[go: up one dir, main page]

WO2002093508A1 - Portable personal medical file system - Google Patents

Portable personal medical file system Download PDF

Info

Publication number
WO2002093508A1
WO2002093508A1 PCT/BE2001/000086 BE0100086W WO02093508A1 WO 2002093508 A1 WO2002093508 A1 WO 2002093508A1 BE 0100086 W BE0100086 W BE 0100086W WO 02093508 A1 WO02093508 A1 WO 02093508A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
key
block
patient
standard
Prior art date
Application number
PCT/BE2001/000086
Other languages
French (fr)
Inventor
Georges Chiche
Original Assignee
Georges Chiche
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Georges Chiche filed Critical Georges Chiche
Priority to PCT/BE2001/000086 priority Critical patent/WO2002093508A1/en
Publication of WO2002093508A1 publication Critical patent/WO2002093508A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/346Cards serving only as information carrier of service
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • G16H10/65ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records stored on portable record carriers, e.g. on smartcards, RFID tags or CD
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H15/00ICT specially adapted for medical reports, e.g. generation or transmission thereof

Definitions

  • a two ways data communication The first way is passing trough the bus converter, into the processor and if needed in the memory, this is always the initial flow. After valid identification the processor will make the communication ready.
  • the identification purpose is to makes sure that the owner is giving valid authorization, and the consulting party is only then accessing his data.
  • the data can go trough the secure way (crypt-decrypt) or flow much faster using t e DMA channel.
  • the processor will allocate an area of the memory free for access, then reading or writing can be process in this case data is not passing through the encrypting process. In other case data is retrieve out of memory then the personal encryption key code will apply-in and scramble. It is very interesting and useful to transfer data to a central storage device to be processed.
  • USB SmartKev Structure See figure : 2
  • This device includes, all micro components into a one-piece solid state media that capacity range from 8 to 256 Mb equipped with an USB connector small and light +- 12 grams enough that can be carried into a purse, pocket or wallet.
  • a Software pilot mopitors the computer USB channel to detect if an eventual insertion.
  • the pilot detect is type, characteristics and is ID and determine if ⁇ hey are valid, then signal its presence to the program that start decrypting process of the patient medical personal data.
  • This data is encrypted with the new Rijndael encryption technology using a time out.
  • the hidden key-ID is unique for every patient.
  • the hjdden key-ID is unique for every care provider, the data is always sent in blocks of equal length, but key dependent, in different sequence. Every block has a check sum for integrity.
  • the data can be different for every block to go, in different steps for up counting or down counting sequence, depending on a control word, send in the beginning of the sequence, and processed with the key number.
  • the system is using a matrix of 256 numbers, who can be used in variable sequence, for coding and decoding the data, this sequence depends on the key number, the check sum and the control word in combination of the key ID type.
  • Data regeneration can only be processed in the proper key in order to secure information's; stored within the key it self, this data is encrypted and has always the same block length, making it temper proof.
  • the build-in CryptO ⁇ Processor will reconvert the data into a readable text when both keys Patient and care Provider are connected trough the USB hub.
  • the Administrator key is used for creating the different type of keys, also permits data recuperation and verification in case of lose or data corruption. Smartkey using microchip secure data Storage
  • the DMA channel giyes the possibility to transfer the data on high speed in or out the memory.
  • the data is always encrypted going this way. This gives the security by making backups.
  • temporally the standard data is swapped out of the key, in standard memory of the computer, so the whole memory of the key can be used to process data, block by block so there is virtually no limit on file length. This with the guaranty of maximum security. After job done the standard data is swapped again in the key. Because every key has its own encryption protocol the data can only be used in its proper key.
  • the hardware is constructed so that in case of defect or jam, it always displays the least significant data block.
  • ViTALIS is an Inter ⁇ et Software Portal that will backup and maintain in a secure way the user individual page, to store his medical data file.
  • the software will detect is type, characteristics and is ID to determine if they are valid, then signal its presence to the program that allows or not accessing to his own page only if valid then patient ⁇ atest care data can be accessed, updated and stored if necessary.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Epidemiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Medical Treatment And Welfare Office Work (AREA)
  • Storage Device Security (AREA)

Abstract

A Personal and Portable Medical File System and its overall concept. This tool captures and maintains all heath data from patient in a digitally and electronically form stored within a small solid state device, light and small enough to easily fit into a wallet and could connect to any computer, desktop or mobile system equipped with USB port. The Personal Portable Medical File System can be carried by the patient anywhere and permits when needed to instantly five access to his medical data and history to the care provider in an eventual emergency case or in a medical practice. With the use of user-friendly software all related medical data of patient including x-rys, labs reports data, emergency information, allergies, medication, administration and insurance information of the patient will be display. Furthermore it offer to the care provider a summarized report of the care provided to the patient for insurance purpose and history backup. Moreover, using a dedicated internet portal site, facilities are given to the care provider to download x-ray and analyses result uploaded earlier by lab offices. A secure communication and storage algorithm based on Rijndael in conjunction with a security technique using a memory microchip device that as a swapping DMA techniques in order to secure data storage, a personal encrypted hidden key with variable block add security to the system.

Description

DESCRIPTION
Portable Personal Medical File System.
Basic Concept
To allow to each citizen the right and the possibility to own, carry and access at any moment, anywhere without any mean of specialized intervention, his health status and overall medical file hjistory.
While incredible advances are continually made in the delivery of patient care, the health care field stjll suffers from a lack of integrated information as providers, researchers, health care enterprises and software vendors struggle to share health care knowledge across clinical specialties and sites of care. At times, it can seem as though no one in health care is using the same vocabulary - or even speaking the same language.
Now the health care industry has an innovative solution to this age-old problem: is a unique conceptτbased technology that makes health care knowledge more accessible and usable whenever and wherever it is needed. The dynamic, comprehensive terminology has numerous benefits for patients, practitioners, health care enterprises and software vendors alike:
Enables consistent coding of clinical concepts, leading to more complete and accurate jnformation.
Improves co-ordination of patient care and potentially reduces the occurrence σ medical errors.
Provides access to important information that might otherwise be buried among paper reqords.
Allows health care enterprises and practitioners to record data just once, then mine it fof decision support, statistical reporting, outcome measurement, treatment guidelines and cost analysis.
Helps ensure comparability of data recorded by multiple practitioners across diverse and often incompatible platforms and systems.
Enables flexible queries and the complete, consistent recall needed for better workflow management and strategic business support
Enables more accurate billing through reduced vulnerability to miscoding.
Facilitates progress toward the electronic health record.
Security concept on data storage and manipulation.
A two ways data communication. The first way is passing trough the bus converter, into the processor and if needed in the memory, this is always the initial flow. After valid identification the processor will make the communication ready.
The identification purpose is to makes sure that the owner is giving valid authorization, and the consulting party is only then accessing his data.
After proper identifiqation the data can go trough the secure way (crypt-decrypt) or flow much faster using t e DMA channel.
In case of DMA the processor will allocate an area of the memory free for access, then reading or writing can be process in this case data is not passing through the encrypting process. In other case data is retrieve out of memory then the personal encryption key code will apply-in and scramble. It is very interesting and useful to transfer data to a central storage device to be processed.
Prior to be resented though the encrypting processor, access to data is being denied before it is restored within its proper key. This gives the possibility to swap data without any loss of safety of the key's proper information by using temporarily the memory capacity of the key.
Lines in red are the control by witches the processor access the proper device.
The latch addresses, the right memory area.
The USB SmartKev Structure: See figure : 2
An innovative way to secure hardware
This device includes, all micro components into a one-piece solid state media that capacity range from 8 to 256 Mb equipped with an USB connector small and light +- 12 grams enough that can be carried into a purse, pocket or wallet.
No connecting cables or PCMCIA card adapters are required. It fits standard USB ports that equipped all computer system today. Conforms to USB industry standards mechanical specifications, Plug & Play, no battery or power source requires except the power supplied by the computer.
Runs on Microsoft Windows 98, 98SE, Windows ME, Windows 2000, Mac and Linux Os, to be used with desktops & notebooks computer system. Storage capacities could vary from 8MB to 256MB.
Technical Specs: Insertion live cycles up to 5000 cycles
Data Reading Speed 750Kbytes/Sec Depending on PC
Data Writing Speed 350 Kbytes/Sec Depending on PC
Security Concept Application Structure See figure : 3
Achieving a secure way to process the personal medical data file.
A Software pilot mopitors the computer USB channel to detect if an eventual insertion. In the event that a martKey is connected the pilot detect is type, characteristics and is ID and determine if {hey are valid, then signal its presence to the program that start decrypting process of the patient medical personal data. This data is encrypted with the new Rijndael encryption technology using a time out. The hidden key-ID is unique for every patient. The hjdden key-ID is unique for every care provider, the data is always sent in blocks of equal length, but key dependent, in different sequence. Every block has a check sum for integrity.
The data can be different for every block to go, in different steps for up counting or down counting sequence, depending on a control word, send in the beginning of the sequence, and processed with the key number. The system is using a matrix of 256 numbers, who can be used in variable sequence, for coding and decoding the data, this sequence depends on the key number, the check sum and the control word in combination of the key ID type. Data regeneration can only be processed in the proper key in order to secure information's; stored within the key it self, this data is encrypted and has always the same block length, making it temper proof.
The build-in CryptOηProcessor will reconvert the data into a readable text when both keys Patient and care Provider are connected trough the USB hub. The Administrator key is used for creating the different type of keys, also permits data recuperation and verification in case of lose or data corruption. Smartkey using microchip secure data Storage
Because only the hqlder of the key may expose the data we can use a unique base figure for every key. This is, more safe then PKI, you need no public key for encryption. There is only one central data, base where the double of every key is stored so in case of defect or lost a new key can be made with the recovered data of the backup media
Swapping memory techniques using DMA
The DMA channel giyes the possibility to transfer the data on high speed in or out the memory. The data is always encrypted going this way. This gives the security by making backups. In case of processing large amount of data, temporally the standard data is swapped out of the key, in standard memory of the computer, so the whole memory of the key can be used to process data, block by block so there is virtually no limit on file length. This with the guaranty of maximum security. After job done the standard data is swapped again in the key. Because every key has its own encryption protocol the data can only be used in its proper key.
Security techniques using personal encrypted variable hidden Key
Above the standard encryption the data is always transferred at standard block length. So it is impossible to fiηd the beginning or end of the data in this block. Every block has its own hidden key. The place where this key is hidden is different for every block. This key is telling the construption of the block, the offset for the beginning, left or right reading and the binary bite manipulation. This process is changing every time the contents are changed.
Hardware extra latcji Security techniques
The hardware is constructed so that in case of defect or jam, it always displays the least significant data block.
The Portable Personal Medical File System Concept See figure : 4
Achieving an Internet communication way.
ViTALIS is an Interηet Software Portal that will backup and maintain in a secure way the user individual page, to store his medical data file.
Access in being geηerally granted only the holder of the Smartkey with valid identification.
In the event that a ^martKey is connected and user request access to the Internet portal the software will detect is type, characteristics and is ID to determine if they are valid, then signal its presence to the program that allows or not accessing to his own page only if valid then patient ^atest care data can be accessed, updated and stored if necessary.
In the event of road accident emergency care provider will be granted access when patient not carrying his Smartkey to retrieve emergency data.
In case of loss of the patient's or care provider's key, request is made to the administrator to issue a new Smartkey.
Various care providers as x-rays lab, analyses laboratory or other care provider will have a special Internet cqmmunication page session to upload their reports into a note's page where this data will be temporarily stored in order to be downloaded later by the doctor or care provider in charge at that time with the patient care.

Claims

CLAIM
1.. A Personal Pqrtable Medical File System and overall concept that capture and maintain all health data from patient in a digitally and electronically form and stored them within a small device that can be connected to any computer desktop or mobile system equipped with an USB port. This device includes all micro components into a one-piece solid state media that capacity range from 8 to 256 Mb equipped with an USB connector small and light +- 12 grams enough that can be carried, into a purse, pocket or wallet.
No connecting caqles or PCMCIA card adapters are required. It fits standard USB ports that equipped all computer system today. Conforms to USB industry standards mechanical specifications, Plug & Play, no battery or power source requires except the power supplied by the computer.
2.. Smartkey using microchip secure data Storage
Because only the holder of the key may expose the data we can use a unique base figure for every key. This is more safe then PKI, you need no public key for encryption. There is only one central data base where the double of every key is stored so in case of defect or lost a new key can be made with the recovered data of the backup media
3.. Swapping memory techniques using DMA
The DMA channel gives the possibility to transfer the data on high speed in or out the memory. The data is always encrypted going this way. This gives the security by making backups. In case qf processing large amount of data, temporally the standard data is swapped out of th^ key, in standard memory of the computer, so the whole memory of the key can be used to process data, block by block so there is virtually no limit on file length. This with th,e guaranty of maximum security. After job done the standard data is swapped again in the key. Because every key has its own encryption protocol the data can only be used in its proper key.
4.. Security techniques using personal encrypted variable hidden Key
Above the standard encryption the data is always transferred at standard block length. So it is impossible to f nd the beginning or end of the data in this block. Every block has its own hidden key. The place where this key is hidden is different for every block. This key is telling the construction of the block, the offset for the beginning, left or right reading and the binary bite maηipulation. This process is changing every time the contents are changed.
5.. Hardware extra latch Security techniques
The hardware is constructed so that in case of defect or jam, it always displays the least significant data block.
PCT/BE2001/000086 2001-05-16 2001-05-16 Portable personal medical file system WO2002093508A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/BE2001/000086 WO2002093508A1 (en) 2001-05-16 2001-05-16 Portable personal medical file system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/BE2001/000086 WO2002093508A1 (en) 2001-05-16 2001-05-16 Portable personal medical file system

Publications (1)

Publication Number Publication Date
WO2002093508A1 true WO2002093508A1 (en) 2002-11-21

Family

ID=3862564

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/BE2001/000086 WO2002093508A1 (en) 2001-05-16 2001-05-16 Portable personal medical file system

Country Status (1)

Country Link
WO (1) WO2002093508A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004109610A1 (en) * 2003-06-04 2004-12-16 Zingtech Limited Transaction processing
DE102004008187A1 (en) * 2004-02-18 2005-04-07 Siemens Ag Component system e.g. for processing patient specific data, has instructions for administration and or instructions for requirement of patient- specific data with assumption data and control instructions received
WO2005050517A3 (en) * 2003-11-20 2006-02-23 Angelo Montiglio System for sharing personal multi-language medical­health data and process for managing such data
EP1736925A1 (en) * 2005-06-13 2006-12-27 Linax Holdings Ltd., Electronic health book
WO2007053885A1 (en) * 2005-11-08 2007-05-18 Yak Biotech Solutions Pty Ltd Method and apparatus for handling personal information
CN100426178C (en) * 2004-12-31 2008-10-15 重庆安运科技有限公司 A method for identification of driver identity
WO2008132451A3 (en) * 2007-04-26 2009-03-12 Cell Uk Ltd E Data storage device
WO2009058163A1 (en) * 2007-10-30 2009-05-07 Jackson Johnnie R System and method for portable medical records

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2680258A1 (en) * 1991-08-07 1993-02-12 Ballet Eric Microprocessor-based or magnetic medical card system with double-entry reader
US5291399A (en) * 1990-07-27 1994-03-01 Executone Information Systems, Inc. Method and apparatus for accessing a portable personal database as for a hospital environment
EP0661675A2 (en) * 1993-12-29 1995-07-05 International Business Machines Corporation Access control apparatus and method
WO1996008755A1 (en) * 1994-09-13 1996-03-21 Irmgard Rost Personal data archive system
FR2730331A1 (en) * 1995-02-07 1996-08-09 Robin Jean Marc HEALTH CARD
WO1997004712A1 (en) * 1995-07-26 1997-02-13 Mc Medical Card Systems Gmbh System for the transmission and storage of personal medical data, and an ic card for use in such a system
EP0764911A1 (en) * 1995-08-22 1997-03-26 Emx L.C.C. Medical information communications system and method
WO1997022092A2 (en) * 1995-12-14 1997-06-19 Venda Security Corporation Secure personal information card and method of using the same
EP0821326A2 (en) * 1996-07-24 1998-01-28 International Business Machines Corporation Method and system for the secure transmission and storage of protectable information
WO1998055932A2 (en) * 1997-06-04 1998-12-10 Richard Rubinstein Processor interfacing to memory mapped computing engine
WO2001006468A1 (en) * 1999-07-19 2001-01-25 Datacard Corporation System and method for storing, managing, and retrieving healthcare information on a smart card

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5291399A (en) * 1990-07-27 1994-03-01 Executone Information Systems, Inc. Method and apparatus for accessing a portable personal database as for a hospital environment
FR2680258A1 (en) * 1991-08-07 1993-02-12 Ballet Eric Microprocessor-based or magnetic medical card system with double-entry reader
EP0661675A2 (en) * 1993-12-29 1995-07-05 International Business Machines Corporation Access control apparatus and method
WO1996008755A1 (en) * 1994-09-13 1996-03-21 Irmgard Rost Personal data archive system
FR2730331A1 (en) * 1995-02-07 1996-08-09 Robin Jean Marc HEALTH CARD
WO1997004712A1 (en) * 1995-07-26 1997-02-13 Mc Medical Card Systems Gmbh System for the transmission and storage of personal medical data, and an ic card for use in such a system
EP0764911A1 (en) * 1995-08-22 1997-03-26 Emx L.C.C. Medical information communications system and method
WO1997022092A2 (en) * 1995-12-14 1997-06-19 Venda Security Corporation Secure personal information card and method of using the same
EP0821326A2 (en) * 1996-07-24 1998-01-28 International Business Machines Corporation Method and system for the secure transmission and storage of protectable information
WO1998055932A2 (en) * 1997-06-04 1998-12-10 Richard Rubinstein Processor interfacing to memory mapped computing engine
WO2001006468A1 (en) * 1999-07-19 2001-01-25 Datacard Corporation System and method for storing, managing, and retrieving healthcare information on a smart card

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004109610A1 (en) * 2003-06-04 2004-12-16 Zingtech Limited Transaction processing
US7231373B2 (en) 2003-06-04 2007-06-12 Zingtech Limited Transaction processing
WO2005050517A3 (en) * 2003-11-20 2006-02-23 Angelo Montiglio System for sharing personal multi-language medical­health data and process for managing such data
DE102004008187A1 (en) * 2004-02-18 2005-04-07 Siemens Ag Component system e.g. for processing patient specific data, has instructions for administration and or instructions for requirement of patient- specific data with assumption data and control instructions received
CN100426178C (en) * 2004-12-31 2008-10-15 重庆安运科技有限公司 A method for identification of driver identity
EP1736925A1 (en) * 2005-06-13 2006-12-27 Linax Holdings Ltd., Electronic health book
EP1736926A1 (en) * 2005-06-13 2006-12-27 Linax Holdings Ltd., Electronic health book
WO2007053885A1 (en) * 2005-11-08 2007-05-18 Yak Biotech Solutions Pty Ltd Method and apparatus for handling personal information
WO2008132451A3 (en) * 2007-04-26 2009-03-12 Cell Uk Ltd E Data storage device
WO2009058163A1 (en) * 2007-10-30 2009-05-07 Jackson Johnnie R System and method for portable medical records

Similar Documents

Publication Publication Date Title
US7328276B2 (en) Computer oriented record administration system
US5995965A (en) System and method for remotely accessing user data records
JPH10505695A (en) Personal data storage device
US20040103000A1 (en) Portable system and method for health information storage, retrieval, and management
US20050125678A1 (en) Systems and methods for configuring digital storage media with multiple access privileges
US20080094926A1 (en) Portable device for storing private information such as medical, financial or emergency information
US20080027752A1 (en) Physician reviewed portable and network accessed electronic medical record
US20070265884A1 (en) Portable memory device configured to store person's medical information
US20120023592A1 (en) Medical alert computer interface tamper-proof secure device
US20100332260A1 (en) Personal record system with centralized data storage and distributed record generation and access
NO311545B1 (en) Secure user card for sharing user data and procedures among a variety of microprocessors
KR20170127587A (en) Method and system for administering electronic prescriptions
WO2002093508A1 (en) Portable personal medical file system
Jansen et al. Guidelines on PDA forensics
US20130253955A1 (en) Network and method for data input, storage and retrieval
CN106709832A (en) Campus life account system based on fingerprint identification
KR20000071940A (en) System for electronically transmitting prescription by using smart card
JP2002279062A (en) Personal information management system and personal information management method
RU98104U1 (en) DISTRIBUTED AUTOMATED HEALTH MONITORING SYSTEM
JP2011514060A (en) System for controlled data exchange between at least two data carriers via mobile read / write memory
JP2001125989A (en) System and method for making remote access to user data record
WO1999046682A1 (en) Mobile intelligent memory (mim) unit with removable security key
WO2010091484A2 (en) Electronic driving licence with points on smart card
JP2007133770A (en) Memory card, processor module, and host device control method
WO2010091483A1 (en) Electronic identity card on smartcard

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AT AU CA CH DE DK ES FI GB IN IS LU MX NO NZ PL RU TR US ZA

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642