WO2002093508A1 - Portable personal medical file system - Google Patents
Portable personal medical file system Download PDFInfo
- Publication number
- WO2002093508A1 WO2002093508A1 PCT/BE2001/000086 BE0100086W WO02093508A1 WO 2002093508 A1 WO2002093508 A1 WO 2002093508A1 BE 0100086 W BE0100086 W BE 0100086W WO 02093508 A1 WO02093508 A1 WO 02093508A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- key
- block
- patient
- standard
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/346—Cards serving only as information carrier of service
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
- G16H10/65—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records stored on portable record carriers, e.g. on smartcards, RFID tags or CD
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H15/00—ICT specially adapted for medical reports, e.g. generation or transmission thereof
Definitions
- a two ways data communication The first way is passing trough the bus converter, into the processor and if needed in the memory, this is always the initial flow. After valid identification the processor will make the communication ready.
- the identification purpose is to makes sure that the owner is giving valid authorization, and the consulting party is only then accessing his data.
- the data can go trough the secure way (crypt-decrypt) or flow much faster using t e DMA channel.
- the processor will allocate an area of the memory free for access, then reading or writing can be process in this case data is not passing through the encrypting process. In other case data is retrieve out of memory then the personal encryption key code will apply-in and scramble. It is very interesting and useful to transfer data to a central storage device to be processed.
- USB SmartKev Structure See figure : 2
- This device includes, all micro components into a one-piece solid state media that capacity range from 8 to 256 Mb equipped with an USB connector small and light +- 12 grams enough that can be carried into a purse, pocket or wallet.
- a Software pilot mopitors the computer USB channel to detect if an eventual insertion.
- the pilot detect is type, characteristics and is ID and determine if ⁇ hey are valid, then signal its presence to the program that start decrypting process of the patient medical personal data.
- This data is encrypted with the new Rijndael encryption technology using a time out.
- the hidden key-ID is unique for every patient.
- the hjdden key-ID is unique for every care provider, the data is always sent in blocks of equal length, but key dependent, in different sequence. Every block has a check sum for integrity.
- the data can be different for every block to go, in different steps for up counting or down counting sequence, depending on a control word, send in the beginning of the sequence, and processed with the key number.
- the system is using a matrix of 256 numbers, who can be used in variable sequence, for coding and decoding the data, this sequence depends on the key number, the check sum and the control word in combination of the key ID type.
- Data regeneration can only be processed in the proper key in order to secure information's; stored within the key it self, this data is encrypted and has always the same block length, making it temper proof.
- the build-in CryptO ⁇ Processor will reconvert the data into a readable text when both keys Patient and care Provider are connected trough the USB hub.
- the Administrator key is used for creating the different type of keys, also permits data recuperation and verification in case of lose or data corruption. Smartkey using microchip secure data Storage
- the DMA channel giyes the possibility to transfer the data on high speed in or out the memory.
- the data is always encrypted going this way. This gives the security by making backups.
- temporally the standard data is swapped out of the key, in standard memory of the computer, so the whole memory of the key can be used to process data, block by block so there is virtually no limit on file length. This with the guaranty of maximum security. After job done the standard data is swapped again in the key. Because every key has its own encryption protocol the data can only be used in its proper key.
- the hardware is constructed so that in case of defect or jam, it always displays the least significant data block.
- ViTALIS is an Inter ⁇ et Software Portal that will backup and maintain in a secure way the user individual page, to store his medical data file.
- the software will detect is type, characteristics and is ID to determine if they are valid, then signal its presence to the program that allows or not accessing to his own page only if valid then patient ⁇ atest care data can be accessed, updated and stored if necessary.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Epidemiology (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Storage Device Security (AREA)
Abstract
A Personal and Portable Medical File System and its overall concept. This tool
captures and maintains all heath data from patient in a digitally and electronically
form stored within a small solid state device, light and small enough to easily
fit into a wallet and could connect to any computer, desktop or mobile system equipped
with USB port. The Personal Portable Medical File System can be carried by the
patient anywhere and permits when needed to instantly five access to his medical
data and history to the care provider in an eventual emergency case or in a medical
practice. With the use of user-friendly software all related medical data of
patient including x-rys, labs reports data, emergency information, allergies,
medication, administration and insurance information of the patient will be
display. Furthermore it offer to the care provider a summarized report of the
care provided to the patient for insurance purpose and history backup. Moreover,
using a dedicated internet portal site, facilities are given to the care provider
to download x-ray and analyses result uploaded earlier by lab offices. A secure
communication and storage algorithm based on Rijndael in conjunction with a
security technique using a memory microchip device that as a swapping DMA techniques
in order to secure data storage, a personal encrypted hidden key with variable
block add security to the system.
Description
DESCRIPTION
Portable Personal Medical File System.
Basic Concept
To allow to each citizen the right and the possibility to own, carry and access at any moment, anywhere without any mean of specialized intervention, his health status and overall medical file hjistory.
While incredible advances are continually made in the delivery of patient care, the health care field stjll suffers from a lack of integrated information as providers, researchers, health care enterprises and software vendors struggle to share health care knowledge across clinical specialties and sites of care. At times, it can seem as though no one in health care is using the same vocabulary - or even speaking the same language.
Now the health care industry has an innovative solution to this age-old problem: is a unique conceptτbased technology that makes health care knowledge more accessible and usable whenever and wherever it is needed. The dynamic, comprehensive terminology has numerous benefits for patients, practitioners, health care enterprises and software vendors alike:
Enables consistent coding of clinical concepts, leading to more complete and accurate jnformation.
Improves co-ordination of patient care and potentially reduces the occurrence σ medical errors.
Provides access to important information that might otherwise be buried among paper reqords.
Allows health care enterprises and practitioners to record data just once, then mine it fof decision support, statistical reporting, outcome measurement, treatment guidelines and cost analysis.
Helps ensure comparability of data recorded by multiple practitioners across diverse and often incompatible platforms and systems.
Enables flexible queries and the complete, consistent recall needed for better workflow management and strategic business support
Enables more accurate billing through reduced vulnerability to miscoding.
Facilitates progress toward the electronic health record.
Security concept on data storage and manipulation.
A two ways data communication. The first way is passing trough the bus converter, into the processor and if needed in the memory, this is always the initial flow. After valid identification the processor will make the communication ready.
The identification purpose is to makes sure that the owner is giving valid authorization, and the consulting party is only then accessing his data.
After proper identifiqation the data can go trough the secure way (crypt-decrypt) or flow much faster using t e DMA channel.
In case of DMA the processor will allocate an area of the memory free for access, then reading or writing can be process in this case data is not passing through the encrypting process. In other case data is retrieve out of memory then the personal encryption key code will apply-in and scramble. It is very interesting and useful to transfer data to a
central storage device to be processed.
Prior to be resented though the encrypting processor, access to data is being denied before it is restored within its proper key. This gives the possibility to swap data without any loss of safety of the key's proper information by using temporarily the memory capacity of the key.
Lines in red are the control by witches the processor access the proper device.
The latch addresses, the right memory area.
The USB SmartKev Structure: See figure : 2
An innovative way to secure hardware
This device includes, all micro components into a one-piece solid state media that capacity range from 8 to 256 Mb equipped with an USB connector small and light +- 12 grams enough that can be carried into a purse, pocket or wallet.
No connecting cables or PCMCIA card adapters are required. It fits standard USB ports that equipped all computer system today. Conforms to USB industry standards mechanical specifications, Plug & Play, no battery or power source requires except the power supplied by the computer.
Runs on Microsoft Windows 98, 98SE, Windows ME, Windows 2000, Mac and Linux Os, to be used with desktops & notebooks computer system. Storage capacities could vary from 8MB to 256MB.
Technical Specs: Insertion live cycles up to 5000 cycles
Data Reading Speed 750Kbytes/Sec Depending on PC
Data Writing Speed 350 Kbytes/Sec Depending on PC
Security Concept Application Structure See figure : 3
Achieving a secure way to process the personal medical data file.
A Software pilot mopitors the computer USB channel to detect if an eventual insertion. In the event that a martKey is connected the pilot detect is type, characteristics and is ID and determine if {hey are valid, then signal its presence to the program that start decrypting process of the patient medical personal data. This data is encrypted with the new Rijndael encryption technology using a time out. The hidden key-ID is unique for every patient. The hjdden key-ID is unique for every care provider, the data is always sent in blocks of equal length, but key dependent, in different sequence. Every block has a check sum for integrity.
The data can be different for every block to go, in different steps for up counting or down counting sequence, depending on a control word, send in the beginning of the sequence, and processed with the key number. The system is using a matrix of 256 numbers, who can be used in variable sequence, for coding and decoding the data, this sequence depends on the key number, the check sum and the control word in combination of the key ID type. Data regeneration can only be processed in the proper key in order to secure information's; stored within the key it self, this data is encrypted and has always the same block length, making it temper proof.
The build-in CryptOηProcessor will reconvert the data into a readable text when both keys Patient and care Provider are connected trough the USB hub. The Administrator key is used for creating the different type of keys, also permits data recuperation and verification in case of lose or data corruption.
Smartkey using microchip secure data Storage
Because only the hqlder of the key may expose the data we can use a unique base figure for every key. This is, more safe then PKI, you need no public key for encryption. There is only one central data, base where the double of every key is stored so in case of defect or lost a new key can be made with the recovered data of the backup media
Swapping memory techniques using DMA
The DMA channel giyes the possibility to transfer the data on high speed in or out the memory. The data is always encrypted going this way. This gives the security by making backups. In case of processing large amount of data, temporally the standard data is swapped out of the key, in standard memory of the computer, so the whole memory of the key can be used to process data, block by block so there is virtually no limit on file length. This with the guaranty of maximum security. After job done the standard data is swapped again in the key. Because every key has its own encryption protocol the data can only be used in its proper key.
Security techniques using personal encrypted variable hidden Key
Above the standard encryption the data is always transferred at standard block length. So it is impossible to fiηd the beginning or end of the data in this block. Every block has its own hidden key. The place where this key is hidden is different for every block. This key is telling the construption of the block, the offset for the beginning, left or right reading and the binary bite manipulation. This process is changing every time the contents are changed.
Hardware extra latcji Security techniques
The hardware is constructed so that in case of defect or jam, it always displays the least significant data block.
The Portable Personal Medical File System Concept See figure : 4
Achieving an Internet communication way.
ViTALIS is an Interηet Software Portal that will backup and maintain in a secure way the user individual page, to store his medical data file.
Access in being geηerally granted only the holder of the Smartkey with valid identification.
In the event that a ^martKey is connected and user request access to the Internet portal the software will detect is type, characteristics and is ID to determine if they are valid, then signal its presence to the program that allows or not accessing to his own page only if valid then patient ^atest care data can be accessed, updated and stored if necessary.
In the event of road accident emergency care provider will be granted access when patient not carrying his Smartkey to retrieve emergency data.
In case of loss of the patient's or care provider's key, request is made to the administrator to issue a new Smartkey.
Various care providers as x-rays lab, analyses laboratory or other care provider will have a special Internet cqmmunication page session to upload their reports into a note's page where this data will be temporarily stored in order to be downloaded later by the doctor or care provider in charge at that time with the patient care.
Claims
1.. A Personal Pqrtable Medical File System and overall concept that capture and maintain all health data from patient in a digitally and electronically form and stored them within a small device that can be connected to any computer desktop or mobile system equipped with an USB port. This device includes all micro components into a one-piece solid state media that capacity range from 8 to 256 Mb equipped with an USB connector small and light +- 12 grams enough that can be carried, into a purse, pocket or wallet.
No connecting caqles or PCMCIA card adapters are required. It fits standard USB ports that equipped all computer system today. Conforms to USB industry standards mechanical specifications, Plug & Play, no battery or power source requires except the power supplied by the computer.
2.. Smartkey using microchip secure data Storage
Because only the holder of the key may expose the data we can use a unique base figure for every key. This is more safe then PKI, you need no public key for encryption. There is only one central data base where the double of every key is stored so in case of defect or lost a new key can be made with the recovered data of the backup media
3.. Swapping memory techniques using DMA
The DMA channel gives the possibility to transfer the data on high speed in or out the memory. The data is always encrypted going this way. This gives the security by making backups. In case qf processing large amount of data, temporally the standard data is swapped out of th^ key, in standard memory of the computer, so the whole memory of the key can be used to process data, block by block so there is virtually no limit on file length. This with th,e guaranty of maximum security. After job done the standard data is swapped again in the key. Because every key has its own encryption protocol the data can only be used in its proper key.
4.. Security techniques using personal encrypted variable hidden Key
Above the standard encryption the data is always transferred at standard block length. So it is impossible to f nd the beginning or end of the data in this block. Every block has its own hidden key. The place where this key is hidden is different for every block. This key is telling the construction of the block, the offset for the beginning, left or right reading and the binary bite maηipulation. This process is changing every time the contents are changed.
5.. Hardware extra latch Security techniques
The hardware is constructed so that in case of defect or jam, it always displays the least significant data block.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/BE2001/000086 WO2002093508A1 (en) | 2001-05-16 | 2001-05-16 | Portable personal medical file system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/BE2001/000086 WO2002093508A1 (en) | 2001-05-16 | 2001-05-16 | Portable personal medical file system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2002093508A1 true WO2002093508A1 (en) | 2002-11-21 |
Family
ID=3862564
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/BE2001/000086 WO2002093508A1 (en) | 2001-05-16 | 2001-05-16 | Portable personal medical file system |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2002093508A1 (en) |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004109610A1 (en) * | 2003-06-04 | 2004-12-16 | Zingtech Limited | Transaction processing |
| DE102004008187A1 (en) * | 2004-02-18 | 2005-04-07 | Siemens Ag | Component system e.g. for processing patient specific data, has instructions for administration and or instructions for requirement of patient- specific data with assumption data and control instructions received |
| WO2005050517A3 (en) * | 2003-11-20 | 2006-02-23 | Angelo Montiglio | System for sharing personal multi-language medicalhealth data and process for managing such data |
| EP1736925A1 (en) * | 2005-06-13 | 2006-12-27 | Linax Holdings Ltd., | Electronic health book |
| WO2007053885A1 (en) * | 2005-11-08 | 2007-05-18 | Yak Biotech Solutions Pty Ltd | Method and apparatus for handling personal information |
| CN100426178C (en) * | 2004-12-31 | 2008-10-15 | 重庆安运科技有限公司 | A method for identification of driver identity |
| WO2008132451A3 (en) * | 2007-04-26 | 2009-03-12 | Cell Uk Ltd E | Data storage device |
| WO2009058163A1 (en) * | 2007-10-30 | 2009-05-07 | Jackson Johnnie R | System and method for portable medical records |
Citations (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2680258A1 (en) * | 1991-08-07 | 1993-02-12 | Ballet Eric | Microprocessor-based or magnetic medical card system with double-entry reader |
| US5291399A (en) * | 1990-07-27 | 1994-03-01 | Executone Information Systems, Inc. | Method and apparatus for accessing a portable personal database as for a hospital environment |
| EP0661675A2 (en) * | 1993-12-29 | 1995-07-05 | International Business Machines Corporation | Access control apparatus and method |
| WO1996008755A1 (en) * | 1994-09-13 | 1996-03-21 | Irmgard Rost | Personal data archive system |
| FR2730331A1 (en) * | 1995-02-07 | 1996-08-09 | Robin Jean Marc | HEALTH CARD |
| WO1997004712A1 (en) * | 1995-07-26 | 1997-02-13 | Mc Medical Card Systems Gmbh | System for the transmission and storage of personal medical data, and an ic card for use in such a system |
| EP0764911A1 (en) * | 1995-08-22 | 1997-03-26 | Emx L.C.C. | Medical information communications system and method |
| WO1997022092A2 (en) * | 1995-12-14 | 1997-06-19 | Venda Security Corporation | Secure personal information card and method of using the same |
| EP0821326A2 (en) * | 1996-07-24 | 1998-01-28 | International Business Machines Corporation | Method and system for the secure transmission and storage of protectable information |
| WO1998055932A2 (en) * | 1997-06-04 | 1998-12-10 | Richard Rubinstein | Processor interfacing to memory mapped computing engine |
| WO2001006468A1 (en) * | 1999-07-19 | 2001-01-25 | Datacard Corporation | System and method for storing, managing, and retrieving healthcare information on a smart card |
-
2001
- 2001-05-16 WO PCT/BE2001/000086 patent/WO2002093508A1/en unknown
Patent Citations (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5291399A (en) * | 1990-07-27 | 1994-03-01 | Executone Information Systems, Inc. | Method and apparatus for accessing a portable personal database as for a hospital environment |
| FR2680258A1 (en) * | 1991-08-07 | 1993-02-12 | Ballet Eric | Microprocessor-based or magnetic medical card system with double-entry reader |
| EP0661675A2 (en) * | 1993-12-29 | 1995-07-05 | International Business Machines Corporation | Access control apparatus and method |
| WO1996008755A1 (en) * | 1994-09-13 | 1996-03-21 | Irmgard Rost | Personal data archive system |
| FR2730331A1 (en) * | 1995-02-07 | 1996-08-09 | Robin Jean Marc | HEALTH CARD |
| WO1997004712A1 (en) * | 1995-07-26 | 1997-02-13 | Mc Medical Card Systems Gmbh | System for the transmission and storage of personal medical data, and an ic card for use in such a system |
| EP0764911A1 (en) * | 1995-08-22 | 1997-03-26 | Emx L.C.C. | Medical information communications system and method |
| WO1997022092A2 (en) * | 1995-12-14 | 1997-06-19 | Venda Security Corporation | Secure personal information card and method of using the same |
| EP0821326A2 (en) * | 1996-07-24 | 1998-01-28 | International Business Machines Corporation | Method and system for the secure transmission and storage of protectable information |
| WO1998055932A2 (en) * | 1997-06-04 | 1998-12-10 | Richard Rubinstein | Processor interfacing to memory mapped computing engine |
| WO2001006468A1 (en) * | 1999-07-19 | 2001-01-25 | Datacard Corporation | System and method for storing, managing, and retrieving healthcare information on a smart card |
Cited By (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004109610A1 (en) * | 2003-06-04 | 2004-12-16 | Zingtech Limited | Transaction processing |
| US7231373B2 (en) | 2003-06-04 | 2007-06-12 | Zingtech Limited | Transaction processing |
| WO2005050517A3 (en) * | 2003-11-20 | 2006-02-23 | Angelo Montiglio | System for sharing personal multi-language medicalhealth data and process for managing such data |
| DE102004008187A1 (en) * | 2004-02-18 | 2005-04-07 | Siemens Ag | Component system e.g. for processing patient specific data, has instructions for administration and or instructions for requirement of patient- specific data with assumption data and control instructions received |
| CN100426178C (en) * | 2004-12-31 | 2008-10-15 | 重庆安运科技有限公司 | A method for identification of driver identity |
| EP1736925A1 (en) * | 2005-06-13 | 2006-12-27 | Linax Holdings Ltd., | Electronic health book |
| EP1736926A1 (en) * | 2005-06-13 | 2006-12-27 | Linax Holdings Ltd., | Electronic health book |
| WO2007053885A1 (en) * | 2005-11-08 | 2007-05-18 | Yak Biotech Solutions Pty Ltd | Method and apparatus for handling personal information |
| WO2008132451A3 (en) * | 2007-04-26 | 2009-03-12 | Cell Uk Ltd E | Data storage device |
| WO2009058163A1 (en) * | 2007-10-30 | 2009-05-07 | Jackson Johnnie R | System and method for portable medical records |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7328276B2 (en) | Computer oriented record administration system | |
| US5995965A (en) | System and method for remotely accessing user data records | |
| JPH10505695A (en) | Personal data storage device | |
| US20040103000A1 (en) | Portable system and method for health information storage, retrieval, and management | |
| US20050125678A1 (en) | Systems and methods for configuring digital storage media with multiple access privileges | |
| US20080094926A1 (en) | Portable device for storing private information such as medical, financial or emergency information | |
| US20080027752A1 (en) | Physician reviewed portable and network accessed electronic medical record | |
| US20070265884A1 (en) | Portable memory device configured to store person's medical information | |
| US20120023592A1 (en) | Medical alert computer interface tamper-proof secure device | |
| US20100332260A1 (en) | Personal record system with centralized data storage and distributed record generation and access | |
| NO311545B1 (en) | Secure user card for sharing user data and procedures among a variety of microprocessors | |
| KR20170127587A (en) | Method and system for administering electronic prescriptions | |
| WO2002093508A1 (en) | Portable personal medical file system | |
| Jansen et al. | Guidelines on PDA forensics | |
| US20130253955A1 (en) | Network and method for data input, storage and retrieval | |
| CN106709832A (en) | Campus life account system based on fingerprint identification | |
| KR20000071940A (en) | System for electronically transmitting prescription by using smart card | |
| JP2002279062A (en) | Personal information management system and personal information management method | |
| RU98104U1 (en) | DISTRIBUTED AUTOMATED HEALTH MONITORING SYSTEM | |
| JP2011514060A (en) | System for controlled data exchange between at least two data carriers via mobile read / write memory | |
| JP2001125989A (en) | System and method for making remote access to user data record | |
| WO1999046682A1 (en) | Mobile intelligent memory (mim) unit with removable security key | |
| WO2010091484A2 (en) | Electronic driving licence with points on smart card | |
| JP2007133770A (en) | Memory card, processor module, and host device control method | |
| WO2010091483A1 (en) | Electronic identity card on smartcard |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AT AU CA CH DE DK ES FI GB IN IS LU MX NO NZ PL RU TR US ZA |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |