Mediated data encryption for longitudinal patient level databases
First Claim
1. A process for assembling a longitudinally linked database from individual patient healthcare transaction data records, the process comprising the steps of:
- (a) deploying an implementation partner (IP) to mediate processing of acquired data records having patient-identifying attributes and non-identifying attributes at a data supplier site, whereby at least the patient-identifying attributes in the data records are encrypted so that the data records can be securely transmitted to a longitudinal database facility (LDF);
(b) receiving the encrypted data records at the LDF; and
(c) deploying the IP to mediate processing of the received data records, whereby LDF identifiers (IDs) are assigned to the data records based on the values of the encrypted patient-identifying attributes in the data records, and whereby the encrypted data records can be linked longitudinally ID by ID, wherein in steps (a) and (c) the processing of the data records is performed in a secure processing environment that is accessible only to the IP.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for the assembly of a longitudinally linked database of patient healthcare data records involve a neutral implementation partner to ensure that sensitive patient-identifying information contained in the data records is secure at all times. The implementation partner is deployed to mediate processing of the data records in a secure environment, which is inaccessible to unauthorized parties including data supplier and database facility personnel. At data supplier sites, the implementation partner mediates processing of the data records so that the patient-identifying attributes in the data records are encrypted before they are transmitted to a common longitudinal database facility. At the common longitudinal database facility, the implementation partner mediates processing of the data records so that internal tags are assigned to data records based on the values of the encrypted patient-identifying attributes. The internal tags are used to longitudinally link the encrypted data records in a statistically meaningful manner. The implementation partner may be any combination of software, hardware and organizational entities.
36 Citations
19 Claims
-
1. A process for assembling a longitudinally linked database from individual patient healthcare transaction data records, the process comprising the steps of:
-
(a) deploying an implementation partner (IP) to mediate processing of acquired data records having patient-identifying attributes and non-identifying attributes at a data supplier site, whereby at least the patient-identifying attributes in the data records are encrypted so that the data records can be securely transmitted to a longitudinal database facility (LDF);
(b) receiving the encrypted data records at the LDF; and
(c) deploying the IP to mediate processing of the received data records, whereby LDF identifiers (IDs) are assigned to the data records based on the values of the encrypted patient-identifying attributes in the data records, and whereby the encrypted data records can be linked longitudinally ID by ID, wherein in steps (a) and (c) the processing of the data records is performed in a secure processing environment that is accessible only to the IP. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for assembling a longitudinally linked database from individual patient healthcare transaction data records received from multiple data suppliers by a longitudinal database facility (LDF), the system comprising:
-
an implementation partner (IP) who mediates processing of data records having patient-identifying attributes and non-identifying attributes at a data supplier site, whereby at least the patient-identifying attributes in the data records are encrypted so that the data records can be securely transmitted to the LDF, and who further mediates processing of the received data records at the LDF, whereby identifiers (IDs) are assigned to data records based on the values of the encrypted patient-identifying attributes in the data records, and whereby the encrypted data records can be linked longitudinally ID by ID at the LDF; and
a secure data processing environment extending over the data suppler site and the LDF that is accessible only to the IP. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification