G06F 3/04842 - Selection of displayed objects or displayed text elements
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
2.
SYSTEMS AND METHODS FOR PEER-DRIVEN TRANSACTION ORCHESTRATION ON A PERMISSIONED BLOCKCHAIN NETWORK
A system and method for a trusted data-exchange interface using a peer-driven transaction sequence on a permissioned blockchain network is disclosed. A first peer initiates the sequence by invoking a smart contract in an endorsing peer. The endorsing peer retrieves information from an external system. A second peer executes chaincode to generate a determination. An ordering peer commits a result of the determination to an immutable ledger. The peers may be implemented as distinct containers in a shared hardware environment.
A system for configuring an adaptive computer cluster is disclosed. The system includes a cluster configuration server communicatively coupled to a cluster hosting environment through a network, the cluster configuration server having a processor and a memory. The memory includes a plurality of inert containers and a configuration tool configured to receive at least one procedure having a trigger event and at least one task and further configured to instruct the cluster hosting environment to instantiate the adaptive computer cluster based upon the at least one procedure and using the plurality of inert containers. The instantiation instructions include instructions to instantiate, within the cluster hosting environment, an API gateway container, a storage container, a distributed computing master node container, at least one solution-specific container, and an orchestrator container. The instructions from the configuration tool further include instructions to communicatively couple all of the containers to the orchestrator container.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/0233 - Object-oriented techniques, for representation of network management data, e.g. common object request broker architecture [CORBA]
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
A system and method for rules-driven adjudication is disclosed. The system includes a storage includes a rule library having a plurality of rules, each rule being in a human-readable format and including a first data tag, a comparator, a comparison value, and a result. The system also includes a rules manager configured to receive and store a new rule. The system includes a rules evaluator configured to receive an adjudication request having a data object associated with a data tag, and evaluate the request and create a primary determination by applying a first rule to the request, and further applying a first subsequent rule and all logically adjacent rules until all logically adjacent rules have been exhausted and the primary determination is an indefinite outcome or the applying of a final rule returns an outcome that becomes the primary determination.
A system and method for detecting prescription fraud in real time utilizes machine-learned models to analyze prescription histories and identify outlier behavior among clinicians. The system generates outlier scores representing the probability that a clinician's prescribing behavior deviates from norms. These scores can be used to evaluate prescription events, generating event scores that indicate the likelihood of illicit activity. The system employs a graph database to model relationships between clinicians, pharmacies, medications, and prescription events. Upon determining that an outlier or event score meets an alert threshold, the system can deny access to electronic prescription applications or alert pharmacies to potential fraud. Reinforcement learning is used to improve model accuracy, minimizing false positives while identifying complex fraud patterns.
G16H 50/30 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for calculating health indicesICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for individual health risk assessment
G16H 20/10 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
G16H 80/00 - ICT specially adapted for facilitating communication between medical practitioners or patients, e.g. for collaborative diagnosis, therapy or health monitoring
A system and method for rules-driven adjudication is disclosed. The system includes a storage includes a rule library having a plurality of rules, each rule being in a human-readable format and including a first data tag, a comparator, a comparison value, and a result. The system also includes a rules manager configured to receive and store a new rule. The system includes a rules evaluator configured to receive an adjudication request having a data object associated with a data tag, and evaluate the request and create a primary determination by applying a first rule to the request, and further applying a first subsequent rule and all logically adjacent rules until all logically adjacent rules have been exhausted and the primary determination is an indefinite outcome or the applying of a final rule returns an outcome that becomes the primary determination.
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
G16H 70/20 - ICT specially adapted for the handling or processing of medical references relating to practices or guidelines
A system and method for data aggregation and process automation is disclosed. The method includes receiving a first data object from a first integration point through a first smart adapter, identifying an appropriate rules library from a plurality of rules libraries using a rules engine, the appropriate rules library being identified using the first data object, and applying the appropriate rules library through the rules engine. The rules are applied by instructing a transformation module to transform the first data object into a transformed data object, instructing a validation module to validate at least one of the first data object and the transformed data object, and instructing an aggregation module to perform a statistical analysis on one of the first data object and the transformed data object. Finally, the method includes sending the transformed data object to a second integration point associated with a second smart adapter.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
8.
METHOD AND SYSTEM FOR INTELLIGENT COMPLETION OF MEDICAL RECORD BASED ON BIG DATA ANALYTICS
The present teaching relates to medical record completion. In one example, a medical record of a patient is received. The medical record is associated with a plurality of components comprising a first component with a populated value and a second component with an unpopulated value. The unpopulated value of the second component is estimated based on the populated value of the first component in accordance with a first model. Information associated with the medical record and/or the patient is obtained. The values of the first and second components are validated based on the obtained information in accordance with a second model. The first and second models are dynamically updated based on data related to medical transactions of a plurality of patients.
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G16H 20/10 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
G16H 50/70 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for mining of medical data, e.g. analysing previous cases of other patients
9.
METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS
The present teaching relates to managing identity information of a person at an identity center. In one example, the person associated with a first set of identity attributes that are verified to be associated with the person. Upon the person being associated with the first set of identity attributes, the person is linked with a first user account at a source site. A consent is received from the person to share one or more attributes of the first user account at the source application with an attribute consumer. The sharing of one or more attributes of the first user account from the source entity to the receiving entity is facilitated in accordance with the received consent.
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
10.
ANONYMIZED INTERFACE FOR TICKET BASED AUTHENTICATION
Method, system, and programs provide automatic anonymization of protected data items when a request is associated with authentication via a ticket. Ticket authentication includes sending a ticket to a recipient address. The ticket is included in a request for information. Responsive to receiving a request with a ticket, an example system may determine if the ticket is still valid and, if so, generate mock identifiers for any identifiers in information provided back to the requestor, replace the identifiers with their corresponding mock identifiers, as well as delete any protected information from the information provided back to the requestor. The system may store a mapping of the identifiers with their mock identifiers by session id. These mappings may be deleted after a predetermined time, so that the mapping is valid only for a particular session for a limited time.
A system and method for on-demand data cleansing is disclosed. The system includes a processor and a volatile memory including a data object having a plurality of data fields, each field having a tag and a value. The system also includes a cleansing module stored in the volatile memory and executed by the processor. The cleansing module includes a library having a plurality of tag-operation pairs. The cleansing module is configured to receive a pointer locating the data object within volatile memory, and further configured to, for each data field, look up the tag of the data field among the library tags, and execute the operation paired with the matching library tag on the value of the field, modifying the value of the data field while it is stored in volatile memory. The cleansing module is configured to execute the operation in near real-time, and at runtime.
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
12.
System and method for configuring an adaptive computing cluster
A system for configuring an adaptive computer cluster is disclosed. The system includes a cluster configuration server communicatively coupled to a cluster hosting environment through a network, the cluster configuration server having a processor and a memory. The memory includes a plurality of inert containers and a configuration tool configured to receive at least one procedure having a trigger event and at least one task and further configured to instruct the cluster hosting environment to instantiate the adaptive computer cluster based upon the at least one procedure and using the plurality of inert containers. The instantiation instructions include instructions to instantiate, within the cluster hosting environment, an API gateway container, a storage container, a distributed computing master node container, at least one solution-specific container, and an orchestrator container. The instructions from the configuration tool further include instructions to communicatively couple all of the containers to the orchestrator container.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/0233 - Object-oriented techniques, for representation of network management data, e.g. common object request broker architecture [CORBA]
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
A method is provided for managing event access policies using a user interface. The method includes defining event access policies to be applied to incoming transactions, where each policy identifies a field identifier. The method further includes applying the event access policies to incoming transactions, resulting in the generation of event access records for each policy determined to apply to the incoming transactions. The event access records include field values captured from the transaction and a corresponding group identifier generated for the transaction. Additionally, event blocks are written to an event graph for the incoming transactions, independent of applying the event access policies. Each event block includes a group identifier, content, and a hash for the transaction. The method enables efficient and flexible management of event access policies that facilitate later transaction querying.
G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
G06F 16/21 - Design, administration or maintenance of databases
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
A computer system identifies supplemental materials most effective at increasing adherence for each of a plurality of different medications and provides the materials at an optimal point in time. An example method generates a first user interface for receiving an electronic prescription for a patient for a prescribed substance. Responsive to receiving the electronic prescription, the method includes obtaining adherence data for the patient, identifying supplemental programs associated with the prescribed substance from a database of supplemental programs, generating a second user interface that presents the supplemental programs for selection by the health care provider, and responsive to receiving selection of at least one of the supplemental programs in the second user interface, providing the supplemental programs to the patient. The supplemental programs identified from the database are associated with at least one rule relating to adherence data that is met by the adherence data for the patient.
G06Q 30/02 - MarketingPrice estimation or determinationFundraising
G06Q 50/22 - Social work or social welfare, e.g. community support activities or counselling services
G16H 20/10 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
A blockchain network control system and method is disclosed. The system includes a processor coupled to a storage comprising a plurality of network entity definitions each defining a different network entity that make up a target network architecture for a permissioned blockchain network. The system also includes a control object communicatively coupled to an ordering service and a plurality of organizations. The plurality of organizations was established by the blockchain network control system by instantiating the organizational membership service provider, registering and enrolling each peer node within each organization, storing the cryptographic identity generated for the peer node, and then instantiating the plurality of peer nodes. The ordering service was established by the blockchain network control system by instantiating the ordering membership service provider, registering and enrolling each orderer node belonging to the ordering service, storing the cryptographic identity generated for the orderer node, and then instantiating the orderer nodes.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
16.
Self-consistent structures for secure transmission and temporary storage of sensitive data
Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch
G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
A system and method for data aggregation and process automation is disclosed. The method includes receiving a first data object from a first integration point through a first smart adapter, identifying an appropriate rules library from a plurality of rules libraries using a rules engine, the appropriate rules library being identified using the first data object, and applying the appropriate rules library through the rules engine. The rules are applied by instructing a transformation module to transform the first data object into a transformed data object, instructing a validation module to validate at least one of the first data object and the transformed data object, and instructing an aggregation module to perform a statistical analysis on one of the first data object and the transformed data object. Finally, the method includes sending the transformed data object to a second integration point associated with a second smart adapter.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
18.
System and method for healthcare revenue cycle management
A method for healthcare revenue cycle management is disclosed, and includes receiving a transaction proposal at a first peer within a permissioned blockchain network (PBN). The transaction proposal includes a patient identity and a query, the query being a determination of unknown value to be made by a second organization of a plurality of organizations. Each organization of the plurality represents, within the PBN, one of a healthcare payer and a healthcare provider. The method also includes identifying a smart contract associated with the query and defined to automatically adjudicate the query. The method also includes invoking the smart contract in at least one endorsing peer, and receiving, from each endorsing peer, a proposed transaction response. The method further includes automatically adjudicating the query by executing chaincode on a second peer, operating on the required information to assign a value to the determination, then updating the immutable ledger.
Systems and methods provide an infrastructure for supporting wholly or partially virtual visits. Example methods include instantiating a virtual visit object for a subject participant, assigning a virtual room in the virtual visit object to a first room status, assigning at least a service team member to the virtual room based on room access rules applicable to the first room status. The method may also include providing a first user interface to the subject participant configured according to room participant access rules for the first room status to collect a data element from the subject participant. Changing the room status to a second room status may change the user interface, add a second service team member to the room participants for the virtual room based on a second room access rule applicable to the second room status and may remove the first service team member from the room participants.
G06Q 10/1093 - Calendar-based scheduling for persons or groups
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
21.
Communication device display with graphical user interface
A system and method for rules-driven adjudication is disclosed. The system includes a storage includes a rule library having a plurality of rules, each rule being in a human-readable format and including a first data tag, a comparator, a comparison value, and a result. The system also includes a rules manager configured to receive and store a new rule. The system includes a rules evaluator configured to receive an adjudication request having a data object associated with a data tag, and evaluate the request and create a primary determination by applying a first rule to the request, and further applying a first subsequent rule and all logically adjacent rules until all logically adjacent rules have been exhausted and the primary determination is an indefinite outcome or the applying of a final rule returns an outcome that becomes the primary determination.
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
G16H 70/20 - ICT specially adapted for the handling or processing of medical references relating to practices or guidelines
A data aggregation and process automation (DAPA) system is disclosed. The DAPA system includes an authentication module, a monitoring module, an intelligent automation module, and a transformation module. The authentication module is configured to initiate authenticated communication with a plurality of servers, and includes an authentication storage having a plurality of authentication credentials and routing information. The monitoring module is configured to monitor a first server for a first change event and monitor a second server for a second change event. The first change event results in the receipt of a first data object and the second change event results in the receipt of a second data object. The intelligent automation module is configured to identify the second server, request a service, and submit an update data object to the first server. The transformation module is configured to transform data objects from one format into another.
G06Q 30/06 - Buying, selling or leasing transactions
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
G06Q 40/00 - FinanceInsuranceTax strategiesProcessing of corporate or income taxes
G16H 15/00 - ICT specially adapted for medical reports, e.g. generation or transmission thereof
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
24.
Data aggregation and process automation systems and methods
A system and method for data aggregation and process automation is disclosed. The method includes receiving a first data object from a first integration point through a first smart adapter, identifying an appropriate rules library from a plurality of rules libraries using a rules engine, the appropriate rules library being identified using the first data object, and applying the appropriate rules library through the rules engine. The rules are applied by instructing a transformation module to transform the first data object into a transformed data object, instructing a validation module to validate at least one of the first data object and the transformed data object, and instructing an aggregation module to perform a statistical analysis on one of the first data object and the transformed data object. Finally, the method includes sending the transformed data object to a second integration point associated with a second smart adapter.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
A system and method for on-demand data cleansing is disclosed. The system includes a processor and a volatile memory including a data object having a plurality of data fields, each field having a tag and a value. The system also includes a cleansing module stored in the volatile memory and executed by the processor. The cleansing module includes a library having a plurality of tag-operation pairs. The cleansing module is configured to receive a pointer locating the data object within volatile memory, and further configured to, for each data field, look up the tag of the data field among the library tags, and execute the operation paired with the matching library tag on the value of the field, modifying the value of the data field while it is stored in volatile memory. The cleansing module is configured to execute the operation in near real-time, and at runtime.
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
26.
System and method for configuring an adaptive computing cluster
A system for configuring an adaptive computer cluster is disclosed. The system includes a cluster configuration server communicatively coupled to a cluster hosting environment through a network, the cluster configuration server having a processor and a memory. The memory includes a plurality of inert containers and a configuration tool configured to receive at least one procedure having a trigger event and at least one task and further configured to instruct the cluster hosting environment to instantiate the adaptive computer cluster based upon the at least one procedure and using the plurality of inert containers. The instantiation instructions include instructions to instantiate, within the cluster hosting environment, an API gateway container, a storage container, a distributed computing master node container, at least one solution-specific container, and an orchestrator container. The instructions from the configuration tool further include instructions to communicatively couple all of the containers to the orchestrator container.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
Systems and methods provide an infrastructure for supporting wholly or partially virtual visits. Example methods include instantiating a virtual visit object for a subject participant, assigning a virtual room in the virtual visit object to a first room status, assigning at least a service team member to the virtual room based on room access rules applicable to the first room status. The method may also include providing a first user interface to the subject participant configured according to room participant access rules for the first room status to collect a data element from the subject participant. Changing the room status to a second room status may change the user interface, add a second service team member to the room participants for the virtual room based on a second room access rule applicable to the second room status and may remove the first service team member from the room participants.
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
Systems and methods provide an infrastructure for supporting wholly or partially virtual visits. Example methods include instantiating a virtual visit object for a subject participant, assigning a virtual room in the virtual visit object to a first room status, assigning at least a service team member to the virtual room based on room access rules applicable to the first room status. The method may also include providing a first user interface to the subject participant configured according to room participant access rules for the first room status to collect a data element from the subject participant. Changing the room status to a second room status may change the user interface, add a second service team member to the room participants for the virtual room based on a second room access rule applicable to the second room status and may remove the first service team member from the room participants.
G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
G16H 40/40 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management of medical equipment or devices, e.g. scheduling maintenance or upgrades
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
The present teaching relates to medical suggestion searching. In one example, data related to a medication drug are obtained. One or more candidate prescription strings are identified from the obtained data. Each of the candidate prescription strings is associated with a plurality of attributes. Each of the one or more candidate prescription strings is automatically processed based on at least one model to generate one or more prescription strings each with an associated ranking. At least some of the generated one or more prescription strings and the associated rankings are stored for future use.
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
G16Z 99/00 - Subject matter not provided for in other main groups of this subclass
32.
ANONYMIZED INTERFACE FOR TICKET BASED AUTHENTICATION
Method, system, and programs provide automatic anonymization of protected data items when a request is associated with authentication via a ticket. Ticket authentication includes sending a ticket to a recipient address. The ticket is included in a request for information. Responsive to receiving a request with a ticket, an example system may determine if the ticket is still valid and, if so, generate mock identifiers for any identifiers in information provided back to the requestor, replace the identifiers with their corresponding mock identifiers, as well as delete any protected information from the information provided back to the requestor. The system may store a mapping of the identifiers with their mock identifiers by session id. These mappings may be deleted after a predetermined time, so that the mapping is valid only for a particular session for a limited time.
Method, system, and programs provide automatic anonymization of protected data items when a request is associated with authentication via a ticket. Ticket authentication includes sending a ticket to a recipient address. The ticket is included in a request for information. Responsive to receiving a request with a ticket, an example system may determine if the ticket is still valid and, if so, generate mock identifiers for any identifiers in information provided back to the requestor, replace the identifiers with their corresponding mock identifiers, as well as delete any protected information from the information provided back to the requestor. The system may store a mapping of the identifiers with their mock identifiers by session id. These mappings may be deleted after a predetermined time, so that the mapping is valid only for a particular session for a limited time.
Method, system, and programs provide automatic anonymization of protected data items when a request is associated with authentication via a ticket. Ticket authentication includes sending a ticket to a recipient address. The ticket is included in a request for information. Responsive to receiving a request with a ticket, an example system may determine if the ticket is still valid and, if so, generate mock identifiers for any identifiers in information provided back to the requestor, replace the identifiers with their corresponding mock identifiers, as well as delete any protected information from the information provided back to the requestor. The system may store a mapping of the identifiers with their mock identifiers by session id. These mappings may be deleted after a predetermined time, so that the mapping is valid only for a particular session for a limited time.
Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a match for the property from graph access records, the match being a node in an identity chain. The method also includes verifying a complete chain from the match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a match for the property from graph access records, the match being a node in an identity chain. The method also includes verifying a complete chain from the match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
38.
Streamlined patient communication device display screen with graphical user interface
Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.
G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
G06F 16/21 - Design, administration or maintenance of databases
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
A computer system identifies supplemental materials most effective at increasing adherence for each of a plurality of different medications and provides the materials at an optimal point in time. An example method generates a first user interface for receiving an electronic prescription for a patient for a prescribed substance. Responsive to receiving the electronic prescription, the method includes obtaining adherence data for the patient, identifying supplemental programs associated with the prescribed substance from a database of supplemental programs, generating a second user interface that presents the supplemental programs for selection by the health care provider, and responsive to receiving selection of at least one of the supplemental programs in the second user interface, providing the supplemental programs to the patient. The supplemental programs identified from the database are associated with at least one rule relating to adherence data that is met by the adherence data for the patient.
Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
44 - Medical, veterinary, hygienic and cosmetic services; agriculture, horticulture and forestry services
09 - Scientific and electric apparatus and instruments
Goods & Services
Health care business services, namely, providing a computer database for use in selection of potential patients for conducting medical research projects and for conducting patient surveys by third party pharmaceutical and medical companies; Health care business services, namely, notification of potential patients and patients regarding participation in medical drug trials, and feedback from patients regarding prescription drug usage and other issues relating to medical research programs; Providing electronic prescription refill and prescription processing services, namely, enabling healthcare providers to facilitate online prescription orders and refills with pharmacies and insurers for patients; providing office management services for medical practices and practitioners, namely, preparing business reports and budgeting, via the Internet, telephone, fax, and mail Financial advice, namely, budget planning Providing temporary use of online non-downloadable software for use in medical services, namely, for generating medical prescriptions and recording patient information; software as a service (SAAS) services featuring software for use in the healthcare industry for electronic prescribing of controlled substances; software as a service (SAAS) services featuring software for use in the healthcare industry to allow for the transferring of electronic messages, data and medical information, namely, patient information, on a one-to-one or one-to- many users basis; software as a service (SAAS) services featuring software for use in the healthcare services industry to allow authorized individuals to access, share and exchange medical information, namely, prescription and patient information and messages pertaining to such medical information; software as a service (SAAS) services featuring software that allows for the secure exchange of medical prescriptions and patient and medical information; application service provider services featuring software and secure communications software in the field of healthcare management and clinical management via the Internet, intranets or global communications or information networks for use by medical/health services providers, for electronic prescription handling and for secure email transmissions and secure transmissions of electronic medical records, clinical patient data and other private information; computer software installation and maintenance; design, hosting, and maintenance of public and private Internet sites for medical/health service providers Providing online medical information, namely, maintaining patient medical record and prescription information; providing electronic prescription refill reminder services and electronic medication refill reminder services to healthcare providers Downloadable computer software for use in the healthcare industry to allow for the transferring of electronic messages, data and medical information, namely, patient information, on a one-to-one or one-to-many users basis
A blockchain network control system and method is disclosed. The system includes a processor coupled to a storage comprising a plurality of network entity definitions each defining a different network entity that make up a target network architecture for a permissioned blockchain network. The system also includes a control object communicatively coupled to an ordering service and a plurality of organizations. The plurality of organizations was established by the blockchain network control system by instantiating the organizational membership service provider, registering and enrolling each peer node within each organization, storing the cryptographic identity generated for the peer node, and then instantiating the plurality of peer nodes. The ordering service was established by the blockchain network control system by instantiating the ordering membership service provider, registering and enrolling each orderer node belonging to the ordering service, storing the cryptographic identity generated for the orderer node, and then instantiating the orderer nodes.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
A system and method for rules-driven adjudication is disclosed. The system includes a storage includes a rule library having a plurality of rules, each rule being in a human-readable format and including a first data tag, a comparator, a comparison value, and a result. The system also includes a rules manager configured to receive and store a new rule. The system includes a rules evaluator configured to receive an adjudication request having a data object associated with a data tag, and evaluate the request and create a primary determination by applying a first rule to the request, and further applying a first subsequent rule and all logically adjacent rules until all logically adjacent rules have been exhausted and the primary determination is an indefinite outcome or the applying of a final rule returns an outcome that becomes the primary determination.
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G16H 70/20 - ICT specially adapted for the handling or processing of medical references relating to practices or guidelines
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.
G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch
A system and method for on-demand data cleansing is disclosed. The system includes a processor and a volatile memory including a data object having a plurality of data fields, each field having a tag and a value. The system also includes a cleansing module stored in the volatile memory and executed by the processor. The cleansing module includes a library having a plurality of tag-operation pairs. The cleansing module is configured to receive a pointer locating the data object within volatile memory, and further configured to, for each data field, look up the tag of the data field among the library tags, and execute the operation paired with the matching library tag on the value of the field, modifying the value of the data field while it is stored in volatile memory. The cleansing module is configured to execute the operation in near real-time, and at runtime.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
48.
Authentication using a feeder robot in a web environment
Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.
The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.
G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
G06F 16/21 - Design, administration or maintenance of databases
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.
The present teaching relates to medical record completion. In one example, a medical record of a patient is received. The medical record is associated with a plurality of components comprising a first component with a populated value and a second component with an unpopulated value. The unpopulated value of the second component is estimated based on the populated value of the first component in accordance with a first model. Information associated with the medical record and/or the patient is obtained. The values of the first and second components are validated based on the obtained information in accordance with a second model. The first and second models are dynamically updated based on data related to medical transactions of a plurality of patients.
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G16H 20/10 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
G16H 50/70 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for mining of medical data, e.g. analysing previous cases of other patients
42 - Scientific, technological and industrial services, research and design
Goods & Services
Technology consulting as it relates to enterprise level software for healthcare administration; Consulting in the field of information technology, namely, consulting in information technology as it relates to artificial intelligence; Technology consulting as it relates to artificial intelligence, machine learning, and block chain; Custom design of computer software for medical and pharmacy benefits; Customizing computer software; Developing customized software for others; Developing customized software in the field of artificial intelligence, machine learning, and block chain for others; Information technology consulting as it relates to enterprise level software for healthcare administration
54.
Data aggregation and process automation systems and methods
A data aggregation and process automation (DAPA) system is disclosed. The DAPA system includes an authentication module, a monitoring module, an intelligent automation module, and a transformation module. The authentication module is configured to initiate authenticated communication with a plurality of servers, and includes an authentication storage having a plurality of authentication credentials and routing information. The monitoring module is configured to monitor a first server for a first change event and monitor a second server for a second change event. The first change event results in the receipt of a first data object and the second change event results in the receipt of a second data object. The intelligent automation module is configured to identify the second server, request a service, and submit an update data object to the first server. The transformation module is configured to transform data objects from one format into another.
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G16H 15/00 - ICT specially adapted for medical reports, e.g. generation or transmission thereof
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
A computer system identifies the permutation of supplemental materials most effective at increasing adherence for each of a plurality of different medication diagnostic codes and provides the materials at an optimal point in time. An example system includes a supplemental program (SP) module implemented on a computing device that receives a plurality of supplemental programs associated with the one or more prescribed substances, identifies a plurality of permutations of the plurality of supplemental programs, constructs a plurality of cohorts, each of the cohorts corresponding to a prescribed substance and associated with a permutation, receives adherence data collected with respect to the plurality of permutations associated with the plurality of cohorts; and determines effectiveness of each of the plurality of permutations based on the adherence data.
Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.
G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch
57.
SELF-CONSISTENT STRUCTURES FOR SECURE TRANSMISSION AND TEMPORARY STORAGE OF SENSITIVE DATA
Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.
42 - Scientific, technological and industrial services, research and design
Goods & Services
software as a service (SAAS) services featuring software for providing patients with information, educational materials, cost information, and access to financial assistance, all related to medications and pharmaceutical products
59.
Method and system for interoperable identity and interoperable credentials
The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.
The present teaching relates to medical suggestion searching. In one example, data related to a medication drug are obtained. One or more candidate prescription strings are identified from the obtained data. Each of the candidate prescription strings is associated with a plurality of attributes. Each of the one or more candidate prescription strings is automatically processed based on at least one model to generate one or more prescription strings each with an associated ranking. At least some of the generated one or more prescription strings and the associated rankings are stored for future use.
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
61.
System and method for configuring an adaptive computing cluster
A system for configuring an adaptive computer cluster is disclosed. The system includes a cluster configuration server communicatively coupled to a cluster hosting environment through a network, the cluster configuration server having a processor and a memory. The memory includes a plurality of inert containers and a configuration tool configured to receive at least one procedure having a trigger event and at least one task and further configured to instruct the cluster hosting environment to instantiate the adaptive computer cluster based upon the at least one procedure and using the plurality of inert containers. The instantiation instructions include instructions to instantiate, within the cluster hosting environment, an API gateway container, a storage container, a distributed computing master node container, at least one solution-specific container, and an orchestrator container. The instructions from the configuration tool further include instructions to communicatively couple all of the containers to the orchestrator container.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
Implementations provide self-consistent, temporary, secure storage of information. An example system includes fast, short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the fast, short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Advanced product research in the field of artificial intelligence; Design and development of computer hardware and software systems; Integrated platform as a service featuring artificial intelligence, machine learning, and blockchain computer software platforms for database management in the healthcare industry, encryption of medical records, document management, healthcare claims management; Research and development of advanced learning technologies and teaching methods
64.
Strong authentication with feeder robot in a federated identity web environment
Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.
The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.
42 - Scientific, technological and industrial services, research and design
44 - Medical, veterinary, hygienic and cosmetic services; agriculture, horticulture and forestry services
Goods & Services
Providing temporary use of online non-downloadable software for use in medical services, namely, for generating medical prescriptions and recording patient information Providing online medical information in the field of patient medical record and prescription information
Method, system, and programs for providing a patient prescription portal are disclosed. An example method includes determining, responsive to receiving an electronic prescription, that information in the electronic prescription matches a parameter, transmitting, responsive to determining that the information in the electronic prescription matches, a notification to a phone number provided by a patient identified in the electronic prescription, the notification requesting input for managing patient medications, the notification including an opt-in option, and accessing, subsequent to the patient selecting the opt-in option, medication records for the patient. The method may also include initiating a medication app that displays the medication records to the patient and provides controls enabling the patient to change the medication records, receiving, from the patient via the medication app, a change to the medication records, and updating the medication records according to the change.
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
Business management consulting with relation to strategy, marketing, sales, operation, product design particularly specializing in the use of analytic and statistic models for the understanding and predicting of consumers, businesses, and market trends and actions
A health information exchange (HIE) system and related methods for sharing patient medical data among a plurality of users. In one embodiment, the HIE system includes a processor executing a software application and one or more databases. Medical data may be downloaded by a first user to the system in a source file format. The system converts and stores the medical data in a data record such as an object having a different type of data structure. Upon receiving a request from a second user for the medical data in a specified destination file format, the system retrieves and converts the object containing the medical data into the specified destination file format, and sends the destination file to the second user. The source and destination file formats may be the same or different. In one embodiment, users may access and communicate with the HIE system via the Internet.
G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G06F 16/21 - Design, administration or maintenance of databases
G06F 16/178 - Techniques for file synchronisation in file systems
The present teaching relates to medical record completion. In one example, a medical record of a patient is received. The medical record is associated with a plurality of components comprising a first component with a populated value and a second component with an unpopulated value. The unpopulated value of the second component is estimated based on the populated value of the first component in accordance with a first model. Information associated with the medical record and/or the patient is obtained. The values of the first and second components are validated based on the obtained information in accordance with a second model. The first and second models are dynamically updated based on data related to medical transactions of a plurality of patients.
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
72.
METHOD AND SYSTEM FOR INTELLIGENT COMPLETION OF MEDICAL RECORD BASED ON BIG DATA ANALYTICS
The present teaching relates to medical record completion. In one example, a medical record of a patient is received. The medical record is associated with a plurality of components comprising a first component with a populated value and a second component with an unpopulated value. The unpopulated value of the second component is estimated based on the populated value of the first component in accordance with a first model. Information associated with the medical record and/or the patient is obtained. The values of the first and second components are validated based on the obtained information in accordance with a second model. The first and second models are dynamically updated based on data related to medical transactions of a plurality of patients.
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
73.
Strong authentication with feeder robot in a federated identity web environment
Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.
Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first infonnation being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
75.
STRONG AUTHENTICATION USING A FEEDER ROBOT IN A FEDERATED IDENTITY WEB ENVIRONMENT
Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
The present teaching relates to medical suggestion searching. In one example, data related to a medication drug are obtained. One or more candidate prescription strings are identified from the obtained data. Each of the candidate prescription strings is associated with a plurality of attributes. Each of the one or more candidate prescription strings is automatically processed based on at least one model to generate one or more prescription strings each with an associated ranking. At least some of the generated one or more prescription strings and the associated rankings are stored for future use.
A61J 3/00 - Devices or methods specially adapted for bringing pharmaceutical products into particular physical or administering forms
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
G06F 17/30 - Information retrieval; Database structures therefor
G06Q 50/24 - Patient record management (processing of medical or biological data for scientific purposes G06F 19/00)
The present teaching relates to medical suggestion searching. In one example, data related to a medication drug are obtained. One or more candidate prescription strings are identified from the obtained data. Each of the candidate prescription strings is associated with a plurality of attributes. Each of the one or more candidate prescription strings is automatically processed based on at least one model to generate one or more prescription strings each with an associated ranking. At least some of the generated one or more prescription strings and the associated rankings are stored for future use.
A61J 7/00 - Devices for administering medicines orally, e.g. spoonsPill counting devicesArrangements for time indication or reminder for taking medicine
G16H 20/00 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
78.
Method and system for interoperable identity and interoperable credentials
The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.
The present teaching relates to medical suggestion searching. In one example, data related to a medication drug are obtained. One or more candidate prescription strings are identified from the obtained data. Each of the candidate prescription strings is associated with a plurality of attributes. Each of the one or more candidate prescription strings is automatically processed based on at least one model to generate one or more prescription strings each with an associated ranking. At least some of the generated one or more prescription strings and the associated rankings are stored for future use.
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
G06F 17/30 - Information retrieval; Database structures therefor
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
80.
HEALTHCARE EVENT RESPONSE AND COMMUNICATION CENTER
The present teaching relates to a Healthcare Event Response and Communication Center. In one example, a healthcare message is received. The healthcare message is processed to automatically identify one or more healthcare events. For each identified healthcare event, one or more responsive entities that are configured to be responsive to the healthcare event are identified. Each responsive entity is associated with one or more healthcare workflows that are configured to receive the healthcare event. Each identified healthcare event is provided in realtime to each of the one or more responsive healthcare workflows with respect to each responsive entity.
A system and method for increasing patient adherence to following medication treatment regimens. An adherence data processing and communication system generates and displays medication adherence data based on historical medication information. The system is linked to other systems involved with electronic ordering and filling of prescriptions, such as electronic prescription and pharmacy systems all connected by suitable wired and/or wireless communication protocols including the Internet. In one embodiment, the adherence data is displayed in the form of an interactive report card which provides a user with adherence metrics in both summary and more detailed formats for prescription medications taken by the patient. A related method executed by the data processing and communication system is disclosed.
ABSTRACT A system and method for increasing patient adherence to following medication treatment regimens. An adherence data processing and communication system generates and displays medication adherence data based on historical medication information. The system is linked to other systems involved with electronic ordering and filling of prescriptions, such as electronic prescription and pharmacy systems all connected by suitable wired and/or wireless communication protocols including the Internet. In one embodiment, the adherence data is displayed in the form of an interactive report card which provides a user with adherence metrics in both summary and more detailed formats for prescription medications taken by the patient. A related method executed by the data processing and communication system is disclosed. Date Recue/Date Received 2021-04-16
G16H 20/10 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
83.
SYSTEM AND METHOD FOR INCREASING PATIENT ADHERENCE TO MEDICATION TREATMENT REGIMENS
A system and method for increasing patient adherence to following medication treatment regimens. An adherence data processing and communication system generates and displays medication adherence data based on historical medication information. The system is linked to other systems involved with electronic ordering and filling of prescriptions, such as electronic prescription and pharmacy systems all connected by suitable wired and/or wireless communication protocols including the Internet. In one embodiment, the adherence data is displayed in the form of an interactive report card which provides a user with adherence metrics in both summary and more detailed formats for prescription medications taken by the patient. A related method executed by the data processing and communication system is disclosed.
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G16H 20/10 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
84.
SYSTEM AND METHOD FOR INCREASING PATIENT ADHERENCE TO MEDICATION TREATMENT REGIMENS
A system and method for increasing patient adherence to following medication treatment regimens. An adherence data processing and communication system generates and displays medication adherence data based on historical medication information. The system is linked to other systems involved with electronic ordering and filling of prescriptions, such as electronic prescription and pharmacy systems all connected by suitable wired and/or wireless communication protocols including the Internet. In one embodiment, the adherence data is displayed in the form of an interactive report card which provides a user with adherence metrics in both summary and more detailed formats for prescription medications taken by the patient. A related method executed by the data processing and communication system is disclosed.
A system and method for increasing patient adherence to following medication treatment regimens. An adherence data processing and communication system generates and displays medication adherence data based on historical medication information. The system is linked to other systems involved with electronic ordering and filling of prescriptions, such as electronic prescription and pharmacy systems all connected by suitable wired and/or wireless communication protocols including the Internet. In one embodiment, the adherence data is displayed in the form of an interactive report card which provides a user with adherence metrics in both summary and more detailed formats for prescription medications taken by the patient. A related method executed by the data processing and communication system is disclosed.
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Application service provider services featuring software and secure communications software in the field of healthcare management and clinical management via the internet, intranets or global communications or information networks for use by medical and health services providers, namely, providing software for prescription handling services, namely, electronic prescription handling, and for secure electronic transmission services, namely, for providing secure email transmissions and secure transmissions of electronic medical records, clinical patient data and other private information; computer software installation and maintenance; design, hosting, and support of public and private internet sites for medical and health service providers.
36 - Financial, insurance and real estate services
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
44 - Medical, veterinary, hygienic and cosmetic services; agriculture, horticulture and forestry services
Goods & Services
(1) Providing office management services for medical practices and practitioners, namely, preparing reports and budgeting, via the Internet, telephone, fax, and mail
(2) Communication services, namely, providing user access to a a global communications and information network; providing secure electronic communications, namely, providing user access to a platform over a network to medical service providers and insurance companies for medical insurance claims submission, management, and reporting, and for verification of insurance coverage eligibility of patients
(3) Computer software installation and maintenance; design, hosting, and support of public and private Internet sites for medical practices and practitioners; providing electronic medical records over a global communications and information network
(4) Providing electronic prescription refill services and prescription processing; Providing electronic prescription refill and prescription processing services, namely, providing prescription refills to pharmacies from physicians' offices for others to facilitate online prescription management
(5) Providing electronic prescription refill reminder services and electronic medication refill reminder services to healthcare providers
09 - Scientific and electric apparatus and instruments
Goods & Services
Computer software for use in the healthcare industry to allow for the transferring of electronic messages, data and medical information, namely, patient information, on a one-to-one or one-to-many users basis
42 - Scientific, technological and industrial services, research and design
Goods & Services
Software as a service (SAAS) services featuring software for use in the healthcare industry to allow for the transferring of electronic messages, data and medical information, namely, patient information, on a one-to-one or one-to-many users basis
92.
Systems and methods for providing supplemental materials to increase patient adherence to prescribed medication
The present invention relates generally to a method of provisioning a combined educational coupon that includes a) receiving, on a computer apparatus, electronic prescription data for a prescribed substance for a patient; b) the computer apparatus determining educational data relating to the prescribed substance and coupon data relating to the prescribed substance; and c) the computer apparatus generating a single data file comprising the educational data relating to the prescribed substance and the coupon data relating to the prescribed substance.
09 - Scientific and electric apparatus and instruments
Goods & Services
Downloadable computer application software for connecting patients and healthcare personnel to each other and to patient information, for use on mobile phones and other computing devices
42 - Scientific, technological and industrial services, research and design
Goods & Services
Application service provider services featuring software and secure communications software in the field of healthcare management and clinical management via the Internet, intranets or global communications or information networks for use by medical/health services providers, namely, providing software [ for accounting, billing and financial reporting, featuring charge capture features, for office management services, namely, for scheduling appointments, ] for prescription handling services, namely, electronic prescription handling, [ for assisting with the processing, submission and management of medical insurance claims, ] and for secure electronic transmission services, namely, for providing secure email transmissions and secure transmissions of electronic medical records, clinical patient data and other private information; Computer software installation and maintenance; Design, hosting, and support of public and private Internet sites for medical/health service providers [ ; Providing temporary use of on-line non-downloadable accounting application software for medical practices and practitioners ]
36 - Financial, insurance and real estate services
37 - Construction and mining; installation and repair services
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing [ billing and ] office management services for medical practices and practitioners, namely, preparing reports and budgeting, via the Internet, telephone, fax, and mail [ ; buying services, namely, providing discounts to member practitioners on selected goods and services purchased over the Internet ] [ Providing financial reporting services, namely, financial analysis and consultation for medical practices and practitioners ] [ Computer hardware installation and maintenance ] Communication services, namely, providing a means for secure communications over a global communications and information network; providing secure electronic communications between medical service providers and insurance companies for medical insurance claims submission, management, and reporting, and for verification of insurance coverage eligibility of patients Computer software installation and maintenance; design, hosting, and support of public and private Internet sites for medical practices and practitioners; providing electronic medical records over a global communications and information network [, Leasing software including patient billing and accounting functions to medical practices and practitioners ]