The present invention relates to a method and a system for collecting and providing reports of activities of medical service providers, while encrypting confidential information.
In the healthcare system, there are generally patients, providers, and payers. A patient is a person who comes to the provider for diagnoses or treatment of medical conditions. Providers include medical practitioners and professionals (such as dentists, nurse practitioners, physicians, and therapists) as well as medical service facilities (such as private offices, hospitals, and outpatient centers), medical service providers (such as pharmacies and laboratories) and other individuals or companies which provide medical diagnosis and treatment services. Payers are payment organizations which assist patients in paying for the diagnosis and treatment fees, and include privately owned health insurance companies, as well as publicly funded programs including Medicare, and Medicaid.
When a patient visits a provider for a diagnosis or treatment, the patient incurs a service fee. Depending on the patient's health insurance plan, the patient may have to pay a portion of the service fee to the provider, also known as a co-payment. The patient or the provider then fills out a medical insurance claim form and submits it to one or more payers to collect the rest of the service fee.
The payers and other organizations have standardized medical claim forms to help the payers and providers communicate with each other in a uniform manner. An exemplary standardized claim form is shown in U.S. Pat. No. 7,386,526, which is incorporated herein by reference. The sample claim form includes 85 fields for entry of information and codes. For instance, field 1 is used for entry of the provider name, address, and telephone number. Fields 12-16 are used for entry of the patient's personal information, such as name, address, birth date, and gender. Fields 67-81 are used for entry of codes corresponding to the diagnosis and procedure performed by the provider. Field 82 is used for entry of an identification code of the attending physician. Each doctor is identified by a physician identification code, rather than by their name, on the medical claim form. Typically, a third party or a manually created conversion table is used to convert between the identification code and the physician's name because identification codes for physicians are publicly available.
Instead of writing down on the claim form the complete diagnoses or procedures that were performed, the provider can utilize a code corresponding to the respective diagnosis and procedure. Diagnosis and procedure codes are standardized and established by healthcare industry standards groups, such as the National Uniform Billing Committee (NUBC), State Uniform Billing Committee (SUBC), American Medical Association (AMA), and Drug Enforcement Administration (DEA).
There are various diagnosis and procedure coding systems for different fields of medicine, services, and treatments. Each coding system contains thousands of unique diagnosis or procedure codes for providers to use in filling out the medical claim forms. One diagnosis coding system is the International Classification of Disease with Clinical Modifications, 9th Revision (ICD-9 CM, hereinafter “ICD-9”), developed by the World Health Organization. Payers and providers commonly use the ICD-9; codes on medical claim forms to describe diagnoses of symptoms, injuries, diseases, and medical conditions. For example, the ICD-9 code 414.0 would be typically recorded for patients who were diagnosed with the condition of Coronary Atherosclerosis. One procedure coding system is the Current Procedure Terminology (CPT) developed by the AMA. Payers and providers commonly use CPT codes to describe procedures or services that providers may perform on patients. These procedures and services are then subsequently reimbursed by the payer, such as an insurer. For example, on a medical claim form, CPT 31255 code indicates that a provider has performed a surgical nasal or sinus endoscopy on the patient. The DEA also developed a Healthcare Common Procedure Coding System (HCPCS) which is a set of procedure codes based on the CPT codes.
In addition, field 82 requires a physician identification code (rather than the physician's name), and fields 12-20 require patient name, gender and age, and date of service. There can also be fields for hospital affiliation, group practice, and other information. Thus, each medical claim form provides a wide range of information related to the provider's activities.
As the healthcare industry grows, the number of medical claims being submitted has increased tremendously. Because of the voluminous amount of medical claims being submitted daily from a large number of providers, many providers and payers have a difficult time managing the medical claims. As a result, clearinghouses have developed to assist payers and providers in dealing with the claim submission process. The clearinghouses receive medical claim forms from the providers, ensure that the forms are properly completed, and distribute the claim forms to the payers. The clearinghouses also distribute the status of submitted claim forms, such as rejected or accepted, from the payers to the providers. Recently, the processing of claim forms has been enhanced by electronic processing of these claim forms. Approximately 90% of all medical claim forms are processed electronically for payment. Electronic processing is further enhanced by use of standard format medical claim forms, such as those in the ANSI ASC X12N 837 Health Care Claims standard and the National Council for Prescription Drug Programs' Prescription Claim Transaction standard Version 5.1.
An exemplary system for providers to submit medical insurance claims to payers is illustrated in co-pending U.S. patent application Ser. No. 12/481,321, filed Jun. 9, 2009. The system includes providers, medical claim forms, clearinghouses, and payers. The providers submit the claim forms to the clearinghouses by paper or electronically as a file or other suitable format. The clearinghouses collect the claim forms from the providers, and distribute them to the payers. The providers can be physicians who provide diagnoses and treatment procedures for patients. The providers can be affiliated with private physician offices, hospitals, and other types of medical service facilities.
Many companies, such as pharmaceutical and medical device manufacturers and organizations related to medical service, have a great interest in promoting their products and services to specific groups of providers. To promote their products and services effectively, those companies want to target their products not to all providers, but to the most relevant group of providers in a specialized field. Thus, before promotion, a company would want a list of providers, such as physicians who performed particular diagnoses and procedures in the field of medicine that would most need the company's products. The providers on the list would be more likely than others to use or introduce the company's products to their patients. For instance, a manufacturer of a device for measuring blood sugar level may want a list of the top 100 physicians in the country that performed the highest number of diabetes diagnoses and treatments in the previous year. Those physicians are more likely than others to diagnose and treat diabetic patients in the near future and introduce the company's blood-level measuring device to their patients. Moreover, the manufacturer may want the list of the top 100 physicians to be sorted by the total number of diagnoses performed, or by gender and age range of the patients. Such a reporting list of physician activities would help the manufacturer to strategize business planning and maximize return on promotions.
Companies that offer reporting lists of provider activities generally obtain their information from the providers. However, the information from many providers is often summary data of the total number of diagnoses and treatments that the providers have performed. For instance, a hospital provides a summary for its many physicians. Those summaries typically do not provide breakdowns of how many diagnoses and treatments each physician affiliated with the hospital has performed. Thus, to estimate how many diagnoses or procedures each physician performed, the total number of services provided by the hospital is divided by the number of physicians. As a result of this crude apportioning approach, summary reports of physician activities do not accurately reflect the actual number of diagnoses and procedures that each physician actually performed.
However, with privacy concerns and laws limiting the ability of pharmaceutical companies to directly target service providers and patients, there is a need for a system and methods to generate reports of provider activities, derived from a database that includes information obtained from standardized and electronically processed medical claim data linked to each individual provider who performed the diagnoses and procedures, but with the information specifically identifying the individual provider or patient information encrypted to assure privacy and assure compliance with, e.g., HIPAA and all other applicable Federal and State laws and regulations.
Accordingly, an aspect of the present invention is to provide systems and methods for collecting and providing information from medical claim transactions without information for specifically identifying the particular medical service provider. Another object of the present invention is to correlate medical claim transactions with providers' information without using information that can be used to specifically identify the particular medical service provider (provider identifier).
One embodiment of the present invention provides a system for collecting and providing information from prescription claim transactions without information for specifically identifying the particular medical provider. The system includes a central location and a remote location. The remote location includes a least a source of the medical claim transaction (preferably a plurality of sources are included) that contains a remote processor programmed to encrypt the provider identifier from a medical claim transaction and transmit that encrypted medical claim transaction (medical claim transaction with the provider identifier encrypted) to the central location.
The central location contains a first central database containing provider information and a remote processor for matching and associating the encrypted prescription claim transaction with the medical provider information in the central database. The provider information contains an encrypted provider identifier with other provider information, such as such as geographic location, medical specialty, age, gender, and other demographic attributes. The encryption process at the central location is identical to the encryption process at the remote location so that the same provider obtains the same encrypted identifier.
The central location obtains provider information from public sources, such as the Center for Medicare and Medicaid Services' (CMS) National Provider and Plan Enumeration System (NPPES) database, or the Drug Enforcement Administration's Registration File, or State Licensure databases from the various States. This information typically contains provider names (or any identification information, such as identification number, etc.) and their associated provider information (such as geographic locations and medical specialties). The provider names (or other identifiers) obtained from public sources are then assigned an anonymous practitioner key (APK) and is saved in a second database containing APK cross-referenced to the corresponding provider information. The APK can be, for example, an arbitrary number that is assigned to the particular provider name. In a third database, each APK is cross-referenced to all possible provider identifiers, including name and any identification numbers. The provider identifiers in the third database are then encrypted using the same encryption method as at the remote location. This encrypted data from the third database and the data from the second database are combined to produce the first database which contain all possible encrypted provider identifiers cross-referenced to an APK.
The central processor matches the encrypted provider identifier from the prescription claim transaction with the encrypted provider identifiers in the first database. When there is a match, the information from the medical claim transaction is combined with the provider information and saved in a data warehouse. This saved information can be used to generate reports on provider activities.
Other objects, advantages, and features of the invention will become apparent from the following detailed description, which, taken in conjunction with the annexed drawings, discloses a preferred embodiment of the present invention.
The present invention provides systems and methods for collecting and providing information from medical claim transactions without information for specifically identifying the particular medical service provider. In the data of the present invention, provider identifiers are encrypted to protect the anonymity of the medical service provider associated with the medical service data. The encrypted identifier allows for cross-referencing and matching of medical claim transaction information with the provider information, while preserving the anonymity of the individual by encrypting all provider identifiers. As such, the medical service data is “de-identified” by encrypting all information that can be used to directly identify an individual provider. The encrypted identifier is appended to the medical claim transaction and provider information so that the claim transaction and the provide information can be matched and associated by the provider identifier without identifying the particular provider.
As used herein, “provider identifier” is used to indicate information that directly and positively identifies a particular provider. This information includes, but is not limited to, names, certain elements of addresses (except zip codes), Drug Enforcement Agency (DEA) Registration Numbers, State License Numbers, National Provider Identifiers (NPI—the provider identifiers used in CMS' NPPES database), or any other unique identifier that may allow direct identification of the provider. Most common provider identifiers include, but are not limited to, names, State License Number, DEA Registration Number, and/or NPI.
“Provider information,” as used herein, refers to information about the provider that cannot be used to specifically identify the provider. This information includes, but is not limited to geographic locations (such as zip codes), medical specialties, age, gender, and other demographic attributes. Here, a provider generally refers to anyone who is licensed or authorized to provide health care, such as a physician, dentist, or nurse practitioner. In a preferred embodiment, the medical service provider is licensed or authorized to provide health care or to issue a prescription for a drug.
Referring to the
Returning to
The hash function is a cryptographic primitive. Although another cryptographic primitive, such as a block cipher, can be used, the hash function is preferred because it generally has no inverse function that can recover the input from the hash function's output. The hash function maps a bit string of arbitrary length to another bit string of fixed length. Hash functions include Ripe-MD, Whirlpool, Haval, MD4, MD5, and the SHA group of hash functions. Preferably, the first hash function is from the SHA-2 family, in particular, SHA-256 which creates 256 bit hashes. The SHA family of hash functions was designed by the National Institute of Standards and Technology and is a Federal Information Processing Standard, as described by Federal Information Processing Standards Publication 180-2, dated Aug. 1, 2002. Federal Information Processing Standards Publication 180-2 also provides an algorithm and examples for implementing an SHA-256 hash function.
The processor 2 at the remote location 100 then creates an encrypted medical claim transaction data file 3, which includes the encrypted provider identifier. The original provider identifier data are not included (or NULL'ed out) so that the file cannot be used to specifically identify a provider. For example, using the data of
The file 3 is then periodically transmitted from the remote location 100 to a central location 200. The transfer is preferably a secured electronic transfer, more preferably via a secure file transfer protocol (sftp). The central location 200 can be remotely located from the data remote locations 100 or at the same location.
A key database 5 is provided at the central location 200. An illustrative example of the data from the key database 5 is shown in
A specialty database 6 is also provided at the central location. The specialty database 6 contains the APKs (referenced with respect to the key database 5 above) cross-referenced to provider information, such as medical specialty and/or geographic location information about each practitioner. This information can be obtained from public sources, such as the CMS NPPES database, the DEA Registration File, and various State Licensure databases. The public sources generally provide the medical service provider information along with identifiers. This information is then parsed to produce the specialty database 6 and the key database 5. An example of the data in the specialty database 6 may appear as shown in
At step 7, the processor 810 (see
A noted above, at step 4, the de-identified file 3 is periodically received at the central location 200 from the remote location 100, preferably via a secure file transfer protocol. The received file 3 contains only an encrypted identifier for each medical service provider, and is stored at the central location 200 as a transaction file 9. At step 10, a processor 810 matches the encrypted identifiers on each prescription claim transaction 9 to the encrypted identifiers stored in the encrypted database 8. If a match is found, the medical service claim transaction associated is then assigned the APK that is associated with the particular identifier from the encrypted database 8. If no successful match is achieved in step 10, then the prescription claim transaction is given a designated APK, for example 0 (zero), indicating that it cannot be linked to any medical service provider information.
With the assigned APK, the processor 810 can associate the medical service provider information from the specialty database 6 with the medical service claim transaction, as shown in
Although
Accordingly, the system allows the at least one remote location 100 to transmit prescription claim transaction data with encrypted identifier(s) to the central location 200.
This encrypted prescription claim transaction data is devoid of any provider identifier. The central location 200 then decrypts that data and fills in provider information obtained from publicly-available sources (as contained in the specialty database 6).
It should be noted that although the databases 5, 6, 8 and 12 are illustrated conceptually in
In addition, the medical claim transaction 1 may contain patient identification information. That information can be removed or the information otherwise de-identified to comply with privacy requirements. The present invention can process the provider information simultaneously with or separately from the processing of the patient information. The processes and systems for de-identifying patient identification information are, for example, disclosed in U.S. Patent Application Publication No. 2008/0147554, which is incorporated herein by reference.
Turning to
A computing platform is provided at each of the remote locations 100 and the central location 200 to perform the various functions and operations in accordance with the invention. The computing platform can be, for instance, a personal computer (PC), server or mainframe computer. The computing platform may also be provided with one or more of a wide variety of components or subsystems including, for example, a processor, co-processor, register, data processing devices and subsystems, wired or wireless communication links, input devices, monitors, memory or storage devices such as one or more database.
The system can be a network configuration or a variety of data communication network environments using software, hardware or a combination of hardware and software to provide the processing functions. All or parts of the system and processes can be implemented by computer-readable media, which has stored thereon machine executable instructions for performing the processes described. Computer readable media may include, for instance, hard disks, floppy disks, and CD-ROM or other forms of computer-readable memory such as read-only memory (ROM) or random-access memory (RAM). The processes of the invention can be implemented in a variety of ways and include other modules, programs, applications, scripts, processes, threads or code sections that interrelate with each other.
An embodiment of the system to carry out the above disclosed method is depicted in
The user interface 702 is in communication with the database 708 and the processor 2. The user interface 702 can be a desktop, handheld, and/or touch screen computing device or any other display and information input device. It preferably has a display 704 and an input device 706. The display 704 can be any device that presents information to the user. The input device 706 can be any device to electronically enter the medical service claim transaction data 1, such as, but not limited to, a keyboard, touch screen, mouse, scanner, digital camera, or other similar device for transmuting non-electronic information into electronic data.
The database 708 is in communication with the user interface 702 and the processor 2. The database 708 stores medical service claim transaction information data 1. The database 708 can be separate from the processor 2 or can be stored in memory internal to the processor 2. Though a single database 708 is shown in the embodiment of
The processor 2 is in communication with the user interface 702 and the database 708. The processor 2 preferably has one or more of the following modules: a data retrieval module 714, an extraction module 716, an encryption module 718, and a data transmission module 720. Each of the modules described herein has various sub-routines, procedures, definitional statements, macros, and other similar processes. Software is provided in the processor 2 to implement the operations performed at the remote location 100, including encrypting the provider identifiers and transmitting the encrypted medical service claim transactions. The software includes programming that embodies the data retrieval module 714, which retrieves the medical service claim data from the database 708, if such data is stored in a database; the extraction module 716, which extract the desired data from the medical service claim data; the encryption module 718, which encrypts the provider identifier; and the data transmission module 720, which controls the transmission 4 of the encrypted file 3 to the central location 200. In some embodiments, as illustrated in
A central system 800, located at the central location 200, is also shown in
The storage device 808 is in communication with the user interface 802 and the processor 810. The storage device 808 electronically stores medical service data and include the specialty database 6, the key database 5, and the encrypted database 8. Though a single storage device 808 is shown in the embodiment of
The processor 810 is in communication with the user interface 802 and the storage device 808. The embodiment of
however, in other embodiments, the functions of steps 7 and 10 can be separate and implemented by more than one processors. The processor 810 preferably has one or more of the following modules: a data reception module 814, an encryption module 816, an extraction module 818, and a data transmission module 820. Each of the modules described herein has various sub-routines, procedures, definitional statements, macros, and other similar processes. Software is provided in the processor 810 to implement the methods of these modules. The software includes programming that embodies the data receipt module 814, the encryption module 816, the extraction module 818, and the data transmission module 220. The description of each of the modules is used for convenience to describe the functionality of the processor 810 overall. Thus, the processes that are performed by each of the modules may be redistributed to one of the other modules, combined together in a single module, or made available in a shareable dynamic link library.
The modules 814-820 are programmed to carry out functions previously described for steps 7 and 10. The data receipt module 814 receives medical service claim transaction data transmitted from the remote system 700. The extraction module 818 extract data from the various database and compares the encrypted identifiers on each prescription claim transaction to the encrypted identifiers stored in the encrypted database 8 (function of step 10). The encryption module 816, containing the same encryption software as the encryption module 718 of the remote system 700, encrypts the identifiers from the key database 5 to produce the encrypted database 8 (function of step 7). The data transmission module 820 can be used to forward the provider file 812 to a provider file database 12 or to another location.
The user interface 802, the storage device 808, and the processor 810 can each be coupled to the Internet or a network such as a local area network (LAN) or wide area network (WAN). The system is not limited to hard-wired connections but can include wireless communication such as radiofrequency (RF), 802.11 (WiFi), Bluetooth or any combination of data communications paths. For example, the central location 200 can be implemented or incorporated as a single device such as a stand alone computer or a PDA or the storage device 808 can be placed on a remote server coupled to the Internet by hard-wired connections with other components located nearby in wireless communication with the Internet.
Although certain presently preferred embodiments of the invention have been specifically described herein, it will be apparent to those skilled in the art to which the invention pertains that variations and modifications of the various embodiments shown and described herein may be made without departing from the spirit and scope of the invention. Accordingly, it is intended that the invention be limited only to the extent required by the appended claims and the applicable rules of law.
This application claims priority to U.S. Provisional Patent Application No. 61/154,062, filed Feb. 20, 2009, the entire disclosure of which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
3752904 | Waterbury | Aug 1973 | A |
3896266 | Waterbury | Jul 1975 | A |
4979832 | Ritter | Dec 1990 | A |
4993068 | Piosenka et al. | Feb 1991 | A |
5003539 | Takemoto et al. | Mar 1991 | A |
5005200 | Fischer | Apr 1991 | A |
5070452 | Doyle, Jr. et al. | Dec 1991 | A |
5214702 | Fischer | May 1993 | A |
5299121 | Brill et al. | Mar 1994 | A |
5301105 | Cummings, Jr. | Apr 1994 | A |
5371797 | Bocinsky, Jr. | Dec 1994 | A |
5471382 | Tallman et al. | Nov 1995 | A |
5502764 | Naccache | Mar 1996 | A |
5581749 | Hossain et al. | Dec 1996 | A |
5606610 | Johansson | Feb 1997 | A |
5644778 | Burks et al. | Jul 1997 | A |
5652842 | Siegrist, Jr. et al. | Jul 1997 | A |
5664109 | Johnson et al. | Sep 1997 | A |
5666492 | Rhodes et al. | Sep 1997 | A |
5704044 | Tarter et al. | Dec 1997 | A |
5724575 | Hoover et al. | Mar 1998 | A |
5754938 | Herz et al. | May 1998 | A |
5758085 | Kouoheris et al. | May 1998 | A |
5758095 | Albaum et al. | May 1998 | A |
5787186 | Schroeder | Jul 1998 | A |
5793969 | Kamentsky et al. | Aug 1998 | A |
5799086 | Sudia | Aug 1998 | A |
5799308 | Dixon | Aug 1998 | A |
5821871 | Benzler | Oct 1998 | A |
5823948 | Ross, Jr. et al. | Oct 1998 | A |
5825906 | Obata et al. | Oct 1998 | A |
5832449 | Cunningham | Nov 1998 | A |
5867821 | Ballantyne et al. | Feb 1999 | A |
5876926 | Beecham | Mar 1999 | A |
5890129 | Spurgeon | Mar 1999 | A |
5907677 | Glenn et al. | May 1999 | A |
5915240 | Karpf | Jun 1999 | A |
5918208 | Javitt | Jun 1999 | A |
5920854 | Kirsch et al. | Jul 1999 | A |
5926810 | Noble et al. | Jul 1999 | A |
5956716 | Kenner et al. | Sep 1999 | A |
5961593 | Gabber et al. | Oct 1999 | A |
5970462 | Reichert | Oct 1999 | A |
5991731 | Colon et al. | Nov 1999 | A |
5995939 | Berman et al. | Nov 1999 | A |
6003006 | Colella et al. | Dec 1999 | A |
6012051 | Sammon, Jr. et al. | Jan 2000 | A |
6014631 | Teagarden et al. | Jan 2000 | A |
6018713 | Coli et al. | Jan 2000 | A |
6024287 | Takai et al. | Feb 2000 | A |
6079021 | Abadi et al. | Jun 2000 | A |
6085322 | Romney et al. | Jul 2000 | A |
6249768 | Tulskie, Jr. et al. | Jun 2001 | B1 |
6266675 | Evans et al. | Jul 2001 | B1 |
6302844 | Walker et al. | Oct 2001 | B1 |
6317700 | Bagne | Nov 2001 | B1 |
6341267 | Taub | Jan 2002 | B1 |
6397224 | Zubeldia et al. | May 2002 | B1 |
6421650 | Goetz et al. | Jul 2002 | B1 |
6449621 | Pettovello | Sep 2002 | B1 |
6496931 | Rajchel et al. | Dec 2002 | B1 |
6654724 | Rubin et al. | Nov 2003 | B1 |
6732113 | Ober et al. | May 2004 | B1 |
6734886 | Hagan et al. | May 2004 | B1 |
6874085 | Koo et al. | Mar 2005 | B1 |
6915265 | Johnson | Jul 2005 | B1 |
7184947 | Matsuoka et al. | Feb 2007 | B2 |
7200578 | Paltenghe et al. | Apr 2007 | B2 |
7309001 | Banfield et al. | Dec 2007 | B2 |
7376677 | Ober et al. | May 2008 | B2 |
7386526 | Chappel | Jun 2008 | B1 |
7823207 | Evenhaim | Oct 2010 | B2 |
8121868 | Grady et al. | Feb 2012 | B1 |
8131646 | Kocher et al. | Mar 2012 | B2 |
8374888 | Earles et al. | Feb 2013 | B2 |
20020002474 | Michelson et al. | Jan 2002 | A1 |
20020143434 | Greeven et al. | Oct 2002 | A1 |
20020198473 | Kumar et al. | Dec 2002 | A1 |
20030097358 | Mendez | May 2003 | A1 |
20040199781 | Erickson et al. | Oct 2004 | A1 |
20040215981 | Ricciardi et al. | Oct 2004 | A1 |
20050027564 | Yantis | Feb 2005 | A1 |
20050065824 | Kohan | Mar 2005 | A1 |
20050065912 | Cafrelli et al. | Mar 2005 | A1 |
20050165623 | Landi et al. | Jul 2005 | A1 |
20050234740 | Krishnan et al. | Oct 2005 | A1 |
20050236474 | Onuma et al. | Oct 2005 | A1 |
20050256740 | Kohan et al. | Nov 2005 | A1 |
20050256741 | Kohan et al. | Nov 2005 | A1 |
20050256742 | Kohan et al. | Nov 2005 | A1 |
20050268094 | Kohan et al. | Dec 2005 | A1 |
20060020611 | Gilbert et al. | Jan 2006 | A1 |
20060026156 | Zuleba | Feb 2006 | A1 |
20060288095 | Torok et al. | Dec 2006 | A1 |
20070100595 | Earles et al. | May 2007 | A1 |
20080059227 | Clapp | Mar 2008 | A1 |
20080076971 | Clapp | Mar 2008 | A1 |
20080091474 | Ober et al. | Apr 2008 | A1 |
20080120296 | Kariathungal et al. | May 2008 | A1 |
20080133273 | Marshall | Jun 2008 | A1 |
20080137848 | Kocher et al. | Jun 2008 | A1 |
20080147554 | Stevens et al. | Jun 2008 | A1 |
20090198519 | McNamar | Aug 2009 | A1 |
20100027780 | Jung et al. | Feb 2010 | A1 |
20100114607 | Kress et al. | May 2010 | A1 |
20100217973 | Kress et al. | Aug 2010 | A1 |
20130018727 | Earles et al. | Jan 2013 | A1 |
Number | Date | Country |
---|---|---|
0869637 | Oct 1998 | EP |
1026603 | Aug 2000 | EP |
6083847 | Mar 1994 | JP |
10021302 | Jan 1998 | JP |
WO-9515628 | Jun 1995 | WO |
WO-9641275 | Dec 1996 | WO |
WO-9642059 | Dec 1996 | WO |
WO-0077642 | Dec 2000 | WO |
WO-0118631 | Mar 2001 | WO |
Entry |
---|
“Electronic Medical Record Systems and Databases” (May 15, 2001) by Shixin Zhang and C. Forbes Dewey, Jr.; 33 pages; converted to PDF originally from http://icmit.mit.edu/sxzhang/healthcare/word.htm. |
“Selecting a database encryption solution” (Mar. 31, 2008) by Ulf Mattsson; 5 pages; converted to PDF originally from http://it.toolbox.com/wiki/index.php/Selecting—a—database—encryption—solution. |
U.S. Patent and Trademark Office, Office Action for U.S. Appl. No. 09/665,752, May 5, 2004, 5 pgs. |
U.S. Patent and Trademark Office, Office Action for U.S. Appl. No. 09/665,752, Mar. 4, 2005, 6 pgs. |
U.S. Patent and Trademark Officer, Office Action for U.S. Appl. No. 09/665,752, Dec. 16, 2005, 4 pgs. |
U.S. Patent and Trademark Office, Office Action for U.S. Appl. No. 09/665,752, Mar. 16, 2007, 7 pgs. |
U.S. Patent and Trademark Office, Office Action for U.S. Appl. No. 09/665,752, Jan. 25, 2008, 7 pgs. |
U.S. Patent and Trademark Office, Office Action for U.S. Appl. No. 09/665,752, Dec. 8, 2008, 8 pgs. |
J.D. Halamka, P. Szolovits, D. Rind, and C. Safran, A WWW Implementation of National Recommendations for Protecting Electronic Health Information, Journal of the American Medical Informatics Association, vol. 4, No. 6, Nov./Dec. 1997, pp. 458-464. |
R. Anderson, The DeCODE Proposal for an Icelandic Health Database, Oct. 20, 1998, pp. 1-12, www.decode.is. |
H. Bouzelat, C. Quantin and L. Dusserre, Extraction and Ananymity Protocol of Medical File, Proceedings of the American Medical Informatics Association Annual Fall Symposium, 1996, pp. 323-327, AMIA, Inc. |
K.R. Iversen and T.O. Grotan, Socio-technical aspects of the use of health related personal information for management and research, International journal of Bio-Medical Computing, vol. 43, 1996, pp. 83-91, Elsevier Science Ireland Ltd. |
A. Ohrn and L. Ohno-Machado, Using Boolean reasoning to ananymize databases, Artificial Intelligence in Medicine, vol. 15, 1999, pp. 235-254, Elsevier Science B.V. |
K. Kahl, G. Dickson, J. Kebisek and M. Powell, Bar code tracking system enhances record- and film-handling productivity, Top Health Rec Manage, vol. 12, No. 3, Mar. 1992, 1 pg., St. Joseph's Hospital, Milwaukee, WI, PubMed—indexed for MEDLINE. |
E.T. Carroll, S. Wright, C. Zakoworotny, Securely Implementing Remote Access within Health Information Management, Journal of AHIMA, vol. 69, No. 3, Mar. 1998, pp. 46-49, copied from the National Library of Medicine. |
F. Scheuren and P. Baier, HIPAA Certification for SDI's De-Identification Technology, Jun. 4, 2007, pp. 1-24, Washington, DC. |
English Translation of Japanese Office Action for co-pending application, Reference No. B025547, Mailing No. 571403, Mailing Date: Aug. 10, 2010, Patent Application No. 2001-525614. |
S. Chaudhuri, et al: An overview of Data Warehousing and OLAP Technology, Sigmod Record, Sigmod, New York, NY, US, vol. 26, No. 1, Mar. 199, (Mar. 1997), pp. 65-74, XP002193792, ISSN: 0163-5808. |
V.M. Brannigan and B. R. Beier, Patient privacy in the era of medical computer networks: a new paradigm for a new technology, Proceedings of the Eighth World Congress on Medical Informatics, vol. 8, No. 8, Jul. 23, 1995, Jul. 27, 1995, pp. 640-643, XP009040274, Vancouver, British Columbia, Canada, ISSN: 1569-6332. |
C. Quantin, et al. How to ensure data security of an epidemiological follow up: quality assessment of an anonymous record linkage procedure, International Journal of Medical Informatics, Elsevier Scientific Publishers, Shannon, IR, vol. 49, No. 1, Mar. 1998, pp. 117-122, XP004149470, ISSN: 1386-5056. |
R. J. Anderson, A security policy model for clinical information systems, Security and Privacy, 1996, Proceedings, 1996 IEEE Symposium on Oakland, CA, USA May 6-8, 1996 (May 6, 1996), pp. 30-43, XP010164923, ISBN: 0/8186-7417-2. |
Supplementary European Search Report of EP 00 96 5216. |
International Search Report of PCT/US00/25818. |
Secure Hash Standard, National Institute of Standards and Technology, Aug. 1, 2002, pp. i-iv and 1-79, Federal Information Processing Standards Publication 180-2 (+Change Notice to include SHA-224). |
Why Clearinghouses Transmit Electronic Claims to Insurance Carriers, and Why the Service They Provide is Essential to Medical Practices, Electronic Claim Clearinghouses, MPM Soft, Practice Billing Software, pp. 1-7, www.mpmsoft.com/EDI/clearinghouse.htm, printed Jan. 5, 2009. |
Number | Date | Country | |
---|---|---|---|
20100217973 A1 | Aug 2010 | US |
Number | Date | Country | |
---|---|---|---|
61154062 | Feb 2009 | US |