This disclosure relates to the management of healthcare information, and more particularly, to facilitating the management of an individual's healthcare information via the use of an alerting system.
Most health information exchanges today are focused on institution-to-institution transfer, and do not consider patient access to—or maintenance of—personal health data. Moreover, they must abide by strict patient privacy regulations under The Health Insurance Portability and Accountability Act (HIPAA), and none have a fully functional patient portal.
The Veteran's Administration originated the “Blue Button,” as a symbol on its patient portal that beneficiaries could click to securely download their own health record electronically. Since then, the Blue Button has spread beyond the VA to other government agencies and the private sector. Responsibility for encouraging broader use of Blue Button and enhancing its technical standards was transferred to the Office of the National Coordinator for Health Information Technology (ONC), part of the Department of Health and Human Services, in 2012.
Via the Blue Button Pledge Program, more than 450 organizations make personal health data available to Americans via their healthcare providers, health insurance companies, labs, and drug stores; building tools to make health information actionable for patients; and/or spreading the word about why all this matters.
As America's healthcare system rapidly goes digital, these organizations are starting to give patients and consumers access to their health records electronically through the “Blue Button” mechanism, which allows consumers to take action—download your own health information and use it!
Blue Button has also become a rallying cry for achieving the potential of patients and their families to engage via better health information and tools Blue Button and is becoming a movement.
Blue Button allows people to view and download their personal health information, and to share it with people they trust. With over 2 million users and a growing addressable market of over 100 million, over 400 companies have taken the “Blue Button pledge.” Thousands of software developers, clinicians, health plan administrators, and patient advocates are engaged with Blue Button. They participate in Blue Button hack-a-thons, run Blue Button conferences, and lead foundation efforts to promote consumer-centered access to care.
Methods and apparatuses or devices disclosed herein each have several aspects, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this disclosure, for example, as expressed by the claims which follow, its more prominent features will now be discussed briefly. After considering this discussion, and particularly after reading the section entitled “Detailed Description” one will understand how the features being described provide advantages that include data authentication services.
Drawings and the associated description herein are provided to illustrate specific embodiments of the invention and are not intended to be limiting.
Currently, health information is not easily shared between various entities in a health care system, and all too often cannot be accessed on a secure, timely basis. This creates a host of issues for all major stakeholders. For example, the value of a payor (such as an insurance company) network is limited by regulatory and security concerns which constrain digital communication across the networks, forcing a reliance on fax, paper and phone. Additionally, accessing out-of-network information by providers is time consuming. Consumers can not generally be relied upon to provide accurate information. Consumers also cannot easily access their health information or communicate with providers digitally, and worry about the privacy of their information through digital channels. Corporate customers face rising healthcare costs, and their health and wellness programs lack the data they need to be effective.
The next step in the rapid evolution of Blue Button patient-centered care will be the emergence of personal health data repositories, which can be physical, virtual, and federated, and allow patients to access their information and share it with their parents, their partners, their children, and their delegates. Via the methods and systems disclosed herein the following benefits may be achieved:
“One stop” aggregated access to health care information that is reliable, private, and secure allows patients to centralize their health information from a variety of disparate sources and formats, including commercial pharmacies, specialty care providers, diagnostic laboratories, and insurance company claims records. The consumer-mediated Blue Button model for patient exchange may dramatically improve continuity of care, lower unit delivery costs, and most importantly of all, reduce medical errors and improve systemic safety. As a result medical service providers may have ready access to comprehensive and complete patient-centered (and controlled) information, which will obviate the need for redundant tests, avoid drug-drug and drug-nutrient interactions, and provide an up-to-date and scientifically sound basis of evidence-based clinical decision support.
Advantages of the Blue Button model include improved efficiency and time management for employees by enabling access to medical data and analytics that leads to better quality of care. Blue Button also provides a technology platform to leverage identity management for personal digital services, beginning with patient-centered health information exchange. Blue Button establishes a digital platform that is transferrable and scalable to other sectors, and creates a secure repository for sensitive information storage and review. The system also provides for automation of paper-based processes with a digital solution.
A patient lacks choice in the system of
When the patient consults with any of the specialist, surgeon and/or general practitioner, they also grant permission for that provider to access their medical records within the patient controlled vault 308. The patient also has the ability, through another portal application (not shown) to access their health care information that is stored in the patient controlled vault 308.
With the health care network shown in
Additionally, with the system of
The system of
Some implementations of the system of
The apparatus 502a includes an electronic hardware processor 503, memory 504 operably connected to the processor 503, and a network interface 506 that is also operably connected to the processor 503. The memory stores instructions 508 that configure the processor to perform operations. The instructions may configure the processor 503 to perform one or more of the methods discussed here, such as one or more of methods 1600, 1700, 1800, and/or 1900 of
The user interface 600 includes a variety of indications. In particular, the user interface 600 indicates who “set up” the request 602. The request may be “set up” by, for example, an administrator at an office initiating the transfer request. The user interface 600 also includes an indication of who requested the transfer request 604. The requestor differs from the individual who “set up” the request in that the requestor may be an original initiator of the transfer request, while the individual who “set up” the request is responsible for the logistics of making the request occur. The user interface also includes a reason indication 606. The reason may be provided by the requester, in this case “Jackie Johnson.” The user interface 600 also includes an indication of the destination of the healthcare records 607, in other words, where the present transfer request will send the health care records. The user interface 600 also includes indications of network addresses 608a-b. The indications may include source (608a) and destination (608b) IP addresses as shown. The user interface 600 also includes a comments indication 610. The comments may be entered by either the individual who “set up” the transfer request, or by the individual who “requested” the transfer request. The user interface 600 also includes a prompt 612, in this case, asking a user reviewing the user interface 600 whether they grant permission for the transfer request to proceed.
In some aspects, the user interface 600 is displayed to a user with administrative privileges to the healthcare records of the individual. This could be the individual themselves, or someone who has been granted permission to administer the individual's health care information, such as a parent or guardian or other family member. The user interface 600 also includes buttons 614a-b, which allow the user viewing the user interface 600 to either grant (614b) or deny (614a) permission for the transfer request to proceed.
The user interface 650 includes several indications similar to that of user interface 600, described previously, including an indication of who “set up” the database access 652, who requested the database access 654, a reason indication 656, a destination for the information being obtained by the database access 658, source and destination IP addresses 660a-b. User interface also includes a prompt 662 and rejections and confirmation controls/buttons 664a-b. The database access authorization user interface 650 also includes an indication of a database IP address 666, and database service identifier indication 668.
The user interface 700 provides a reason indication 702, which indicates, in this example, the reason for the verification is that a password reset operation has been initiated. Other reasons are also contemplated. The user interface 700 also includes a facility indication, which shows that the password reset operation was initiated from a U.S. post office facility in this example. The user interface 700 also includes a requestor indication, which in the illustrated example indicates that the password reset was required via www.usps.com. The user interface 700 also includes an address indication 708, indicating the address of the facility shown in facility indication 704. The user interface 700 also includes a prompt 710, indicating that acknowledgment of the dialog/user interface 700 will allow the verification operation of the password reset to proceed. The user interface 700 also includes controls/buttons 712a-b, that allow the user to either deny the password reset operation (via control 712a) or allow the password reset to proceed (via control 712b).
The user interface 800 indicates a reason indication 802, which indicates the reason for the verification is that someone is attempting to have an identification issued based on identification records that are administered by the user receiving the user interface 800. The user interface 800 also includes a facility indication, which shows that issuance of the identification was initiated from a U.S. post office facility in this example. The user interface 800 also includes a requestor indication, which in the illustrated example indicates that the identification is being requested by an individual named “Dmitri Tkachev.” The user interface 800 also includes an address indication 808, indicating the address of the facility shown in facility indication 804. The user interface 800 also includes a prompt 810, indicating that acknowledgment of the dialog/user interface 800 will allow the issuance of the identification to proceed. The user interface 800 also includes controls/buttons 812a-b. These controls allow the user to either deny the identification issuance operation (via control 812a) or allow the identification issuance to proceed (via control 812b).
The user interface 900 of
The user interface 900 includes an indication 902 of who “set up” the wire transfer request. The individual “setting up” the transfer request may be an administrative individual at a financial institution initiating the wire transfer. The user interface 900 also includes a requested by indication 904, indicating an individual who originally requested the wire transfer. The user interface 900 also includes a reason indication 906, indicating the reason for the approval request. In the illustrated example, the reason indication 906 indicates that the user interface 900 is being presented to the user to solicit approval of the wire transfer request. The user interface 900 also includes an amount indication 908, which indicates an amount of the wire transfer request. The user interface 900 also includes a destination indication 910, in this example indicating the destination of the money subject to the wire transfer. The user interface 900 also includes a destination bank indication, in this case the bank of Antarctica. The user interface 900 also includes a destination account indication 914. The user interface 900 also includes a comments indication 916. In the illustrated example, the comments indicate that the wire transfer is ready to go, and all that is needed is the approval by the individual receiving the user interface 900. A prompt 918 prompts the user for their permission to proceed with the wire transfer, and controls 920a-b receive either a negative approval (via control 920a) or an approval (via control 920b).
The user interface 1000 includes an indication 1002 of who “set up” the corporate tax filing. The individual “setting up” the transfer request may be an administrative individual at a financial institution initiating the corporate tax filing. The user interface 1000 also includes a “reviewed by” indication 1004, indicating an individual who has reviewed the corporate tax filing. The user interface 1000 also includes an entity indication 1006, indicating an entity for which the corporate tax filing applies. In the illustrated example, the corporate tax filing is for sunshine, LLC. The user interface 1000 also includes a reason indication, which indicates the reason for the corporate tax filing confirmation dialog. In the illustrated example, the reason is the electronic filing of the corporate taxes. The user interface 1000 also includes a destination indication 1010, indicating in this example that the corporate taxes are destined for the Internal Revenue Service website “www.irs.gov.” The user interface 1000 also includes a transaction signature 1012. The user interface 1000 also includes a comments indication 1016, which may be entered by either the “setup by” individual or the “reviewed by” individual. A default message may also be provided. The user interface 1000 also includes a prompt 1018, asking the user whether permission is granted for the corporate tax filing to proceed. Controls 1020a-b provide negative acknowledgment (via control 1020a) and permission (via control 1020b) for the corporate tax filing to occur.
In some aspects, instructions 508 of device 502a, which is one of the one or more servers 502 of
The user interface 1100 includes a patient indicator 1102, in this case indicating the patient's name is “Dmitri Tkachev.” The user interface 1100 also includes a “requested by” indicator 1104. In the illustrated example, the alert provided by user interface 1100 was requested by an emergency room nurse. The user interface 1100 also includes a facility indicator 1108. In the illustrated example, the facility is the “Lenox Hill Hospital.” An address indicator 1116 indicates the location of the facility where the patent was accepted into the emergency room. A prompt 1118 asks the user viewing the user interface 1100 whether they would like to speak directly with the hospital indicated by the facility indicator 1108. The user can deny the request to speak to the hospital via control 1120a or accept the request to speak to the hospital via control 1120b. If the user selects control 1120b, and the user interface 1100 is being displayed on a computer that is able to control a phone system, such as a cell phone, desk phone, or even a virtual IP phone running on a personal computer or tablet, then selecting control 1120b may cause a telephone call to be placed to the hospital or facility indicated by facility indicator 1108.
In some aspects, instructions 508 of device 502a, which is one of the one or more servers 502 of
The user interface 1200 includes a patient indicator 1202, in this case indicating the patient's name is “Dmitri Tkachev.” The user interface 1200 also includes a “requested by” indicator 1204. In the illustrated example, the alert provided by user interface 1200 was requested by an emergency room nurse. The user interface 1200 also includes a facility indicator 1216. In the illustrated example, the facility is the “Lenox Hill Hospital.” The user interface 1200 also includes a reason indication 1218, indicating the reason for the healthcare records access request is that the patient is a minor. A prompt 1219 asks the user viewing the user interface 1200 whether they grant permission for the facility indicated by facility indicator 1216 to access the heath care records of the patient indicated by patient indicator 1202. The user can deny the request to access the healthcare records via control 1220a or accept the request to access the health care records via control 1220b.
In some aspects, instructions 508 of device 502a, which is one of the one or more servers 502 of
The user interface 1300 includes a patient indicator 1302, in this case indicating the patient's name is “Dmitri Tkachev.” The user interface 1300 also includes a symptoms indicator 1304. In the illustrated example, the symptoms are indicated to be an irregular heartbeat. The user interface 1300 also includes a vital signs indicator 1306. In the illustrated example, the vital signs being shown are the heart rate, at 113 beats per minute (BPM). In some aspects, other vital signs may be shown, such as a respiration rate, a body temperature, blood pressure, blood oxygen saturation, blood sugar level, and/or an indication of convulsive activity. The user interface 1300 also includes a device indication 1308. The device indication indicates a device generating the vital signs alert, in the illustrated example, the device is a bionic heart tracker. The user interface 1300 also include a location indication 1310, indicating the location where the patient was located when the vital signs alert was generated. A prompt 1313 asks the user seeing the user interface 1300 whether a family doctor should be called. The user can deny the request to call the family doctor via control 1320a or accept the request to call the family doctor via control 1320b. If the user selects control 1320b, and the user interface 1300 is being displayed on a computer that is able to control a phone system, such as a cell phone, desk phone, or even a virtual IP phone running on a personal computer or tablet, then selecting control 1320b may cause a telephone call to be placed to the hospital or facility associated with the family doctor.
In some aspects, instructions 508 of device 502a, which is one of the one or more servers 502 of
The user interface 1400 includes a patient indicator 1402, in this case indicating the patient's name is “Dmitri Tkachev.” The user interface 1400 also includes a medical procedure indicator 1404, indicating the type of medical procedure for which the request for authorization pertains. In the illustrated example, the procedure for which authorization is being requested is an appendicitis removal surgery. The user interface 1400 also includes a requested by indication 1406, in the illustrated example, the authorization request is being requested by the head of surgery. The user interface 1400 also includes a facility indication 1408. In the illustrated example, the facility is the “Lenox Hill Hospital.” The user interface 1400 also includes an address indicator 1410, indicating the address of the facility indicated by indicator 1408. A prompt 1413 asks the user whether permission to perform the procedure indicated by procedure indicator 1404 is granted. By selecting control 1420a, the user can deny the request to perform the procedure. By selecting control 1420b, the user can approve the request to perform the procedure.
In some aspects, instructions 508 of device 502a, which is one of the one or more servers 502 of
The user interface 1500 includes a patient records indicator 1502, in this case indicating the patient's name is “Dmitri Tkachev.” The user interface 1500 also includes a “requested by” indicator 1504, indicating an individual who is requesting access to the personal healthcare and medical history information. The user interface 1500 also includes a source indicator 1506, indicating a source of the personal healthcare and medical history information. In this example, www.health.com is indicated, which may be a HIE or HISP as discussed above. The user interface 1500 also includes a company indicator 1508, which indicates an entity that is requesting access to the personal healthcare and medical history. A reason indication is also provided on user interface 1500, which indicates a reason for the access request. In this illustrated example, an insurance policy is being renewed, and perhaps the insurance company needs to review personal healthcare and medical history before renewing the policy. A prompt 1512 asks the user to which the user interface 1500 is displayed whether they grant permission for the company to access the personal healthcare and medical history of the patient. The request for access can be denied via selection of control 1520a and approved via selection of control 1520b.
In block 1605, healthcare information is received for an individual. For example, the healthcare information may be received by a system implemented by the one or more servers 502 discussed above. In some aspects, the healthcare information received in block 1605 may include one or more of family history information, identification information, such as name, social security number, address, driver license numbers, passport numbers identification numbers, and the like. The healthcare information may also include one or more of information relating to one or more medical procedures performed on the individual in the past, records relating to one or more medical evaluations performed in the past. For example, this information might include vital signs recorded during the medical evaluations and or procedures, and/or conclusions or recommendations of medical professionals performing the evaluations and/or procedures.
In some aspects, the healthcare information may be received by the one or more servers 502 over a computer network, such as the Internet. In some aspects, the one or more servers 502 may implement a web based user interface that is displayed on one of the client devices 508a-c shown in
In block 1610, electronic contact information is received. The electronic contact information may be received, in some aspects, by the system implemented by the one or more servers 502 discussed above. In some aspects, the electronic contact information may be received over a computer network, such as the Internet. The electronic contact information may include one or more of email address(es), phone number(s), fax number(s), skype identifiers, instant messaging user names, twitter account identification information, and the like. In some aspects the electronic contact information relates to the individual themselves. For example, if healthcare information for John Doe is received in block 1605, then contact information for John Doe is received in block 1610. In some other aspects, the contact information received in block 1610 may be for a different individual than John Doe, in the example above. For example, in some aspects, the contact information received in block 1610 may be for an individual designated as a guardian or parent of the individual whose healthcare information was received in block 1605. The electronic contact information received in block 1610 may be contact information for an individual that will receive notifications when health care information for the individual discussed with respect to block 1605 is accessed or modified. In some aspects, the electronic contact information may be for a second individual with approval authority for medical procedures that may be performed on the individual referenced in block 1605.
In block 1615, a request to access the healthcare information is received. In some aspects, the request is received via a web user interface implemented by the one or more servers 502 shown in
In some aspects, as shown in
In block 1620, a prompt for approval of the access request is generated. The prompt may be generated based on the contact information received in block 1610. In some aspects, the prompt may take substantially the form of one of the user interfaces shown in
In block 1625, input is received indicating whether the access request is approved. In some aspects, the input is received over a computer network, such as the Internet. In some aspects, the input is received from a user interface control on one of the user interfaces shown in
In block 1630, access to the health care information is conditionally allowed based on the input. For example, if the input indicates access should be allowed, then block 1620 may allow access. In some aspects, any one of the controls 614b, 664b, 1220b, and 1520b may generate input indicating access should be allowed. In some aspects, allowing access may include generating a security credential or token that may be used to obtain access to the requested healthcare information.
In some aspects, the method may be implemented by a combination of the one or more servers 502 of
In block 1705, healthcare information is received for an individual. In some aspects, the healthcare information received in block 1705 may include one or more of family history information, identification information, such as name, social security number, address, driver license numbers, passport numbers identification numbers, and the like. The healthcare information may also include one or more of information relating to one or more medical procedures performed on the individual in the past, records relating to one or more medical evaluations performed in the past. For example, this information might include vital signs recorded during the medical evaluations and or procedures, and/or conclusions or recommendations of medical professionals performing the evaluations and/or procedures.
The healthcare information may be received over a computer network, such as the Internet in some aspects. In some aspects, the one or more servers 502 may implement a web based user interface that is displayed on one of the client devices 508a-c shown in
In block 1710, electronic contact information for a guardian of an individual is received. In some aspects, the electronic contact information may be one or more of an email address, phone number, instant messaging user name, twitter account identifier, or the like. In some aspects, the electronic contact information may be a user name of the guardian within an electronic healthcare records system, such as the system implemented by the one or more servers 502 illustrated in
In block 1715, a request to perform a medical procedure on an individual is received. In some aspects, the request received in block 1715 may be in the form of a network message received by the system 502a, discussed above with respect to
In some aspects, the request of block 1715 is generated on the device 502a from a web based or mobile application based user interface provided to the healthcare professional. In some aspects, the interface may allow the healthcare professional to select an identification of the individual, for example, by their name, social security number, user name within the system of servers 502, or other identifying information. The web based or mobile application may be configured to display its user interface on the device 508a for example. After the health care professional enters the treatment information on the device 508a, the information and the request may be received by the server 502.
The device 502 may then automatically identify appropriate contact information for the guardian of the individual, for example, based on the electronic contact information received in block 1710. An association between the individual and one or more guardians or associated individuals may be stored in the database 504, and retrieved by device 502 in response to the request.
In block 1720, a prompt is generated for the guardian, using the electronic contact information. The prompt requests approval to perform the medical procedure. For example, in some aspects, the prompt may substantially take the form of user interface 1400 shown in
In block 1725, input is received indicating whether the procedure is approved. In some aspects, the received input may be received over a computer network, for example, via one or more http messages from a web based user interface. In some aspects, the input may be received from an application running on one of the client devices 508a-c shown in
In block 1730, the procedure is authorized based on the received input. In some aspects, authorizing the procedure may include displaying a message on a user interface for the health care professional requesting authentication in block 1715. For example, in some aspects, the health care professional may be logged into the system implemented by the one or more servers 502 of
In some aspects, authorizing the procedure may include sending one or more application programming interface (API) commands to medical equipment based on the authorization. In some aspects, the medical equipment may be configured to provide at least one aspect of the procedure to the individual upon approval. For example, the medical equipment may comprise a medical device, such as an infusion pump, x-ray machine, proton therapy machine, defibrillator, or other medical device capable of treating a patient such as the individual.
The medical equipment may administer at least a portion of the medical procedure in response to receiving the command. For example, if the input of block 1725 indicates the procedure is authorized, block 1730 may send commands to an infusion pump to begin administering a particular substance to the patient. The infusion pump may be accessible via the network 506 shown in
When the procedure is authorized, the device 502 may look-up the identifying information for the infusion pump in the database 504, and send one or more commands to implement the procedure. For example, the device 502 may, in response to the authorization, first set a flow rate for the infusion pump using a first network API command. The first network API comment may be transmitted from the computer 502 to the infusion pump over a network. The device 502 may then send a second different API command to the infusion pump, indicating the pump should begin administering the substance, such as a drug, at the previously indicated flow rate. This second API command may also be transmitted in the form of a network message from the computer 502 to the infusion pump in some aspects. In response to receiving the second command, the infusion pump may provide power to a pump. The pump may create a suction on a first port and pressure to a second port. The first port may be connected to a supply reservoir, for example, of a medicine, saline, or other liquid. The second port may be connected, indirectly, to the individual. For example, the second port may be connected via an intravenous needle inserted into the individual, for example, into the individual's arm, hand, or abdomen.
In block 1802, alert information is associated with an individual. In some aspects, block 1802 includes receiving alert contact information for a particular individual. For example, the alert contact information may include one or more of email address(es), phone numbers, instant message user names, a user name within the system implemented by the one or more servers 502 of
In block 1805, one or more health data range limits are received for an individual. In some aspects, the range limits may be for a heart rate, blood pressure, body temperature, respiration rate, blood sugar level, blood oxygen saturation, or other diagnostic information measured from the individual. The range limits may indicate both a lower and upper limit, or just either a upper or lower limit.
In block 1810, a health data update is received. In some aspects, a health data update may be received in block 1810 periodically, or at random intervals. For example, in some aspects, a device generating health data updates may generate the updates periodically, or only when the health data changes by some constant or percentage amount. Some devices may generate updates when an amount of change is greater than a threshold or after a predetermined period of time has elapsed since the last update. The health data update may indicate measurements of one or more vital signs, such as the vital signs described above with respect to block 1805.
Decision block 1815 determines whether the health data received in block 1810 is within the ranges received in block 1805. In some aspects, block 1815 determines whether the update indicates data that is between an upper and lower limit for a vital sign, or whether the data is outside the range defined by an upper and lower limit.
If no upper limit is specified for a particular vital sign, decision block 1815 may not consider whether a vital sign is above any limit, but may instead only consider whether the vital sign is below a limit. Similarly, if no lower limit is specified for a particular vital sign, decision block 1815 may not consider whether the vital sign is below a limit, but instead only consider whether the vital sign is above a specified limit.
If decision block 1815 determines that the health data is within range, process 1800 returns to block 1810 and may receive additional updates to the health data. If decision block 1815 determines at least one vital sign in the health data is not within range, process 1800 moves to block 1820 and generates an alert based on the alert information received in block 1802.
In some aspects, block 1820 may generate an alert by displaying a version of the user interface 1300 shown in
In block 1905, contact information associated with an individual is received. In some aspects, the contact information may be received over a computer network, such as the Internet. In some aspects, the information may be received by the one or more servers 502 shown in
In block 1910, a request is received to change authentication information for the individual. In some aspects, the request may be a request to change one or more of the authentication information discussed above. In some aspects, the request may be generated via a user interface presented at a facility associated with the one or more servers 502. For example, in some aspects, an individual may go to a facility with access to the system implemented on the one or more servers 502. The individual may request, for example, that their password for the system be changed, or that they be issued a new identification card based on authentication information stored in the system. The request may be generated by the individual themselves, who may have a user name for the system of
In response to the request of block 1910, method 1900 generates a prompt verifying the change in the authentication information based on the contact information. In some aspects, generating a prompt includes transmitting one or more messages over a computer network defining at least a portion of a user interface to be displayed to a user. In some aspects, the user interface may be substantially similar to one of user interfaces 700 or 800 illustrated in
The user interface on which the prompt is displayed may be a different user interface than a user interface that may receive the request to change authentication information for the individual. For example, the request may be received at a facility, such as a post office facility, via a web interface or application running on a computer at the facility. The prompt may be generated at or via a user interface associated with a user name that is associated with the individual. For example, if the individual's name is “Fred,” and “Fred” goes to a facility to change his password, an administrative user named “Peter” may submit the request to change Fred's authentication information. “Peter” may use a computer located at the facility, such as a hard-wired desktop computer, to enter the request for a change. In some aspects, “Peter” may use a mobile device that is logged in with “Peter's” own user name, such as “plaw.” The prompt of block 1915 may be generated to a user's account associated with “Fred,” for example, a user name of “fredn.” The prompt may display on whichever computer is logged in as “fredn.” In some cases, “fredn” may be logged in to a web site application, or to an application running on a mobile device, such as a cell phone.
In block 1920, input is received indicating whether the change is verified. For example, in some aspects, one of controls 712a-b and 812a-b may generate an indicator of whether the change to the authentication information is verified or not. For example, if a user selects one of controls 712a or 812a, the change is not verified, whereas if the user selects one of controls 712b or 812b, the change is verified. In the example above, the input of block 1920 may be received via the user name “fredn,” and thus could be received via any computer in which the user “fredn” is logged in to.
In block 1925, the change is made based on the verification. For example, if the input verifies the change, then the change is made, otherwise, the change is not made. In some aspects, making the change can include updating a database of authentication information with an updated set of data for the individual. In some aspects, making the change can include issuing an ID card to an individual at a facility (which may be indicated by the user interfaces 700 or 800 in various embodiments. In some aspects, making the change may include displaying a user interface to the user requesting the change in block 1910, the user interface indicating that the change may be made.
Those of skill will recognize that the various illustrative logical blocks, modules, circuits, and algorithm steps described as follows, and in connection with the embodiments disclosed herein may be implemented as electronic hardware, software stored on a computer readable medium and executable by a processor, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor reads information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC.
While the above detailed description has shown, described, and pointed out novel features of the development as applied to various embodiments, it will be understood that various omissions, substitutions, and changes in the form and details of the device or process illustrated may be made by those skilled in the art without departing from the spirit of the development. As will be recognized, the present development may be embodied within a form that does not provide all of the features and benefits set forth herein, as some features may be used or practiced separately from others. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
A person skilled in the art will recognize that each of these sub-systems may be inter-connected and controllably connected using a variety of techniques and hardware and that the present disclosure is not limited to any specific method of connection or connection hardware.
The technology is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, a microcontroller or microcontroller based system, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
As used herein, instructions refer to computer-implemented steps for processing information in the system. Instructions may be implemented in software, firmware or hardware and include any type of programmed step undertaken by components of the system.
A microprocessor may be any conventional general purpose single- or multi-chip microprocessor such as a Pentium® processor, a Pentium® Pro processor, a 8051 processor, a MIPS® processor, a Power PC® processor, or an Alpha® processor. In addition, the microprocessor may be any conventional special purpose microprocessor such as a digital signal processor or a graphics processor. The microprocessor typically has conventional address lines, conventional data lines, and one or more conventional control lines.
The system may be used in connection with various operating systems such as Linux®, UNIX®, MacOS® or Microsoft Windows®.
The system control may be written in any conventional programming language such as C, C++, BASIC, Pascal, NET (e.g., C#), or Java, and ran under a conventional operating system. C, C++, BASIC, Pascal, Java, and FORTRAN are industry standard programming languages for which many commercial compilers may be used to create executable code. The system control may also be written using interpreted languages such as Perl, Python or Ruby. Other languages may also be used such as PHP, JavaScript, and the like.
The foregoing description details certain embodiments of the systems, devices, and methods disclosed herein. It will be appreciated, however, that no matter how detailed the foregoing appears in text, the systems, devices, and methods may be practiced in many ways. As is also stated above, it should be noted that the use of particular terminology when describing certain features or aspects of the invention should not be taken to imply that the terminology is being re-defined herein to be restricted to including any specific characteristics of the features or aspects of the technology with which that terminology is associated.
It will be appreciated by those skilled in the art that various modifications and changes may be made without departing from the scope of the described technology. Such modifications and changes are intended to fall within the scope of the embodiments. It will also be appreciated by those of skill in the art that parts included in one embodiment are interchangeable with other embodiments; one or more parts from a depicted embodiment may be included with other depicted embodiments in any combination. For example, any of the various components described herein and/or depicted in the Figures may be combined, interchanged or excluded from other embodiments.
With respect to the use of substantially any plural and/or singular terms herein, those having skill in the art may translate from the plural to the singular and/or from the singular to the plural as is appropriate to the context and/or application. The various singular/plural permutations may be expressly set forth herein for sake of clarity.
The term “comprising” as used herein is synonymous with “including,” “containing,” or “characterized by,” and is inclusive or open-ended and does not exclude additional, unrecited elements or method steps.
All numbers expressing quantities of ingredients, reaction conditions, and so forth used in the specification and claims are to be understood as being modified in all instances by the term “about.” Accordingly, unless indicated to the contrary, the numerical parameters set forth in the specification and attached claims are approximations that may vary depending upon the desired properties sought to be obtained by the present invention. At the very least, and not as an attempt to limit the application of the doctrine of equivalents to the scope of the claims, each numerical parameter should be construed in light of the number of significant digits and ordinary rounding approaches.
The above description discloses several methods and materials of the present development. This development is susceptible to modifications in the methods and materials, as well as alterations in the fabrication methods and equipment. Such modifications will become apparent to those skilled in the art from a consideration of this disclosure or practice of the development disclosed herein. Consequently, it is not intended that this development be limited to the specific embodiments disclosed herein, but that it cover all modifications and alternatives coming within the true scope and spirit of the development as embodied in the attached claims.
As will be understood by those of skill in the art, in some embodiments, the processes set forth in the following material may be performed on a computer network. The computer network having a central server, the central server having a processor, data storage, such as databases and memories, and communications features to allow wired or wireless communication with various parts of the networks, including terminals and any other desired network access point or means.
This application claims priority to U.S. Provisional Application No. 62/214,376, filed Set. 4, 2015, and entitled “METHODS AND SYSTEMS FOR HEALTH CARE INFORMATION MANAGEMENT.” The content of this prior application is considered part of this application, and is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
62214376 | Sep 2015 | US |