SECURE ACCESS TO HEALTHCARE INFORMATION
First Claim
1. A method implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to:
- assign identification information to a plurality of users and a plurality of items;
associate the identification information of a user of the plurality of users with one or more items of the plurality of items;
set-up security policies including predetermined locations, within predetermined stages within a sequence and during predetermined times; and
provide the user access to the one or more items when there is a matching between the identification information of the user and the one or more items, and all of the security policies associated with the user and the one or more of the plurality of items are met.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for providing or exchanging healthcare information (e.g., medical information) to authorized users in a secure manner. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to: assign identification information to a plurality of users and a plurality of items; associate the identification information of a user of the plurality of users with one or more items of the plurality of items; set-up security policies including predetermined locations, within predetermined stages within a sequence and during predetermined times; and provide the user access to the one or more items when there is a matching between the identification information of the user and the one or more items, and all of the security policies associated with the user and the one or more of the plurality of items are met.
-
Citations
25 Claims
-
1. A method implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to:
-
assign identification information to a plurality of users and a plurality of items; associate the identification information of a user of the plurality of users with one or more items of the plurality of items; set-up security policies including predetermined locations, within predetermined stages within a sequence and during predetermined times; and provide the user access to the one or more items when there is a matching between the identification information of the user and the one or more items, and all of the security policies associated with the user and the one or more of the plurality of items are met. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
- 15. A system implemented in hardware, comprising a computing infrastructure operable to set up security polices in order to provide access to medical information to one or more requesting users, in compliance with the security policies, and authorizing or providing access to the medical information when all security policies are met including identification information of the one or more requesting users matches with identification of requested medical information, and the one or requesting users and the requested medical information are at a set location, during a set time period at a defined event in a sequence of events.
-
18. A computer program product comprising a computer usable storage medium having readable program code embodied in the storage medium, the computer program product includes at least one component operable to:
-
assign identification information to a plurality of users and a plurality of items; activate a radio frequency identification tag having the identification information; associate the activated radio frequency identification tag of at least one user of the plurality of users with one or more items of the plurality of items; set-up security policies to allow access to the one or more items of the plurality of items which include providing access only at predetermined locations, within a certain sequence and at predetermined times; provide the at least one user access to the one or more of the plurality of items when there is a match between the activated radio frequency identification tag of the at least one user and the identification information of the one or more of the plurality of items, and all of the security policies associated with the at least one user and the one or more of the plurality of items are met.
-
-
19. A computer system for providing secure access to medical information, the system comprising:
-
a CPU, a computer readable memory and a computer readable storage media; first program instructions to assign and manage radio frequency identification (RFID) information for one or more users and one or more items; second program instructions to manage the one or more items; third program instructions to set and maintain security policies comprising setting access permissions to the one or more items when the RFID information for one or more users match with the one or more items, and the matched one or more users and the one or more items are at predetermined locations, within predetermined stages within a sequence and during predetermined times in accordance with the security policies, wherein the first, second and third program instructions are stored on the computer readable storage media for execution by the CPU via the computer readable memory. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A method of deploying a system for securing medical information comprising:
providing a computer infrastructure, being operable to; assign identification information to a plurality of users and a plurality of items; set-up security policies including predetermined locations, within predetermined stages within a sequence and during predetermined times; and provide a user access to one or more of the plurality of items when there is a match between the identification information of the user and the one or more of the plurality of items, and all of the security policies associated with the user and the one or more of the plurality of items are met.
Specification