Method and equipment configured for verifying presence of a medical implant within a patient

ABSTRACT

A system comprises means for authenticating an identity of a medical implant patient using at least a portion of information provided on an identification card and means for displaying an image showing a medical implant as actually implanted within the medical implant patient and an image showing an implant operation scar of the medical implant patient resulting from actual implantation of the medical implant therein thereby allowing the displayed image of the medical implant to be visually compared against a corresponding image provided on the identification card and allowing verification that the medical implant patient has a scar thereon appearing the same as the image showing the implant operation scar of the medical implant patient resulting from actual implantation of the medical implant. Displaying the images is performed in response to successfully authenticating the identity of the medical implant verification patient.

CROSS REFERENCE TO RELATED APPLICATIONS

This patent application is a continuation patent application claimingpriority from U.S. Non-Provisional Patent Application having Ser. No.10/369,254, filed 18 Feb. 2003, now U.S. Pat. No. 7,767,385 entitled“Methods And Equipment Adapted For Verifying Presence Of A MedicalImplant Within A Patient”, having a common applicant herewith and beingincorporated herein in its entirety by reference.

FIELD OF THE DISCLOSURE

The disclosures herein relate generally to medical data and, moreparticularly, to identification cards configured with medical data.

BACKGROUND OF THE DISCLOSURE

There are many situations in which it is desirable, if not mandatory, toverify presence of a medical implant within a patient. One example ofsuch a situation is when a metal detector detects presence of a medicalimplant in a person. As sensitivity of metal detection systems continuesto increase and as metal detectors continue to proliferate into areaswhere they were typically not used previously, it will become moreimportant for a medical implant recipient to verify the presence of amedical implant to law enforcement personnel, security personnel andother authorized personnel requesting such verification.

Commercial theft detection devices are also becoming more sensitive andsophisticated. Accordingly, in some instances, certain types of theftdetection devices detect a person with a medical implant rather than ashoplifter. In such instances, it may be necessary for the person withthe medical implant to readily verify presence of the medical implant.

Patient identification cards are one example of a conventional means forenabling presence of a medical implant to be verified (i.e., aconventional patient identification card). Conventional patientidentification cards are limited in their effectiveness for severalreasons. One limitation of conventional patient identification cards isthat their issuance is often unrestricted (i.e., anyone can get a card).Another limitation is that they are typically not linked to an on-lineverification database. Still another limitation is that they typicallydepict generic representations of a medical implant rather than theactual implant of a cardholder.

Implanted identification transponders are another example of aconventional means for enabling a medical implant to be verified.Implanted identification transponders mandate the use of a transponderreader and may present privacy issues stemming from unauthorized readingof such transponders. Furthermore, implanted identification transpondersare themselves implanted devices that may require verification ofpresence.

Therefore, methods and equipment adapted for verifying presence of amedical implant within a patient in a manner that overcomes limitationsassociated with conventional methods and equipment adapted for verifyingpresence of a medical implant within a patient would be useful.

BRIEF DESCRIPTION OF THE DRAWING FIGURES

FIG. 1 depicts a method for verifying presence of a medical implantwithin a patient in accordance with an embodiment of the disclosuresmade herein.

FIG. 2 depicts an apparatus adapted for verifying presence of a medicalimplant within a patient in accordance with an embodiment of thedisclosures made herein.

FIG. 3A depicts a first side of a medical implant verification card inaccordance with an embodiment of the disclosures made herein.

FIG. 3B depicts a second side of a medical implant verification card inaccordance with an embodiment of the disclosures made herein.

FIG. 4 depicts an embodiment of the operation for authenticating themedical implant patient depicted in FIG. 1.

FIG. 5 depicts an embodiment of the operation for creating theauthenticated-patient medical implant verification account depicted inFIG. 1.

FIG. 6 depicts an embodiment of the operation for facilitatingpatient-authorized access to the authenticated-patient medical implantverification account depicted in FIG. 1.

DETAILED DESCRIPTION OF THE DRAWING FIGURES

The disclosures made herein relate to various aspects of methods andequipment adapted for verifying presence of a medical implant within apatient (e.g., a person). Such methods and equipment, which are inaccordance with embodiments of the disclosures made herein, are adaptedfor overcoming limitations associated with conventional methods andequipment providing related functionality. An objective of such methodsand equipment as disclosed herein is to provide a remotely accessible,secure and trusted means for verifying presence of a medical implantwithin the patient.

One embodiment of the disclosures made herein is a Medical ImplantVerification System (MIVS), which includes a Medical ImplantVerification Card (MIVC). The MIVS is adapted for providing verificationof the presence of a permanent medical implant within a patient torequesting parties such as airport security personnel, law enforcementpersonnel, military personnel, government agency personnel, doctors,hospital personnel, commercial security personnel, the patient and/orthe patient's designee. Although the MIVS is specifically adapted formedical implants, it is contemplated herein that the MIVS may also beused for verifying non-medical implant items in a patient (e.g.,retained bullet/shrapnel fragments).

A MIVS in accordance with an embodiment of the disclosures made hereinprovides an authorized requesting party with immediate access toinformation required for verifying presence of a medical implant in amedical implant patient. For example, in the case where the MIVS isaccessible remotely via the Internet, access may be made available 24hours per day, 7 days per week. In this manner, such a MIVS will beuseful in a variety of situations (e.g., verifying a medical implant ina airline passenger, verifying a medical implant in a shopper when theyset off a retail store metal detector, verifying an implant in a personrequesting access to a highly-classified area of a facility, etc).

By nature, certain medical implants are intended for being installedpermanently (i.e., permanent medical implants). However, permanentmedical implants do not always last a lifetime. Accordingly, the MIVSmay be very useful to subsequent treating doctors, if removal orreplacement of a permanent medical implant becomes necessary. The MIVSis a means for readily obtaining patient-specific information andimplant-specific information.

Removal instruments for a particular medical implant are often unique toa manufacturer of that particular medical implant. Therefore,implant-specific information (e.g., identification of the exact makeand/or model of the medical implant, implant removal information, etc.)in combination with other patient-specific information (e.g., thepatient's blood type, allergies of the patient, etc.) may be imperativeto safely and efficiently removing a particular medical implant. Suchimplant-specific information can usually be obtained from the implantingphysician or from a patient's hospital. However, in a trauma situation,a means for readily accessing implant-specific information is vital whenthere is not enough time to obtain previous medical records from typicalsources.

Furthermore, there has been national debate at the National Institute ofHealth (NIH) about an implant retrieval program. The MIVS disclosedherein provides a platform for patients who want to be identified as avoluntary implant donor for the purposes of implant retrieval andanalysis. Similarly, the MIVS disclosed herein also provides a means foreffectively facilitating product recall of medical implants. Manypatients do not know the manufacturer of their implant or the name oftheir implant. Information such as the make and/or model of thepatient's medical implant may be accessed via the MIVS disclosed herein.

Turning now to specific figures, FIG. 1 depicts a method 100 forverifying presence of a medical implant within a patient in accordancewith an embodiment of the disclosures made herein. The method 100includes an operation 102 for authenticating a medical implant patient.After successfully authenticating the medical implant patient, anoperation 104 is performed for creating an authenticated-patient MedicalImplant Verification Account (MIVA) for the medical implant patient. Anoperation 106 for issuing an authenticated-patient MIVC is performedafter creating the authenticated-patient MIVA. Once theauthenticated-patient MIVC is issued, an operation 108 is performed forfacilitating patient-authorized access to the MIVA.

FIG. 2 depicts an apparatus 200 adapted for verifying presence of amedical implant within a patient in accordance with an embodiment of thedisclosures made herein. Specifically, the apparatus 200 is adapted forenabling the method 100 depicted in FIG. 1 to be carried out. Theapparatus 200 includes a MIVS 202, a MIVA access system 204, a verifiedX-ray image delivery system 206, a MIVC fabrication system 208 and anetwork system 210. The network system 210 is connected between the MIVS202, the MIVA access system 204, the verified X-ray image deliverysystem 206 and the MIVC fabrication system 208 for enablingcommunication therebetween. A public network system such as the Internetis an example of the network system 210. The MIVS 202 includes MIVAstorage 212 for storing MIVA information thereon.

The MIVS 202 enables the method 100 to be carried out. A data processingsystem (e.g., a network server, a mainframe, etc) that is running one ormore data processor programs necessary for facilitating the method 100depicted in FIG. 1 is an example of the MIVS 202. Storage available on adata storage unit, which includes one or more harddrives, is an exampleof the MIVA storage 212. It is contemplated herein that the MIVS 202includes a management interface (not shown) for enabling a systemadministrator to access the MIVS 200.

A data processing system (e.g., a personal computer, a network server, amainframe or proprietary interface system) running one or more dataprocessor programs for enabling communication with the MIVS is anexample of the MIVA access system 204. In practice, it is contemplatedthat the MIVA access system 204 and a plurality of other MIVA accesssystems (not shown) are a provided for communication with the MIVS 202via the network system 210. Such MIVA access systems reside at remotelocations from the MIVS 202 (e.g., at airport security check-points, atcheck-points in restricted access facilities, at retail outlet securitycenters, etc.).

The verified X-ray image delivery system 206 is a system adapted forproviding known-authenticated copies of implanted medical implant imagesto the MIVS 202. A secure and trusted repository of digital X-ray imagesof implanted medical implants for patients is an example of such asystem. The intent of such a system is to serve as a centralized, secureand trusted facility for delivering verified (i.e., known to beauthentic) implanted medical implant images to the MIVS 202 in a digitalmanner over the network system 210. A computer system of a radiologist,physician or the like, which is operated in a controlled-access manner,is another example of the verified X-ray image delivery system 206.

The MIVC fabrication system 208 is a system adapted for receiving MIVCinformation from the MIVS and facilitating fabrication of MIVCs. Anidentification card fabrication system of an identification cardfabrication vendor is an example of the MIVC fabrication system 208. Theintent of such a system is to serve as a centralized, secure and trustedfacility for receiving MIVA information from the MIVS 202 and forfabricating MIVCs in accordance with such information.

An embodiment of a MIVC 300 is depicted in FIGS. 3A and 3B. FIGS. 3A and3B depict a first side 302 and a second side 303, respectively, of theMIVC 300. An image 304 of the patient's face, MIVA information 306 ofthe patient and a signature 308 of the patient (e.g., a digitalreproduction of the patient's actual signature) are provided on thefirst side 302 of the MIVC 300. Examples of the MIVA information 306include the patient's name, the patient's address, the patient's MIVAnumber, the make/model of the patient's medical implant, the body regionwhere the medical implant is implanted, the patient's physician, and thephysician's phone number.

A brief list of medical implants that include metallic components andthat may alert metal detectors include automatic implantable cardiacdefibrillators (AICD), bone fusion stimulators, cochlear implants,cranial plates/screws, fracture plates/screws, hip joint replacements,implantable pain pumps, knee joint replacements, metal plates/screws,metallic TMJ implants, oral surgery implants, pacemakers, Parkinson'scontrol systems, podiatry plates/screws, shoulder joint replacements,spinal cord stimulators, spinal implants such asplates/screws/rods/cages, and Vagus nerve stimulators forEpilepsy/seizure disorders. Retained bullet and shrapnel fragments willalso alert metal detectors and these patients may also elect to carrythe MIVC for verification.

An image 310 of the patient's actual implanted medical implant (i.e., asimplanted in the patient's body) and an image 312 of the patient'sactual implant operation scar are provided on the second side 303 of theMIVC 300. A high-resolution digital images and a photographic image areexamples of the image 304 of the patient's face and the image 312 of thepatient's actual implant operation scar. An X-ray image is an example ofthe image 310 of the patient's actual implanted medical implant. It iscontemplated that MIVCs in accordance with embodiments of thedisclosures made herein may include one or more measures for reducingthe potential for tampering and forgery.

FIG. 4 depicts an embodiment of the operation 102 for authenticating themedical implant patient. In the depicted embodiment of the operation 102for authenticating the medical implant patient, a step 110 is performedfor receiving a patient operative report, a step 112 is performed forreceiving an image (e.g., an X-ray image) showing a medical implant inthe patient (i.e. an implanted medical implant image), a step 114 isperformed for receiving patient identification information and a step116 is performed for examining a patient implant operation scar. Thepatient operative report, the patient implanted medical implant image,the patient identification information and the patient implant operationscar represent examples of authentication information. After receivingthe patient operative report, receiving the implanted medical implantimage, receiving patient identification information and examining thepatient implant operation scar, a step 118 is performed for correlatingauthentication information. Patient identification information may becorrelated against information available on a valid governmental photoID of the patient (e.g., a driver's license, military ID or passport).

In response to successfully correlating required portions of theauthentication information, the patient is thereby authenticated ashaving a designated medical implant (i.e., an authenticated-patient),the authentication information is verified as being authentic and themethod 100 continues at the operation 104 for creating theauthenticated-patient MIVA for the medical implant patient. In responseto unsuccessfully correlating required portions of the authenticationinformation, the operation 102 ends. It is contemplated herein that atleast a portion of the steps of operation 102 may be performedsequentially or in parallel.

FIG. 5 depicts an embodiment of the operation 104 for creating theauthenticated-patient MIVA. In the depicted embodiment of the operation104 for creating the authenticated-patient MIVA, a step 120 is performedfor receiving a verified implanted medical implant image (e.g., asverified at the operation and then performs 118 in FIG. 4) and then astep 122 is performed for assigning an image identifier (e.g., a filename) to the verified medical implant image. A step 124 is performed forreceiving a verified patient implant operation scar image and thenperforms a step 126 for assigning an image identifier (e.g., a filename) to the verified patient implant operation scar image. Inassociation with assigning the image identifier for the verifiedimplanted medical implant image and assigning the image identifier tothe verified patient implant operation scar image, a step 128 isperformed for storing the verified medical implant image and theverified patient implant operation scar image.

Still referring to FIG. 5, a step 130 is performed for receivingverified patient identification, a step 132 is performed for generatinga MIVA number for the patient (i.e., a system-generated MIVA number) anda step 134 is performed for generating a passcode for the patient (i.e.,a system-generated MIVA passcode). It is contemplated herein that thesystem-generated MIVA passcode may be changed by the patient to anotherMIVA passcode (i.e., a patient-specified MIVA passcode). As discussed ingreater detail below, the MIVA number and the MIVA passcode enableaccess to the MIVA by the patient and/or authorized representatives ofthe patient.

After performing the steps (120-134) for receiving, assigning,generating and storing, a step 136 is performed for instantiating anaccount instance with verified authentication information, the MIVAnumber, the MIVA passcode and the image identifiers. Instantiating anobject in an object environment and populating a record in a databaseare examples of instantiating an account instance. After instantiatingthe account instance, a step 138 is performed for transmitting a MIVAcreation confirmation message for reception by the patient. Transmittingan e-mail message via the Internet is an example of transmitting theMIVA creation confirmation message. The method 100 then proceeds at theoperation 106. It is contemplated herein that at least a portion of thesteps of operation 104 may be performed sequentially or in parallel.

FIG. 6 depicts an embodiment of the operation 108 for facilitatingpatient-authorized access to the authenticated-patient MIVA of apatient. In the depicted embodiment of the operation 108 forfacilitating patient-authorized access to the authenticated-patient MIVAof a patient, a MIVA access system performs a step 140 transmitting aMIVA number for reception by a medical implant system (MIVS) and a step142 for transmitting a MIVA passcode corresponding to the MIVA numberfor reception by the MIVS. Submission of a MIVA access request comprisestransmitting the MIVA number and the MIVA passcode. In response to theMIVS performing a step 144 for receiving the MIVA number and a step 146for receiving the MIVA passcode, the MIVS performs a step 148 forauthorizing the access request. It is contemplated herein that the MIVAnumber and the MIVA passcode may be transmitted and receivedsequentially or in parallel.

Still referring to FIG. 6, a step 150 is performed by the MIVS forenabling MIVA access by the MIVA access system in response to the accessrequest being authorized successfully. After the MIVS enables MIVAaccess, the MIVA access system performs a step 152 for accessing theMIVA. In response to the access request not being authorizedsuccessfully, the operation 108 ends without enabling MIVA access to theMIVA access system.

In at least one embodiment of the disclosures made herein, the operation108 for facilitating patient-authorized access to theauthenticated-patient MIVA of a patient is performed over a secureInternet connection. In such an embodiment, the MIVA access systemcommunicates with the MIVS over a secure Internet connection. Forexample, a MIVS website address is noted on the MIVC, thereby enablingthe secure connection to be implemented. Once the secure connection withthe MIVS website is established, the party requesting access (i.e., therequesting party) is prompted to enter the patient's MIVA number.Alternatively, the MIVC may be read (e.g., via a magnetic strip) by theMIVA access system.

In response to a valid MIVA number being provided to the MIVS, therequesting party is then prompted for providing a corresponding MIVApasscode. The patient then enters his or her MIVA passcode via a securemeans (e.g., a handheld keypad). In response to the corresponding MIVApasscode being entered, access to MIVA information is granted. Withoutthe corresponding MIVA passcode being entered, access to the MIVA isdenied.

This MIVS will only provide MIVA information that has been authorized bythe patient. It may include the same images that are on the front and/orthe back of the MIVC, a full-length image of the patient, a secondaryMIVA passcode known only by the patient, etc. Additional informationthat may be available includes the patient's name, address, DOB, socialsecurity number, telephone number, emergency contact's name & telephonenumber and patient's allergies, blood type and designation as an organor implant donor. Implant information that may be supplied in thedatabase includes the implanting surgeon's name, address and telephonenumber, as well as the date of surgery, name of the surgery, implantinghospital's name, address and telephone number, as well as the implant'sname and manufacturer and the region of the body where the medicalimplant resides.

In the preceding detailed description, reference has been made to theaccompanying drawings that form a part hereof, and in which are shown byway of illustration specific embodiments in which the invention may bepracticed. These embodiments, and certain variants thereof, have beendescribed in sufficient detail to enable those skilled in the art topractice the invention. It is to be understood that other suitableembodiments may be utilized and that logical, mechanical, chemical andelectrical changes may be made without departing from the spirit orscope of the invention. To avoid unnecessary detail, the descriptionomits certain information known to those skilled in the art. Thepreceding detailed description is, therefore, not intended to be limitedto the specific forms set forth herein, but on the contrary, it isintended to cover such alternatives, modifications, and equivalents, ascan be reasonably included within the spirit and scope of the appendedclaims.

1. A system configured verifying presence of a medical implant implantedwithin a medical implant patient, comprising: at least one dataprocessing device; instructions processable by said at least one dataprocessing device; and an apparatus from which said instructions areaccessible by said at least one data processing device; wherein saidinstructions are configured for causing said at least one dataprocessing device to carry out operations for: authenticating anidentity of a medical implant patient using at least a portion ofinformation accessed from an identification card; and displaying animage showing a medical implant as actually implanted within the medicalimplant patient and an image showing an implant operation scar of themedical implant patient resulting from actual implantation of themedical implant therein thereby allowing said displayed image of themedical implant to be visually compared against a corresponding imageprovided on the identification card while the image showing the medicalimplant as actually implanted within the medical implant patient isbeing displayed and allowing verification that the medical implantpatient has a scar thereon appearing the same as the image showing theimplant operation scar of the medical implant patient resulting fromactual implantation of the medical implant, wherein displaying saidimages is performed in response to successfully authenticating theidentity of the medical implant verification patient using saidinformation accessed from the identification card.
 2. The system ofclaim 1 wherein: said displayed images are verified as beingknown-authentic images for the medical implant patient; and displayingsaid images includes retrieving said images from a secure imagerepository.
 3. The system of claim 1 wherein: authenticating theidentity of the medical implant patient includes displayingauthenticated medical implant verification account information therebyallowing said displayed medical implant verification account informationto be compared to said information provided on the identification card;and said medical implant verification account information includesimplant identification information designating a type of the medicalimplant, contact information for a surgeon having performed theoperation for implanting the medical implant, and informationdesignating a location of the body of the patient at which the medicalimplant is located.
 4. The system of claim 3 wherein: said displayedimages are verified as being known-authentic images for the medicalimplant patient; and displaying said images includes retrieving saidimages from a secure image repository.
 5. The system of claim 1 wherein:said instructions are configured for causing said at least one dataprocessing device to carry out operations for accessing medical implantverification account information for the medical implant patient; andsaid instructions are configured for causing said at least one dataprocessing device to carry out operations for displaying said medicalimplant verification account information; said medical implantverification account information includes implant identificationinformation designating a type of the medical implant, contactinformation for a surgeon having performed the operation for implantingthe medical implant, and information designating a location of the bodyof the patient at which the medical implant is located.
 6. The system ofclaim 5 wherein: authenticating the identity of the medical implantpatient includes displaying authenticated medical implant verificationaccount information thereby allowing said displayed medical implantverification account information to be compared to said informationprovided on the identification card; said medical implant verificationaccount information includes implant identification informationdesignating a type of the medical implant, contact information for asurgeon having performed the operation for implanting the medicalimplant, and information designating a location of the body of thepatient at which the medical implant is located; and said displayedimages are verified as being known-authentic images for the medicalimplant patient; and displaying said images includes retrieving saidimages from a secure image repository.
 7. A method configured verifyingpresence of a medical implant implanted within a medical implantpatient, comprising: at least one data processing device accessing, frommemory coupled to said at least one data processing device, instructionscausing said at least one data processing device to authenticate anidentity of the medical implant patient using information accessed froman identification card; and said at least one data processing deviceaccessing, from said memory, instructions causing said at least one dataprocessing device to display an image showing a medical implant asactually implanted within the medical implant patient and an imageshowing an implant operation scar of the medical implant patientresulting from actual implantation of the medical implant thereinthereby allowing said displayed image of the medical implant to bevisually compared against a corresponding image provided on theidentification card while the image showing the medical implant asactually implanted within the medical implant patient is being displayedand allowing verification that the medical implant patient has a scarthereon appearing the same as the image showing the implant operationscar of the medical implant patient resulting from actual implantationof the medical implant, wherein causing said at least one dataprocessing device to display said images is performed in response to theidentity of the medical implant verification patient being successfullyauthenticated using said information accessed from the identificationcard.
 8. The method of claim 7 wherein: said displayed images areverified as being known-authentic images for the medical implantpatient; and causing said at least one data processing device to displaysaid images includes causing said at least one data processing device toretrieve said images from a secure image repository.
 9. The method ofclaim 7 wherein: causing said at least one data processing device toauthenticate the identity of the medical implant patient includescausing said at least one data processing device to displayauthenticated medical implant verification account information therebyallowing said displayed medical implant verification account informationto be compared to said information provided on the identification card;said medical implant verification account information includes implantidentification information designating a type of the medical implant,contact information for a surgeon having performed the operation forimplanting the medical implant, and information designating a locationof the body of the patient at which the medical implant is located. 10.The method of claim 9 wherein: said displayed images are verified asbeing known-authentic images for the medical implant patient; andcausing said at least one data processing device to display said imagesincludes causing said at least one data processing device to retrievesaid images from a secure image repository.
 11. The method of claim 7,further comprising: said at least one data processing device accessing,from said memory, instructions causing said at least one data processingdevice to access medical implant verification account information forthe medical implant patient; and said at least one data processingdevice accessing, from said memory, instructions causing said at leastone data processing device to display said medical implant verificationaccount information, wherein said medical implant verification accountinformation includes implant identification information designating atype of the medical implant, contact information for a surgeon havingperformed the operation for implanting the medical implant, andinformation designating a location of the body of the patient at whichthe medical implant is located.
 12. The method of claim 11 wherein:causing said at least one data processing device to authenticate theidentity of the medical implant patient includes causing said at leastone data processing device to display authenticated medical implantverification account information thereby allowing said displayed medicalimplant verification account information to be compared to saidinformation provided on the identification card; said medical implantverification account information includes implant identificationinformation designating a type of the medical implant, contactinformation for a surgeon having performed the operation for implantingthe medical implant, and information designating a location of the bodyof the patient at which the medical implant is located; and saiddisplayed images are verified as being known-authentic images for themedical implant patient; and causing said at least one data processingdevice to display said images includes causing said at least one dataprocessing device to retrieve said images from a secure imagerepository.
 13. A non-transient computer-readable medium having tangiblyembodied thereon and accessible therefrom a set of instructionsinterpretable by at least one data processing device, said set ofinstructions configured for causing said at least one data processingdevice to carry out operations for: authenticating an identity of amedical implant patient using information accessed from anidentification card; and displaying an image showing a medical implantas actually implanted within the medical implant patient and an imageshowing an implant operation scar of the medical implant patientresulting from actual implantation of the medical implant thereinthereby allowing said displayed image of the medical implant to bevisually compared against a corresponding image provided on theidentification card while the image showing the medical implant asactually implanted within the medical implant patient is being displayedand allowing verification that the medical implant patient has a scarthereon appearing the same as the image showing the implant operationscar of the medical implant patient resulting from actual implantationof the medical implant, wherein displaying said images is performed inresponse to successfully authenticating the identity of the medicalimplant verification patient using said information accessed from theidentification card.
 14. The computer-readable medium of claim 13wherein: said displayed images are verified as being known-authenticimages for the medical implant patient; and displaying said imagesincludes retrieving said images from a secure image repository.
 15. Thecomputer-readable medium of claim 13 wherein: authenticating theidentity of the medical implant patient includes displayingauthenticated medical implant verification account information therebyallowing said displayed medical implant verification account informationto be compared to said information provided on the identification card;and said medical implant verification account information includes atleast one of implant identification information designating a type ofthe medical implant, contact information for a surgeon having performedthe operation for implanting the medical implant, and informationdesignating a location of the body of the patient at which the medicalimplant is located.
 16. The computer-readable medium of claim 15wherein: said displayed images are verified as being known-authenticimages for the medical implant patient; and displaying said imagesincludes retrieving said images from a secure image repository.
 17. Thesystem of claim 13 wherein: said set of instructions configured forcausing said at least one data processing device to carry out operationsfor accessing medical implant verification account information for themedical implant patient and displaying said medical implant verificationaccount information; and said medical implant verification accountinformation includes implant identification information designating atype of the medical implant, contact information for a surgeon havingperformed the operation for implanting the medical implant, andinformation designating a location of the body of the patient at whichthe medical implant is located.
 18. The computer-readable medium ofclaim 17 wherein: authenticating the identity of the medical implantpatient includes displaying authenticated medical implant verificationaccount information thereby allowing said displayed medical implantverification account information to be compared to said informationprovided on the identification card; said medical implant verificationaccount information includes implant identification informationdesignating a type of the medical implant, contact information for asurgeon having performed the operation for implanting the medicalimplant, and information designating a location of the body of thepatient at which the medical implant is located; and said displayedimages are verified as being known-authentic images for the medicalimplant patient; and displaying said images includes retrieving saidimages from a secure image repository.