Systems and devices for encrypting, converting and interacting with medical images

ABSTRACT

A system for communicating images, comprises an imaging device configured to capture and image and generate a digital image file, the imaging device comprising a device identifier; a set of routines configured to label the digital image file, associated account information with the digital image file, associate the device identifier with the digital image file, and communicate the digital image file to a server; a server configured to receive digital image files and process the digital image file according to at least one of a label associated with the digital image file, account information associated with the digital image file, and a device identifier associated with a device that captured the digital image file.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 14/884,709, filed on Oct. 15, 2015, which is incorporated herein by reference in its entirety, along with all of its priority claims to prior applications.

BACKGROUND 1. Technical Field

The embodiments described herein are related to delivery of medical image records, and more particularly to the automatic encryption and conversion of medical image files for delivery to mobile devices and/or remote communication systems.

2. Related Art

Medical diagnostic devices and medical imaging systems have become increasingly complex in recent years. In response to the increasing challenges in digital imaging technology, the American College of Radiology (ACR) and the National Electrical Manufacturers Association (NEMA) developed the Digital Imaging and Communications in Medicine (DICOM) standard. DICOM is a standard for handling, storing, printing, and transmitting information in medical imaging. It includes a file format definition and a network communication protocol. The network communication protocol is an application protocol that uses TCP/IP to communicate between systems. One of the goals of the standard is to make uniform the transferring of medical images and information between viewing and scanning sources to allow users of different imaging software and/or hardware to share information. DICOM files can be exchanged between two entities that are capable of receiving image and patient data in DICOM format. DICOM enables the integration of scanners, servers, workstations, printers, and network hardware from multiple manufacturers into a Picture Archiving and Communication System (PACS) for storing and downloading of digital images. The different devices come with DICOM conformance statements that clearly state the DICOM classes they support. DICOM has been widely adopted by hospitals, and is gaining popularity in smaller dentists' and doctors' offices.

DICOM files commonly contain images; therefore, they are often referred to as DICOM images. But it will be understood that a DICOM file does not necessarily need to include an image. Rather, such a file can include measurements or report data. Thus, DICOM files may contain media data, such as, video and audio data, or no media data at all. In that case, DICOM files may contain only metadata identifying the originating modality, the operator, or the patient being examined. Modality here refers to any image generating equipment in medical imaging, such as, Ultrasound (US), Magnetic Resonance Imaging (MRI), Computed Tomography (CT), Positron Emission Tomography (PET), radiographs, and the like.

The type of data and amount of data available in any one DICOM image file varies. A DICOM file is generally structured using data identifying Patient, Study, Series and Instance in that hierarchical order. A Patient can be involved in a number of Studies (cases), which in turn may contain a number of Series (examination or visits), which in turn may contain a number of Instances (files usually containing images). It means that a DICOM file can be unambiguously identified and fitted into that hierarchy. All DICOM files contain an identifier for the generating modality. In other words, the identifier will reflect the equipment or location in which the file was originated. The files also contain timestamps pertaining to both the file itself (Instance) and the Series. Using the timestamps and the originating identifier, an image can be unambiguously identified using that data without involving any identifiable patient information to safeguard patient privacy issues. In addition, DICOM file format differs from other data formats in that it groups information into data sets. For example, a file of a chest X-Ray image actually contains the patient ID within the file, so that the image can never be separated from this information by mistake.

Most PACSs handle images from various medical imaging instruments, including US, Mill, PET, CT, and the like. Electronic images and reports are transmitted digitally via PACS; this eliminates the need to manually file, retrieve or transport film jackets. A PACS consists of four major components: the imaging modalities, such as, CT and MRI; a secured network for the transmission of patient information; workstations for interpreting and reviewing images; and long and short term archives for the storage and retrieval of images and reports. Combined with available and emerging Web technology, PACS has the ability to deliver timely and efficient access to images, interpretations and related data. PACS breaks down the physical and time barriers associated with traditional film-based image retrieval, distribution and display.

Medical imaging devices typically output digital image data. The overwhelming majority, if not all, of such devices use the DICOM standard for both image file format and network transfers. These images are generally not readable by consumer image viewers or mobile devices. Therefore, patients who wish to share their medical images struggle with conversion and delivery of these images. A good example is to share images from an Ultrasound examination during a pregnancy. The future parents usually would like to keep, share and display the images of their future child. They might also conceivably want to send these images to their friends' and relatives' cellular phones or email accounts. They might even want to post them on a social network, or they might just want to keep them in their personal digital “photo album”. All of these events would require them to either scan a printed hard-copy of the image, or to find, purchase, install and learn to use DICOM viewer software package with export capabilities. These software packages are usually not readily available or they are not economical for limited use.

It should also be noted that this issue is not necessarily limited to DICOM files. In general, there is no real method for a patient to view images related to their condition, treatment, status, etc. Moreover, there are few, if any effective means by which a doctor or clinician can quickly and remotely retrieve images for diagnostic or other purposes.

In fact, many smaller medical practices, such as, small clinics, doctors' offices, and dentists' offices also suffer from an inability to convert, deliver, and receive medical images economically and timely. These facilities usually do not have the technical support-staff or finances to run a full PACS for image archiving and delivery to remote expert doctors for second opinions and consultations. They often resort to using films, or writable CDs which are sent by mail or messenger. This is both slow, environmentally unfriendly and, in the case of using unregistered postal delivery, insecure. The cost of running a PACS is not just paying the licensing fees. Major investments in advanced infrastructure including the surrounding software, hardware, and facility, as well as the cost for educating staff, and the hours spent on administration will add to the cost of running a PACS. These major investments are expensive, therefore, usually out-of-reach for most small businesses.

Additionally, many medical practices may not have a local network where medical imaging equipment communicates, or the local network may not be secure or properly configured to receive and communicate medical images. The medical imaging devices themselves often lack the capability to encrypt or convert the captured images. The local network, if it does exist, may be incapable of incorporating network devices such as a PACS for the management of digital images.

SUMMARY

A peripheral device for attachment with a medical imaging device provides for the encryption and conversion of a medical image into a secure and standardized image file format as well as the communication of the encrypted and/or converted image to a secure server on a remote network.

According to one aspect, a system for communicating images, comprises an imaging device configured to capture and image and generate a digital image file, the imaging device comprising a device identifier; a set of routines configured to label the digital image file, associated account information with the digital image file, associate the device identifier with the digital image file, and communicate the digital image file to a server; a server configured to receive digital image files and process the digital image file according to at least one of a label associated with the digital image file, account information associated with the digital image file, and a device identifier associated with a device that captured the digital image file.

According to another aspect, an imaging device, comprises a modality configured to capture and image and generate a digital image file; a device identifier; a shared key; and a set of routines configured to label the digital image file, associated account information with the digital image file, associate the device identifier with the digital image file, encrypt the digital image file using the shared key, and communicate the digital image file to a server; wherein the label, account information and device identifier instruct the server as to how to process the digital image file.

These and other features, aspects, and embodiments are described below in the section entitled “Detailed Description.”

BRIEF DESCRIPTION OF THE DRAWINGS

Features, aspects, and embodiments are described in conjunction with the attached drawings, in which:

FIG. 1 is a diagram illustrating an example system for the automatic conversion and distribution of medical images to any of a plurality of output modalities in accordance with one embodiment;

FIG. 2 is a high level block diagram illustrating certain components of an example data conversion and delivery system that can be included in the system of FIG. 1 in accordance with one embodiment;

FIG. 3 is a flow chart illustrating an example automated message creation process performed by the data conversion and delivery system of FIG. 2 in accordance with one embodiment;

FIG. 4 is a flow chart illustrating example type of information and data that can be examined in the process of FIG. 3 in accordance with one embodiment;

FIG. 5 is a flow chart illustrating an example process for the use of information embedded inside of the metadata included with incoming files by the data conversion and delivery system of FIG. 2 in accordance with one embodiment;

FIG. 6 is a flow chart that illustrates the operation of an image converter module that can be included in the data conversion and delivery system of FIG. 2 ;

FIG. 7 is a flow chart illustrating a typical use of a Web GUI that can be included in the data conversion and delivery system of FIG. 2 and its streamlined interface for finding an image by the originating modality without any identifiable patient information in accordance with one embodiment;

FIG. 8 is a flow chart illustrating a variation of the typical use of the Web GUI and its streamlined interface for finding an image by using a piece of identifiable patient data in accordance with one embodiment;

FIG. 9 is a diagram illustrating an example system for the automatic conversion and distribution of medical images to any of a plurality of output modalities in accordance with another embodiment; and

FIG. 10 is an illustration of a peripheral device connected with a medical imaging device and a remote server for converting and encrypting medical image files from the medical imaging device, according to one embodiment of the invention.

FIG. 11 is an illustration of a network device connected with a medical imaging device and a remote server for converting and encrypting medical image files from the medical imaging device, according to one embodiment of the invention; and

FIG. 12 is a flowchart diagram of the signal flow through the network.

FIG. 13 is an illustration of a system for converting and encrypting a medical image with an encryption and conversion unit, a medical imaging device and a remote server, according to one embodiment of the invention;

FIGS. 14 and 15 illustrate traditional workflows for medical image sharing in a primary care and emergency room setting;

FIG. 16 is a flow chart of one embodiment of a system for real-time remote interactive collaboration for medical diagnoses;

FIG. 17 illustrates a user interfaces which users of the real-time remote interaction system will view;

FIG. 18 illustrates a user interfaces which users of the real-time remote interaction system will view;

FIG. 19 illustrates a user interfaces which users of the real-time remote interaction system will view;

FIG. 20 illustrates a user interfaces which users of the real-time remote interaction system will view;

FIG. 21 illustrates a user interfaces which users of the real-time remote interaction system will view;

FIG. 22 illustrates a user interfaces which users of the real-time remote interaction system will view;

FIG. 23 illustrates a user interfaces which users of the real-time remote interaction system will view;

FIG. 24 illustrates a user interfaces which users of the real-time remote interaction system will view;

FIG. 25 illustrates a user interfaces which users of the real-time remote interaction system will view;

FIG. 26 is an illustration of a mobile device connected with a medical imaging device and a remote server for converting and encrypting medical image files from the medical imaging device, according to one embodiment of the invention;

FIGS. 27 and 28 illustrate example processes that can be run on a device or computer system for communicating images to a server using IP networking; and

FIG. 29 is a diagram illustrating an example system that includes the routines of FIGS. 27 and 28 .

DETAILED DESCRIPTION

FIG. 1 is a diagram illustrating an example system 100 for the automatic conversion and distribution of medical images to any of a plurality of output modalities. The term output modality is used to refer to various types of devices, systems, and services, several examples of which are provided below. As can be seen, system 100 can comprise a plurality of source medical imaging modalities 10, such as Ultrasound, MM, CT and PET equipment, a local PACS 20 (typically source image archive-servers), or any other device capable of sending medical data such as DICOM data, commonly medical images. Modalities 10 and PACS 20 can be connected, e.g., with a Central Computer System (CC S) 30 via the Internet 60 through a router 50 usually provided with encryption and firewall protection.

Central Computer System (CCS) 30 can include a data conversion and delivery system (DCDS) 32 for processing the medical data. The CCS can comprise one or more servers, and include one or more a processors or CPUs, memory associated with the processor(s), a data storage module, a display means, and an input/output interface means. It should be appreciated that various other peripheral devices and modules can be connected to the CCS, such as other servers, other data storage modules, or intrusion detection systems. The CCS can also be a cluster of interoperating servers, each taking care of a specific task within the system. Similarly, all the modules shown in FIG. 2 , and described below can each be a separate server in such a cluster, so as to distribute the load and increase the capacity of the system.

DCDS 32 can be configured to convert medical images associated with the medical data into, e.g., consumer-friendly images, video, or both. DCDS 32 can then in turn send these converted images to a number of destinations, or output modalities 40 as directed by the user/operator of DCDS 32 or as dictated by information included in the medical data. These destinations 40 can be, for example, a web site such as a social networking site including, e.g., Twitter, Facebook, and Google Health; cellular phones; PDAs; Email accounts; or any computer system capable of accepting data via protocols such as, e.g., SOAP and REST. DCDS 32 functions in such a way that it allows source modalities (10, 20) to be protected by the most rigorous of firewall settings 50, while still allowing transfers to take place over the internet 60. The original source image data may optionally be sent to the destinations 40 without any processing or conversion.

For example, when a patient undergoes an ultrasound examination during pregnancy, the ultrasound images can be sent to DCDS 32 for conversion into a set of images that can be sent the parent's social networking web page, their mobile device, their friends and families devices or web pages, etc. More specifically, a nice sequence of the fetus waving its arm can be captured and stored during the ultrasound examination by the operator. The ultrasound operator, usually a nurse or technician, sends the stored, e.g., DICOM file to DCDS 32. The nurse, technician or any trusted employee at the patient's facility (user) can use a remote graphical user interface (GUI) interfaced with DCDS 32 to bring up the desired sequence sent by the source modality 10. The user can then enter the cellular phone numbers, web account information, email addresses, etc., as well as any personal message that the patient indicates, and then start the delivery process. The, e.g., DICOM file, now converted into a cellular phone compatible video format, e.g., 3gpp, can then be sent as a multimedia message to the mobile phones, and files converted to other appropriate formats can also be sent to the given email and web accounts.

Alternatively, the nurse or technician at the patient's facility can enter the patient's cellular phone number in the patient information field on the ultrasound machine. On receiving the, e.g., DICOM data file, DCDS 32 can be configured to then locate that number embedded in the DICOM data file, and automatically forward the converted image or video file after processing to the desired locations as specified by the patient. Examples of these processes are described in detail below.

FIG. 2 is a high level block diagram illustrating certain components of an example DCDS 32 in accordance with one embodiment. It will be understood that the diagram of FIG. 2 is for purposes of explanation and illustration and is not intended to restrict the embodiments described herein to any particular architecture or design. Nor is FIG. 2 intended to provide a detail view of all components of an example DCDS 32. In operation, a request from a modality 10 can be handled by an input stage, consisting of a Receiver 203 and Storage & Parser 204. The Receiver 203 can be configured to authenticate the connection from the source modality 10, and to handle the network transactions necessary to complete the request.

Storage & Parser 204 can be configured to parse the received data and to store any image data 205 and all metadata 206 in storage system 214. For example, the image data 205 can be stored as binary data, while the metadata can be stored as structured data allowing typical structured access to the data, such as, searches and associations between different items. Storage & Parser 204 can be configured in certain implementations or under certain conditions to strip all sensitive patient information from the incoming data file. For example, an operator of the system can use a Graphical User Interface (GUI), such as a Web GUI 208 to selectively set the parts of metadata that are considered to be sensitive. Alternatively, the system can be programmed to automatically determine which fields in the meta data are sensitive. This process is called anonymization, and it is performed in order to protect the patient's privacy. Anonymization is discussed in more detail below.

In certain embodiments, an event signal can be triggered indicating that the newly stored data has been added. When Event System module 209 receives an event signal from the parser 204, it can be configured to determine what action, if any, should be taken as a result. For example, if rules for automatic delivery have been set, and the appropriate metadata values are found in the newly received data stored in structured database 206, then Event System module 209 can be configured to signal the Output Module 213 to send the converted data as instructed by the automatic delivery rules. This process is also described in more detail below.

Output Module 213 can be configured to accept calls from other parts of DCDS 32 containing general data, information to send, and number of delivery destinations, including email addresses. For example, the data can include a text message, a reference to a, e.g., DICOM image, two cellular phone numbers, and one email address. The Output Module 213 can be configured to assemble the appropriate formatted output “packages”, or messages, and send the resulting messages using a modular plug-in-based architecture. A plug-in (not shown) for each corresponding type of destination can be included and used by Output Module 213.

In the example provided above, when a service call is received by DCDS 32, Output Module 213 can assemble one MMS message packet containing a jpeg version of an image and message text, all combined and encoded according to the MMS specifications. This message can then be sent twice, first to each phone number destinations requested, and secondly, to each email address destinations specified.

Output Module 213 can request a converted image from Image Converter 211, identifying the original image and specifying the requested format and dimensions. Image Converter 211 can be configured to then look for an existing image in the Converted Image Cache 212 that matches the request. If no match is found, it can generate an image from the original image data 205. The Image Converter 211 can be configured to use the metadata 206 of the original image stored in database to determine if the requested format is appropriate. If not, it can respond with an error. For example, requesting an mp3 audio version of a still image would result in an error, while requesting a jpeg still image of a multi-frame DICOM image file (effectively video) would be proper.

Image Converter 211 can be configured to respond to an event from Parser 204 and perform common conversions preemptively. This will improve the responsiveness of the system components, in particular, the Output Module 213 and the Web GUI 208; however, the trade-off is an increase in storage required, and also a slight decrease in the overall security level.

A Web GUI 208 provides, e.g., medical staff with remote access to DCDS 32 via a secured web browser connection (https) 202. Such a Web GUI 208 can provide an interface to perform administrative tasks such as setting up rules for Event System module 209, as well as an optimized interface for identifying images and sending output messages. The typical operations of these interfaces are described in detail below.

Web GUI 208 can operate on the structured metadata 206 to find and identify images. It can be configured to request conversions from Image Converter 211 to, e.g., display thumbnails and previews of images, and to provide service request forms where output messages can be specified and send on to Output Module 213 for delivery.

An adaptable Garbage Collector 207 can continually evaluate the state of all data and compare that to configurations made by an administrator of the system. The configuration can set certain criteria that items need to meet in order to remain in the system or be deleted from the system. One basic criterion can be the age of an item. For example, if an item has been stored over a week ago or certain number of days ago could be automatically deleted. Other automatic deletion criteria can be the number of times an item has been previously sent, system state information stored, and the value of any metadata. This feature is in part useful for keeping the resource usage down, and also to aid patient confidentiality by removing patent data that the system is no longer needed to maintain.

It should be noted that in some embodiments the images are to be used for clinical or diagnostic purposes. In such instances, it is often required that the image that is ultimately displayed on the device used for viewing the images maintain a certain resolution or image quality. As such, in certain embodiments, one or more of Parser 204, Event System module 209, and Image Converter 211 can be configured, either alone or in combination, to recognize that the image is being viewed in a diagnostic or clinical application. Such recognition can be based on information included in the meta data, information stored in Image System 214, or information provided via GUI 208.

For example, the address or device identified in the meta data for receiving the image can be recognizable as an address or device associated with a clinical or diagnostic application, the image or series identifier can also be associated with a clinical or diagnostic application, etc. Alternatively, an operator can indicate through GUI 208 that images to be sent are intended for clinical or diagnostic purposes.

When it is determined that the images are to be used for clinical or diagnostic purposes, then Image Converter 211 can be configured to determine, e.g., based on information stored in storage system 214, the required resolution or image quality. For example, resolution, image quality, or both for various types of images, clinical applications, etc., can be stored in storage system 214. Image converter can then determine the correct image resolution and quality and covert the image in accordance therewith. In certain embodiments, DCDS 32 can be configured to determine whether the identified output device or address is capable of displaying the converted image with the requisite image resolution and quality before sending the image. If the device or address is not capable, then DCDS can generate an error message or other notification indicating such. The error message can be displayed through GUI 208, on the device, or both.

As noted above, DCDS 32 can be configured to take an incoming medical image file and automatically convert it for distribution to and viewing by any of a plurality of output modalities. FIG. 3 is a flow chart illustrating one example embodiment for an automated message creation operation performed by DCDS 32 in accordance with one embodiment. In the example of FIG. 3 , it is assumed that destination information, e.g., output modality information is included in a medical image file received by DCDS 32. In other embodiments, a user can access DCDS 32, e.g., through GUI 208 and specify which files should be sent to which output modalities; however, a powerful aspect of DCDS 32, as configured in accordance with the systems and methods described herein, is its ability to automatically determine the destinations and to convert and format the data appropriately as described below.

In step 320, a file is received and the headers associated therewith are examined to determine various information. The medical image file received by input 203 will often include metadata that provides information related to the medical data or images included therewith. For example, in a DICOM file, the medical image file will include a header that comprises a plurality of fields. These fields are generally the same for each input modality 10. Thus, DCDS 32 can be configured to examine the header fields to determine various information as described in detail below and with respect to FIG. 4 .

In step 322, an output destination type, or modality can be determined. For example, the header can include information identifying recipients of the images included in the image file. Or more specifically, the header can include information identifying output modalities associated with various recipients or services, e.g., such as an online photo album page, site, or service; a social networking page or service, a mobile device, etc. Basic types of destinations can include a mobile device, such as a cellphone; an email account; a Web-Application Specific Interface (API), e.g., associated with an online site or service, etc. Thus, DCDS 32 can be configured to examine the header file and determine associated output devices or services, i.e., modalities.

Whenever possible, DCDS 32 can be configured to then retrieve specific characteristics of each destination type as indicated in step 324. These characteristics can include capabilities and physical characteristics of the destination device and specifications and limitations of the network class and message type. This information is then used to determine the output formatting and other specifications needed for each output modality. For example, this information can be used for adaptations of the image data based on specifications for the type of message being sent, e.g., e-mail has limitations in specification and common practice that can be adapted for; and MMS has very different limitations that can be adapt for.

The capabilities and characteristics determined in step 324 can include frame size, i.e., pixel dimensions of an image or video, e.g., 640 by 480 and the like; data rate or data size, e.g., MMS messages can commonly not exceed 300 KB total size, e-mail attachments exceeding 10 MB are often not accepted, etc.; supported encoding format, e.g. mpeg 4, jpeg, etc.; and message layout rules, i.e., how a message can be composed for the destination, e.g. MMS is made of “pages”, each able to display a single image or video and a single text along with playing audio while e-mail is capable of HTML layouts and can hold attachments of any file type, etc.

In step 326, a basic compatibility check can be performed to determine whether the data included in the image file can be delivered in a format compatible with the output modality. For example, if the image data includes video data, then a determination can be made as to whether the output modality is capable of receiving and displaying video data.

The most suitable delivery format is then chosen in step 328 to ensure the output message that is ultimately generated includes the best quality data that the output modality can handle. This can be important for example in clinical settings or settings where the data is being used for examination or diagnostic purposes. Resolution information suitable for diagnostic purposes and the ability of DCDS 32 to provide such resolution is discussed in detail below.

Then, in step 330 the data can be extracted and converted as required. For example, MMS messages allow only a very limited total message size. Therefore images or video in particular often need to be adapted and optimized to let the final message meet the format and specification requirements of a particular output modality. In contrast, e-mail messages often have no strict limit on size and therefore can accept larger files, e.g., higher resolution images or video. But even e-mail accounts can include rules limiting extremely large files and therefore even e-mail messages can require optimization of, e.g., video files to ensure sufficient quality but also to comply with size limitations.

If the incoming file is already encoded in a format compatible with the output modality, then often no conversion will occur in step 330 in order to preserve the highest possible image quality.

In step 332, the data can be anonymized as required by any applicable anonymization rules. For example, the data can be extracted and copied into a generic format so that certain data can be removed, redacted, etc. The data can then be converted to the final output format. Steps 330 and 332 can be performed in parallel or reverse order as required by a particular implementation.

In step 334, the converted data can then be assembled into an output message in accordance with the applicable formats and specifications determined in the preceding steps. Optionally, other data can be included with the message. This information can be manually entered, e.g., via GUI 208 or it can be extracted from the metadata accompanying the received file. Still further, the data can be data retrieved from configuration settings based on the set of characteristics described above.

In certain embodiments, the data components that are to comprise an output message are assembled according to template rules for the type of message being created. For example, the various template rules can be stored in Storage System 214 and accessed by Output Module 213 in order to assemble the output message. For example, MMS messages are based on a page metaphor where each page can contain an image or video, a text element, and an audio element. Thus, sending two or more images, or including text, audio, or both with the image(s) will then require the message to be assembled into several pages. By contrast, e-mail messages can include any number of images, attachments, etc., depending on, e.g., the message size restrictions.

Output Module 213 can then be configured to elect the appropriate output gateway for transmission of the assembled output message in step 336. For example, Output Module 213 can be configured to send an e-mail message to a SMTP server (not shown) and to send an MMS message to a MMS gateway (not shown).

FIG. 4 is a flow chart illustrating example type of information and data that can be examined in step 320. As can be seen in FIG. 4 , when the file comes in, the metadata or more specifically the header can be examined to identify the input modality in step 420. In step 422, the compatibility of the modality determined in step 420 with the system can be determined. If compatible, then in step 424, specific characteristics of the data included in the image file can be determined. For example, whether or not the file actually includes any image or video data or whether the data is simply report or measurement can be determined in step 424. When an incoming file does include, e.g., report or measurement data, then such information can be extracted and stored in, e.g., a generic structured format in step 426. In step 428, any image data can then be extracted and stored as well and various characteristics can be determined such as binary encoding format, frame size, color bit depth, still image or video, etc.

FIG. 5 is a flow chart illustrating an example process for the use of information embedded inside of the metadata including with incoming files by DCDS 32 in accordance with one embodiment. The metadata, e.g., header fields can be used to ensure safe and secure delivery of the image data included therewith. For example, a DICOM image file can include a plurality of header fields that are key-value pairs in a number of datatypes, such as strings, numbers, dates, special measurement types, etc. Fields can be embedded in the and can be hard linked to the file for which the provide metadata. In this way, there is no way to mix-up header files and the associated data, since they are not separated.

In step 520, DCDS 32 can be configured to automatically track and record header fields for each network device sending images. In this way, DCDS 32 can identify the specific device associated with an incoming file. DCDS 32 can do this by recording which header fields are present for a particular modality 10 in step 522 and to then record the data included in device-dependent header fields for the associated modality in step 524. A particular device should always report the same values for, e.g., manufacturer, model name, model number, etc. Thus, DCDS 32 can use this information to identify a particular device.

In step 526, DCDS can detect any changes in the data and then take appropriate action. For example, changes to header field data that should not be changed, e.g., manufacturer information, can be an indication that the file has been tampered with or someone is trying to hack into the system. In response to detection of such changes, the system can log the event, notify an operator, place the incoming data in an approval queue, quarantine the data or any further data from the associated device, reject the data, rejecting the all future data from the device, to name just a few possible actions.

In step 528, DCDS can be configured to search the header fields for data that can identify an intended recipient as noted above. Identification can be in the form of an actual, e.g., e-mail address, mobile station International Subscriber Directory Number (ISDN), web site address, etc. In fact, such direct identification can be preferable as it takes advantage of the existence of the header fields. Identification can also be indirect such as an ID that can be used to look up a direct address, e.g., in a registry stored in storage system 214. It should also be noted that each field can include more than one piece of data and data of different types. Accordingly, any identifying or address fields can include telephone numbers as well as e-mail address, etc. Further, identifying data can be included in more than one field.

The DCDS 32 can be configured to then determine an action to take in step 528 based on any identifying data detected in step 530. Such actions can include sending an appropriate message to any addresses found, formatting messages appropriately as described above, notifying an operator, adding a message to a queue, e.g., for manual approval, locating and adding other data or information to an outgoing message, to name just a few.

Accordingly, FIG. 6 is a flow chart that illustrates the operation of DCDS 32 in more detail. Referring to FIG. 6 , a Conversion Request 301 can be received containing, at a minimum, an internal identifier for the image, and a destination format. As noted above, the conversion request can be the result of information and data included in the metadata associated with an incoming file. As noted below, however, the request can also result from input received through GUI 208. Optionally, the request could contain new image dimensions to be scaled as output image to be sent. The Image Converter 211 can be configured to then determine the existence of the requested image 304 by trying to locate the metadata associated with it in metadata database 303. If no record exists for the requested image, the converter can optionally return a placeholder image (305, 308) or abort the conversion attempt 306. A placeholder is typically an image, video or similar media communicating that the requested image is unavailable. At this point, the converter also can also be configured to determine if the requested output format is feasible or not.

If a metadata record in database 303 does exist, then the converter can be configured to load the, e.g., DICOM image 307 from image storage 302 into a raw binary format. The Converter 211 can be configured to then determine if the image data should be resized to the dimensions provided in the request or to the dimensions required by the requested output format. For example a jpeg preview for the Web GUI 208 could be rendered in any dimensions that are suitable to the layout of the html document, while video for MMS messages have very specific dimensions to comply with the specification.

Next, the image data can be converted 311 to the requested destination format. The results can be saved to an image cache 312 and metadata records can be updated 313 to indicate the existence of the converted image. Finally, the converted images can be returned as a response to the request. Converter 211 can then return either the converted binary data directly or return a reference to its location in the image cache 313.

As noted, DCDS 32 can also be operated and interfaced with through the Web GUI 208. GUI 208 can enable both remote and local access the DCDS 32 and allows for images to be located within storage system 208. The images may need to be located or analysis or diagnosis or for sending to a specified destination or address.

Two primary ways for accessing files can be provided. The first way involves finding files without any identifying information. This is explained in detail with respect to FIG. 7 ; however, it should first be noted that each device sending files to DCDS 32 can be identified by recording and mapping header fields of incoming file transfers. The devices can also be at least partially identified based on their network address, AE titles used for the transfer, or both. Each device can then be given a name that is unique and preferable meaningful to operators. Files as well as their series, study, or both, can then be identified by the device they originated from, the time and date of the image capture, and header fields identifying the operator of the device used to capture the images.

Since no patient information is needed, DCDS 32 can handle anonymized data and no patient information can be gathered by the misuse of the system. Further, the most used images can be stored as the most recent images in the system. Thus, finding images can be made very efficient in this manner. Once the file, series, study, etc., had been found, GUI 208 can offer the operator direct access to features for viewing the images, sending the images, etc.

With this in mind, FIG. 7 is a flow chart illustrating a typical use of the Web GUI 208 and its streamlined interface for finding an image by the originating modality without any identifiable patient information (401-404) in accordance with one embodiment. When an image has been identified (405,) the interface displays a service request form where the user enters output destination information and other message details. If the data validates (407,) the required conversions are requested (408) from the Image Converter (211.) For all successful requests, the data is assembled by the appropriate output plug-ins (409-411,) and the results are sent (412-414) to the appropriate destinations. Status information for each individual output is gathered (415,) and returned (416 or 417) to the form view (405) for display. At this point, the user can choose to repeat the send process or return to finding another image.

The Web GUI 208 allows for sending groups of images that belong to the same, e.g., DICOM Series. The operating steps are similar to those illustrated by FIGS. 7 and 8 . The Web GUI 208 also present interfaces for configuring the Event System 209, organizing and storing output destination addresses and other administrative tasks necessary. It is important to note that, as a security measure, the Web GUI 208 does not handle any authorization of source modalities allowed to store images or access privileges to those images. These important settings are only available through a separate method of access either locally or remotely. With the DCDS running on a Unix-style operating system, remote access would typically be via the Secure Shell (SSH) protocol. If the DCDS is running on a Windows operating system, remote access would typically be via Terminal Services. Both protocols are examples of secured remote access to the operating system.

The second way to access files is to use identifying information. For example, operators can search for files using patient information such as name, birth date, patient ID, etc. The operator can, for example, input a search term and if there is a match, the system can present all available studies. If multiple patients are returned, then they can be presented for selection. Once the patient is selected, and the associated file, series, study, etc., had been found, GUI 208 can offer the operator direct access to features for viewing the images, sending the images, etc.

FIG. 8 is a flow chart illustrating a variation of the typical use of the Web GUI 208 and its streamlined interface for finding an image by using a piece of identifiable patient data (501-504,) such as, patient name, and birth-date, etc. Alternatively, any unrelated identifying password or PIN code can be utilized to avoid using real patient information to ensure patient privacy. After that, the processing steps as described above related to FIG. 7 can be followed.

In certain embodiments, CCS 30 can be interfaced with a server 902 that can be configured to host and support various value added services for, e.g., patients and family in relation to the images being captured by modalities 10 as illustrated in FIG. 9 . For example, if the images are fetal ultrasound images, the server 902 can be configured to provide a variety of services for the parents, family, friends, etc. For example, the DCDS 32 can be configured to convert the images to a proper format or formats supported by server 902 and the related services. The images can be sent to server 902 and stored in storage system 904.

It will be understood that server 902 can actually comprise a plurality of servers, computers, routers, etc., as well as the appropriate software and firmware required to carry out the functions described herein. Further, storage system 904 can comprise one or more databases, one or more storage servers, as well as other physical storage mediums as required.

Server 902 can then be configured for example, to host a web site on which users can create accounts. The users can then access the images on the site and purchase images, pregnancy calendars, customized mugs, key chains, T-shirts, canvases, etc. Further, the site can be configure to present pictures, illustrations, information on fetus and child development, health and nutrition tips, etc. Such a site can enable such services as a registry, e.g., for a baby shower; automatic updates to friends and family; digital and viral gifts, such as baby images with digital lullabies; invites and thank you cards; etc.

A user can be charged a fee for setting up an account, e.g., a subscription fee, either one time or periodic, the user and family and friends can also be charged for the various products and services, or both.

In addition, kiosks 908 can be set up, e.g., in maternity wards that can provide at least some of the same services. Kiosk 908 can either be stand alone, i.e., interfaced directly with CCS 30, or can be interfaced with server 902 as illustrated. Thus, family and friends can order pictures and other goods, e.g., right in the waiting room.

Further, the user can continue to use the account even after the birth of the child. For example, the site can track the child throughout its child hood, or at least through the first few months or years. The site can be configured to send birthday reminders and announcements to friends and family or to inform of other special events, developmental milestones, etc. Moreover, the site can be configured to continue to present developmental information as well as health and nutrition tips for both mother and child.

In fact, it can be preferable to have the parent upload contact information for friends and family. In this manner, server 902 can be configured to continue to send birthday reminders to friends and family. In certain embodiments, the site hosted by server 902 can be affiliated with or host a “gift store” offering various products and services. Alternatively, or in addition, the site can offer discounts, coupons, etc., to various other business and stores. Since server 902 will have pertinent demographic information related to the child, e.g., residence information, sex, age, race, and possibly even parents age, profession, and other affiliations, the site can send reminders, gift recommendations, discount offers, etc., that are appropriate for the child and the family, popular with similar demographics, etc.

In this regard, it can be preferable to offer the user the opportunity to provide such demographic information. Thus, in one embodiment, the user can access the site and customize or provide profile information, contacts, preferences, etc. Algorithms running on server 902 can be configured to then use the information available to make product recommendations, etc. In fact, since server 902 will have information for individuals all over the world, the algorithms can be configured to use information for populations that share similar demographics, income levels, preferences, etc., to make recommendations.

In certain embodiments, a user can purchase items through the site, i.e., through server 902. For example, server 902 can be configured to accept credit card payment, a PayPal account, or for mobile billing. Thus, server 902 can be configured to process the transaction and either deduct an appropriate fee or charge a related business, affiliate, partner, etc., a transaction fee. Moreover, purchase information can also be fed into the algorithms and used to make future recommendations. In fact, the purchases of an entire related population can be used to make more targeted and appropriate recommendations.

Thus, as a child grows, the algorithms can be constantly updated and honed in order to make, e.g., gift recommendations. Recommendations that can be automatically sent out to friends and family over the years. As the database grows over time and with more and more users, the algorithms can be honed to provide ever more relevant and targeted recommendations.

It should also be noted that the database will necessarily include vast information about the relationships and connections between a large population. This includes direct links such as friends and family, but also more indirect links such as preferences, similar buying habits, etc. This type of interconnection information can be very valuable for targeted advertising and product recommendations as well as for simply tracking and mapping the interconnectedness of a large population.

It should be pointed out that such a site can be built around other conditions or events, such as a cancer support site, physical therapy support site, etc. It should also be pointed out that the merging of interconnectedness data for these various other conditions and events can extend the power of the information and lead to even better algorithms for targeting information and products and services.

It should also be noted that users can access the site via, e.g., the Internet using computers 914 and mobile devices 912. Further, the site can be interfaced with other social networking sites such as Twitter, Facebook, etc. In certain embodiments, the site can actually be converted to an application, or widget that can be exported to other sites. For example, a grandma can place the application on her Facebook page and receive updates and notices more easily without needing to log onto server 902. This can increase the interaction with the site, which can increase, for example, the amount of information and data available to server 902 as input to the algorithms described above.

While certain embodiments have been described above, it will be understood that the embodiments described are by way of example only. Accordingly, the systems and methods described herein should not be limited based on the described embodiments. Rather, the systems and methods described herein should only be limited in light of the claims that follow when taken in conjunction with the above description and accompanying drawings. Peripheral Encryption and Conversion Device

In one embodiment, a peripheral device may be attached with a medical imaging device for the encryption and conversion of a medical image into a secure and standardized image file format as well as the communication of the encrypted and/or converted image to a secure server on a remote network. As shown in FIG. 10 , the peripheral device 102 may be a dongle or other type of stand alone device which can be physically attached with a medical imaging device 101, and will have its own processor and memory for executing a variety of functions relating to the conversion, encryption and transmission of medical image files from the medical imaging device to a remote server 103 on another network. The peripheral device 102 may be attached with a communication port on the medical imaging device, such as a network port, serial port or other communication interface. The peripheral device may act as a filter to monitor all medical image files generated on the medical imaging device and encrypt and convert selected medical image files for transmission to a remotely connected device on another network, such as a server or a mobile device.

The dongle may be configured with a separate network connection to a local area network (LAN) or wide area network (WAN), or it may be configured to use the network that is already connected with the medical imaging device. If the medical imaging device is not connected to a network or is connected to a network that is not capable of transmitting medical images, the dongle may have network hardware to allow the dongle to communicate over a WiFi or cellular network or even accept a direct Ethernet cable connection to a local network which the medical imaging device is not connected with.

In another embodiment, the encryption dongle 102 may be connected with the imaging device 101 with an insecure connection, in which case the encryption dongle 102 will function to take medical images stored on the medical imaging device 101 and encrypt the images for transmission across a secure network connection to a remote device, such as a remote secure server or a mobile device that is the ultimate destination of the medical image.

One embodiment provides a method and technical system for encrypting and routing DICOM network connections from devices without any such encryption capabilities built-in.

One embodiment of the invention can listen on known ports for unprotected communication and automatically encrypt and route the connection in its encrypted form over the port's encrypted counterpart. E.g. ordinary DICOM connections on TCP port 104 or 11112 can be encrypted in SSL/TLS and routed as DICOM/TLS on TCP port 2762. This would effectively make the connection appear to the remote server as a secure TLS connection and to the client device as an unprotected connection. By attaching the embodiment of the invention to the network port of an imaging device or as a network router on the same protected local network as the device, a high level of security is maintained.

Likewise, ordinary “web” connections over the HTTP protocol on TCP port 80 can be encrypted in SSL/TLS and routed as HTTPS on TCP port 443. This would effectively make the connection appear to the HTTP server as a secure HTTPS connection and to the HTTP client as an unprotected connection. It should be noted here that encrypting HTTP traffic is useful only with older clients and servers which are capable of secure connections. It is, however, a well-known pair of network ports that serve to illustrate a general embodiment of the invention.

Embodiments of the invention include a wireless network connection such as WiFi or cellular modem capabilities to not only encrypt but also to offer access to the Internet without existing network infrastructure near the imaging device. This is highly useful for portable devices that can be used on-the-go running on battery power.

Embodiments of the invention can be pre-configured to only forward protected traffic to a single remote end-point.

Embodiments of the invention may use any and all relevant encryption methods to secure the connection. Examples or these include the aforementioned SSL/TLS standard as well as other common encryption standards. The point being that the invention will mimic the native encryption standard for each type of connection an embodiment supports. Encryption may be encoded and decoded either by dedicated chips (electronic hardware components), software or a combination of software with hardware acceleration. Network Encryption and Conversion Device

A network device for connection with a local network including at least one medical imaging device provides for the encryption and conversion of a medical image from the at least one medical imaging device into a secure and standardized image file format, as well as the communication of the encrypted and/or converted image to a secure server on a remote network. The network device may act as a router or a gateway on the local network to monitor traffic of medical images from the medical imaging devices to destination devices outside of the local network and ensure that the medical data files are encrypted and converted into an appropriate format for delivery to a device on the remote network. Upon detection, the network device will encrypt and convert the selected medical image files for transmission to a remotely connected device on the remote network, such as a server or a mobile device.

One embodiment of the network device is illustrated in FIG. 11 , where the network device 104 acts as an encryption router to receive medical image files from one or more medical imaging devices 101 over a local network which may not be secure. The encryption router 104 will then be configured for encryption and conversion of a medical image into a secure and standardized image file format. The encryption router 104 will then be configured for communication of the encrypted and/or converted image over a secure connection to a secure server 103 on a remote network, such as the Internet.

In one embodiment, the network device 104 will create a private network for the one or more medical imaging devices 101 to communicate. The network device 104 may then transmit an encrypted DICOM image over WiFi, cellular (3G) or cable connection to a remote network. In this configuration, the network device 104 acts as the network gate to ensure that all medical images being transmitted out of the local network are converted and encrypted.

FIG. 12 illustrates a flowchart of the data flow of a medical image file from a local area network (LAN) 301 to a remote device on a remote wide area network (WAN) 307. The network device 104 may include one or more of the components illustrated herein, including an encryption listening port 302 which monitors network traffic in the LAN for the transmission of medical image files which are not encrypted or converted into a proper format. An encryption database 305 may store encryption settings that provide instructions on the type of encryption that a particular medical image file should be encrypted with, perhaps depending on the type of network or the destination device on the remote WAN network 307. The medical image file is processed 303 to encrypt the file, after which a port is mapped 304 for transmission of the file. The encrypted file is then transmitted through a firewall or other local router 306 to a remote WAN network 307.

In one example, a Vscan imaging device captures a medical image that is non-DICOM and not encrypted, but which is selected for transmission from the Vscan to a remote secure server on the remote network. The medical image is then sent to the network device 104, which converts the image to a DICOM image and encrypts the image before sending it to the remote secure server.

The network device may be useful in a local network which is otherwise insecure or unreliable, as it creates a secure connection with the medical imaging devices and with a remotely connected server or device on another network. Additionally, the network device may be useful in highly secure networks with strict firewalls that would otherwise prevent connections to a remote secure server.

In one embodiment, the network device may be configured as a network satellite which is attached with the local network but which acts as a remote secure server to that the one or more medical imaging devices sends the images to the network satellite under the impression that the network satellite is the final destination for the medical image file. The network satellite will then take the medical image and encrypt or convert it (or both) and then send the encrypted and converted image to the actual remote secure server. In this embodiment, the medical imaging device does not need to be instructed to send the medical image file to a new location on the network such as the network device, as it instead transmits the file to what it believes is the final destination of the medical file—the remote secure server on a remote network.

One embodiment provides a method and technical system for encrypting and routing DICOM network connections from devices without any such encryption capabilities built-in.

One embodiment of the invention can listen on known ports for unprotected communication and automatically encrypt and route the connection in its encrypted form over the port's encrypted counterpart. E.g. ordinary DICOM connections on TCP port 104 or 11112 can be encrypted in SSL/TLS and routed as DICOM/TLS on TCP port 2762. This would effectively make the connection appear to the remote server as a secure TLS connection and to the client device as an unprotected connection. By connecting the embodiment of the invention to the network port of an imaging device or as a network router on the same protected local network as the device, a high level of security is maintained.

Likewise, ordinary “web” connections over the HTTP protocol on TCP port 80 can be encrypted in SSL/TLS and routed as HTTPS on TCP port 443. This would effectively make the connection appear to the HTTP server as a secure HTTPS connection and to the HTTP client as an unprotected connection. It should be noted here that encrypting HTTP traffic is useful only with older clients and servers which are capable of secure connections. It is, however, a well-known pair of network ports that serve to illustrate a general embodiment of the invention.

Embodiments of the invention include a wireless network connection such as WiFi or cellular modem capabilities to not only encrypt but also to offer access to the Internet without existing network infrastructure near the imaging device. This is highly useful for portable devices that can be used on-the-go running on battery power.

Embodiments of the invention can be pre-configured to only forward protected traffic to a single remote end-point.

Embodiments of the invention may use any and all relevant encryption methods to secure the connection. Examples or these include the aforementioned SSL/TLS standard as well as other common encryption standards. The point being that the invention will mimic the native encryption standard for each type of connection an embodiment supports. Encryption may be encoded and decoded either by dedicated chips (electronic hardware components), software or a combination of software with hardware acceleration.

Encryption and Conversion Plugin

Systems and methods for encrypting and converting medical image files on a device within a network are provided. An encryption and conversion unit may be incorporated within the hardware and software of a medical imaging device or another network device in order to provide the capability for encrypting a medical image for transmission to a remote network and for converting the medical image to a format that is compatible with a destination device or network. The encryption and conversion unit may also be configured to package and transmit a converted and encrypted image to an appropriate destination, such as a secure server, on a remote network.

The encryption and conversion unit may act as a router or a gateway on the local network to monitor traffic of medical images from the medical imaging devices to destination devices outside of the local network and ensure that the medical data files are encrypted and converted into an appropriate format for delivery to a device on the remote network. Upon detection, the encryption and conversion unit will encrypt and convert the selected medical image files for transmission to a remotely connected device on the remote network, such as a server or a mobile device.

One embodiment of the encryption and conversion unit is illustrated in FIG. 13 , where the encryption and conversion unit 104 acts as an encryption router to receive medical image files from one or more medical imaging devices 101 over a local network which may not be secure. The encryption and conversion unit 104 may be incorporated within each medical imaging device 101 as software, hardware or a combination of software and hardware. In another embodiment, the encryption and conversion unit 104 may be a part of a router, gateway, firewall or other network device which monitors and regulates traffic over a network. Regardless of the type of device in which it is placed, the encryption and conversion unit 104 will then be configured for encryption and conversion of a medical image into a secure and standardized image file format. The encryption and conversion unit 104 will then be configured for communication of the encrypted and/or converted image over a secure connection to a secure server 103 on a remote network, such as the Internet.

FIG. 12 illustrates a flowchart of the data flow of a medical image file from a local area network (LAN) 301 to a remote device on a remote wide area network (WAN) 307. The encryption and conversion unit 104 may include one or more of the components illustrated herein, either as software, hardware or a combination of both. In one embodiment, the encryption and conversion unit 104 includes an encryption listening port 302 which monitors network traffic in the LAN for the transmission of medical image files which are not encrypted or converted into a proper format. An encryption database 305 may store encryption settings that provide instructions on the type of encryption that a particular medical image file should be encrypted with, perhaps depending on the type of network or the destination device on the remote WAN network 307. The medical image file is processed 303 to encrypt the file, after which a port is mapped 304 for transmission of the file. The encrypted file is then transmitted through a firewall or other local router 306 to a remote WAN network 307.

In one example, a Vscan imaging device captures a medical image that is non-DICOM and not encrypted, but which is selected for transmission from the Vscan to a remote secure server on the remote network. The encryption and conversion unit 104 is embedded as software running on the Vscan device, and therefore converts the image to a DICOM image and encrypts the image before sending it out of the Vscan device to the remote secure server.

The encryption and conversion unit may be useful in a local network which is otherwise insecure or unreliable, as it creates a secure connection with the medical imaging devices and with a remotely connected server or device on another network. Additionally, the network device may be useful in highly secure networks with strict firewalls that would otherwise prevent connections to a remote secure server.

One embodiment provides a method and technical system for encrypting and routing DICOM network connections from devices without any such encryption capabilities built-in.

One embodiment of the invention can listen on known ports for unprotected communication and automatically encrypt and route the connection in its encrypted form over the port's encrypted counterpart. E.g. ordinary DICOM connections on TCP port 104 or 11112 can be encrypted in SSL/ TLS and routed as DICOM/TLS on TCP port 2762. This would effectively make the connection appear to the remote server as a secure TLS connection and to the client device as an unprotected connection. By having the embodiment of the invention communicate with the network port of an imaging device or with a network router on the same protected local network as the device, a high level of security is maintained.

Likewise, ordinary “web” connections over the HTTP protocol on TCP port 80 can be encrypted in SSL/TLS and routed as HTTPS on TCP port 443. This would effectively make the connection appear to the HTTP server as a secure HTTPS connection and to the HTTP client as an unprotected connection. It should be noted here that encrypting HTTP traffic is useful only with older clients and servers which are capable of secure connections. It is, however, a well-known pair of network ports that serve to illustrate a general embodiment of the invention.

Embodiments of the invention include a wireless network connection such as WiFi or cellular modem capabilities to not only encrypt but also to offer access to the Internet without existing network infrastructure near the imaging device. This is highly useful for portable devices that can be used on-the-go running on battery power.

Embodiments of the invention can be pre-configured to only forward protected traffic to a single remote end-point. Embodiments of the invention may use any and all relevant encryption methods to secure the connection. Examples or these include the aforementioned SSL/TLS standard as well as other common encryption standards. The point being that the invention will mimic the native encryption standard for each type of connection an embodiment supports. Encryption may be encoded and decoded either by dedicated chips (electronic hardware components), software or a combination of software with hardware acceleration.

Mobile Device Implementation of the Encryption and Conversion Unit

In certain embodiments, the encryption and conversion functionality described above, e.g., with respect to FIGS. 10-13 , can be implemented on a mobile device such as a smartphone, tablet or other mobile device. The is illustrated in FIG. 26 , wherein the encryption and conversion unit 105 of, e.g., FIG. 13 is replaced by a mobile device 107 on which software 109 has been installed that allows the mobile device to perform the encryption and conversion functions, as well as the routing functions, described above.

In many embodiments, the encryption and conversion functionality can be integrated with the mobile device 107 by downloading an application 111 to device 107. The application 111 will then include, or will allow the user to download the software 109 need to perform the required functions. The software 109 can thus be compiled for the processor architecture of the device 107.

Software 109 can then act as a router or tcp proxy through which the data sent from devices 101, e.g., a portable ultrasound machine travels. From the ultrasound machine's point of view it will seem as if it is communicating directly with a dicom server on the device 107, but it will actually be communicating directly with hosted server 103 through the encrypted tunnel or secure connection provided by device 107.

The port used by device 107 will often be 104 but there is also the alternate port 11112, which is used whenever there is a need to stay above port 1024, which is rarely the case.

In certain embodiments, the software can require payment for either one time uses or a subscription. Thus, the system can be configured such that certificates a can be provided, e.g., by server 103 to software 111. Typically the certificates would be set to expire, thus application 109 can enable a process where the customer pays for a reissuing, e.g., extending the period during which the certificate is valid. This could be simply called “the subscription”. The auto expiration may be quite useful in this scenario. Thus, application 109 can include an ability to fetch the new certificate and installing it, e.g., automatically.

Application 109 can include payment capability that can allow the user to pay, using a credit card, mobile wallet, or other account, for a subscription or one time use, e.g., an extended or new period during which the software would have valid certificates.

In certain other embodiments, a more advanced user interface can be included in application 109 that allows the user to actually interact, monitor, troubleshoot, or all of the above, the functionality of software 111. This can include the ability to verify connectivity, the existence of the secure connection, upload and download speeds, etc.

In certain embodiments, mobile device 107 and the imaging devices 101 can communicate via wireless communication links, such as NFC, BlueTooth' , or WiFi. Thus, a communications dongle, not shown, can be interfaced with the devices 101 to enable such wireless communication, or such capability can be included in the device 101.

The mobile device 107 can in turn communicate with, e.g., server 103 over, e.g., 3G/4G WAN systems. In other embodiments, however, device 107 is also able to use, e.g., a WiFi connection to communicate with, e.g., server 103.. This means that, for example, a tablet without 3G/4G capabilities can still act as an encryption device by connecting it, over WiFi, to a local network (reachable by any modalities 101 that will be using it).

If for example, devices 101 are using Wi-Fi, then device 107, and device 107 is using a wireless Wan to communicate with server 103,tehn device 107 can act as a Wi-Fi base station and router to which the, e.g., ultrasound machine 101 connects. The IP address to which the ultrasound machine connects is that of the device 107, which is the same as whatever router IP address the ultrasound machine gets when it configures itself via DHCP.

Integrating Image Management

Systems and methods for integrating a variety of communication protocols and file types relating to medical imaging are provided. The system integrates a current interface with third party software by adding software and intelligence to the current interface to provide for communication with third party image management software.

In one embodiment of the integration software, a medical imaging user interface such as a GE Viewpoint interface generates a plurality of medical images in a portable document format (PDF). The systems and methods described herein will then convert the PDF documents into DICOM formatted image documents, which may then be sent to a specific destination and then converted back into a PDF for viewing on an appropriate electronic device, such as a personal computer, portable electronic device, etc.

In another embodiment, an HL7 protocol device is used for medical software communication, and it includes a packet on the destination of a particular document. For example, an image created by an HL7 device needs to be sent to a doctor or patient. The integration software obtains information on the image, combines it with the command information on the destination for the image, and then adds it to a DICOM message.

The integration software works by obtaining information needed from the third party software system and determining information needed to convert, encrypt and send the images to the appropriate destination.

Real-Time Remote Interaction

The systems and methods described herein provide for live, or real-time, remote diagnosis of a medical problem of a patient using one or more medical images of the patient taken with a medical imaging device, such as an MRI. The system may be embodied as a network with a plurality of computing and display devices which displays a graphical user interface (GUI) to each user so the users can all view the same medical images in real-time. The users are also provided with options to annotate the images in real-time, chat about the images through an instant messaging program and even talk using a voice-over-internet-protocol (VOIP) or a traditional landline conferencing system. The system provides a plurality of menus for a user to organize images, select diagnoses and other actions, and otherwise collaborate with a plurality of users in real-time to make a medical diagnosis based on one or more medical images.

FIG. 16 illustrates an overall workflow for the real-time remote interaction, where a user is first presented with a dashboard, or home screen, showing various options for collaborating to make a diagnosis. The dashboard is further illustrated in FIG. 18 . Medical images from a Vscan device may be shown to the user, and an Exam Screen process may then be undertaken. During the exam screening, the images may be sent to a patient, an examination may be sent to the patient, and the resulting information may be sent for diagnosis. A live, or real-time, diagnosis may then be made. In a true emergency situation, the flowchart illustrates that these steps may be skipped in order to make an emergency diagnosis without collaborating with remote users.

FIG. 17 illustrates an overall GUI which the user is presented with when viewing a display of a computing device on a network. A main menu, a main content area and a navigation and information section may all be provided.

FIG. 18 illustrates a “dashboard” GUI, which will list the medical imaging devices that are connected to the overall network or with the user's actual computing device (such as the medical imaging devices on the user's local network at a hospital or medical facility). The dashboard will also list the images that have been captured by those devices, and may arrange them in order of capture, by patient, by doctor, etc. If new images arrive, they may be moved to the top of the list and highlighted so the user can easily find them. In one embodiment, when a new image or images is captured by a particular device, an alert will go out to the appropriate physician or health care provider handling that patient's case—such as an SMS or e-mail message. The dashboard may also provide a search feature where the user can search through the images and a database of information related to the images and the patients.

FIG. 19 shows further detail of the main menu GUI, which provides: options to select DICOM images (where the main image workflows are found); and Inbox where the user will receive messages from the system or other users; a Recipients icon of patients or other users and contacts that can be easily found and contacted for sending images and messages; a Settings icon to handle setup of imaging devices, anonymization or automation of patient messages and labels to categorize studies; a Statistics icon to show traffic through the overall application over time; an Administration icon to show where administrators manage user accounts and setup branding of patient images; an Account icon where non-administrators can review their profiles and other account details; and a Sign Out icon that allows a user to sign out of the system. One will appreciate that the icons and options listed here are may be altered and are not limited to those described.

FIG. 20 illustrates one embodiment of an image workflow, where an image or a study of images can be selected from a list for further review. The study information may include the number of files and labels assigned to each study, as well as the number of comments made on particular studies and images by other users. Different icons for still images, videos, comments, etc. may be provided. The labels may pertain to suggested diagnoses or to a particular type of image or images contained within the study.

FIG. 21 illustrates a series of images as thumbnails that can be quickly reviewed before selecting one or more of them for further review. A list of actions is provided at the top of the GUI, and other icons on the thumbnails provide indications as to whether the thumbnail represents a video and whether it is of a particular image format (such as DICOM). The user may click or select one of the thumbnails to open the full image or video.

FIG. 22 is an illustration of a real-time remote interactive collaboration GUI, where a medical image is displayed along with annotations that are made on the image by one or more users. A chat screen is shown where the users can type instant messages to each other in the process of discussing the diagnosis of the patient, and a list of thumbnails of other images in the study may be provided at the top. The thumbnails may be updated as new images arrive. This “Live Diagnosis Screen” is a real-time collaboration tool that updates all information in real-time and synchronizes edits between users, including the annotations, chats, actions, selected images, pins and other changes. The live diagnosis screen may be particularly advantageous for an emergency room situation where a diagnosis is needed immediately. In the chat screen, the users have the option of inviting additional participants and taking one or more other actions related to the case.

FIG. 23 illustrates one embodiment of the Actions that may be selected in the chat screen, and may be a way to provide unambiguous instructions to another user—such as a doctor or nurse who is providing care to the patient. The Actions tab may also provide tracking of the selected actions and who executed and suggested the actions so that the treatment of the patient can be properly documented. In the Invite Collaborators tab, a user can invite more users to participate in a live diagnosis process. The invited users may receive a text message, email or phone call asking them to join in the live chat session. The user interface may be adopted for any type of computing device, including mobile phones and tablets, to allow other users to participate from any location and with any type of portable electronic device.

FIG. 24 illustrates a GUI where a diagnosis can be requested for a particular patient based on a set of images. The user can select different options for concerns and possible diagnoses to be investigated. When the request is sent, one or more users may be informed via email, text or phone, and an inbox screen may be provided to show when replies arrive.

In FIG. 25 , the GUI for making a diagnosis is provided, where several images and a plurality of menus are provided to select appropriate diagnoses. The images may be downloaded to a computer desktop for more detailed viewing with other software tools. Options for potential diagnoses can be highlighted or selected. Once a final decision is reached, the diagnosis is sent and recorded in the record for future review and study.

Receiving Pipeline Implementations

In embodiment, such as those described with respect to FIGS. 10, 11, and 13 , a DNS and special ports are required. In certain embodiments, however, standard ports can be used in order to eliminate the need for a DNS. In such embodiments, certain communications routine are applications can be loaded onto the imaging device 101 or a computing system interfaced with the device 101. These communications routines can communicate with the, e.g., DICOM imaging applications on the device to take the DICOM image, encrypt the image, provide labeling and account information, and then communicate this information to a server or servers. Among other things, the label and account information can be used as inputs into the calculation of a private preshared keys, which can be used for encryption as described in more detail below. This information can also be used to determine if the account is suspended to prevent any transmission when an account is suspended.

FIG. 29 is a diagram illustrating an example system 2900 configured with communication routines, processes, etc. (routines 2906), which perform such message creation functions in accordance with one embodiment. In the example of FIG. 29 , the routines 2906 can be included in a device, such as a terminal 2904 coupled with device 101, or within device 101 itself. Terminal 2904 can be a computing device, including a portable computing device such as a laptop, tablet or smartphone. The routines 2906 can be configured to take images from device 101, create messages that include the image data, labeling, account information, and other information that can provide information on how to handle the image data, encrypt the image data or the entire message, and communicate the message to one or more servers 2912 and storage locations 2910 via a network 2908.

Network 2908, storage locations 2910, and servers 2912 can be indicative of a basic cloud structure.

As noted above the labeling and account information can instruct, or at least provide the necessary information to allow, e.g., servers 2912 to handle the messages and the image data included therewith. For example, the labels and account information can instruct servers 2912 to store the image data and associate with the account of a particular clinician, group of clinicians, a hospital, etc., where the image data can later be accessed and viewed, e.g., with viewing applications such as those described above. Alternatively, the labeling and account information can instruct the servers 2912 to forward the image to a clinician's or patients device or a website.

Routines 2906 can in certain embodiments also provide the functionality to allow the image data to be converted into a different format that can more easily be transmitted to and handled by servers 2912, or into a format associated with a destination. Moreover, routines 2906 can eliminate the need for a DNS or the use of special ports.

FIGS. 27 and 28 illustrate example implementation of two such routines 2906 or daemon processes called image data receiver 2702 and communications 2704. The following is a description of these daemon processes. First, as illustrated in FIG. 27 , routines 2906 can comprise an image data receiver 2702 (Dcmtk::storescp). As can be seen, a sub process (Trice::sendFile) can be linked in and these processes together can be configured to send an image file, such as a DICOM image file to a receiver routine 2710 (Trice::receiver) in the cloud.

Transport Layer Security (TLS) can be achieved in certain embodiments using private preshared key that is device specific. The keys are encryption keys where both the sender and receiver need to successfully calculate the same key in order for transmission to succeed. Account information and labeling can be two of the inputs into this calculation. The configuration depicted should provide robust file copy functionality that will succeed if there is any connectivity between the device 101 and the cloud. Any failure in the communication pipeline illustrated in FIGS. 27 and 28 can result in a failed response to the device 101, which can cause device 101 to attempt to resend the image data.

The communications routine 2704 can also be configured to communicate with the receiver 2710 as illustrated in FIG. 28 . Communications routine 2704 can be responsible for initialization, sending “heartbeats” to the cloud, failure reporting, configuration updates, and software updates if allowed.

A local directory 2706 with read/write access can be included to store the configuration information. The location of this directory 2706 can be passed in as an argument to both daemon processes 2702 and 2704. In most embodiments, there are no requirements regarding it's disk location for directory 2706. The directory 2706 can store information such as port#, local-ip address, DICOM dictionary, error logs, etc. If device 101 is a DICOM imaging device, then a DICOM service can load the DICOM dictionary for example from this directory 2706. Heartbeat messages, as described herein, can be sent to the cloud Receiver that include port# and local-ip address, which can be read from this directory 2706. Logging information can also be stored in this directory 2706.

A unique name can be calculated for the device 101. If there is a device id associated with device 101, then it should be used instead of the calculated name. If there is a device id, the file name containing the device id can be passed into communications routine 2704. This device id can be the primary key for everything related to the Uplink/device in the cloud database. The cloud services can then lookup things like: when was the last heartbeat from the device; when did the device first came online; what version of the software is loaded on the device; what account is associated with the device; etc.? The Uplink depicted in FIGS. 27 and 28 sends periodic state information, which can be termed a heartbeat and which can be persisted in the cloud using the device-id as it's primary key. It should also again be noted that standard ports are used (e.g., 443) for all communications. 

What is claimed:
 1. A system comprising: a communication interface; at least one processor; and a set of routines that is configured to, when executed by the at least one processor, monitor data to detect medical image data, and in response to detecting the medical image data, determine a destination for the medical image data, convert the medical image data into a format associated with the destination, encrypt the converted medical image data, and transmit the encrypted and converted medical image data to the destination via the communication interface.
 2. The system of claim 1, wherein the communication interface comprises an Ethernet port.
 3. The system of claim 1, wherein the communication interface comprises a Wi-Fi interface.
 4. The system of claim 1, wherein the communication interface comprises a cellular interface.
 5. The system of claim 1, wherein the destination consists of a single remote server.
 6. The system of claim 1, wherein the format is Digital Imaging and Communications in Medicine (DICOM) format.
 7. The system of claim 1, wherein the encrypted and converted medical image data are transmitted to the destination over a network, wherein the set of routines is further configured to, in response to detecting the medical image data, determine a type of encryption based on a type of the network, and wherein the converted medical image data is encrypted according to the determined type of encryption.
 8. The system of claim 1, wherein the set of routines is further configured to, in response to detecting the medical image data, determine a type of encryption based on the destination, and wherein the converted medical image data is encrypted according to the determined type of encryption.
 9. The system of claim 1, wherein the system is a dongle that is configured to be plugged into a port of a medical imaging device, and wherein monitoring data comprises monitoring all medical image data generated by the medical imaging device.
 10. The system of claim 9, wherein, when the dongle is plugged into the port of the medical imaging device, the communication interface provides the medical imaging device with access to a network.
 11. The system of claim 1, wherein the system is a network device on a local network, and wherein monitoring data comprises monitoring traffic on the local network.
 12. The system of claim 11, wherein the destination comprises a remote server on a remote network outside of the local network, and wherein the encrypted and converted medical image data are transmitted to the remote server over the remote network.
 13. The system of claim 11, wherein monitoring traffic comprises listening on one or more ports for unprotected communications.
 14. The system of claim 1, wherein the system is a router that receives medical image files from one or more medical imaging devices over a local network.
 15. The system of claim 1, wherein the system is a medical imaging device, and wherein monitoring data comprises monitoring all medical image data generated on the medical imaging device.
 16. The system of claim 1, wherein the system is a mobile device that communicates with one or more medical imaging devices via wireless communications, and wherein monitoring data comprises monitoring medical image files received from the one or more medical imaging devices via the wireless communications.
 17. The system of claim 1, wherein the set of routines is further configured to, in response to detecting the medical image data: create a message that includes the encrypted and converted medical image data, one or more labels, and account information; and transmit the message to the destination via the communication interface.
 18. The system of claim 17, wherein the set of routines is further configured to calculate a key using the one or more labels and the account information as inputs, and wherein the calculated key is used for encrypting the converted medical image data.
 19. A method comprising using at least one processor to: monitor data to detect medical image data; and in response to detecting the medical image data, determine a destination for the medical image data, convert the medical image data into a format associated with the destination, encrypt the converted medical image data, and transmit the encrypted and converted medical image data to the destination via a communication interface.
 20. A non-transitory computer-readable medium having a set of routines stored thereon, wherein the set of routines, when executed by a processor, causes the processor to: monitor data to detect medical image data; and in response to detecting the medical image data, determine a destination for the medical image data, convert the medical image data into a format associated with the destination, encrypt the converted medical image data, and transmit the encrypted and converted medical image data to the destination via a communication interface. 