Method and apparatus for feature configuration in remotely located ultrasound imaging system
First Claim
1. A method for configuring a system at a remote location, comprising the steps of:
- storing a validation identifier inside said system;
transmitting an option identifier which identifies a change in system configuration and an expiration date associated with said change in system configuration from said remote location to a central location;
encrypting said validation identifier, said option identifier and said expiration date at said central location;
transmitting an encrypted feature key comprising a sequence of characters from said central location to said remote location, said encrypted feature key comprising said encrypted validation identifier, said encrypted option identifier and said encrypted expiration dates;
placing said system in a feature key entry mode;
inputting said encrypted feature key into said system by operation of a sequence of input keys corresponding to said sequence of characters of said encrypted feature key;
decrypting said encrypted feature key inside said system to form decrypted data comprising a decrypted validation identifier, a decrypted option identifier and a decrypted expiration date;
comparing said decrypted validation identifier with said stored validation identifier; and
altering a system configuration database inside said system to reflect said change in system configuration only if said decrypted validation identifier matches said stored validation identifier, wherein said altering step further comprises storing said decrypted expiration date in said system configuration database.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for configuring an ultrasound imaging system at a remote location by obtaining an encrypted feature key from a central location (e.g., via telephone) and then inputting that feature key into the ultrasound imaging system using an operator interface (e.g., a keyboard). To validate the feature key, the ultrasound imaging system decrypts the encrypted data and then compares the decrypted data to validation data pre-stored in the system. If the decrypted data matches the validation data, then the optional feature identified by the feature key will be enabled each time the system is booted or initialized. Optionally, an expiration date can be associated with the activated option, after which date the feature will be disabled when the system is initialized. Similarly, an activated optional feature can be disabled at a remote location by the input of an encrypted key obtained from a central location.
56 Citations
18 Claims
-
1. A method for configuring a system at a remote location, comprising the steps of:
-
storing a validation identifier inside said system;
transmitting an option identifier which identifies a change in system configuration and an expiration date associated with said change in system configuration from said remote location to a central location;
encrypting said validation identifier, said option identifier and said expiration date at said central location;
transmitting an encrypted feature key comprising a sequence of characters from said central location to said remote location, said encrypted feature key comprising said encrypted validation identifier, said encrypted option identifier and said encrypted expiration dates;
placing said system in a feature key entry mode;
inputting said encrypted feature key into said system by operation of a sequence of input keys corresponding to said sequence of characters of said encrypted feature key;
decrypting said encrypted feature key inside said system to form decrypted data comprising a decrypted validation identifier, a decrypted option identifier and a decrypted expiration date;
comparing said decrypted validation identifier with said stored validation identifier; and
altering a system configuration database inside said system to reflect said change in system configuration only if said decrypted validation identifier matches said stored validation identifier, wherein said altering step further comprises storing said decrypted expiration date in said system configuration database. - View Dependent Claims (4, 5)
-
-
2. A method for configuring a system at a remote location, comprising the steps of:
-
storing a validation identifier inside said system;
transmitting an option identifier which identifies a change in system configuration from said remote location to a central location;
constructing a non-singular encryption matrix at said central location;
encrypting said validation identifier and said option identifier at said central location, said encrypting step being carried out by applying said non-singular encryption matrix to said validation identifier and said option identifier;
transmitting an encrypted feature key comprising a sequence of characters from said central location to said remote location, said encrypted feature key comprising said encrypted validation identifier and said encrypted option identifier;
placing said system in a feature key entry mode;
inputting said encrypted feature key into said system by operation of a sequence of input keys corresponding to said sequence of characters of said encrypted feature key;
constructing a decryption matrix which is an inversion of said non-singular encryption matrix at said remote location;
decrypting said encrypted feature key inside said system to form decrypted data comprising a decrypted validation identifier and a decrypted option identifier, said decrypting step being carried out by applying said decryption matrix to vectors formed from said encrypted feature key;
comparing said decrypted validation identifier with said stored validation identifier; and
altering a system configuration database inside said system to reflect said change in system configuration only if said decrypted validation identifier matches said stored validation identifier.
-
-
3. A method for configuring a system at a remote location, comprising the steps of:
-
storing a validation identifier inside said system;
transmitting an option identifier which identifies a change in system configuration from said remote location to a central location;
encrypting said validation identifier and said option identifier at said central location;
transmitting an encrypted feature key comprising a sequence of characters from said central location to said remote location, said encrypted feature key comprising said encrypted validation identifier and said encrypted option identifier;
placing said system in a feature key entry mode;
inputting said encrypted feature key into said system by operation of a sequence of input keys corresponding to said sequence of characters of said encrypted feature key;
decrypting said encrypted feature key inside said system to form decrypted data comprising a decrypted validation identifier and a decrypted option identifier;
comparing said decrypted validation identifier with said stored validation identifier; and
altering a system configuration database inside said system to reflect said change in system configuration only if said decrypted validation identifier matches said stored validation identifier, wherein said validation identifier comprises a system identifier which uniquely identifies said system. - View Dependent Claims (6)
-
-
7. A method for configuring an ultrasound imaging system, comprising the steps of:
-
storing a validation identifier inside said system;
placing said system in a feature key entry mode;
inputting an encrypted feature key into said system by operation of a sequence of input keys corresponding to a sequence of characters, said encrypted feature key comprising an encrypted validation identifier, an encrypted option identifier and an encrypted expiration date;
decrypting said encrypted feature key inside said system to form decrypted data comprising a decrypted validation identifier, a decrypted option identifier and a decrypted expiration date;
comparing said decrypted validation identifier with said stored validation identifier; and
altering a system configuration database inside said system to reflect a change in system configuration identified by said decrypted option identifier only if said decrypted validation identifier matches said stored validation identifier, said altering step further comprises storing said decrypted expiration date in said system configuration database.
-
-
8. A method for configuring a system, comprising the steps of:
-
storing a validation identifier inside said system;
placing said system in a feature key entry mode;
inputting an encrypted feature key into said system by operation of a sequence of input keys corresponding to a sequence of characters, said encrypted feature key comprising an encrypted validation identifier and an encrypted option identifier;
constructing a decryption matrix inside said system from decryption matrix precursor data;
decrypting said encrypted feature key inside said system to form decrypted data comprising a decrypted validation identifier and a decrypted option identifier, wherein said decrypting step is carried out by applying said decryption matrix to vectors formed from said encrypted feature key;
comparing said decrypted validation identifier with said stored validation identifier; and
altering a system configuration database inside said system to reflect a change in system configuration identified by said decrypted option identifier only if said decrypted validation identifier matches said stored validation identifier. - View Dependent Claims (10, 11)
-
-
9. A method for configuring a system, comprising the steps of:
-
storing a validation identifier inside said system;
placing said system in a feature key entry mode;
inputting an encrypted feature key into said system by operation of a sequence of input keys corresponding to a sequence of characters, said encrypted feature key comprising an encrypted validation identifier and an encrypted option identifier;
decrypting said encrypted feature key inside said system to form decrypted data comprising a decrypted validation identifier and a decrypted option identifier;
comparing said decrypted validation identifier with said stored validation identifier; and
altering a system configuration database inside said system to reflect a change in system configuration identified by said decrypted option identifier only if said decrypted validation identifier matches said stored validation identifier, wherein said validation identifier comprises a system identifier which uniquely identifies said system. - View Dependent Claims (12)
-
-
13. An ultrasound imaging system comprising:
-
an ultrasound transmitter for transmitting ultrasound energy into a volume of ultrasound scatterers;
a signal processing chain for acquiring display data representing an image of ultrasound scatterers in said volume in accordance with a system configuration comprising enabled features, said display data being based on ultrasound energy scattered by said ultrasound scatterers;
a monitor for displaying said image in response to receipt of said display data;
a memory for storing a system configuration database representing said enabled features of said system configuration;
an operator interface comprising a plurality of keys for inputting data into said system;
means for placing said system in a feature key entry mode in response to a predetermined command input via said operator interface;
decrypting means for outputting decrypted data in response to depression of a sequence of keys of said operator representing an encrypted feature key comprising an encrypted validation identifier and an encrypted option identifier an encrypted expiration date, said decrypted data comprising a decrypted validation identifier, a decrypted option identifier and a decrypted expiration date;
validating means for determining if said decrypted validation identifier is valid; and
means for altering said system configuration as a function of said decrypted option identifier only if said decrypted validation identifier is valid, wherein said altering means further comprises means for storing said decrypted expiration date in said system configuration database.
-
-
14. An ultrasound imaging system comprising:
-
an ultrasound transmitter for transmitting ultra-sound energy into a volume of ultrasound scatterers;
a signal processing chain for acquiring display data representing an image of ultrasound scatterers in said volume in accordance with a system configuration comprising enabled features, said display data being based on ultrasound energy scattered by said ultrasound scatterers;
a monitor for displaying said image in response to receipt of said display data;
a memory for storing a system configuration data-base representing said enabled features of said system configuration;
an operator interface comprising a plurality of keys for inputting data into said system;
means for placing said system in a feature key entry mode in response to a predetermined command input via said operator interface;
decrypting means for outputting decrypted data in response to depression of a sequence of keys of said operator representing an encrypted feature key comprising an encrypted validation identifier and an encrypted option identifier, said decrypted data comprising a decrypted validation identifier and a decrypted option identifier;
validating means for determining if said decrypted validation identifier is valid; and
means for altering said system configuration as a function of said decrypted option identifier only if said decrypted validation identifier is valid, wherein said validation identifier comprises a system identifier which uniquely identifies said ultrasound imaging system. - View Dependent Claims (15, 16, 17, 18)
-
Specification