CN106202941A - A kind of multi-functional cloud network diagnosis and treatment system - Google Patents
A kind of multi-functional cloud network diagnosis and treatment system Download PDFInfo
- Publication number
- CN106202941A CN106202941A CN201610556830.1A CN201610556830A CN106202941A CN 106202941 A CN106202941 A CN 106202941A CN 201610556830 A CN201610556830 A CN 201610556830A CN 106202941 A CN106202941 A CN 106202941A
- Authority
- CN
- China
- Prior art keywords
- network node
- network
- node
- cloud
- miniature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G06F19/3418—
Abstract
A kind of multi-functional cloud network diagnosis and treatment system, including high-definition camera, micro computer digital information processing system, mini-ECG instrument, miniature B ultrasonic machine, miniature X-ray machine and physiological parameter acquisition system, described micro computer cloud computing digital information processing system obtains patient image and data by described high-definition camera, mini-ECG instrument, miniature B ultrasonic machine, miniature X-ray machine and physiological parameter acquisition system and is sent to cloud network and carries out processing, storing and remote transmission;Described cloud network includes multiple even network node and link, and its data received can transmit to the user having permission for checking.
Description
Technical field
The present invention relates to therapeutic medical systems, be specifically related to a kind of multi-functional cloud network diagnosis and treatment system.
Background technology
The most deep along with IT application to our society, communication technology is gradually coated on each each side of life, for people
Life provide telematics quick, a large amount of, accurate.On this basis, people are highly desirable based on digital information
Traditional armarium is integrated and upgrades by technology, provides multi-functional information-based diagnosis and treatment platform for extensive patients, it is achieved
Remotely diagnosis, teletherapy, the omnidistance seamless networking linking of diagnosis and treatment, make patient no matter be in where and can obtain the most relevant
The science diagnoses and treatment of care specialists.Meanwhile, again it has to be ensured that the relevant ill data of patient is the most compromised, have the highest
Safety.
Summary of the invention
For the problems referred to above, the present invention provides a kind of multi-functional cloud network diagnosis and treatment system.
The purpose of the present invention realizes by the following technical solutions:
A kind of multi-functional cloud network diagnosis and treatment system, including high-definition camera, micro computer digital information processing system, the miniature heart
Electrograph instrument, miniature B ultrasonic machine, miniature X-ray machine and physiological parameter acquisition system, described micro computer cloud computing Digital Signal Processing system
Unite and obtain trouble by described high-definition camera, mini-ECG instrument, miniature B ultrasonic machine, miniature X-ray machine and physiological parameter acquisition system
Person's image and data are also sent to cloud network and carry out processing, storing and remote transmission;Described cloud network includes that multiple networking network saves
Point and link, its data received can transmit to the user having permission for checking;Also include security protection system, be used for be
Described cloud network provides security protection.
This cloud network diagnosis and treatment system have the beneficial effect that one-stop comprehensive collection physical signs of patient data, it is achieved data and doctor
Learn the collection of image, process, store and the most immediately transmit, the state of an illness data of patient can be provided at any time to earth any point.
Accompanying drawing explanation
The invention will be further described to utilize accompanying drawing, but the embodiment in accompanying drawing does not constitute any limit to the present invention
System, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain according to the following drawings
Other accompanying drawing.
Fig. 1 is the structured flowchart of a kind of multi-functional cloud network diagnosis and treatment system;
Fig. 2 is the structured flowchart of security protection system.
Reference: high-definition camera-1;Micro computer digital information processing system-2;Mini-ECG instrument-3;Miniature B ultrasonic
Machine-4;Miniature X-ray machine-5;Physiological parameter acquisition system-6;Cloud network-7;Cloud network node safety classification subsystem-10;Safety
Protection configuration subsystem-20;Network security monitoring subsystem-30;Cloud service subsystem-40;Incidence matrix generation module-11;
Minimum spanning tree module-12;Diversity module-13;Substitute module-14.
Detailed description of the invention
The invention will be further described with the following Examples.
Application scenarios 1:
One multi-functional cloud network diagnosis and treatment system as shown in Figure 1, at high-definition camera 1, micro computer digital signal
Reason system 2, mini-ECG instrument 3, miniature B ultrasonic machine 4, miniature X-ray machine 5 and physiological parameter acquisition system 6, described micro computer cloud
Calculate digital information processing system 2 by described high-definition camera 1, mini-ECG instrument 3, miniature B ultrasonic machine 4, miniature X-ray machine 5
Obtain patient image and data with physiological parameter acquisition system 6 and be sent to cloud network 7 and carry out processing, storing and remote transmission;
Described cloud network 7 includes multiple even network node and link, and its data received can transmit to the user having permission for looking into
See.Also include security protection system, for providing security protection for described cloud network.
The present invention uses one-stop comprehensive collection physical signs of patient data, it is achieved data and the collection of medical image, processes, deposit
Storage and the most instant transmission, can provide the state of an illness data of patient at any time to earth any point.
Preferably, described physiological parameter acquisition system 6 includes that infrared thermometer, sphygomanometer and pulse counter, electronics are listened
Examine device, blood glucose meter.
Preferably, described micro computer digital information processing system 2 is used for its data obtained are formatted process, and
Described data are encrypted.
Preferably, as in figure 2 it is shown, security protection system includes cloud network node safety classification subsystem 10, security protection
Configuration subsystem 20, network security monitoring subsystem 30 and cloud service subsystem 40, described network node security classification system 10
By the importance values calculating network node, network node being divided into 4 different safe classes, described security protection configuration is sub
System 20 is according to the classification results of cloud network node safety classification subsystem 10, for network node and the joint of different safety class
Link between point provides different secure cryptographic service;Described network security monitoring subsystem 30 is used for monitoring network node shape
State, described cloud service subsystem 40 provides cloud to support for whole security protection cloud system.
(1) cloud network node safety classification subsystem 10 include incidence matrix generation module 11, minimum spanning tree module 12,
Diversity module 13 and replacement module 14:
The importance values of cloud network node safety classification subsystem 10 obtains and is based primarily upon following theory: to be measured by removing
Node assesses this node status in the network, specifically, if after node to be measured is removed, raw in the new figure obtained
The number of Cheng Shu is the fewest, then the importance values of this node is the biggest.
A, incidence matrix generation module 11:
A non-directed graph with m network node V and n bar link E, wherein V={V is represented with G1, V2... Vm, E=
{E1, E2... En, the annexation of network structure interior joint and link, the one of matrix R is represented with the incidence matrix R of a m × n
A network node in row map network, the string of R represents the value of network node and the relating attribute of corresponding sides, each in R
The value of element is 0 or 1, wherein 0 represents link and does not associates with network node, and 1 represents link associates with network node;Such as,
If the element of m row the n-th row is 1 in R, then represent m-th network node and nth bar link association;
B. minimum spanning tree module 12:
With (i j) represents connection network node V in non-directed graph GiWith network node VjLink, ω (Vi, Vj) represent this chain
The weight on road, if there is subset that T is E and for without circulation figure so that ω (T) minimum, is just referred to as the minimum spanning tree of G, then by T
Minimum spanning tree sum τ (G)=det (RR in GT), wherein det (.) represents determinant generating function,;
C. diversity module 13:
Node V is obtained by following formulaiImportance values ri:Wherein τ (G) is for be generated by minimum
The minimum spanning tree sum that tree computing module obtains;K is the quantity of the i-th row nonzero element in incidence matrix R, and Z is remove R
The new matrix obtained after the nonzero element column of i row and the i-th row, det (Zi) represent the determinant of Z;riValue the biggest,
I.e. node demonstrates the highest importance, works as riValue when take 1, then it represents that ViIt is most important network node in this network,
Once this network node is destroyed the connectedness of figure and will be destroyed dramatically, thus causes network service to interrupt;By with
Upper method calculates the importance values of all-network node respectively, concurrently sets classification thresholds T1, T2, T3, and T1 > T2 > T3, as
Really ri> T1, then be labeled as important node by this network node, if T1 is > ri> T2, then be labeled as time weight by this network node
Want node, if T2 is > ri> T3, then be labeled as intermediate node by this network node, if riLess than T3, then by this network node
It is labeled as fringe node, and the safe class of important node, secondary important node, intermediate node and fringe node is designated as respectively
Grade 1, grade 2, grade 3 and class 4;T3=0.25, fringe node number is not over the 30% of overall network nodes;
D. replacement module 14:
When network node quantity or node location change, automatically recalculate the important of each network node
Property value, and re-start safety classification and labelling;
(2) security protection configuration subsystem 20: between the network node that safe class is identical, uses based on Internet
It is mutual that Secure Internet Protocol IPSec carries out information, it is provided that the protecting information safety of channel level, and ipsec protocol should by cryptographic technique
For Internet, it is provided that what point-to-point data were transmitted includes the peace that safety certification, data encryption, access control, integrity differentiate
Full service;Use between the network node of different safety class and be operated in the application layer protocol on network layer protocol and carry out information
Alternately, the safety of application layer, based on PKI system, guarantees information file transfer, the safety shared and use by cryptographic technique,
Following cipher mode is used to be encrypted specifically:
A. for network node A that safe class is n1 and network node B that safe class is n2, when A to transmit letter to B
During breath MES, first being sent request by A to B, B returns Shu random number R D1 of Shu n1-n2, and B retains RD1;
Each RD1 is digitally signed by b.A by pre-assigned secret key, and produces random number corresponding to Shu n1-n2 Shu
RD2;By the matrix on one Shu n1-n2 Shu × Shu n1-n2 Shu rank of RD1 and RD2 composition, utilize matrix encryption technology that information MES is carried out
Encryption, is sent to B by encrypted result;Owing to the span of n1 and n2 is 1-4, easily know the net for different safety class
For network node, this matrix is 3 × 3 rank matrixes to the maximum, minimum 1 × 1 matrix, and for the identical network node of safe class
For, n1-n2=0, do not carry out the operation of matrix encryption;When safe class bypass the immediate leadership transmission progression the highest, Shu n1-n2 Shu get over
Greatly, then the exponent number of scrambled matrix is the biggest, and cryptographic security is the best, and at the same level or when bypassing the immediate leadership little, AES
Amount of calculation reduces accordingly, has stronger adaptivity.
C.B calls decryption function and is decrypted the information after encryption, obtains RD1 ' and information MES, is entered by RD1 and RD1 '
Row comparison match, if the match is successful, receives and retains MES, if inconsistent, MES return A or is abandoned;
(3) network security monitoring subsystem 30, is used for monitoring number of network node and network node location, and it includes perception mould
Block and transport module:
Described sensing module realizes by disposing a large amount of wireless senser around network node, due to network node not
Knowing self-position, described wireless senser is by accepting network node wireless signal, in conjunction with self and other sensing stations
Relation, positions network node location;
(4) cloud service subsystem 40, including cloud storage module and cloud computing module:
Described cloud storage module includes publicly-owned cloud storage submodule and private cloud storage submodule, described publicly-owned storage cloud
Module mainly stores network node ranked data, and its storage content external world can carry out free access, described private cloud storage submodule
Block mainly stores secret key and decryption function, only can be conducted interviews by the personnel of authentication;
Described cloud computing module realizes by disposing SOA server, including publicly-owned cloud computing submodule and privately owned cloud computing
Submodule, described publicly-owned cloud computing submodule provides for cloud network node safety classification subsystem and network security monitoring subsystem
Calculating and support, described privately owned cloud computing submodule provides to calculate for security protection configuration subsystem and supports, and all types of user is by eventually
End program obtains high in the clouds data.
The most one-stop comprehensive collection physical signs of patient data, it is achieved data and the collection of medical image, process,
Storage and the most instant transmission, can provide the state of an illness data of patient at any time to earth any point;Network system node divides safely
Level system 10 uses the node importance based on minimum spanning tree to calculate, can relatively accurately, amount of calculation calculate network joint smaller
The importance of point, and carries out safety classification to the node in network on this basis, T3=0.25, fringe node number not over
The 30% of overall network nodes;Information between the network node of different safety class is transmitted by security protection configuration subsystem 20
Use different encryption policys, and bypass the immediate leadership when safe class and transmit the highest (when Shu n1-n2 Shu is the biggest), then the exponent number of scrambled matrix
The biggest, cryptographic security is the best, and at the same level or when bypassing the immediate leadership little, the amount of calculation of AES reduces accordingly, has relatively
Strong adaptivity;Cloud service module is set, it is possible to save memory space, improves and calculate speed, save time cost.
Preferably, in described network security monitoring subsystem, the concrete positioning action of network node is as follows:
With network node as the center of circle, r is that radius draws circle, and the wireless senser quantity in circle that falls is n, biography that i-th is wireless
Sensor receives the signal intensity of this network node and corresponds to qi, i=1,2 ..., n;
The position of network node (x, y) as follows:
Described transport module is for being transferred to cloud service subsystem 40 by the monitoring result of sensing module.
Network security monitoring subsystem is set in this embodiment, it is possible to gather network node data, accurate positioning in time.
Application scenarios 2:
One multi-functional cloud network diagnosis and treatment system as shown in Figure 1, at high-definition camera 1, micro computer digital signal
Reason system 2, mini-ECG instrument 3, miniature B ultrasonic machine 4, miniature X-ray machine 5 and physiological parameter acquisition system 6, described micro computer cloud
Calculate digital information processing system 2 by described high-definition camera 1, mini-ECG instrument 3, miniature B ultrasonic machine 4, miniature X-ray machine 5
Obtain patient image and data with physiological parameter acquisition system 6 and be sent to cloud network 7 and carry out processing, storing and remote transmission;
Described cloud network 7 includes multiple even network node and link, and its data received can transmit to the user having permission for looking into
See.Also include security protection system, for providing security protection for described cloud network.
The present invention uses one-stop comprehensive collection physical signs of patient data, it is achieved data and the collection of medical image, processes, deposit
Storage and the most instant transmission, can provide the state of an illness data of patient at any time to earth any point.
Preferably, described physiological parameter acquisition system 6 includes that infrared thermometer, sphygomanometer and pulse counter, electronics are listened
Examine device, blood glucose meter.
Preferably, described micro computer digital information processing system 2 is used for its data obtained are formatted process, and
Described data are encrypted.
Preferably, as in figure 2 it is shown, security protection system includes cloud network node safety classification subsystem 10, security protection
Configuration subsystem 20, network security monitoring subsystem 30 and cloud service subsystem 40, described network node security classification system 10
By the importance values calculating network node, network node being divided into 4 different safe classes, described security protection configuration is sub
System 20 is according to the classification results of cloud network node safety classification subsystem 10, for network node and the joint of different safety class
Link between point provides different secure cryptographic service;Described network security monitoring subsystem 30 is used for monitoring network node shape
State, described cloud service subsystem 40 provides cloud to support for whole security protection cloud system.
(1) cloud network node safety classification subsystem 10 include incidence matrix generation module 11, minimum spanning tree module 12,
Diversity module 13 and replacement module 14:
The importance values of cloud network node safety classification subsystem 10 obtains and is based primarily upon following theory: to be measured by removing
Node assesses this node status in the network, specifically, if after node to be measured is removed, raw in the new figure obtained
The number of Cheng Shu is the fewest, then the importance values of this node is the biggest.
A, incidence matrix generation module 11:
A non-directed graph with m network node V and n bar link E, wherein V={V is represented with G1, V2... Vm, E=
{E1, E2... En, the annexation of network structure interior joint and link, the one of matrix R is represented with the incidence matrix R of a m × n
A network node in row map network, the string of R represents the value of network node and the relating attribute of corresponding sides, each in R
The value of element is 0 or 1, wherein 0 represents link and does not associates with network node, and 1 represents link associates with network node;Such as,
If the element of m row the n-th row is 1 in R, then represent m-th network node and nth bar link association;
B. minimum spanning tree module 12:
With (i j) represents connection network node V in non-directed graph GiWith network node VjLink, ω (Vi, Vj) represent this chain
The weight on road, if there is subset that T is E and for without circulation figure so that ω (T) minimum, is just referred to as the minimum spanning tree of G, then by T
Minimum spanning tree sum τ (G)=det (RR in GT), wherein det (.) represents determinant generating function,;
C. diversity module 13:
Node V is obtained by following formulaiImportance values ri:Wherein τ (G) is for be generated by minimum
The minimum spanning tree sum that tree computing module obtains;K is the quantity of the i-th row nonzero element in incidence matrix R, and Z is remove R
The new matrix obtained after the nonzero element column of i row and the i-th row, det (Zi) represent the determinant of Z;riValue the biggest,
I.e. node demonstrates the highest importance, works as riValue when take 1, then it represents that ViIt is most important network node in this network,
Once this network node is destroyed the connectedness of figure and will be destroyed dramatically, thus causes network service to interrupt;By with
Upper method calculates the importance values of all-network node respectively, concurrently sets classification thresholds T1, T2, T3, and T1 > T2 > T3, as
Really ri> T1, then be labeled as important node by this network node, if T1 is > ri> T2, then be labeled as time weight by this network node
Want node, if T2 is > ri> T3, then be labeled as intermediate node by this network node, if riLess than T3, then by this network node
It is labeled as fringe node, and the safe class of important node, secondary important node, intermediate node and fringe node is designated as respectively
Grade 1, grade 2, grade 3 and class 4;T3=0.28, fringe node number is not over the 27% of overall network nodes;
D. replacement module 14:
When network node quantity or node location change, automatically recalculate the important of each network node
Property value, and re-start safety classification and labelling;
(2) security protection configuration subsystem 20: between the network node that safe class is identical, uses based on Internet
It is mutual that Secure Internet Protocol IPSec carries out information, it is provided that the protecting information safety of channel level, and ipsec protocol should by cryptographic technique
For Internet, it is provided that what point-to-point data were transmitted includes the peace that safety certification, data encryption, access control, integrity differentiate
Full service;Use between the network node of different safety class and be operated in the application layer protocol on network layer protocol and carry out information
Alternately, the safety of application layer, based on PKI system, guarantees information file transfer, the safety shared and use by cryptographic technique,
Following cipher mode is used to be encrypted specifically:
A. for network node A that safe class is n1 and network node B that safe class is n2, when A to transmit letter to B
During breath MES, first being sent request by A to B, B returns Shu random number R D1 of Shu n1-n2, and B retains RD1;
Each RD1 is digitally signed by b.A by pre-assigned secret key, and produces random number corresponding to Shu n1-n2 Shu
RD2;By the matrix on one Shu n1-n2 Shu × Shu n1-n2 Shu rank of RD1 and RD2 composition, utilize matrix encryption technology that information MES is carried out
Encryption, is sent to B by encrypted result;Owing to the span of n1 and n2 is 1-4, easily know the net for different safety class
For network node, this matrix is 3 × 3 rank matrixes to the maximum, minimum 1 × 1 matrix, and for the identical network node of safe class
For, n1-n2=0, do not carry out the operation of matrix encryption;When safe class bypass the immediate leadership transmission progression the highest, Shu n1-n2 Shu get over
Greatly, then the exponent number of scrambled matrix is the biggest, and cryptographic security is the best, and at the same level or when bypassing the immediate leadership little, AES
Amount of calculation reduces accordingly, has stronger adaptivity.
C.B calls decryption function and is decrypted the information after encryption, obtains RD1 ' and information MES, is entered by RD1 and RD1 '
Row comparison match, if the match is successful, receives and retains MES, if inconsistent, MES return A or is abandoned;
(3) network security monitoring subsystem 30, is used for monitoring number of network node and network node location, and it includes perception mould
Block and transport module:
Described sensing module realizes by disposing a large amount of wireless senser around network node, due to network node not
Knowing self-position, described wireless senser is by accepting network node wireless signal, in conjunction with self and other sensing stations
Relation, positions network node location;
(4) cloud service subsystem 40, including cloud storage module and cloud computing module:
Described cloud storage module includes publicly-owned cloud storage submodule and private cloud storage submodule, described publicly-owned storage cloud
Module mainly stores network node ranked data, and its storage content external world can carry out free access, described private cloud storage submodule
Block mainly stores secret key and decryption function, only can be conducted interviews by the personnel of authentication;
Described cloud computing module realizes by disposing SOA server, including publicly-owned cloud computing submodule and privately owned cloud computing
Submodule, described publicly-owned cloud computing submodule provides for cloud network node safety classification subsystem and network security monitoring subsystem
Calculating and support, described privately owned cloud computing submodule provides to calculate for security protection configuration subsystem and supports, and all types of user is by eventually
End program obtains high in the clouds data.
The most one-stop comprehensive collection physical signs of patient data, it is achieved data and the collection of medical image, process,
Storage and the most instant transmission, can provide the state of an illness data of patient at any time to earth any point;Network system node divides safely
Level system 10 uses the node importance based on minimum spanning tree to calculate, can relatively accurately, amount of calculation calculate network joint smaller
The importance of point, and carries out safety classification to the node in network on this basis, T3=0.28, fringe node number not over
The 27% of overall network nodes;Information between the network node of different safety class is transmitted by security protection configuration subsystem 20
Use different encryption policys, and bypass the immediate leadership when safe class and transmit the highest (when Shu n1-n2 Shu is the biggest), then the exponent number of scrambled matrix
The biggest, cryptographic security is the best, and at the same level or when bypassing the immediate leadership little, the amount of calculation of AES reduces accordingly, has relatively
Strong adaptivity;Cloud service module is set, it is possible to save memory space, improves and calculate speed, save time cost.
Preferably, in described network security monitoring subsystem, the concrete positioning action of network node is as follows:
With network node as the center of circle, r is that radius draws circle, and the wireless senser quantity in circle that falls is n, biography that i-th is wireless
Sensor receives the signal intensity of this network node and corresponds to qi, i=1,2 ..., n;
The position of network node (x, y) as follows:
Described transport module is for being transferred to cloud service subsystem 40 by the monitoring result of sensing module.
Network security monitoring subsystem is set in this embodiment, it is possible to gather network node data, accurate positioning in time.
Application scenarios 3:
One multi-functional cloud network diagnosis and treatment system as shown in Figure 1, at high-definition camera 1, micro computer digital signal
Reason system 2, mini-ECG instrument 3, miniature B ultrasonic machine 4, miniature X-ray machine 5 and physiological parameter acquisition system 6, described micro computer cloud
Calculate digital information processing system 2 by described high-definition camera 1, mini-ECG instrument 3, miniature B ultrasonic machine 4, miniature X-ray machine 5
Obtain patient image and data with physiological parameter acquisition system 6 and be sent to cloud network 7 and carry out processing, storing and remote transmission;
Described cloud network 7 includes multiple even network node and link, and its data received can transmit to the user having permission for looking into
See.Also include security protection system, for providing security protection for described cloud network.
The present invention uses one-stop comprehensive collection physical signs of patient data, it is achieved data and the collection of medical image, processes, deposit
Storage and the most instant transmission, can provide the state of an illness data of patient at any time to earth any point.
Preferably, described physiological parameter acquisition system 6 includes that infrared thermometer, sphygomanometer and pulse counter, electronics are listened
Examine device, blood glucose meter.
Preferably, described micro computer digital information processing system 2 is used for its data obtained are formatted process, and
Described data are encrypted.
Preferably, as in figure 2 it is shown, security protection system includes cloud network node safety classification subsystem 10, security protection
Configuration subsystem 20, network security monitoring subsystem 30 and cloud service subsystem 40, described network node security classification system 10
By the importance values calculating network node, network node being divided into 4 different safe classes, described security protection configuration is sub
System 20 is according to the classification results of cloud network node safety classification subsystem 10, for network node and the joint of different safety class
Link between point provides different secure cryptographic service;Described network security monitoring subsystem 30 is used for monitoring network node shape
State, described cloud service subsystem 40 provides cloud to support for whole security protection cloud system.
(1) cloud network node safety classification subsystem 10 include incidence matrix generation module 11, minimum spanning tree module 12,
Diversity module 13 and replacement module 14:
The importance values of cloud network node safety classification subsystem 10 obtains and is based primarily upon following theory: to be measured by removing
Node assesses this node status in the network, specifically, if after node to be measured is removed, raw in the new figure obtained
The number of Cheng Shu is the fewest, then the importance values of this node is the biggest.
A, incidence matrix generation module 11:
A non-directed graph with m network node V and n bar link E, wherein V={V is represented with G1, V2... Vm, E=
{E1, E2... En, the annexation of network structure interior joint and link, the one of matrix R is represented with the incidence matrix R of a m × n
A network node in row map network, the string of R represents the value of network node and the relating attribute of corresponding sides, each in R
The value of element is 0 or 1, wherein 0 represents link and does not associates with network node, and 1 represents link associates with network node;Such as,
If the element of m row the n-th row is 1 in R, then represent m-th network node and nth bar link association;
B. minimum spanning tree module 12:
With (i j) represents connection network node V in non-directed graph GiWith network node VjLink, ω (Vi, Vj) represent this chain
The weight on road, if there is subset that T is E and for without circulation figure so that ω (T) minimum, is just referred to as the minimum spanning tree of G, then by T
Minimum spanning tree sum τ (G)=det (RR in GT), wherein det (.) represents determinant generating function,;
C. diversity module 13:
Node V is obtained by following formulaiImportance values ri:Wherein τ (G) is for be generated by minimum
The minimum spanning tree sum that tree computing module obtains;K is the quantity of the i-th row nonzero element in incidence matrix R, and Z is remove R
The new matrix obtained after the nonzero element column of i row and the i-th row, det (Zi) represent the determinant of Z;riValue the biggest,
I.e. node demonstrates the highest importance, works as riValue when take 1, then it represents that ViIt is most important network node in this network,
Once this network node is destroyed the connectedness of figure and will be destroyed dramatically, thus causes network service to interrupt;By with
Upper method calculates the importance values of all-network node respectively, concurrently sets classification thresholds T1, T2, T3, and T1 > T2 > T3, as
Really ri> T1, then be labeled as important node by this network node, if T1 is > ri> T2, then be labeled as time weight by this network node
Want node, if T2 is > ri> T3, then be labeled as intermediate node by this network node, if riLess than T3, then by this network node
It is labeled as fringe node, and the safe class of important node, secondary important node, intermediate node and fringe node is designated as respectively
Grade 1, grade 2, grade 3 and class 4;T3=0.30, fringe node number is not over the 32% of overall network nodes;
D. replacement module 14:
When network node quantity or node location change, automatically recalculate the important of each network node
Property value, and re-start safety classification and labelling;
(2) security protection configuration subsystem 20: between the network node that safe class is identical, uses based on Internet
It is mutual that Secure Internet Protocol IPSec carries out information, it is provided that the protecting information safety of channel level, and ipsec protocol should by cryptographic technique
For Internet, it is provided that what point-to-point data were transmitted includes the peace that safety certification, data encryption, access control, integrity differentiate
Full service;Use between the network node of different safety class and be operated in the application layer protocol on network layer protocol and carry out information
Alternately, the safety of application layer, based on PKI system, guarantees information file transfer, the safety shared and use by cryptographic technique,
Following cipher mode is used to be encrypted specifically:
A. for network node A that safe class is n1 and network node B that safe class is n2, when A to transmit letter to B
During breath MES, first being sent request by A to B, B returns Shu random number R D1 of Shu n1-n2, and B retains RD1;
Each RD1 is digitally signed by b.A by pre-assigned secret key, and produces random number corresponding to Shu n1-n2 Shu
RD2;By the matrix on one Shu n1-n2 Shu × Shu n1-n2 Shu rank of RD1 and RD2 composition, utilize matrix encryption technology that information MES is carried out
Encryption, is sent to B by encrypted result;Owing to the span of n1 and n2 is 1-4, easily know the net for different safety class
For network node, this matrix is 3 × 3 rank matrixes to the maximum, minimum 1 × 1 matrix, and for the identical network node of safe class
For, n1-n2=0, do not carry out the operation of matrix encryption;When safe class bypass the immediate leadership transmission progression the highest, Shu n1-n2 Shu get over
Greatly, then the exponent number of scrambled matrix is the biggest, and cryptographic security is the best, and at the same level or when bypassing the immediate leadership little, AES
Amount of calculation reduces accordingly, has stronger adaptivity.
C.B calls decryption function and is decrypted the information after encryption, obtains RD1 ' and information MES, is entered by RD1 and RD1 '
Row comparison match, if the match is successful, receives and retains MES, if inconsistent, MES return A or is abandoned;
(3) network security monitoring subsystem 30, is used for monitoring number of network node and network node location, and it includes perception mould
Block and transport module:
Described sensing module realizes by disposing a large amount of wireless senser around network node, due to network node not
Knowing self-position, described wireless senser is by accepting network node wireless signal, in conjunction with self and other sensing stations
Relation, positions network node location;
(4) cloud service subsystem 40, including cloud storage module and cloud computing module:
Described cloud storage module includes publicly-owned cloud storage submodule and private cloud storage submodule, described publicly-owned storage cloud
Module mainly stores network node ranked data, and its storage content external world can carry out free access, described private cloud storage submodule
Block mainly stores secret key and decryption function, only can be conducted interviews by the personnel of authentication;
Described cloud computing module realizes by disposing SOA server, including publicly-owned cloud computing submodule and privately owned cloud computing
Submodule, described publicly-owned cloud computing submodule provides for cloud network node safety classification subsystem and network security monitoring subsystem
Calculating and support, described privately owned cloud computing submodule provides to calculate for security protection configuration subsystem and supports, and all types of user is by eventually
End program obtains high in the clouds data.
The most one-stop comprehensive collection physical signs of patient data, it is achieved data and the collection of medical image, process,
Storage and the most instant transmission, can provide the state of an illness data of patient at any time to earth any point;Network system node divides safely
Level system 10 uses the node importance based on minimum spanning tree to calculate, can relatively accurately, amount of calculation calculate network joint smaller
The importance of point, and carries out safety classification to the node in network on this basis, T3=0.30, fringe node number not over
The 32% of overall network nodes;Information between the network node of different safety class is transmitted by security protection configuration subsystem 20
Use different encryption policys, and bypass the immediate leadership when safe class and transmit the highest (when Shu n1-n2 Shu is the biggest), then the exponent number of scrambled matrix
The biggest, cryptographic security is the best, and at the same level or when bypassing the immediate leadership little, the amount of calculation of AES reduces accordingly, has relatively
Strong adaptivity;Cloud service module is set, it is possible to save memory space, improves and calculate speed, save time cost.
Preferably, in described network security monitoring subsystem, the concrete positioning action of network node is as follows:
With network node as the center of circle, r is that radius draws circle, and the wireless senser quantity in circle that falls is n, biography that i-th is wireless
Sensor receives the signal intensity of this network node and corresponds to qi, i=1,2 ..., n;
The position of network node (x, y) as follows:
Described transport module is for being transferred to cloud service subsystem 40 by the monitoring result of sensing module.
Network security monitoring subsystem is set in this embodiment, it is possible to gather network node data, accurate positioning in time.
Application scenarios 4:
One multi-functional cloud network diagnosis and treatment system as shown in Figure 1, at high-definition camera 1, micro computer digital signal
Reason system 2, mini-ECG instrument 3, miniature B ultrasonic machine 4, miniature X-ray machine 5 and physiological parameter acquisition system 6, described micro computer cloud
Calculate digital information processing system 2 by described high-definition camera 1, mini-ECG instrument 3, miniature B ultrasonic machine 4, miniature X-ray machine 5
Obtain patient image and data with physiological parameter acquisition system 6 and be sent to cloud network 7 and carry out processing, storing and remote transmission;
Described cloud network 7 includes multiple even network node and link, and its data received can transmit to the user having permission for looking into
See.Also include security protection system, for providing security protection for described cloud network.
The present invention uses one-stop comprehensive collection physical signs of patient data, it is achieved data and the collection of medical image, processes, deposit
Storage and the most instant transmission, can provide the state of an illness data of patient at any time to earth any point.
Preferably, described physiological parameter acquisition system 6 includes that infrared thermometer, sphygomanometer and pulse counter, electronics are listened
Examine device, blood glucose meter.
Preferably, described micro computer digital information processing system 2 is used for its data obtained are formatted process, and
Described data are encrypted.
Preferably, as in figure 2 it is shown, security protection system includes cloud network node safety classification subsystem 10, security protection
Configuration subsystem 20, network security monitoring subsystem 30 and cloud service subsystem 40, described network node security classification system 10
By the importance values calculating network node, network node being divided into 4 different safe classes, described security protection configuration is sub
System 20 is according to the classification results of cloud network node safety classification subsystem 10, for network node and the joint of different safety class
Link between point provides different secure cryptographic service;Described network security monitoring subsystem 30 is used for monitoring network node shape
State, described cloud service subsystem 40 provides cloud to support for whole security protection cloud system.
(1) cloud network node safety classification subsystem 10 include incidence matrix generation module 11, minimum spanning tree module 12,
Diversity module 13 and replacement module 14:
The importance values of cloud network node safety classification subsystem 10 obtains and is based primarily upon following theory: to be measured by removing
Node assesses this node status in the network, specifically, if after node to be measured is removed, raw in the new figure obtained
The number of Cheng Shu is the fewest, then the importance values of this node is the biggest.
A, incidence matrix generation module 11:
A non-directed graph with m network node V and n bar link E, wherein V={V is represented with G1, V2... Vm, E=
{E1, E2... En, the annexation of network structure interior joint and link, the one of matrix R is represented with the incidence matrix R of a m × n
A network node in row map network, the string of R represents the value of network node and the relating attribute of corresponding sides, each in R
The value of element is 0 or 1, wherein 0 represents link and does not associates with network node, and 1 represents link associates with network node;Such as,
If the element of m row the n-th row is 1 in R, then represent m-th network node and nth bar link association;
B. minimum spanning tree module 12:
With (i j) represents connection network node V in non-directed graph GiWith network node VjLink, ω (Vi, Vj) represent this chain
The weight on road, if there is subset that T is E and for without circulation figure so that ω (T) minimum, is just referred to as the minimum spanning tree of G, then by T
Minimum spanning tree sum τ (G)=det (RR in GT), wherein det (.) represents determinant generating function,;
C. diversity module 13:
Node V is obtained by following formulaiImportance values ri:Wherein τ (G) is for be generated by minimum
The minimum spanning tree sum that tree computing module obtains;K is the quantity of the i-th row nonzero element in incidence matrix R, and Z is remove R
The new matrix obtained after the nonzero element column of i row and the i-th row, det (Zi) represent the determinant of Z;riValue the biggest,
I.e. node demonstrates the highest importance, works as riValue when take 1, then it represents that ViIt is most important network node in this network,
Once this network node is destroyed the connectedness of figure and will be destroyed dramatically, thus causes network service to interrupt;By with
Upper method calculates the importance values of all-network node respectively, concurrently sets classification thresholds T1, T2, T3, and T1 > T2 > T3, as
Really ri> T1, then be labeled as important node by this network node, if T1 is > ri> T2, then be labeled as time weight by this network node
Want node, if T2 is > ri> T3, then be labeled as intermediate node by this network node, if riLess than T3, then by this network node
It is labeled as fringe node, and the safe class of important node, secondary important node, intermediate node and fringe node is designated as respectively
Grade 1, grade 2, grade 3 and class 4;T3=0.33, fringe node number is not over the 35% of overall network nodes;
D. replacement module 14:
When network node quantity or node location change, automatically recalculate the important of each network node
Property value, and re-start safety classification and labelling;
(2) security protection configuration subsystem 20: between the network node that safe class is identical, uses based on Internet
It is mutual that Secure Internet Protocol IPSec carries out information, it is provided that the protecting information safety of channel level, and ipsec protocol should by cryptographic technique
For Internet, it is provided that what point-to-point data were transmitted includes the peace that safety certification, data encryption, access control, integrity differentiate
Full service;Use between the network node of different safety class and be operated in the application layer protocol on network layer protocol and carry out information
Alternately, the safety of application layer, based on PKI system, guarantees information file transfer, the safety shared and use by cryptographic technique,
Following cipher mode is used to be encrypted specifically:
A. for network node A that safe class is n1 and network node B that safe class is n2, when A to transmit letter to B
During breath MES, first being sent request by A to B, B returns Shu random number R D1 of Shu n1-n2, and B retains RD1;
Each RD1 is digitally signed by b.A by pre-assigned secret key, and produces random number corresponding to Shu n1-n2 Shu
RD2;By the matrix on one Shu n1-n2 Shu × Shu n1-n2 Shu rank of RD1 and RD2 composition, utilize matrix encryption technology that information MES is carried out
Encryption, is sent to B by encrypted result;Owing to the span of n1 and n2 is 1-4, easily know the net for different safety class
For network node, this matrix is 3 × 3 rank matrixes to the maximum, minimum 1 × 1 matrix, and for the identical network node of safe class
For, n1-n2=0, do not carry out the operation of matrix encryption;When safe class bypass the immediate leadership transmission progression the highest, Shu n1-n2 Shu get over
Greatly, then the exponent number of scrambled matrix is the biggest, and cryptographic security is the best, and at the same level or when bypassing the immediate leadership little, AES
Amount of calculation reduces accordingly, has stronger adaptivity.
C.B calls decryption function and is decrypted the information after encryption, obtains RD1 ' and information MES, is entered by RD1 and RD1 '
Row comparison match, if the match is successful, receives and retains MES, if inconsistent, MES return A or is abandoned;
(3) network security monitoring subsystem 30, is used for monitoring number of network node and network node location, and it includes perception mould
Block and transport module:
Described sensing module realizes by disposing a large amount of wireless senser around network node, due to network node not
Knowing self-position, described wireless senser is by accepting network node wireless signal, in conjunction with self and other sensing stations
Relation, positions network node location;
(4) cloud service subsystem 40, including cloud storage module and cloud computing module:
Described cloud storage module includes publicly-owned cloud storage submodule and private cloud storage submodule, described publicly-owned storage cloud
Module mainly stores network node ranked data, and its storage content external world can carry out free access, described private cloud storage submodule
Block mainly stores secret key and decryption function, only can be conducted interviews by the personnel of authentication;
Described cloud computing module realizes by disposing SOA server, including publicly-owned cloud computing submodule and privately owned cloud computing
Submodule, described publicly-owned cloud computing submodule provides for cloud network node safety classification subsystem and network security monitoring subsystem
Calculating and support, described privately owned cloud computing submodule provides to calculate for security protection configuration subsystem and supports, and all types of user is by eventually
End program obtains high in the clouds data.
The most one-stop comprehensive collection physical signs of patient data, it is achieved data and the collection of medical image, process,
Storage and the most instant transmission, can provide the state of an illness data of patient at any time to earth any point;Network system node divides safely
Level system 10 uses the node importance based on minimum spanning tree to calculate, can relatively accurately, amount of calculation calculate network joint smaller
The importance of point, and carries out safety classification to the node in network on this basis, T3=0.33, fringe node number not over
The 35% of overall network nodes;Information between the network node of different safety class is transmitted by security protection configuration subsystem 20
Use different encryption policys, and bypass the immediate leadership when safe class and transmit the highest (when Shu n1-n2 Shu is the biggest), then the exponent number of scrambled matrix
The biggest, cryptographic security is the best, and at the same level or when bypassing the immediate leadership little, the amount of calculation of AES reduces accordingly, has relatively
Strong adaptivity;Cloud service module is set, it is possible to save memory space, improves and calculate speed, save time cost.
Preferably, in described network security monitoring subsystem, the concrete positioning action of network node is as follows:
With network node as the center of circle, r is that radius draws circle, and the wireless senser quantity in circle that falls is n, biography that i-th is wireless
Sensor receives the signal intensity of this network node and corresponds to qi, i=1,2 ..., n;
The position of network node (x, y) as follows:
Described transport module is for being transferred to cloud service subsystem 40 by the monitoring result of sensing module.
Network security monitoring subsystem is set in this embodiment, it is possible to gather network node data, accurate positioning in time.
Application scenarios 5:
One multi-functional cloud network diagnosis and treatment system as shown in Figure 1, at high-definition camera 1, micro computer digital signal
Reason system 2, mini-ECG instrument 3, miniature B ultrasonic machine 4, miniature X-ray machine 5 and physiological parameter acquisition system 6, described micro computer cloud
Calculate digital information processing system 2 by described high-definition camera 1, mini-ECG instrument 3, miniature B ultrasonic machine 4, miniature X-ray machine 5
Obtain patient image and data with physiological parameter acquisition system 6 and be sent to cloud network 7 and carry out processing, storing and remote transmission;
Described cloud network 7 includes multiple even network node and link, and its data received can transmit to the user having permission for looking into
See.Also include security protection system, for providing security protection for described cloud network.
The present invention uses one-stop comprehensive collection physical signs of patient data, it is achieved data and the collection of medical image, processes, deposit
Storage and the most instant transmission, can provide the state of an illness data of patient at any time to earth any point.
Preferably, described physiological parameter acquisition system 6 includes that infrared thermometer, sphygomanometer and pulse counter, electronics are listened
Examine device, blood glucose meter.
Preferably, described micro computer digital information processing system 2 is used for its data obtained are formatted process, and
Described data are encrypted.
Preferably, as in figure 2 it is shown, security protection system includes cloud network node safety classification subsystem 10, security protection
Configuration subsystem 20, network security monitoring subsystem 30 and cloud service subsystem 40, described network node security classification system 10
By the importance values calculating network node, network node being divided into 4 different safe classes, described security protection configuration is sub
System 20 is according to the classification results of cloud network node safety classification subsystem 10, for network node and the joint of different safety class
Link between point provides different secure cryptographic service;Described network security monitoring subsystem 30 is used for monitoring network node shape
State, described cloud service subsystem 40 provides cloud to support for whole security protection cloud system.
(1) cloud network node safety classification subsystem 10 include incidence matrix generation module 11, minimum spanning tree module 12,
Diversity module 13 and replacement module 14:
The importance values of cloud network node safety classification subsystem 10 obtains and is based primarily upon following theory: to be measured by removing
Node assesses this node status in the network, specifically, if after node to be measured is removed, raw in the new figure obtained
The number of Cheng Shu is the fewest, then the importance values of this node is the biggest.
A, incidence matrix generation module 11:
A non-directed graph with m network node V and n bar link E, wherein V={V is represented with G1, V2... Vm, E=
{E1, E2... En, the annexation of network structure interior joint and link, the one of matrix R is represented with the incidence matrix R of a m × n
A network node in row map network, the string of R represents the value of network node and the relating attribute of corresponding sides, each in R
The value of element is 0 or 1, wherein 0 represents link and does not associates with network node, and 1 represents link associates with network node;Such as,
If the element of m row the n-th row is 1 in R, then represent m-th network node and nth bar link association;
B. minimum spanning tree module 12:
With (i j) represents connection network node V in non-directed graph GiWith network node VjLink, ω (Vi, Vj) represent this chain
The weight on road, if there is subset that T is E and for without circulation figure so that ω (T) minimum, is just referred to as the minimum spanning tree of G, then by T
Minimum spanning tree sum τ (G)=det (RR in GT), wherein det (.) represents determinant generating function,;
C. diversity module 13:
Node V is obtained by following formulaiImportance values ri:Wherein τ (G) is for be generated by minimum
The minimum spanning tree sum that tree computing module obtains;K is the quantity of the i-th row nonzero element in incidence matrix R, and Z is remove R
The new matrix obtained after the nonzero element column of i row and the i-th row, det (Zi) represent the determinant of Z;riValue the biggest,
I.e. node demonstrates the highest importance, works as riValue when take 1, then it represents that ViIt is most important network node in this network,
Once this network node is destroyed the connectedness of figure and will be destroyed dramatically, thus causes network service to interrupt;By with
Upper method calculates the importance values of all-network node respectively, concurrently sets classification thresholds T1, T2, T3, and T1 > T2 > T3, as
Really ri> T1, then be labeled as important node by this network node, if T1 is > ri> T2, then be labeled as time weight by this network node
Want node, if T2 is > ri> T3, then be labeled as intermediate node by this network node, if riLess than T3, then by this network node
It is labeled as fringe node, and the safe class of important node, secondary important node, intermediate node and fringe node is designated as respectively
Grade 1, grade 2, grade 3 and class 4;T3=0.35, fringe node number is not over the 37% of overall network nodes;
D. replacement module 14:
When network node quantity or node location change, automatically recalculate the important of each network node
Property value, and re-start safety classification and labelling;
(2) security protection configuration subsystem 20: between the network node that safe class is identical, uses based on Internet
It is mutual that Secure Internet Protocol IPSec carries out information, it is provided that the protecting information safety of channel level, and ipsec protocol should by cryptographic technique
For Internet, it is provided that what point-to-point data were transmitted includes the peace that safety certification, data encryption, access control, integrity differentiate
Full service;Use between the network node of different safety class and be operated in the application layer protocol on network layer protocol and carry out information
Alternately, the safety of application layer, based on PKI system, guarantees information file transfer, the safety shared and use by cryptographic technique,
Following cipher mode is used to be encrypted specifically:
A. for network node A that safe class is n1 and network node B that safe class is n2, when A to transmit letter to B
During breath MES, first being sent request by A to B, B returns Shu random number R D1 of Shu n1-n2, and B retains RD1;
Each RD1 is digitally signed by b.A by pre-assigned secret key, and produces random number corresponding to Shu n1-n2 Shu
RD2;By the matrix on one Shu n1-n2 Shu × Shu n1-n2 Shu rank of RD1 and RD2 composition, utilize matrix encryption technology that information MES is carried out
Encryption, is sent to B by encrypted result;Owing to the span of n1 and n2 is 1-4, easily know the net for different safety class
For network node, this matrix is 3 × 3 rank matrixes to the maximum, minimum 1 × 1 matrix, and for the identical network node of safe class
For, n1-n2=0, do not carry out the operation of matrix encryption;When safe class bypass the immediate leadership transmission progression the highest, Shu n1-n2 Shu get over
Greatly, then the exponent number of scrambled matrix is the biggest, and cryptographic security is the best, and at the same level or when bypassing the immediate leadership little, AES
Amount of calculation reduces accordingly, has stronger adaptivity.
C.B calls decryption function and is decrypted the information after encryption, obtains RD1 ' and information MES, is entered by RD1 and RD1 '
Row comparison match, if the match is successful, receives and retains MES, if inconsistent, MES return A or is abandoned;
(3) network security monitoring subsystem 30, is used for monitoring number of network node and network node location, and it includes perception mould
Block and transport module:
Described sensing module realizes by disposing a large amount of wireless senser around network node, due to network node not
Knowing self-position, described wireless senser is by accepting network node wireless signal, in conjunction with self and other sensing stations
Relation, positions network node location;
(4) cloud service subsystem 40, including cloud storage module and cloud computing module:
Described cloud storage module includes publicly-owned cloud storage submodule and private cloud storage submodule, described publicly-owned storage cloud
Module mainly stores network node ranked data, and its storage content external world can carry out free access, described private cloud storage submodule
Block mainly stores secret key and decryption function, only can be conducted interviews by the personnel of authentication;
Described cloud computing module realizes by disposing SOA server, including publicly-owned cloud computing submodule and privately owned cloud computing
Submodule, described publicly-owned cloud computing submodule provides for cloud network node safety classification subsystem and network security monitoring subsystem
Calculating and support, described privately owned cloud computing submodule provides to calculate for security protection configuration subsystem and supports, and all types of user is by eventually
End program obtains high in the clouds data.
The most one-stop comprehensive collection physical signs of patient data, it is achieved data and the collection of medical image, process,
Storage and the most instant transmission, can provide the state of an illness data of patient at any time to earth any point;Network system node divides safely
Level system 10 uses the node importance based on minimum spanning tree to calculate, can relatively accurately, amount of calculation calculate network joint smaller
The importance of point, and carries out safety classification to the node in network on this basis, T3=0.35, fringe node number not over
The 37% of overall network nodes;Information between the network node of different safety class is transmitted by security protection configuration subsystem 20
Use different encryption policys, and bypass the immediate leadership when safe class and transmit the highest (when Shu n1-n2 Shu is the biggest), then the exponent number of scrambled matrix
The biggest, cryptographic security is the best, and at the same level or when bypassing the immediate leadership little, the amount of calculation of AES reduces accordingly, has relatively
Strong adaptivity;Cloud service module is set, it is possible to save memory space, improves and calculate speed, save time cost.
Preferably, in described network security monitoring subsystem, the concrete positioning action of network node is as follows:
With network node as the center of circle, r is that radius draws circle, and the wireless senser quantity in circle that falls is n, biography that i-th is wireless
Sensor receives the signal intensity of this network node and corresponds to qi, i=1,2 ..., n;
The position of network node (x, y) as follows:
Described transport module is for being transferred to cloud service subsystem 40 by the monitoring result of sensing module.
Network security monitoring subsystem is set in this embodiment, it is possible to gather network node data, accurate positioning in time.
Last it should be noted that, above example is only in order to illustrate technical scheme, rather than the present invention is protected
Protecting the restriction of scope, although having made to explain to the present invention with reference to preferred embodiment, those of ordinary skill in the art should
Work as understanding, technical scheme can be modified or equivalent, without deviating from the reality of technical solution of the present invention
Matter and scope.
Claims (3)
1. a multi-functional cloud network diagnosis and treatment system, is characterized in that, including high-definition camera, micro computer Digital Signal Processing system
System, mini-ECG instrument, miniature B ultrasonic machine, miniature X-ray machine and physiological parameter acquisition system, described micro computer cloud computing numeral
Signal processing system is by described high-definition camera, mini-ECG instrument, miniature B ultrasonic machine, miniature X-ray machine and physiological parameter acquisition
System obtains patient image and data and is sent to cloud network and carries out processing, storing and remote transmission;Described cloud network includes many
Individual even network node and link, its data received can transmit to the user having permission for checking;Also include security protection
System, for providing security protection for described cloud network.
One the most according to claim 1 multi-functional cloud network diagnosis and treatment system, is characterized in that, described physiological parameter acquisition system
System includes infrared thermometer, sphygomanometer and pulse counter, electronic stethoscope, blood glucose meter.
One the most according to claim 2 multi-functional cloud network diagnosis and treatment system, is characterized in that, described micro computer digital signal
Processing system is for formatting process to its data obtained, and is encrypted described data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610556830.1A CN106202941A (en) | 2016-07-13 | 2016-07-13 | A kind of multi-functional cloud network diagnosis and treatment system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610556830.1A CN106202941A (en) | 2016-07-13 | 2016-07-13 | A kind of multi-functional cloud network diagnosis and treatment system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106202941A true CN106202941A (en) | 2016-12-07 |
Family
ID=57475749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610556830.1A Pending CN106202941A (en) | 2016-07-13 | 2016-07-13 | A kind of multi-functional cloud network diagnosis and treatment system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106202941A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202362786U (en) * | 2011-12-02 | 2012-08-01 | 毕胜 | Remote intelligent multifunctional cloud network diagnosis workbench |
CN103164599A (en) * | 2011-12-10 | 2013-06-19 | 西安百利信息科技有限公司 | Liver cirrhosis remote consultation system based on abdominal computed tomography (CT) image transmission |
CN103258137A (en) * | 2013-05-28 | 2013-08-21 | 美合实业(苏州)有限公司 | Long-distance inquiring method |
CN103324831A (en) * | 2013-05-28 | 2013-09-25 | 美合实业(苏州)有限公司 | Remote interrogation system |
CN103338224A (en) * | 2013-05-28 | 2013-10-02 | 美合实业(苏州)有限公司 | Central diagnostic system of medical institution |
EP2920732A1 (en) * | 2012-11-14 | 2015-09-23 | CompuGroup Medical AG | Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method |
CN105337971A (en) * | 2015-10-20 | 2016-02-17 | 上海电机学院 | Electric power information system cloud safety guarantee system and implementation method thereof |
US20160063187A1 (en) * | 2014-08-29 | 2016-03-03 | Atigeo Corporation | Automated system for handling files containing protected health information |
-
2016
- 2016-07-13 CN CN201610556830.1A patent/CN106202941A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202362786U (en) * | 2011-12-02 | 2012-08-01 | 毕胜 | Remote intelligent multifunctional cloud network diagnosis workbench |
CN103164599A (en) * | 2011-12-10 | 2013-06-19 | 西安百利信息科技有限公司 | Liver cirrhosis remote consultation system based on abdominal computed tomography (CT) image transmission |
EP2920732A1 (en) * | 2012-11-14 | 2015-09-23 | CompuGroup Medical AG | Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method |
CN103258137A (en) * | 2013-05-28 | 2013-08-21 | 美合实业(苏州)有限公司 | Long-distance inquiring method |
CN103324831A (en) * | 2013-05-28 | 2013-09-25 | 美合实业(苏州)有限公司 | Remote interrogation system |
CN103338224A (en) * | 2013-05-28 | 2013-10-02 | 美合实业(苏州)有限公司 | Central diagnostic system of medical institution |
US20160063187A1 (en) * | 2014-08-29 | 2016-03-03 | Atigeo Corporation | Automated system for handling files containing protected health information |
CN105337971A (en) * | 2015-10-20 | 2016-02-17 | 上海电机学院 | Electric power information system cloud safety guarantee system and implementation method thereof |
Non-Patent Citations (2)
Title |
---|
孟群 等;: "《医疗物联网的发展现状及关键技术探索》", 《中国卫生信息管理杂志》 * |
王永建 等;: "《基于云计算的智慧政务安全体系设计研究》", 《通信技术》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pasha et al. | Framework for E-health systems in IoT-based environments | |
WO2018176484A1 (en) | Method and apparatus for processing medical image transmission data, and electronic device | |
Gonçalves et al. | Security architecture for mobile e-health applications in medication control | |
Uke | Healthcare 4.0 enabled lightweight security provisions for medical data processing | |
Shankar et al. | Secure medical data transmission by using ECC with mutual authentication in WSNs | |
CN106131018B (en) | A kind of doctors and patients' information management system based on network security | |
CN107242854A (en) | A kind of intelligent medical system based on secure communication | |
Sha et al. | Data quality challenges in cyber-physical systems | |
Quasim et al. | A blockchain framework for secure electronic health records in healthcare industry | |
CN111083150A (en) | Identity authentication and data security transmission method under medical sensor network environment | |
CN106529130A (en) | Electronic medical records encrypting and checking system and method in medical information system | |
Boyinbode et al. | CloudeMR: a cloud based electronic medical record system | |
Sutradhar et al. | A dynamic step-wise tiny encryption algorithm with fruit fly optimization for quality of service improvement in healthcare | |
US11868506B2 (en) | Systems and methods for implementing a secure database for storing a patient operational longitudinal record | |
CN103971063A (en) | Transfer medium for security-critical medical image contents | |
El Zouka | An authentication scheme for wireless healthcare monitoring sensor network | |
Chen et al. | Hadoop-based healthcare information system design and wireless security communication implementation | |
CN112259238A (en) | Electronic device, disease type detection method, apparatus, and medium | |
Gunanidhi et al. | An experimental analysis of blockchain enabled intelligent healthcare monitoring system using IoT based deep learning principles | |
CN106202941A (en) | A kind of multi-functional cloud network diagnosis and treatment system | |
CN112233764A (en) | AIDS management cloud platform system and intelligent medicine box | |
Nair et al. | Smart secure system for human health monitoring | |
Nikam et al. | Implementation of secure sharing of PHR’s with IoMT cloud | |
CN202750117U (en) | SD cipher card based internet of things health medical service system | |
CN117150562B (en) | Blood glucose monitoring method, device, equipment and storage medium based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161207 |
|
RJ01 | Rejection of invention patent application after publication |