Secure access to healthcare information
First Claim
1. A computer system for providing secure access to medical information, the system comprising:
- a CPU, a computer readable memory, and a computer readable storage media;
program instructions to activate one or more RFID tags;
program instructions to record one or more locations of the one or more RFID tags when each of the one or more RFID tags enters or exits a respective location of the one or more locations;
program instructions to provide a user access to one or more items when there is a matching between an RFID tag of the user and one or more RFID tags associated with the one or more items, and all security policies associated with the user and the one or more items are met,wherein the security polices include a predetermined authorized location, a predetermined authorized time, and a predetermined authorized stage within a sequence, and wherein the matching comprises determining that the RFID tag of the user and the one or more RFID tags of the one or more items are recorded at the predetermined authorized location at the predetermined authorized time, within the predetermined authorized stage; and
program instructions to manage the one or more items, including at least one of the group consisting of;
encrypting all digital media representative of the one or more items;
checking with a Security Manager if the user may access the one or more items;
recording all users that requested any of the one or more items and what items of the one or more items was requested;
destroying any of the one or more items per security policies; and
sending alerts when the security policies have been violated,wherein the program instructions are stored on the computer readable storage medium for execution by the CPU via the computer readable memory.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing or exchanging healthcare information (e.g., medical information) to authorized users in a secure manner. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to: assign identification information to a plurality of users and a plurality of items; associate the identification information of a user of the plurality of users with one or more items of the plurality of items; set-up security policies including predetermined locations, within predetermined stages within a sequence and during predetermined times; and provide the user access to the one or more items when there is a matching between the identification information of the user and the one or more items, and all of the security policies associated with the user and the one or more of the plurality of items are met.
26 Citations
17 Claims
-
1. A computer system for providing secure access to medical information, the system comprising:
-
a CPU, a computer readable memory, and a computer readable storage media; program instructions to activate one or more RFID tags; program instructions to record one or more locations of the one or more RFID tags when each of the one or more RFID tags enters or exits a respective location of the one or more locations; program instructions to provide a user access to one or more items when there is a matching between an RFID tag of the user and one or more RFID tags associated with the one or more items, and all security policies associated with the user and the one or more items are met, wherein the security polices include a predetermined authorized location, a predetermined authorized time, and a predetermined authorized stage within a sequence, and wherein the matching comprises determining that the RFID tag of the user and the one or more RFID tags of the one or more items are recorded at the predetermined authorized location at the predetermined authorized time, within the predetermined authorized stage; and program instructions to manage the one or more items, including at least one of the group consisting of; encrypting all digital media representative of the one or more items; checking with a Security Manager if the user may access the one or more items; recording all users that requested any of the one or more items and what items of the one or more items was requested; destroying any of the one or more items per security policies; and sending alerts when the security policies have been violated, wherein the program instructions are stored on the computer readable storage medium for execution by the CPU via the computer readable memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product comprising a computer usable storage device having readable program code embodied in the storage device, the computer program product includes at least one component operable to:
-
activate one or more RFID tags; record one or more locations of the one or more RFID tags when each of the one or more RFID tags enters or exits a respective location of the one or more locations; determine whether the one or more RFID tags is a duplicate; provide a user access to one or more items when the one or more RFID tags has no duplicate and there is a match between an RFID tag of a user and one or more RFID tags of the one or more items, and all of the security policies associated with the user and the one or more items are met, wherein the match comprises determining that the RFID tag of the user and the one or more RFID tags of the one or more items are recorded at a predetermined location at a predetermined time within a predetermined stage within a sequence of different predetermined locations at predetermined times included in the security policies; and manage the one or more items, including at least one of the group consisting of; encrypting all digital media representative of the one or more items; checking with a Security Manager if the user may access the one or more items; recording all users that requested any of the one or more items and what items of the one or more items was requested; destroying any of the one or more items per security policies; and sending alerts when the security policies have been violated. - View Dependent Claims (13, 14)
-
-
15. A computer system for providing secure access to medical information, the system comprising:
-
a CPU, a computer readable memory, and a computer readable storage media; program instructions to activate one or more RFID tags; program instructions to record one or more locations of the one or more RFID tags when each of the one or more RFID tags enters or exits a respective location of the one or more locations; program instructions to provide a user access to one or more items when there is a matching between an RFID tag of the user and one or more RFID tags associated with the one or more items, and all security policies associated with the user and the one or more items are met, wherein the security polices include a predetermined authorized location, a predetermined authorized time, and a predetermined authorized stage within a sequence, and wherein the matching comprises determining that the RFID tag of the user and the one or more RFID tags of the one or more items are recorded at the predetermined authorized location at the predetermined authorized time, within the predetermined authorized stage; and a sequence manager configured to set the sequence of different predetermined locations at predetermined times included in the security policies, wherein the locations relate to pre-operative and post-operative locations within a medical facility, and wherein the program instructions are stored on the computer readable storage medium for execution by the CPU via the computer readable memory. - View Dependent Claims (16)
-
-
17. A computer program product comprising a computer usable storage device having readable program code embodied in the storage device, the computer program product includes at least one component operable to:
-
activate one or more RFID tags; record one or more locations of the one or more RFID tags when each of the one or more RFID tags enters or exits a respective location of the one or more locations; determine whether the one or more RFID tags is a duplicate; provide a user access to one or more items when the one or more RFID tags has no duplicate and there is a match between an RFID tag of a user and one or more RFID tags of the one or more items, and all of the security policies associated with the user and the one or more items are met, wherein the match comprises determining that the RFID tag of the user and the one or more RFID tags of the one or more items are recorded at a predetermined location at a predetermined time within a predetermined stage within a sequence of different predetermined locations at predetermined times included in the security policies; and set the sequence of different predetermined locations at predetermined times included in the security policies, wherein the locations relate to pre-operative and post-operative locations within a medical facility.
-
Specification