LAYERING IN USER AUTHENTICATION
First Claim
1. A system comprising:
- a processing device to run a medical cart;
computer-readable memory storing data and instructions for access to a medical database server, wherein the instructions are executable by the processing device to perform biometric recognition on medical staff members;
wherein the processing device is to execute the instructions to;
authenticate an identity of a medical staff member with biometric recognition;
receive a location of the medical staff member from a real-time location system (RTLS);
correlate the location of the medical staff member with a location of a patient; and
grant access to data records of the patient on the medical database server according to a security access level authorized the medical staff member, as authenticated, in response to co-location of the medical staff member and the patient.
3 Assignments
0 Petitions
Accused Products
Abstract
An asset is disclosed having a processing device and hardware with which to capture a biometric. The asset, with optional input from a remote server, may authenticate an identity of a medical staff member (MSM) with biometric recognition (and/or with other second factor authentication) upon the MSM attempting to access a medical database via the asset. The asset may receive a first location of the MSM from a real-time location system (RTLS) and retrieve a second location of a patient from the RTLS. The asset may further correlate the first location and the second location as being co-located, and thus grant the MSM access to identified data records of the patient within the medical database according to a security access level authorized the MSM. The correlation may include a location of the asset, which correlates to the location of the MSM before access is granted.
92 Citations
21 Claims
-
1. A system comprising:
-
a processing device to run a medical cart; computer-readable memory storing data and instructions for access to a medical database server, wherein the instructions are executable by the processing device to perform biometric recognition on medical staff members; wherein the processing device is to execute the instructions to; authenticate an identity of a medical staff member with biometric recognition; receive a location of the medical staff member from a real-time location system (RTLS); correlate the location of the medical staff member with a location of a patient; and grant access to data records of the patient on the medical database server according to a security access level authorized the medical staff member, as authenticated, in response to co-location of the medical staff member and the patient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
authenticating, by a processing device incorporated within an asset, an identity of a medical staff member with biometric recognition upon the medical staff member attempting to access a medical database via the asset; receiving a first location of the medical staff member from a real-time location system; retrieving a second location of a patient from the real-time location system; correlating, using the processing device, the first location and the second location as being co-located; and granting the medical staff member memory access, by the processing device, to identified data records of the patient within the medical database according to a security access level authorized the medical staff member. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A processing device to execute instructions stored in non-transitory computer readable storage medium to:
-
validate credentials received from a user through an asset to provide access to an authentication system used to authenticate access to a medical database comprising medical information; authenticate an identity of the user through a first type of user authentication; determine a level of accuracy of the first type of user authentication; perform additional authentication of the identity of the user through at least a second type of user authentication until an accuracy level of a combination of the first type and the at least the second type of user authentication exceeds a predetermined threshold level of accuracy; and grant a level of access to records of the medical database according to a security access level associated with the user responsive to reaching the predetermined threshold level of accuracy of user authentication. - View Dependent Claims (18, 19, 20, 21)
-
Specification