Case study devices, methods, and systems
First Claim
Patent Images
17. A storage computing system, comprising:
- a processor;
a memory coupled to the processor, the memory having executable instructions stored thereon that are executable by the processor to;
receive a bundled file from a computing device over an internet connection, where the bundled file is in a compressed and an encrypted form;
decrypt the bundled file;
decompress the bundled file to provide a case study file and a hash key to the case study file;
validate the integrity of the case study file using the hash key; and
index the case study file in the storage computing system upon validation of the case study file.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure includes devices, methods, and systems for creating a case study file that includes an image file from an imaging modality, executing a hash algorithm on the case study file to produce a hash key, compressing the case study file, bundling the hash key with the compressed file, encrypting the bundled file, and moving the encrypted bundled file through an Internet connection to a storage computing system, among other embodiments.
-
Citations
54 Claims
-
17. A storage computing system, comprising:
-
a processor; a memory coupled to the processor, the memory having executable instructions stored thereon that are executable by the processor to; receive a bundled file from a computing device over an internet connection, where the bundled file is in a compressed and an encrypted form; decrypt the bundled file; decompress the bundled file to provide a case study file and a hash key to the case study file; validate the integrity of the case study file using the hash key; and index the case study file in the storage computing system upon validation of the case study file. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A system, comprising:
a storage computing system and a number of computing devices, where the storage computing system and the number of computing devices include; a processor; a memory coupled to the processor, the memory having executable instructions stored thereon that are executable by the processor to; receive a bundled file from a first computing device over an internet connection, where the bundled file is in a compressed and an encrypted form; decrypt and decompress the bundled file to provide a case study file and a hash key to the case study file; validate the integrity of the case study file using the hash key; index the case study file in the storage computing system upon validation of the case study file; indicate to an approved computing device the existence of the case study file; receive a request over the internet connection from at least one of the first computing device or a second computing device for access to the case study file stored on the storage computing system; verify that at least one of the first computing device or the second computing device is the approved computing device; execute to recompress and re-encrypt the bundled file in its entirety; and send the re-encrypted bundled file through the internet connection to the approved computing device over the internet connection. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
34. A method, comprising:
-
creating a case study file, including an image file from an imaging modality on a computing device; executing a hash algorithm on the case study file to produce a hash key; producing a bundled file including the case study file and the hash key; compressing the bundled file; encrypting the bundled file in its entirety; and sending the encrypted bundled file through an internet connection to a storage computing system in communication with the computing device. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41)
-
-
42. A method of case study file management, comprising:
-
receiving a bundled file from a computing device over an internet connection, where the bundled file includes a case study file and a hash key in a compressed and encrypted form; decrypting the bundled file and validating the integrity of the case study file using the hash key; and indexing the case study file in a storage computing system upon validation of the case study file. - View Dependent Claims (43, 44, 45)
-
-
46. A method for storing case study files for clinics comprising the computer-implemented steps of:
-
receiving a bundled file including a case study file and a hash key from a computing device over an internet connection, where the case study file includes a number of images; validating the integrity of the case study file using the hash key; noting the number of images included in the case study file and grouping the number of images according to type of image; generating an invoice indicating a case study file fee, and an image fee for the number of images. - View Dependent Claims (47, 48, 49, 50, 51)
-
-
52. A method for selling an animal comprising the computer-implemented steps of:
-
receiving a bundled file including a case study file and a hash key from a computing device over an internet connection at a storage computing system, where the case study file includes a number of images; validating the integrity of the case study file using the hash key; receiving a request over the internet connection from a buyer computing device for access to the case study file stored on the storage computing system; verify authorization for the request to access the case study file; access the case study file upon verification of authorization; execute to compress the bundled file; execute to encrypt the bundled file in its entirety; and send the encrypted bundled file through the internet connection to the buyer computing device. - View Dependent Claims (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 53, 54)
-
-
53-1. The method of claim 52, where the internet connection is unsecured.
Specification