“Systems And Methods For The Safe Transfer And Verification Of Sensitive Data” in Patent Application Approval Process (USPTO 20220350921): Patent Application - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Advertise
    • Contact
    • Editorial Staff
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
November 23, 2022 Newswires
Share
Share
Post
Email

“Systems And Methods For The Safe Transfer And Verification Of Sensitive Data” in Patent Application Approval Process (USPTO 20220350921): Patent Application

Insurance Daily News

2022 NOV 23 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- A patent application by the inventors Hladio, Andre Novomir (Waterloo, Ca); Michael, Justin Aaron (Vancouver, Ca); Schipper, Joseph Arthur (Kitchener, Ca), filed on June 18, 2020, was made available online on November 3, 2022, according to news reporting originating from Washington, D.C., by NewsRx correspondents.

This patent application has not been assigned to a company or institution.

The following quote was obtained by the news editors from the background information supplied by the inventors: “Various systems and methods are known to generate sensitive health information, known as protected health information (PHI). PHI consists of two aspects: personally identifiable information (PII), and health information (HI). PII is any information that individually, or in combination with other readily accessible information, is statistically likely to be able to be linked to an individual person. HI is any information related to the past, current, or future physical or mental health of a person.

“It may be desired to transmit PHI from one location to another. In one example, a surgeon may have some information stored on a server in one physical location, such as a hospital network, but may need access to the information at a home office to perform diagnosis or analysis. In another example, a surgeon may desire to share patient images with a third part for processing, and have the results returned.

“This transmission may be digital, or physical. Strict regulations exist around the transmission of PHI to protect the individual it refers to. These regulations are complex and expensive to implement, and may include requirements around the security of data at rest, and in transit (encryption), the physical ability to access the data, and the administrative rules regulating access to the data. In addition to this, there may be regulations surrounding what actions a company or individual must take should and PHI be disclosed to an unauthorized party.

“When PHI is transmitted from one location to another, it must be able to be linked to the correct patient. For example, if a pre-operative plan is created for a specific patient for hip surgery, then it must be confirmed during surgery that the plan corresponds to the patient undergoing that hip surgery. Failing to use the correct patient specific plan may result in severe consequences for all parties involved, such as the patient, the surgeon, and the hospital.

“The regulations for the safe transfer of data are region specific. In the United States, the regulations are outlined in the Health Insurance Portability and Accountability Act (HIPAA). More specifically, the transfer of digital information is governed by the Privacy Rule (why protecting health information is required), and the Security Rule (how to protect health information). The security rule outlines how PHI must be secured, and includes three classes of protection: technical, physical, and administrative.”

In addition to the background information obtained for this patent application, NewsRx journalists also obtained the inventors’ summary information for this patent application: “There are provided systems and methods for the safe transfer and verification of sensitive digital information comprising uniquely identifying information and health information. A first computing device may be configured to encode uniquely identifying information from the sensitive digital information for an individual using a colliding hashing algorithm to produce verifiable identifying information. The verifiable identifying information is encapsulated with the health information to produce verifiable digital information, and provided for use with a second computing device.

“A second computing device may be configured with to receive verifiable digital information from a first computing device and test identifying information of a second person, and process the test identifying information using a colliding hashing algorithm to produce test verifiable identifying information.

“The uniquely identifying information may comprise one or more of the following: patient name, medical record number, social security number/social insurance number, date of birth, date of surgery, or other uniquely identifying codes. The health information may comprise information related to a surgical procedure. In one example the information may be co-registration information and implant target information for hip surgery. The co-registration information may comprise a set of pre-define points in an anatomic coordinate system. The implant target information may comprise one or more of acetabular implant inclination, acetabular implant anteversion, acetabular implant location, acetabular implant make and model, femoral implant version, femoral implant offset, femoral implant make and model, or bone cut locations.

“The colliding hashing algorithm may comprise steps which when executed by a first or second computing device computes verifiable digital information from uniquely identifying information which is statistically likely to be share among multiple individuals in a population (e.g. with different uniquely identifying information), but is statistically unlikely to be identical between two random individuals in a population. The colliding hashing algorithm may comprise a first mapping function which has a statistically insignificant change of output collision (e.g. such as MD5, SHA-1, SHA-2, SHA-256, SHA-3) and a second mapping function to increase the chance of output collision (e.g. such as a binning function or integer modulus function).

“The first computing device may be configured to export the verifiable digital information as a QR code image. The first computing device may be further configured to perform preoperative planning and provide the results of planning as health information for use by a second computing device.

“The second computing device may be located in an operating room, and may be further configured to receive a preoperative plan form a first computing device and to deliver the preoperative plan using computer aided navigation.

“The test identifying information may be derived from another source at the time of the surgical procedure which the other source may be a patient chart, a networked medical database, or a physical or digital image in the operating room.

“The second computing device may be configured to provide for display to a user the verifiable identifying information from the verifiable digital information and the test verifiable identifying information to a user for visual comparison, or may be configured to perform the comparison and provide for display to a user the results of the comparison. The second computing device may be further configured to automatically begin a further process based on the results of the comparison such beginning an anatomic registration step.

“The present concept of the invention is best described through certain embodiments thereof, which are described herein with reference to the accompanying drawings, wherein like reference numerals refer to like features throughout. It is to be understood that the term invention, when used herein, is intended to connote the concept underlying the embodiments described below and not merely the embodiments themselves. It is to be understood further that the general concept is not limited to the illustrative embodiments described below and the following descriptions should be read in such light. More than one concept may be shown and described and each may standalone or be combined with one or more others unless stated otherwise.”

The claims supplied by the inventors are:

“1. A method for the secure transfer and verification of sensitive digital information, the method for performing by a first computing device and comprising: transforming sensitive digital information (SDI) into verifiable digital information (VDI) for the purpose of exporting the VDI to a second computing device, wherein: the SDI comprises uniquely identifying information (UII) of a first person, and health information of the first person; the VDI comprises verifiable identifying information (VII) derived from the UII, and the health information from the first person; and the VII is derived from the Ull using a colliding hashing algorithm (CHA); and exporting the VDI for receiving by the second computing device, which second device is configured to verify the health information relates to the first person.

“2. (canceled)

“3. The method of claim 1, wherein the UlI comprises one or more of: patient name; medical record number; social security number/social insurance number; date of birth; date of surgery; or other uniquely identifying codes.

“4. The method of claim 1, wherein the health information comprises a patient specific plan for a surgical procedure comprising of co-registration information and implant target information for a hip surgery.

“5. The method of claim 4, wherein the co-registration information is a set of pre-defined points in an anatomic coordinate system.

“6. The method of claim 4, wherein the implant target information comprises one or more of: acetabular implant inclination; acetabular implant anteversion; acetabular implant location; acetabular implant make and model; femoral implant version; femoral implant offset; femoral implant make and model; and bone cut locations.

“7. The method claim 1, wherein the CHA computes a VII that is shared among multiple individuals in a population, but is statistically unlikely to be identical between two random individuals.

“8. The method claim 1, wherein the CHA comprises a first mapping function that has a statistically insignificant chance of output collision, and a second mapping function to perform a reduction and that increases the chance of collision.

“9. The method of claim 8, wherein the first mapping function comprises any one of the hashing functions: MD5; SHA-1; SHA-2; SHA-256; and SHA-3.

“10. The method of claim 8, wherein the second mapping function operates to map output from the first mapping function into one of a small integer number of bins.

“11. The method of claim 1, wherein the VDI is exported as a Quick Response (QR)code image.

“12. The method of claim 1, wherein the first computing device is further configured to perform pre-operative planning.

“13. The method claim 1, wherein the second computing device is located in an operating room, and the second computing device is further configured to deliver a pre-operative plan using computer aided navigation.

“14. A method for the secure transfer and verification of sensitive digital information, the method for performing by a second computing device and comprising: receiving verifiable digital information (VDI), exported from a first computing device, and test identifying information (TII) of a second person; and defining test verifiable identifying information (TVII) for the purpose of verifying that the identity of the second person matches the identity of the first person, wherein: the VDI comprises verifiable identifying information (VII) derived from uniquely identifying information (UII) of a first person using a colliding hashing algorithm (CHA), and further comprises health information from the first person; the TII comprises uniquely identifying information for the second person and has a same format as the UII; and the TVII is derived from the TII using the CHA; and providing the TVII for comparison with the VDI to verify the identity related to the health information

“15. The method of claim 14, wherein the second computing device is configured to display the VII and the TVII to a user for visual comparison.

“16. The method of claim 14, further configured to compare the VII and TVII and display to a user the results of the comparison.

“17. The method of claim 16, wherein the second computing device is further configured to automatically begin a further process based on the result of the comparison.

“18. (canceled)

“19. (canceled)

“20. The method of claim 14, wherein the TII of the second person is derived from another source at the time of an operation on an anatomy of the second person, which other source comprises one of: a patient chart; a networked medical database; and a physical or digital image in the operating room.

“21. The method of claim 14, wherein: the CHA computes TVII that is shared among multiple individuals in a population, but is statistically unlikely to be identical between two random individuals; the CHA comprises a first mapping function that has a statistically insignificant chance of output collision, and a second mapping function to perform a reduction and that increases the chance of collision.

“22. The method of claim 21, wherein: the first mapping function comprises any one of the hashing functions: MD5; SHA-1; SHA-2; SHA-256; and SHA-3; and the second mapping function operates to map output from the first mapping function into one of a small integer number of bins.”

URL and more information on this patent application, see: Hladio, Andre Novomir; Michael, Justin Aaron; Schipper, Joseph Arthur. Systems And Methods For The Safe Transfer And Verification Of Sensitive Data. Filed June 18, 2020 and posted November 3, 2022. Patent URL: https://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220220350921%22.PGNR.&OS=DN/20220350921&RS=DN/20220350921

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Reports Outline Public Health Study Findings from Beijing Technology and Business University (The impact of public health education on people’s demand for commercial health insurance: Empirical evidence from China): Health and Medicine – Public Health

Newer

Shelton Turley Trot hike scheduled for Nov

Advisor News

  • Companies take greater interest in employee financial wellness
  • Tax refund won’t do what fed says it will
  • Amazon Go validates a warning to advisors
  • Principal builds momentum for 2026 after a strong Q4
  • Planning for a retirement that could last to age 100
More Advisor News

Annuity News

  • Corebridge Financial powers through executive shakeup with big sales
  • Half of retirees fear running out of money, MetLife finds
  • Planning for a retirement that could last to age 100
  • Annuity check fraud: What advisors should tell clients
  • Allianz Life Launches Fixed Index Annuity Content on Interactive Tool
More Annuity News

Health/Employee Benefits News

  • Cut to GLP-1 coverage prevents personnel cuts this year, but fiscal challenges ahead for Chelmsford
  • Striking nurses back bill requiring health plans that receive state subsidies to disclose investments
  • Recent Studies from University of Tennessee Add New Data to COVID-19 (Uncovering Gaps in Childhood Vaccine Coverage: A Post-COVID-19 Analysis of Vaccine Disparities in Tennessee): Coronavirus – COVID-19
  • Researchers from University of California Discuss Findings in COVID-19 (Assessing the Use of Medical Insurance Claims and Electronic Health Records to Measure COVID-19 Vaccination During Pregnancy): Coronavirus – COVID-19
  • Trademark Application for “EXL” Filed by ExlService Holdings, Inc.: Exlservice Holdings Inc.
More Health/Employee Benefits News

Life Insurance News

  • New York Life Launches Golden Futures Awards and Scholarships to Strengthen Financial Confidence Across Generations
  • William Lako: When the unexpected happens, insurance can help protect what you’ve built
  • The insurance industry must embrace change like never before
  • With recent offerings, life insurance goes high-tech
  • Symetra Launches New Chapter of ‘Plan Well, Play Well’ Campaign With Sue Bird
Sponsor
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Elevate Your Practice with Pacific Life
Taking your business to the next level is easier when you have experienced support.

LIMRA’s Distribution and Marketing Conference
Attend the premier event for industry sales and marketing professionals

Get up to 1,000 turning 65 leads
Access your leads, plus engagement results most agents don’t see.

What if Your FIA Cap Didn’t Reset?
CapLock™ removes annual cap resets for clearer planning and fewer surprises.

Press Releases

  • LIDP Named Top Digital-First Insurance Solution 2026 by Insurance CIO Outlook
  • Finseca & IAQFP Announce Unification to Strengthen Financial Planning
  • Prosperity Life Group Appoints Nick Volpe as Chief Technology Officer
  • Prosperity Life Group appoints industry veteran Rona Guymon as President, Retail Life and Annuity
  • Financial Independence Group Marks 50 Years of Growth, Innovation, and Advisor Support
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Advertise
  • Contact
  • Editorial Staff
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet