A client device collects immunization data includes a type of immunization given to an individual and a date that the immunization was provided to the individual. The client device converts immunization data into a numeric string, where the numeric string as converted comprises an encrypted payload portion and a mode indicator portion. The client device generates a two-dimensional machine-readable identifier using the numeric string. A reader device reads the two-dimensional machine-readable identifier and accesses the numeric string. The reader device converts at least a portion of the numeric string comprising the immunization data into a predetermined format for importing into an electronic health record (EHR).
Distribution Of Cryptographic Keys For Controlling Access To Encrypted Data In Machine-Readable Identifiers
Disclosed are various embodiments for facilitating the transfer of cryptographic keys various devices. A computing device can receive from a reader device a first device identifier associated with a client device and a second device identifier associated with the reader device. The computing device can determine whether the reader device is authorized to access data associated with the client device based at least in part on the first device identifier and the second device identifier. A cryptographic key corresponding to the data associated with the client device can be provided to the reader device.
Secure Data Translation Using A Low-Energy Wireless Communication Link
- Atlanta GA, US Katherine S. Hill - Atlanta GA, US
International Classification:
H04W 12/00 H04W 12/04 H04W 12/02 H04L 9/16
Abstract:
Disclosed are various embodiments for providing access control to the sensitive data, such as personal medical history. A first client device executes an application that ingests input data entered by a user via a user interface of the first client device, encrypts at least a first portion of the input data using a first cryptographic key, and transmits the encrypted input data over a low-power wireless private area network (WPAN), such as a Bluetooth Low-Energy (BLE) WPAN, for example. A second client device executing a second application receives the encrypted input data transmitted over the low-power WPAN by the first client device and use the first cryptographic key to decrypt the encrypted input data.
Secure Data Translation Using Machine-Readable Identifiers
Disclosed are various embodiments for providing secure data translation using machine-readable identifiers, such as barcodes or quick response (QR) codes. In one embodiment, a client device may be configured to translate input data stored in a first data format to data in a universal data format and encrypt the data in the universal data format using the cryptographic key such that the data in the universal data format is only accessible by the reader device having the cryptographic key. The client device may further generate a machine-readable identifier using the data as encrypted for rendering in a display accessible by the client device. A reader device may be configured to decrypt the data as encrypted to access the data in the universal data forma; and translate the input data from the universal data format to a second data format in accordance with a second format setting.
Secure Data Translation Using Machine-Readable Identifiers
- Atlanta GA, US Katherine S. Hill - Atlanta GA, US
International Classification:
G06F 17/28 G06F 21/62 G06F 17/30 G06K 19/06
Abstract:
Disclosed are various embodiments for providing secure data translation using machine-readable identifiers, such as barcodes or quick response (QR) codes. In one embodiment, a client device may be configured to translate input data stored in a first data format to data in a universal data format and encrypt the data in the universal data format using the cryptographic key such that the data in the universal data format is only accessible by the reader device having the cryptographic key. The client device may further generate a machine-readable identifier using the data as encrypted for rendering in a display accessible by the client device. A reader device may be configured to decrypt the data as encrypted to access the data in the universal data forma; and translate the input data from the universal data format to a second data format in accordance with a second format setting.
Selectively Encrypting And Displaying Machine-Readable Identifiers In A Device Lock Screen
Disclosed are various embodiments for selectively encrypting and display machine-readable identifiers in a lock screen of a client device. In one embodiment, a client device may be configured to access input data from a data store and identify a first portion of the input data having a first sensitivity level and a second portion of the input data having a second sensitivity level, where the second sensitivity level is more sensitive than the first sensitivity level. The client device may encrypt at least the second portion of the input data using a cryptographic key and generate a machine-readable identifier using the first portion of the input data and the second portion of the input data as encrypted. The machine-readable identifier may be shown in a lock screen of the client device.
Access Control For Encrypted Data In Machine-Readable Identifiers
Disclosed are various embodiments for providing access control to the underlying data of a single machine-readable identifier when read by various reader devices. A client device may receive a first cryptographic key associated with a first device profile and a second cryptographic key associated with a second device profile. Data provided through an ingestion process is formatted into at least a first portion of data and a second portion of data, where the first portion of data is intended for a first reader device and the second portion of data is intended for a second reader device. The first portion of data may be encrypted using the first cryptographic key while the second portion of data is encrypted using the second cryptographic key. A machine-readable identifier may be generated using the first portion of data as encrypted and the second portion of data as encrypted.
Access Control For Encrypted Data In Machine-Readable Identifiers
- Atlanta GA, US Katherine S. Hill - Atlanta GA, US
International Classification:
G06K 19/06 H04L 9/08 G06K 7/10
Abstract:
Disclosed are various embodiments for providing access control to the underlying data of a single machine-readable identifier when read by various reader devices. A client device may receive a first cryptographic key associated with a first device profile and a second cryptographic key associated with a second device profile. Data provided through an ingestion process is formatted into at least a first portion of data and a second portion of data, where the first portion of data is intended for a first reader device and the second portion of data is intended for a second reader device. The first portion of data may be encrypted using the first cryptographic key while the second portion of data is encrypted using the second cryptographic key. A machine-readable identifier may be generated using the first portion of data as encrypted and the second portion of data as encrypted.
Wayne State University 2009 - 2013
Master of Education (M.Ed.), Art Therapy
Eastern Michigan University 2005 - 2007
Bachelor of Fine Arts (B.F.A.), Watercolors
Selfridge Air Force Base Elementary School Mt. Clemens MI 1964-1966, Irving Elementary School Spokane WA 1966-1971, Sacajawea Middle School Spokane WA 1971-1972
I love life! It just keeps getting better and better! God Bless and Roll Tide!
Katherine Hill
Work:
Self Employed - Writer, Director, Actor (2012)
Katherine Hill
Education:
Wayne State University
Katherine Hill
Tagline:
Well, I'm AWESOME!
Bragging Rights:
DUH! I'm awesome!
Katherine Hill
About:
Hiiii I'm Katherine. I will be posting videos of me talking about anything. I make strange faces/noises on occasion. Subscribe to me and I promise to reply to you guys and answer questions etttcccc.