The invention relates to a method of retrieving medical data from a server.
The invention further relates to a system for retrieving medical data from a server.
The invention further relates to a server for use in such a system.
The invention further relates to a client for use in such a system.
The invention further relates to a medical workstation comprising such a client.
The invention further relates to a medical information management system comprising such a system.
The invention further relates to a digital rights management service for use in such a method or system.
Nowadays, a lot of medical data such as medical images and patient data, such as name, gender, allergies etc. are stored digitally in a database on a dedicated server. An example that relates to medical images is a Picture Archiving and Communications System (PACS) that organizes amongst others a central storage of the images in a database on a dedicated server. The medical images are sent from an image acquisition system to the server and the medical images can be viewed for reviewing by retrieving them from the server and showing them on a workstation. Such architecture is generally referred to as client-server architecture.
Another example of such a medical information management system is a Hospital Information System (HIS) that organizes administrative patient data, such as billing, the laboratory exams etc. or a Radiology Information System (RIS) that organizes for example the scheduling of the patients on the acquisition stations.
The medical data is subject to rules of privacy and security because of the inherent personal nature of the data, which is usually regulated by the national government, e.g. the Health Insurance Portability and Accountability Act (HIPAA) in the United States. Such rules of security may include for example that only certain persons may have access to the patient data and that the patient data may not be changed.
The security rules are implemented, i.e. enforced, at different places where the data may reside, for example when the data is stored in the database, when it is viewed at the workstation or when it is transferred to and from the server over a network, such as a Local Area Network (LAN) or Wide Access Network (WAN) using the Internet. Usually, within the boundaries of a hospital a private network, such as Intranet, is used to secure that there's no unauthorized access to the network, and thereby the data, from outside the boundaries of the hospital.
With the introduction of wireless networks, the network becomes more and more open to the public. Further hospitals and physicians have a desire to exchange the medical data from a patient over the Internet, so there's the need for access to private medical data over the public Internet. A typical example are emergency cases where ambulance or first aid personnel needs access to data while being outside the physical premises, outside the private network or even outside the organizational structure that manages the required data.
An example of a method of retrieving medical data from a server is disclosed in U.S. Pat. No. 6,876,985 that enables a hospital or other organization to store patient data in a public place while maintaining the confidentiality thereof. The disclosed patient information management method comprises a storage management device wherein patient information is encrypted so that it can be decrypted when both patient Identification (ID) information and a password decided by a patient are used. The encrypted patient information is stored in a storage device. The storage management device issues a use request to the storage device to receive encrypted patient information, and used patient ID information and a password to decrypt it for use.
Such protection of the digital data, here digital medical data, is generally referred to as Digital Rights Management (DRM). With DRM one can for example protect the number of copies that are allowed of the digital data, control the users that have access to the digital data, control how users use data and control changes to the digital data. These policies are managed and described using licenses. These licenses contain a rights expression expressing the policy and accompany the encrypted content. After evaluation of the rights expression the related encryption key is used to decrypt the data. Hereto, the DRM must be implemented on the client to protect the copied content of the server, to securely evaluate the rights expression, to decrypt the content and to deliver the content to a trusted rendering application. A client that implements the DRM is certified to use the content of the server according to the rules enforced by the DRM. A client that does not implement the DRM is uncertified for such use. A trusted rendering application is an application that uses the content and is either part of the DRM or is known to the DRM. DRM control affects also the use of the content on the client in addition to traditional access control systems that for example require user authentication and verification but then give out the data without subsequent protection. The use of DRM on the client makes the client certified for the specific server, which therefore agrees to release data to such client. For an example of a DRM system, see S. Guth, A Sample DRM System, Digital Rights Management: Technological, Economic, Legal and Political Aspects, LNCS2770, Springer-Verlag, 2003. or see Open Mobile Alliance, DRM Architecture: Draft Version 2.0, 20-8-2004.
As a consequence the different devices, i.e. clients, that are used in or outside the hospital and that require access to the medical data stored on the server must implement the DRM of the server. However, different medical data servers may require different DRM being implemented on the client limiting the usability of the client. For example a portable heart monitor device that requests patient data such as age from a server may not be able to retrieve that information because it does not implement the required DRM. This problem is especially relevant in cases of a combination of third party care providers using different systems in emergency cases where time and accessibility to information is critical.
It is an object of the invention to provide a method of retrieving medical data from a server that improves the usability of a client. To achieve this object, the invention provides a method of retrieving medical data from a server according to the opening paragraph, the method comprising: requesting the medical data from the server by an uncertified client; installing a certified digital rights management service on the uncertified client; managing the requested medical data according to the installed certified digital rights management service thereby retrieving the medical data from the server. By installing a certified digital rights management service on an uncertified client when this client requests medical data from the server, the uncertified client does not need to know what kind of digital rights management is required by the server. Consequently, the client can be used for multiple servers each of the servers having its own digital rights management for the medical data. Thus the server provides a mechanism to enable the security and integrity of the medical data that is stored on the server according to the digital right management rules of the specific server. A further advantage of the DRM service is that trust and control stays in control of the server, since that party creates the DRM service and for example can control the robustness by obfuscation and other well-known techniques.
In an embodiment of the method according to the invention access to the medical data is restricted according to an access policy and the uncertified client is restricted to access the medical data according to a further access policy and the certified digital rights management service obtains a resulting policy based upon the access policy and the further access policy. Hereby, the privacy and security of the data is further controlled in a flexible way. Depending on the security, trust and robustness of both the client and DRM service the further access policy and thereby the resulting policy can be defined. This gives the advantage that the data can be used for the intended use, but not further, which increases privacy and security. A further advantage is that the further policy is added to the normal access policy for the data, and together accompany the data when delivered to the client, which has the advantage that up to the moment of use at the client device the policies are enforced. In an embodiment of the method according to the invention, the step of managing comprises limiting a usability period of the medical data by the uncertified client. Hereby, it is prevented that the medical data may be used on the client for an unlimited period.
In a further embodiment of the method according to the invention, the step of managing comprises limiting the retrieved amount of the requested medical data. Hereby, it is prevented that one client retrieves more medical data than allowed by the server. Furthermore, the privacy and security of the data is further controlled in a flexible way. Depending on the security, trust and robustness of the client, the DRM service, and the requesting authenticated user more or less data can be released. A further advantage is that this allows more contextual information to be taken into account for the decision to release data to a client. For example the system could deliver more data when a client or user is trusted, for example because it is recommended by an already trusted client or it has made correct requests in the past or the user is known.
In a further embodiment of the method according to the invention, the method further comprises logging the medical data request. Hereby, the requested medical data can be traced which may include tracing the client, the number of times data is requested, what data is requested, the time the medical data is requested etc.
In a further embodiment of the method according to the invention, the method further comprises authentication of a user before installing the certified digital rights management service or before delivering the data as part of the request. By requesting authentication, like for example by means of credit card verification, phone number, user identification, it can be controlled that a user operating the client is allowed to request the medical data. Furthermore, authentication, even when using weak forms, can increase the trust level, especially when used in determining the policy for the use and/or in determining the amount of data to be delivered. Some examples of weak forms of authentication are credit card numbers and email addresses. Using weak forms of authentication has a further advantage that no global trusted identity infrastructure is required, but that identity infrastructures of others can be used.
It is a further object of the invention to provide a system of retrieving medical data from a server that improves the usability of a client. To achieve this object, the invention provides a system of retrieving medical data from a server according to the opening paragraph, the system comprising: means for requesting the medical data from the server by an uncertified client; means for installing a certified digital rights management service on the uncertified client; means for managing the requested medical data according to the installed certified digital rights management service thereby retrieving the medical data from the server.
It is a further object of the invention to provide a server for use in a system of retrieving medical data from the server that improves the usability of a client. To achieve this object, the invention provides a server for use in a system according to the invention, the server comprising means for installing a certified digital rights management service on an uncertified client.
It is a further object of the invention to provide a client for use in a system of retrieving medical data from a server that improves the usability of the client. To achieve this object, the invention provides an uncertified client for use in a system according to the invention, the uncertified client comprising means for requesting the medical data from the server by the uncertified client.
It is a further object of the invention to provide a medical workstation of retrieving medical data from a server in that improves the usability of the medical workstation. To achieve this object, the invention provides a medical workstation comprising the uncertified client according to the invention. It is a further object of the invention to provide a medical information management system of retrieving medical data from a server that improves the usability of a client. To achieve this object, the invention provides a medical information management system comprising the system according to the invention.
The invention further provides a digital rights management service for use in a method or system according to the invention, the digital rights management service designed to be loaded by a computer arrangement comprising a processing unit and a memory, the digital rights management service, after being loaded, providing the processing unit with the capability to manage requests and responses from an uncertified client into request and responses for a server.
The same advantages are achieved for the system, the server, the client, the medical workstation, the medical information management system and the digital rights management service as described with reference to the method according to the invention.
These and other aspects of the invention will be apparent from and elucidated with reference to the embodiments described hereinafter as illustrated by the following Figures:
The client 206 comprises an Application Programming Interface (API) 208 that enables the client to establish a connection to a server, for example by implementing the Transmission Control Protocol (TCP) and sending requests according to the Hypertext Transfer Protocol (HTTP). Furthermore, the client offers an execution environment 210 for the DRM client. Examples for this include a virtual machine such as a Java virtual machine or Self-Protecting Digital Content (SPDC), see P Kocher, J Jaffe, B Jun, C Laren, N Lawson, Self-Protecting Digital Content, Cryptography Research Inc. White Paper, April, 2003, which offer the advantage that they are more or less platform independent. The client furthermore, comprises a component 212 that handles the download of DRM services, and enables execution thereof in the execution environment. The DRM service furthermore comprises an API that the client uses to request access to certain data, which typically involves license evaluation, data decryption, etc., by the DRM service. This component starts with downloading the DRM service, which it may do as part of the protocol itself by sending a request and getting the DRM service binary code as response, or it may do this outside the protocol by sending a download request using a standard web protocol such as HTTP to a location indicated by the server. The component stores the DRM service binary code in a writable memory, for example a harddisk, flash or Random Access Memory (RAM). Subsequently, it registers the DRM service binary code with the virtual machine, which results therein that the below-mentioned DRM service API is made available to programs running on the client and that need to use the DRM service. Finally the component calls the initialization method of the DRM client. The client exposes an API to the DRM service through the execution environment that the DRM service uses to communicate with the end-user, e.g. to display the data or to ask for input including authentication details, and other platform services such as network communication, storage, and for example a real-time clock.
The client, the server and the DRM may be implemented as computer readable code to be loaded by a computer arrangement comprising a processing unit and a memory, that, after being loaded, provide the processing unit with the capability to perform the method according to the invention.
The order in the described embodiments of the method of the current invention is not mandatory, a person skilled in the art may change the order of steps or perform steps concurrently using threading models, multi-processor systems or multiple processes without departing from the concept as intended by the current invention.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design many alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word “comprising” does not exclude the presence of elements or steps other than those listed in a claim. The word “a” or “an” preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the system claims enumerating several means, several of these means can be embodied by one and the same item of computer readable software or hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Number | Date | Country | Kind |
---|---|---|---|
06111197.7 | Mar 2006 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB07/50750 | 3/7/2007 | WO | 00 | 9/15/2008 |