A system and method for a trusted data-exchange interface using a peer-driven transaction sequence on a permissioned blockchain network is disclosed. A first peer initiates the sequence by invoking a smart contract in an endorsing peer. The endorsing peer retrieves information from an external system. A second peer executes chaincode to generate a determination. An ordering peer commits a result of the determination to an immutable ledger. The peers may be implemented as distinct containers in a shared hardware environment.
A system for configuring an adaptive computer cluster is disclosed. The system includes a cluster configuration server communicatively coupled to a cluster hosting environment through a network, the cluster configuration server having a processor and a memory. The memory includes a plurality of inert containers and a configuration tool configured to receive at least one procedure having a trigger event and at least one task and further configured to instruct the cluster hosting environment to instantiate the adaptive computer cluster based upon the at least one procedure and using the plurality of inert containers. The instantiation instructions include instructions to instantiate, within the cluster hosting environment, an API gateway container, a storage container, a distributed computing master node container, at least one solution-specific container, and an orchestrator container. The instructions from the configuration tool further include instructions to communicatively couple all of the containers to the orchestrator container.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
H04L 41/0233 - Techniques orientées objet, pour la représentation des données de gestion de réseau, p. ex. l’architecture commune de répartition des requêtes d’objets [CORBA]
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
A system and method for rules-driven adjudication is disclosed. The system includes a storage includes a rule library having a plurality of rules, each rule being in a human-readable format and including a first data tag, a comparator, a comparison value, and a result. The system also includes a rules manager configured to receive and store a new rule. The system includes a rules evaluator configured to receive an adjudication request having a data object associated with a data tag, and evaluate the request and create a primary determination by applying a first rule to the request, and further applying a first subsequent rule and all logically adjacent rules until all logically adjacent rules have been exhausted and the primary determination is an indefinite outcome or the applying of a final rule returns an outcome that becomes the primary determination.
A system and method for detecting prescription fraud in real time utilizes machine-learned models to analyze prescription histories and identify outlier behavior among clinicians. The system generates outlier scores representing the probability that a clinician's prescribing behavior deviates from norms. These scores can be used to evaluate prescription events, generating event scores that indicate the likelihood of illicit activity. The system employs a graph database to model relationships between clinicians, pharmacies, medications, and prescription events. Upon determining that an outlier or event score meets an alert threshold, the system can deny access to electronic prescription applications or alert pharmacies to potential fraud. Reinforcement learning is used to improve model accuracy, minimizing false positives while identifying complex fraud patterns.
G16H 50/30 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour le calcul des indices de santéTIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour l’évaluation des risques pour la santé d’une personne
G16H 20/10 - TIC spécialement adaptées aux thérapies ou aux plans d’amélioration de la santé, p. ex. pour manier les prescriptions, orienter la thérapie ou surveiller l’observance par les patients concernant des médicaments ou des médications, p. ex. pour s’assurer de l’administration correcte aux patients
G16H 80/00 - TIC spécialement adaptées pour faciliter la communication entre les professionnels de la santé ou les patients, p. ex. pour le diagnostic collaboratif, la thérapie collaborative ou la surveillance collaborative de l’état de santé
A system and method for rules-driven adjudication is disclosed. The system includes a storage includes a rule library having a plurality of rules, each rule being in a human-readable format and including a first data tag, a comparator, a comparison value, and a result. The system also includes a rules manager configured to receive and store a new rule. The system includes a rules evaluator configured to receive an adjudication request having a data object associated with a data tag, and evaluate the request and create a primary determination by applying a first rule to the request, and further applying a first subsequent rule and all logically adjacent rules until all logically adjacent rules have been exhausted and the primary determination is an indefinite outcome or the applying of a final rule returns an outcome that becomes the primary determination.
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p. ex. pour des dossiers électroniques de patients
G16H 40/20 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santéTIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion ou l’administration de ressources ou d’établissements de soins de santé, p. ex. pour la gestion du personnel hospitalier ou de salles d’opération
G16H 70/20 - TIC spécialement adaptées au maniement ou au traitement de références médicales concernant des pratiques ou des directives
A system and method for data aggregation and process automation is disclosed. The method includes receiving a first data object from a first integration point through a first smart adapter, identifying an appropriate rules library from a plurality of rules libraries using a rules engine, the appropriate rules library being identified using the first data object, and applying the appropriate rules library through the rules engine. The rules are applied by instructing a transformation module to transform the first data object into a transformed data object, instructing a validation module to validate at least one of the first data object and the transformed data object, and instructing an aggregation module to perform a statistical analysis on one of the first data object and the transformed data object. Finally, the method includes sending the transformed data object to a second integration point associated with a second smart adapter.
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
7.
METHOD AND SYSTEM FOR INTELLIGENT COMPLETION OF MEDICAL RECORD BASED ON BIG DATA ANALYTICS
The present teaching relates to medical record completion. In one example, a medical record of a patient is received. The medical record is associated with a plurality of components comprising a first component with a populated value and a second component with an unpopulated value. The unpopulated value of the second component is estimated based on the populated value of the first component in accordance with a first model. Information associated with the medical record and/or the patient is obtained. The values of the first and second components are validated based on the obtained information in accordance with a second model. The first and second models are dynamically updated based on data related to medical transactions of a plurality of patients.
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p. ex. pour des dossiers électroniques de patients
G16H 20/10 - TIC spécialement adaptées aux thérapies ou aux plans d’amélioration de la santé, p. ex. pour manier les prescriptions, orienter la thérapie ou surveiller l’observance par les patients concernant des médicaments ou des médications, p. ex. pour s’assurer de l’administration correcte aux patients
G16H 50/70 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour extraire des données médicales, p. ex. pour analyser les cas antérieurs d’autres patients
8.
METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS
The present teaching relates to managing identity information of a person at an identity center. In one example, the person associated with a first set of identity attributes that are verified to be associated with the person. Upon the person being associated with the first set of identity attributes, the person is linked with a first user account at a source site. A consent is received from the person to share one or more attributes of the first user account at the source application with an attribute consumer. The sharing of one or more attributes of the first user account from the source entity to the receiving entity is facilitated in accordance with the received consent.
G06F 21/46 - Structures ou outils d’administration de l’authentification par la création de mots de passe ou la vérification de la solidité des mots de passe
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p. ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
9.
ANONYMIZED INTERFACE FOR TICKET BASED AUTHENTICATION
Method, system, and programs provide automatic anonymization of protected data items when a request is associated with authentication via a ticket. Ticket authentication includes sending a ticket to a recipient address. The ticket is included in a request for information. Responsive to receiving a request with a ticket, an example system may determine if the ticket is still valid and, if so, generate mock identifiers for any identifiers in information provided back to the requestor, replace the identifiers with their corresponding mock identifiers, as well as delete any protected information from the information provided back to the requestor. The system may store a mapping of the identifiers with their mock identifiers by session id. These mappings may be deleted after a predetermined time, so that the mapping is valid only for a particular session for a limited time.
A system and method for on-demand data cleansing is disclosed. The system includes a processor and a volatile memory including a data object having a plurality of data fields, each field having a tag and a value. The system also includes a cleansing module stored in the volatile memory and executed by the processor. The cleansing module includes a library having a plurality of tag-operation pairs. The cleansing module is configured to receive a pointer locating the data object within volatile memory, and further configured to, for each data field, look up the tag of the data field among the library tags, and execute the operation paired with the matching library tag on the value of the field, modifying the value of the data field while it is stored in volatile memory. The cleansing module is configured to execute the operation in near real-time, and at runtime.
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
G06F 16/29 - Bases de données d’informations géographiques
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
11.
System and method for configuring an adaptive computing cluster
A system for configuring an adaptive computer cluster is disclosed. The system includes a cluster configuration server communicatively coupled to a cluster hosting environment through a network, the cluster configuration server having a processor and a memory. The memory includes a plurality of inert containers and a configuration tool configured to receive at least one procedure having a trigger event and at least one task and further configured to instruct the cluster hosting environment to instantiate the adaptive computer cluster based upon the at least one procedure and using the plurality of inert containers. The instantiation instructions include instructions to instantiate, within the cluster hosting environment, an API gateway container, a storage container, a distributed computing master node container, at least one solution-specific container, and an orchestrator container. The instructions from the configuration tool further include instructions to communicatively couple all of the containers to the orchestrator container.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
H04L 41/0233 - Techniques orientées objet, pour la représentation des données de gestion de réseau, p. ex. l’architecture commune de répartition des requêtes d’objets [CORBA]
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
A method is provided for managing event access policies using a user interface. The method includes defining event access policies to be applied to incoming transactions, where each policy identifies a field identifier. The method further includes applying the event access policies to incoming transactions, resulting in the generation of event access records for each policy determined to apply to the incoming transactions. The event access records include field values captured from the transaction and a corresponding group identifier generated for the transaction. Additionally, event blocks are written to an event graph for the incoming transactions, independent of applying the event access policies. Each event block includes a group identifier, content, and a hash for the transaction. The method enables efficient and flexible management of event access policies that facilitate later transaction querying.
G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées
G06F 16/21 - Conception, administration ou maintenance des bases de données
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
A computer system identifies supplemental materials most effective at increasing adherence for each of a plurality of different medications and provides the materials at an optimal point in time. An example method generates a first user interface for receiving an electronic prescription for a patient for a prescribed substance. Responsive to receiving the electronic prescription, the method includes obtaining adherence data for the patient, identifying supplemental programs associated with the prescribed substance from a database of supplemental programs, generating a second user interface that presents the supplemental programs for selection by the health care provider, and responsive to receiving selection of at least one of the supplemental programs in the second user interface, providing the supplemental programs to the patient. The supplemental programs identified from the database are associated with at least one rule relating to adherence data that is met by the adherence data for the patient.
G06Q 30/02 - MarketingEstimation ou détermination des prixCollecte de fonds
G06Q 50/22 - Aide sociale ou assistance sociale, p. ex. activités de développement communautaire ou services de consultation
G16H 20/10 - TIC spécialement adaptées aux thérapies ou aux plans d’amélioration de la santé, p. ex. pour manier les prescriptions, orienter la thérapie ou surveiller l’observance par les patients concernant des médicaments ou des médications, p. ex. pour s’assurer de l’administration correcte aux patients
A blockchain network control system and method is disclosed. The system includes a processor coupled to a storage comprising a plurality of network entity definitions each defining a different network entity that make up a target network architecture for a permissioned blockchain network. The system also includes a control object communicatively coupled to an ordering service and a plurality of organizations. The plurality of organizations was established by the blockchain network control system by instantiating the organizational membership service provider, registering and enrolling each peer node within each organization, storing the cryptographic identity generated for the peer node, and then instantiating the plurality of peer nodes. The ordering service was established by the blockchain network control system by instantiating the ordering membership service provider, registering and enrolling each orderer node belonging to the ordering service, storing the cryptographic identity generated for the orderer node, and then instantiating the orderer nodes.
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
15.
Self-consistent structures for secure transmission and temporary storage of sensitive data
Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 12/0862 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache avec pré-lecture
G06F 12/0891 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache utilisant des moyens d’effacement, d’invalidation ou de réinitialisation
G06F 16/248 - Présentation des résultats de requêtes
A system and method for data aggregation and process automation is disclosed. The method includes receiving a first data object from a first integration point through a first smart adapter, identifying an appropriate rules library from a plurality of rules libraries using a rules engine, the appropriate rules library being identified using the first data object, and applying the appropriate rules library through the rules engine. The rules are applied by instructing a transformation module to transform the first data object into a transformed data object, instructing a validation module to validate at least one of the first data object and the transformed data object, and instructing an aggregation module to perform a statistical analysis on one of the first data object and the transformed data object. Finally, the method includes sending the transformed data object to a second integration point associated with a second smart adapter.
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
17.
System and method for healthcare revenue cycle management
A method for healthcare revenue cycle management is disclosed, and includes receiving a transaction proposal at a first peer within a permissioned blockchain network (PBN). The transaction proposal includes a patient identity and a query, the query being a determination of unknown value to be made by a second organization of a plurality of organizations. Each organization of the plurality represents, within the PBN, one of a healthcare payer and a healthcare provider. The method also includes identifying a smart contract associated with the query and defined to automatically adjudicate the query. The method also includes invoking the smart contract in at least one endorsing peer, and receiving, from each endorsing peer, a proposed transaction response. The method further includes automatically adjudicating the query by executing chaincode on a second peer, operating on the required information to assign a value to the determination, then updating the immutable ledger.
Systems and methods provide an infrastructure for supporting wholly or partially virtual visits. Example methods include instantiating a virtual visit object for a subject participant, assigning a virtual room in the virtual visit object to a first room status, assigning at least a service team member to the virtual room based on room access rules applicable to the first room status. The method may also include providing a first user interface to the subject participant configured according to room participant access rules for the first room status to collect a data element from the subject participant. Changing the room status to a second room status may change the user interface, add a second service team member to the room participants for the virtual room based on a second room access rule applicable to the second room status and may remove the first service team member from the room participants.
G06Q 10/1093 - Ordonnancement basé sur un agenda pour des personnes ou des groupes
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p. ex. pour des dossiers électroniques de patients
G16H 40/20 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santéTIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion ou l’administration de ressources ou d’établissements de soins de santé, p. ex. pour la gestion du personnel hospitalier ou de salles d’opération
Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
20.
Communication device display with graphical user interface
A system and method for rules-driven adjudication is disclosed. The system includes a storage includes a rule library having a plurality of rules, each rule being in a human-readable format and including a first data tag, a comparator, a comparison value, and a result. The system also includes a rules manager configured to receive and store a new rule. The system includes a rules evaluator configured to receive an adjudication request having a data object associated with a data tag, and evaluate the request and create a primary determination by applying a first rule to the request, and further applying a first subsequent rule and all logically adjacent rules until all logically adjacent rules have been exhausted and the primary determination is an indefinite outcome or the applying of a final rule returns an outcome that becomes the primary determination.
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p. ex. pour des dossiers électroniques de patients
G16H 40/20 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santéTIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion ou l’administration de ressources ou d’établissements de soins de santé, p. ex. pour la gestion du personnel hospitalier ou de salles d’opération
G16H 70/20 - TIC spécialement adaptées au maniement ou au traitement de références médicales concernant des pratiques ou des directives
A data aggregation and process automation (DAPA) system is disclosed. The DAPA system includes an authentication module, a monitoring module, an intelligent automation module, and a transformation module. The authentication module is configured to initiate authenticated communication with a plurality of servers, and includes an authentication storage having a plurality of authentication credentials and routing information. The monitoring module is configured to monitor a first server for a first change event and monitor a second server for a second change event. The first change event results in the receipt of a first data object and the second change event results in the receipt of a second data object. The intelligent automation module is configured to identify the second server, request a service, and submit an update data object to the first server. The transformation module is configured to transform data objects from one format into another.
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
G06Q 40/00 - FinanceAssuranceStratégies fiscalesTraitement des impôts sur les sociétés ou sur le revenu
G16H 15/00 - TIC spécialement adaptées aux rapports médicaux, p. ex. leur création ou leur transmission
G16H 40/20 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santéTIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion ou l’administration de ressources ou d’établissements de soins de santé, p. ex. pour la gestion du personnel hospitalier ou de salles d’opération
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
23.
Data aggregation and process automation systems and methods
A system and method for data aggregation and process automation is disclosed. The method includes receiving a first data object from a first integration point through a first smart adapter, identifying an appropriate rules library from a plurality of rules libraries using a rules engine, the appropriate rules library being identified using the first data object, and applying the appropriate rules library through the rules engine. The rules are applied by instructing a transformation module to transform the first data object into a transformed data object, instructing a validation module to validate at least one of the first data object and the transformed data object, and instructing an aggregation module to perform a statistical analysis on one of the first data object and the transformed data object. Finally, the method includes sending the transformed data object to a second integration point associated with a second smart adapter.
G06F 16/21 - Conception, administration ou maintenance des bases de données
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06N 5/025 - Extraction de règles à partir de données
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
A system and method for on-demand data cleansing is disclosed. The system includes a processor and a volatile memory including a data object having a plurality of data fields, each field having a tag and a value. The system also includes a cleansing module stored in the volatile memory and executed by the processor. The cleansing module includes a library having a plurality of tag-operation pairs. The cleansing module is configured to receive a pointer locating the data object within volatile memory, and further configured to, for each data field, look up the tag of the data field among the library tags, and execute the operation paired with the matching library tag on the value of the field, modifying the value of the data field while it is stored in volatile memory. The cleansing module is configured to execute the operation in near real-time, and at runtime.
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
G06F 16/29 - Bases de données d’informations géographiques
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
25.
System and method for configuring an adaptive computing cluster
A system for configuring an adaptive computer cluster is disclosed. The system includes a cluster configuration server communicatively coupled to a cluster hosting environment through a network, the cluster configuration server having a processor and a memory. The memory includes a plurality of inert containers and a configuration tool configured to receive at least one procedure having a trigger event and at least one task and further configured to instruct the cluster hosting environment to instantiate the adaptive computer cluster based upon the at least one procedure and using the plurality of inert containers. The instantiation instructions include instructions to instantiate, within the cluster hosting environment, an API gateway container, a storage container, a distributed computing master node container, at least one solution-specific container, and an orchestrator container. The instructions from the configuration tool further include instructions to communicatively couple all of the containers to the orchestrator container.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
H04L 41/0233 - Techniques orientées objet, pour la représentation des données de gestion de réseau, p. ex. l’architecture commune de répartition des requêtes d’objets [CORBA]
26.
Streamlined patient communication device display screen with graphical user interface
Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
Systems and methods provide an infrastructure for supporting wholly or partially virtual visits. Example methods include instantiating a virtual visit object for a subject participant, assigning a virtual room in the virtual visit object to a first room status, assigning at least a service team member to the virtual room based on room access rules applicable to the first room status. The method may also include providing a first user interface to the subject participant configured according to room participant access rules for the first room status to collect a data element from the subject participant. Changing the room status to a second room status may change the user interface, add a second service team member to the room participants for the virtual room based on a second room access rule applicable to the second room status and may remove the first service team member from the room participants.
G16H 40/67 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santéTIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour le fonctionnement d’équipement ou de dispositifs médicaux pour le fonctionnement à distance
G16H 40/40 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santéTIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion d’équipement ou de dispositifs médicaux, p. ex. pour planifier la maintenance ou les mises à jour
G16H 40/20 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santéTIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion ou l’administration de ressources ou d’établissements de soins de santé, p. ex. pour la gestion du personnel hospitalier ou de salles d’opération
The present teaching relates to medical suggestion searching. In one example, data related to a medication drug are obtained. One or more candidate prescription strings are identified from the obtained data. Each of the candidate prescription strings is associated with a plurality of attributes. Each of the one or more candidate prescription strings is automatically processed based on at least one model to generate one or more prescription strings each with an associated ranking. At least some of the generated one or more prescription strings and the associated rankings are stored for future use.
G16H 50/20 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour le diagnostic assisté par ordinateur, p. ex. basé sur des systèmes experts médicaux
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
G16Z 99/00 - Matière non prévue dans les autres groupes principaux de la présente sous-classe
30.
ANONYMIZED INTERFACE FOR TICKET BASED AUTHENTICATION
Method, system, and programs provide automatic anonymization of protected data items when a request is associated with authentication via a ticket. Ticket authentication includes sending a ticket to a recipient address. The ticket is included in a request for information. Responsive to receiving a request with a ticket, an example system may determine if the ticket is still valid and, if so, generate mock identifiers for any identifiers in information provided back to the requestor, replace the identifiers with their corresponding mock identifiers, as well as delete any protected information from the information provided back to the requestor. The system may store a mapping of the identifiers with their mock identifiers by session id. These mappings may be deleted after a predetermined time, so that the mapping is valid only for a particular session for a limited time.
Method, system, and programs provide automatic anonymization of protected data items when a request is associated with authentication via a ticket. Ticket authentication includes sending a ticket to a recipient address. The ticket is included in a request for information. Responsive to receiving a request with a ticket, an example system may determine if the ticket is still valid and, if so, generate mock identifiers for any identifiers in information provided back to the requestor, replace the identifiers with their corresponding mock identifiers, as well as delete any protected information from the information provided back to the requestor. The system may store a mapping of the identifiers with their mock identifiers by session id. These mappings may be deleted after a predetermined time, so that the mapping is valid only for a particular session for a limited time.
Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a match for the property from graph access records, the match being a node in an identity chain. The method also includes verifying a complete chain from the match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures
34.
Streamlined patient communication device display screen with graphical user interface
Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.
G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées
G06F 16/21 - Conception, administration ou maintenance des bases de données
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
A computer system identifies supplemental materials most effective at increasing adherence for each of a plurality of different medications and provides the materials at an optimal point in time. An example method generates a first user interface for receiving an electronic prescription for a patient for a prescribed substance. Responsive to receiving the electronic prescription, the method includes obtaining adherence data for the patient, identifying supplemental programs associated with the prescribed substance from a database of supplemental programs, generating a second user interface that presents the supplemental programs for selection by the health care provider, and responsive to receiving selection of at least one of the supplemental programs in the second user interface, providing the supplemental programs to the patient. The supplemental programs identified from the database are associated with at least one rule relating to adherence data that is met by the adherence data for the patient.
Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
44 - Services médicaux, services vétérinaires, soins d'hygiène et de beauté; services d'agriculture, d'horticulture et de sylviculture.
09 - Appareils et instruments scientifiques et électriques
Produits et services
Health care business services, namely, providing a computer database for use in selection of potential patients for conducting medical research projects and for conducting patient surveys by third party pharmaceutical and medical companies; Health care business services, namely, notification of potential patients and patients regarding participation in medical drug trials, and feedback from patients regarding prescription drug usage and other issues relating to medical research programs; Providing electronic prescription refill and prescription processing services, namely, enabling healthcare providers to facilitate online prescription orders and refills with pharmacies and insurers for patients; providing office management services for medical practices and practitioners, namely, preparing business reports and budgeting, via the Internet, telephone, fax, and mail Financial advice, namely, budget planning Providing temporary use of online non-downloadable software for use in medical services, namely, for generating medical prescriptions and recording patient information; software as a service (SAAS) services featuring software for use in the healthcare industry for electronic prescribing of controlled substances; software as a service (SAAS) services featuring software for use in the healthcare industry to allow for the transferring of electronic messages, data and medical information, namely, patient information, on a one-to-one or one-to- many users basis; software as a service (SAAS) services featuring software for use in the healthcare services industry to allow authorized individuals to access, share and exchange medical information, namely, prescription and patient information and messages pertaining to such medical information; software as a service (SAAS) services featuring software that allows for the secure exchange of medical prescriptions and patient and medical information; application service provider services featuring software and secure communications software in the field of healthcare management and clinical management via the Internet, intranets or global communications or information networks for use by medical/health services providers, for electronic prescription handling and for secure email transmissions and secure transmissions of electronic medical records, clinical patient data and other private information; computer software installation and maintenance; design, hosting, and maintenance of public and private Internet sites for medical/health service providers Providing online medical information, namely, maintaining patient medical record and prescription information; providing electronic prescription refill reminder services and electronic medication refill reminder services to healthcare providers Downloadable computer software for use in the healthcare industry to allow for the transferring of electronic messages, data and medical information, namely, patient information, on a one-to-one or one-to-many users basis
A blockchain network control system and method is disclosed. The system includes a processor coupled to a storage comprising a plurality of network entity definitions each defining a different network entity that make up a target network architecture for a permissioned blockchain network. The system also includes a control object communicatively coupled to an ordering service and a plurality of organizations. The plurality of organizations was established by the blockchain network control system by instantiating the organizational membership service provider, registering and enrolling each peer node within each organization, storing the cryptographic identity generated for the peer node, and then instantiating the plurality of peer nodes. The ordering service was established by the blockchain network control system by instantiating the ordering membership service provider, registering and enrolling each orderer node belonging to the ordering service, storing the cryptographic identity generated for the orderer node, and then instantiating the orderer nodes.
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
A system and method for rules-driven adjudication is disclosed. The system includes a storage includes a rule library having a plurality of rules, each rule being in a human-readable format and including a first data tag, a comparator, a comparison value, and a result. The system also includes a rules manager configured to receive and store a new rule. The system includes a rules evaluator configured to receive an adjudication request having a data object associated with a data tag, and evaluate the request and create a primary determination by applying a first rule to the request, and further applying a first subsequent rule and all logically adjacent rules until all logically adjacent rules have been exhausted and the primary determination is an indefinite outcome or the applying of a final rule returns an outcome that becomes the primary determination.
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p. ex. pour des dossiers électroniques de patients
G16H 70/20 - TIC spécialement adaptées au maniement ou au traitement de références médicales concernant des pratiques ou des directives
G06N 5/04 - Modèles d’inférence ou de raisonnement
G16H 40/20 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santéTIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion ou l’administration de ressources ou d’établissements de soins de santé, p. ex. pour la gestion du personnel hospitalier ou de salles d’opération
G06Q 50/26 - Services gouvernementaux ou services publics
Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.
G06F 16/248 - Présentation des résultats de requêtes
G06F 12/0891 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache utilisant des moyens d’effacement, d’invalidation ou de réinitialisation
G06F 12/0862 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache avec pré-lecture
A system and method for on-demand data cleansing is disclosed. The system includes a processor and a volatile memory including a data object having a plurality of data fields, each field having a tag and a value. The system also includes a cleansing module stored in the volatile memory and executed by the processor. The cleansing module includes a library having a plurality of tag-operation pairs. The cleansing module is configured to receive a pointer locating the data object within volatile memory, and further configured to, for each data field, look up the tag of the data field among the library tags, and execute the operation paired with the matching library tag on the value of the field, modifying the value of the data field while it is stored in volatile memory. The cleansing module is configured to execute the operation in near real-time, and at runtime.
G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
G06F 16/29 - Bases de données d’informations géographiques
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
44.
Authentication using a feeder robot in a web environment
Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.
The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.
G06F 21/46 - Structures ou outils d’administration de l’authentification par la création de mots de passe ou la vérification de la solidité des mots de passe
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p. ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.
G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées
G06F 16/21 - Conception, administration ou maintenance des bases de données
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.
The present teaching relates to medical record completion. In one example, a medical record of a patient is received. The medical record is associated with a plurality of components comprising a first component with a populated value and a second component with an unpopulated value. The unpopulated value of the second component is estimated based on the populated value of the first component in accordance with a first model. Information associated with the medical record and/or the patient is obtained. The values of the first and second components are validated based on the obtained information in accordance with a second model. The first and second models are dynamically updated based on data related to medical transactions of a plurality of patients.
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p. ex. pour des dossiers électroniques de patients
G16H 20/10 - TIC spécialement adaptées aux thérapies ou aux plans d’amélioration de la santé, p. ex. pour manier les prescriptions, orienter la thérapie ou surveiller l’observance par les patients concernant des médicaments ou des médications, p. ex. pour s’assurer de l’administration correcte aux patients
G16H 50/70 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour extraire des données médicales, p. ex. pour analyser les cas antérieurs d’autres patients
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Technology consulting as it relates to enterprise level software for healthcare administration; Consulting in the field of information technology, namely, consulting in information technology as it relates to artificial intelligence; Technology consulting as it relates to artificial intelligence, machine learning, and block chain; Custom design of computer software for medical and pharmacy benefits; Customizing computer software; Developing customized software for others; Developing customized software in the field of artificial intelligence, machine learning, and block chain for others; Information technology consulting as it relates to enterprise level software for healthcare administration
50.
Data aggregation and process automation systems and methods
A data aggregation and process automation (DAPA) system is disclosed. The DAPA system includes an authentication module, a monitoring module, an intelligent automation module, and a transformation module. The authentication module is configured to initiate authenticated communication with a plurality of servers, and includes an authentication storage having a plurality of authentication credentials and routing information. The monitoring module is configured to monitor a first server for a first change event and monitor a second server for a second change event. The first change event results in the receipt of a first data object and the second change event results in the receipt of a second data object. The intelligent automation module is configured to identify the second server, request a service, and submit an update data object to the first server. The transformation module is configured to transform data objects from one format into another.
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p. ex. pour des dossiers électroniques de patients
G16H 15/00 - TIC spécialement adaptées aux rapports médicaux, p. ex. leur création ou leur transmission
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
G16H 40/20 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santéTIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion ou l’administration de ressources ou d’établissements de soins de santé, p. ex. pour la gestion du personnel hospitalier ou de salles d’opération
A computer system identifies the permutation of supplemental materials most effective at increasing adherence for each of a plurality of different medication diagnostic codes and provides the materials at an optimal point in time. An example system includes a supplemental program (SP) module implemented on a computing device that receives a plurality of supplemental programs associated with the one or more prescribed substances, identifies a plurality of permutations of the plurality of supplemental programs, constructs a plurality of cohorts, each of the cohorts corresponding to a prescribed substance and associated with a permutation, receives adherence data collected with respect to the plurality of permutations associated with the plurality of cohorts; and determines effectiveness of each of the plurality of permutations based on the adherence data.
Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.
G06F 16/248 - Présentation des résultats de requêtes
G06F 12/0891 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache utilisant des moyens d’effacement, d’invalidation ou de réinitialisation
G06F 12/0862 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache avec pré-lecture
53.
SELF-CONSISTENT STRUCTURES FOR SECURE TRANSMISSION AND TEMPORARY STORAGE OF SENSITIVE DATA
Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
software as a service (SAAS) services featuring software for providing patients with information, educational materials, cost information, and access to financial assistance, all related to medications and pharmaceutical products
55.
Method and system for interoperable identity and interoperable credentials
The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/45 - Structures ou outils d’administration de l’authentification
G06F 21/46 - Structures ou outils d’administration de l’authentification par la création de mots de passe ou la vérification de la solidité des mots de passe
The present teaching relates to medical suggestion searching. In one example, data related to a medication drug are obtained. One or more candidate prescription strings are identified from the obtained data. Each of the candidate prescription strings is associated with a plurality of attributes. Each of the one or more candidate prescription strings is automatically processed based on at least one model to generate one or more prescription strings each with an associated ranking. At least some of the generated one or more prescription strings and the associated rankings are stored for future use.
G16H 50/20 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour le diagnostic assisté par ordinateur, p. ex. basé sur des systèmes experts médicaux
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
G06F 19/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des applications spécifiques (spécialement adaptés à des fonctions spécifiques G06F 17/00;systèmes ou méthodes de traitement de données spécialement adaptés à des fins administratives, commerciales, financières, de gestion, de surveillance ou de prévision G06Q;informatique médicale G16H)
57.
System and method for configuring an adaptive computing cluster
A system for configuring an adaptive computer cluster is disclosed. The system includes a cluster configuration server communicatively coupled to a cluster hosting environment through a network, the cluster configuration server having a processor and a memory. The memory includes a plurality of inert containers and a configuration tool configured to receive at least one procedure having a trigger event and at least one task and further configured to instruct the cluster hosting environment to instantiate the adaptive computer cluster based upon the at least one procedure and using the plurality of inert containers. The instantiation instructions include instructions to instantiate, within the cluster hosting environment, an API gateway container, a storage container, a distributed computing master node container, at least one solution-specific container, and an orchestrator container. The instructions from the configuration tool further include instructions to communicatively couple all of the containers to the orchestrator container.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
H04L 41/0233 - Techniques orientées objet, pour la représentation des données de gestion de réseau, p. ex. l’architecture commune de répartition des requêtes d’objets [CORBA]
58.
Self-consistent structures for secure transmission and temporary storage of sensitive data
Implementations provide self-consistent, temporary, secure storage of information. An example system includes fast, short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the fast, short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Advanced product research in the field of artificial intelligence; Design and development of computer hardware and software systems; Integrated platform as a service featuring artificial intelligence, machine learning, and blockchain computer software platforms for database management in the healthcare industry, encryption of medical records, document management, healthcare claims management; Research and development of advanced learning technologies and teaching methods
60.
Strong authentication with feeder robot in a federated identity web environment
Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.
The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 21/45 - Structures ou outils d’administration de l’authentification
G06F 21/46 - Structures ou outils d’administration de l’authentification par la création de mots de passe ou la vérification de la solidité des mots de passe
42 - Services scientifiques, technologiques et industriels, recherche et conception
44 - Services médicaux, services vétérinaires, soins d'hygiène et de beauté; services d'agriculture, d'horticulture et de sylviculture.
Produits et services
Providing temporary use of online non-downloadable software for use in medical services, namely, for generating medical prescriptions and recording patient information Providing online medical information in the field of patient medical record and prescription information
Method, system, and programs for providing a patient prescription portal are disclosed. An example method includes determining, responsive to receiving an electronic prescription, that information in the electronic prescription matches a parameter, transmitting, responsive to determining that the information in the electronic prescription matches, a notification to a phone number provided by a patient identified in the electronic prescription, the notification requesting input for managing patient medications, the notification including an opt-in option, and accessing, subsequent to the patient selecting the opt-in option, medication records for the patient. The method may also include initiating a medication app that displays the medication records to the patient and provides controls enabling the patient to change the medication records, receiving, from the patient via the medication app, a change to the medication records, and updating the medication records according to the change.
G06F 19/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des applications spécifiques (spécialement adaptés à des fonctions spécifiques G06F 17/00;systèmes ou méthodes de traitement de données spécialement adaptés à des fins administratives, commerciales, financières, de gestion, de surveillance ou de prévision G06Q;informatique médicale G16H)
Business management consulting with relation to strategy, marketing, sales, operation, product design particularly specializing in the use of analytic and statistic models for the understanding and predicting of consumers, businesses, and market trends and actions
A health information exchange (HIE) system and related methods for sharing patient medical data among a plurality of users. In one embodiment, the HIE system includes a processor executing a software application and one or more databases. Medical data may be downloaded by a first user to the system in a source file format. The system converts and stores the medical data in a data record such as an object having a different type of data structure. Upon receiving a request from a second user for the medical data in a specified destination file format, the system retrieves and converts the object containing the medical data into the specified destination file format, and sends the destination file to the second user. The source and destination file formats may be the same or different. In one embodiment, users may access and communicate with the HIE system via the Internet.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projetsPlanification d’entreprise ou d’organisationModélisation d’entreprise ou d’organisation
G16H 40/67 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santéTIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour le fonctionnement d’équipement ou de dispositifs médicaux pour le fonctionnement à distance
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p. ex. pour des dossiers électroniques de patients
G06F 16/21 - Conception, administration ou maintenance des bases de données
G06F 16/178 - Techniques de synchronisation des fichiers dans les systèmes de fichiers
The present teaching relates to medical record completion. In one example, a medical record of a patient is received. The medical record is associated with a plurality of components comprising a first component with a populated value and a second component with an unpopulated value. The unpopulated value of the second component is estimated based on the populated value of the first component in accordance with a first model. Information associated with the medical record and/or the patient is obtained. The values of the first and second components are validated based on the obtained information in accordance with a second model. The first and second models are dynamically updated based on data related to medical transactions of a plurality of patients.
G06F 19/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des applications spécifiques (spécialement adaptés à des fonctions spécifiques G06F 17/00;systèmes ou méthodes de traitement de données spécialement adaptés à des fins administratives, commerciales, financières, de gestion, de surveillance ou de prévision G06Q;informatique médicale G16H)
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p. ex. pour des dossiers électroniques de patients
68.
Strong authentication with feeder robot in a federated identity web environment
Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.
The present teaching relates to medical suggestion searching. In one example, data related to a medication drug are obtained. One or more candidate prescription strings are identified from the obtained data. Each of the candidate prescription strings is associated with a plurality of attributes. Each of the one or more candidate prescription strings is automatically processed based on at least one model to generate one or more prescription strings each with an associated ranking. At least some of the generated one or more prescription strings and the associated rankings are stored for future use.
A61J 3/00 - Dispositifs ou procédés spécialement conçus pour donner à des produits pharmaceutiques une forme physique déterminée ou une forme propre à leur administration
G06F 19/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des applications spécifiques (spécialement adaptés à des fonctions spécifiques G06F 17/00;systèmes ou méthodes de traitement de données spécialement adaptés à des fins administratives, commerciales, financières, de gestion, de surveillance ou de prévision G06Q;informatique médicale G16H)
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
G06Q 50/24 - Gestion de dossiers médicaux (traitement de données médicales ou biologiques à des fins scientifiques G06F 19/00)
70.
Method and system for interoperable identity and interoperable credentials
The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.
G06F 7/04 - Contrôle d'égalité, c.-à-d. pour valeurs égales ou non
G06F 21/45 - Structures ou outils d’administration de l’authentification
G06F 21/46 - Structures ou outils d’administration de l’authentification par la création de mots de passe ou la vérification de la solidité des mots de passe
The present teaching relates to medical suggestion searching. In one example, data related to a medication drug are obtained. One or more candidate prescription strings are identified from the obtained data. Each of the candidate prescription strings is associated with a plurality of attributes. Each of the one or more candidate prescription strings is automatically processed based on at least one model to generate one or more prescription strings each with an associated ranking. At least some of the generated one or more prescription strings and the associated rankings are stored for future use.
G06F 19/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des applications spécifiques (spécialement adaptés à des fonctions spécifiques G06F 17/00;systèmes ou méthodes de traitement de données spécialement adaptés à des fins administratives, commerciales, financières, de gestion, de surveillance ou de prévision G06Q;informatique médicale G16H)
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
G16H 50/20 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour le diagnostic assisté par ordinateur, p. ex. basé sur des systèmes experts médicaux
72.
HEALTHCARE EVENT RESPONSE AND COMMUNICATION CENTER
The present teaching relates to a Healthcare Event Response and Communication Center. In one example, a healthcare message is received. The healthcare message is processed to automatically identify one or more healthcare events. For each identified healthcare event, one or more responsive entities that are configured to be responsive to the healthcare event are identified. Each responsive entity is associated with one or more healthcare workflows that are configured to receive the healthcare event. Each identified healthcare event is provided in realtime to each of the one or more responsive healthcare workflows with respect to each responsive entity.
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
G06Q 50/22 - Aide sociale ou assistance sociale, p. ex. activités de développement communautaire ou services de consultation
H04M 11/02 - Systèmes de communication téléphonique spécialement adaptés pour être combinés avec d'autres systèmes électriques avec sonnerie ou systèmes annonciateurs
73.
SYSTEM AND METHOD FOR INCREASING PATIENT ADHERENCE TO MEDICATION TREATMENT REGIMENS
A system and method for increasing patient adherence to following medication treatment regimens. An adherence data processing and communication system generates and displays medication adherence data based on historical medication information. The system is linked to other systems involved with electronic ordering and filling of prescriptions, such as electronic prescription and pharmacy systems all connected by suitable wired and/or wireless communication protocols including the Internet. In one embodiment, the adherence data is displayed in the form of an interactive report card which provides a user with adherence metrics in both summary and more detailed formats for prescription medications taken by the patient. A related method executed by the data processing and communication system is disclosed.
A system and method for increasing patient adherence to following medication treatment regimens. An adherence data processing and communication system generates and displays medication adherence data based on historical medication information. The system is linked to other systems involved with electronic ordering and filling of prescriptions, such as electronic prescription and pharmacy systems all connected by suitable wired and/or wireless communication protocols including the Internet. In one embodiment, the adherence data is displayed in the form of an interactive report card which provides a user with adherence metrics in both summary and more detailed formats for prescription medications taken by the patient. A related method executed by the data processing and communication system is disclosed.
A system and method for increasing patient adherence to following medication treatment regimens. An adherence data processing and communication system generates and displays medication adherence data based on historical medication information. The system is linked to other systems involved with electronic ordering and filling of prescriptions, such as electronic prescription and pharmacy systems all connected by suitable wired and/or wireless communication protocols including the Internet. In one embodiment, the adherence data is displayed in the form of an interactive report card which provides a user with adherence metrics in both summary and more detailed formats for prescription medications taken by the patient. A related method executed by the data processing and communication system is disclosed.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Application service provider services featuring software and secure communications software in the field of healthcare management and clinical management via the internet, intranets or global communications or information networks for use by medical and health services providers, namely, providing software for prescription handling services, namely, electronic prescription handling, and for secure electronic transmission services, namely, for providing secure email transmissions and secure transmissions of electronic medical records, clinical patient data and other private information; computer software installation and maintenance; design, hosting, and support of public and private internet sites for medical and health service providers.
36 - Services financiers, assurances et affaires immobilières
38 - Services de télécommunications
42 - Services scientifiques, technologiques et industriels, recherche et conception
44 - Services médicaux, services vétérinaires, soins d'hygiène et de beauté; services d'agriculture, d'horticulture et de sylviculture.
Produits et services
(1) Providing office management services for medical practices and practitioners, namely, preparing reports and budgeting, via the Internet, telephone, fax, and mail
(2) Communication services, namely, providing user access to a a global communications and information network; providing secure electronic communications, namely, providing user access to a platform over a network to medical service providers and insurance companies for medical insurance claims submission, management, and reporting, and for verification of insurance coverage eligibility of patients
(3) Computer software installation and maintenance; design, hosting, and support of public and private Internet sites for medical practices and practitioners; providing electronic medical records over a global communications and information network
(4) Providing electronic prescription refill services and prescription processing; Providing electronic prescription refill and prescription processing services, namely, providing prescription refills to pharmacies from physicians' offices for others to facilitate online prescription management
(5) Providing electronic prescription refill reminder services and electronic medication refill reminder services to healthcare providers
09 - Appareils et instruments scientifiques et électriques
Produits et services
Computer software for use in the healthcare industry to allow for the transferring of electronic messages, data and medical information, namely, patient information, on a one-to-one or one-to-many users basis
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Software as a service (SAAS) services featuring software for use in the healthcare industry to allow for the transferring of electronic messages, data and medical information, namely, patient information, on a one-to-one or one-to-many users basis
82.
Systems and methods for providing supplemental materials to increase patient adherence to prescribed medication
The present invention relates generally to a method of provisioning a combined educational coupon that includes a) receiving, on a computer apparatus, electronic prescription data for a prescribed substance for a patient; b) the computer apparatus determining educational data relating to the prescribed substance and coupon data relating to the prescribed substance; and c) the computer apparatus generating a single data file comprising the educational data relating to the prescribed substance and the coupon data relating to the prescribed substance.
09 - Appareils et instruments scientifiques et électriques
Produits et services
Downloadable computer application software for connecting patients and healthcare personnel to each other and to patient information, for use on mobile phones and other computing devices
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Application service provider services featuring software and secure communications software in the field of healthcare management and clinical management via the Internet, intranets or global communications or information networks for use by medical/health services providers, namely, providing software [ for accounting, billing and financial reporting, featuring charge capture features, for office management services, namely, for scheduling appointments, ] for prescription handling services, namely, electronic prescription handling, [ for assisting with the processing, submission and management of medical insurance claims, ] and for secure electronic transmission services, namely, for providing secure email transmissions and secure transmissions of electronic medical records, clinical patient data and other private information; Computer software installation and maintenance; Design, hosting, and support of public and private Internet sites for medical/health service providers [ ; Providing temporary use of on-line non-downloadable accounting application software for medical practices and practitioners ]
36 - Services financiers, assurances et affaires immobilières
37 - Services de construction; extraction minière; installation et réparation
38 - Services de télécommunications
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing [ billing and ] office management services for medical practices and practitioners, namely, preparing reports and budgeting, via the Internet, telephone, fax, and mail [ ; buying services, namely, providing discounts to member practitioners on selected goods and services purchased over the Internet ] [ Providing financial reporting services, namely, financial analysis and consultation for medical practices and practitioners ] [ Computer hardware installation and maintenance ] Communication services, namely, providing a means for secure communications over a global communications and information network; providing secure electronic communications between medical service providers and insurance companies for medical insurance claims submission, management, and reporting, and for verification of insurance coverage eligibility of patients Computer software installation and maintenance; design, hosting, and support of public and private Internet sites for medical practices and practitioners; providing electronic medical records over a global communications and information network [, Leasing software including patient billing and accounting functions to medical practices and practitioners ]