Information record infrastructure, system and method
DCFirst Claim
1. A method, comprising the steps of:
- storing a plurality of digital records and respective access rules for each digital record in a computer memory associated with a server system;
receiving a request for access, from a remote computer, to access a digital record stored in the computer memory;
validating, by the server system, the received request to access the digital record by applying a respective set of access rules for the digital record stored in the computer memory;
retrieving, by the server system, a public key having an associated private key, and associating a logging wrapper having a respective session key with the digital record, after validating the received request, wherein the session key is distinct from the public key and the private key;
encrypting and sending, by the server system, the requested digital record which has been validated, using the public key and the session key to encrypt the digital record;
receiving and decrypting the encrypted digital record, by the remote computer, using the private key, and the session key in conjunction with the logging wrapper;
generating by the logging wrapper, at the remote computer, a logging event; and
recording the logging event in an access log.
6 Assignments
Litigations
0 Petitions

Accused Products

Abstract
A method of maintaining electronic medical records, comprising the steps of receiving a medical transaction record, encrypted with an encryption key relating to a patient association of the file, accessing the encrypted medical transaction record according to a patient association; and further encrypting the encrypted accessed medical transaction record with an encryption key associated with an intended recipient of the medical record. The system and method according to the present invention presents a new business model for the creation, maintenance, transmission, and use of medical records, allowing financial burdens to be reallocated, for example more optimally or equitably, to decrease overall societal cost, or simply to provide a successful business model for a database proprietor. Secure entrusted medical records are held in trust by an independent third party on behalf of the patient, serving the medical community at large. Separately encrypted record elements may be aggregated as an information polymer.
1052 Citations
143 Claims
-
1. A method, comprising the steps of:
-
storing a plurality of digital records and respective access rules for each digital record in a computer memory associated with a server system; receiving a request for access, from a remote computer, to access a digital record stored in the computer memory; validating, by the server system, the received request to access the digital record by applying a respective set of access rules for the digital record stored in the computer memory; retrieving, by the server system, a public key having an associated private key, and associating a logging wrapper having a respective session key with the digital record, after validating the received request, wherein the session key is distinct from the public key and the private key; encrypting and sending, by the server system, the requested digital record which has been validated, using the public key and the session key to encrypt the digital record; receiving and decrypting the encrypted digital record, by the remote computer, using the private key, and the session key in conjunction with the logging wrapper; generating by the logging wrapper, at the remote computer, a logging event; and recording the logging event in an access log. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77)
-
-
78. A database system, comprising a plurality of digital records, each digital record having an associated set of access rules, stored in a computer memory associated with a server system;
-
an interface computer in communication with a remote computer, receiving a request for access from the remote computer to access a digital record stored in the computer memory; an automated processor. associated with the server system, validating the received request to access the digital record by applying a respective set of access rules for the digital record stored in the computer memory; retrieving a public key having an associated private key, and associating a logging wrapper having a respective session key with the digital record, after validating the received request, wherein the session key is distinct from the public key and the private key; encrypting and sending the requested digital record which has been validated, using the public key and the session key to encrypt the digital record, through the interface computer; receiving, through the interface computer, a logging event from the remote computer based on an operation of the wrapper and at least the session key; and recording the logging event in an access log. - View Dependent Claims (79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132)
-
-
133. A method, comprising the steps of:
-
storing a plurality of digital records and respective access rules for each digital record in a computer memory associated with a server system; receiving a request for access, from a remote computer, to access a digital record stored in the computer memory; validating, by the server system, the received request to access the digital record by applying a respective set of access rules for the digital record stored in the computer memory; retrieving, by the server system, a public key having an associated private key, and associating a wrapper having a respective session key with the digital record, wherein the session key is distinct from the public key and the private key; encrypting and sending, by the server system, the requested digital record after validating the received request, using the public key and the session key to encrypt the digital record; receiving the encrypted digital record, by the remote computer, and decrypting the encrypted digital record using the private key and the session key in conjunction with the wrapper; generating by the wrapper, at the remote computer, a logging event; and accounting, at the server, for the decrypting by the remote computer using the wrapper. - View Dependent Claims (134, 135, 136, 137, 138, 139)
-
-
140. A database system, comprising:
-
at least one retrieval computer retrieving a plurality of digital records and having at least one access log, each digital record having an associated set of access rules; at least one communications interface computer in communication with a remote computer, communicating a request for access, from the remote computer, to access a digital record stored in the at least one retrieval computer; and at least one processor for; selectively controlling the at least one retrieval computer to retrieve a record in dependence on a compliance with a respective set of access rules; validating the received request to access the digital record by applying a respective set of access rules for the digital record stored in the at least one retrieval computer; retrieving a public key having an associated private key, and associating a wrapper having a respective session key with the digital record, after validating the received request, wherein the session key is distinct from the public key and the private key; encrypting and sending the requested digital record which has been validated, using the public key and the session key to encryp the digital record, through the at least one communications interface computer; receiving, through the at least one communications interface computer, a logging event from the remote computer based on an operation of the wrapper and at least the session key; and recording the logging event in an access log. - View Dependent Claims (141)
-
-
142. A method, comprising the steps of:
-
storing a set of access rules in a database stored in a first computer memory; defining a plurality of sets of information content stored in a second computer memory at a server system, the sets of information content being subject to associated access rules stored in the database; transmitting information defining the associated access rules for the respective plurality of sets of information content from the first computer memory to a database control system at the server system; automatically, under control of the database control system at the server system, analyzing the associated access rules with respect to the respective information content, and implementing the transmitted associated access rules dependent on a context of attempted access of the respective information content, to thereby validate a request for access; retrieving, by the server system, a public key having an associated private key, and associating a wrapper having a respective session key with the respective information content, wherein the session key is distinct from the public key and the private key; encrypting, by the server system, the requested respective information content using the public key and the session key to encrypt the digital record, and associating the respective information content in an encrypted form with a wrapper; communicating the respective information in an encrypted form and the wrapper, after validating the respective request for access, an access to a decrypted form of the information content at a remote computer being dependent on at least the wrapper, the session key and the private key; communicating an event from the remote computer to the server system, by the wrapper; and accounting for access to the information content and a respective context in an access log at the server system. - View Dependent Claims (143)
-
Specification