CN104809411A - Medical image authentication preservation method based on data integrity checking and restoration - Google Patents

Medical image authentication preservation method based on data integrity checking and restoration Download PDF

Info

Publication number
CN104809411A
CN104809411A CN201510216950.2A CN201510216950A CN104809411A CN 104809411 A CN104809411 A CN 104809411A CN 201510216950 A CN201510216950 A CN 201510216950A CN 104809411 A CN104809411 A CN 104809411A
Authority
CN
China
Prior art keywords
data
hash
authentication
damage
preserve
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510216950.2A
Other languages
Chinese (zh)
Inventor
王伟
张海涛
李章勇
冉鹏
庞宇
赵德春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201510216950.2A priority Critical patent/CN104809411A/en
Publication of CN104809411A publication Critical patent/CN104809411A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention relates to a medical image authentication preservation method based on data integrity checking and restoration. The method comprises the following steps: (1) shooting a DICOM (Digital Imaging and Communications in Medicine) image by imaging equipment of a data preservation system, and directly inputting the image to the system; (2) extracting and preserving the DICOM digital image data and generating a preserved data packet by the data preservation system; (3) sending the preserved data packet to a remote data authentication system according to a user request; (4) identifying the data by the data authentication system, directly transforming the unpreserved image data into a DICOM standard format, and certifying the preserved data, namely the preserved data packet; (5) during the authentication of the preserved data packet, performing on-line data restoration on a data segment with errors by network connection between the data segment and the data preservation system; (6) reducing the authenticated complete data or the on-line restored complete data into the DICOM standard format by the data authentication system. The method has the advantages of being capable of guaranteeing the authenticity and reliability of the image data in telemedicine and providing technical support for breaking information encapsulation among hospitals and realizing data share.

Description

A kind of medical image authentication security method based on data integrity verifying and reparation
Technical field
The invention belongs to technical field of long-distance medical, relate to a kind of medical image authentication security method based on data integrity verifying and reparation.
Background technology
Along with release and the realization of DICOM3.0 standard (3.0 editions medical digital images and communication standard), and international mainstream medical imaging device manufacturer is to the support of this standard agreement, the remote data transmission technology of medical digital image between each hospital is developed utilization, and the tele-medicine based on medical image information is achieved.
DICOM3.0 agreement has achieved the communications standardization of medical digital images, and establish medical image storage and transmission system (PACS:Picture Archiving and Communication System) on this basis, namely can generate a digital image data after each patient per's film making can for storing and transmitting across institute.That is, only need individual to carry after patient makes film or Internet Transmission numerical information to doctor, then can medical image be reduced to by corresponding program.But actual conditions are, what take away after every patient film making is still film, and when going to a doctor across institute, the opposing party doctor is often unintelligible with film and require that patient takes pictures again.Occur that the reason of this phenomenon is except economic interests, be exactly in addition data between hospital remote transmission or patient individual store time, existing protocol can not prevent raw data from artificially being revised or partial loss.Once data are destroyed or change, the true integrality of medical image as condition-inference foundation just can not be guaranteed.
DICOM3.0 standard chapter 15 safety and the safety rule should observed when provide only in system management regulation and be used in and exchange information between two application programs communicated, but the problem do not listed in other places or discuss in regarding safety policy, lacks the authentication mechanism of data integrity in PACS transmission.Cause in tele-medicine, although the transmission of view data can be realized, can not get the trust of remote hospital to data validity.
The certification of data is saved core from damage and is to ensure that acquired data are truly complete, unmodified changes.Certification for medical digital images is saved from damage, and its function should meet the following requirements: 1, through remote transmission or after transmitting, and can prevent being put into diagnosis again by the medical image artificially revised or destroy and use; 2, through remote transmission or after transmitting, the medical image that can prevent loss of data is put into diagnosis again and uses; 3, give the qualification of true integrality to the medical image not being modified or destroying and loss of data do not occur, make it obtain the accreditation of hospital doctor, relieved input diagnosis uses; 4, network can be carried out to unsanctioned imperfect medical image to repair online, make the view data after repairing truly complete.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of medical image authentication security method based on data integrity verifying and reparation, the method adopts data to save treatment mechanism from damage, data authentication treatment mechanism and the online repair mechanism of deficiency of data, process is saved from damage to the medical image of patient, when patient transfer from one hospital to another or change doctor carry out remote medical consultation with specialists time, medical image is taken without the need to repeating again, Suo Zhuan hospital or remote doctor obtain patient through saving the medical image of process from damage by authorized, fully can believe that this view data is truly complete, thus realize the tele-medicine of highly effective and safe.
The invention provides following technical scheme:
Based on a medical image authentication security method for data integrity verifying and reparation, in the method, data security system and data recognizing system is adopted to realize saving from damage and certification patient medical view data; Data security system is used for realizing the reading of DICOM digital image information, view data saves process from damage; Data recognizing system is used for realizing data identification, view data authentication processing, deficiency of data are repaired online, view data is reduced to dicom standard form; Specifically comprise the following steps:
Step one: by the imaging device shooting DICOM image of data security system, and directly input this system;
Step 2: data security system extracts DICOM Digital Image Data and does to save process from damage, generates preserve data bag;
Step 3: according to user's request, preserve data bag is sent to long-range data recognizing system;
Step 4: data recognizing system identifies data, is directly converted to dicom standard form to the view data of not saving from damage, to authentication processing made by preserve data and preserve data bag;
Step 5: having the data segment of error in preserve data bag authentication processing by being connected with the network of data security system, carrying out online data reparation;
Step 6: data recognizing system is reduced to dicom standard form by by the partial data of authentication processing or the partial data after online reparation.
Further, in step 2, described DICOM digital image information extracts, and is and dicom standard format-pattern is converted to DAT format picture data, the image information wherein comprised and medically-related information are extracted with the form of data stream, saves process from damage for follow-up certification.
Further, in step 2, described view data saves process from damage, needs the view data of DAT form to be divided into n data segment with segmentation algorithm, and its fundamental purpose is the online data repair function in order to realize in Internet Transmission pattern; Usage data working storage, segmented image data is deposited in Data buffer, repairs online for follow-up deficiency of data; View data saves process from damage, needs segmented image data to do Hash computing respectively, obtains the individual Hash corresponding with the data segment summary of n, composition Hash summary collection A, and to the process of Hash summary collection A privacy, its objective is with each segment data integrality of Hash Digest Authentication, realize data and save from damage.
Further, in step 3, described segmented image data and Hash summary collection A form preserve data bag, and according to the request of user, are sent to data recognizing system by network.
Further, in step 4, data recognizing system identifies data, whether identification data is by realizing containing Hash summary collection A in authentication data bag, if containing Hash summary collection A, then received packet is preserve data bag, and then makes authentication processing to preserve data bag; If do not comprise Hash summary collection A, then direct by received segment data restructuring, and be converted to dicom standard format-pattern.
Further, in step 4, view data authentication processing is and verifies the integrality of the segmented image data received by data recognizing system, its flow process first separates privacy process to the Hash summary collection A received, segmented image data in preserve data bag is done Hash computing simultaneously, draw Hash summary collection B, then corresponding digest value in Hash summary collection A and B is contrasted successively, judge whether to fit like a glove; If fit like a glove, then represent that this segmented image data is truly complete; If not exclusively identical, then can select to repair online error information section, also directly can abandon data.
Further, in step 5, after the online reparation of deficiency of data refers to that segmented image data makes integrity check in data recognizing system is to preserve data bag, if there is error information section, then generate error analysis report, be sent to the Data buffer of data security system, by Data buffer, the raw data of preserved error information section correspondence is sent to data recognizing system as patch data, Verification System receives this patch data segment and still needs to make data integrity check to it later, if patch data bin data is complete, then replaced the error information section in preserve data bag, if imperfect, then can select to continue to repair.
Further, the integrity check of described patch data segment refers to, does Hash computing to patch data segment, draw Hash digest value, this value and error information section are corresponded to the Hash Hash digest value collected in A of making a summary to contrast, if fit like a glove, then this patch data segment is complete.
Further, in step 6, described view data is reduced to dicom standard form and is divided into two kinds of approach: the first is directly converted to dicom standard form at data recognizing system to the view data of not saving process from damage; Its two be data recognizing system to segmented image data by data integrity check after recombinate and be converted to dicom standard form.
Beneficial effect of the present invention is: by method of the present invention, the medical image of patient is by the data integrity certification by saving mechanism and authentication mechanism from damage, when patient transfer from one hospital to another or change doctor carry out remote medical consultation with specialists time, medical image is taken without the need to repeating again, Suo Zhuan hospital or remote doctor obtain patient through saving the medical image of process from damage by authorized, fully can believe that this view data is truly complete, can as the diagnosis basis of patient.Process is saved from damage to the certification of medical digital images, the medical image of patient is made to obtain data integrity certification in tele-medicine with in going to a doctor across institute exactly, authenticity and the reliability of view data can be ensured, for the information broken between hospital is closed, realize data sharing and technical support is provided.This both saved expense for patient, also can reduce imaging device and repeatedly take the spinoff brought patient body.
Accompanying drawing explanation
In order to make object of the present invention, technical scheme and beneficial effect clearly, the invention provides following accompanying drawing and being described:
Fig. 1 is the fundamental diagram of technical solution of the present invention;
Fig. 2 is the system flowchart of technical solution of the present invention;
Fig. 3 is for saving processing flow chart from damage;
Fig. 4 is view data Piecewise Operation process flow diagram;
Fig. 5 is system authentication processing flow chart;
Fig. 6 is that Hash contrasts schematic diagram;
Fig. 7 is that view data repairs process flow diagram online.
Embodiment
Below in conjunction with accompanying drawing, the preferred embodiments of the present invention are described in detail.
The invention provides a kind of medical image authentication security method based on data integrity verifying and reparation, in the method, data security system and data recognizing system is adopted to realize saving from damage and certification patient medical view data, Fig. 1 is the fundamental diagram of technical solution of the present invention, Fig. 2 is the system flowchart of technical solution of the present invention, data save treatment scheme from damage as shown in Figure 3, and wherein each main modular function is as follows:
Data are changed: to not saved from damage the dicom standard digital picture of process, being changed, obtaining the view data of DAT form, its objective is deciphering view data by data, to realize saving process from damage to the certification of data;
Data sectional: the view data of DAT form is divided into n data segment with suitable segmentation algorithm is the online data repair function in order to realize in Internet Transmission pattern to data staging treating fundamental purpose;
Hash computing: the data segment of the n after segmentation is done Hash computing respectively, obtains the Hash summary that n is corresponding with data segment, composition Hash summary collection A, and its objective is makes a summary with Hash realizes data and save from damage;
Data buffer: the data after segmentation are stored to this part, in Internet Transmission pattern, utilizes the data segment being saved in this part to realize online reparation;
Privacy process: the operations such as scrambled can be taked to realize the secret of Hash summary, guarantees that Hash summary is in remote transmission or transmittance process, artificially can not be revised or destroy;
Data are packed: the Hash summary collection A after the view data after segmentation and privacy process is encapsulated as a packet, is convenient to remote transmission or transmission.
Wherein view data segmentation and Hash computing flow process are as shown in Figure 4.
Data authentication treatment scheme as shown in Figure 5, at data authentication end, to the preserve data bag received, need to separate privacy process to Hash summary collection A, then make a summary with newly-generated Hash and collect B and compare, its contrast details as shown in Figure 6, if the summary data in Hash summary collection A/B fits like a glove, after then representing this segmentation, data are truly complete, just can carry out data segment restructuring to it, and data conversion, be reduced to dicom standard format digital image, Hash summary is had to misfit if two summaries are concentrated, then can select to carry out online error reparation to data after segmentation, namely the online reparation flow process of error information section is entered.As shown above, contrast between Hash summary collection A/B is that the digest value corresponding to inside contrasts one by one, whether checking fits like a glove, if a certain section of Hash summary is misfitted, then this section of Hash corresponding data segment of making a summary has been modified or has destroyed, if fit like a glove, then after received segmentation, view data is truly complete.
View data repairs flow process as shown in Figure 7 online.The online reparation of data is exactly by the data not by integrated authentication, replaces online wherein there being the data segment of error.
Patch data segment is provided by the Data buffer saving end from damage, comprises in certification end the data of saving end storage from damage having error band corresponding, is sent to certification end by Internet Transmission.
Replace error information section, the patch data segment by integrated authentication is replaced original error information section, the patch data segment not by certification is repaired again.Wherein patch data segment can be multiple data segment, all just must can carry out reconfiguring of data segment by certification to multiple patch data segment later.
If there is multiple patch data segment, when again repairing, only again need save end from damage to data to the patch data segment not by integrated authentication and send the request of reparation, and the patch data segment by certification is replaced corresponding error information section.
As shown in Figure 2, the detailed work steps of this method is as follows:
1) save end from damage in data, an original DICOM digital picture is inputted this system by imaging device;
2) system data saves the view data that DICOM digital picture is converted to DAT form by end from damage, and then these data are made Piecewise Operation, and the segmented image data obtained remakes Hash computing, draws Hash summary collection A.Segmented image data is stored to Data buffer, for repairing use online simultaneously.Finally the Hash summary collection A after segmented image data and privacy process is packaged into preserve data bag;
3) save process from damage and finally obtain a preserve data bag, containing segmented image data and corresponding Hash summary collection A in this packet, this packet by mobile storage or Internet Transmission to data authentication end;
4) at data authentication end, first whether the data identification received through and saving process from damage, namely detect and whether collect A containing Hash summary.If do not save process from damage, then can select directly read data or abandon data, if save process from damage, then be accredited as preserve data bag, to its authentication processing;
5) authentication processing, is realized by hash value contrast.Again do Hash computing to the segmented image data received, obtain Hash summary collection B, the A that made a summary by the Hash after the process of solution privacy contrasts with it one by one.Whether coincideing by detecting each value in Hash summary collection A and B, can differentiate that in this preserve data bag, whether view data is complete, if data integrity, can be dicom standard image by its format conversion, if view data is imperfect, then receives amendment or destroy, can select to repair online it;
6) to the online reparation of deficiency of data, first generate error analysis report and be sent to data and save end from damage, this report mainly which data segment clear and definite does not pass through integrated authentication.Data are saved from damage after end receives error analysis report, extract the preserve data of corresponding error band, and this preserve data is sent to data authentication end as reparation patch from Data buffer;
7) data authentication end is after receiving this reparation patch, Hash computing is done to these patch data, draw hash value, then this hash value and Hash are made a summary collect the corresponding hash value of A medial error data segment and compare, detect and whether coincide, if coincide, then these patch data are by certification, replaced original error information section, if misfit, then not by certification, can select to continue repair or directly abandon all data;
8) treat that all error information sections all complete after reparation, then the total data section by certification is reconfigured, and be dicom standard image to the Data Format Transform after combination.
What finally illustrate is, above preferred embodiment is only in order to illustrate technical scheme of the present invention and unrestricted, although by above preferred embodiment to invention has been detailed description, but those skilled in the art are to be understood that, various change can be made to it in the form and details, and not depart from claims of the present invention limited range.

Claims (9)

1. based on a medical image authentication security method for data integrity verifying and reparation, it is characterized in that: in the method, adopt data security system and data recognizing system to realize saving from damage and certification patient medical view data; Data security system is used for realizing the reading of DICOM digital image information, view data saves process from damage; Data recognizing system is used for realizing data identification, view data authentication processing, deficiency of data are repaired online, view data is reduced to dicom standard form; Specifically comprise the following steps:
Step one: by the imaging device shooting DICOM image of data security system, and directly input this system;
Step 2: data security system extracts DICOM Digital Image Data and does to save process from damage, generates preserve data bag;
Step 3: according to user's request, preserve data bag is sent to long-range data recognizing system;
Step 4: data recognizing system identifies data, is directly converted to dicom standard form to the view data of not saving from damage, to authentication processing made by preserve data and preserve data bag;
Step 5: having the data segment of error in preserve data bag authentication processing by being connected with the network of data security system, carrying out online data reparation;
Step 6: data recognizing system is reduced to dicom standard form by by the partial data of authentication processing or the partial data after online reparation.
2. a kind of medical image authentication security method based on data integrity verifying and reparation according to claim 1, it is characterized in that: in step 2, described DICOM digital image information extracts, be and dicom standard format-pattern is converted to DAT format picture data, the image information wherein comprised and medically-related information are extracted with the form of data stream, saves process from damage for follow-up certification.
3. a kind of medical image authentication security method based on data integrity verifying and reparation according to claim 1, it is characterized in that: in step 2, described view data saves process from damage, need the view data of DAT form to be divided into n data segment with segmentation algorithm, its fundamental purpose is the online data repair function in order to realize in Internet Transmission pattern; Usage data working storage, segmented image data is deposited in Data buffer, repairs online for follow-up deficiency of data; View data saves process from damage, needs segmented image data to do Hash computing respectively, obtains the individual Hash corresponding with the data segment summary of n, composition Hash summary collection A, and to the process of Hash summary collection A privacy, its objective is with each segment data integrality of Hash Digest Authentication, realize data and save from damage.
4. a kind of medical image authentication security method based on data integrity verifying and reparation according to claim 3, it is characterized in that: in step 3, described segmented image data and Hash summary collection A form preserve data bag, and according to the request of user, be sent to data recognizing system by network.
5. a kind of medical image authentication security method based on data integrity verifying and reparation according to claim 4, it is characterized in that: in step 4, data recognizing system identifies data, whether identification data is by realizing containing Hash summary collection A in authentication data bag, if containing Hash summary collection A, then received packet is preserve data bag, and then makes authentication processing to preserve data bag; If do not comprise Hash summary collection A, then direct by received segment data restructuring, and be converted to dicom standard format-pattern.
6. a kind of medical image authentication security method based on data integrity verifying and reparation according to claim 5, it is characterized in that: in step 4, view data authentication processing is and verifies the integrality of the segmented image data received by data recognizing system, its flow process first separates privacy process to the Hash summary collection A received, segmented image data in preserve data bag is done Hash computing simultaneously, draw Hash summary collection B, then corresponding digest value in Hash summary collection A and B is contrasted successively, judge whether to fit like a glove; If fit like a glove, then represent that this segmented image data is truly complete; If not exclusively identical, then can select to repair online error information section, also directly can abandon data.
7. a kind of medical image authentication security method based on data integrity verifying and reparation according to claim 6, it is characterized in that: in step 5, after the online reparation of deficiency of data refers to that segmented image data makes integrity check in data recognizing system is to preserve data bag, if there is error information section, then generate error analysis report, be sent to the Data buffer of data security system, by Data buffer, the raw data of preserved error information section correspondence is sent to data recognizing system as patch data, Verification System receives this patch data segment and still needs to make data integrity check to it later, if patch data bin data is complete, then replaced the error information section in preserve data bag, if imperfect, then can select to continue to repair.
8. a kind of medical image authentication security method based on data integrity verifying and reparation according to claim 7, it is characterized in that: the integrity check of described patch data segment refers to, Hash computing is done to patch data segment, draw Hash digest value, this value and error information section are corresponded to the Hash Hash digest value collected in A of making a summary to contrast, if fit like a glove, then this patch data segment is complete.
9. a kind of medical image authentication security method based on data integrity verifying and reparation according to claim 8, it is characterized in that: in step 6, described view data is reduced to dicom standard form and is divided into two kinds of approach: the first is directly converted to dicom standard form at data recognizing system to the view data of not saving process from damage; Its two be data recognizing system to segmented image data by data integrity check after recombinate and be converted to dicom standard form.
CN201510216950.2A 2015-04-30 2015-04-30 Medical image authentication preservation method based on data integrity checking and restoration Pending CN104809411A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510216950.2A CN104809411A (en) 2015-04-30 2015-04-30 Medical image authentication preservation method based on data integrity checking and restoration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510216950.2A CN104809411A (en) 2015-04-30 2015-04-30 Medical image authentication preservation method based on data integrity checking and restoration

Publications (1)

Publication Number Publication Date
CN104809411A true CN104809411A (en) 2015-07-29

Family

ID=53694224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510216950.2A Pending CN104809411A (en) 2015-04-30 2015-04-30 Medical image authentication preservation method based on data integrity checking and restoration

Country Status (1)

Country Link
CN (1) CN104809411A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106230851A (en) * 2016-08-29 2016-12-14 中金云金融(北京)大数据科技股份有限公司 Data security method based on block chain and system
CN106652017A (en) * 2016-09-18 2017-05-10 青岛海信医疗设备股份有限公司 Method and apparatus for determining the completeness of DICOM image file in three-dimensional reconstruction
CN107330246A (en) * 2017-06-05 2017-11-07 上海联影医疗科技有限公司 Introduction method, device and the computer-readable medium of medical image files
CN107742085A (en) * 2017-10-20 2018-02-27 国信嘉宁数据技术有限公司 A kind of data security system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7653814B2 (en) * 2001-12-11 2010-01-26 International Business Machines Corporation System and method for securely hyperlinking graphic objects
CN201682530U (en) * 2010-04-29 2010-12-22 泰山医学院 Browser/Server mode based medical image storage communication system
CN101964041A (en) * 2010-09-25 2011-02-02 合肥工业大学 Perceptual hashing-based practical and safe image forensic system and forensic method
CN104077747A (en) * 2013-03-26 2014-10-01 株式会社东芝 Medical image data processing apparatus and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7653814B2 (en) * 2001-12-11 2010-01-26 International Business Machines Corporation System and method for securely hyperlinking graphic objects
CN201682530U (en) * 2010-04-29 2010-12-22 泰山医学院 Browser/Server mode based medical image storage communication system
CN101964041A (en) * 2010-09-25 2011-02-02 合肥工业大学 Perceptual hashing-based practical and safe image forensic system and forensic method
CN104077747A (en) * 2013-03-26 2014-10-01 株式会社东芝 Medical image data processing apparatus and method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
游历: "云端数据完整性验证和数据恢复机制研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
王良军: "DICOM标准下对医学图像数字签名的研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106230851A (en) * 2016-08-29 2016-12-14 中金云金融(北京)大数据科技股份有限公司 Data security method based on block chain and system
CN106230851B (en) * 2016-08-29 2019-12-13 中金云金融(北京)大数据科技股份有限公司 Data security method and system based on block chain
CN106652017A (en) * 2016-09-18 2017-05-10 青岛海信医疗设备股份有限公司 Method and apparatus for determining the completeness of DICOM image file in three-dimensional reconstruction
CN106652017B (en) * 2016-09-18 2020-05-26 青岛海信医疗设备股份有限公司 Method and device for judging DICOM image file integrity in three-dimensional reconstruction
CN107330246A (en) * 2017-06-05 2017-11-07 上海联影医疗科技有限公司 Introduction method, device and the computer-readable medium of medical image files
CN107330246B (en) * 2017-06-05 2024-01-09 上海联影医疗科技股份有限公司 Medical image file importing method, device and computer readable medium
CN107742085A (en) * 2017-10-20 2018-02-27 国信嘉宁数据技术有限公司 A kind of data security system

Similar Documents

Publication Publication Date Title
CN110299195B (en) Electronic medical record sharing system with privacy protection based on alliance chain and application method
CN110414203B (en) Internet medical identity authentication method based on block chain technology
US10277400B1 (en) Biometric electronic signature tokens
CN107592318A (en) It is a kind of that the shared method and system of clinical data are realized by block chain
JP5623388B2 (en) Secure data cache
KR20190069551A (en) Block chain-based data processing method and device
CN104809411A (en) Medical image authentication preservation method based on data integrity checking and restoration
CN102436562B (en) Medical image stores safely the method with transmission
CN107330301A (en) Managing medical information platform based on recognition of face
CN104240170A (en) High-end electronic medical record system for achieving intelligent medical treatment
CN109905368A (en) Across the chain data interaction of block chain and verification method, block catenary system and storage medium
CN107871081A (en) A kind of computer information safe system
TW202022666A (en) System, apparatus and methods for accessing health information
CN107181633A (en) A kind of method and system of long-range acquisition business diary
CN105634742A (en) Session key negotiation method and intelligent secret key device
CN112804218A (en) Data processing method, device and equipment based on block chain and storage medium
CN104318201A (en) Fingerprint processing method, chip and terminal
CN206611427U (en) A kind of key storage management system based on trust computing device
CN106789024A (en) A kind of remote de-locking method, device and system
Hasan et al. Electronic health records system using blockchain technology
CN104965986B (en) The medical information identification card generation system and method for Implantable Medical Device
CN107133517B (en) Data recovery method based on data encryption and calculation in memory
CN106789017A (en) Accounts information Explore of Unified Management Ideas based on biological feature encryption
CN109474622A (en) Improve the ciphertext encryption method of privacy of user safety
Weider et al. An electronic health record content protection system using smartcard and PMR

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150729

RJ01 Rejection of invention patent application after publication