[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hawrylak et al., 2015 - Google Patents

Data privacy issues with RFID in healthcare

Hawrylak et al., 2015

View HTML
Document ID
7645001438676600429
Author
Hawrylak P
Hale J
Publication year
Publication venue
Medical Data Privacy Handbook

External Links

Snippet

Radio frequency identification (RFID) provides a means to implement the “last-mile” connection in a connected world, often referred to as the Internet of Things (IoT). RFID has been widely used in the retail and construction sectors for supply-chain management, and …
Continue reading at www.ncbi.nlm.nih.gov (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects

Similar Documents

Publication Publication Date Title
US12056558B2 (en) Proximity-based system for object tracking and automatic application initialization
Santos et al. Internet of things and smart objects for M-health monitoring and control
Najera et al. Real-time location and inpatient care systems based on passive RFID
Rosenbaum Radio frequency identification (RFID) in health care: privacy and security concerns limiting adoption
Floerkemeier et al. Scanning with a purpose–supporting the fair information principles in RFID protocols
Cangialosi et al. Leveraging RFID in hospitals: Patient life cycle and mobility perspectives
US20160203349A1 (en) Proximity-Based System for Object Tracking
Castro et al. Adding intelligence to mobile asset management in hospitals: the true value of RFID
Hawrylak et al. Security risks associated with radio frequency identification in medical environments
Taghaboni-Dutta et al. RFID technology is revolutionary: who should be involved in this game of tag?
Ahmed et al. Wireless sensor network technology and adoption in healthcare: A review
Kumaresan et al. Amalgamation of blockchain, IoT, and 5G to improve security and privacy of smart healthcare systems
US11436369B1 (en) Systems, devices and methods for securely communicating with electronic assets using an authenticated computer hub and a central server
Hawrylak et al. Data privacy issues with RFID in healthcare
Aguado Correa et al. RFID and health management: is it a good tool against system inefficiencies?
Memon Smarter Healthcare Collaborative Network
Tayyaba et al. Principles and paradigms in IoT-based healthcare using RFID
Bouet et al. RFID in eHealth systems: applications, challenges, and perspectives
Alshammri et al. Survey on radio frequency identification security and attacks
Aung et al. Emerging RFID/USN applications and challenges
Mphande A secure patient monitoring and tracking system using RFID and internet of things for the university teaching hospital
Nuuri The use of RFID technology in the patient tracking system
Renugadevi et al. IoT-enabled applications and other techniques to combat COVID-19
Goyal Industry 4.0 in Healthcare IoT for Inventory and Supply Chain Management
Hawrylak et al. RFID in e-health: Technology, implementation, and security issues