Embodiments relate generally to information networks, and more specifically to securely managing and storing individually identifiable information in web-based network environments.
Various websites have been developed to allow people to log and manage their personal information in varieties of different applications, such as health care and medical information, financial data, home energy consumption, and the like. When people subscribe to these websites, they are usually required to provide certain items of Identifiable Individual Information (denoted “III”), such as their real name, home address, telephone number, social security number, credit card number, and other sensitive information. Website providers generally take efforts to protect the privacy of these users of the web service. However, as long as this type of III exists in the database of the website, it is always in danger of being stolen or corrupted by malicious users or third parties (e.g., hackers), or the website provider itself.
A particularly relevant application involving the vulnerability of the use of III in a networked environment is the health care field, in which a person keeps all of their health information on a healthcare-related website so that they or a healthcare provider can track their health status. In such an environment, several parties, such as insurers, doctors, pharmacists, and so on, may have access to at least a portion of a person's records and their III. Since the personal health information is highly confidential, the user of the web service may hesitate to subscribe to the website if the website provider cannot adequately guarantee the safety and privacy of his or her III and health information, collectively referred to as Personal Health Data (“PHD”).
To alleviate the problems associated with maintaining two separate sets of health records, one of which, namely the user's, is typically very informal and often incomplete, online systems were developed to help doctors and patience maintain a single healthcare record. The World Wide Web (hereinafter, the “web”) has become a suitable platform for implementing aspects of the health care industry, such as in the transacting or delivering of health care services on-line. A significant number of hospitals and clinics throughout the world provide services to clients on various web sites for services such as, on-line counseling, remote monitoring of vital signs or virtual visits for refill of medications. Healthcare users can contact web sites to obtain specific health information, to appoint healthcare services being offered by a particular institution, or to transmit information from Personal Health Records (“PHR”) to care providers. Likewise, healthcare providers (e.g., physicians) can utilize website based registry tools for disease management decision support, and forwarding clinical information from the electronic medical records to a clients' PHR.
Through consumer expectations and legislation, it has become necessary for entities that store records containing identifiable personal information to secure the information so that it is not readily available to those users who do not need access to the information. For example, in 1996, the United States enacted legislation known as the Health Insurance Portability and Accountability Act (HIPAA) to impose strict privacy rules on the insurance and health care industries to protect internet users from misuse and unapproved dissemination of their personal information. Additionally, most modern websites use state of the art techniques to ensure the confidentiality of the data/information stored on their sites as well as data/information transferred over the Internet. In spite of these efforts, personal information is not always absolutely secure. With regulations such as HIPAA, which is intended to help protect a patient's privacy in their medical records, the issue of on-line privacy has become of paramount importance when dealing with highly sensitive information such as personal medical records.
Besides sensitive health related information, Personal Health Records also contain individual identifiable information, which may be considered sensitive in its own right, due to concerns such as identity theft, and the like.
In order to protect the privacy of patients through securing identifiable information within the database, efforts are also often made to de-identify protected identity information received or created in the course of business. De-identified records are data/information, alone or in combination with other information, that cannot readily or potentially be used to identify an individual. A company may need to de-identify a person's III so that the company may continue to search on the data/information and distribute the de-identified data/information to third parties. Such information might include contact information items such as the person's full name, address, e-mail, telephone number, social security number, and identifiable photographic images. In addition, some information about familial or social relationships identified by that association, i.e., spouse, father, mother, sister, friend, social contact, employer, etc. may also be de-identified as well. Information of this type is deemed “contextual” since it is usually unverified information and is used to provide background information important to the health conditions or diseases management of the subject. In most cases, however, a health care provider will access subject information that is individually identifiable and necessary to understand the health, medical history, life experiences, or behavior of the subject and which is relevant to the health problems being addressed. By de-identifying III, an individual's identity and personal information that may identify that individual will still need to be protected. Traditionally, companies de-identify records by stripping out all III from those records. But this is effectively just a hidden processing technique in that actual storage of all III in database table remains in existence somewhere in the system's memory. Despite all efforts to de-identify data, the data still exists and remains vulnerable to exposure and misuse.
What is desired, therefore, is a health record system, or other user-based information system that allows shared access to user information and that stores no individually identifiable information of the user so that the privacy of the user can be absolutely protected. What is further desired is a method of storing a user's information on a website without any individually identifiable data/information (de-identified in nature), and that still allows an authorized care provider to be able to access the users' data/information on that website individually and in a contextually identifiable manner.
Embodiments of the present invention are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:
All patents and patent applications that are referenced herein are hereby incorporated by reference in their entirety.
Embodiments of the current invention relate to systems and methods for securing healthcare users' privacy by using de-identified database on a website. A care alliance is formed between a patient (user) and a care or service provider. The authorized care provider processes the user's health information that is individually identifiable by a specific re-identifying way. Users can terminate the alliance any time, and the provider is no longer able to access the user's information. A system for using a de-identified database to secure users' privacy, and a method of using alliance-based III information allows care providers to process health information that must be individually identifiable, i.e., the identity of the subject is readily ascertained by the authorized care provider for on-line services. This is achieved by building an alliance among three parties: the website, the user, and the service provider who guides the user.
In an embodiment, a dual-portal web-based system is implemented that provides healthcare related information to healthcare users through a first website, and registry/management tools to care providers through a second website. No identifiable fields relating to the user, such as name, birth date, address, e-mail address, telephone/fax number, Social Security ID, relatives and employers, is stored or accessible in the database of the first website. All user information is de-identified by total exclusion from the database, rather than by merely stripping-out true identity information from database prior to exchange or usage. Any record retrieved from this database alone can never allow anyone but an authorized care provider to identify an individual. A re-identification process allows an authorized care provider to view his or her clients in combination with registered personal information from the system. The re-identification process is enabled through the use of an ABID (alliance-based ID) key that associates the de-identified data with the fully identifiable user data. When accessing user information in the registration pages of the second website, the system enables fully identifiable personal information to be displayed in sufficient detail as well as the de-identified health data/information from the first database. In an embodiment, the re-identifying process is limited to a session-specific protocol so that the identity related dataset can only store temporarily information in the system's Random Access Memory (RAM) during the login-to-logout time interval of a successful authentication session of a care-provider.
In an embodiment, a token generation process generates tokens that allow different ABID keys to be generated for use with different care providers through a single user account.
In the following description, numerous specific details are introduced to provide a thorough understanding of, and enabling description for, embodiments of the web-based secure and private personal information management system in applications such as the healthcare industry. One skilled in the relevant art, however, will recognize that these embodiments can be practiced without one or more of the specific details, or with other components, systems, etc. In other instances, well-known structures or operations are not shown, or are not described in detail, to avoid obscuring aspects of the disclosed embodiments.
Aspects of the one or more embodiments described herein may be implemented on one or more computers or computing devices executing software instructions. The computers may be networked in a client-server arrangement or similar distributed computer network.
In one embodiment, a user of client computer 202 is a healthcare patient who accesses one or more server computers, such as physician computer (PC) 204, to request services from the physician or care provider. Data transferred in network 200 is enabled by one or more World-Wide Web (WWW) servers that store data in the form of web pages and transmit these pages as Hypertext Markup Language (HTML) files over the Internet 210 to other server and client computers using web server processes. For this embodiment, the server and client computers typically run web browser programs e.g., web browser 212 to access the web pages served by server computers and any other available content provider or supplemental servers. The target websites served by the web servers typically contain their own content as well as hyper links to other sites or content directly served into the target web page from separate server computers. For purposes of the following description, web pages that are served to visitors may be served by a destination website from a web server computer that is accessed through one or more intermediate websites, or it may be a web page that is accessed directly on a target website by the visitor. Unless otherwise stated, it should be understood that the term “web page” may represent an entire web page, or a portion of a web page displayed on the visitor client computer. Likewise, it may represent a component of a page. In a general meaning, a web page may be any type of directed content that is served directly or indirectly from a server computer to the visitor client computer over a network.
For the embodiment illustrated in
In an embodiment, a system server 206 in network system 200 is a server computer that executes an information management process 236. Client versions of one or more of the processes or modules for this server process may be executed on any of the physician and or the client computers 204 and 202. The information management process 236 may represent one or more executable programs modules that are stored within network server 206 and executed locally within the server. Alternatively, however, it may be stored on a remote storage or processing device coupled to server 204, 202 or network 210 and accessed by a server to be locally executed. In a further alternative embodiment, the information management process 236 may be implemented in a plurality of different program modules, each of which may be executed by two or more distributed server computers coupled to each other, or to network 210 separately. The information management process 236 includes one or more separate processes, such as authentication process 242, ABID (alliance-based ID) management process 244, advanced search engine 246, and re-identification process 248.
In one embodiment, the system of
The database 304 can also be accessed by a separate website provided for the service provider (clinician).
Access to the PHR information for the patient that is stored in database 304 is controlled through an alliance relationship that is established between the patient and the clinician. In most circumstances, the clinician is a physician such as family doctor or general practitioner who is the principal health care provider for the patient. Alternatively, the clinician may be a specialist, consultant, pharmacist, or other care provider who provides care related to the health of the patient and who may need to access the patient's PHR information. In an embodiment, the alliance relationship is established by a physical act of the patient visiting the clinician's office or place of business and authorizing this person to managing the health, or a specific health problem for the patient. Once the alliance formed, the clinician (e.g., physician) can act as an authorized relationship based care provider and the alliance will hold the doctor accountable for health outcome. Depending upon actual insurance or business implementation, the physician may receive a yearly extra money reward from a payer (e.g., insurer), which is paid according to accountability indicators, health outcome indicators, and cost saving from virtual capitation adjusted by global budget, and other like factors.
The system includes mechanisms whereby either the patient or doctor can terminate the relationship when either party desires, such as when mutual trust is compromised or the two parties do not cooperate well with each other, or any other appropriate reason.
The alliance-based authorization requires registration of the physician with the system.
Upon input of the required information, the access control server accredits the role identity of the care provider, block 510. The accreditation decision is performed in block 512. If the provider is not accredited, such as due to erroneously entered information or lack of appropriate credentials, the care provider is re-prompted to enter the information from block 506. Upon successful accreditation, the access control server transmits a successful approval message to the authentication server, block 514. The authentication server responds to the applicant indicating a valid user status and transmits an e-mail message to the provider requesting confirmation, block 516. The e-mail message may include the login identifier and password for the provider to use. In block 518, the provider accesses the web page referenced by a hyperlink in the e-message and inputs the appropriate login identifier and password to complete the registration.
The alliance based authorization process thus allows the provider to access the website of clinician portal by presenting a unique ID and password. The provider then makes a request to create a PHD account via clinician portal for his or her patient.
The provider registration process of
Once an alliance-based relationship is established between a provider and a patient, a health account is created within the system for this patient-provider alliance.
Once the provider who has logged on is proven valid through successful authentication and the other security mechanisms, the request for creating PHD account is sent to an algorithmic rule server to create an ABID-indexed PHD account in the database 304. The data/information in the PHD account is totally de-identified, that is, any information that serves to identify the patient, such as name, birth date, address, e-mail address, telephone/fax number, Social Security ID, relatives and employers, will not be present and/or stored in the database. As shown in block 612 of
The Electronic Health Record (EHR) server generates an encrypted ABID-indexed identity configuration XML file and stores this in a certain path for a URL (Uniform Resource Locator) of the website, and sends a public key to the patient's PHR account, block 616. The EHR server is generally maintained by a trusted entity and stores the HI of the patient in a database that is separate from the patient PHR database 304. The EHR server may be maintained by a CIS or HIS system that may include an add-on component that enables the care provider to register his or her patients, and produce an III-XML file from certain table elements of the EHR database by which the data/information viewed by doctor will be re-identified in the care provider portal website 406. The ABID key created in block 612 is returned to the provider's website, and a contemporaneously created III-XML file is created and stored as a specific path and file name in the database 304.
The individual identifying information (III) for each patient of a particular doctor is stored on a computer managed by that doctor. Thus, in the example of
As can be seen in
The re-identified patient data can be provided in response to several different use scenarios related to requests for information about a patient by a physician, care provider, lab, insurance company, and so on. Among the most common use cases is where a physician pulls up a patient's records in order to provide care requested by the patient, such as in a diagnostic appointment, emergency, or regular doctor visit. The authorized physician logs onto the PHR website and is validated as an authorized party to receive the re-identified patient data.
The advanced search engine 246 can be configured to allow various different types of searches of PHR information related to many different aspects of health care. Searches by patient name are common, but other types of searches are also possible, such as by location, date of birth, medications, diseases, and the like.
The de-identified database system is generally accessed by a physician or other care provider logging onto the PHR website, and validating himself by inputting the registered ID and password. Using the advanced search engine 246, the physician can request the health records of specific patients or conditions. The ABID management process 244 creates all ABID indexed de-identified health accounts that match the search criteria. The ABID file is transmitted to the physician computer, which then calls a web service to get the III-XML file for the defined target population, which is then transmitted to the physician computer 204.
A physician accessing the PHR server for the first time will need to register to before being acknowledged as a validated member. For security reasons, the PHR database 228 provides only de-identified information, and the physician will need to obtain the patient's III information from a separate source else or from his or her own computer 204. A re-identification process 248 uses the ABID indexed III records and the PHR data to form combined ABID-III records for the physician.
Under an embodiment, a re-identification process serves to associate the III information with the health record information for a specific patient and in response to a particular query or other fetch process. The re-identification process can be implemented in various ways depending upon the actual network and system configuration. For example, the re-configuration may be implemented as a software process executed on the care provider computer, or a separate network server computer, or it may be implemented as a hardware component or apparatus coupled to the network.
As stated above, the ABID key is the mechanism by which the III information for a patient is associated with the health record data for that patient. An ABID management process 1116 generates the ABID key based on the provider data. The re-identification process uses the III indexed by an ABID key to associate the corresponding health record data for display on the provider computer. In an embodiment, the re-identification process may be initiated by an algorithmic search, or by a query.
As shown in
Embodiments of the system allow the re-identifying of information that can be displayed to the healthcare users. In this case, re-identification processes can be implemented in the client computer 212 or in a component (apparatus or software process) accessible to the client computer. In this manner, the de-identified health record information can be joined with the corresponding ABID-indexed III information that may be provided back from the provider's database. This arrangement allows the health care users to update their personal information related to the patient III data.
The de-identified database structure and restricted access patient database described herein provides robust and efficient protection of private patient data through mechanisms that include: enhancing the authentication by software applications or hardware devices; de-identifying health data/information by anonymous exchange during transaction; encrypting and decrypting the data/information by public-to-private key pairs; and linking users' computer in a close network (e.g. virtual private network, VPN) as a trusted delivery networks while maintaining privacy through security procedures and tunneling protocols. A first database stores the existing identifiable data/information fields in related table, such as name, address, birth date, e-mail, telephone number, social security number, among others. This is the information within most systems that is vulnerable to theft or unauthorized dissemination or access of personally sensitive private health data/information. This information is protected by its exclusion from any database that contains health record or other data related to the patient. That is, the substantive health record information is stored in a second database that is separate from the first database. Only authorized care providers specified by the healthcare user is allowed to view and manage the patient's health data/information with corresponding III data/information.
An ABID key mechanism is used to index the III and health data information and is used by a re-identification process that joins or combines these two components of data for display to the provider and/or user. The re-identifying process involves at least two different internet protocols to support the full data view in the care provider web browser.
Although embodiments have been described with respect to a web-based implementation, other systems incorporating an ABID key and a re-identification process acting on III and PHD/I information stored in two separate databases can be implemented on other platforms. For example, a USB flash memory device, or similar portable, persistent memory device can be used to transfer relevant data. In this embodiment, a website provides the web service that a person could put his health related info/data on the server of the platform but that does not include any III. A physician also subscribes to the website and receives a memory stick to store III of the patient. When the patient visits the physician, the physician logs in to the web service account and adds the person into his management list, and the alliance is built between the person and the physician. The III of the person, which is stored in a CIS or HIS system will be downloaded into the memory stick. An ABID key will then be generated by the website and stored in the memory stick (the key box) and the III can be addressed by the key (ABID) in the key box.
The person could see his own health information/data without III on the website. By opening the key box through a password of the physician and the memory stick, and using the ABID key, the physician can open the file that stores the III file addressed by the ABID. This allows the physician to search the health data/information which belongs to the person. A re-identification process combines the two separate III and PHD/I parts together to produce a completed identifiable personal health record (PHR) for the physician.
For the embodiments described above, a user account is designated with an ABID in accordance with a healthcare provider with whom the user applies for service. The ABID offers a re-identification mechanism that allows the service provider to access the user's de-identified data from a database accessible through a website. In many cases, a user may rely on a variety of different service providers to fill various needs related to his or her total health. For example, a user may have a general practitioner or family physician as a main doctor and various other specialists to provide other services, such as pharmacists, gynecologists, pediatricians, surgeons, and so on. Each of these service providers may need to access the same body of III information, or parts of the user's III information. In an embodiment, the ABID management system includes a token mechanism which allows a user to register for different healthcare providers with a unified user account. A single user account can be designated with a plurality of ABIDs corresponding to several healthcare providers without the need of replicating and storing the data in various databases. With a single user account, the user service records and information can be shared among different healthcare providers in a way that facilitates patient-centered coordination and integration of healthcare services.
As shown in
In an embodiment, the token for each user is generated through a token generation process that takes certain input and generates a unique token for each user.
In an embodiment, the tokens are generated by a service provider associated with the data transmission service in system 100 of
With the token, the user then approaches the healthcare provider to apply for a new service or care session, step 1706. The service provider then enters the user provided token into the HIS/CIS or PHR database 228, step 1708. In an embodiment, the HIS/CIS database is configured to recognize and process tokens to generate the ABID keys for use in the re-identification and indexing process between the III and de-identified data for the user.
When the token is input into the HIS/CIS database, a verification process checks to see whether or not the token has been used before or is a new token, step 1710. If the token is not new, the token is used to access and recall the registered user account corresponding to the token, step 1712. The process then proceeds with the generation of the ABID specifically for the user and the healthcare provider, step 1716, and as described previously in the present detailed description. If, in step 1710, it is determined that the token has not previously been used and is new, the system builds a new user account for the user, step 1714. This step involves registering the user and setting up a user account containing certain information regarding the user. Once the new user account is established, the ABID is then generated for the user, step 1716.
Embodiments have been described with respect to a computer-implemented method of providing a restricted access database containing de-identified user information for use by a service provider, wherein the method comprises:
Although embodiments have been described with respect to health industry applications in which the care provider is a physician, the user is a patient, and the patient data comprises health related PHR or PHD/I information, it should be understood that the embodiments are applicable to any system in which any type of private data of an individual is stored for use by a third party, such as financial management, fitness training, diet management, and the like.
Aspects of the de-identified database structure described herein may be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices (“PLDs”), such as field programmable gate arrays (“FPGAs”), programmable array logic (“PAL”) devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits. Some other possibilities for implementing aspects include: microcontrollers with memory (such as EEPROM), embedded microprocessors, firmware, software, etc. Furthermore, aspects of the content serving method may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types.
It should also be noted that the various functions disclosed herein may be described using any number of combinations of hardware, firmware, and/or as data and/or instructions embodied in various machine-readable or computer-readable media, in terms of their behavioral, register transfer, logic component, and/or other characteristics. Computer-readable media in which such formatted data and/or instructions may be embodied include, but are not limited to, non-volatile storage media in various forms (e.g., optical, magnetic or semiconductor storage media) and carrier waves that may be used to transfer such formatted data and/or instructions through wireless, optical, or wired signaling media or any combination thereof. Examples of transfers of such formatted data and/or instructions by carrier waves include, but are not limited to, transfers (uploads, downloads, e-mail, etc.) over the Internet and/or other computer networks via one or more data transfer protocols (e.g., HTTP, FTP, SMTP, and so on).
Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words “herein,” “hereunder,” “above,” “below,” and words of similar import refer to this application as a whole and not to any particular portions of this application. When the word “or” is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.
The above description of illustrated embodiments of the de-identified database structure is not intended to be exhaustive or to limit the embodiments to the precise form or instructions disclosed. While specific embodiments of, and examples for, processes in Internet search engines are described herein for illustrative purposes, various equivalent modifications are possible within the scope of the disclosed methods and structures, as those skilled in the relevant art will recognize.
The elements and acts of the various embodiments described above can be combined to provide further embodiments. These and other changes can be made to the web page optimization method in light of the above detailed description.
In general, in the following claims, the terms used should not be construed to limit the disclosed method to the specific embodiments disclosed in the specification and the claims, but should be construed to include all operations or processes that operate under the claims. Accordingly, the disclosed structures and methods are not limited by the disclosure, but instead the scope of the recited method is to be determined entirely by the claims. While certain aspects of the disclosed system and method are presented below in certain claim forms, the inventors contemplate the various aspects of the methodology in any number of claim forms. For example, while only one aspect may be recited as embodied in machine-readable medium, other aspects may likewise be embodied in machine-readable medium. Accordingly, the inventors reserve the right to add additional claims after filing the application to pursue such additional claim forms for other aspects
The current application is a continuation-in-part application of U.S. patent application Ser. No. 12/614,209, filed on Nov. 6, 2009 and entitled “System and Method for Securely Managing and Storing Individually Identifiable Information in Web-based and Alliance-based Networks,” which is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | 12614209 | Nov 2009 | US |
Child | 12950035 | US |