Developing What Works Best
BID Learning Network
LearningSharingDeveloping What Works Best BID Learning Network

Posts & Resources: Patient De-Identification

News, reports, downloads and links

Posts Resources

Aug 31, 2016

Making Innovation Matter: Conference Report From The Innovation Effect

, , ,
Global

More than 150 leading global health and development thinkers convened on June 15, 2016, for The Innovation Effect: Powering Disruptive Global Health Solutions in Washington, DC. This conference report provides an overview of the insights shared when attendees explored what happens when unique partnerships, disruptive technologies, transformed systems, and data-driven insights combine in often unexpected ways to create dramatic improvements in the health and well-being of people around the world.

Go To Link

Jun 6, 2014

Patient De-Identification Handbook

, , ,
Global

Integrating the Healthcare Enterprise (IHE) has put together a handbook on patient de-identification. This handbook explains the process for removing individually identifiable information from healthcare data. This includes de-identification, pseudonymization, re-linking, design consideration, techniques, and risks. The intended audience is IHE Profile editors and healthcare information technology implementers needing a guide for designing and implementing de-identification systems.  

Go To Link

Nov 8, 2009

Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

, , ,
Global

As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

Go To Link

Jump in. Expand your knowledge.

Join the discussion and share with your colleagues.

Participate

Events

No Upcoming Events

view past events

Communicate

Contact us

Subscribe

Keep up to date with the latest BID Initiative content and blog posts.

Go