US 12,452,073 B2
Ocular self-imaging high-resolution optical coherence tomography system and methods
Grace C. Chang, Corona Del Mar, CA (US)
Assigned to VIDEANT INC., Corona Del Mar, CA (US)
Filed by Grace C. Chang, Corona Del Mar, CA (US)
Filed on Apr. 24, 2023, as Appl. No. 18/138,482.
Claims priority of provisional application 63/333,903, filed on Apr. 22, 2022.
Prior Publication US 2023/0344636 A1, Oct. 26, 2023
Int. Cl. H04L 9/32 (2006.01); G16H 30/20 (2018.01); G16H 40/67 (2018.01)
CPC H04L 9/3231 (2013.01) [G16H 40/67 (2018.01); G16H 30/20 (2018.01)] 22 Claims
OG exemplary drawing
 
1. A system deployed within a communication network, the system comprising:
a first computing device, comprising:
a non-transitory computer-readable storage medium; and
a processor coupled to the non-transitory computer-readable storage medium and configured to control a plurality of modules to execute instructions of the non-transitory computer-readable storage medium to:
obtain identifying information of a subject requesting optical coherence tomography (OCT) imaging via a device, wherein the device is disabled to prevent OCT measurements of the subject before the subject is positively authenticated based on the identifying information,
process the identifying information in accordance with one or more programmable threshold values,
generate unique pattern data based on the identifying information in response to detect the identifying information exceeding the one or more programmable threshold values,
encrypt the unique pattern data, and
transmit encrypted unique pattern data to a computing server system;
wherein the computing server system is configured to:
receive the encrypted unique pattern data from the first computing device,
decrypt the encrypted unique pattern data,
compare decrypted unique pattern data with a plurality of unique pattern data corresponding to authorized users of OCT imaging devices to determine whether the subject is authorized to use the device, and
generate one or more signals to indicate whether the subject is authorized to use the device; and
a second computing device deployed within the communication network and configured to remotely set or change imaging and scanning parameters of the device for the subject in response to detecting that the subject is positively authenticated to use the device based on the identifying information.