Home USE CASES

INFORMATION REQUEST

´╗┐´╗┐
 
 
 
 
USE CASES
Examples of How Palm Identify can Simplify and Secure Patient Identity

 New Patient Registration Flow:

  1. At the end of the admissions process the employee captures the patient's palm image
  2. Patient hand is scanned twice which takes only a couple of seconds  
  3. The system then automatically creates a unique hash key based upon the image and assigns it to the patient's medical record number in the system

Existing Patient Flow:

  1. Patient scans hand once
  2. System recognizes the patient and pulls patient demographic and insurance information
  3. Information is validated on the patient   

New Patient Flow at Kiosk:

  1. Patient is directed to scan palm
  2. Biometric signature is assigned to patient ADT information
  3. Patient completes registration process at Kiosk and is checked-in

Existing Patient Flow at Kiosk:

  1. Patient Scans hand Once
  2. Palm Indentify recognizes the patient and instantly displays demographic and insurance information for patient to verify
  3. Patient completes registration process at Kiosk and is checked-in
 

ARE YOUR PATIENTS IDENTITIES SECURE?

  • Suspicious documents?
  • Suspicious personal identifying information?
  • Suspicious activities?
  • Notices from victims of identity theft, law enforcement authorities, insurers, or others suggesting possible identity theft?

POWERED BY

Biz Technology SOlutions, Inc.

Biz Technology Solutions, Inc.
353 Oates Road
Mooresville, NC 28117
(877) 424-9832
Contact Us