AU2021100235A4 - Patient safety and privacy-preserving in e-health using internet of things - Google Patents
Patient safety and privacy-preserving in e-health using internet of things Download PDFInfo
- Publication number
- AU2021100235A4 AU2021100235A4 AU2021100235A AU2021100235A AU2021100235A4 AU 2021100235 A4 AU2021100235 A4 AU 2021100235A4 AU 2021100235 A AU2021100235 A AU 2021100235A AU 2021100235 A AU2021100235 A AU 2021100235A AU 2021100235 A4 AU2021100235 A4 AU 2021100235A4
- Authority
- AU
- Australia
- Prior art keywords
- health
- privacy
- things
- patient
- internet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/0002—Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network
- A61B5/0015—Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network characterised by features of the telemetry system
- A61B5/0022—Monitoring a patient using a global network, e.g. telephone networks, internet
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/0002—Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network
- A61B5/0015—Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network characterised by features of the telemetry system
- A61B5/0024—Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network characterised by features of the telemetry system for multiple sensor units attached to the patient, e.g. using a body or personal area network
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y30/00—IoT infrastructure
- G16Y30/10—Security thereof
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B2562/00—Details of sensors; Constructional details of sensor housings or probes; Accessories for sensors
- A61B2562/02—Details of sensors specially adapted for in-vivo measurements
- A61B2562/0219—Inertial sensors, e.g. accelerometers, gyroscopes, tilt switches
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/0002—Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network
- A61B5/0004—Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network characterised by the type of physiological signal transmitted
- A61B5/0006—ECG or EEG signals
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/02—Detecting, measuring or recording pulse, heart rate, blood pressure or blood flow; Combined pulse/heart-rate/blood pressure determination; Evaluating a cardiovascular condition not otherwise provided for, e.g. using combinations of techniques provided for in this group with electrocardiography or electroauscultation; Heart catheters for measuring blood pressure
- A61B5/021—Measuring pressure in heart or blood vessels
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B5/00—Measuring for diagnostic purposes; Identification of persons
- A61B5/145—Measuring characteristics of blood in vivo, e.g. gas concentration, pH value; Measuring characteristics of body fluids or tissues, e.g. interstitial fluid, cerebral tissue
- A61B5/1455—Measuring characteristics of blood in vivo, e.g. gas concentration, pH value; Measuring characteristics of body fluids or tissues, e.g. interstitial fluid, cerebral tissue using optical sensors, e.g. spectral photometrical oximeters
- A61B5/14551—Measuring characteristics of blood in vivo, e.g. gas concentration, pH value; Measuring characteristics of body fluids or tissues, e.g. interstitial fluid, cerebral tissue using optical sensors, e.g. spectral photometrical oximeters for measuring blood gases
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
Landscapes
- Health & Medical Sciences (AREA)
- Engineering & Computer Science (AREA)
- Life Sciences & Earth Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Public Health (AREA)
- Pathology (AREA)
- Surgery (AREA)
- Physics & Mathematics (AREA)
- Biomedical Technology (AREA)
- Heart & Thoracic Surgery (AREA)
- Veterinary Medicine (AREA)
- Molecular Biology (AREA)
- Biophysics (AREA)
- Animal Behavior & Ethology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Epidemiology (AREA)
- Primary Health Care (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
Abstract
PATIENT SAFETY AND PRIVACY-PRESERVING IN E-HEALTH USING INTERNET OF THINGS
Abstract:
The Internet of Things (lOT) idea is a true digital universe that binds all objects and all things.
Almost all current systems have experienced significant improvements in this new concept. Innovative
medical and healthcare facilities and programmes are viewed and implemented in the smart health (e
health) environment. The most critical problems that intelligent health faces are the protection and
privacy of patients and health records as other sub-categories of the Internet of Things. Many studies in
the fields of smart health protection and privacy have been addressed in recent years, and various
frameworks and protocols have been put forward in this respect to protect security/privacy. However,
several of these programmes and protocols cover some, not all, features of security and privacy. There is
also a strong lack of protection and privacy in intelligent wellness. Many of the proposed schemes and
protocols also have a machine sophistication not so lightweight, which contradicts the existence of the
Internet of Things which deals with power supply, low processing energy and small memory devices. We
introduce a different approach to this invention idea to ensure patient protection and privacy in e
health. The suggested system safeguards the dignity and content of the patient's identity. Also, present
a modern authentication method with the data security function of the patient. The proposed
innovative authentication system is an effective, lightweight system that meets all safety criteria.
Diagram:
- B-~ AN'-, User Interaction Black Box \ Remote Access
/ ~Interiam
Wood Pressure EEG Physician
Swo Sensor\
PukseOxietuy Inerial
Sensor __ Sensor L*medical
[iEj11] Information
1 Emergency
Layerr /Layer//
1 3 / ~Layer
Figure -1
Description
Diagram:
- B-~AN'-, User Interaction Black Box \ Remote Access / ~Interiam Wood Pressure EEG Physician Swo Sensor\
PukseOxietuy Inerial Sensor __ Sensor L*medical
[iEj11] Information
1 Emergency
Layerr /Layer// 1 3 /~Layer
Figure -1
2021100235
Description
Field Of Inventions: This relates to the evaluation of embedded customized systems on user devices
and, more specifically, distributed evaluation mechanisms for embedded
customized systems on user devices that preserve privacy.
Background of invention:
Technological modifications have facilitated the introduction of advanced
technologies to improve the quality of human life. To gain insight and solve
health-related issues, researchers researching the evolution of technology have
identified and assessed health information from these sources. Thus, at every level
of the healthcare system, the development of advanced healthcare technology has
the potential to increase productivity and improve patient outcomes.
Via stringent patient safety controls, ubiquitous data access, remote inpatient
supervision, rapid clinical interventions and decentralized electronic health
records, the implementation of modem electronic health (e-Health) application
systems will address many problems facing conventional healthcare systems.
These systems can handle patient data and health information, enhance the quality of life of patients, increase communication, improve patient outcomes, minimize costs, and increase the overall performance of e-health services.
At the intersection of medical informatics, public health and Internet health
services, e-health is an evolving area that supports and drives the global
advancement of new technologies to address deep-seated issues, bring costs down
and improve patient care. At the same time, the evolution of the Internet of Things
(IoT) is the driving force behind the growth of a multitude of intelligent services
that provide access to shared/configurable resources, such as computers,
storage/cloud computing, network-connected devices, applications, systems, and
other resources.
Thus, IoT-connected models, applications and systems have become ubiquitous. In
addition, the widespread adoption of IoT has coincided with the advancement of
interrelated communication technologies for healthcare, business, industry,
operational systems, and so on, such as computer intelligence. To make such
implementation feasible, the effective and secure implementation of health
information technology, programmes and overall e-Health systems requires
extremely efficient and robust security systems.
IoT technology research and development, including complex architectures for use
in health networks, has been motivated by the ubiquity of IoT systems. Linking
IoT networks, computers, software and resources enables e-Health systems to use
the latest technologies to exchange related information.
IoT and cloud computing are new ground-breaking technologies that, when
implemented as versatile, scalable and effective patient healthcare systems,
complement each other's capabilities. Compared to conventional networks, the
combination offers advantages such as ease of deployment, improved information
security during contact, easy access to records and energy savings over traditional
modalities. E-Health systems based on the IoT-cloud will greatly enhance
healthcare services and facilitate continuous systemic innovation. Underlying IoT
networks allow contact between users, providers and servers, with medical data
stored in the cloud, in IoT-cloud-based e-health systems.
According to 20180183693 the disclosure usually relates to behavioral research in
order to automate the direct and/or indirect monitoring of Internet of Things (IoT)
user wellbeing. In particular, normal behavior associated with an IoT device in a
local IoT network can be modeled in such a way that behaviors observed on the
IoT device may be compared to the normal behavior modeled to determine if the
behaviors observed on the IoT device are normal or anomalous.
Objective of the Inventions:
• Create interactive user friendly cloud based E health system
" Maintain high security patient database
Summary of the Invention:
To enhance the quality of medical care and also produce vast volumes of data, a
number of medical devices and software applications are used. The value of data
is, at present, self-evident. At all levels of data, how to effectively protect data
protection and privacy will occupy an important position Place in research relevant
to the future.
Starting with IoT' security and privacy criteria, this idea security and privacy
concerns from technological perspectives and poses the challenges of future
development. Much attention has been paid to IoT; however, related standards and
technical specifications are still improving, especially the basic healthcare
application requirements, and more.
Detailed Description of the Invention:
Key management, to secure e-health communications, In the security
process, protocols play a crucial role. Complex encryption algorithms or
transmission protocols can, however, significantly affect the rate of transmission
and even fail to transmit data. In addition, they are expected to occupy valuable
medical assets that are not available. With science and careful measures, the
difficult balance between safety security and device energy consumption needs to
be solved.
Proposed stable authentication and authentication as seen in Figure 1, the
main agreement scheme for the cloud-assisted WBAN method uses expanded
chaotic maps. Centered on the principle of Dife-Hellman key exchange, the
architecture of Chebyshev disorderly maps will create safe ways or channels for
device participants when they register.
Until delivery, the assessed health objects obtained from WBAN body
sensors will be encrypted. The tracked patient will facilitate real-time research with
continuous remote surveillance on stream-oriented health products.
Enabling medical caregivers to access their wellness products held in a cloud
that not only delivers home support, but also increases the quality of life.
Protection and safety review found that in mobile emergency medical care
services, the proposed mechanism would effectively overcome the problem of user
authentication.
Claims (3)
1. The embedded computing system, where the computer-executable instructions
are executed by the processor:
Get the patient's feedback relevant to at least one operation, signs, status,
treatment, location of the body, and intake of food; and
Store the input-related information in the data store.
2. The method of claim 1, in which the sensor is attached to a mobile computing
unit by means of a wired link containing a plurality of electrodes mounted in a
platform which is designed to hold each of the electrodes in an anatomically
correct position without the positioning of individual leads when positioned at a
suitable location on the patient.
3. The Claim 2 methodology entails contrasting customer success with equally
situated entities and enhancing customer progress by normative messaging.
Diagram:
Figure -1
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021100235A AU2021100235A4 (en) | 2021-01-14 | 2021-01-14 | Patient safety and privacy-preserving in e-health using internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021100235A AU2021100235A4 (en) | 2021-01-14 | 2021-01-14 | Patient safety and privacy-preserving in e-health using internet of things |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2021100235A4 true AU2021100235A4 (en) | 2021-04-15 |
Family
ID=75396987
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2021100235A Ceased AU2021100235A4 (en) | 2021-01-14 | 2021-01-14 | Patient safety and privacy-preserving in e-health using internet of things |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2021100235A4 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114220506A (en) * | 2021-12-15 | 2022-03-22 | 深圳梵淼医疗科技有限公司 | Medical recorder box |
-
2021
- 2021-01-14 AU AU2021100235A patent/AU2021100235A4/en not_active Ceased
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114220506A (en) * | 2021-12-15 | 2022-03-22 | 深圳梵淼医疗科技有限公司 | Medical recorder box |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahmad et al. | Health fog: a novel framework for health and wellness applications | |
Farhin et al. | Secured smart healthcare system: blockchain and Bayesian inference based approach | |
Picazo-Sanchez et al. | Secure publish-subscribe protocols for heterogeneous medical wireless body area networks | |
Liu et al. | Secure and efficient querying over personal health records in cloud computing | |
Ming et al. | Efficient privacy-preserving access control scheme in electronic health records system | |
Korzun | Internet of things meets mobile health systems in smart spaces: An overview | |
Shankar et al. | Secure medical data transmission by using ECC with mutual authentication in WSNs | |
Wu et al. | MNSSp3: Medical big data privacy protection platform based on Internet of things | |
Verma | Blockchain-based privacy preservation framework for healthcare data in cloud environment | |
Chen et al. | Merging RFID and blockchain technologies to accelerate big data medical research based on physiological signals | |
Lin et al. | A multi-user ciphertext policy attribute-based encryption scheme with keyword search for medical cloud system | |
Abounassar et al. | Security and interoperability issues with internet of things (IoT) in healthcare industry: A survey | |
Rajasekaran et al. | Blockchain enabled anonymous privacy-preserving authentication scheme for internet of health things | |
Mosaiyebzadeh et al. | Privacy-enhancing technologies in federated learning for the internet of healthcare things: a survey | |
Maksimović | Improving computing issues in internet of things driven e-health systems | |
AU2021100235A4 (en) | Patient safety and privacy-preserving in e-health using internet of things | |
Khaloufi et al. | Fog computing for smart healthcare data analytics: An urgent necessity | |
Shah et al. | Guest Editorial: Special section on 5G edge computing-enabled internet of medical things | |
Ullah et al. | Enabling secure communication in wireless body area networks with heterogeneous authentication scheme | |
Basak et al. | Smart healthcare surveillance system using IoT and machine learning approaches for heart disease | |
Suganthi et al. | Secure and privacy in healthcare data using quaternion based neural network and encoder-elliptic curve deep neural network with blockchain on the cloud environment | |
Ion et al. | An implementation of event and filter confidentiality in pub/sub systems and its application to e-health | |
Nguyen et al. | Intelligent tunicate swarm-optimization-algorithm-based lightweight security mechanism in internet of health things | |
Tandon et al. | Security and privacy challenges in healthcare using Internet of Things | |
Khaloufi et al. | Fog computing in the age of big healthcare data: Powering the medical Internet of Things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |