EP1844398A2 - Method and apparatus for two-way transmission of medical data - Google Patents
Method and apparatus for two-way transmission of medical dataInfo
- Publication number
- EP1844398A2 EP1844398A2 EP05855661A EP05855661A EP1844398A2 EP 1844398 A2 EP1844398 A2 EP 1844398A2 EP 05855661 A EP05855661 A EP 05855661A EP 05855661 A EP05855661 A EP 05855661A EP 1844398 A2 EP1844398 A2 EP 1844398A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- site
- data
- component
- firewall
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H30/00—ICT specially adapted for the handling or processing of medical images
- G16H30/20—ICT specially adapted for the handling or processing of medical images for handling medical images, e.g. DICOM, HL7 or PACS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/168—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP] specially adapted for link layer protocols, e.g. asynchronous transfer mode [ATM], synchronous optical network [SONET] or point-to-point protocol [PPP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
Definitions
- This invention relates to the two-way transmission of medical data in general, and more — 9 —
- HIPAA Health Insurance Portability and Accountability Act
- VPNs Virtual Private Networks
- Tl lines can be cost prohibitive in many situations.
- SSH secure shell
- rsync rsync protocol
- medical institutions e.g., hospitals
- firewalls to limit outside access to their internal computer networks.
- hospital firewalls will typically block outside attempts to access any medical data on their internal radiology networks.
- a healthcare provider e.g., a hospital
- an outside third party e.g., a service provider
- CT scan data must be transmitted from a hospital to Medical Metrx Solutions of West Lebanon, NH (MMS) , where that CT scan data is converted into patient-specific computer models and then returned to the hospital for viewing by medical personnel.
- MMS Medical Metrx Solutions of West Lebanon, NH
- the present invention provides for a secure, two-way transmission of medical data over the Internet and through the hospital's firewall using push and pull mechanisms. More particularly, the present invention utilizes standard SSH technology and the rsync and scp (secure copy) protocols to enable secure, cost-effective data transmission over the Internet.
- the hospital firewall is traversed through the use of an agent located behind the hospital's firewall.
- the agent utilizes a push mechanism to push the raw scan data through the firewall and over the Internet to the outside third party; and the agent uses a pull mechanism to reach through the firewall and over the Internet to retrieve the data processed by the outside third party.
- the present invention transfers data from the hospital to the third party by initiating a data push mechanism from behind the hospital firewall; and transfers the processed data from the outside third party back into the hospital by initiating a data pull mechanism from behind the hospital firewall.
- the aforementioned agent acts as a broker for the foregoing data transmission and also encodes how the data should be handled once it is received on the hospital side.
- an agent for transmitting data between a first site and a second site wherein the first site and the second site are connected to the Internet, and further wherein the first site is located behind a firewall; the agent being located behind the firewall and being connected to the first site and to the Internet, the agent comprising first, second, third and fourth components; the first component being configured for receiving raw data from the first site; the second component being configured for pushing a verification query through the firewall and over the Internet to the second site; the third component being configured for pulling a verification over the Internet and through the firewall from the second site; and the fourth component being configured for, upon receipt of the verification, pushing the raw data through the firewall and over the Internet to the second site.
- a system comprising: a first site and a second site, wherein the first site and the second site are connected to the Internet, and further wherein the first site is located behind a firewall; an agent for transmitting data between the first site and the second site, the agent being located behind the firewall and being connected to the first site and to the Internet, the agent comprising first, second, third and fourth components; the first component being configured for receiving raw data from the first site; the second component being configured for pushing a verification query through the firewall and over the Internet to the second site; the third component being configured for pulling a verification over the Internet and through the firewall from the second site; and the fouth component being configured for, upon receipt of the verification, pushing the raw data through the firewall and over the Internet to the second site.
- a method for transmitting data between a first site and a second site wherein the first site and the second site are connected to the Internet, and further wherein the first site is located behind a firewall, comprising: receiving data from the first site; pushing a verification query through the firewall and over the Internet to the second site; pulling a verification over the Internet and through the firewall from the second site; and upon receipt of the verification, pushing data through the firewall and over the Internet to the second site.
- Fig. 1 is a schematic view showing the transmission of DICOM data from the hospital to a third party and the retrieval of processed data from the third party back to the hospital;
- Fig. 2 is a schematic view showing the transmission of DICOM data from the hospital to a third party and the retrieval of DICOM data from the third party back to the hospital;
- Fig. 3 is a schematic view showing remote 3D imaging in accordance with the present invention.
- Fig. 4 is a schematic view showing an expanded form of the DAC system having order verification.
- DICOM Digital Imaging and Communications In Medicine
- MMS West Riverside, NH
- the DAC Pro is designed to allow the secure transfer of DICOM image data over regular Internet connections without using Virtual Private Networks.
- the DAC Pro preferably comes pre-configured to work on the hospital network behind the firewall, and contains all of the hardware and software necessary to (i) send data across the firewall and through the Internet to a third party (e.g., MMS) for 3D processing, and (ii) retrieve the processed data (e.g., 3D patient-specific studies) back through the Internet and across the firewall for use in surgical planning by medical professionals at the hospital.
- MMS third party
- retrieve the processed data e.g., 3D patient-specific studies
- the DAC Pro is not designed for long-term data storage; it is integrated into the hospital network so that data can be stored in hospital systems for long-term storage.
- the DAC Pro preferably runs a customized version of the Red Hat Linux operating system and boots from a CD-ROM.
- all of the system software runs from the CD-ROM, and no system software needs to run from the hard drive of the DAC Pro.
- the DAC Pro has added security and is easily upgraded.
- the DAC Pro resides within the healthcare institution's firewall. It pushes medical data through the firewall and over the Internet to MMS (or other third party) and/or pulls medical data back over the Internet and back through the firewall. Significantly, the third party (e.g., MMS) never sends data directly to the DAC Pro. Thus, the remote healthcare institution's firewall requires little modification and data is easily secured through encryption.
- the DAC Pro can be used to transfer data in various formats.
- the DAC Pro can be used to transfer DICOM data to MMS, and to retrieve
- 3D model data (e.g., MMS Preview ® data) from MMS. See
- the DAC Pro conforms with established radiology standards.
- the DICOM data is sent to the DAC Pro unit in the same manner as it would be transfered to another DICOM device within the hospital, e.g., a Picture Archiving System (PACS) , a printer or a workstation.
- PACS Picture Archiving System
- the DICOM protocol is not handled directly by the DAC Pro. Rather, protocol communications are forwarded securely by using 768-bit RSA public key authentication and 256- bit Advanced Encryption Standard (AES) data encryption through a secure shell (ssh) tunnel to a DICOM server at the third party, where the DICOM communication is handled. This ensures HIPPA compliance.
- AES Advanced Encryption Standard
- This outgoing data transmission is handled as a push through the firewall and over the Internet.
- DICOM data e.g., the 2D CT slice data
- MMS modeling technicians retrieve the DICOM data
- the patient-specific model is stored on a server at MMS.
- it is placed on the MMS server in an appropriate folder specifically set up for a particular hospital, and is preferably stored in an industry standard compressed format, e.g., single gzip'ed tar file.
- This single compressed file format is preferred, since it makes transfer times much faster than sending many uncompressed files.
- the DAC Pro at the receiving hospital is in constant contact with the MMS server through the aforementioned ssh tunnel connection. Once the DAC Pro at the receiving hospital sees the completed study in its remote folder on the MMS server, it pulls the data back over the Internet and through the firewall to its local hard drive. At the hospital side the DAC Pro decrypts and decompresses the pulled data.
- the DAC Pro preferably runs a version of the Samba file server so that the data is easily available for
- the incoming data transmission is handled as a pull initiated from inside the firewall, which permits the data to be passed from MMS into the secure healthcare facility.
- the DAC Pro can also be used to transfer DICOM data to MMS and to retrieve DICOM data back from MMS. See Fig. 2.
- the DAC Pro might send DICOM data to MMS for processing on 3D workstations using software other than the MMS
- the data in this directory is gzip'ed and tar' ed as described previously. However, this time the data has additional information pertaining to the receiving institution's PACS encoded in it.
- the DAC Pro located inside the firewall at the remote site pulls the processed DICOM data from the MMS server once it sees data in its specific directory. This processed DICOM data is pulled over the Internet and through the firewall to the DAC Pro unit located at the remote site. With the encoded information and a trigger in the file name, the DAC Pro will know that this is DICOM data and not Preview ® data. The DAC Pro will be used.
- the remote hospital acts as an SCU to send data to the DAC Pro, which then forwards the data, using a push transfer, through the firewall and then across an ssh tunnel established over the Internet to the MMS server.
- the 3D workstations Upon arriving at the MMS Image Archive server, the 3D workstations query the server for studies which need processing (preferably utilizing the DICOM general purpose worklist) . Once the studies are complete, the 3D workstations act as an SCU to send the completed studies to the MMS outgoing DICOM server. This server receives the DICOM data and does the work of creating the gzip'ed tar file. The gzip'ed tar file is then
- the DAC Pros located at their respective remote institutions are continually polling their respective "drop boxes" at the MMS server for data to retrieve. Once it is determined that there is data in the "drop box", the DAC Pro pulls the data, using rsync or scp through a new ssh tunnel, to bring the data back over the Internet and through the firewall.
- the DAC Pro uses the pre-configured information pertaining to that hospital's PACS (IP Address, port, and AE Title) to act as an SCU to push the data to the hospital's PACS. This is all completed using ssh connections over the Internet. All data is pushed to MMS, or pulled from MMS, from within the sending institution's firewall, keeping the data secure at all times.
- the ssh tunnel can be established with an appropriate command such as:
- DAC Pro Digital Imaging and Communications Standards in Medicine
- MMS Medical Metrx Solutions of West Lebanon, NH
- DAC Pro Digital Imaging and Communications Standards in Medicine
- MMS Medical Metrx Solutions of West Lebanon, NH
- the DAC Pro device is essentially a two-way transfer device comprising computer hardware and software for enabling the secure, cost-effective transmission of data through a firewall (e.g., a hospital firewall) and across the Internet.
- the DAC Pro device is designed to allow the secure transfer of DICOM image data over regular Internet connections without using Virtual Private Networks.
- the DAC Pro device is preferably pre- configured to work on the hospital network behind the firewall, and contains all the software necessary to: (i) send data across the firewall and through the Internet to MMS for 3D processing (i.e., "modeling”); and (ii) retrieve the processed data (e.g., 3D patient-specific "studies”) back through the Internet and across the firewall for use in surgical planning by medical professionals at the hospital.
- 3D processing i.e., "modeling”
- retrieve the processed data e.g., 3D patient-specific "studies”
- the data is stored for a default term (e.g., 30 days, 35 days, etc.) on the hard drive of the DAC Pro device.
- the DAC Pro device is not designed for long-term storage; rather, the DAC Pro device is integrated into the hospital network so that data can be stored in hospital systems for long-term storage.
- the DAC Pro device preferably runs a customized version of the Linux operating system (e.g., Fedora Linux or Red Hat Linux) and boots from a CD-ROM drive.
- the DAC Pro device resides inside the hospital's firewall.
- the DAC Pro device pushes medical data through the firewall and over the Internet to MMS and/or pulls medical data back over the Internet and back through the firewall.
- MMS never sends data directly to the DAC Pro device. Rather, the DAC Pro device pulls data back into the hospital.
- the hospital's firewall remains intact and the hospital's data is secure.
- the DAC Pro device can be used to transfer DICOM data to MMS, and to retrieve 3D model data (e.g., MMS
- the DAC Pro device conforms with established radiology standards.
- the DICOM data is sent to the DAC Pro device in the same manner as that data would be transferred to another DICOM device located within the hospital, e.g., a Picture Archiving System (PACS), a printer, a workstation, etc.
- PACS Picture Archiving System
- the DICOM protocol is not handled directly by the DAC Pro device. Rather, protocol communications are securely forwarded from the DAC Pro device at the hospital to a DICOM server at MMS (where the DICOM communication is handled) by using, for example, a 768-bit RSA public key authentication and a 256-bit Advanced Encryption Standard (AES) data encryption procedure implemented through a secure shell (ssh) tunnel. This ensures HIPPA compliance.
- AES Advanced Encryption Standard
- the outgoing data transmission (i.e., from the DAC Pro device to MMS) is handled as a "push" through the hospital's firewall and over the Internet.
- the DICOM data (e.g., the 2D slice data from the CT scanner) arrives at MMS
- MMS modeling technicians retrieve the data and create a patient-specific 3D model.
- the patient-specific 3D model is stored on a server at MMS.
- the 3D model is placed on the MMS server in an appropriate folder specifically set up for a particular hospital, and is preferably stored in an industry standard compressed format, e.g., in a single gzip'ed tar file. This single compressed file format is preferred, since it makes transfer times much faster than sending many uncompressed files.
- the DAC Pro device (at the receiving hospital) is in constant contact with the MMS server through the aforementioned ssh tunnel connection. Once the DAC Pro device at the receiving hospital sees the completed study in its remote folder on the MMS server, the DAC Pro device "pulls" the data back over the Internet and through the firewall to its local hard drive. At the hospital side, the DAC Pro device decrypts and decompresses the data file pulled back across the firewall. The DAC Pro device runs a LINUX version of the SMB file server so that the data is easily available for viewing (i.e., using the MMS
- the system utilizes the same general configuration as the "DAC Pro" system discussed above.
- the expanded version of the system (which will sometimes hereinafter be referred to as the "DAC 3" system) adds an order verification component to the system.
- This order verification component verifies a hospital order prior to the DAC 3 device pushing the DICOM data to the MMS server for processing.
- This order verification component allows MMS to verify that the DICOM data sent from hospital personnel to the DAC 3 device was in fact intended to be sent to MMS for modeling.
- Such verification can be advantageous for a variety of reasons, e.g., order confirmation and control, third party payer (e.g., insurer) considerations, patient privacy controls, cost controls, etc.
- FIG. 4 there is shown a schematic illustration of the DAC 3 system and its operation, which essentially consists of a series of dataflows between system elements.
- Dataflow 1 The process is initiated when a user at a CT PACS workstation sends 2D CT scan data to the DAC 3 device located on the internal side of the firewall.
- the DAC 3 device pushes a request for verification through the hospital firewall to the MMS U104 transaction database.
- This request for verification is pushed to the U104 transaction database as a psql communication through a secure shell (ssh) tunnel.
- the request for verification essentially advises MMS that the DAC 3 device is holding 2D scan data and requires verification that this 2D scan data should be sent to MMS for modeling.
- This request for verification also provides the U104 transaction database with information regarding the request, e.g., hospital identification, department identification, physician identification, patient identification, scan date, delivery information, etc.
- the U104 transaction database sends a request for verification to the MMS, Patient Evaluation And Management System ("PEMS") component.
- Dataflow 4 The MMS PEMS component sends a request for verification to the appropriate hospital coordinator. This request is sent via e-mail.
- the MMS PEMS component advises the U104 transaction database that it has received appropriate verification from the hospital coordinator.
- the U104 transaction database notes this fact in its database.
- the DAC 3 device which is in communication (e.g., constant or periodic) with the U104 transaction database, looks for the requested verification in the U104 transaction database. Such verification is pulled from the U104 transaction database as a psql communication through a secure shell (ssh) tunnel.
- ssh secure shell
- the DAC 3 device If the DAC 3 device has received the requested verification from the U104 transaction database, the DAC 3 device "pushes" the 2D scan data (in encrypted form) to the MMS DICOM server through a secure shell (ssh) tunnel.
- ssh secure shell
- the 2D scan data is pulled from the DICOM server via the MMS downloading component.
- the MMS downloading component sends processed 2D scan data to the MMS data repository and order confirmation information to the U104 Relational Database.
- the MMS data repository sends the 2D scan data to the modeling processor, where the patient-specific 3D model is created.
- the modeling processor sends the patient-specific 3D model (i.e., the study) back to the MMS data repository.
- the MMS shipping component pulls the finished patient-specific 3D model from the MMS data repository.
- the MMS shipping component queries the U104 transaction database for delivery information.
- delivery information includes, among other things, the "drop box" location on the ftp server (see below) where the patient-specific 3D model will be held for pick-up.
- the U104 transaction database sends the appropriate delivery information to the MMS shipping component.
- the MMS shipping component sends the patient-specific 3D model to the appropriate "drop box" location on the ftp server.
- the DAC 3 device which is in communication (e.g., constant or periodic) with the ftp server, looks for the patient-specific 3D model in the appropriate "drop box" location on the ftp server.
- the patient-specific 3D model is "pulled” from the ftp server to the DAC 3 device via an rsync communication.
- the patient-specific 3D model is stored on the DAC 3 device until a user accesses it for viewing.
- Elements DAC 3 Device ssh Tunnels are established for webmin (-R) , postgres (-L) and dicom (-L) . These tunnels are initiated (and kept open) through the inittab mechanism. In one preferred configuration, the webmin tunnel is turned off, and only enabled by the remote site on request.
- Crontab Scripts run on the DAC 3 device as two different users: the local DAC UNIX user (e.g., mmstest) and root.
- the outgoing.sh procedure preferably operates 11 times an hour, pulling from FTP server, checking CHECKSUM, unpacking the data and updating the database element armorcar_outgoing. start_date and database element armorcar_outgoing.end_date.
- a database lock prevents multiple processes from interfering with each other.
- the remove_preview. sh procedure calls delete_outgoing.pi, preferably once a day at midnight, and removes Preview ® studies after 35 days (default condition) . The actual expiration time is set in armorcars.expire_outgoing__studies.
- the incoming. sh procedure calls check_incoming.pl (preferably 2 times an hour, e.g., at "3 minutes” and "33 minutes"), checks /mnas/incoming for new data, and updates the U104 armorcar_incoming_uids database element.
- the vsend.sh procedure preferably operating every 5 minutes, uses send_image to do a DICOM send of a file to the DICOM server sorted by study_instance_uid.
- the remove_incoming.sh preferably operating once a day at midnight, deletes studies from the DAC 3 device once they have been received by the DICOM server at MMS.
- the report_disk_usage.pl procedure preferably running once every half hour, updates the amount of free space in the Preview ® data SMB share.
- cron.daily procedure updates from ftp: /home/drop/dac_software into /mms/bin/scripts, /mms/bin/dicom and /var/spool/cron. This happens once a day via rsync.
- Dicom Server (dicom.medicalmetrx.com) simple_storage. DICOM Storage SCP from Mallinckrodt Institute of Radiology. request_verfication.pl. This is the verification requesting script, and is preferably run once every 30 minutes. This element sends an email to the coordinator asking for verification after the DAC 3 device has received data. The "meta information" for this data in transferred to the U104 database and is utilized by PEMS. mark_mms_received.pl. (every 5 minutes) When the Dicom Server has fully received the study after verification, this procedure sends an E-mail to the coordinator by looking for the files in /b/DICOM/incoming. delete_incoming.pl.
- This procedure preferably run every 10 minutes, emails the coordinator when the DAC has retrieved a Preview study (by asking the U104 transaction database) .
- delete_outgoing.pl This procedure, preferably run everyday at midnight, deletes files that have been fully downloaded from both the dropbox and the dac repository.
- Postgresql Database U104 Transaction Database
- mms_matrix This is a database connection for the DAC 3 device which operates via a ssh tunnel through the DICOM server.
- the server scripts connect via the user dac_server.
- the DAC available views are: armorcar_incoming (INSERT), armorcar_storage_space (UPDATE) , armorcar_log_view (INSERT), armorcar_incoming_uids (SELECT, UPDATE), armorcar_outgoing (SELECT) , armor_outgoing__updates (SELECT, UPDATE) .
- the CT technician sends data to the DAC 3 device by selecting the correct IP address, port and AE_TITLE to access the DAC 3 device on the hospital's network.
- the DAC 3 device notifies the mms_matrix database that it has received a CT scan for processing by writing a new row into the armorcar_incoming data file.
- the request_verfication.pl procedure which runs on the Dicom Server, sends an email to the appropriate hospital coordinator, requesting verification that the CT scan should be processed.
- the hospital coordinator logs onto PEMS and verifies that the CT scan data should be processed, updating the 'verified' column in the armorcar_incoming data file. This action also creates a row in the armorcar_orders data file that associates a model number to the Study Instance UID of the incoming set of CT scan files.
- the DAC 3 device sends the actual CT image data to MMS via the send_image (Mallinckrodt) program. This CT image data is received at the DICOM Server.
- the mark_mms_received.pl procedure sets the armorcar_incoming.mms_received flag and emails the hospital coordinator.
- MMS downloads the image files from the dicom: /b/DICOM/incoming data file and sets the "ready for modeling" status for the study.
- the CT scan data is then processed (i.e., modeled) .
- the processed data is removed from the /b/DICOM/incoming by delete_incoming.pl data file.
- the MMS Shipper runs the ac_create procedure on a Preview CD to complete the study fulfillment.
- This tar s and compresses the Data directory into a TGZ file, which is secure copied to the FTP server at ftp: /home/drop/dac_repository.
- the virtual_mirror procedure creates a hard link of the TGZ file into the appropriate dropbox.
- the DAC 3 device polls the U104 database transaction database, preferably about 11 times an hour, to determine which studies have been completed and are available. If the DAC 3 device finds a study (i.e., completed model) in the dropbox, the DAC 3 device scp' s the contents locally, verifies the checksum (md ⁇ sum) and unpacks the TGZ file to the /mms_preview SMB mount directory on the DAC 3 device.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
- Epidemiology (AREA)
- Computer Hardware Design (AREA)
- Public Health (AREA)
- Primary Health Care (AREA)
- General Engineering & Computer Science (AREA)
- Radiology & Medical Imaging (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US63857804P | 2004-12-23 | 2004-12-23 | |
PCT/US2005/047142 WO2006071894A2 (en) | 2004-12-23 | 2005-12-23 | Method and apparatus for two-way transmission of medical data |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1844398A2 true EP1844398A2 (en) | 2007-10-17 |
Family
ID=36615492
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05855661A Withdrawn EP1844398A2 (en) | 2004-12-23 | 2005-12-23 | Method and apparatus for two-way transmission of medical data |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1844398A2 (en) |
WO (1) | WO2006071894A2 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100146595A1 (en) * | 2007-04-05 | 2010-06-10 | Invicta Networks, Inc | Networking computers access control system and method |
US9800550B2 (en) | 2008-01-31 | 2017-10-24 | International Business Machines Corporation | Method and system for pervasive access to secure file transfer servers |
WO2015116540A1 (en) * | 2014-01-31 | 2015-08-06 | Quick Release Lifescan, LLC | System and method for communicating protected health information |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6092198A (en) * | 1997-02-25 | 2000-07-18 | International Business Machines Corporation | System and method for enabling and controlling anonymous file transfer protocol communications |
US6711678B2 (en) * | 2002-04-05 | 2004-03-23 | Expand Beyond Corporation | Pre-authenticated communication within a secure computer network |
US7299364B2 (en) * | 2002-04-09 | 2007-11-20 | The Regents Of The University Of Michigan | Method and system to maintain application data secure and authentication token for use therein |
US7523505B2 (en) * | 2002-08-16 | 2009-04-21 | Hx Technologies, Inc. | Methods and systems for managing distributed digital medical data |
-
2005
- 2005-12-23 EP EP05855661A patent/EP1844398A2/en not_active Withdrawn
- 2005-12-23 WO PCT/US2005/047142 patent/WO2006071894A2/en active Application Filing
Non-Patent Citations (1)
Title |
---|
See references of WO2006071894A2 * |
Also Published As
Publication number | Publication date |
---|---|
WO2006071894A3 (en) | 2009-04-09 |
WO2006071894A2 (en) | 2006-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230017310A1 (en) | Cloud based viewing, transfer and storage of medical data | |
US7660413B2 (en) | Secure digital couriering system and method | |
US6574742B1 (en) | Method for storing and accessing digital medical images | |
US8099307B2 (en) | Methods, systems, and devices for managing medical files | |
US7653634B2 (en) | System for the processing of information between remotely located healthcare entities | |
US20060190999A1 (en) | Method and apparatus for two-way transmission of medical data | |
US20100122336A1 (en) | Method and apparatus for two-way transmission of medical data | |
US8627107B1 (en) | System and method of securing private health information | |
US20120070045A1 (en) | Global medical imaging repository | |
US20110110568A1 (en) | Web enabled medical image repository | |
US20160210408A1 (en) | Methods, systems, and devices for managing medical images and records | |
US20050197860A1 (en) | Data management system | |
WO2010126797A1 (en) | Methods, systems, and devices for managing medical images and records | |
US20070083615A1 (en) | Cross-enterprise wallplug for connecting internal hospital/clinic imaging systems to external storage and retrieval systems | |
US20050257257A1 (en) | Method and apparatus for two-way transmission of medical data | |
WO2006071894A2 (en) | Method and apparatus for two-way transmission of medical data | |
US20050187787A1 (en) | Method for payer access to medical image data | |
US8261067B2 (en) | Devices, methods, and systems for sending and receiving case study files | |
WO2009065043A1 (en) | Method and apparatus for two-way transmission of medical data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20070723 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR MK YU |
|
DAX | Request for extension of the european patent (deleted) | ||
R17D | Deferred search report published (corrected) |
Effective date: 20090409 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 9/00 20060101ALI20090508BHEP Ipc: H04L 9/32 20060101ALI20090508BHEP Ipc: H04L 9/00 20060101AFI20090508BHEP |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20110701 |