Patient identification and information protection system and method
First Claim
1. A personnel identity protection system, comprising:
- a wearable wireless communication tag having a pseudo-name identifier correlated to a protected identity of the wearer of the tag, wherein the pseudo-name does not visibly reveal the public identity or private information relating to the wearer;
a transceiver capable of receiving wireless communication from the tag and capable of transmitting a signal having at least one of the tag'"'"'s communication and a transceiver'"'"'s location, and capable of receiving a non-tag generated signal;
a computer capable of receiving the transceiver'"'"'s transmitted signal and capable of initiating a non-tag signal to be transmitted to the transceiver; and
software operating on the computer, the software evaluating received transceiver transmitted signals and designating the transceiver'"'"'s access to differing levels of information relating to the wearer of the tag based on at least one of the transceiver'"'"'s location and the tag'"'"'s communication.
1 Assignment
0 Petitions
Accused Products
Abstract
A personnel identity protection mechanism and method is provided which utilizes a pseudo-name that is used in conjunction with RFID or RFID-like tags. By correlating the location of the tag wearer to equipment or professionals attending to the tag wear, identity and/or private information relating to the tag wearer can be controlled on a need-to-know basis. Concomitantly, access to the tag wearer'"'"'s identity and/or private information by attending professionals, wearing a non-pseudo-name RFID or RFID-like tag, can be automatically enabled or filtered by correlating the non-pseudo-name bearing tags'"'"' proximity to the accessing system. By use of such a pseudo-name having restricted access capabilities with a RFID or RFID-like tag system, patients or institutionalized persons can be assured of a higher degree of security with respect to their private or medical information.
-
Citations
26 Claims
-
1. A personnel identity protection system, comprising:
-
a wearable wireless communication tag having a pseudo-name identifier correlated to a protected identity of the wearer of the tag, wherein the pseudo-name does not visibly reveal the public identity or private information relating to the wearer;
a transceiver capable of receiving wireless communication from the tag and capable of transmitting a signal having at least one of the tag'"'"'s communication and a transceiver'"'"'s location, and capable of receiving a non-tag generated signal;
a computer capable of receiving the transceiver'"'"'s transmitted signal and capable of initiating a non-tag signal to be transmitted to the transceiver; and
software operating on the computer, the software evaluating received transceiver transmitted signals and designating the transceiver'"'"'s access to differing levels of information relating to the wearer of the tag based on at least one of the transceiver'"'"'s location and the tag'"'"'s communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A personnel identity protection system, comprising:
-
communication means for portably and wirelessly communicating information that is usable to identify a location of a wearer of the communication means, the communication means having a pseudo-name identifier correlated to a protected identity of the wearer of the communication means, wherein the pseudo-name does not visibly reveal the public identity or private information relating to the wearer;
transceiver means for receiving wireless communication from the communication means and transmitting a signal having at least one of the wireless communication means'"'"' communication and a transceiver means'"'"' location, and capable of receiving a non-communication means generated signal;
processing means for receiving the transceiver means'"'"' transmitted signal and initiating a non-communication means generated signal to be transmitted to the transceiver means; and
instruction means for operating on the processing means and evaluating the received transceiver means'"'"' signals, the instruction means designating the transceiver means'"'"' access to differing levels of information relating to the wearer of the communication means based on at least one of the transceiver means'"'"' location and the communication means'"'"' communication.
-
-
20. A method for protecting identifying information of personnel, comprising the steps of:
-
generating a visible pseudo-name on a wearable and wireless communication tag, the pseudo-name being correlated to a protected identity of a wearer of the tag, wherein the pseudo-name does not visibly reveal the public identity or private information relating to the wearer;
transmitting a wireless communication from the tag;
receiving at a transceiver at least one of the wireless communication from the tag and a non-tag generated signal;
transmitting from the transceiver a signal having at least one of the tag'"'"'s communication and a transceiver'"'"'s location;
receiving the transceiver'"'"'s signal for processing by a computer;
executing software instructions based on at least one of the tag'"'"'s communication and the transceiver'"'"'s location;
designating the transceiver'"'"'s access to differing levels of information relating to the wearer of the tag based on at least one of the transceiver'"'"'s location and the tag'"'"'s communication; and
initiating a non-tag signal to be transmitted by the computer to the transceiver facilitating access to designated information relating to the wearer of the tag. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification