session, and storing the patient identifier in the allocated volatile memory space.
  • the method includes transmitting the patient identifier using a secure transmission protocol during the session.
  • the method includes de-allocating the volatile memory space at the termination of the session, wherein the de-allocation of the volatile memory space causes the patient identifier to be erased from the volatile memory space.
  • the method includes allocating volatile memory space in the mobile device for a session, and storing the received patient data and the at least partially filled billing record in the allocated volatile memory space.
  • the method includes de-allocating the volatile memory space at the termination of the session, wherein the de-allocation of the volatile memory space causes the stored patient data and the at least partially filled billing record to be erased from the volatile memory space.
  • a system includes a mobile communication device configured to communicate over a communication network.
  • the mobile communication device includes at least one processor and a volatile memory space coupled to the processor.
  • the volatile memory space is allocated for a defined session and de-allocated at the termination of the session.
  • the system includes a barcode reader configured to read a machine-readable optical code and to decode the optical code into a patient identifier.
  • the processor is configured to store the patient identifier, patient data corresponding to the patient identifier, and a billing record at least partially filled with the patient data in the volatile memory space. The de-allocation of the volatile memory space erases stored data in the volatile memory space.
  • FIG. 1 is a schematic block diagram of a communication system in which embodiments of the disclosure can be implemented
  • FIG. 2 illustrates an application executable on the mobile device according to disclosed embodiments
  • FIG. 3 illustrates the application with a scan button
  • FIG. 4 shows an acquired QR code
  • FIG. 5 is a flow diagram of a method according to disclosed embodiments.
  • FIG. 6 illustrates a partially filled billing record
  • FIG. 7 is a flow diagram of a method according to disclosed embodiments.
  • FIGS. 1-7 discussed below, and the various embodiments used to describe the principles of the present disclosure are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will recognize that the principles of the disclosure may be implemented in any suitably arranged device or a system. The numerous innovative teachings of the present disclosure will be described with reference to exemplary non-limiting embodiments.
  • Various disclosed embodiments provide methods and systems, executable on a mobile device, for acquiring a machine-readable code, decoding the code into a patient identifier, and receiving from a database a billing record filled with patient data corresponding to the patient identifier.
  • methods and systems provide secure acquisition of a machine-readable optical code by a mobile device.
  • the mobile device includes a processor coupled to a memory, including a non-volatile memory defined for a session.
  • the machine-readable optical code is decoded into a patient identifier and is stored in the non-volatile memory.
  • the patient identifier is transmitted to a database using a secure transmission protocol (STP).
  • STP secure transmission protocol
  • the database is searched using the patient identifier, and patient data corresponding to the patient identifier is retrieved.
  • a billing record is at least partially filled with the patient data, and the at least partially filled billing record is transmitted to the mobile device.
  • the billing record is displayed on the mobile device.
  • the volatile memory is de-allocated, thereby erasing the patient data, the billing record or any other patient health information (PHI) from the volatile memory.
  • PHI patient health information
  • FIG. 1 is a schematic block diagram of a communication system 100 in which embodiments of the disclosure can be implemented.
  • the system 100 includes a mobile communication device 104 which may take the form of a mobile phone, a laptop computer, a tablet computer or the like.
  • the mobile device 104 is configured to wirelessly communicate with other communication devices via a communication network 122 .
  • the network 122 may be a mobile cellular network such as a 3GPP network or other CDMA/GSM network.
  • the network 122 may be linked to another network 126 such as the Internet.
  • the system 100 includes a web server 130 and an application server 134 connected to the Internet 126 .
  • the application server 134 is configured to store one or more applications and provide access to the applications over the Internet.
  • the mobile device 104 can access the applications over the networks 122 and 126 , and run the applications remotely.
  • the web server 130 is configured to generate web pages including any web pages generated by running one or more applications in the application server 134 .
  • the mobile device 104 can download web pages from the web server 130 over the networks 122 and 126 .
  • a database 138 is connected to the application server 134 .
  • the database 138 is configured to store data such as, for example, patient data.
  • the patient data may include patient health information (PHI) which contains patient medical records.
  • PHI patient health information
  • the application server 134 may include a search engine configured to search the database 138 and retrieve data from the database 138 .
  • the search results may be downloaded by the mobile device 104 over the networks 122 and 126 .
  • the mobile device 104 can search and download PHI from the database 138 over the networks 122 and 126 .
  • the mobile device 104 includes a processor 108 connected to a memory 112 .
  • the processor 108 may be of the type generally used in mobile devices such as those manufactured by Intel Corporation or ARM Holdings.
  • the memory 112 comprises a non-volatile memory 116 and a volatile memory 120 .
  • the non-volatile memory 116 any data stored is persistently retained even after electrical power is removed from the non-volatile memory 116 .
  • any data stored in the non-volatile memory 116 is not erased following removal of electrical power.
  • any data stored in the volatile memory 120 is erased, and thus lost, after electrical power is removed from the volatile memory 120 .
  • any data stored in the volatile memory 120 is not persistently retained after removal of electrical power.
  • the volatile memory space may be allocated by marking portions of it as being allocated to an application in a memory allocation table and de-allocated by marking those portions as unallocated at the termination of the session and perhaps also overwriting it.
  • the volatile memory space may be allocated by applying electrical power to the volatile memory 120 and de-allocated by removing electrical power at the termination of the session.
  • Volatile memory space that is temporarily allocated to an application is sometimes called “scratchpad” memory.
  • a “sandbox” is designed to prevent applications from interfering with one another or the operating system, except as the operating system permits.
  • the mobile device 104 also includes a barcode reader 114 configured to acquire machine-readable optical code.
  • the barcode reader 114 may be a barcode scanner which illuminates a machine-readable optical code with red light.
  • a sensor in the barcode scanner detects the reflected light and generates an analog signal with varying voltage that represents the intensity of the reflection.
  • a converter changes the analog signal to a digital signal which is fed to a decoder.
  • the decoder converts the code to an ASCII text, which is stored in the memory 112 .
  • the barcode reader 114 is configured to read a one-dimensional barcode or a Quick Response (QR) code.
  • QR code is a matrix or two-dimensional barcode.
  • a QR code includes square dots arranged in a square grid on a white background, which can be read by a barcode reader.
  • the barcode or QR code may be decoded into a patient identifier which identifies a patient by name, date of birth, or other identifying information.
  • the mobile device 104 also includes a transceiver 140 coupled to an antenna 144 .
  • the transceiver 118 includes conventional transmit and receive circuitry configured to transmit and receive signals wirelessly via the antenna 120 over a wireless network such as the network 122 .
  • FIG. 2 illustrates an exemplary application 200 executable on the mobile device 104 .
  • the application 200 may reside in the mobile device 104 or may reside remotely such as, for example, in the application server 134 .
  • a user may download and access the application over the networks 122 and 126 using the mobile device 104 .
  • the application 200 provides a username 204 field and a password 208 field displayed on the mobile device 104 .
  • a user can login by entering a username and a password.
  • a connection is established with a secure server such as the server 130 and the server 134 over the networks 122 and 126 .
  • a web page 300 is displayed which has a scan button 304 as shown in FIG. 3 .
  • the user can press the scan button 304 to activate the barcode reader 114 of the mobile device 104 to read a machine-readable optical code.
  • the machine-readable optical code may be a standard one-dimensional barcode or a QR code.
  • the code may be decoded into a patient identifier which identifies a patient.
  • FIG. 4 shows a QR code 404 acquired by the mobile device 104 .
  • the QR code 404 may be processed using an error correction method so that the image in the QR code 404 can be interpreted.
  • the data in the QR code 404 is extracted (i.e., decoded) from patterns present in horizontal and vertical components of the image.
  • the QR code 404 may be decoded into a patient identifier which identifies a patient by name, date of birth or other identifying information.
  • a volatile memory space in the volatile memory 120 is allocated by the processor 108 for a defined session and de-allocated at the termination of the session.
  • the session is defined for a predetermined time period.
  • the volatile memory space may be allocated by applying electrical power to the volatile memory 120 and de-allocated by removing electrical power at the termination of the session.
  • the acquired machine-readable optical code (e.g., QR code 404 ) is stored in the allocated volatile memory space.
  • the volatile memory space may be a random access memory (RAM).
  • the stored code is then encrypted and transmitted to a remote server using a secure transmission protocol.
  • the code may be encrypted and transmitted to the application server 134 over the networks 122 and 126 .
  • the encrypted code is authenticated upon reception.
  • the volatile memory space is de-allocated which causes the stored code and any other patent health information (PHI) to be erased from the volatile memory space.
  • PHI patent health information
  • the volatile memory space is de-allocated by removing electrical power from the volatile memory. Consequently, any PHI and other patient data are not persistently retained in the mobile device 104 after the termination of the session.
  • the disclosed embodiments provide secure acquisition and transmission of PHI in compliance with HIPAA. Since the patient identifier and all other PHI are erased from the volatile memory after the defined session, and thus not persistently retained by the mobile device 104 , the data is protected from intrusion and misappropriation. Also, because the transmitted data is encrypted, they are prevented from unauthorized interception.
  • FIG. 5 is a flow diagram of a method according to disclosed embodiments.
  • a machine readable optical code is read by a mobile device.
  • a QR code may be read by the barcode scanner 114 of the mobile device 104 .
  • the optical code is decoded into a patient identifier.
  • the QR code may be decoded into a patient identifier by extracting the data from the patterns in horizontal and vertical components of the image in the QR code.
  • the patient identifier may be an ASCII code that identifies a patient by name, date of birth and/or other identifying information.
  • a volatile memory space is allocated for a defined session.
  • the volatile memory space may be allocated for a predetermined time period by applying electrical power to the volatile memory.
  • the patient identifier is stored in the allocated volatile memory space.
  • the patient identifier is encrypted and transmitted using a secure transmission protocol. For example, the patient identifier may be transmitted using a secure transmission protocol to the database 138 over the networks 122 and 126 .
  • the database 138 is searched using the patient identifier for corresponding patient data.
  • a search engine in the application server 134 may be used to search the database 138 and retrieve patent data corresponding to the patient identifier.
  • a patient billing record is retrieved from the database 138 and the billing record is partially or completely filled with the patient data.
  • the billing record is at least partially filled the patient data which may include PHI.
  • the database 138 is configured to auto-complete one or more fields in the billing record. Also, the database 138 features selection data entry fields that are updated with user interaction. The database 138 dynamically collects data, which eliminates the need for end user platform releases as new data gather entries are implemented.
  • the partially (or completely) filled billing record is downloaded by the mobile device 104 over the networks 122 and 126 , and the billing record is displayed on the mobile device 104 .
  • FIG. 6 shows a partially filled billing record 604 displayed on the mobile device 104 .
  • the billing record may be stored in the volatile memory 120 .
  • the volatile memory 120 is un-allocated, thus erasing the billing record, the patient data or any other PHI. Consequently, after the termination of the session, no PHI is retained by the mobile device 104 .
  • FIG. 7 is a flow diagram of a method according to disclosed embodiments.
  • the patient identifier is received by the database 138 .
  • the mobile device 104 transmits the patient identifier over the networks 122 and 126 to the database 138 .
  • the database 138 is searched using the patient identifier, and patient data corresponding to the patient identifier is retrieved from the database 138 .
  • a search engine in the application server 134 may be utilized to search and retrieve the patient data from the database 138 .
  • the patient data is downloaded by the mobile device 104 over the networks 122 and 126 .
  • machine usable/readable or computer usable/readable mediums include: nonvolatile, hard-coded type mediums such as read only memories (ROMs) or erasable, electrically programmable read only memories (EEPROMs), and user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs).
  • ROMs read only memories
  • EEPROMs electrically programmable read only memories
  • user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs).

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Medical Informatics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Primary Health Care (AREA)
  • General Engineering & Computer Science (AREA)
  • Public Health (AREA)
  • Epidemiology (AREA)
  • Software Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
  • Radiology & Medical Imaging (AREA)
  • Biomedical Technology (AREA)
  • Telephonic Communication Services (AREA)
  • Computing Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Methods and systems for acquiring a machine-readable optical code, decoding the optical code into a patient identifier, and receiving from a database a billing record filled with patient data corresponding to the patient identifier. The method includes reading by a mobile device the machine-readable optical code and decoding the optical code into a patient identifier. The method includes transmitting the patient identifier to a database. The method includes receiving from the database at least partially filled billing record with patient data corresponding to the patient identifier and displaying on the mobile device the at least partially filled billing record. The method includes searching the database using the patient identifier, and retrieving the patient data corresponding to the patient identifier. The method includes at least partially filling a billing record with the patient data, and transmitting the at least partially filled billing record to the mobile device.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This application claims the benefit of U.S. Provisional Application Ser. No. 62/062,601, filed by Osorio, et al., on Oct. 10, 2014, entitled “Multi-feature Mobile Software Application that Generate [sic.] a Secure Environment to Capture Data under a HIPAA/Hitech Complaint [sic.] Protocol,” commonly assigned with this application and incorporated herein by reference.
  • TECHNICAL FIELD
  • The disclosure relates to methods and systems for secure acquisition, interpretation and transmission of data under HIPAA compliant protocol.
  • BACKGROUND
  • The Health Insurance Portability and Accountability Act (HIPAA) requires healthcare providers (e.g., physicians, hospitals), health insurance companies and other businesses associated with the healthcare industry to implement control of access to mobile devices, computer systems and networks that process and store patient health information (PHI). HIPAA requires that mobile devices and computer systems that process and store PHI are protected from intrusion. Also, HIPAA requires any communication containing PHI transmitted electronically over open networks is encrypted to prevent unauthorized interception.
  • Since healthcare providers and other businesses associated with the healthcare industry typically operate and maintain computer systems, networks, and applications to process and store PHI, they must ensure that PHI is protected from intrusions. Also, healthcare providers and health insurance companies must ensure that electronically transmitted PHI is protected from unauthorized interception. If PHI is stolen by intrusion of computer systems or if PHI is intercepted during transmission, businesses may face legal and financial liabilities.
  • Recently, increasing use of mobile communication and computing devices have encouraged development of systems that enable communication with healthcare service providers from a mobile device. Some systems allow a person to review medical records and update records from a mobile device. For example, an application may enable entry and upload of personal information from a mobile device to a physician's office prior to a visit. However, existing systems and methods generally do not allow secure acquisition and transmission of PHI. Also, existing systems and methods do not allow convenient and efficient upload of information containing PHI from a mobile device. Accordingly, improved systems and methods are needed.
  • SUMMARY
  • Various disclosed embodiments provide methods and systems, executable on a mobile device, for acquiring a machine-readable optical code, decoding the optical code into a patient identifier, and receiving from a database a billing record filled with patient data corresponding to the patient identifier.
  • According to disclosed embodiments, the method includes reading by a mobile device a machine-readable optical code and decoding the optical code into a patient identifier. The method includes transmitting the patient identifier to a database. The method includes receiving from the database at least partially filled billing record with patient data corresponding to the patient identifier, and displaying on the mobile device the at least partially filled billing record. The patient identifier is an ASCII code that identifies a patient. The machine-readable optical code may be a Quick Response Code or a standard one-dimensional barcode.
  • The method includes searching the database using the patient identifier, and retrieving the patient data corresponding to the patient identifier. The method includes at least partially filling a billing record with the patient data, and transmitting the at least partially filled billing record to the mobile device.
  • The method includes allocating a volatile memory space in the mobile device for a session, and storing the patient identifier in the allocated volatile memory space. The method includes transmitting the patient identifier using a secure transmission protocol during the session. The method includes de-allocating the volatile memory space at the termination of the session, wherein the de-allocation of the volatile memory space causes the patient identifier to be erased from the volatile memory space.
  • The method includes allocating volatile memory space in the mobile device for a session, and storing the received patient data and the at least partially filled billing record in the allocated volatile memory space. The method includes de-allocating the volatile memory space at the termination of the session, wherein the de-allocation of the volatile memory space causes the stored patient data and the at least partially filled billing record to be erased from the volatile memory space.
  • According to disclosed embodiments, a system includes a mobile communication device configured to communicate over a communication network. The mobile communication device includes at least one processor and a volatile memory space coupled to the processor. The volatile memory space is allocated for a defined session and de-allocated at the termination of the session.
  • The system includes a barcode reader configured to read a machine-readable optical code and to decode the optical code into a patient identifier. The processor is configured to store the patient identifier, patient data corresponding to the patient identifier, and a billing record at least partially filled with the patient data in the volatile memory space. The de-allocation of the volatile memory space erases stored data in the volatile memory space.
  • The foregoing has outlined rather broadly the features and technical advantages of the present disclosure so that those skilled in the art may better understand the detailed description that follows. Additional features and advantages of the disclosure will be described hereinafter that form the subject of the claims. Those skilled in the art will appreciate that they may readily use the conception and the specific embodiment disclosed as a basis for modifying or designing other structures for carrying out the same purposes of the present disclosure. Those skilled in the art will also realize that such equivalent constructions do not depart from the spirit and scope of the disclosure in its broadest form.
  • Before undertaking the DETAILED DESCRIPTION below, it may be advantageous to set forth definitions of certain words or phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, whether such a device is implemented in hardware, firmware, software or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, and those of ordinary skill in the art will understand that such definitions apply in many, if not most, instances to prior as well as future uses of such defined words and phrases. While some terms may include a wide variety of embodiments, the appended claims may expressly limit these terms to specific embodiments.
  • BRIEF DESCRIPTION
  • Reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
  • FIG. 1 is a schematic block diagram of a communication system in which embodiments of the disclosure can be implemented;
  • FIG. 2 illustrates an application executable on the mobile device according to disclosed embodiments;
  • FIG. 3 illustrates the application with a scan button;
  • FIG. 4 shows an acquired QR code;
  • FIG. 5 is a flow diagram of a method according to disclosed embodiments;
  • FIG. 6 illustrates a partially filled billing record; and
  • FIG. 7 is a flow diagram of a method according to disclosed embodiments.
  • DETAILED DESCRIPTION
  • FIGS. 1-7, discussed below, and the various embodiments used to describe the principles of the present disclosure are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will recognize that the principles of the disclosure may be implemented in any suitably arranged device or a system. The numerous innovative teachings of the present disclosure will be described with reference to exemplary non-limiting embodiments.
  • Various disclosed embodiments provide methods and systems, executable on a mobile device, for acquiring a machine-readable code, decoding the code into a patient identifier, and receiving from a database a billing record filled with patient data corresponding to the patient identifier.
  • According to disclosed embodiments, methods and systems provide secure acquisition of a machine-readable optical code by a mobile device. The mobile device includes a processor coupled to a memory, including a non-volatile memory defined for a session. The machine-readable optical code is decoded into a patient identifier and is stored in the non-volatile memory.
  • During the defined session, the patient identifier is transmitted to a database using a secure transmission protocol (STP). The database is searched using the patient identifier, and patient data corresponding to the patient identifier is retrieved. A billing record is at least partially filled with the patient data, and the at least partially filled billing record is transmitted to the mobile device. The billing record is displayed on the mobile device.
  • At the conclusion or termination of the defined session, the volatile memory is de-allocated, thereby erasing the patient data, the billing record or any other patient health information (PHI) from the volatile memory. Thus, after the termination of the session, no PHI is persistently retained by the mobile device.
  • FIG. 1 is a schematic block diagram of a communication system 100 in which embodiments of the disclosure can be implemented. The system 100 includes a mobile communication device 104 which may take the form of a mobile phone, a laptop computer, a tablet computer or the like. The mobile device 104 is configured to wirelessly communicate with other communication devices via a communication network 122. The network 122 may be a mobile cellular network such as a 3GPP network or other CDMA/GSM network. The network 122 may be linked to another network 126 such as the Internet.
  • The system 100 includes a web server 130 and an application server 134 connected to the Internet 126. The application server 134 is configured to store one or more applications and provide access to the applications over the Internet. Thus, the mobile device 104 can access the applications over the networks 122 and 126, and run the applications remotely. The web server 130 is configured to generate web pages including any web pages generated by running one or more applications in the application server 134. The mobile device 104 can download web pages from the web server 130 over the networks 122 and 126.
  • A database 138 is connected to the application server 134. The database 138 is configured to store data such as, for example, patient data. The patient data may include patient health information (PHI) which contains patient medical records.
  • The application server 134 may include a search engine configured to search the database 138 and retrieve data from the database 138. The search results may be downloaded by the mobile device 104 over the networks 122 and 126. Thus, for example, using the search engine the mobile device 104 can search and download PHI from the database 138 over the networks 122 and 126.
  • The mobile device 104 includes a processor 108 connected to a memory 112. The processor 108 may be of the type generally used in mobile devices such as those manufactured by Intel Corporation or ARM Holdings.
  • According to disclosed embodiments, the memory 112 comprises a non-volatile memory 116 and a volatile memory 120. In the non-volatile memory 116, any data stored is persistently retained even after electrical power is removed from the non-volatile memory 116. Thus, any data stored in the non-volatile memory 116 is not erased following removal of electrical power. In contrast, any data stored in the volatile memory 120 is erased, and thus lost, after electrical power is removed from the volatile memory 120. Thus, any data stored in the volatile memory 120 is not persistently retained after removal of electrical power.
  • According to disclosed embodiments, the volatile memory space may be allocated by marking portions of it as being allocated to an application in a memory allocation table and de-allocated by marking those portions as unallocated at the termination of the session and perhaps also overwriting it. Alternatively, the volatile memory space may be allocated by applying electrical power to the volatile memory 120 and de-allocated by removing electrical power at the termination of the session. Volatile memory space that is temporarily allocated to an application is sometimes called “scratchpad” memory. In the context of certain mobile device operating systems commercially available from Apple Incorporated of Cupertino, Calif. (e.g., OS X®), such temporarily allocated volatile memory is called a “sandbox” and is designed to prevent applications from interfering with one another or the operating system, except as the operating system permits.
  • The mobile device 104 also includes a barcode reader 114 configured to acquire machine-readable optical code. The barcode reader 114 may be a barcode scanner which illuminates a machine-readable optical code with red light. A sensor in the barcode scanner detects the reflected light and generates an analog signal with varying voltage that represents the intensity of the reflection. A converter changes the analog signal to a digital signal which is fed to a decoder. The decoder converts the code to an ASCII text, which is stored in the memory 112.
  • According to disclosed embodiments, the barcode reader 114 is configured to read a one-dimensional barcode or a Quick Response (QR) code. A QR code is a matrix or two-dimensional barcode. A QR code includes square dots arranged in a square grid on a white background, which can be read by a barcode reader. The barcode or QR code may be decoded into a patient identifier which identifies a patient by name, date of birth, or other identifying information.
  • The mobile device 104 also includes a transceiver 140 coupled to an antenna 144. The transceiver 118 includes conventional transmit and receive circuitry configured to transmit and receive signals wirelessly via the antenna 120 over a wireless network such as the network 122.
  • FIG. 2 illustrates an exemplary application 200 executable on the mobile device 104. The application 200 may reside in the mobile device 104 or may reside remotely such as, for example, in the application server 134. When the application 200 resides in the application server 134, a user may download and access the application over the networks 122 and 126 using the mobile device 104.
  • The application 200 provides a username 204 field and a password 208 field displayed on the mobile device 104. A user can login by entering a username and a password. Upon successful login a connection is established with a secure server such as the server 130 and the server 134 over the networks 122 and 126. Once the user is logged on, a web page 300 is displayed which has a scan button 304 as shown in FIG. 3. The user can press the scan button 304 to activate the barcode reader 114 of the mobile device 104 to read a machine-readable optical code. As discussed before, the machine-readable optical code may be a standard one-dimensional barcode or a QR code. The code may be decoded into a patient identifier which identifies a patient.
  • FIG. 4 shows a QR code 404 acquired by the mobile device 104. The QR code 404 may be processed using an error correction method so that the image in the QR code 404 can be interpreted. The data in the QR code 404 is extracted (i.e., decoded) from patterns present in horizontal and vertical components of the image. For example, the QR code 404 may be decoded into a patient identifier which identifies a patient by name, date of birth or other identifying information.
  • According to disclosed embodiments, a volatile memory space in the volatile memory 120 is allocated by the processor 108 for a defined session and de-allocated at the termination of the session. The session is defined for a predetermined time period. According to disclosed embodiments, the volatile memory space may be allocated by applying electrical power to the volatile memory 120 and de-allocated by removing electrical power at the termination of the session.
  • According to disclosed embodiments, the acquired machine-readable optical code (e.g., QR code 404) is stored in the allocated volatile memory space. The volatile memory space may be a random access memory (RAM). The stored code is then encrypted and transmitted to a remote server using a secure transmission protocol. For example the code may be encrypted and transmitted to the application server 134 over the networks 122 and 126. In accordance with the secure transmission protocol, at the remote server the encrypted code is authenticated upon reception.
  • According to disclosed embodiments, after the termination of the session, the volatile memory space is de-allocated which causes the stored code and any other patent health information (PHI) to be erased from the volatile memory space. The volatile memory space is de-allocated by removing electrical power from the volatile memory. Consequently, any PHI and other patient data are not persistently retained in the mobile device 104 after the termination of the session.
  • Thus, it will be appreciated that the disclosed embodiments provide secure acquisition and transmission of PHI in compliance with HIPAA. Since the patient identifier and all other PHI are erased from the volatile memory after the defined session, and thus not persistently retained by the mobile device 104, the data is protected from intrusion and misappropriation. Also, because the transmitted data is encrypted, they are prevented from unauthorized interception.
  • FIG. 5 is a flow diagram of a method according to disclosed embodiments. In block 504, a machine readable optical code is read by a mobile device. For example, a QR code may be read by the barcode scanner 114 of the mobile device 104.
  • In block 508, the optical code is decoded into a patient identifier. For example, the QR code may be decoded into a patient identifier by extracting the data from the patterns in horizontal and vertical components of the image in the QR code. The patient identifier may be an ASCII code that identifies a patient by name, date of birth and/or other identifying information.
  • In block 512, a volatile memory space is allocated for a defined session. The volatile memory space may be allocated for a predetermined time period by applying electrical power to the volatile memory. In block 516, the patient identifier is stored in the allocated volatile memory space. In block 520, the patient identifier is encrypted and transmitted using a secure transmission protocol. For example, the patient identifier may be transmitted using a secure transmission protocol to the database 138 over the networks 122 and 126.
  • According to disclosed embodiments, the database 138 is searched using the patient identifier for corresponding patient data. For example, a search engine in the application server 134 may be used to search the database 138 and retrieve patent data corresponding to the patient identifier.
  • In block 524, a patient billing record is retrieved from the database 138 and the billing record is partially or completely filled with the patient data. Thus, the billing record is at least partially filled the patient data which may include PHI.
  • According to disclosed embodiments, the database 138 is configured to auto-complete one or more fields in the billing record. Also, the database 138 features selection data entry fields that are updated with user interaction. The database 138 dynamically collects data, which eliminates the need for end user platform releases as new data gather entries are implemented.
  • In block 528, the partially (or completely) filled billing record is downloaded by the mobile device 104 over the networks 122 and 126, and the billing record is displayed on the mobile device 104. FIG. 6 shows a partially filled billing record 604 displayed on the mobile device 104.
  • The billing record may be stored in the volatile memory 120. After the termination of the defined session, the volatile memory 120 is un-allocated, thus erasing the billing record, the patient data or any other PHI. Consequently, after the termination of the session, no PHI is retained by the mobile device 104.
  • FIG. 7 is a flow diagram of a method according to disclosed embodiments. In block 704, the patient identifier is received by the database 138. As discussed before, the mobile device 104 transmits the patient identifier over the networks 122 and 126 to the database 138. In block 708, the database 138 is searched using the patient identifier, and patient data corresponding to the patient identifier is retrieved from the database 138. A search engine in the application server 134 may be utilized to search and retrieve the patient data from the database 138. In block 712, the patient data is downloaded by the mobile device 104 over the networks 122 and 126.
  • Those skilled in the art will recognize that, for simplicity and clarity, the full structure and operation of all systems suitable for use with the present disclosure is not being depicted or described herein. Instead, only so much of a system as is unique to the present disclosure or necessary for an understanding of the present disclosure is depicted and described. The remainder of the construction and operation of the disclosed systems may conform to any of the various current implementations and practices known in the art.
  • Of course, those of skill in the art will recognize that, unless specifically indicated or required by the sequence of operations, certain steps in the processes described above may be omitted, performed concurrently or sequentially, or performed in a different order. Further, no component, element, or process should be considered essential to any specific claimed embodiment, and each of the components, elements, or processes can be combined in still other embodiments.
  • It is important to note that while the disclosure includes a description in the context of a fully functional system, those skilled in the art will appreciate that at least portions of the mechanism of the present disclosure are capable of being distributed in the form of instructions contained within a machine-usable, computer-usable, or computer-readable medium in any of a variety of forms, and that the present disclosure applies equally regardless of the particular type of instruction or signal bearing medium or storage medium utilized to actually carry out the distribution. Examples of machine usable/readable or computer usable/readable mediums include: nonvolatile, hard-coded type mediums such as read only memories (ROMs) or erasable, electrically programmable read only memories (EEPROMs), and user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs).
  • Those skilled in the art to which this application relates will appreciate that other and further additions, deletions, substitutions and modifications may be made to the described embodiments.
  • None of the description in the present application should be read as implying that any particular element, step, or function is an essential element which must be included in the claim scope: the scope of patented subject matter is defined only by the allowed claims. Moreover, none of these claims are intended to invoke paragraph six of 35 USC §112 unless the exact words “means for” are followed by a participle.

Claims (23)

What is claimed is:
1. A method comprising:
reading by a mobile device a machine-readable optical code;
decoding the optical code into a patient identifier;
transmitting the patient identifier to a database;
receiving from the database an at least partially filled billing record with patient data corresponding to the patient identifier; and
displaying on the mobile device the at least partially filled billing record.
2. The method of claim 1, wherein the patient identifier is an ASCII code that identifies a patient.
3. The method of claim 1, further comprising:
searching the database using the patient identifier;
retrieving the patient data corresponding to the patient identifier;
at least partially filling a billing record with the patient data; and
transmitting the at least partially filled billing record to the mobile device.
4. The method of claim 1, wherein the machine-readable optical code is a Quick Response Code.
5. The method of claim 1, wherein the machine-readable optical code is a two-dimensional barcode.
6. The method of claim 1, wherein the machine-readable optical code is a one-dimensional barcode.
7. The method of claim 1, further comprising:
allocating volatile memory space in the mobile device for a session;
storing the patient identifier in the allocated volatile memory space;
transmitting the patient identifier using a secure transmission protocol during the session; and
de-allocating the volatile memory space at the termination of the session, wherein the de-allocation of the volatile memory space causes the patient identifier to be erased from the volatile memory space.
8. The method of claim 1, further comprising:
allocating volatile memory space in the mobile device for a session;
storing the received patient data and the at least partially filled billing record in the allocated volatile memory space;
de-allocating the volatile memory space at the termination of the session, wherein the de-allocation of the volatile memory space causes the stored patient data and the at least partially filled billing record to be erased from the volatile memory space.
9. The method of claim 1, wherein the machine-readable optical code is read by a barcode reader.
10. The method of claim 1, wherein the machine-readable optical code is read by an optical scanner.
11. A system, comprising:
a mobile communication device configured to communicate over a communication network, the mobile communication device comprising:
at least one processor;
a volatile memory space coupled to the processor, the volatile memory space allocated for a defined session and de-allocated at the termination of the session; and
a barcode reader configured to read a machine-readable optical code and to decode the optical code into a patient identifier, wherein the processor is configured to store the patient identifier, patient data corresponding to the patient identifier, and a billing record at least partially filled with the patient data in the volatile memory space, and wherein the de-allocation of the volatile memory space erases stored data in the volatile memory space.
12. The system of claim 11, wherein the patient identifier is an ASCII code that identifies a patient.
13. The system of claim 11, wherein patient identifier is transmitted by the mobile device to a database, and wherein the at least partially filled billing record including the patient data is received by the mobile device from the database.
14. The system of claim 11, wherein the at least partially filled billing record is displayed on the mobile device.
15. The system of claim 11, wherein the database is searched using the patient identifier.
16. The system of claim 11, wherein the machine-readable optical code is a Quick Response Code.
17. The system of claim 11, wherein the machine-readable optical code is a two-dimensional barcode.
18. The system of claim 11, wherein the machine-readable optical code is a one-dimensional barcode.
19. The system of claim 11, wherein the de-allocation of the volatile memory space causes the stored data to not be persistently retained in the mobile device.
20. The system of claim 11, wherein the session is defined for a predetermined time period.
21. A method comprising:
receiving by a database a patient identifier;
searching the database and retrieving patient data corresponding to the patient identifier, wherein the patient data includes patient health information;
at least partially filling a billing record with the patient data; and
transmitting the at least partially filled billing record to a mobile device using a secure transmission protocol.
22. The method of claim 21, wherein the patient identifier is an ASCII code that identifies a patient.
23. The method of claim 21, further comprising transmitting the at least partially filled billing record over the Internet.
US14/879,193 2014-10-10 2015-10-09 Methods and systems for secure acquisition, interpretation and transmission of data under hipaa compliant protocol Abandoned US20160103964A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/879,193 US20160103964A1 (en) 2014-10-10 2015-10-09 Methods and systems for secure acquisition, interpretation and transmission of data under hipaa compliant protocol

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201462062601P 2014-10-10 2014-10-10
US14/879,193 US20160103964A1 (en) 2014-10-10 2015-10-09 Methods and systems for secure acquisition, interpretation and transmission of data under hipaa compliant protocol

Publications (1)

Publication Number Publication Date
US20160103964A1 true US20160103964A1 (en) 2016-04-14

Family

ID=55655547

Family Applications (4)

Application Number Title Priority Date Filing Date
US14/879,193 Abandoned US20160103964A1 (en) 2014-10-10 2015-10-09 Methods and systems for secure acquisition, interpretation and transmission of data under hipaa compliant protocol
US14/879,248 Active 2037-10-25 US10388408B2 (en) 2014-10-10 2015-10-09 Methods and systems for secure transmission and reception of data between a mobile device and a central computer system
US14/879,184 Abandoned US20160104000A1 (en) 2014-10-10 2015-10-09 Methods and systems for secure acquisition and transmission of image
US16/505,320 Active US10803979B2 (en) 2014-10-10 2019-07-08 Methods and systems for secure acquisition and transmission of an image

Family Applications After (3)

Application Number Title Priority Date Filing Date
US14/879,248 Active 2037-10-25 US10388408B2 (en) 2014-10-10 2015-10-09 Methods and systems for secure transmission and reception of data between a mobile device and a central computer system
US14/879,184 Abandoned US20160104000A1 (en) 2014-10-10 2015-10-09 Methods and systems for secure acquisition and transmission of image
US16/505,320 Active US10803979B2 (en) 2014-10-10 2019-07-08 Methods and systems for secure acquisition and transmission of an image

Country Status (1)

Country Link
US (4) US20160103964A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160103782A1 (en) * 2014-10-10 2016-04-14 MD Cloud Practice Solutions, L.L.C. Methods and systems for secure transmission and reception of data between a mobile device and a central computer system
US11392670B1 (en) * 2011-12-09 2022-07-19 Iqvia Inc. Systems and methods for streaming normalized clinical trial capacity information
US20230401323A1 (en) * 2022-06-10 2023-12-14 Collibra Belgium Bv Reflected distributed data access

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113470742B (en) * 2020-03-31 2024-08-09 浙江省疾病预防控制中心 Data processing method, device, storage medium and computer equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030154398A1 (en) * 2002-02-08 2003-08-14 Eaton Eric Thomas System for providing continuity between session clients and method therefor
US20040162831A1 (en) * 2003-02-06 2004-08-19 Patterson John Douglas Document handling system and method
US20070183493A1 (en) * 2005-02-04 2007-08-09 Tom Kimpe Method and device for image and video transmission over low-bandwidth and high-latency transmission channels
US20090230179A1 (en) * 2008-03-11 2009-09-17 Xpress Systems, Llc System for printing hospital labels and wristbands

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3916095A (en) * 1972-02-17 1975-10-28 Dacom Inc Dual-line data compression method and system for compressing, transmitting and reproducing facsimile data
US5671246A (en) * 1996-04-22 1997-09-23 Hewlett-Packard Comany Method and apparatus for adaptive adjustment of cache allocation for storage of font data
AUPO648397A0 (en) 1997-04-30 1997-05-22 Canon Information Systems Research Australia Pty Ltd Improvements in multiprocessor architecture operation
US6128621A (en) * 1997-10-31 2000-10-03 Oracle Corporation Apparatus and method for pickling data
JP2003159465A (en) * 2001-11-28 2003-06-03 Aruze Corp Gaming related equipment key unit, gaming related equipment and amusement arcade monitoring system
US7039796B2 (en) * 2002-06-04 2006-05-02 Hewlett-Packard Development Company, L.P. Method and system of locating a position in memory at which to store incoming firmware image
JP4236152B2 (en) * 2002-07-29 2009-03-11 富士フイルム株式会社 Solid-state image sensor
US20040221788A1 (en) 2003-05-07 2004-11-11 George Sievewright Preventing marine vessel from colliding with piling or dock
US7430671B2 (en) * 2004-03-31 2008-09-30 Nortel Networks Limited Systems and methods for preserving confidentiality of sensitive information in a point-of-care communications environment
JP4689247B2 (en) * 2004-11-19 2011-05-25 キヤノン株式会社 Camera and control method thereof
US11462314B2 (en) * 2009-10-14 2022-10-04 Trice Imaging, Inc. Systems and devices for encrypting, converting and interacting with medical images
US9253305B2 (en) * 2010-03-15 2016-02-02 Nokia Corporation Image-based addressing of physical content for electronic communication
EP2766832A1 (en) * 2011-10-10 2014-08-20 AbbVie Biotechnology Ltd Managing healthcare services
US20150278474A1 (en) * 2011-10-10 2015-10-01 Peter Carl Stueckemann Managing healthcare services
US8316460B1 (en) * 2011-11-22 2012-11-20 Google Inc. Private web browsing using encryption
US20140339807A1 (en) * 2013-05-17 2014-11-20 Thomas D. Pawlik Method for authenticating uv absorbing security mark
JP6179228B2 (en) * 2013-07-09 2017-08-16 株式会社リコー Information processing apparatus, image processing system, and control program
US9280678B2 (en) * 2013-12-02 2016-03-08 Fortinet, Inc. Secure cloud storage distribution and aggregation
US20160103964A1 (en) * 2014-10-10 2016-04-14 MD Cloud Practice Solutions, L.L.C. Methods and systems for secure acquisition, interpretation and transmission of data under hipaa compliant protocol

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030154398A1 (en) * 2002-02-08 2003-08-14 Eaton Eric Thomas System for providing continuity between session clients and method therefor
US20040162831A1 (en) * 2003-02-06 2004-08-19 Patterson John Douglas Document handling system and method
US20070183493A1 (en) * 2005-02-04 2007-08-09 Tom Kimpe Method and device for image and video transmission over low-bandwidth and high-latency transmission channels
US20090230179A1 (en) * 2008-03-11 2009-09-17 Xpress Systems, Llc System for printing hospital labels and wristbands

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11392670B1 (en) * 2011-12-09 2022-07-19 Iqvia Inc. Systems and methods for streaming normalized clinical trial capacity information
US11961596B2 (en) 2011-12-09 2024-04-16 Iqvia Inc. Systems and methods for streaming normalized clinical trial capacity information
US20160103782A1 (en) * 2014-10-10 2016-04-14 MD Cloud Practice Solutions, L.L.C. Methods and systems for secure transmission and reception of data between a mobile device and a central computer system
US10388408B2 (en) * 2014-10-10 2019-08-20 MD Cloud Practice Solutions, L.L.C. Methods and systems for secure transmission and reception of data between a mobile device and a central computer system
US10803979B2 (en) 2014-10-10 2020-10-13 MD Cloud Practice Solutions, L.L.C. Methods and systems for secure acquisition and transmission of an image
US20230401323A1 (en) * 2022-06-10 2023-12-14 Collibra Belgium Bv Reflected distributed data access

Also Published As

Publication number Publication date
US20160103782A1 (en) 2016-04-14
US10388408B2 (en) 2019-08-20
US20160104000A1 (en) 2016-04-14
US20190333615A1 (en) 2019-10-31
US10803979B2 (en) 2020-10-13

Similar Documents

Publication Publication Date Title
US20230334383A1 (en) Mobile device-based system for automated, real time health record exchange
US10803979B2 (en) Methods and systems for secure acquisition and transmission of an image
US20150006474A1 (en) Secure cloud based document storage and management system and method
US11900198B2 (en) Multi-tier identities in an RFID chip
US8065163B2 (en) Methods and systems for providing patient registration information
EP2383675A1 (en) Thin client-server system, thin client terminal, data management method, and computer readable recording medium
CN104869128B (en) A kind of method, system and web server uploading form attachment
US11756038B2 (en) Transaction authentication using multiple biometric inputs
CN107104924B (en) Verification method and device for website backdoor file
WO2017067201A1 (en) Wi-fi connection method, terminal, and system
CN105225155A (en) A kind of insurance risk management-control method based on biological identification technology
US20160234291A1 (en) File sharing method and file sharing system utilizing the same
US10607729B2 (en) System and method for automated generation of a secure message
US20110305406A1 (en) Business card recognition system
KR102309688B1 (en) Method, Apparatus and Recording For Computerizing Of Electro-Magnetic Resonance
GB2509064A (en) Method and system for distributing health data
US10068065B2 (en) Assignment of a machine-readable link to content as a payoff
US10114808B2 (en) Conflict resolution of originally paper based data entry
KR102572802B1 (en) Server for supporting automation and unification of malfunction reception, and system
CN106330899A (en) Private cloud device account management method and system, electronic device and server
US11374901B2 (en) Network address compression for electronic devices
CN202331569U (en) Patient identity information login system
KR20200044528A (en) Method and apparatus for providing insurance
US20150073817A1 (en) Billing system and method
Madhushree et al. SECURING E-MEDICAL DOCUMENTS USING QR CODE

Legal Events

Date Code Title Description
AS Assignment

Owner name: MD CLOUD PRACTICE SOLUTIONS, L.L.C., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:OSORIO, FEDERICO;OVALLES, ANDRES GUTIERREZ;REEL/FRAME:036764/0576

Effective date: 20151007

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION