Patent application number | Description | Published |
20130191137 | SYSTEMS AND METHODS FOR ELECTRONICALLY PRESCRIBING CONTROLLED SUBSTANCES - The present invention relates to a method for electronically prescribing controlled substances on a wide area network that includes a health care provider system (HCP system), an electronic prescription system (EP system), a third party identification validation system (third party IDV system), and a pharmacy system, and includes: a) the EP system receiving from the HCP system an electronic prescription entered by a provider for a controlled substance, a first identification factor, and a second identification factor; b) the EP system authenticating the first identification factor and transmitting the second identification factor to the third party IDV system for authentication; and c) upon the first identification factor being approved by the EP system and the EP system receiving approval of the second identification factor from the third party IDV system, the electronic prescription being certified for transmission to the pharmacy system as a certified electronic prescription for the controlled substance. | 07-25-2013 |
20130191138 | SYSTEMS AND METHODS FOR ELECTRNICALLY PRESCRIBING CONTROLLED SUBSTANCES - The present invention relates to a method for electronically prescribing controlled substances on a wide area network that includes a health care provider system (HCP system), an electronic prescription system (EP system), a third party identification validation system (third party IDV system), and a pharmacy system, and includes: a) the EP system receiving from the HCP system an electronic prescription entered by a provider for a controlled substance, a first identification factor, and a second identification factor; b) the EP system authenticating the first identification factor and transmitting the second identification factor to the third party IDV system for authentication; and c) upon the first identification factor being approved by the EP system and the EP system receiving approval of the second identification factor from the third party IDV system, the electronic prescription being certified for transmission to the pharmacy system as a certified electronic prescription for the controlled substance. | 07-25-2013 |
20130191139 | SYSTEMS AND METHODS FOR ELECTRONICALLY PRESCRIBING CONTROLLED SUBSTANCES - The present invention relates to a method for electronically prescribing controlled substances on a wide area network that includes a health care provider system (MCP system), an electronic prescription system (EP system), a third party identification validation system (third party IDV system), and a pharmacy system, and includes: a) the EP system receiving from the HCP system an electronic prescription entered by a provider for a controlled substance, a first identification factor, and a second identification factor; b) the EP system authenticating the first identification factor and transmitting the second identification factor to the third party IDV system for authentication; and c) upon the first identification factor being approved by the EP system and the EP system receiving approval of the second identification factor from the third party IDV system, the electronic prescription being certified for transmission to the pharmacy system as a certified electronic prescription for the controlled substance. | 07-25-2013 |
20130304510 | HEALTH INFORMATION EXCHANGE SYSTEM AND METHOD - A health information exchange (HIE) system and related methods for sharing patient medical data among a plurality of users. In one embodiment, the HIE system includes a processor executing a software application and one or more databases. Medical data may be downloaded by a first user to the system in a source file format. The system converts and stores the medical data in a data record such as an object having a different type of data structure. Upon receiving a request from a second user for the medical data in a specified destination file format, the system retrieves and converts the object containing the medical data into the specified destination file format, and sends the destination file to the second user. The source and destination file formats may be the same or different. In one embodiment, users may access and communicate with the HIE system via the Internet. | 11-14-2013 |
20150310176 | HEALTHCARE EVENT RESPONSE AND COMMUNICATION CENTER - The present teaching relates to a Healthcare Event Response and Communication Center. In one example, a healthcare message is received. The healthcare message is processed to automatically identify one or more healthcare events. For each identified healthcare event, one or more responsive entities that are configured to be responsive to the healthcare event are identified. Each responsive entity is associated with one or more healthcare workflows that are configured to receive the healthcare event. Each identified healthcare event is provided in real-time to each of the one or more responsive healthcare workflows with respect to each responsive entity. | 10-29-2015 |
20160063239 | METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS - The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person. | 03-03-2016 |
20160063657 | METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS - The present teaching relates to managing identity information of a person at an identity center. In one example, the person is associated with a first set of identity attributes that are verified to be associated with the person. Upon the person being associated with the first set of identity attributes, the person is linked with a first user account at a source entity. A consent is received from the person to share one or more attributes of the first user account at the source entity with a receiving entity. The sharing of the one or more attributes of the first user account from the source entity to the receiving entity is facilitated in accordance with the received consent. | 03-03-2016 |
20160065552 | METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS - Method, system, and programs for interoperable identity and interoperable credentials. In one example, an authentication request is received. The authentication request originated from an online user in connection with an application having a first LOA. The authentication request includes the online user's input. A digital identity is searched based on the online user's input. A GUID associated with the digital identity is obtained when the digital identity is found. One or more credentials that are bound to the GUID at the first LOA or a higher LOA are provided. A selection of at least one credential is received. Information of the selected credential that includes a credential verification service capable of verifying the selected credential is received. Verification of the selected credential of the online user based on the GUID is requested. A verification response is received. The online user is authenticated at the first LOA when the verification response indicates that the selected credential is successfully verified. | 03-03-2016 |
20160065579 | METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS - The present teaching relates to identity management. In one example, a trusted connector is instantiated in the enterprise system behind a security. The trusted connector is configured to communicate with the private resource via a communication protocol. Upon being triggered by the external system, a secure communication channel is established between the external system and the trusted connector. A request is received from the external source at the trusted connector through the secure communication channel. The request is interpreted for communicating with the private resource. The interpreted request is sent to the private resource. A response is received from the private resource. The response from the private resource is interpreted for communicating with the external system. The interpreted response is sent to the external system through the secure communication channel. | 03-03-2016 |