Remote terminal connection via SSH
Firmware Update to Local Host
Hacking Health Detroit Demo
Did you know lots of your hospital data isn't that secure? For HIPPA standards we use the same style of AES256 & Blowfish encryption as in the 1990s.
What it does
We can use the Arduino 101 to connect to the portal via SSH and have an API manager that can view your connection to the Cisco Spark framework. Essentially you are able to view the different hardware key connections as different API endpoints creating a decentralized security network. You are using type 7 encryption and if one endpoint is somehow able to get leaked, the entire hospital portal doesn't get leaked.
How I built it
Using different Cisco frameworks & custom hardware, we can replace that with Cisco Type 7. Meaning a health care portal with more path walls and less vulnerable to hacking and data loss. We call our selves, "MediSafe".
Challenges I ran into
We did have a few deployment issues that are now sort of fixed. We are also able to demo the hardware code and the key connection to any judges via skype if needed to later on.
Accomplishments that I'm proud of
We started the process of doing this and was able to have a short successful demo during the weekend of Hacking Health Windsor. We originally tested this on the Raspberry Pi Zero W as well using Pi Bakery. While we didn't win, because they saw it as more of a security then healthcare application, many people were impressed. We are able to also fully articulate the ideas with Cisco CCNPs and network managers. The Brightside is that it can also be integrated with VPNs to further the security process.
What I learned
I learned a bunch about API pipelines as well as different hardware and cloud cryptography methods
What's next for MediSafe: Healthcare Portal
Further the technology and being able to make it patentable, get partnerships, and overall try using it to better benefit humanity