Gupta et al., 2025 - Google Patents
Artificial Intelligence-Enabled Security for Healthcare Systems: Safeguarding Patient Data and Improving ServicesGupta et al., 2025
- Document ID
- 6524845099970786168
- Author
- Gupta S
- Kapoor M
- Debnath S
- Publication year
External Links
Snippet
The book" AI-Enabled Healthcare Security: Safeguarding Patient Data and Improving Outcomes" focuses on the role of artificial intelligence in enhancing healthcare security and improving patient outcomes. It covers the challenges and risks associated with cybersecurity …
- 238000013473 artificial intelligence 0 abstract description 306
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rawat et al. | Conversational Artificial Intelligence | |
Herzog et al. | Artificial intelligence in healthcare and medical records security | |
Rathore et al. | Synergy of AI and blockchain to secure electronic healthcare records | |
Ndumbe et al. | Government strategies on cybersecurity and how artificial intelligence can impact cybersecurity in healthcare with special reference to the UK | |
El-deep et al. | A comprehensive survey on impact of applying various technologies on the internet of medical things | |
Sharma et al. | Understanding cybersecurity management in healthcare | |
Wijayanti et al. | Uncovering security vulnerabilities in electronic medical record systems: a comprehensive review of threats and recommendations for enhancement | |
Finch et al. | Commentary on healthcare and disruptive innovation | |
Chava | Revolutionizing Healthcare Systems with Next-Generation Technologies: The Role of Artificial Intelligence, Cloud Infrastructure, and Big Data in Driving Patient-Centric Innovation | |
Abuasal et al. | Designing a standard-based approach for security of healthcare systems | |
Bhattacharya et al. | Virtual AI Agents in Registration Systems: Enhancing Security and Usability Across Industries | |
Gupta et al. | Artificial Intelligence-Enabled Security for Healthcare Systems: Safeguarding Patient Data and Improving Services | |
Mawel | Exploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches | |
Gupta et al. | How artificial intelligence can undermine security: an overview of the intellectual property rights and legal problems involved | |
Williams et al. | Security and privacy of the integrated clinical environment part I | |
Krishna et al. | Internet of Things based e-Healthcare System: An Useful Review on Critical Issues and Challenges | |
Ahmed | Augmenting Accountability, Security and Fraud Detection in Health Data Sharing Systems | |
Monteith et al. | Artificial intelligence and cybercrime: implications for individuals and the healthcare sector | |
Kumari | Security Aspects of Patient's Data in a Medical Diagnostic System | |
Chamran | Implementation of AI and Blockchain in Healthcare | |
Murtaza | Risk management for health information security and privacy | |
Gupta et al. | Artificial Intelligence-Enabled Security for Healthcare Systems | |
Shahriar et al. | Approaches and challenges to secure health data | |
Harris et al. | Cybersecurity Standards for AI based Healthcare Networks | |
Thantilage et al. | Secure Emergency Data Sharing in Healthcare-A Data Warehouse View |