Abstract:
Methods and systems for continuously and quantitatively assessing the risk to data confidentiality, integrity, and availability on identified on endpoints, servers, medical devices, and “Internet of things” devices in a networked healthcare environment monitor resource requests by user applications running on the various device. A map of resource usage by each application may be generated. Based on the map and a risk model (e.g., the contents of a risk database), application events associated with risks are detected and resources vulnerable to the risk may be identified.
Abstract:
Computer-implemented systems and methods automatically track the dynamic composition of a patient-care team by combining and harvesting information from at least two electronic audit trails: (1) a trail recording access to electronic medical records (EMR), e.g., read-access to patient data, electronic prescriptions and physician orders, etc., and (2) a trail recording electronic communications (email, text messages, etc.) regarding and referencing the patient.
Abstract:
Computer-implemented systems and methods automatically track the dynamic composition of a patient-care team by combining and harvesting information from at least two electronic audit trails: (1) a trail recording access to electronic medical records (EMR), e.g., read-access to patient data, electronic prescriptions and physician orders, etc., and (2) a trail recording electronic communications (email, text messages, etc.) regarding and referencing the patient.
Abstract:
Computer-implemented systems and methods automatically track the dynamic composition of a patient-care team by combining and harvesting information from at least two electronic audit trails: (1) a trail recording access to electronic medical records (EMR), e.g., read-access to patient data, electronic prescriptions and physician orders, etc., and (2) a trail recording electronic communications (email, text messages, etc.) regarding and referencing the patient.
Abstract:
Representative embodiments of secure authentication to a resource in accordance with a predefined, electronically stored quorum-based authentication policy include causing electronic interaction among multiple devices that constitute a quorum in accordance with the policy, computationally determining whether the interaction satisfies the policy, and if so, electronically according access to the resource to one or more individuals associated with the interacting device(s).
Abstract:
A user of a client device that executes a remote application is authenticated by first receiving an HTTP or HTTPS request to authenticate the user from the remote application. The user is prompted for authentication information, and authentication information is obtained by communicating with a hardware device in electronic communication with the client device. The user's authorization to use the remote application is then verified using a computer processor and using the authentication information.
Abstract:
Requests to gain access to secure resources are adjudicated according to authentication policies that include rules based on user-states derived from multiple heterogeneous access-control systems. Comprehensive user authentication and access control based on rules and policies that encompass a user's status in multiple access-control systems, including both logical access (e.g., Active Directory, RADIUS, Virtual Private Network, etc.) as well as physical access (e.g., card-based) control systems, may be realized.
Abstract:
An interface system that facilitates user interaction with a plurality of document-management programs, each of which may require different data formats, and convenient output of data generated by such programs to recording or display devices. The invention includes a "front end", which accepts user commands and channels them to a designated application program; and a "back end", which converts output data into a form compatible with a selected output device or display, and which can simultaneously drive display of data from a plurality of application programs. The system operates using a common set of raster-image instructions; output and display data from an application program are converted into this common set of instructions before being provided to a selected output or display device. The system can store multiple display lists in segregated memory partitions, and then combine the lists according to a user-defined "mapping" procedure to produce a single, integrated display.
Abstract:
Convenient sharing of information among authorized network users may be facilitated by allowing a user to send information originating from multiple applications in aggregate form to another user, e.g., using a secure messaging service. In scenarios where data access is restricted, a server may check the recipient's access privileges prior to forwarding the information to her.
Abstract:
Firmware updates for, e.g., thin client devices may be achieved in a seamless, non-disruptive manner using a two-stage firmware loader, including a base loader pre-installed on the device and a caching loader downloaded, by the base loader, from a firmware server and thereafter responsible for downloading and updating other firmware application packages.