Devices, methods, and systems for sending and receiving case study files
First Claim
Patent Images
1. A computing device, comprising:
- a processor;
a memory coupled to the processor, the memory having executable instructions stored thereon that are executable by the processor to;
create a case study file that includes an image file from an imaging modality;
execute a hash algorithm on the image file of the case study file to produce a hash key placed in the case study file to produce a bundled file;
execute to compress the bundled file;
execute to encrypt the bundled file in its entirety;
make an outbound request to move the encrypted bundled file through an internet connection to a storage computing system in communication with the computing device over the internet connection;
indicate to an approved computing device the existence of the case study file and flag the approved computing device in a list of a number of computing devices stored in the storage computing system; and
receive a query from the number of computing devices to determine whether at least one of the number of computing devices has been flagged as an approved computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure includes devices, methods, and systems for creating a case study file that includes an image file from an imaging modality, executing a hash algorithm on the case study file to produce a hash key, compressing the case study file, bundling the hash key with the compressed file, encrypting the bundled file, and moving the encrypted bundled file through an Internet connection to a storage computing system, among other embodiments.
-
Citations
40 Claims
-
1. A computing device, comprising:
-
a processor; a memory coupled to the processor, the memory having executable instructions stored thereon that are executable by the processor to; create a case study file that includes an image file from an imaging modality; execute a hash algorithm on the image file of the case study file to produce a hash key placed in the case study file to produce a bundled file; execute to compress the bundled file; execute to encrypt the bundled file in its entirety; make an outbound request to move the encrypted bundled file through an internet connection to a storage computing system in communication with the computing device over the internet connection; indicate to an approved computing device the existence of the case study file and flag the approved computing device in a list of a number of computing devices stored in the storage computing system; and receive a query from the number of computing devices to determine whether at least one of the number of computing devices has been flagged as an approved computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A storage computing system, comprising:
-
a processor; a memory coupled to the processor, the memory having executable instructions stored thereon that are executable by the processor to; receive a bundled file from a computing device over an internet connection, where the bundled file is in a compressed and an encrypted form; decrypt the bundled file; decompress the bundled file to provide a case study file and a hash key to the case study file; validate the integrity of the case study file using the hash key; index the case study file in the storage computing system upon validation of the case study file; receive updates to the case study file from the computing device; save the bundled file including the case study file, the hash key, and updates to the case study file to a computing device readable medium after a predetermined time interval; and send the computing device readable medium to a clinic. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A system, comprising:
a storage computing system and a number of computing devices, where the storage computing system and the number of computing devices include; a processor; a memory coupled to the processor, the memory having executable instructions stored thereon that are executable by the processor to; receive a bundled file from a first computing device over an internet connection, where the bundled file is in a compressed and an encrypted form; decrypt and decompress the bundled file to provide a case study file and a hash key to the case study file; validate the integrity of the case study file using the hash key; index the case study file in the storage computing system upon validation of the case study file; indicate to an approved computing device the existence of the case study file and flag the approved computing device in a list of the number of computing devices stored in the storage computing system; receive a query from the number of computing devices to determine whether at least one of the number of computing devices has been flagged as an approved computing device; receive a request over the internet connection from at least one of the first computing device or a second computing device for access to the case study file stored on the storage computing system; verify that at least one of the first computing device or the second computing device is the approved computing device; execute to recompress and re-encrypt the bundled file in its entirety; and send the re-encrypted bundled file through the internet connection to the approved computing device over the internet connection. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
32. A method, comprising:
-
creating a case study file, including an image file from an imaging modality on a computing device; executing a hash algorithm on the image file of the case study file to produce a hash key; producing a bundled file including the case study file and the hash key; compressing the bundled file; encrypting the bundled file in its entirety; sending the encrypted bundled file through an internet connection to a storage computing system in communication with the computing device; receiving updates to the case study file from the computing device; saving the bundled file including the case study file, the hash key, and updates to the case study file to a computing device readable medium after a predetermined time interval; and sending the computing device readable medium to a clinic. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39)
-
-
40. A method of case study file management, comprising:
-
receiving a bundled file from a computing device over an internet connection, where the bundled file includes a case study file and a hash key in a compressed and encrypted form; decrypting the bundled file and validating the integrity of the case study file using the hash key; indexing the case study file in a storage computing system upon validation of the case study file; receiving updates to the case study file from the computing device; saving the bundled file including the case study file, the hash key, and updates to the case study file to a computing device readable medium after a predetermined time interval; and sending the computing device readable medium to a clinic.
-
Specification