Differential Diagnostics™- Computing System
Computing System
Infrastructure & Architecture
Q. What powers the Differential Diagnostics™ system?
A. A robust infrastructure combining computers, private networks, edge computing, and Azure Cloud supports operations and data processing.
Q. What its unique architecture do?
A. It enables secure provisioning of 4G/5G-based last-mile applications, private wireless networks, cloud and edge computing, and IoT, ensuring dynamic, interoperable, and secure connectivity.
Connectivity & Networking
Q. How is internet connectivity managed?
A. The system ensures seamless internet access for real-time data transmission and remote system access.
Q. What networking setup is used in a healthcare setting?
A. A secure private network is deployed with two sub-networks: one for medical devices and one for guest/non-clinical access.
Q. How is real-time data flow supported?
A. Real-time transmission from patient devices to the Clinician Web App enables continuous monitoring and decision support.
Data Security & Encryption
Q. How is data secured during transmission and storage?
A. Data is encrypted using TLS/IPsec during transmission and AES-256, BitLocker, and DKM at rest. Passwords are encrypted or hashed in both states.
Q. What authentication methods are supported?
A. The system supports multi-factor authentication (MFA), passwordless login, and strong password policies.
Q. How is access control managed?
A. Role-Based Access Control (RBAC) ensures users only access what they need. All login attempts are logged, and accounts lock after 3 failed attempts.
Q. What happens to unused or compromised accounts?
A. Admins can disable accounts in real time. Unused accounts are disabled or archived.
Compliance & Standards
Q. What compliance standards does the system meet?
A. The system complies with HIPAA, GDPR, PIPEDA, and Quebec’s Law 25. Each customer’s data is stored in a separate database for privacy.
Q. What certifications are planned?
A. The company aims to obtain SOC 2 or ISO 27001.
Security Monitoring & Response
Q. How is security integrated into development?
A. A security-by-design approach is used, with regular vulnerability assessments and a formal incident response plan.
Q. How is the system integrated with its local EHRs and system?
A. A local EHR and system on an edge computing device communicates with the cloud-based EHR. Full sync with healthcare HER can be done at the institution request.
Q. How is the private network configured for security?
A. The private network is segmented into secure sub-networks, enabling encrypted data transmission.
Q. How do patients access the system?
A. Patients can self-register via QR code on Android/iOS and sign in independently through the PoC app with the same credential.
Q. How is clinician access managed?
A. The clinician web app includes administrator-level access and RBAC for secure, role-specific data access.
API & Interoperability
Q. How does the system connect to external applications?
A. A single interoperable API standard allows secure connection to all partner endpoints, including third-party apps and data networks.
Other Topics
Autonomous Care Unit (ACU™)
Differential Diagnostics™
Interactive Tutorials & Video Guides
Documentation
Regulatory & Compliance
Data Privacy & Security