Team 16 : MedFRS Device Diagnostic Software Misha DowdProject Manager Delnaz GundeviaLife Cycle Planner Anfal Abdul JaleelSystem Architect Nanda Kishore.

Slides:



Advertisements
Similar presentations
CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Department of Labor HSPD-12
©1999 Addison Wesley Longman Slide 13.1 Information System Security and Control 13.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
CSCI 6962: Server-side Design and Programming
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
MAHI Research Database Data Validation System Software Prototype Demonstration September 18, 2001
Modern Software Engineering for Distributed Embedded Systems Joseph Voelmle, Carlos Daboin, Joanne Sirois, Josh Gallegos Mentor: Dr. Janusz Zalewski.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
DHSTS - Counseling Testing Referral (CTR) CTR Data Processing Activity – Agency using Evaluation Web Generate reports for a final check Agency Collect.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Prescryption DrugSafe “Imagine a world where technology enables us to live healthier lives” CSE403 – LCO Proposal Team DrugSafe: Brian Ma Jenny Yuen Jon.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
IT Introduction to Information Technology CHAPTER 01.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Types of Electronic Infection
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
ACM 511 Introduction to Computer Networks. Computer Networks.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Information Security What is Information Security?
EMAS Walkthrough Registration, registration updates and consultation.
ICT in Healthcare. Electronic prescription service GPs and nurses can send electronic prescriptions to a dispenser (pharmacy) of the patients choice.
OARN Database UPDATE – SEPTEMBER We’re Live – and Testing  The site is up and running in Google’s data centers:  The site has been secured: 
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Flat Files Relational Databases
PAYWARE MOBILE API – APP TO APP INTEGRATION. PAYWARE MOBILE API OVERVIEW VeriFone’s PAYware Mobile API provides iPhone developers the ability to easily.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Education Solution.
ITT_04101 COMPUTER APPLICATIONS Gaper M CIT
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
Antony Edwin Keane Inc Ltd
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
E-Prescription Distributed System. E-prescription E-prescribing is simply an electronic way to generate prescriptions through an automated data-entry.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Computer Hardware-Meeting the machine
ICT meeting Business needs
Misha Dowd, Project Manager Delnaz Gundevia, Life Cycle Planner
County HIPAA Review All Rights Reserved 2002.
Electronic Payment Security Technologies
Instructor Materials Chapter 5: Ensuring Integrity
Modern benefits administration and HR software, supported by us.
Presentation transcript:

Team 16 : MedFRS Device Diagnostic Software Misha DowdProject Manager Delnaz GundeviaLife Cycle Planner Anfal Abdul JaleelSystem Architect Nanda Kishore Kollaje RaoSystem Requirements Engineer Anupam KumarFeasibility Analyst Jackie ChengIIV & V

Overview Current first responder systems that provide emergency health care in the field consist of a somewhat archaic paper tagging system in the case of a major catastrophe. Current system have added many systems over time, such as barcode tracking, to help the first responders treat people. However these systems are expensive and still faulty. The MedFRS is a system that will integrate a variety of first responder systems onto a single platform, preferably a ruggedized commercial laptop computer or handheld device, and will simplify the operation and inter- operation of these systems while providing for patient privacy and safety. The MedFRS integration includes the patient monitoring and treatment systems and the standardization of system protocols, interfaces, and key data (e.g., electronic patient records).

Requirements Capability Goals 1.The system should allow the first responders to record the victim information that they have collected with ID, location and triage category (enables information propagation). 2.The system should collate all the data entered by the first responders. 3.The system should provide the EMT with a list of victims sorted by category ( immediate>delayed) and then location (alphabetically). 4.The system should allow the EMT to retrieve a victim’s information by entering the victim’s ID. 5.The system should allow the supervisor to record in which ambulance the victim was taken and to which hospital. 6.Only authorized individuals should have access to the system and data (security). 7.The system should have a web interface.

Requirements Capability Goals 1.The transmission of data should be reliable. Reliability of transmission needs to very high because the system deals with medial data Low to medium network latency is acceptable because the system addresses disaster scenarios and networks would not be at their optimal level of service LOS GoalsDesired LevelAcceptance Level Reliability of transmission100%85% Network Latency30ms300ms

Risks There are many risks which could affect our project, some are : 1.The data collected has to be kept secure and we need to prevent unauthorized individuals from misusing it. For that purpose we need an authentication mechanism and a secure transmission mechanism. 2.The volunteer’s device may be temporarily out of range of the network, so we need a mechanism that stores the data and syncs it to the hub when the device comes back in range. 3. In the case of natural calamities there may be network failure but that is too large a scope, so we are working under the assumption that the network exists. 4.Volunteers can make a mistake while entering data which is a risk by human error.

Risk Item- Authentication Authentication is a primary risk Any user can generate and send data which may lead to clog the server Tracking volunteers Applications Validating Data

Volunteer Registers One Time Pass will be sent to the volunteer Volunteer Activates the Application using OTP A new Device ID will generated and sent to the App All Communication will be sent using this server generated ID DecryptionAuthentication Server Generated ID RSA Encrypted Authentication

Risk Item - Data Sync Data Sync is the process of communicating the victim information from Volunteer’s device to the cloud and from cloud to the EMT’s device, securely.

Data Sync  Why is it a risk? Security of the data may be compromised Network Connectivity may be hindered Data sent/received may not be consistent

Data Sync – When There is no Network Store the information in file on iOS file system[1] Another thread keeps checking network status in the background

Data Sync – When network Comes back Server Checksum DB Checker Thread Notifies of Network Connectivity Digital Signature of data is computed Data is then encrypted and transmitted Server decrypts the data Server verifies the digital signature Server stores the data if the signatures match

Bar Code is Entered or scanned Data is embedded with the Device ID and Barcode Number Data is Encrypted with RSA and updated in the Server EMS Personnel Scans the Bar code and gets Victim Data Store Data based on Barcode Number Send Data for the received Bar Code Number EMT Device RSA Encrypted Feature 1 : Barcode Tagging

Feature 2-Victim Location & Prioritization Table Automatically gets populated as data from volunteer starts pouring in Table stores information sorted based on the urgency of victim’s condition (Immediate, delayed) and on the alphabetic order of names of buildings assigned to him

References RSA Reference iOS Developer Guide tifkeytrustservices/Reference/reference.html#//apple_ref/doc/uid/TP Property List iOS Developer Guide opertyLists/AboutPropertyLists/AboutPropertyLists.html#//apple_ref/doc/uid / i-CH3-SW2 Checksum anPages/man1/cksum.1.html