摘要:
Various embodiments concern a method which may include communicating medical information between a PIMD and an interface module via a first channel in compliance with a predetermined medical information regulatory standard, preventing access to the PIMD via the interface module other than through the first channel, detecting a communication protocol used by an available generic network access device, selecting a communication protocol rule set from a plurality of communication protocol rule sets to effect communication between the interface device and an available generic network access device of a plurality of generic network access devices, and transferring at least some of the medical information to the remote network via a second channel established between the interface module and the available generic network access device using the selected communication protocol rule set.
摘要:
Various embodiments concern a method which may include communicating medical information between a PIMD and an interface module via a first channel in compliance with a predetermined medical information regulatory standard, preventing access to the PIMD via the interface module other than through the first channel, detecting a communication protocol used by an available generic network access device, selecting a communication protocol rule set from a plurality of communication protocol rule sets to effect communication between the interface device and an available generic network access device of a plurality of generic network access devices, and transferring at least some of the medical information to the remote network via a second channel established between the interface module and the available generic network access device using the selected communication protocol rule set.
摘要:
An object oriented tool monitors the step-by-step progress of security administration within an electronic work flow to implement access control measures, and security administration policies that may include additional checks and balances, such as second party review, escalated authorization requirements, and trusted audit facilities. A security administration architecture for distributed electronic data processing systems preferably includes a checkpoint object that provides uniform characterization of milestone or transition states in administration activity, and which may be inherited by or refined to an administration activity object. A checkpoint object manager that is instantiated as a trusted third party object manages the state progression of checkpoint objects. As a result of checkpointing, checkpoint objects are resumed with their state advanced, reversed, or unchanged by the checkpoint object manager as appropriate. The checkpoint object manager also assures that all checkpoints are logged and monitored, and that resumptions are authenticated.