CN104798081B - 控制对由远程计算资源分析的临床数据的访问 - Google Patents

控制对由远程计算资源分析的临床数据的访问 Download PDF

Info

Publication number
CN104798081B
CN104798081B CN201380060193.3A CN201380060193A CN104798081B CN 104798081 B CN104798081 B CN 104798081B CN 201380060193 A CN201380060193 A CN 201380060193A CN 104798081 B CN104798081 B CN 104798081B
Authority
CN
China
Prior art keywords
data
encryption key
remote computing
computing resource
creator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201380060193.3A
Other languages
English (en)
Chinese (zh)
Other versions
CN104798081A (zh
Inventor
B·D·格罗斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Publication of CN104798081A publication Critical patent/CN104798081A/zh
Application granted granted Critical
Publication of CN104798081B publication Critical patent/CN104798081B/zh
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/20ICT specially adapted for the handling or processing of patient-related medical or healthcare data for electronic clinical trials or questionnaires
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • G16H40/60ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices
    • G16H40/67ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/64Self-signed certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/88Medical equipments

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Medical Informatics (AREA)
  • Theoretical Computer Science (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Epidemiology (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Biomedical Technology (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Tourism & Hospitality (AREA)
  • Child & Adolescent Psychology (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Measuring And Recording Apparatus For Diagnosis (AREA)
CN201380060193.3A 2012-09-18 2013-09-13 控制对由远程计算资源分析的临床数据的访问 Expired - Fee Related CN104798081B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201261702437P 2012-09-18 2012-09-18
US61/702,437 2012-09-18
PCT/IB2013/058520 WO2014045173A1 (en) 2012-09-18 2013-09-13 Controlling access to clinical data analyzed by remote computing resources

Publications (2)

Publication Number Publication Date
CN104798081A CN104798081A (zh) 2015-07-22
CN104798081B true CN104798081B (zh) 2018-10-26

Family

ID=49765576

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201380060193.3A Expired - Fee Related CN104798081B (zh) 2012-09-18 2013-09-13 控制对由远程计算资源分析的临床数据的访问

Country Status (8)

Country Link
US (2) US9544151B2 (https=)
EP (1) EP2898443B1 (https=)
JP (1) JP2015534343A (https=)
CN (1) CN104798081B (https=)
BR (1) BR112015005740A2 (https=)
CA (1) CA2884970C (https=)
RU (1) RU2648952C2 (https=)
WO (1) WO2014045173A1 (https=)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10162858B2 (en) * 2013-07-31 2018-12-25 Sap Se Local versus remote optimization in encrypted query processing
DK4343784T3 (da) 2013-12-27 2026-04-07 Abbott Diabetes Care Inc Brugergrænseflade og skærmstyring i et miljø til overvågning af analyter
WO2018009612A1 (en) 2016-07-06 2018-01-11 Patient Doctor Technologies, Inc. Secure and zero knowledge data sharing for cloud applications
US11837342B2 (en) 2017-01-26 2023-12-05 Joshua J. Dronzek Method and system for backing up and maintaining electronic medical records for periods of temporary loss of connectivity to an electronic storage facility
US12191012B2 (en) * 2017-03-20 2025-01-07 Opticsurg, Inc. Method and system for optimizing healthcare delivery
US11830614B2 (en) 2017-03-20 2023-11-28 Opticsurg, Inc. Method and system for optimizing healthcare delivery
EP3503606A1 (en) * 2017-12-20 2019-06-26 Gemalto Sa A method for controlling by a server the use of at least one data element of a data owner
CN110135671A (zh) * 2018-02-08 2019-08-16 国网青海省电力公司经济技术研究院 输变电工程技经指标分析模型构建样本库的建立方法
CN110135670A (zh) * 2018-02-08 2019-08-16 国网青海省电力公司经济技术研究院 输变电工程技经智能化评审的建立方法
DE102018204447B4 (de) * 2018-03-22 2019-12-19 Madana Ug (Haftungsbeschränkt) Automatisiertes Verfahren zum Schutz von elektronischen Daten zum Zwecke der Datenverarbeitung durch Dritte unter Einbezug transparenter und unterbrechungssicherer Vergütung
CN108769024B (zh) * 2018-05-30 2020-11-13 中国电子信息产业集团有限公司第六研究所 一种数据获取方法及多数据运营商协商服务系统
US11437150B2 (en) * 2018-05-31 2022-09-06 Inspire Medical Systems, Inc. System and method for secured sharing of medical data generated by a patient medical device
WO2020220119A1 (en) * 2019-05-02 2020-11-05 Iisaac Inc. System and method for user-controllable cloud-based data sharing
US12225111B2 (en) * 2022-03-08 2025-02-11 SanDisk Technologies, Inc. Authorization requests from a data storage device to multiple manager devices
EP4354448A1 (en) * 2022-10-13 2024-04-17 F. Hoffmann-La Roche AG Systems and methods for sharing healthcare data with healthcare data processors
CN116389065B (zh) * 2023-03-01 2025-08-19 浙江网商银行股份有限公司 水平越权检测方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1702676A (zh) * 2004-05-28 2005-11-30 西门子医疗健康服务公司 处理针对临床试验和分析的病人医疗数据的系统
US20070180259A1 (en) * 2006-01-20 2007-08-02 Bulot Earl J Secure Personal Medical Process
CN101521880A (zh) * 2009-03-26 2009-09-02 中国计量学院 带安全机制的无线实时社区医疗保健监测系统及方法
CN102546655A (zh) * 2012-02-07 2012-07-04 中山爱科数字科技股份有限公司 健康信息的安全传输方法

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7178030B2 (en) * 2000-10-25 2007-02-13 Tecsec, Inc. Electronically signing a document
US20030115452A1 (en) * 2000-12-19 2003-06-19 Ravi Sandhu One time password entry to access multiple network sites
GB2400699B (en) 2003-04-17 2006-07-05 Hewlett Packard Development Co Security data provision method and apparatus and data recovery method and system
JP4504130B2 (ja) * 2003-07-25 2010-07-14 株式会社リコー 通信装置、通信システム、証明書送信方法及びプログラム
WO2008090470A2 (en) * 2007-01-16 2008-07-31 Absolute Software Corporation A security module having a secondary agent in coordination with a host agent
WO2009002804A2 (en) * 2007-06-22 2008-12-31 Chumby Industries, Inc. Systems and methods for device registration
US20090193267A1 (en) * 2008-01-28 2009-07-30 Chiasen Chung Secure electronic medical record storage on untrusted portal
JP2009301131A (ja) * 2008-06-10 2009-12-24 Sony Corp 医療データ管理システム、及び医療データ管理方法
JP5267027B2 (ja) * 2008-10-03 2013-08-21 富士通株式会社 個人情報システム
US20100241852A1 (en) * 2009-03-20 2010-09-23 Rotem Sela Methods for Producing Products with Certificates and Keys
EP2606604A1 (en) * 2010-08-17 2013-06-26 Hewlett-Packard Development Company, L.P. Encryption key management
US10003458B2 (en) * 2011-12-21 2018-06-19 Ssh Communications Security Corp. User key management for the secure shell (SSH)

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1702676A (zh) * 2004-05-28 2005-11-30 西门子医疗健康服务公司 处理针对临床试验和分析的病人医疗数据的系统
US20070180259A1 (en) * 2006-01-20 2007-08-02 Bulot Earl J Secure Personal Medical Process
CN101521880A (zh) * 2009-03-26 2009-09-02 中国计量学院 带安全机制的无线实时社区医疗保健监测系统及方法
CN102546655A (zh) * 2012-02-07 2012-07-04 中山爱科数字科技股份有限公司 健康信息的安全传输方法

Also Published As

Publication number Publication date
US10164950B2 (en) 2018-12-25
US20170085535A1 (en) 2017-03-23
WO2014045173A1 (en) 2014-03-27
BR112015005740A2 (pt) 2017-07-04
RU2015114491A (ru) 2016-11-10
RU2648952C2 (ru) 2018-03-28
US20150236859A1 (en) 2015-08-20
EP2898443A1 (en) 2015-07-29
CA2884970C (en) 2021-12-14
JP2015534343A (ja) 2015-11-26
US9544151B2 (en) 2017-01-10
CA2884970A1 (en) 2014-03-27
EP2898443B1 (en) 2018-12-12
CN104798081A (zh) 2015-07-22

Similar Documents

Publication Publication Date Title
CN104798081B (zh) 控制对由远程计算资源分析的临床数据的访问
Zala et al. PRMS: design and development of patients’ E-healthcare records management system for privacy preservation in third party cloud platforms
Ganiga et al. Security framework for cloud based electronic health record (EHR) system
Lee et al. Privacy preservation in patient information exchange systems based on blockchain: system design study
Seol et al. Privacy-preserving attribute-based access control model for XML-based electronic health record system
Pussewalage et al. Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
Li et al. ChainSDI: A software-defined infrastructure for regulation-compliant home-based healthcare services secured by blockchains
JP7023294B2 (ja) 一致コホートの作成およびブロックチェーンを使用した保護データの交換
TW202020789A (zh) 用於調節健康照護網路中使用的加密貨幣的值的系統和方法
CN105450650A (zh) 一种安全移动电子健康记录访问控制系统
Asghar et al. A review of privacy and consent management in healthcare: A focus on emerging data sources
Ali et al. SeSPHR: a methodology for secure sharing of personal health records in the cloud
KR101698555B1 (ko) 건강관리 데이터 핸들링 방법 및 시스템
Riadi et al. Developing data integrity in an electronic health record system using blockchain and interplanetary file system (case study: COVID-19 data)
Weerasinghe et al. Secure trust delegation for sharing patient medical records in a mobile environment
Kala et al. Smart IoT-blockchain security to secure sensitive personal medical data using shuffled random starvation link encryption
CN119728149B (zh) 一种基于区块链和边缘计算的医疗数据共享及访问控制方法
Liu et al. Design of secure access control scheme for personal health record‐based cloud healthcare service
Thummavet et al. Privacy-preserving emergency access control for personal health records.
Lounis Security in cloud computing
CN119449409A (zh) 一种基于区块链和边缘计算的医疗数据共享及访问控制平台
Fitri et al. Secure attribute-based encryption with access control to data medical records
CN117896071A (zh) 用于与医疗保健数据处理者共享医疗保健数据的系统和方法
Benifa et al. Blockchain-based health care monitoring for privacy preservation of COVID-19 medical records
Vithanwattana Securing mHealth: investigating the development of a novel information security framework

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181026