Abstract:
Die Erfindung betrifft ein Verfahren zum Bereitstellen und Prüfen der Gültigkeit eines virtuellen Dokuments (204) auf einem ersten Computersystem (152). Das virtuelle Dokument (204) wird mittels eines mobilen zweiten Computersystems (102) für das erste Computersystem (152) bereitgestellt. Das Verfahrenumfasst: - Empfangen einer passwortgeschützten Speicheradresse (110) einer ersten Datenbank (202),unter der das virtuelle Dokument (204) auslesbar ist, - Auslesen des virtuellen Dokuments(204), - Anzeigen des virtuellen Dokuments (204) auf einem Display (174) des ersten Computersystems (152), - Empfangen eines eindeutigen zweiten Identifikators (111) des mobilen zweiten Computersystems (102), - Berechnen eines dritten Identifikators unter Verwendung des empfangenen zweiten Identifikators (111) und eines Hashwerts des virtuellen Dokuments (204), - Identifizieren des Datenbankeintragsder zweiten Datenbank(212),in welchem ein erste Identifikator (214) einer ersten Paarung aus dem mobilen zweiten Computersystem (102) und dem ersten virtuellen Dokument (204) gespeichert ist, - Vergleichen des berechneten dritten Identifikators mit dem in dem identifizierten Datenbankeintrag gespeicherten ersten Identifikator (214).
Abstract:
A presente invenção trata de um sistema e um método de monitoramento simultâneo e sincronizado de dados, em que cada equipamento transcodificador (12, 22 e 32) é habilitado a se conectar, através de uma estrutura de rede sem fio WLAN (4), a um equipamento concentrador (5), e em que cada equipamento transcodificador (12, 22 e 32) é responsável por receber os dados de um respectivo equipamento provedor de dados (11, 21 e 31) através de uma porta serial, criptografá- los e posteriormente transmiti-los para o equipamento concentrador (5), em que o equipamento concentrador (5) é responsável por aguardar uma comunicação (501) e associar um contexto paralelo de processamento (502) para cada equipamento transcodificador (12, 22 e 32), e por meio de cada um deles, realizar uma interação com os equipamentos provedores de dados (11, 21 e 31) e receber os dados de forma simultânea e sincronizada (503), utilizando o protocolo de comunicação serial nativo de cada equipamento provedor de dados (11, 21 e 31) com suas respectivas velocidades de transmissão serial, além de garantir que os dados recebidos pelo equipamento concentrador (5) possuam a informação de georeferência (504) e a informação de referência temporal (505), sincronizar e finalizar contextos paralelos de processamento (507), criar as séries temporais (200) e enviá-las (508) a uma nuvem (7).
Abstract:
A computer-implemented method for generating a longitudinal data profile from multiple disparate data sources is provided. The method includes storing, at a central data hub, first de-identified data received from a first data source, the first de-identified data including a plurality of data records having encrypted identifying data and an anonymous ID assigned to each record, wherein the anonymous ID is assigned based on a master list that includes a list of identifiers and corresponding anonymous IDs for each identifier. The method further includes storing second de-identified data received from a second data source, and storing third de-identified data received from a third data source. The method further includes processing the first, second, and third de-identified data to link the first, second, and third de-identified data using the anonymous ID, and generating the longitudinal data profile from the linked first, second, and third de-identified data.
Abstract:
Embodiments of present invention provide a system and method for electronic evaluation of candidates. The system provides a central server adapted to be communicably coupled to a plurality of client devices. Graders/evaluators may generate a gradation test that is stored on the central server or any other server communicably coupled thereto. The central servers makes available, to duly authenticated client devices, through exam-center servers, the gradation test over a secure channel, which may be answered by the candidates electronically. The answers of candidates, including answers written in their own handwriting using a tablet and stylus, are stored on the central server and made available to duly authenticated grader/evaluators for evaluation. The present invention enables evaluation to be carried out in a time-effective and cost-efficient manner with utmost security.
Abstract:
Systems, methods, and apparatuses for identifier matching and management are described herein. In various embodiments, the system includes a distributed architecture for receiving and matching public and secure identifiers associated with a particular consumer. In particular embodiments, the system uses the matched public and secure identifiers to transmit one or more messages to the particular consumer.
Abstract:
A system and method for obtaining manufacturer-signed content for use with manufacturer equipment is provided. Content is obtained at a merchant device for executing or presenting on manufacturer equipment. A signature is generated for the content based on a private key. The merchant device transmits the content and signature to a manufacturer server. The manufacturer server decrypts and authenticates the signature based on the private key or a corresponding public key. If authenticated, the manufacturer server re-signs the content with a manufacturer signature that allows the content to be presented or executed on manufacturer equipment.
Abstract:
Embodiments facilitate confidential and secure sharing of anonymous user profile data to improve the delivery of customized content. Embodiments of the invention provide a data appliance to an entity such as a business to convert profile data about the business's customers into anonymous identifiers. A similar data appliance is provided to a content provider in one embodiment to generate identifiers for its user profile data. Because the anonymous identifiers are generated with the same anonymization method, identical identifiers are likely generated from profile data of the same users. Therefore, the identifiers can be used to anonymously match the customers of the business to the users of the content provider. Therefore, data can be shared to improve customized content such as advertisements that the business wishes to place with the content provider without requiring the business to disclose customer data in an unencrypted form, and any non-matched data can remain confidential.
Abstract:
A method performed by a processing system includes encrypting an electronic health record of a patient using a record key, encrypting a portion of a node of a metadata tree of the patient with a node key, the portion including a reference to the encrypted record in an encrypted data store, and updating the metadata tree for the patient to include the encrypted node and a node key lockbox with the node key.
Abstract:
An e-book system receives and stores different versions of an e-book supporting different consumption modes. Additionally, the e-book system stores signposts for the e-book. The signposts include corresponding locations in different versions of the e-book. When a user switches from a first version to a second version, the e-book system determines based on the signposts a location in the second version of the e-book that corresponds to the current location in the first version. The e-book system then presents the content in the second version from the determined location.
Abstract:
Die Erfindung betrifft ein Authentisierungssystem, ein mobiles, elektronisches Gerät (G), eine Instanziierungseinheit (I) und ein Verfahren, sowie ein Computerprogrammprodukt zur Authentisierung eines Patienten gegenüber einer zentralen Registry (10), die in Datenaustausch mit einem Repository (12) zur Speicherung von medizinischen Datensätzen steht. Auf das Mobilfunkgerät (G) wird eine individualisierte Applikation (V) geladen und installiert, um Nachrichten an die Registry (10) mit einer Signatur (SIG) zu signieren. Die Signatur kann in der Registry (10) ausgelöst werden, um die Authentizität des entfernten Patienten zu überprüfen, um den Datenzugriff aus zuführen.