Patent Issued for Strong authentication via distributed stations (USPTO 11842803): Imprivata Inc. - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
January 1, 2024 Newswires
Share
Share
Post
Email

Patent Issued for Strong authentication via distributed stations (USPTO 11842803): Imprivata Inc.

Insurance Daily News

2024 JAN 01 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- A patent by the inventors Ullrich, Meinhard Dieter (Lexington, MA, US), filed on April 4, 2022, was published online on December 12, 2023, according to news reporting originating from Alexandria, Virginia, by NewsRx correspondents.

Patent number 11842803 is assigned to Imprivata Inc. (Lexington, Massachusetts, United States).

The following quote was obtained by the news editors from the background information supplied by the inventors: “In a busy healthcare environment, such as a hospital, clinicians roam frequently among patients, floors and buildings. Each time a clinician reaches a new location, she may require access to patient information or other medical data maintained by the facility (or elsewhere). That data may be accessed via a local, typically shared workstation, or via a handheld wireless device, such as a “smart phone” or tablet capable of hosting applications and establishing telecommunications, Internet and/or local intranet connections.

“In particular, medical institutions from hospitals to physician practice groups to testing centers maintain diverse electronic medical records (EMR) systems, which collectively form the healthcare information backbone. EMR systems allow clinicians access to medical information maintained in various back-end systems. The typical workflow when a physician interacts with a patient involves first logging onto the computer system, then launching and logging into one or more EMR applications, selecting the right patient record, verifying that the record matches the patient, reviewing results (often from different sources), checking up on medical references, entering orders or prescriptions (e.g., using computerized physician order entry (CPOE) applications and ePrescribing), and/or charting patient progress. All of these activities may involve the same patient but different applications, and in some cases multiple separate applications for a single patient-specific activity.

“Moreover, healthcare records are protected by strict privacy laws (such as the Health Insurance Portability and Accountability Act, or HIPAA), regulatory regimes, and institutional access policies. Accordingly, when a clinician moves from place to place, he may be required to log on to a new terminal or device, and because of data-access restrictions, the log-on procedure may involve cumbersome and/or multiple authentication modalities.

“Indeed, for some highly sensitive transactions, a properly authenticated and logged-in user may be asked to re-authenticate using a stronger form of authentication. For example, the user may be asked to provide a fingerprint to a reader complying with Federal Information Processing Standard (FIPS) Publication 201-2, a one-time token or a smart card in order to satisfy an institutional policy or regulatory requirement. Particularly in an environment where nodes can be moved, and where users may access system resources using a personal wireless phone or tablet lacking sophisticated authentication modalities, the user may confront the need to search quickly, in stressful circumstances, for an available workstation with the appropriate authentication capability.”

In addition to the background information obtained for this patent, NewsRx journalists also obtained the inventors’ summary information for this patent: “In various embodiments, authentication stations are distributed within a facility, particularly in spaces where mobile devices are predominantly used-e.g., in a hospital’s emergency department. Each such station includes a series of authentication devices, ideally spanning the range of possible modalities required of users, e.g., a FIPS-compliant fingerprint reader, a proximity-card reader, a smart-card reader, a vein reader, an iris scanner, a soft token application, etc. The mobile device may run an application (“app”) for locating the nearest such station and, in some embodiments, pair wirelessly with the station so that authentication thereon will accord the user access to the desired resource via her mobile device. The authentication stations may be dedicated, stand-alone devices (e.g., deployed as kiosks). But in some embodiments, if a nearby workstation or other network node is not presently in use and has the needed authentication modality, the user may be guided to that node.

“Accordingly, in a first aspect, the invention relates to a method of authentication and log-on to access a secure resource via a computer network. In various embodiments, the method comprises the steps of sending, via a computational device, an access request to a secure resource via a network; receiving, from the secure resource, a user authentication requirement involving an authentication modality; locating, via a mobile device, a nearest authentication station supporting the authentication modality; establishing wireless communication between the mobile device and the authentication station; obtaining, by the authentication station using the authentication modality, authentication credentials from a user; causing transmission of the authentication credentials to the authentication server; receiving, by the authentication station, an authentication confirmation from the authentication server and, via multiple-party communication among the mobile device, the authentication station, the computational device, and the secure resource, according access to the secure resource via the computational device.

“The mobile device may be the computational device or may be different from, but in wireless communication with, the computational device. In various embodiments, the step of establishing wireless communication between the mobile device and the authentication station comprises claiming, by the mobile device, the authentication station until the authentication credentials have been received by the authentication station.

“The multiple-party communication may comprise wirelessly communicating, by the authentication station via a secure link, the obtained authentication credentials to the wireless device, and wirelessly communicating, by the wireless device via a secure link, the authentication credentials to the authentication server. In one example of this flow the computational device is different from the wireless device, and the method further comprises wirelessly communicating, by the authentication station to the wireless device via a secure link, a token indicating acceptance of the obtained authentication credentials, and wirelessly communicating, by the wireless device via a secure link, the token to the computational device, whereby access to the secure resource is accorded to the computational device.

“In some embodiments, the multiple-party communication comprises wirelessly communicating, by the wireless device via a secure link to the authentication server, the authentication credentials and session data identifying a session between an application running on the wireless device and the secure resource; and causing, by the authentication server, the computational device to be accorded access to the secure resource over the session.”

The claims supplied by the inventors are:

“1. A system for facilitating user authentication and enabling access to secure resources via a computer network using an authentication modality, the system comprising: a computer network; a plurality of computational devices each configured to provide user access to one or more secure resources via the computer network but lacking the authentication modality; an authentication server; and a plurality of authentication stations each being different from the authentication server and each being configured to (i) receive, using the authentication modality, authentication credentials from a user located at the authentication station, (ii) transmit the authentication credentials to the authentication server, and (iii) receive an authentication confirmation from the authentication server; wherein user access to the one or more secure resources at one or more of the computational devices is enabled by the authentication confirmation.

“2. The system of claim 1, wherein at least one of the authentication stations comprises one or more of a fingerprint reader, a proximity-card reader, a smart-card reader, a vein reader, an iris scanner, or a soft token application.

“3. The system of claim 1, wherein at least one of the authentication stations comprises two or more of a fingerprint reader, a proximity-card reader, a smart-card reader, a vein reader, an iris scanner, or a soft token application.

“4. The system of claim 1, wherein at least some of the computational devices are mobile devices of users.

“5. The system of claim 1, wherein the authentication stations are not configured to provide user access to one or more secure resources via the computer network.

“6. The system of claim 1, further comprising one or more second computational devices each configured to provide user access to one or more secure resources via the computer network and each comprising the authentication modality, each second computational device being configured to function as an authentication station when not being otherwise utilized by a user.

“7. The system of claim 6, further comprising a location server maintaining a database relating the second computational devices to their physical locations.

“8. The system of claim 7, wherein the database relates the second computational devices to their use statuses.

“9. The system of claim 7, wherein the database relates the authentication stations to their physical locations.

“10. The system of claim 1, wherein one or more of the authentication stations is configured for wireless communication with mobile devices of users.

“11. The system of claim 1, further comprising a location server maintaining a database relating the authentication stations to their physical locations.

“12. A system enabling access to secure resources, on a mobile device of a user via a computer network using an authentication modality, wherein the mobile device lacks the authentication modality, the system comprising: a computer network; an authentication server; and a plurality of authentication stations each being different from the authentication server and each being configured to (i) receive, using the authentication modality, authentication credentials from a user located at the authentication station, and (ii) transmit the authentication credentials to the authentication server and/or to the mobile device of the user; wherein the authentication server is configured to issue an authentication confirmation based on the authentication credentials, the authentication confirmation enabling access to the secure resources to the user on the mobile device.

“13. The system of claim 12, wherein the authentication server is configured to receive the authentication credentials from an authentication station and transmit the authentication confirmation to said authentication station.

“14. The system of claim 12, wherein the authentication server is configured to receive the authentication credentials from an authentication station and transmit the authentication confirmation to the mobile device.

“15. The system of claim 12, wherein the authentication server is configured to receive the authentication credentials from the mobile device and transmit the authentication confirmation to the mobile device.

“16. The system of claim 12, wherein the mobile device comprises a display and a mapping application configured to cause a map showing a current location of the mobile device and a location of at least one said authentication station to appear on the display.

“17. The system of claim 12, wherein the mobile device is configured to wirelessly claim an identified authentication station until the authentication credentials have been received by the authentication station.

“18. The system of claim 12, wherein at least one authentication station is configured to be claimed, via wireless communication with the mobile device, until the authentication credentials have been received by the authentication station or until a predetermined time period has elapsed.

“19. The system of claim 12, wherein at least one of the authentication stations comprises one or more of a fingerprint reader, a proximity-card reader, a smart-card reader, a vein reader, an iris scanner, or a soft token application.

“20. The system of claim 12, wherein at least one of the authentication stations comprises two or more of a fingerprint reader, a proximity-card reader, a smart-card reader, a vein reader, an iris scanner, or a soft token application.”

URL and more information on this patent, see: Ullrich, Meinhard Dieter. Strong authentication via distributed stations. U.S. Patent Number 11842803, filed April 4, 2022, and published online on December 12, 2023. Patent URL (for desktop use only): https://ppubs.uspto.gov/pubwebapp/external.html?q=(11842803)&db=USPAT&type=ids

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

New Findings from Tufts University in the Area of Managed Care Reported (Assessing Reliability and Validity of Sipat and Opportunities for Improvement: a Single-center Cohort Study): Managed Care

Newer

Patent Issued for Managing access control of data pipelines configured on a cloud platform (USPTO 11843664): Humana Inc.

Advisor News

  • Hagens Berman: Retired First Responders Sue Washington State over Rights to $3.3B Pension Funds Threatened by Lawmakers
  • Financially support your adult children without risking your future
  • NY insurance agent and Ponzi schemer faces 4-12 years in prison
  • Economic pressure makes boomerang living a new normal
  • Millennials ready to bring their advisor to the family table
More Advisor News

Annuity News

  • A new opportunity for advisors: Younger indexed annuity buyers
  • Most employers support embedding guaranteed lifetime income options into DC Plans
  • InspereX Partners with AuguStar Retirement for Strategic Expansion into Annuity Market
  • FACC and DOL enter stipulation to dismiss 2020 guidance lawsuit
  • Zinnia’s Zahara policy admin system adds FIA chassis to product library
More Annuity News

Health/Employee Benefits News

  • Private Medicare plans get a break
  • LAWMAKERS SPOTLIGHT HOW HIGH HOSPITAL PRICES DRIVE THE HEALTH CARE AFFORDABILITY CRISIS
  • ACTING SUPERINTENDENT KAITLIN ASROW SECURES $2.25 MILLION CYBERSECURITY SETTLEMENT WITH DELTA DENTAL
  • New Cigna CEO: Insurer to exit ACA, focus on ‘relentless’ push for affordability
  • Thousands of Marylanders downgraded health plans on ACA marketplace amid rising premiums
More Health/Employee Benefits News

Life Insurance News

  • Finalists announced for Lincoln's 2026 Best Places to Work
  • Investors Heritage Promotes Anna Reynolds to Senior Vice President and General Counsel
  • AM Best Affirms Credit Ratings of Old Republic International Corporation’s Subsidiaries
  • Government seeks dismissal of Dean Vagnozzi’s lawsuit against SEC
  • Symetra Promotes Nicholas Mocciolo to Chief Investment Officer of Symetra Financial Corporation
More Life Insurance News

- Presented By -

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Protectors Vegas Arrives Nov 9th - 11th
1,000+ attendees. 150+ speakers. Join the largest event in life & annuities this November.

A FIA Cap That Stays Locked
CapLock™ from Oceanview locks the cap at issue for 5 or 7 years. No resets. Just clarity.

Aim higher with Ascend annuities
Fixed, fixed-indexed, registered index-linked and advisory annuities to help you go above and beyond

Unlock the Future of Index-Linked Solutions
Join industry leaders shaping next-gen index strategies, distribution, and innovation.

Leveraging Underwriting Innovations
See how Pacific Life’s approach to life insurance underwriting can give you a competitive edge.

Bring a Real FIA Case. Leave Ready to Close.
A practical working session for agents who want a clearer, repeatable sales process.

Press Releases

  • Hexure Offers Real-Time Case Status Visibility and Enhanced Post-Issue Servicing in FireLight Through Expanded DTCC Partnership
  • RFP #T01325
  • RFP #T01325
  • RFP #T01825
  • RFP #T01825
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet