AU2020101946A4 - HIHO- Blockchain Technology: HEALTH INFORMATION AND HEALTHCARE OBSERVATION USING BLOCKCHAIN TECHNOLOGY - Google Patents

HIHO- Blockchain Technology: HEALTH INFORMATION AND HEALTHCARE OBSERVATION USING BLOCKCHAIN TECHNOLOGY Download PDF

Info

Publication number
AU2020101946A4
AU2020101946A4 AU2020101946A AU2020101946A AU2020101946A4 AU 2020101946 A4 AU2020101946 A4 AU 2020101946A4 AU 2020101946 A AU2020101946 A AU 2020101946A AU 2020101946 A AU2020101946 A AU 2020101946A AU 2020101946 A4 AU2020101946 A4 AU 2020101946A4
Authority
AU
Australia
Prior art keywords
data
healthcare
information
patient
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2020101946A
Inventor
Dr. Khaleel Ahmad (Assistant Professor)
(Associate Professor and Head (Dean P &M)), Dr. M. A. Rizvi
Dr. Djamshid Sultanov (Associate Professor and Head of Department)
Dr. Khalim Khujamatov (Associate Professor and Head of Dept)
Dr. Manju Khari
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AU2020101946A priority Critical patent/AU2020101946A4/en
Application granted granted Critical
Publication of AU2020101946A4 publication Critical patent/AU2020101946A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • G06F16/1834Distributed file systems implemented based on peer-to-peer networks, e.g. gnutella
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A90/00Technologies having an indirect contribution to adaptation to climate change
    • Y02A90/10Information and communication technologies [ICT] supporting adaptation to climate change, e.g. for weather forecasting or climate simulation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Public Health (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Primary Health Care (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Epidemiology (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

Patent Title: HIHO- Blockchain Technology: HEALTH INFORMATION AND HEALTHCARE OBSERVATION USING BLOCKCHAIN TECHNOLOGY. ABSTRACT My Invention "HIHO- Blockchain Technology "is a technologies are disclosed herein to secure flexible access to the healthcare information resources (HIR) contained within electronic health records (EHR) systems. The invention auto managing access permissions with certified self-sovereign identities and distributed ledger techniques, HIR may be secured. Medical stop, Patients and other users may be registered to access a distributed ledger, such as a healthcare blockchain, employed to set, host and adjudicate permissions to access HIR. Authorized owners, medical stop, patients with rights to their own HIR may be able to grant fine-grained and conditional access permissions to third parties. Information transfers and transactions occurring according to these permissions may be logged within smart contracts incorporated in the healthcare blockchain. The invented method creates an electronic health record and analyzes that record to present a summary report. The report may optionally include treatment opportunities, strategies, and plans for the physician and patient. Data processing steps used to create and analyze the record and deliver the summary data may include aggregation, integration, internal validation, clinical validation, inspection, prediction, and communication. 27 Dr. Manju Khari Dr. Khaleel Ahmad (Assistant Professor) Dr. M A Rizvi (Associate Professor and Head (Dean P &M)) Dr. Khalim Khujamatov (Associate Professor and Head of Department) Dr. Djamshid Sultanov (Associate Professor and Head of Department) TOTAL NO OF SHEET: 5 NO OF FIG: 05 110 SHR It NOOs - - ] PanNotify Auto paymen FG..1. SAFO.CATSOIG.H.PRTONO ICOSDPOES

Description

Dr. Manju Khari Dr. Khaleel Ahmad (Assistant Professor) Dr. M A Rizvi (Associate Professor and Head (Dean P &M)) Dr. Khalim Khujamatov (Associate Professor and Head of Department) Dr. Djamshid Sultanov (Associate Professor and Head of Department) TOTAL NO OF SHEET: 5 NO OF FIG: 05
110
- - ] PanNotify
SHR It NOOs Auto paymen
FG..1. SAFO.CATSOIG.H.PRTONO ICOSDPOES
Australian Government IP Australia Innovation Patent Australia
Sr. no: IP-52: Patent Title: HIHO- Blockchain Technology: HEALTH INFORMATION AND HEALTHCARE OBSERVATION USING BLOCKCHAIN TECHNOLOGY. Name and address of patentees(s): Dr. Manju Khari Address: Computer Science and Engineering Department, Ambedkar Institute of Advanced Communication Technologies and Research, Under Govt. of NCT of Delhi, 110031, India. E-mail: [email protected] Dr. Khaleel Ahmad (Assistant Professor) Address: University: Department of Computer Science and Information Technology Maulana Azad National Urdu University, Hyderabad, India - 500032 E-mail: [email protected] Dr. M A Rizvi (Associate Professor and Head (Dean P &M)) (Department of Computer Engineering and Applications) Address: National Institute of Technical Teachers Training and Research, Bhopal, Shanti Marg, Shamla Hills Nhopal M.P. India-462002. E-mail: [email protected] Dr. Khalim Khujamatov (Associate Professor and Head of Department) (Data Communication Networks and Systems) Address: Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Amir Temur avenue 108, Tashkent 100200, Uzbekistan. E-mail: [email protected], [email protected] Dr. Djamshid Sultanov (Associate Professor and Head of Department) (Hardware and Software of Management Systems in Telecommunications (Head of International Relations Department) Address: Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Amir Temur avenue 108, Tashkent 100200, Uzbekistan. E-mail: [email protected], [email protected] Complete Specification: Australian Government
FIELD OF THE INVENTION
My invention "HIHO- Blockchain Technology" is related to health information and healthcare observation using blockchain technology and also relate to the field of electronic health records, in exemplary embodiments relates to improved methods for maintaining, providing and delivering health record information.
BACKGROUND OF THE INVENTION
Healthcare records containing vital information resources may be generated by a variety of entities, such as healthcare providers, pharmacies, patients, and others. These healthcare records, even if in electronic health record (EHR) form, may reside in a variety of locations, and may not be easily accessible to a variety of applications, current stakeholders, and/or other users of those healthcare records. At the same time, different systems for storing healthcare records may utilize their own mechanism for controlling and disbursing the health information resources (HIR) that are stored within their various EHRs. This may cause confusion among patients and other users of the healthcare data, as well as difficulty in accessing the healthcare data itself. In many cases, patients may have little to no control of their EHRs and/or HIRs that pertain to them. In some cases, new applications development that could benefit from accessing and managing HIR data may be effectively restricted within legacy EHR environments.
Additionally, there are regulations and laws directed to the privacy of healthcare data. For example, regulations embodied in the Health Insurance Portability and Accountability Act (HIPAA) of 1996 regulates the extent to which certain kinds of patients' protected health information (PHI) may be shared with third- parties and/or otherwise utilized without the patient's permission. As a result, entities that store healthcare records containing PHI have implemented proprietary mechanisms for compliance to these regulations and for managing them. Accordingly, there are a variety of different systems for managing EHRs, most of which are not easily interoperable with each other.
Furthermore, due to potential liability resulting from non-compliance with PHI handling regulations, practicing health systems (e.g., hospitals) often choose to control the full lifecycle of their EHRs, from birth to destruction of the HIR data within them. Thus, the HIRs, or the presentation thereof, may not be readily customized or otherwise accessible to patient needs or the needs of the users of the data. Further still, caretakers of the healthcare data, such as care providers within healthcare systems, may be burdened with the liability of managing and disbursing healthcare data, in many cases, distracting those entities from their core competencies, such as providing healthcare.
The method may include receiving, by the value-added certificate authorization system, from an application download system, a request to bind the CSI to a healthcare application; and instructing, responsive to the request to bind the CSI to the healthcare application, storing the CSI in a digital wallet of the client system. In still further example embodiments, the method may be wherein the CSI is a first CSI, the first CSI corresponding to a first user, the method further comprising: receiving a request to grant a permission for a health information resource to a second user, the second user having a second CSI; determining, based at least in part on the first CSI, that the first user is authorized to set permissions for the health information resource; and instructing, a blockchain system, to include a smart contract corresponding to the grant of the permission to the second user for the health information resource.
The grant of the permission for the health information resource comprises one or more conditions under which the second user is permitted to access the health record. Further still, in example embodiments, the client system is a first client system, and wherein the smart contract comprises instructions to issue an access token to the second user, the access token allowing a second client system corresponding to the second user to receive the health information resource from a resource server.
In example there may be a system including a memory that stores computer-executable instructions; at least one processor configured to access the memory, wherein the at least one processor is further configured to execute the computer-executable instructions to: receive, from a client system, a request to certify a self-sovereign identity certificate (SIC) for access to a healthcare blockchain; request, from the client system, a plurality of personal identification information associated with the sovereign identity; receive the plurality of personal identification information; request, from an independent identity authority system, verification of the plurality of personal identification information; verify the plurality of personal identification information; and certify, responsive to the verification, the SIC as a certified sovereign identity (CSI), wherein the CSI authorizes the client system to access the healthcare blockchain.
In example the at least one processor is further configured to execute the computer executable instructions to register the CSI with the healthcare blockchain. In further example embodiments, the CSI comprises a public key that is included in the healthcare blockchain and a private key that is stored on the client system. In additional example embodiments, the at least one processor is further configured to execute the computer executable instructions to: receive, from an application download system, a request to bind the CSI to a healthcare application; and instruct, responsive to the request to bind the CSI to the healthcare application, storing the CSI in a digital wallet of the client system.
In example the system is such that the CSI is a first CSI, the first CSI corresponding to a first user, and wherein the at least one processor is further configured to execute the computer-executable instructions to: receive a request to grant a permission for a health information resource to a second user, the second user having a second CSI; determine, based at least in part on the first CSI, that the first user is authorized to set permissions for the health information resource; and instruct, a blockchain system, to include a smart contract corresponding to the grant of the permission to the second user for the health information resource. In further example embodiments, the grant of the permission for the health information resource comprises one or more conditions under which the second user is permitted to access the health information resource. In still further example embodiments, the client system is a first client system, and wherein the smart contract comprises instructions to issue an access token to the second user, the access token allowing a second client system corresponding to the second user to receive the health information resource from a resource server.
There are one or more non-transitory computer-readable media maintaining instructions executable by one or more processors to perform operations comprising: identifying that access to a healthcare blockchain is to be established on behalf of a first user; generate a self- sovereign identity certificate (SIC) associated with the first user; sending, to a value added certificate authorization system, a request to certify the SIC for access to a healthcare blockchain; receiving a request for a plurality of personal identification information associated with the first user; receiving the plurality of personal identification information; sending, to the value-added certificate authorization system, the plurality of personal identification information; receiving an indication of certification of the SIC as a certified sovereign identity (CSI), wherein the CSI authorizes to access the healthcare blockchain.
In example the operations further comprise: receiving, a healthcare application; requesting, the value-added certificate authorization system, to bind the CSI to the healthcare application; receiving instructions to store the CSI in a digital wallet associated with the healthcare application; and storing the CSI in the digital wallet of the healthcare application. In further example embodiments, the operations further comprise: requesting setting a first permission for a first healthcare record for a second user associated with a second CSI; and receiving confirmation that the first permission is set, wherein the confirmation indicates that a smart contract corresponding to the first permission has been added to the healthcare blockchain.
First permission is a conditional permission. In yet further example embodiments, the operations further comprise: generate a verification request for a healthcare information resource; send the verification request to a blockchain system; receive an access token corresponding to the healthcare information resource; generate a request for the healthcare information resource; send, to a resource server, the request for the healthcare information resource and the access token; and receive, the healthcare information resource. In some example embodiments, the healthcare information resource is received in a predetermined format, and wherein the operations further comprise displaying the healthcare information resource.
The Electronic Health Record (EHR) is a key element in efforts to manage health care delivery. In general, the EHR is most valuable today for the sickest members of our society-the 10% of the population that consumes 80% of the cost. With multiple conditions requiring multiple specialists, many powerful medications, numerous ancillary care providers and careful care coordination from case and disease managers, these individuals are also likely to be the least able personally to communicate the complexity of their histories and health status to their next treating physician. Yet it is exactly that complexity that confounds the medical community's attempts to reduce errors of omission and commission and to minimize the cost of duplicative and otherwise unnecessary care.
Broadly speaking, there are three sources of health care information about patients: the patients themselves (or their care givers); the patients' physicians, hospitals and other providers; and the patients' health plan or other payer. Most patients have only limited information about their own care and even less ability to obtain, retain and store such data. Worse, a patient's ability to personally maintain their own health record decreases with illness, infirmity and, often, with age. Even the most user-friendly personal health record (PHR) systems available today are seldom used and even less frequently updated on a timely basis by their owners.
Physicians, hospitals and other providers are required by law and professional ethics to maintain significant records pertaining to the care they provide. These providers do not either generally or comprehensively obtain patient data from the spectrum of other providers. Thus, hospitals might have a deep reservoir of information regarding the services and tests provided to patients within the facility and, perhaps, by the admitting physician, but little, if any, information from other facilities or physicians who have treated those same patients. A single physician knows and has records of everything the patient has told him and the treatment he has provided, but that provider knows neither what the patient has been told by other physicians nor what treatment other physicians have provided. Complicating the distributed nature of the information is that it remains overwhelmingly paper-based and hand-written, rendering it exceedingly difficult to integrate, analyze and/or transmit effectively.
Therefore, there is a need for improved systems and methods for integrating patient data and providing it in a useful form to those who need it.
PRIOR ART SEARCH
US20140108046A1*2012-10-122014-04-17Ruben Gerardo Echeverria Cabrera Sharing healthcare information on private collaborative networks. US20150205929A1*2014-01-232015-07-23Dror Samuel Brama Method, System and Program Product for Transferring Genetic and Health Data. WO2015175722A1*2014-05-132015-11-19Nant Holdings Ip, Llc. Healthcare transaction validation via blockchain proof-of-work, systems and methods. WO2015179020A2*2014-03-272015-11-26Ent Technologies, Inc. Generalized entity network translation (gent). US5506937A*1993-04-021996-04-09University Of West Florida Concept map based multimedia computer system for facilitating user understanding of a domain of knowledge. US5583758A*1992-06-221996-12-1OHealth Risk Management, Inc. Health care management system for managing medical treatments and comparing user-proposed and recommended resources required for treatment. US6022315A*1993-12-292000-02-08First Opinion Corporation Computerized medical diagnostic and treatment advice system including network access. US6110109A *1999-03-262000-08-29Biosignia, Inc. System and method for predicting disease onset. US6184030B1*1995-10-022001-02-06Mohammad W. Katoot Biologically-active polymers.
US20010023419A1*1996-02-092001-09-20Jerome Lapointe Method for selecting medical and biochemical diagnostic tests using neural network-related applications.
OBJECTIVES OF THE INVENTION
1. The objective of the invention is to a technologies are disclosed herein to secure flexible access to the healthcare information resources (HIR) contained within electronic health records (EHR) systems. The invention auto managing access permissions with certified self-sovereign identities and distributed ledger techniques, HIR may be secured. 2. The other objective of the invention is to Medical stop, Patients and other users may be registered to access a distributed ledger, such as a healthcare blockchain, employed to set, host and adjudicate permissions to access HIR. Authorized owners, medical stop, patients with rights to their own HIR may be able to grant fine-grained and conditional access permissions to third-parties. 3. The other objective of the invention is to Information transfers and transactions occurring according to these permissions may be logged within smart contracts incorporated in the healthcare blockchain. The invented method creates an electronic health record and analyzes that record to present a summary report. The report may optionally include treatment opportunities, strategies, and plans for the physician and patient. 4. The other objective of the invention is to the data processing steps used to create and analyze the record and deliver the summary data may include aggregation, integration, internal validation, clinical validation, inspection, prediction, and communication. 5. The other objective of the invention is to wherein a plurality of said categories of confirming information are selected based on the diagnosis code under evaluation and also the invention is to wherein information in one of said categories of confirming information is weighted differently from information in another category of confirming information depending on the diagnosis code under evaluation. The invention is to wherein a hierarchy of relative value in determining whether the patient has the medical condition represented by the condition code is assigned to said categories of confirming information. 6. The other objective of the invention is to including determining a weighted confidence level parameter based on the total weighted value of confirming evidence supporting a presumption that the patient has the condition represented by the diagnosis code and also the invention is to wherein available confirming information is evaluated based on predetermined clinical validation rules to determine a confidence level that a condition is present. The invention is to wherein available confirming information is evaluated based on predetermined clinical validation rules to determine a weighted confidence level that a condition is present. 7. The other objective of the invention is to wherein said output includes a summary report identifying medical conditions that the patient can be presumed to have based on analysis of confirming information in the data records for that patient and also the invention is to wherein information in one of said categories of confirming information is weighted differently from information in another category of confirming information depending on the diagnosis code under evaluation. The invention is to wherein a hierarchy of relative value in determining whether the patient has the medical condition represented by the condition code is assigned to said categories of confirming information. 8. The other objective of the invention is to including determining a weighted confidence level parameter based on the total weighted value of confirming evidence supporting a presumption that the patient has the condition represented by the diagnosis code and also the invention is to wherein available confirming information is evaluated based on predetermined clinical validation rules to determine a confidence level that a condition is present. 9. The other objective of the invention is to wherein available confirming information is evaluated based on predetermined clinical validation rules to determine a weighted confidence level that a condition is present.
SUMMARY OF THE INVENTION
The technologies disclosed herein provide functionality for enabling electronic access to protected health information (PHI) according to the wishes of a patient and/or other authorized parties including, but not limited to, the healthcare provider to whom the healthcare data may belong or is otherwise authorized under existing regulation. The patient or provider may designate who (e.g., individuals, entities, applications, etc.) may have permission to access his or her PHI and/or other health information resources (HIRs), and may further place conditional stipulations (e.g., time periods, redactions, locations, number of views, device types, anonymity, etc.) by which a designee may access authorized PHI and/or other HIRs.
According to example embodiments, electronic healthcare records (EHRs) may reside at a resource system of an entity that has generated the healthcare record or has received the healthcare record, such as a hospital's resource system(s) for managing EHRs. These resource systems may be configured to provide PHI and/or other HIRs to an authorized user application according to a predefined standard. An application program interface (API) may reside on a front-end of the resource system to provide this predefined format for granular HIRs to a requesting and authorized user's client system.
According to example embodiments of the disclosure, a user (e.g., patient) may be able, via an application executing on his or her client system, set conditional permissions for his or her HIR. Through a user interface of the application, the user may be able to designate conditional permissions for a particular HIR, or collection of resources such as those typically contained in an existing EHR. These conditional permission(s) may be used to generate a permission grant that may be sent to a distributed ledger, or healthcare blockchain system, to invoke an executable smart contract within a healthcare blockchain. If the user is authorized to cause permissions to be written onto the blockchain' s smart contracts, then the blockchain systems may incorporate (e.g., hash with prior blocks) a new block containing new and/or modified permissions, such as in the form of one or more smart contracts.
Smart contracts contained within the healthcare blockchain may operate using any suitable protocols to adjudicate and/or enable agreements between parties to execute according to those agreements as prescribed, specified, codified, verified, and/or enforced. These same smart contracts may be both self-executing and or self- enforcing. In example embodiments, a smart contract is used to determine whether access to an HIR should be granted to a requesting party. In this case, the smart contract may make this determination based upon, among other factors, the verification of a certified self sovereign identity (CSI) of the requesting party, a CSI of the party owning the information, and permissions previously provided by the owning party.
According to example embodiments of the disclosure, permissions may be expressed within one or more smart contract(s) in the blockchain that designates and/or enables the permissioning of others, such as in a conditional manner, to access the HIR for which the permissions in the blockchain were generated. Once incorporated into the healthcare blockchain, the smart contract(s) may generate and/or send an indication to a client system of a permissioned party that he, she or it may access the HIR for which permissions have been granted. In example embodiments, only the most recent permission states, as incorporated in the healthcare blockchain, may be able to authorize access tokens. As a result, an immutable record of all activity may recorded in the blockchain while preserving near real-time patient control and/or ability to correct any mistakes of information transfer to client and other systems.
Upon receiving an indication that a user (e.g., doctor, pharmacy, insurance company, researcher, etc.) or user application is authorized to access particular HIR, that user application may request HIR for which permissions have been granted, according to example embodiments of the disclosure. In other example embodiments, a user may attempt unprompted access, such as without knowing if he or she already has access to the particular HIR. In either case, the client system of the permissioned user, via an application operating thereon, can cooperate with other entities to arrange the issuance of an access token, using which, the HIR may be obtained. In example embodiments, the access token may be generated by smart contracts, as incorporated in the healthcare blockchain, and representing permissions granted for the particular HIR being requested. In example embodiments, the creation of the access token may be recorded within the healthcare blockchain, thus maintaining an immutable journal of all access token creation and issuance events.
The access token, as received by a client system associated with a permissioned user, may then be sent, by the client system, to a resource system where the PHI resources and other HIR resides. Responsive to receiving the access token, the resource system may provide the requested HIR to the client system of the requesting user. When a client system receives an HIR, the client system may confirm receipt of the transaction brokered by the blockchain. Using the confirmation, the blockchain may maintain a record, such as an immutable record, of transactions of healthcare resources, as well as metadata pertaining to requests, permissions, and access tokens granted, or the like.
A client system may be configured to interact with other systems of the HIR delivery infrastructure to establish certified self-sovereign identification (CSI) key pairs (e.g., unique public, private and symmetric keys operating isochronously on both client and server systems, etc.) for accessing the healthcare blockchain, as well as other systems. In some cases, the access, as allowed by the CSI infrastructure may be pseudonymous. This process may include the client system being directed to one or more value-added certificate authorization system(s) with which the client system, and a user thereon, interacts. The value-added certificate authorization system(s) may request information about a user for whom the CSI is to be established. This information, in some cases, may include his or her current or anticipated healthcare providers' identification. The value added certificate authorization system(s) may receive information about the user and/or his or her current or anticipated health providers' identification from the client system, as enteredby the user thereon.
According to example embodiments, the value-added certificate authorization system(s) may verify the information about the user from an independent identity authority system. Based at least in part on the comparison of personal identity information supplied from the client system about the user and the corresponding information from and or other collaboration with the independent identity authority system, the value-added certificate authorization system(s) may deem that the user or entity is verified to be who he, she, or it claims to be. If the user is verified, then the value-added certificate authorization system(s) may digitally sign a self-sovereign identity certificate (SIC) of the user to generate the user's certified self-sovereign identity (CSI). The value-added certificate authorization system(s) may then register the CSI's public key. The CSI public key and other CSI certificate information may be registered with and/or hashed as a transaction onto the healthcare blockchain. The CSI key pair may include a private CSI key that may be generated and stored on the client system associated with the user.
The CSI is to be used subsequently by the client system and the user thereon to access HIRs to which the user may be entitled. In some cases, the access to the HIR, using the CSI may be pseudonymous. After the CSI is established, the value- added certificate authorization system(s) may direct the client system to an application download system and/or an application store to download a healthcare application onto the client system. A client system may be configured to download and install a healthcare application from an application download system that the client device may access directly or be redirected from one or more other entities. The application download system may cooperate with the value-added certificate authorization system(s) to bind the public CSI of the user of the client system to the application that is downloaded and installed on the client system. This process may involve the application download system requesting verification of the user's access to the healthcare blockchain from the blockchain systems. Upon verification of the user's access to the blockchain system, the application download system may request the value-added certificate authorization system(s) to set-up the health care application.
After the CSI establishment process, a process for binding a user, and his or her CSI, to the client system may be commenced. In some example embodiments, this process may involve various biometric and/or other multi-factor identification techniques and may result in the user being bound to the client device, and the user, with his or her CSI, bound to the healthcare blockchain. At this point, granting access to HIRS associated with the CSI of the user may be controlled by smart contracts, such as smart contracts residing on the healthcare blockchain.
The healthcare application may be installed on the client device and bound to the CSI of the user. This may entail storing the CSI key pair, hash thereof, and/or other identifying information about the user in a digital wallet and/or other modules on the client device. Once the CSI is stored and bound to the healthcare application, the healthcare application operating on the client device may interact with the value- added certificate authorization system(s) to establish permissions for healthcare resources for which the user owns rights (e.g., the user's patient data). The permissions may, in some cases, be granulated and/or with conditions and/or stipulations. When permissions are established, a permission command indicating the permissions may be generated and sent to the blockchain systems for incorporation into the appropriate smart contract permission held within the healthcare blockchain. In some example embodiments, the establishment of permissions may be communicated to other entities, such as resource system(s) that have the HIRs for which permissions were established, as well as the value-added certificate authorization system(s), and/or other client systems associated with other users that have been granted permissions to the healthcare records.
In example embodiments, the permissions granted by a patient to access specific HIR may be highly granular, and may allow for conditions and/or stipulations. For example, the permissions may not only indicate who or what is allowed to access particular medical records' resources (e.g., HIRs), but also when those records may be accessed, if any parts must be redacted, if those records are to be anonymized, etc.
According to further example embodiments of the disclosure, the HIR, as provided from the resource system to the client system, may be relatively granular and adhere to a pre designated format. The resource systems, in example embodiments, may have a front-end application programming interface (API) that may be universal and known to application developers, so that different application developers may develop healthcare applications for the client devices that may be able to interface with the resource systems in a pre established manner. It is to be understood that both the following summary and the detailed description are exemplary and explanatory and are intended to provide further explanation of the invention as claimed. Neither the summary nor the description that follows is intended to define or limit the scope of the invention to the particular features mentioned in the summary or in the description.
In an exemplary embodiment, a method creates an electronic health record (EHR), and analyzes that record to present treatment opportunities, strategies, and plans for the physician and patient in a Patient Clinical Summary report also referred to as a PCS report. An electronic health record (EHR) may provide clinical information about an individual patient and may include data from various primary stakeholders in the healthcare system: Payers (insurance companies and other entities at financial risk for care), providers (physicians, pharmacists, nurses and other medical professionals in acute, ambulatory, nursing home, and home care settings), and the patients themselves.
Data residing at payers will be referred to as a payer-based health record (PBHR). The PBHR may include claims, care management, pharmacy, self-surveys and other data. Provider (hospitals and physician offices) data will be referred to as an electronic medical record (EMR). These records may include clinical findings, laboratory results, radiology images, or other data. Finally, data that patients maintain on themselves are referred to as a personal health record (PHR). This data may include family medical history, patient medical history, over-the-counter medications, allergies, acute or chronic diseases, and other health and wellness information.
In an exemplary embodiment, a plurality of data processing steps are used to create the electronic health record and the summary. For example, these steps may include aggregation, integration, internal validation, inspection, prediction, and communication. In an embodiment, these patient-centric data processes correctly identify the patient and all the data from all sources that belong to that patient. Aggregation is a process that collects data from one or more disparate sources that could belong to the patient in question. Preferably, aggregation takes all available data from all the components of the PBHR, EMR and PHR described above, and "weaves" them into an aggregate patient record that is utilized by subsequent data processes.
In an exemplary embodiment, an integration process examines the aggregate record for duplicate and overlapping data (e.g. identical laboratory results from both the lab and the doctor's office), identifies that data, eliminates the duplicate data, and assembles a revised single, consolidated record.
In an embodiment, internal validation processes are performed using various techniques, which may include probability assessment, referential edits, algorithms and/or other techniques to determine that certain key data elements in the consolidated record are, in fact, correct. For example, for some medical conditions such as heart attack, the "rule out" and "present" codes may be the same. Therefore, in exemplary embodiments, a mechanism to resolve ambiguity is desirable. In exemplary embodiments, an internal validation process is applied to drug data, laboratory results, physicians' assessments, and other data elements to conclude that a condition is or is not present. If, for example, there is one healthcare claim that indicates a condition, this may be insufficient information to conclude with certainty that the condition really exists. If, however, this claims data are corroborated by two or three physician encounter records or other healthcare data diagnosing the condition, then it is far more likely that the condition exists.
A similar validation process is used in exemplary embodiments to confirm that the patient in question is, indeed, the correct patient. At the conclusion of these processes, in an exemplary embodiment, a single, integrated, woven, complete, and consolidated clinical history is provided for the correct patient. This record can then be used as a common, central electronic health record or EHR.
Inspection of the aggregated, integrated, and validated patient data in the consolidated record may then be accomplished as desired. In exemplary embodiments, this process compares the consolidated patient record to evidence-based guidelines and best practices to probe for gaps in care and reveal treatment opportunities. Some embodiments of the inspection process may identify care being delivered that is not appropriate as well as recommended care. In example embodiments, this process includes a hierarchy of prompts (alerts, warnings, and potential errors) that supports the physician's decision making process.
A prediction process may use various predictive modeling techniques (neural networks, artificial intelligence, etc.) to identify patients who are at higher risk than others for various conditions. In such cases, analytical techniques search for those patients who could require extensive medical services and identify the approximate cost of those services. The prediction process then identifies appropriate treatment strategies, plans and actions for the patient. In exemplary embodiments, at the conclusion of the inspection and prediction processes, a summary (for example, a Patient Clinical Summary) of the analyzed consolidated patient record may be created for use by authorized individuals within the healthcare system.
The summary is also forwarded to authorized individuals. Communication can be via the internet, smart card, fax, or in person with the display medium being a PC monitor screen, PDA device, or paper, for example. The method disclosed is useful in creating a consolidated and validated electronic health record for a patient using data from one or more possibly inconsistent databases, and which may be summarized and communicated to any authorized health care provider, or the patient, as desired.
BRIEF DESCRIPTION OF THE DIAGRAM
FIG. 1: is a flow chart showing the operation of a disclosed process. FIG. 2: is a block schematic diagram showing an apparatus for collecting, processing and distributing data. FIG. 3: is a block schematic diagram showing a apparatus for collecting, processing, and distributing data. FIG. 4: is a block schematic diagram of a general purpose computer system used in some exemplary embodiments. FIG. 5: is a flow chart showing an exemplary embodiment of a process for electronically retrieving a patient clinical summary.
DESCRIPTION OF THE INVENTION
The invention will now be explained in terms of exemplary embodiments. This specification discloses one or more embodiments that incorporate the features of this invention. The embodiment(s) described, and references in the specification to "one embodiment", "an embodiment", "an example embodiment", etc., indicate that the embodiment(s) described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, persons skilled in the art may implement such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described. The application includes an appendix, which is part of this specification and is incorporated herein by reference.
Referring to FIG. 1, in an exemplary embodiment, a method creates an electronic health record (EHR), and analyzes that record to provide desired outputs. For example, these outputs may include treatment opportunities, strategies, and plans for the physician and patient in a summary report. The electronic health record (EHR) provides clinical information about an individual patient that may, for example, include data from three primary stakeholders in the healthcare system: Payers (insurance companies and other entities at financial risk for care), providers (physicians, pharmacists, nurses and other medical professionals in acute, ambulatory, nursing home, and home care settings), and the patients themselves.
Data residing at payers will be referred to as a payer-based health record (PBHR). The PBHR may include claims, care management, pharmacy, self-surveys and other data. Provider (hospitals and physician offices) data will be referred to as an electronic medical record (EMR). The EMR may include, for example, clinical findings, laboratory results, radiology images, and other data. Finally, data that patients maintain themselves are referred to as a personal health record (PHR). This data may include, for example, family medical history, patient medical history, over-the-counter medications, allergies, acute or chronic diseases, and other health and wellness information.
A plurality of data processing steps are used to create the electronic health record and the summary. For example, these steps may include one or more of aggregation, integration, internal validation, inspection, prediction, and communication. In exemplary embodiments these patient-centric data processes are combined to correctly identify the patient and all the data from all sources that belong to that patient. In exemplary embodiments, aggregation is a process that collects all data from one or more disparate sources that could belong to the patient in question. In some preferred embodiments, aggregation takes all available data from all the components of the PBHR, EMR and PHR described above, and "weaves" them into an aggregate patient record that is utilized by subsequentdata processes.
An integration process examines the aggregate record for duplicate and overlapping data (e.g. identical laboratory results from both the lab and the doctor's office), identifies that data, eliminates the duplicate data, and assembles a revised single, consolidated record. In an embodiment, internal validation processes are performed using various techniques, which may include probability assessment, referential edits, algorithms and/or other techniques to determine that certain key data elements in the consolidated record are, in fact, correct. For example, for some medical conditions such as a heart attack, the "rule out" and "present" codes used in some records may be the same. Therefore, it is desirable to provide a mechanism to resolve ambiguity. For example, internal validation may process drug data, laboratory results, physicians' assessments, and other data elements to conclude that the condition is or is not present. If, for example, there is one healthcare claim that indicates a condition, this may be insufficient information to conclude with certainty that the condition really exits. If, however, this claims data are corroborated by two or three physician encounter records or other healthcare data diagnosing the same condition, then it is much more likely that the condition exists.
A similar validation process is used in some embodiments to confirm that the patient in question is, indeed, the correct patient. At the conclusion of these processes, in exemplary embodiments, a single, integrated, woven, complete, and consolidated clinical history exists on the correct patient. This record is referred to as the electronic health record or EHR. Inspection of the aggregated, integrated, and validated patient data in the consolidated record may then be accomplished as desired. In exemplary embodiments, this process compares the consolidated patient record to evidence-based guidelines and best practices to probe for gaps in care and reveal treatment opportunities. The inspection process may identify care being delivered that is not appropriate as well as recommended care. This process may also include a hierarchy of prompts (alerts, warnings, and potential errors) that supports the physician's decision-making process.
A prediction process may use various predictive modeling techniques (neural networks, artificial intelligence, etc.) to identify patients who are at higher risk than others for various conditions. Analytical techniques search for those patients who could require extensive medical services and identify the approximate cost of those services. The prediction process then identifies appropriate treatment strategies, plans and actions for the patient. At the conclusion of the inspection and prediction processes, a summary (for example, a Patient Clinical Summary) of the analyzed consolidated patient record is created for use by authorized individuals within the healthcare system. In an embodiment, the summary is forwarded to authorized individuals. Communication can be via the internet, smart card, fax, or in person with the display medium being a PC monitor screen, PDA device, or paper, for example.
FIG. 1: is a data flow chart showing an exemplary embodiment of a generalized data flow method for processing health care data. This process may be implemented in a variety of embodiments that use one, several, or all of the steps shown in FIG. 1, and may include additional steps as desired, and otherwise be varied, all within the intended scope of the present invention. As shown in the example of FIG. 1, the processing flow steps may include an input data step 102. In the example shown, a system obtains data from a variety of sources: copies of raw data from within the local system, copies of summary data in the local system, raw and summary data from data warehouses that payers or other providers control, and raw data transactions from production systems such as claims, pharmacy, lab results, EMRs, PHRs, and other data items.
Ideally, a unique and consistent patient identifier will be available for each record provided to the system. In many cases, the different systems involved may use disparate record formats and identifiers for those records. Thus, some level of processing and analysis is required to identify records belonging to the same individual and call for the relevant data from each. A Record Locator Service (RLS) may be used to indicate where there are records for "John Smith" and what identifiers are used to retrieve those records.
As patient-authorized Unique Patient Identifier numbers become more widely implemented in the industry, this process can be simplified.
As shown in FIG. 1, the process then includes a data quality assurance step 104, episode and condition mapping step 106, and predictive modeling step 108. In an embodiment, the resulting data are put into tables in step 110. Data taken from an eligibility file in step 114 and the data tables from step 110 are used in an electronic records collection process in step 112 to produce a summary report and a medical management interface file in step 116. The summary report may be provided to recipients via web 122, interactive voice response (IVR) 124, electronic data interchange (EDI) 126, reporting tools 118, computer network connection 120, or other available methods.
Each data type has likely sources, and a framework is established in the system allowing gathering of data from a series of transactions of differing formats without destroying the integrity of the overall process. For instance, lab result data may come in from multiple sources (including various independent labs and hospital vendors), each with its own transaction characteristics. As standards are created for lab results data formats, the process is preferably adapted to integrate that data in the available format. When a request for medical information is made by a provider, the system preferably retrieves all health records for a patient across a variety of sources. Four examples of data sources are: public health agencies, payers, providers, and the patients themselves. Public Health Agencies may include Medicare, Medicaid, NIH, CDC, etc. Payers may include managed care entities, PBMs, Labs, Referral and Authorizations, etc. Provider information may include Imaging Data, HIS, Referral and Authorization, Telemetry, and EMR. Patient data may include HRAs and Personal Health Records. Other sources may include grocery, financial transactions, etc.
The data are preferably assembled in a patient data model following a standard format. Many items of data will be associated with specific dates, often referred to as the Date of Service. Most lab tests, prescription fills, office visits, hospital stays and other health care services are performed at specific dates and times, and those dates can be very useful when assembling data for a patient. Some data (especially that from Personal Health Records) are not confined to specific dates. For example, family medical history, chronic illnesses, self-medication with Over the Counter (OTC) medications and dietary supplements may not be date-specific. Therefore, while time is a key dimension in the data assembly process, allowance must also be made for integrating data elements that do not have an associated date.
When the steps of getting data and assembling the data are complete, the data set is preferably processed further to eliminate redundancy and inconsistency. Lab results, for instance, may have been received both from the lab and from the doctor's office for the same test. The test results were originally created on the day after the doctor visit. For such cases, a set of rules are established to determine which record should be kept if there are multiple identical records, and which date should be used. Rules are also established for action in case minor differences are found between otherwise identical records. The completion of these data integration functions preferably results in a single record, in a predetermined structure, that appears coherent from a data element perspective.
The data set is also tested as part of the integration process. The testing process preferably examines the data set to determine the clinical "truth" of the record. For example, the testing function may examine data to validate a level of certainty that the patient has a particular condition and to judge its severity. Elements are preferably cross checked within the EHR for this purpose. A finding that only one doctor has reported a chronic condition would indicate a higher level of uncertainty, while verification of the diagnosis by its presence on multiple claims or encounters across multiple physicians would increase certainty.
Also, lab results that confirm the condition and prescription of appropriate drugs for some period of time each suggest a continuing belief that the condition exists. An appropriate data testing process helps to eliminate the effects of coding errors, coding problems associated with "rule out" diagnoses, and misdiagnosis in the early stages of a condition (the example being a diagnosis of Schizophrenia for a patient later found to have Lyme Disease). It is desirable to have the capability to indicate, display and use (in analytics) a level of certainty regarding conditions, particularly if the system recommends treatment or further diagnosis based on these patient conditions. The result of the data testing step will be a patient's EHR in a standardized form that has been evaluated for consistency and has an identified likelihood of being correct. In some cases, it is not possible to obtain complete records, but the data set available is preferably presented in a manner that is internally consistent and clinically reasonable.
Following the data testing step, the patient record (EHR) may be transmitted to its destination. The EHR may be transmitted to any authorized recipient. In particular, it may typically be available to at least three principal destinations: a subsequent evaluation step through the system (for identifying "treatment opportunities" by comparing it to Evidence-Based Medicine pathways and for predictive modeling), a third-party that requested the EHR, such as an emergency room or other care provider's office, and/or for saving to a data repository for reporting and/or later transmittal to one of the first two options. The entire available record, or any portion or summary of the record, may be transmitted as appropriate. In an exemplary embodiment, as described previously, a summary is provided to the care providers. This summary may have the format shown in Appendix A to this specification.
The summary shares information the health plan has about the patient with the patient's treating clinicians. The summary is created and may apply evidence-based medicine and predictive modeling capabilities to identify treatment opportunities ("gaps in care") for patients who are targeted for disease management or already enrolled in a disease management program. The treatment opportunities included within the Patient Clinical Summaries are intended to engage the physician in collaborating on the care plan for the patient. Various embodiments deliver the information in different forms depending on the needs of the recipient. In an embodiment, a web platform efficiently delivers health data to clinicians at the point of care.
This information may be delivered, for example, as a PDF report. Preferably, the presentation layer of the sending process supports HTML, PDF and XML output streams, as well as any other output streams that are desirable in view of the equipment and processes used by the recipients at the time. In an embodiment, the summary report is provided in an electronic data format compatible with a data processing system used by the receiving health care provider, such as in a raw data format so that the data can be immediately integrated into the provider's database.
The report (shown in Appendix A) has been formatted to meet the needs of clinicians by displaying the content of the report in an easy to use format that highlights the most critical information about the patient. The system may also provide this information electronically to other systems, such as patient portals and other provider information systems.
As shown in Appendix A, the summary may optionally include the following information:
Member Demographics: the most recent member demographic information.
Health Plan: the health plan from which this report was generated.
Health Status Measure: the HSM may be determined using the Case Alert" service available from ME Decision, the assignee of this application or other commercially available predictive modeling tool. The HSM is a score between 1-10 (10 is the highest) that shows the patient's risk relative to a master population.
Medical Conditions: displays medical conditions for which the patient has been treated. With each condition, a severity (Low, Moderate or High) is also displayed. The severity is based on the diagnosis code recorded on the healthcare claims, provider encounters or other healthcare data. For example, diabetes with a diagnosis code of 250.00 is less severe than a diabetes diagnosis code of 250.10. The severity of the condition also takes into consideration any co-morbid conditions, the number of hospitalizations associated with the condition, the prescriptions and the lab values. In a preferred embodiment, various conditions are grouped according to their severity, so that high severity conditions are presented first in a group, followed by groups of lower severity conditions.
IP Facility Admissions: allows the provider to review any inpatient admissions that have occurred for the patient. This section also includes admit and discharge dates and the principal diagnosis. Emergency Room Visits: provides information about emergency room visits by the patient. Monitored Services: presents the provider with a list of services that which the patient has received. It also provides the last service date, the most recent servicing provider and that provider's phone number.
Medications: lists medications based on the USC code and description.
Providers Seen: lists providers recently seen by the patient. It includes provider specialty and phone number.
Clinical Flags: provides information regarding treatment opportunities and Preventative Health and Wellness clinical flags for the patient. Treatment opportunities identify clinical risk factors for the patient's condition and treatment guidelines, based on evidenced based medicine. Preventative Health and Wellness clinical flags indicate generally healthy lifestyle services which the patient should receive. For example, a colonoscopy for a patient over the age of 50.
Care Management Summary: Based on the patient's identified condition(s) and associated severity, documents the care team's care plan for this patient.
Radiological and Laboratory Results: Lists results of radiological and laboratory tests.
With the goal to improve the efficiency of healthcare processes, reduce medical errors and decrease costs, providing immediate access to useful, timely, validated clinical information at the point of care will allow more appropriate clinical decisions resulting in improved clinical outcomes. Where return on investment has been difficult to demonstrate for EHR systems, the availability of easy-to-review summary data can have a significant impact on every clinician who will have access to a patient's history, medication list and other relevant clinical information. In fact, in a study produced by Health Core on Jul. 24, 2006, the result of supplying summarized, validated payer EHR data in the emergency department (ED) setting was a reduction in the cost of the ED visit, together with the cost of the first day of hospitalization for the subset of patients who were admitted to the hospital, of five hundred and forty-five dollars ($545) per Patient Clinical Summary provided. The system supports privacy regulations and addresses privacy concerns by selectively limiting the display of information in the report. For example, conditions relating to mental or behavioral health or certain diseases such as AIDS may be filtered so that they are not displayed. Similarly, medications related to these conditions and providers may be omitted from the report where their inclusion would tend to disclose the occurrence of mental health or AIDS treatment.
FIG. 2: is a block schematic diagram of one example implementation of a data processing and delivery system. In this embodiment, medical data processing is performed as a service using an Application Service Provider model. Various data files 212 are provided to a service bureau 214, which generates summary data, for example PCS data 216, in the manner described herein. The summary data set is provided to the ASP center 202.
ASP center 202 comprises PCS data store 220, server 222 and internet delivery application 224. The data set is provided through delivery application 210 to one or more insurer data centers 204. In addition, further information can be obtained from those data centers for use in the summary. The summary is then provided to other parties as desired, for example via secure internet connection 206. The parties may include, as one example, a hospital emergency department 208 when a patient is brought in for treatment. A variety of parties may use the information provided and the applications are in no way limited to hospital emergency departments.
The insurer data center 204 receives case data from various sources. For example, the insurer data center 204 may receive claims data from the service bureau 214 through data store 218. The insurer data center 204 may comprise, among other things, interface 226, eligibility files 228, and case data store 230.
In one embodiment that may be more preferable than the embodiment of FIG. 2, a central processing center draws data on a real-time basis from a variety of sources and combines the data into useful records. These records are then made available to authorized persons. Referring to FIG. 3, central processing center 302 comprises weaver agent 320, switchboard agent 324, rule agent 326, and repository 322. These agent functions may be implemented in software, hardware, or a combination of the two. The agent functions may be combined in a single device or server, or may be divided as desired to be performed by one or more devices. Weaver agent 320 is connected to terminals 304 and to web clients 306 so that weaver agent 320 to receive requests from terminals 304 and web clients 306, process those requests, and provide responsive information.
Switchboard agent 324 is arranged to communicate with weaver agent 320, repository 322, and one or more electronic data interfaces (EDIs), for example EDI 308, EDI310, and EDI312. Rule agent326is arranged to communicate with weaver agent 320 and repository 322. EDI 308 is an interface that obtains patient data from a regional health information organization or RHIO. EDI 312 is an interface to a patient identification mechanism and/or record locating service, for example a master patient index (MPI) 318. EDI 310 is an interface to a health insurer database, such as Blue Cross database 316.
The functions of the switchboard agent include, but are not limited to, determining where to get information about a particular patient and obtaining the information when information about that patient is needed. Information about patients can be compiled in advance of a specific need, but to enhance privacy, preferably the information is gathered, processed, summarized and presented in real time only when needed.
The EDIs 308, 310 and 312 work with switchboard agent 324 to gather and assemble records from a variety of sources and translate them into a common format. The EDIs thus act as transfer agents, each providing a particular framework for interfacing with a disparate external database and retrieving desired information. The EDIs may include a programmable record parser, and may be configured to retrieve from an external record repository only those record fields or elements useful to the system. The EDIs may use data retrieved from an external source to populate one or more records defined by a class hierarchy or schema that has been established as a standardized record format for use in the system. The standardized record format will sometimes be referenced herein as an ontology.
The EDIs may be provided with a table or other mapping mechanism that maps corresponding field names used in the external database to fields in the standard record ontology for the system. Of course, fields in the disparate systems may not match exactly. Fields may have different names, for example, one database may have a "compound" field while another uses the term "medications" for the same type of data. In an embodiment, the EDI provides a mapping between similar fields in the two databases. Fields from the external database may also be discarded, truncated, translated into a different format, or otherwise modified when they do not fit appropriately into the established ontology for the present system. Fields in the ontology for which no data are provided may be left empty. As a result, when an EDI communicates with an external data source to obtain information about a particular patient, it will provide to the repository 322 one or more records in a standard format following the established ontology.
The standardized ontology includes the following categories of fields: Name, Patient Information, Date, Condition, Severity, Medication, Medication Class, Confidence, Care Plans, Radiological Studies, Laboratory Results, Biometrics and other Clinical Observations. Each of the field categories may have one or more data fields associated with it to hold desired information. For example, the Name category may be broken down into first name, middle name, and last name. Patient information may be broken down into date of birth, gender, a flag for multiple births, and a condition list. The condition category may include the condition name, start date, end date, severity level, and flags to show that the condition is "confirmed" and whether it is chronic. Medication may include date, medication name, and class of medication. Biometrics may include date taken, height, weight, and other biometric health monitoring or identifying information as desired.
An unlimited number of EDIs may be provided in the system, depending on the number of data sources that have agreed to participate and provide data. Standardized EDIs may be provided for data sources that follow a standard, such as the HL7 message standard. Customized EDIs may be provided for any external database that is arranged in a unique manner. As will be seen, the use of customized EDIs to translate disparate external database records into a standard format that can be readily processed by the weaver agent 320 makes it possible to more easily combine data from disparate sources to obtain a clear picture of the patient's status and history. The EDIs and other agents each define a core set of operations used between the agents and other frameworks to provide consistent yet flexible asynchronous operations. The use of a system built around autonomous agents also enhances the scalability of the system and its ability to operate using parallel processing.
If desired, the EDIs may provide data to the switchboard agent 324 and repository 322 using XML protocols, in accordance with the established ontology. In an embodiment, rule agent 326 is an agent that implements clinical evidence-based care guidelines to provide, for example, treatment opportunities and recommendations, wellness and preventive recommendations, predictive health information, drug-to-drug interaction information, and other features. Such guidelines are commercially available or can be developed independently if desired, and incorporated into the rule agent 326.
Once the data has been collected in a standardized format in the manner just described, in an exemplary embodiment the group of records for a particular patient may be processed to eliminate any records not belonging that that patient, and to eliminate duplicate records. Then, the collected data may be assessed and validated. The validation process may include episode grouping, for example, if 20 services are provided during the same hospitalization incident they may be grouped for analytical purposes. In some preferred embodiments, the validation process may include a clinical validation process to determine whether a record and an indicated diagnosis make sense in the context of other information available for the patient. The clinical validation process may also include condition confirmation analysis, to verify that a particular disease or condition is present before indicating that the condition is present in system outputs, such as for example a Patient Clinical Summary.
The inventors have identified particular criteria that are useful in establishing confirming condition logic to validate diagnoses contained in patient records, and other data suggesting that the patient may have a particular condition. As examples, the inventors have found the following information relevant. First, the frequency with which the diagnosis appears in the available data may be relevant. If two or three doctors have made the same diagnosis on the record, the diagnosis is more likely to be accurate than if it appears only once in the data. Lab test results, when available, may also be used to confirm some diagnoses.
Pharmacy claims and pharmacy sales and dispensing records may also be used for confirmation of a diagnosis, as particular medications and items provided by pharmacies are specific to, or suggestive of, particular conditions. Radiology results may also be used to confirm a condition that can be identified through radiology, such as various forms of cancer, strokes, etc. Submission of data by specialty providers is also an indicator that can be used to confirm a patient condition.
For example, if an encounter from an oncology specialist is present in the record, it is more likely that data suggesting a cancer condition is correct. Finally, hospital discharge diagnoses can be used to confirm conditions. As additional sources of data and additional categories of data are added to the system, further confirming criteria can be added to the foregoing. The criteria to be used for validating data indicating a specific condition may be selected from among the foregoing criteria, or other criteria may be used, within the scope of the invention. In an exemplary embodiment, the criteria to be used are selected from among the foregoing confirming data types. These criteria are then placed in a hierarchy most appropriate for the possible. In this manner, the system can validate diagnoses and other condition information suggested by one or more records for the patient and substantially prevent erroneous statements of patient condition from appearing on summary documents.
Specific items dispensed at pharmacies may be identified that are associated with each disease. The recorded delivery of these items may be evidence that a diagnosis suggested by other data should be confirmed. For example, for diabetes, various hypoglycemic agents that are typically prescribed may be identified and listed in a table. The table may also include, for example, various pen type needles that are commonly used by patients with diabetes. For example, the following items may be included in the table for diabetes: Pen Needles, Bd Original Pen Needles, Bd Short Pen Needles #08290-3201-09, Bd Short Pen Needles 5 mm, Exel Insul Pen Needles 8 mm, Kroger Pen Needles 29 g, Kroger Pen Needles 31 g, Leader Pen Needles 29 g, Leader Pen Needles 31 g, Pen Needles 12 mm 29 g, Pen Needles 6 mm 31 g, and Pen Needles 8 mm 31 g.
Similarly, various brands and types of insulin may be included in the table to assist in confirming the diagnosis. For example, the following pharmacy dispensing codes are among those used for insulin: 54868-1428-*1, 12854-*335-00, 12854-*335-01, 12854 *335-34, 14608-335, 00088-2220-01, 00088-2220-34, 00088-2220-33, 00002-8310-01, 00420-3687-12, 00420-3687-92, 00169-3687-12, and 00169-3687-92.
As another example, the dispensation and use of test strips may provide information useful in confirming or ruling out a diagnosis of diabetes. The following are examples of test strips that are frequently used by patients with diabetes: Accu-Chek Advantage Strips, Accu-Chek Aviva Test Strips, Accu-Chek Compact Strips, Advance Micro-Draw Test Strips, Advance Test Strips, Albustix Reagent Strips, Ascensia Autodisc Strips, Ascensia Contour Strips, Ascensia Elite Test Strips, Assure 3 Test Strips, At-Last Test Strips, Bd Test Strips
# 53885-0245-10, Control Test Strips, Cvs Blood Glucose Strips, Dias tix Reagent Strips, Easygluco Test Strips, Easypro Test Strips, Fast Take Test Strips, Freestyle Test Strips, Glucostix Reagent Strips, Keto-Diastix Reagent Strips, Ketocare Ketone Test Strips, Kinray Test Strips, Kroger Test Strips, Labstix Reagent Strips, Multistix 10 Sg Reag Strips, Multistix Reagent Strips, Nexgen Glucose Test Strips, One Touch Test Strips, One Touch Ultra Test Strips, Precision Pcx Test Strips, Precision Q-I-D Test Strips, Precision Xtra Test Strips, Prestige Test Strips, Reli On Test Strips, Shoprite Test Strips, Surestep Test Strips, Truetrack Glucose Strips, Truetrack Test Strips, Ultima Test Strips, Uristix 4 Reagent Strips, and Uristix Reagent Strips.
Embodiments of the disclosed system may be implemented in hardware, firmware, software, or any combination thereof. Embodiments of the invention may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors. A machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g. a computing device). For example, a machine-readable medium may include read only memory (ROM); random access memory (RAM); hardware memory in PDAs, mobile telephones, and other portable devices; magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical, or other forms of propagated signals (e.g. carrier waves, infrared signals, digital signals, analog signals, etc.), and others. Further, firmware, software, routines, instructions, may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact result from computing devices, processors, controllers or other devices executing the firmware, software, routines, instructions, etc.
The following description of a general purpose computer system is provided for completeness. The disclosed systems and methods can be implemented as software, in hardware, or as a combination of software and hardware. Consequently, the disclosed system may be implemented in the environment of a computer system or other processing system. In one exemplary embodiment, the computers and devices shown in FIGS. 1-3 may be personal computers, servers or other computing system. An example of such a computer system is shown at reference number 800 in FIG. 4. In the disclosed systems, all of the elements depicted in FIGS. 1-3, for example, can execute on one or more distinct computer systems 800, to implement the various disclosed methods. The computer system 800 includes one or more processors, such as a processor 804. The processor 804 can be a special purpose or a general purpose digital signal processor. The processor 804 is connected to a communication infrastructure 806 (for example, a bus or network). Various software implementations are described in terms of this exemplary computer system. After reading this description, it will become apparent to a person skilled in the relevant art how to implement the disclosed systems and methods using other computer systems and/or computer architectures.
The computer system 800 also includes a main memory 808, preferably random access memory (RAM), and may also include a secondary memory 810. The secondary memory 810 may include, for example, a hard disk drive 812 and/or a removable storage drive 814, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc. The removable storage drive 814 reads from and/or writes to a removable storage unit 818 in a well-known manner. The removable storage unit 818, represents a floppy disk, magnetic tape, optical disk, etc. which is read by and written to by the removable storage drive 814. As will be appreciated, the removable storage unit 818 includes a computer usable storage medium having stored therein computer software and/or data.
In alternative implementations, the secondary memory 810 may include other similar means for allowing computer programs or other instructions to be loaded into the computer system 800. Such means may include, for example, a removable storage unit 822 and an interface 820. Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, and other removable storage units 822 and interfaces 820 which allow software and data to be transferred from the removable storage unit 822 to the computer system 800.
Computer system 800 may also include a communications interface 824. Communications interface 824 allows software and data to be transferred between the computer system 800 and external devices. Examples of communications interface 824 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, or other communications path interface devices. Software and data transferred via the communications interface 824 are in the form of signals 828 which may be electronic, electromagnetic, optical or other signals capable of being received by communications interface 824. These signals 828 are provided to communications interface 824 via a communications path 826. Communications path 826 carries signals 828 and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels.
In this document, the terms computer program medium and computer readable medium are used to generally refer to media such as the removable storage drive 814, a hard disk installed in hard disk drive 812, and the signals 828. These computer program products are means for providing software to the computer system 800. Computer programs (also called computer control logic) are stored in the main memory 808 and/or the secondary memory 810. Computer programs may also be received via the communications interface 824. Such computer programs, when executed, enable the computer system800 to implement the disclosed systems and methods as discussed herein. In particular, the computer programs, when executed, enable the processor 804 to implement the processes disclosed herein. Accordingly, such computer programs operate to control computer system 800. By way of example, in various exemplary embodiments, the processes/methods performed by signal processing blocks of encoders and/or decoders can be performed by computer control logic. Where the disclosed systems and methods are implemented using software, the software may be stored in a computer program product and loaded into the computer system 800 using the removable storage drive 814, the hard drive 812 communications interface 824, or any other known method of transferring digital information into a computer system.
The disclosed features are implemented primarily in hardware using, for example, hardware components such as Application Specific Integrated Circuits (ASICs) and gate arrays. Implementation of a hardware state machine so as to perform the functions described herein will also be apparent to persons skilled in the relevant art(s).
FIG. 5: shows a flow chart for a process of retrieving and displaying Patient Clinical Summary (PCS) information. In step 502, an authorized user of the system performs a search for a patient or "member." In step 504, the system determines whether the PCS is available to the user for that patient. If so, at step 506, the system determines whether the system has an existing PCS for the member or can generate one. If one is available, the process continues at step 508 and the system determines whether the member has authorized use of the PCS. If so, the process continues at step 510 and a link to the PCS is displayed. If, in steps 504, 506, or 508, the PCS is not available, the process ends at step 524.
In response to the display of the link at step 510, the user clicks on the link at step 512. A terms and conditions page is displayed at step 514, and in step 516, the system requests acceptance of the terms and conditions. If they are accepted, the process continues at step 518 and detailed data are retrieved. The PCS is displayed in step 520, for example in a separate window, and the process ends at step 524. If the terms are not accepted in step 516, the process continues at step 522, the link is closed, and the process ends with step 524.
WE CLAIMS
1. My Invention "HIHO- Blockchain Technology "is a technologies are disclosed herein to secure flexible access to the healthcare information resources (HIR) contained within electronic health records (EHR) systems. The invention auto managing access permissions with certified self-sovereign identities and distributed ledger techniques, HIR may be secured. Medical stop, Patients and other users may be registered to access a distributed ledger, such as a healthcare blockchain, employed to set, host and adjudicate permissions to access HIR. Authorized owners, medical stop, patients with rights to their own HIR may be able to grant fine-grained and conditional access permissions to third-parties. Information transfers and transactions occurring according to these permissions may be logged within smart contracts incorporated in the healthcare blockchain. The invented method creates an electronic health record and analyzes that record to present a summary report. The report may optionally include treatment opportunities, strategies, and plans for the physician and patient. Data processing steps used to create and analyze the record and deliver the summary data may include aggregation, integration, internal validation, clinical validation, inspection, prediction, and communication. 2. According to claims# the invention is to a technologies are disclosed herein to secure flexible access to the healthcare information resources (HIR) contained within electronic health records (EHR) systems. The invention auto managing access permissions with certified self-sovereign identities and distributed ledger techniques, HIR may be secured. 3. According to claim,2# the invention is to Medical stop, Patients and other users may be registered to access a distributed ledger, such as a healthcare blockchain, employed to set, host and adjudicate permissions to access HIR. Authorized owners, medical stop, patients with rights to their own HIR may be able to grant fine-grained and conditional access permissions to third-parties. 4. According to claiml,2,3# the invention is to Information transfers and transactions occurring according to these permissions may be logged within smart contracts incorporated in the healthcare blockchain. The invented method creates an electronic health record and analyzes that record to present a summary report. The report may optionally include treatment opportunities, strategies, and plans for the physician and patient. 5. According to claim,2,4# the invention is to the data processing steps used to create and analyze the record and deliver the summary data may include aggregation, integration, internal validation, clinical validation, inspection, prediction, and communication. 6. According to claim,2,3# the invention is to wherein a plurality of said categories of confirming information are selected based on the diagnosis code under evaluation and also the invention is to wherein information in one of said categories of confirming information is weighted differently from information in another category of confirming information depending on the diagnosis code under evaluation. The invention is to wherein a hierarchy of relative value in determining whether the patient has the medical condition represented by the condition code is assigned to said categories of confirming information. 7. According to claim,2,6# the invention is to including determining a weighted confidence level parameter based on the total weighted value of confirming evidence supporting a presumption that the patient has the condition represented by the diagnosis code and also the invention is to wherein available confirming information is evaluated based on predetermined clinical validation rules to determine a confidence level that a condition is present. The invention is to wherein available confirming information is evaluated based on predetermined clinical validation rules to determine a weighted confidence level that a condition is present. 8. According to claim,2,6,7# the invention is to wherein said output includes a summary report identifying medical conditions that the patient can be presumed to have based on analysis of confirming information in the data records for that patient and also the invention is to wherein information in one of said categories of confirming information is weighted differently from information in another category of confirming information depending on the diagnosis code under evaluation. The invention is to wherein a hierarchy of relative value in determining whether the patient has the medical condition represented by the condition code is assigned to said categories of confirming information. 9. According to claim,2,8# the invention is to including determining a weighted confidence level parameter based on the total weighted value of confirming evidence supporting a presumption that the patient has the condition represented by the diagnosis code and also the invention is to wherein available confirming information is evaluated based on predetermined clinical validation rules to determine a confidence level that a condition is present. 10.According to claim,2,8,9# the invention is to wherein available confirming information is evaluated based on predetermined clinical validation rules to determine a weighted confidence level that a condition is present.
Date: 21/8/20
Dr. Manju Khari Dr. Khaleel Ahmad (Assistant Professor) Dr. M A Rizvi (Associate Professor and Head (Dean P &M)) Dr. Khalim Khujamatov (Associate Professor and Head of Department) Dr. Djamshid Sultanov (Associate Professor and Head of Department)
FOR Dr. Manju Khari Dr. Khaleel Ahmad (Assistant Professor) Dr. M A Rizvi (Associate Professor and Head (Dean P &M)) Dr. Khalim Khujamatov (Associate Professor and Head of Department) Dr. Djamshid Sultanov (Associate Professor and Head of Department) 22 Aug 2020
TOTAL NO OF SHEET: 5 NO OF FIG: 05 2020101946
FIG. 1: IS A FLOW CHART SHOWING THE OPERATION OF A DISCLOSED PROCESS.
FOR Dr. Manju Khari Dr. Khaleel Ahmad (Assistant Professor) Dr. M A Rizvi (Associate Professor and Head (Dean P &M)) Dr. Khalim Khujamatov (Associate Professor and Head of Department) Dr. Djamshid Sultanov (Associate Professor and Head of Department) 22 Aug 2020
TOTAL NO OF SHEET: 5 NO OF FIG: 05 2020101946
FIG. 2: IS A BLOCK SCHEMATIC DIAGRAM SHOWING AN APPARATUS FOR COLLECTING, PROCESSING AND DISTRIBUTING DATA.
FOR Dr. Manju Khari Dr. Khaleel Ahmad (Assistant Professor) Dr. M A Rizvi (Associate Professor and Head (Dean P &M)) Dr. Khalim Khujamatov (Associate Professor and Head of Department) Dr. Djamshid Sultanov (Associate Professor and Head of Department) 22 Aug 2020
TOTAL NO OF SHEET: 5 NO OF FIG: 05 2020101946
FIG. 3: IS A BLOCK SCHEMATIC DIAGRAM SHOWING A APPARATUS FOR COLLECTING, PROCESSING, AND DISTRIBUTING DATA.
FOR Dr. Manju Khari Dr. Khaleel Ahmad (Assistant Professor) Dr. M A Rizvi (Associate Professor and Head (Dean P &M)) Dr. Khalim Khujamatov (Associate Professor and Head of Department) Dr. Djamshid Sultanov (Associate Professor and Head of Department) 22 Aug 2020
TOTAL NO OF SHEET: 5 NO OF FIG: 05 2020101946
FIG. 4: IS A BLOCK SCHEMATIC DIAGRAM OF A GENERAL PURPOSE COMPUTER SYSTEM USED IN SOME EXEMPLARY EMBODIMENTS.
FOR Dr. Manju Khari Dr. Khaleel Ahmad (Assistant Professor) Dr. M A Rizvi (Associate Professor and Head (Dean P &M)) Dr. Khalim Khujamatov (Associate Professor and Head of Department) Dr. Djamshid Sultanov (Associate Professor and Head of Department) 22 Aug 2020
TOTAL NO OF SHEET: 5 NO OF FIG: 05 2020101946
FIG. 5: IS A FLOW CHART SHOWING AN EXEMPLARY A PROCESS FOR ELECTRONICALLY RETRIEVING A PATIENT CLINICAL SUMMARY.
AU2020101946A 2020-08-22 2020-08-22 HIHO- Blockchain Technology: HEALTH INFORMATION AND HEALTHCARE OBSERVATION USING BLOCKCHAIN TECHNOLOGY Ceased AU2020101946A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2020101946A AU2020101946A4 (en) 2020-08-22 2020-08-22 HIHO- Blockchain Technology: HEALTH INFORMATION AND HEALTHCARE OBSERVATION USING BLOCKCHAIN TECHNOLOGY

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2020101946A AU2020101946A4 (en) 2020-08-22 2020-08-22 HIHO- Blockchain Technology: HEALTH INFORMATION AND HEALTHCARE OBSERVATION USING BLOCKCHAIN TECHNOLOGY

Publications (1)

Publication Number Publication Date
AU2020101946A4 true AU2020101946A4 (en) 2020-10-01

Family

ID=72608264

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2020101946A Ceased AU2020101946A4 (en) 2020-08-22 2020-08-22 HIHO- Blockchain Technology: HEALTH INFORMATION AND HEALTHCARE OBSERVATION USING BLOCKCHAIN TECHNOLOGY

Country Status (1)

Country Link
AU (1) AU2020101946A4 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113160932A (en) * 2021-06-02 2021-07-23 郑州大学 Cerebral apoplexy data management and analysis system based on mobile terminal feedback
CN114091091A (en) * 2021-09-29 2022-02-25 天津大学 Case data remote authorization lookup method based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113160932A (en) * 2021-06-02 2021-07-23 郑州大学 Cerebral apoplexy data management and analysis system based on mobile terminal feedback
CN114091091A (en) * 2021-09-29 2022-02-25 天津大学 Case data remote authorization lookup method based on block chain

Similar Documents

Publication Publication Date Title
US20200350044A1 (en) System and method for health care data integration and management
US8301462B2 (en) Systems and methods for disease management algorithm integration
Hornbrook et al. Building a virtual cancer research organization
US20190088356A1 (en) System and Method for a Payment Exchange Based on an Enhanced Patient Care Plan
US10922774B2 (en) Comprehensive medication advisor
US8180654B2 (en) Method and system for creating, assembling, managing, utilizing, and securely storing portable personal medical records
EP1994484B1 (en) Platform for interoperable healthcare data exchange
Hammond et al. Standards in biomedical informatics
US20100082369A1 (en) Systems and Methods for Interconnected Personalized Digital Health Services
US20130144790A1 (en) Data Automation
US20150081332A1 (en) Method for Indexing, Searching and Retrieving Health Information
US11881303B2 (en) Tracking and quality assurance of pathology, radiology and other medical or surgical procedures
AU2021100430A4 (en) Blockchain: Health Care Information Exchange using Blockchain- Based Technology
AU2020101946A4 (en) HIHO- Blockchain Technology: HEALTH INFORMATION AND HEALTHCARE OBSERVATION USING BLOCKCHAIN TECHNOLOGY
US20050107672A1 (en) System and method for external input of disease management algorithm
Kornegay et al. Selection of data sources
Castro Explaining international IT application leadership: Health IT
US20210158969A1 (en) Indicator for probable inheritance of genetic disease
AU2020102635A4 (en) SDHR-Blockchain Technology: Securely Store Digital Healthcare Records, Notification, Alert Using Blockchain Technology
US20200342984A1 (en) Tracking and quality assurance of pathology, radiology and other medical or surgical procedures
Gliklich et al. Data sources for registries
Connecting for Health Personal Health Working Group The personal health working Group
Else et al. Data sources for pharmacoeconomic and health services research
WO2021096538A1 (en) System and method for a payment exchange based on an enhanced patient care plan
Cusack et al. Clinical Information Systems and Applications

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry