×

Validating a metadata tree using a metadata integrity validator

  • US 10,025,903 B2
  • Filed: 09/12/2012
  • Issued: 07/17/2018
  • Est. Priority Date: 08/15/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method performed by a processing system implemented by at least one hardware processor, the method comprising:

  • storing in a metadata integrity validator, first integrity information for a metadata tree of a patient, the first integrity information including a summary tree that identifies a state of the metadata tree, the summary tree based on an in-order traversal of a corresponding subtree of the metadata tree, the first integrity information including a hash of the subtree based on a hash function cumulatively applied to nodes of the subtree from a root node to a last node along the in-order traversal;

    generating, by the at least one hardware processor, a first reconstructed metadata tree of the patient from a metadata tree journal using the first integrity information to ensure a consistent version is reconstructed from the metadata tree journal, the first reconstructed metadata tree including a plurality of references to a corresponding plurality of encrypted electronic health records of the patient in an encrypted data store;

    receiving from the metadata integrity validator, the first integrity information corresponding to the metadata tree journal;

    validating the first reconstructed metadata tree by comparing second integrity information of the first reconstructed metadata tree to the first integrity information; and

    responsive to successfully validating the first reconstructed metadata tree, permitting read and write access to the encrypted data store, comprising;

    determining a node in the first reconstructed metadata tree that corresponds to an encrypted electronic health record in the encrypted data store;

    accessing the encrypted electronic health record from the encrypted data store using a reference from the node; and

    decrypting the encrypted electronic health record using a record key.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×