The disclosure relates to devices, systems, methods, and smartcards for controlling smart card authentication for a medical system. The medical systems can include any medical device or machine requiring the transfer of any data such as personal health information (PHI) and therapy parameter data to be used by medical devices in the systems. The methods, algorithms, and processes described herein can serve as a basis for a standard to be used by any number of devices and systems for accessing a particular device.
New distributed healthcare models including value-based care systems and precision medical devices such as home-based and portable dialysis units can require the transfer of personal health information (PHI) and other data to function properly. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule enacted in 1997 in the United States and other similar laws throughout the world establish standards to protect a patient's electronic PHI. The security rules generally require reasonable and appropriate safeguards and procedures to verify and protect patient health information that is held or transferred in electronic form. Yet data breaches continue, imposing significant costs on providers and loss of privacy for affected patients. For example, between 2009 and 2017, two thousand one hundred eighty-one (2,181) healthcare data breaches were reported (https://wwwhipaajournal.com/healthcare-data-breach-statistics/). Those breaches resulted in the theft and exposure of a staggering one hundred and seventy-six million, seven hundred and nine thousand, three hundred and five (176,709,305) healthcare records, which equals more than 50% of the U.S. population (id).
Portable smart cards are sometimes used to transport and protect a patient's sensitive data from unauthorized access, tampering, or theft. Conventional methods for authenticating such smart cards require the use of passwords or keys which are common to all the smart cards. Known smart card readers send a global password stored in the system to the smart card. The known smart cards then verify the global password with an internally stored global password. However, the known systems and methods require the medical system to maintain a copy of the common global password. If one of the smart card's password is compromised, then the smart cards and related data used in the known systems and methods may become compromised. Hackers can also more easily tamper vulnerable known systems and methods using a compromised password obtained by an unauthorized third party smart card reader, such as a skimmer. Such breaches can result in patient and configuration data becoming susceptible to class attack and large data loss.
Hence, systems and methods can be provided that improve upon known protecting schemes that guard against unauthorized and unintentional access to medical systems. Encrypting data such as personal health information (PHI) before writing to a smart card and decrypting after reading to ensure that data remains confidential can be provided. An authentication mechanism between a smart card and a reader to reduce the possibility of tampering using third party smart card readers can also be provided. An automated smart card password generation and authentication system to minimize risk of breach in a distributed healthcare environment, ecosystem, or provider network can be further provided. A unique password to each smart card in a trackable manner can be provided. Avoiding the storage of the unique passwords in a system can be provided. Denying access to a third-party smart card reader attempting to access data stored in a smart card can also be provided. Avoiding a class attack, so that a compromise of one smart card's password will not affect other smart cards in the system can be provided. Systems and methods suitable for use in various medical systems including, but not limited to, dialysis can also be provided.
The first aspect of the invention relates to a secure medical system for transmitting personal health information. In any embodiment, the secure medical system can include a smart card; a smart card reader, and a microprocessor; wherein the smart card has a secure computer readable memory having memory allocated to store a first password verifiable by the smart card reader and a second password generated by the smart card reader, and a file directory containing personal health information and a unique ID, wherein the smart card reader can use an algorithm based at least partly on the unique ID to generate the second password; the microprocessor having instructions for verifying a stored second password against a received second password sent by the smart card reader, the microprocessor providing access to the file directory containing data, if the stored second password matches the received second password.
In any embodiment, the smart card can further include an antenna, a capacitor, and a non-volatile memory unit.
In any embodiment, the antenna can communicate with the smart card reader by transmitting and/or receiving radio frequency or wireless signals based on instructions from the microprocessor.
In any embodiment, the smart card can further include a subscriber identification module chip, also known as a SIM chip, which can make direct electrical contact with the smart card reader to transmit data.
In any embodiment, the first password can be a factory-preset password.
In any embodiment, the unique ID can be any one of a serial number, a globally unique identifier (GUID), or a hashed number.
In any embodiment, the personal health information can include any one or more of a name, age, gender, height, weight, patient ID, prescription data, treatment data, device configuration, or any other medically relevant patient data not limited to patient history, prior therapy session data, genetic data, and the like.
In any embodiment, the first password can be overwritten by the second password.
The features disclosed as being part of the first aspect of the invention can be in the first aspect of the invention, either alone or in combination, or follow any arrangement or permutation of any one or more of the described elements. The described combinations can solve one or more one-limiting problems related to smart cards requiring the use of passwords or keys which are common to all the smart cards and storage of passwords by a smart card reader.
The second aspect of the invention is drawn to a smart card reader for use in a medical system. In any embodiment, the smart card reader can include a microprocessor having instructions for transmitting and receiving radio frequency or wireless signals and an algorithm for generating a second password; an antenna for communicating with a smart card, where the antenna can transmit and/or receive radio frequency or wireless signals based on instructions from the microprocessor; a secure computer readable memory storing a first password verifiable by the smart card and memory allocated for a unique ID received from the smart card; and the microprocessor further including instructions for generating the second password based at least partly on the unique ID received from the smart card, instructions for either transmitting and storing the second password on the smart card for initial preparation of the smart card, instructions for transmitting the second password to access a secured file directory containing data on the smart card, and instructions for discarding the second password.
In any embodiment, the algorithm can be at least partly based on partial secret and number of iterations of a pseudo-random function.
In any embodiment, the number of iterations of the pseudo random function can be greater than 1.
In any embodiment, the partial secret can be identical across medical devices.
In any embodiment, the pseudo-random function can be HMAC-SHA1, HMAC-SHA2, HMAC-SHA3, or PBKDF2.
In any embodiment, the length of the second password can be at least 4 bytes.
In any embodiment, the smart card reader can have a slot suitable for receiving the smart card, which can allow the smart card reader to transmit data to and/or from the smart card by making direct electrical contact.
In any embodiment, the smart card reader can be in electrical communication with any one or more of a desktop computer, a laptop computer, or any other medical system.
The features disclosed as being part of the second aspect of the invention can be in the second aspect of the invention, either alone or in combination, or follow any arrangement or permutation of any one or more of the described elements. The described combinations can solve one or more one-limiting problems related to storing or maintaining a copy of a common global password.
The third aspect of the invention is drawn to an automated smart card authentication system for use in a medical system. In any embodiment, the system can include a smart card having memory allocated for storing a first password, a second password generated by an algorithm based on a unique ID, the unique ID, and personal health information; a smart card reader programmed to receive the first password stored in the smart card, wherein the smart card reader can generate a second password using the algorithm based at least partly on the unique ID of the smart card, store the second password on the smart card and discard the second password from the smart card reader; where the smart card reader is programmed to generate the second password on each read of the smart card using the algorithm; where the smart card can grant access to data if the second password generated by the smart card reader matches the second password stored in the smart card, and the smart card reader can discard the second password.
In any embodiment, the smart card reader can transmit the data from the smart card to other medical devices connected to the smart card reader.
In any embodiment, the second password generated by the smart card reader can be stored on the smart card. In any embodiment, the second password is not stored anywhere else on the system.
The features disclosed as being part of the third aspect of the invention can be in the third aspect of the invention, either alone or in combination, or follow any arrangement or permutation of any one or more of the described elements. The described combinations can solve one or more one-limiting problems related to smart card readers storing or maintaining a copy of a common global password.
The fourth aspect of the invention relates to a method for automated smart card authentication for use in a medical system. In any embodiment, the method can include the step of accessing a smart card using a first password and a unique ID stored on the smart card, wherein the unique ID is used to generate a second password by a smart card reader, wherein the smart card reader uses an algorithm based at least partly on the unique ID to generate the second password wherein the second password is stored on the smart card and is discarded and not stored by the smart card reader.
In any embodiment, the method can include the step of re-generating the same second password by the smart card reader using the unique ID of the smart card and upon verification of the same second password on the smart card, access a file directory containing personal health information on the smart card.
The features disclosed as being part of the fourth aspect of the invention can be in the fourth aspect of the invention, either alone or in combination, or follow any arrangement or permutation of any one or more of the described elements. The described combinations can solve one or more one-limiting problems related to methods requiring the storage or maintaining a copy of a common global password.
The fifth aspect of the invention relates to a smart card. In any embodiment, the smart card can have a secure computer readable memory having memory allocated to store a first password verifiable by a smart card reader and a second password generated by the smart card reader; a file directory containing personal health information, and a unique ID, wherein the smart card reader uses an algorithm based at least partly on the unique ID to generate the second password; and a microprocessor having instructions for verifying a stored second password against a received second password sent by the smart card reader, the microprocessor providing access to the file directory containing data, if the stored second password matches the received second password.
In any embodiment, the smart card can have an antenna, a capacitor, and a non-volatile memory unit.
In any embodiment, the smart card can have a subscriber identification module chip, wherein the subscriber identification module chip makes direct electrical contact with the smart card reader to transmit data.
In any embodiment, the first password can be overwritten by the second password.
In any embodiment, the personal health information can include any one or more of a name, age, gender, height, weight, patient ID, prescription data, treatment data, and device configuration.
The features disclosed as being part of the fifth aspect of the invention can be in the fifth aspect of the invention, either alone or in combination, or follow any arrangement or permutation of any one or more of the described elements. The described combinations can solve one or more one-limiting problems related to smart card readers storing or maintaining a copy of a common global password.
Unless defined otherwise, all technical and scientific terms used have the same meaning as commonly understood by one of ordinary skill in the art.
The articles “a” and “an” are used to refer to one to over one (i.e., to at least one) of the grammatical object of the article. For example, “an element” means one element or over one element.
The term “access” or the step of “providing access” or “granting access” can refer to allowing authorization to create, read, list, display, or update information or data stored in a memory, processor, device, or component.
The term “algorithm” can refer to the broadest interpretation of a process, mathematical operation, or method of any type that can be used to generate data, files, parameters, passwords, text, or information.
The term “allocated” can refer to any process that assigns a block of memory for data or for a program.
The term “antenna” can be any component capable of sending or receiving electromagnetic waves or signals.
The term “authentication system” can refer to any system that allows for identification of a particular component by any suitable means known to those of skill in the art.
The term “automated” refers to the broadest interpretation of any algorithm or process that can be performed, in part or wholly, by a machine or apparatus. The operations involved in the “automated” algorithm or process can sometimes occur without human intervention or with partial support by a human. No restriction is placed on the extent to which the algorithm or process is automated wherein any portion of the algorithm or process can be automated.
The phrase “based at least partly on” can refer to a key element or feature, but also optionally include any other non-key elements or features.
A “byte” can refer to a unit of digital information that commonly consists of eight bits.
A “capacitor” can refer to a component capable of storing electric energy.
The term “comprising” includes, but is not limited to, whatever follows the word “comprising.” Use of the term indicates the listed elements are required or mandatory but that other elements are optional and may be present.
A “computer readable memory” can refer to any memory which can be accessed by a computer to transmit information stored with the memory.
The term “consisting of” includes and is limited to whatever follows the phrase “consisting of” The phrase indicates the limited elements are required or mandatory and that no other elements may be present.
The term “consisting essentially of” includes whatever follows the term “consisting essentially of” and additional elements, structures, acts or features that do not affect the basic operation of the apparatus, structure or method described.
The term “contain” or “containing” refers to any component from which information can be obtained. The information can include but is not limited to patient information, system information and component information.
The terms “control,” “controlling,” or “controls” refers to the ability of one or more components to direct the actions of a second set of one or more components.
The term “data” can refer to any quantity, text, character, or symbol containing or representing information of any type. In general, a computer can perform operations on the data, and the data recorded and stored on any one of magnetic, optical, electrical, memory, or mechanical recording media, and transmitted in the form of digital electrical signals.
The term “desktop computer” can refer to any machine containing a processor. The desktop computer is capable of being electrically connected to other components or devices.
The term “device configuration” can refer to a set of data or information capable of modifying or instructing how a device should perform in a particular condition or environment.
“Dialysis” is a type of filtration, or a process of selective diffusion through a membrane. Dialysis removes solutes of a specific range of molecular weights via diffusion through a membrane from a fluid to be dialyzed into a dialysate. During dialysis, a fluid to be dialyzed is passed over a filter membrane, while dialysate is passed over the other side of that membrane. Dissolved solutes are transported across the filter membrane by diffusion between the fluids. The dialysate is used to remove solutes from the fluid to be dialyzed. The dialysate can also provide enrichment to the other fluid.
The terms “discard” or “discarding” can refer to deleting, either permanently or temporarily, any data or information from any memory, computer, or system.
The phrase “direct electrical contact” can refer to a part of a device in contact or attaching to a part of another device. Such contact can optionally provide for the contacted parts to transmit data or information via electrical signal, or any other means.
The terms “electrical communication,” “electrically communicate,” “electrically communicating,” and the like can refer to the ability to transmit electronic data, instructions, information wirelessly, via direct electrical connection, or any other electrical transmission means between one or more components.
The term “factory-preset” can refer to any information or data stored on a component or device at the time of manufacture.
The “file directory” can refer to any architecture, format, digital pathway, or storage structure where information or data can be stored in electronic form.
The terms “generate,” “generating,” or “to generate” can refer to any one of creating, determining, or calculating any parameter, file, or feature (e.g., password) based on any input. Similarly, the terms “re-generate,” “re-generating,” or “to re-generate” can refer to any one of re-creating, re-determining, or re-calculating any parameter, file, or feature (e.g., password) based on any input. For example, a microprocessor can generate or re-generate a unique ID using an algorithm stored in a microprocessor.
A “globally unique identifier” or “GUID” can refer to a 128-bit number used to identify information of any suitable type.
The phrase “value greater than one” means any integer greater than one.
A “hashed number” can refer to a number transformed into another form by a particular function.
A “hash-based message authentication code,” “keyed-hash message authentication code,” or “HMAC” can be used to confirm that a message's content or its sender information has not been modified by using cryptographic hash function and a secret cryptographic key.
The terms HMAC-SHA1, HMAC-SHA2, HMAC-SHA3, PBKDF2, et al. refer to file transfer protocols using a particular type of hash function such as SHA1, SH2, SH3, et al.
The term “identical” can refer to any component, data, process, algorithm, information that is the same in every detail or aspect.
An “initial preparation” can refer to a set of process setting up any component, to a state suitable for a subsequent use. In one non-limiting example, a smart card, which initially comes with a first password, may be given a second password to be stored, which allows the smart card to be subsequently used in an automated manner.
The terms “instruction” or “instructions” can refer to one or more steps directing any one or combination of a circuit, software, or a processor to perform one or more function or process.
The term “laptop computer” can refer to a portable computing platform with one or more microprocessor and memory, both of any type.
The term “match” can refer to any condition or state wherein a feature or file is identical to another feature or file. In general, the term can be used in the context of passwords wherein one entered password is identical to another stored password for verification.
The term “medical system” can be a set of one or more interoperable components capable of any one or more of sensing one or more medical parameters, performing or delivering a medical therapy of any type, and/or storing medical information.
The term “memory” is a device for recording digital information that can be accessed by any microprocessor, such as RAM, Dynamic RAM, microprocessor cache, non-volatile memory such as EEPROM, Flash memory or any other similar memory device.
A “non-volatile memory unit” can refer to any type of memory which allows data to be stored or held even if power to the memory unit is turned off.
The phrase “number of iterations” can refer to a count of a pseudo-random function being executed.
The term “overwritten” or to “overwrite” refers to replacing information saved in a computer readable medium with different information.
The term “partial secret” can refer to any part of a data or number which can be stored in a device or in memory such that data is not readily visible or known to a device user. The data or number can be identical across any type of system or devices.
The term “password” refers to information required by a component or system for gaining access to the component or system.
The term “password-based key derivation function version 2.0” or “PBKDF2” can refer to a type of key derivation function that utilizes a pseudo random function to derive a key that can be used in subsequent functions.
A “patient” or “subject” can be a member of any animal species, preferably a mammalian species, optionally a human. The subject can be an apparently healthy individual, an individual suffering from a disease, or an individual being treated for a disease. In certain embodiments, the patient can be a human, sheep, goat, dog, cat, mouse or any other animal.
The terms “patient identifier” or “patient ID” can refer to information capable of distinguishing one patient from another.
The terms “prescription” or “patient prescription” can refer to one or more system settings for performing a therapy. In one non-limiting embodiment, the prescription can be directed to any parameter used in setting a dialysis session for a patient.
The term “personal health information” can refer to any health data concerning an individual. The term can be used in the context of a particular patient where the information can include, but is not limited to, patient name, patient ID, prescription data, treatment data, genetic and phenotypic data, specific population data, and specific events having occurred during a prior medical treatment or occurring during an on-going treatment.
The term “pseudo-random function” can refer to a function emulating a completely random function. In one non-limiting embodiment, an efficient algorithm cannot distinguish between a completely random function and a pseudo-random function.
The term “processor” or “microprocessor” as used is a broad term and is to be given an ordinary and customary meaning to a person of ordinary skill in the art. The term refers without limitation to a computer system, state machine, processor, or the like designed to perform arithmetic or logic operations using logic circuitry that responds to and processes the basic instructions that drive a computer. In any embodiment of the first, second, third, and fourth invention, the terms can include ROM (“read-only memory”) and/or RAM (“random-access memory”) associated therewith.
The term “programmed,” when referring to a processor, can mean a series of instructions that cause a processor to perform certain steps.
“Radio frequency” refers to electromagnetic radiation with a frequency from about 3 kHz to about 300 GHz.
The terms “read,” “to read,” “reading,” and the like, in referencing a computer process, means the act, state, or process of receiving information or data by any known electrical or digital means.
The term “readable” refers to a memory component that contains information obtainable by another component.
The terms “received,” “to receive,” “receiving,” and the like, in reference to an object, can refer to allowing ingress or generally allowing any object, such as a smart card, to be positioned or seated into a space where the object is placed. The terms if referring to an electrical transmission or communication means obtaining an electrical signal of any type.
The phrase “receive data” generally refers to the process of obtaining information or data from any source by any means including wireless, direct contact, electrical contact, energy transfer, magnetic resonance, or any other known means.
The term “secure” as applied to electronic data and components, generally refers to a state or condition in which the data or component has received any type of protective digital measures to prevent unauthorized access.
A “Secure Hash Algorithm 1, 2, or 3” or “SHA-1, 2, or 3” can refer to a type of cryptographic hash function.
A “serial number” can be a unique identifying number assigned to a component.
A “slot” is any opening on any device or machine for reversibly receiving another component.
A “smart card” can be a substantially rectangular and planar portable component that can contain either a memory and a microprocessor, or both. Other non-limiting components such as antennas and receivers can also be contained on the smart card.
A “smart card reader” is a component that is capable of transmitting information to and from a smart card. The transmission can occur by any means including wireless, direct contact, electrical contact, energy transfer, magnetic resonance, or any other known means.
The terms “stored,” “to store,” or “storing” refer to a process for assigning data to a memory. Optionally, the data can be retrieved later.
The terms “subscriber identification module chip” or “SIM chip” can refer to an integrated circuit. The SIM chip can in certain embodiments securely store information required to identify or authenticate a device or component.
The terms “transmission,” “to transmit,” “transmitting,” and the like can refer to the ability to send electronic data, instructions, information wirelessly, via direct electrical connection, or any other electrical communication means between one or more components.
“Treatment data” can refer to any information regarding a patient's prior medical treatment, including, but not limited to, prescriptions or dosing, history of prior treatment, status of medical components and settings for a medical system for the prior treatment, events occurred during the prior treatment, medical outcome of the treatment, and the like.
A “unique identifier” or “unique ID” can be information or data capable of distinguishing one feature or component from other features or components.
“Verify”, “verifying” or “verifiable” refers generally to a process for comparing two or more digital features or files. In one non-limiting embodiment, passwords to determine whether the two features or files can be matched or will match each other can be verified. The verification process can generally include any one or more of algorithms, electronic methods, and defined procedures to determine the matching or matchability of the two or more digital features of files.
A “wireless signal” can refer to electromagnetic or radio wave which can transfer information between two devices that are not directly connected to each other by wired contact.
The medical system 100 can include, but is not limited to cardiac monitoring, hemodialysis, peritoneal dialysis, or patient monitoring. In one non-limiting embodiment, the medical system 100 is directed to a portable hemodialysis device. The smart card 101 can store personal health information (PHI) including sensitive patient data such as prescription, treatment data, or device configuration data. The smart card 101 can also store data such as a patient's biometric or genetic information. The patient data can originate from the medical system 100 and be stored in smart card 101. A smart card reader 102 can access the stored data in smart card 101 upon making contact either by direct electrical contact, cabled contact, wireless transmission, magnetic resonance, impedance, or any other kind of known transmission means. Non-limiting examples of wireless transmission can include any desired wired or wireless technology, including, for example, cellular, WAN, wireless fidelity (Wi-Fi), Wi-Max, WLAN, and the like. Still other non-limiting technologies can include BLUETOOTH, BLUETOOTH low energy (BLE), near field communication (NFC), Zigbee, RF4CE, WirelessHART, 6LoWPAN, Z-Wave, ANT, and the like. The transmitter/receiver architecture of the smart card reader 102 and smart card 101 can vary depending on the type of transmission protocol. For example, the smart card reader 102 and smart card 101 can be configured to perform one or more different types of transmission protocols (e.g., BLUETOOTH, BLE, NFC, Wi-Fi, Zigbee, etc.). In other embodiments, the smart card reader 102 and smart card 101 can include a plurality of different transmitters/receivers that are respectively configured to perform different types of wireless communication protocols.
In one non-limiting embodiment, the smart card 101 and the smart card reader 102 can each contain an antenna so that smart card 101 and smart card reader 102 can wirelessly communicate with each other by transmitting and receiving data. Alternatively, the smart card reader 102 can have a slot such that smart card 101 can be inserted into smart card reader 102 to communicate by direct electrical contact with smart card 101 to transmit and receive data. Alternatively, the smart card reader 102 can communicate with the smart card 101 by having a groove where the smart card 101 can be swiped, if the smart card 101 has a magnetic strip. The use of the smart card 101 can be automated so that a user is not required to manually type a password to gain access.
The smart card reader 102 can be connected to a computer 103. In certain embodiments, the computer 103 can be a desktop or a laptop computer. The computer 103 can display the data stored in the smart card 101 to a medical professional 104 if the smart card reader 102 has gained access to the smart card 101. Using the computer 103, a medical professional 104 can update or modify a dosage, prescription, therapy parameters, patient data, or any other desired data. The smart card reader 102 can also be connected to a laptop computer, where the laptop computer performs a similar function as described for the desktop computer 103. Alternatively, the smart card reader 102 can be connected to another medical system 100. If the smart card reader 102 is connected to a medical system 100 and the smart card reader 102 has gained access to the smart card 101 that stores a device configuration, the medical system 100 can download and access and update the device configuration. If the smart card reader 102 is connected to the medical system 100 and the smart card reader 102 can gain access to the smart card 101, and the medical system 100 can also modify performance based on the patient data stored in the smart card 101. Alternatively, the medical system 100 can automatically update or edit the data stored in the smart card 101 while connected to the smart card reader 102. Alternatively, a patient can also use computer 103 to access his or her own patient data. In certain embodiments, the smart card reader 102 can be a standalone device and does not need to be connected to a computer 103 or a medical system 100 to be operational. Alternatively, a computer 103 or a medical system 100 can be constructed so that a smart card reader 102 is integrated as a part of the devices, as opposed to being attachable and detachable to the computer 103 or the medical system 100.
The smart card reader can use an algorithm to generate a password.
If a smart card reader is connected to a computer and gains access to a smart card, the computer can display data stored within the smart card.
After the computer readable memory 504 has stored the second password on the memory space 501 allocated for the second password, the smart card 505 can grant access to the smart card reader for data 502 when the smart card 505 receives and verifies the second password sent by the smart card reader. The memory space for protected data 502 can contain personal health information such as prescription or treatment data, as well as biological data of a patient and patient ID. In certain embodiments, protected data can include configuration for a medical device or system as well as any data a medical professional may find useful in treating a patient. The smart card 505 contains a microprocessor 503, which can execute a set of programmed directions. The microprocessor 503 can be programmed to verify a first password sent by the smart card reader against the stored first password. The microprocessor 503 can be programmed to store the second password, generated and sent by the smart card reader, to the memory space 501 allocated for the second password, after the smart card reader access is verified with the first password. The microprocessor 503 can be programmed to grant access to the protected data 502 to the smart card reader after verification of the second password, allowing the smart card reader to read or update the protected data 502. The microprocessor 503 can be programmed to execute other functions of the smart card 505 necessary for the card to work properly. A person skilled in the art will understand and appreciate other suitable functions of the smart card 505 that can be programmed into the microprocessor 503 and executed for specific applications.
In certain embodiments, the smart card 505 can contain an antenna, a capacitor 507, a non-volatile memory unit, and other parts necessary for the smart card 505 to function properly. An antenna can transmit and receive radio frequency or wireless signals based on instructions from the microprocessor 503. The smart card 505 can optionally contain a subscriber identification module chip 508. The subscriber identification module chip 508 can substitute the function of an antenna and transmit and receive data if the subscriber identification module chip 508 is in direct electrical contact with a smart card reader designed to interact with the subscriber identification module chip 508. The smart card 505 can have other elements to transmit and receive data to and from a smart card reader. One example can be a magnetic strip.
In
In
The smart card readers 703 and 705-706 are not limited to any particular type of communication components as shown in
The smart card reader 804 can also be formed as a part of a medical system. The smart card reader 804 can further be connected as a part of the computer 805. In addition to the possible functions of the smart card reader 804 as a part of the computer 805, the smart card reader 804, if attached to the medical system can read device configuration information stored in the smart card and send the information to the medical system to modify the function and/or the parameters of medical devices in the system.
Patients 906, 907, 908, 909, and 910 holding their smart cards 911, 912, 913, 914, and 915, respectively, can individually access the medical systems 900, 901, 902, 903, and 904 without the systems or the smart card readers 905 and 916-919 saving passwords for each smart card 911, 912, 913, 914, and 915. Instead, as explained in
Alternatively, both the medical systems 900, 901, 902, 903, and 904 and the smart card readers 905 and 916-919 can generate the second password. In any embodiment, the generated second password is not saved or stored in the medical systems 900, 901, 902, 903, and 904 or the smart card readers 905 and 916-919 after the second password is generated and sent to the smart card 911, 912, 913, 914, and 915 for verification.
In certain embodiments, even if one of the smart cards 915 is compromised and data is obtained by hackers, the hackers will not have access to other uncompromised smart cards 911, 912, 913, and 914, because each smart card 911, 912, 913, 914, and 915 contains a unique second password. If the hackers infiltrate the smart card readers 905 and 916-919 or the medical systems 900, 901, 902, 903, and 904, they would not be able to acquire protected personal health information stored or other data in the smart cards 911, 912, 913, 914, and 915 or the second passwords required to access them because the second passwords are not stored on the smart card readers 905 and 916-919 or the medical systems 900, 901, 902, 903, and 904.
In any of the described examples, the described systems, methods, and devices may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored as one or more instructions or code on a computer-readable medium and executed by a hardware-based processing unit. Computer-readable media may include non-transitory computer-readable media, which corresponds to a tangible medium such as data storage media (e.g., RAM, ROM, EEPROM, flash memory, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer).
Instructions may be executed by one or more processors, such as one or more digital signal processors (DSPs), general purpose microprocessors, application specific integrated circuits (ASICs), field programmable logic arrays (FPGAs), or other equivalent integrated or discrete logic circuitry. As such, the term “processor” as used herein may refer to any of the foregoing structure or any other physical structure suitable for implementation of the described techniques. Also, the techniques could be fully implemented in one or more circuits or logic elements.
One skilled in the art will understand that various combinations and/or modifications and variations can be made in the described systems and methods depending upon the specific needs for operation. Various aspects disclosed herein may be combined in different combinations than the combinations specifically presented in the description and accompanying drawings. Moreover, features illustrated or described as being part of an aspect of the disclosure may be used in the aspect of the disclosure, either alone or in combination, or follow a preferred arrangement of one or more of the described elements. Depending on the example, certain acts or events of any of the processes or methods described herein may be performed in a different sequence, may be added, merged, or left out altogether (e.g., certain described acts or events may not be necessary to carry out the techniques). In addition, while certain aspects of this disclosure are described as performed by a single module or unit for purposes of clarity, the techniques of this disclosure may be performed by a combination of units or modules associated with, for example, a medical device.
This application claims the benefit of and priority to U.S. Provisional Patent Application No. 62/897,623 filed Sep. 9, 2019, the entire disclosure of which is incorporated by reference herein.
Number | Date | Country | |
---|---|---|---|
62897623 | Sep 2019 | US |