Regulatory Compliant Transmission of Medical Data Employing a Patient Implantable Medical Device and a Generic Network Access Device
    1.
    发明申请
    Regulatory Compliant Transmission of Medical Data Employing a Patient Implantable Medical Device and a Generic Network Access Device 有权
    使用病人植入式医疗设备和通用网络接入设备的医疗数据的监管合规传输

    公开(公告)号:US20120124210A1

    公开(公告)日:2012-05-17

    申请号:US13357399

    申请日:2012-01-24

    IPC分类号: G06F15/173

    CPC分类号: H04L65/1069 A61N1/37282

    摘要: Various embodiments concern a method which may include communicating medical information between a PIMD and an interface module via a first channel in compliance with a predetermined medical information regulatory standard, preventing access to the PIMD via the interface module other than through the first channel, detecting a communication protocol used by an available generic network access device, selecting a communication protocol rule set from a plurality of communication protocol rule sets to effect communication between the interface device and an available generic network access device of a plurality of generic network access devices, and transferring at least some of the medical information to the remote network via a second channel established between the interface module and the available generic network access device using the selected communication protocol rule set.

    摘要翻译: 各种实施例涉及一种方法,其可以包括:通过符合预定医疗信息管理标准的第一信道在PIMD和接口模块之间传送医疗信息,防止经由接口模块而不是通过第一信道访问PIMD,检测 由可用通用网络接入设备使用的通信协议,从多个通信协议规则集中选择通信协议规则集,以实现接口设备与多个通用网络接入设备中的可用通用网络接入设备之间的通信,以及传送 通过使用所选择的通信协议规则集在接口模块和可用的通用网络接入设备之间建立的第二信道到远程网络的至少一些医疗信息。

    Checkpoint object
    3.
    发明授权
    Checkpoint object 失效
    检查点对象

    公开(公告)号:US6035399A

    公开(公告)日:2000-03-07

    申请号:US422206

    申请日:1995-04-07

    摘要: An object oriented tool monitors the step-by-step progress of security administration within an electronic work flow to implement access control measures, and security administration policies that may include additional checks and balances, such as second party review, escalated authorization requirements, and trusted audit facilities. A security administration architecture for distributed electronic data processing systems preferably includes a checkpoint object that provides uniform characterization of milestone or transition states in administration activity, and which may be inherited by or refined to an administration activity object. A checkpoint object manager that is instantiated as a trusted third party object manages the state progression of checkpoint objects. As a result of checkpointing, checkpoint objects are resumed with their state advanced, reversed, or unchanged by the checkpoint object manager as appropriate. The checkpoint object manager also assures that all checkpoints are logged and monitored, and that resumptions are authenticated.

    摘要翻译: 面向对象的工具监视电子工作流程中安全管理的逐步进展,以实施访问控制措施,以及可能包括额外的检查和平衡的安全管理策略,例如第二方审核,升级的授权要求和可信任的 审计设施。 用于分布式电子数据处理系统的安全管理架构优选地包括检查点对象,其提供管理活动中的里程碑或过渡状态的统一表征,并且可以由管理活动对象继承或改进。 被实例化为受信任的第三方对象的检查点对象管理器管理检查点对象的状态进度。 作为检查点的结果,检查点对象由检查点对象管理器根据需要恢复其状态高级,反向或不变。 检查点对象管理器还确保记录和监视所有检查点,并对该恢复进行身份验证。