GB2380345A - Real time encryption and storage of images of an environment - Google Patents

Real time encryption and storage of images of an environment Download PDF

Info

Publication number
GB2380345A
GB2380345A GB0123140A GB0123140A GB2380345A GB 2380345 A GB2380345 A GB 2380345A GB 0123140 A GB0123140 A GB 0123140A GB 0123140 A GB0123140 A GB 0123140A GB 2380345 A GB2380345 A GB 2380345A
Authority
GB
United Kingdom
Prior art keywords
procedure
monitoring
execution
information
predetermined environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0123140A
Other versions
GB0123140D0 (en
Inventor
Guang-Zhong Yang
Edward Draper
Sean Mackay
Ara Warkes Darzi
Lee David Edwards
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ORBB Ltd
Original Assignee
ORBB Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ORBB Ltd filed Critical ORBB Ltd
Priority to GB0123140A priority Critical patent/GB2380345A/en
Publication of GB0123140D0 publication Critical patent/GB0123140D0/en
Priority to PCT/GB2002/004372 priority patent/WO2003028025A1/en
Publication of GB2380345A publication Critical patent/GB2380345A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00224Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a remote server
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00231Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local external medium, e.g. a card
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00478Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier wherein contents are decrypted and re-encrypted with a different key when being copied from/to a record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/92Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback
    • H04N5/926Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback by pulse code modulation
    • H04N5/9261Transformation of the television signal for recording, e.g. modulation, frequency changing; Inverse transformation for playback by pulse code modulation involving data reduction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/84Television signal recording using optical recording
    • H04N5/85Television signal recording using optical recording on discs or drums

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A system for monitoring the execution of a procedure within a predetermined environment comprising means for recording information from the procedure during the time in which the procedure is executed, encrypting said recorded information from the procedure and storing said encrypted information. As described, the system comprises cameras and microphones monitoring a patient consulting or examining room and further sensors may monitor other information such as movement or instrumentation outputs. The signals are compressed before encryption and may be stored on DVD, CD or hard disc. Images etc can be retrieved using an associated public or private key.

Description

<Desc/Clms Page number 1>
A System for Real Time Data Encryption The present invention relates to a system for the recording and real time encryption of multiple data streams before storing the data streams on a storage facility.
It is apparent that patient safety and the monitoring of clinical competence are of ever increasing importance.
The impact of clinical negligence, in an extremely litigious environment, is becoming increasingly burdensome to the medical profession and the healthcare industry as a whole.
The presence of professional chaperones during potentially intimate examinations is common practice in most hospitals. Chaperones or nurses seconded from their normal duties are present during patient examinations specifically to protect both the patient and the practitioner from the risk of spurious charges.
There are many environments outside of the hospital including GP consulting rooms, osteopath or physiotherapist rooms, dental surgeries and alternative healthcare surgeries where a one-to-one interface in potentially intimate situations exposes the healthcare profession to risk.
It is desirable to have a fully integrated, real time visual and audio recording, data collection and retrieval system that offers the medical professions and healthcare industry the benefit of monitoring a procedure. A data recording system provides essential backup that will reduce the number of spurious claims, potentially reduce medical defence premiums and create an environment within
<Desc/Clms Page number 2>
which the healthcare profession and the patient will feel comfortable and protected.
In order to protect the identity of the subjects within the recorded procedure and maximise the security of sensitive data it is advantageous to encrypt all data before storing.
PCT/GBOl/03801 describes a data recording system in which multiple data streams are stored centrally on a data storage device. The system monitors the execution of a procedure within a predetermined environment using multiple recording devices including cameras and microphones. The data streams are synchronised and stored. The procedure may be reviewed by downloading the data from the storage device.
Embodiments of the present invention provides a self contained data recorder capable of monitoring a procedure using multiple data streams in which the data streams are encrypted before being stored directly to DVD. Storing the data directly to DVD negates the need for large processors or hard disc space. Encryption is typically executed using a key system to maximise confidentially.
The encrypted data streams may be accessed from the storage facility using decoding keys in order to review the monitored procedure.
The invention is defined in its various aspects in the appended claims to which reference should now be made.
Embodiments of the present invention will now be described with reference to the accompanying drawings in which; Figure 1 is a block diagram showing the path of multiple data streams within an embodiment of the present invention;
<Desc/Clms Page number 3>
Figure 2 shows the hardware included in an embodiment of the invention; Figure 3 shows the data flow within an embodiment of the present invention; Figure 4 is a block diagram of an embodiment of the present invention including data connections; Figure 5 is block diagram of an embodiment of the present invention including data connections.
Figure 1 shows a consulting or examination room 10 which is monitored by audio recording equipment 12 and video recording equipment 14.
Multiple digital video signals 16 are recorded from multiple video cameras 12 positioned around the monitored area. Multiple video signals are helpful in giving different views of the environment but in some applications only one video signal may be required.
Sometimes the video signals are not recorded at all.
Audio ambient and directional signals 18 are recorded by one or more audio receivers 14 positioned around the monitored area 10. These signals may be recorded by static microphones or microphones attached to subjects within the consulting or examination room 10. Sometimes the audio signals are not recorded at all.
Further embodiments of the invention include sensors to record other types of information including movement or the output from equipment used during the procedure. This further information increases the detail available during a review of the procedure.
<Desc/Clms Page number 4>
The audio and video signals are processed and compressed at 20 and 22 respectively. The compressed signals are then encrypted at 24 and 26. Encryption is typically executed using private and/or public key systems. The encrypted signals are then transferred and stored at an integral DVD recorder 28. It is also possible to replace the DVD recorder using any suitable data storage medium.
It is also possible to simultaneously store the data on multiple storage facilities.
The data stored at 28 may be downloaded and stored onto further storage devices 30 or onto the internet 32.
The data may only be accessed and reviewed through use of decryption codes at 34. Access is only be available to those data streams to which the user has the decryption codes. The encryption programme ensures that review of the recording is only undertaken with the consent of the clinician and the patient. An independent, third party regulatory body may hold the final key to the data and provide the access protocols.
After review the data may be re-encrypted and re-stored at 36.
Figure 2 shows the hardware layout for a real time compression and encryption system used in an embodiment of the present invention. The system includes a PCI plug in board 40 with a single chip encryption processor. The encryption card 42 is linked to an IDE 44. The IDE 44 is then linked to a PCI bus 40 which is connected to the host PC 46.
Figure 3 shows the software dataflow within an embodiment of the present invention. The data from the preocedure is forwarded from an integrated drive electronics (IDE) 50 to the encryption driver 52 where the data is encrypted. The
<Desc/Clms Page number 5>
encryption driver has a dedicated processor which facilitates real-time encryption of high bandwidth data channels such as streaming media including video and audio. The system utilises one time only hardware and driver installation which makes all software application security enabled.
The embodiment of figure 3 emulates a virtual disk for the windows operating system. Any data written to the virtual disk is encrypted in real time and stored to an integrated storage media 54 for example floppy disk, hard disk, CDR or DVD-R. The system uses public key technology 56 and private key technology 58 and allows the user to exchange data with other parties. No decrypted data is stored on any physical media in order to provide added system level protection.
Once stored on the storage device 54 data streams can only be decrypted using public keys 56 or private keys 58. The user can also exchange data with other parties. If a user does not have the required key to access a particular data stream, that data stream will not be decrypted and will be unreadable to the user. The system is easy to set up and once installed it enables multiple software applications 60 with disk access to have a secure route of storing security sensitive data. The system is fully network compatible and can turn a share network drive fully secure. The system is also fully compatible with the Internet and can also be used for secure transmission of data through the Internet.
Figure 4 is a block diagram an embodiment of the present invention. Figure 4 includes the hardware included in the system and shows the power connections between each component.
<Desc/Clms Page number 6>
The system is powered by an ATX power supply 72 which is powered by the mains at 70. The ATX power supply has multiple power outputs including a 12 V output, 5 V output 74 and an ATX output 76.
The ATX output is used to power a single board computer 78 at the ATX input 80. The ON/OFF state of the single board computer is determined by the state of the ON/OFF switch 82 which is connected to the ATX CTRL at 84. A CPU fan 100 and ventilation fan 102 are powered through the single board computer.
The remaining hardware components in this embodiment are powered by the 12 V, 5 V output from the ATX power supply.
The system includes a controller 86, an inverter 88, a TFT LCD display 90, a DVD RAM drive 92, a hard disk drive 94, a camera 96 and a video connector 98 all of which are powered by the 12 V/5 V output 74 of the ATX power supply 72.
Figure 5 shows the data connections within an embodiment of the present invention. The information is first recorded by the camera 96. The data streams from the camera are forwarded to the video connector 98. The data streams are then forwarded to the MPEG2 card 100 where they are converted into digital signals. The MPEG2 card is connected to a peripheral component interconnect (PCI) 102 on the single board computer 78. A second PCI 104 within the single board computer 78 transfers the digital data streams to an encryption card 106. Further embodiments of the invention may include facilities to record other types of information. The corresponding data streams can also be connected to the encryption card at 106. The digital signals are encrypted at 106 and forwarded to the real time data compression and encryption unit 108. The encrypted data stored within the data compression and encryption unit 108 may be downloaded onto
<Desc/Clms Page number 7>
a further storage facility. The embodiment of figure 5 includes a DVD RAM drive 92 and a hard disk drive 94 onto which the encrypted data can be downloaded from the data compression and encryption unit 108.
The DVD RAM drive 92 and hard disk drive 94 are connected to the single board computer 78 via integrated drive electronics (IDE) at 112 and 110 respectively. These connections facilitate downloading of the data for review from the DVD RAM drive 92 and hard disk drive 94. The data may be accessed using a touch screen 114 which is connected to the controller 86. The controller 86 is connected to the single board computer 78 using an RS232 connection 116. The accessed data is displayed on the TFT LDC display 90 via the TTL connection 118.
It is clear from the above description that embodiments of the present invention provide a means for comprehensively monitoring a particular environment. Multiple data streams are recorded, encrypted in real time and stored on a data storage facility. No data is stored which is not encrypted in order to maximise the security of sensitive data. The data streams can only be decoded using the associated private or public keys.
It is understood that the methods employed by this invention extend beyond medical practice and facilitate a means for monitoring a variety of environments. When monitoring a preferred environment, sensors and data streams suitable for use in that environment should be employed.

Claims (24)

  1. Claims 1. A system for monitoring the execution of a procedure within a predetermined environment comprising means for recording information from the procedure during the time in which the procedure is executed, encrypting said recorded information from the procedure and storing said encrypted information.
  2. 2. A system for monitoring the execution of a procedure within a predetermined environment according to claim 1 in which the information from the procedure comprises visual information and is recorded using cameras.
  3. 3. A system for monitoring the execution of a procedure within a predetermined environment according to claim 1 or 2 in which the information from the procedure comprises audio information and is recorded using audio receivers.
  4. 4. A system for monitoring the execution of a procedure within a predetermined environment according to claim 1,2 or 3 in which the information from the procedure comprises the status of instrumentation used during the procedure.
  5. 5. A system for monitoring the execution of a procedure within a predetermined environment according claim 1,2, 3 or 4 in which the information from the procedure comprises the movements of subjects within the environment which are monitored using sensors positioned on the subjects.
  6. 6. A system for monitoring the execution of a procedure within a predetermined environment according to claim 1, 2,3, 4 or 5 in which the recorded information is encrypted in real time.
    <Desc/Clms Page number 9>
  7. 7. A system for monitoring the execution of a procedure within a predetermined environment according to claim 6 in which said encrypted information is stored directly to DVD.
  8. 8. A system for monitoring the execution of a procedure within a predetermined environment according to claim 6 in which said encrypted information is stored directly to CD.
  9. 9. A system for monitoring the execution of a procedure within a predetermined environment according to claim 6 in which said encrypted information is stored directly to the hard drive of a pc.
  10. 10. A system for monitoring the execution of a procedure within a predetermined environment according to claim 7,8 or 9 in which only encrypted data is stored.
  11. 11. A system for monitoring the execution of a procedure within a predetermined environment according to claim 10 in which data may only be selected, downloaded and decrypted through use of the associated public or private keys.
  12. 12. A system for monitoring the execution of a procedure within a predetermined environment substantially as herein described, with reference to the accompanying drawings.
  13. 13. A method for monitoring the execution of a procedure within a predetermined environment comprising the steps of recording information from the procedure during the time in which the procedure is executed, encrypting said recorded information from the procedure and storing said encrypted information.
  14. 14. A method for monitoring the execution of a procedure within a predetermined environment according to claim 13
    <Desc/Clms Page number 10>
    in which the information from the procedure comprises visual information and is recorded using cameras.
  15. 15. A method for monitoring the execution of a procedure within a predetermined environment according to claim 13 or 14 in which the information from the procedure comprises audio information and is recorded using audio receivers.
  16. 16. A method for monitoring the execution of a procedure within a predetermined environment according to claim 13, 14 or 15 in which the information from the procedure comprises the status of instrumentation used during the procedure.
  17. 17. A method for monitoring the execution of a procedure within a predetermined environment according claim 13,14, 15 or 16 in which the information from the procedure comprises the movements of subjects within the environment which are monitored using sensors positioned on the subjects.
  18. 18. A method for monitoring the execution of a procedure within a predetermined environment according to claim 13, 14,15, 16,17 or 18 in which the recorded information is encrypted in real time.
  19. 19. A method for monitoring the execution of a procedure within a predetermined environment according to claim 18 in which said encrypted information is stored directly to DVD.
  20. 20. A method for monitoring the execution of a procedure within a predetermined environment according to claim 18 in which said encrypted information is stored directly to CD.
    <Desc/Clms Page number 11>
  21. 21. A method for monitoring the execution of a procedure within a predetermined environment according to claim 18 in which said encrypted information is stored directly to the hard drive of a pc.
  22. 22. A method for monitoring the execution of a procedure within a predetermined environment according to claim 19, 20,21 in which only encrypted data is stored.
  23. 23. A method for monitoring the execution of a procedure within a predetermined environment according to claim 22 in which data may only be selected, downloaded and decrypted through use of the associated public or private keys.
  24. 24. A method for monitoring the execution of a procedure within a predetermined environment substantially as herein described, with reference to the accompanying drawings.
GB0123140A 2001-09-26 2001-09-26 Real time encryption and storage of images of an environment Withdrawn GB2380345A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB0123140A GB2380345A (en) 2001-09-26 2001-09-26 Real time encryption and storage of images of an environment
PCT/GB2002/004372 WO2003028025A1 (en) 2001-09-26 2002-09-26 A system for real time data encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0123140A GB2380345A (en) 2001-09-26 2001-09-26 Real time encryption and storage of images of an environment

Publications (2)

Publication Number Publication Date
GB0123140D0 GB0123140D0 (en) 2001-11-14
GB2380345A true GB2380345A (en) 2003-04-02

Family

ID=9922729

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0123140A Withdrawn GB2380345A (en) 2001-09-26 2001-09-26 Real time encryption and storage of images of an environment

Country Status (2)

Country Link
GB (1) GB2380345A (en)
WO (1) WO2003028025A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8756437B2 (en) 2008-08-22 2014-06-17 Datcard Systems, Inc. System and method of encryption for DICOM volumes

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5689442A (en) * 1995-03-22 1997-11-18 Witness Systems, Inc. Event surveillance system
WO2000008585A2 (en) * 1998-08-04 2000-02-17 Contec Medical Ltd. Surgical recording and reporting system
US6211907B1 (en) * 1998-06-01 2001-04-03 Robert Jeff Scaman Secure, vehicle mounted, surveillance system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9023590D0 (en) * 1990-10-30 1990-12-12 Cooper Roger D Video signal processing apparatus
US5497419A (en) * 1994-04-19 1996-03-05 Prima Facie, Inc. Method and apparatus for recording sensor data
US5654750A (en) * 1995-02-23 1997-08-05 Videorec Technologies, Inc. Automatic recording system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5689442A (en) * 1995-03-22 1997-11-18 Witness Systems, Inc. Event surveillance system
US6211907B1 (en) * 1998-06-01 2001-04-03 Robert Jeff Scaman Secure, vehicle mounted, surveillance system
WO2000008585A2 (en) * 1998-08-04 2000-02-17 Contec Medical Ltd. Surgical recording and reporting system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Medical Imaging 2000:PACS Design & Evaluation: Engineering & Clinical Issues, San Diego, CA, USA, 15-17 Feb 2000. pp 335-342 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8756437B2 (en) 2008-08-22 2014-06-17 Datcard Systems, Inc. System and method of encryption for DICOM volumes

Also Published As

Publication number Publication date
WO2003028025A1 (en) 2003-04-03
GB0123140D0 (en) 2001-11-14

Similar Documents

Publication Publication Date Title
JP5127446B2 (en) Data encryption application that integrates multi-source long-term patient level data
US20030014282A1 (en) Method and system for creating a conveniently accessible portable medical history
CN104008262B (en) Method and system for showing medical content
Branstetter IV Basics of imaging informatics: Part
Nanah et al. The pros and cons of digital health communication tools in neurosurgery: a systematic review of literature
Manning et al. E-Health and telemedicine in otolaryngology: Risks and rewards
US20060200066A1 (en) Filtering data requiring confidentiality in monitor mirroring
US20050108059A1 (en) Portable health data system
US20080137922A1 (en) Organization of dissimilar data for platform-independent diagnostic imaging presentation
Robertson et al. Hospital, radiology, and picture archiving and communication systems
GB2380345A (en) Real time encryption and storage of images of an environment
JPH11143956A (en) Method and device for disclosing medical treatment information to other medical clinic
US11979681B2 (en) Image recording unit
CA2513471A1 (en) Method and system for creating a conveniently accessible medical history
US20070136101A1 (en) Image transfer device, an image diagnostic device equipped with the same, an image management server, and an image display device
KR20090101561A (en) Personal health record service method and system using mobile devices
JP2007325779A (en) Medical image control system, medical image regeneration device and program
JP2019053443A (en) Electronic medical chart browsing system, and electronic medical chart browsing method
Darrow et al. The potential for undue patient exposure during the use of telementoring technology
Armbrust PACS and image storage
Robertson Image dissemination and archiving
JP2003296453A (en) Medical data communication system
Liu et al. A HIPAA-compliant architecture for securing clinical images
WO2019215782A1 (en) Diagnosis information provision device, method, and system
Shrestha Telemedicine and virtual health care during coronavirus disease pandemic

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)