CN108573737A - A kind of storage method of electronic health record, device, equipment and storage medium - Google Patents
A kind of storage method of electronic health record, device, equipment and storage medium Download PDFInfo
- Publication number
- CN108573737A CN108573737A CN201711424940.3A CN201711424940A CN108573737A CN 108573737 A CN108573737 A CN 108573737A CN 201711424940 A CN201711424940 A CN 201711424940A CN 108573737 A CN108573737 A CN 108573737A
- Authority
- CN
- China
- Prior art keywords
- file
- target
- cryptographic hash
- target data
- data file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
- Medical Treatment And Welfare Office Work (AREA)
Abstract
An embodiment of the present invention provides a kind of storage method of electronic health record, device, equipment and storage medium, this method belongs to big data technical field of memory, including:The file number of the electronic health record of generation is recorded on the file of establishment, target case cover files are obtained, obtains the first cryptographic Hash, invocation target block catenary system stores the first cryptographic Hash, and within the storage system by the storage of target case cover files;Obtain storage location of first cryptographic Hash in target block catenary system, obtain the instruction action for obtaining i-th of target data file, to update electronic health record, after obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, target back cover file is generated according to the instruction of winding up the case of acquisition, obtains the second cryptographic Hash, invocation target block catenary system stores the second cryptographic Hash, and within the storage system by the storage of target back cover file.Method provided in this embodiment avoids the behavior that electronic health record data are tampered.
Description
Technical field
The present invention relates to big data technical field of memory, more particularly to a kind of storage method of electronic health record, device, set
Standby and storage medium.
Background technology
Electronic health record refers to medical worker during curative activity, word that use information system generates, symbol, figure
The digital informations such as table, figure, number, image, and can realize storage, management, transmission and the medical records reappeared, it is case history
A kind of record form, including door (urgency) are diagnosed a disease and are gone through and inpatient cases.
According to code requirement, electronic medical record system should be operating personnel and provides proprietary identity and means of identification,
And corresponding authority is set.The use of operating personnel's identity proprietary to itself is responsible for.Meanwhile medical institutions should be patient
Electronic health record assigns unique patient's identity, to ensure the authenticity, consistency, company of patient basis and its medical records
Continuous property, integrality.In addition, examining electronic health record by the door (urgency) of medical institutions' keeping, the holding time is medical from patient's last time
From no less than 15 years;In hospital the electronic health record holding time from patient last time leave hospital from no less than 30 years.
Currently, planning commission's (full name is defended in electronic medical record system use:National health and Family Planning Committee) centralized purchasing,
Data are then stored directly in the computer room for defending planning commission's management or report daily to defending planning commission.The scheme of this centralization data storage,
Still it is difficult to avoid that the behavior for even finding data tampering.
Invention content
In view of this, the embodiment of the present invention be designed to provide a kind of storage method of electronic health record, device, equipment and
Storage medium, the behavior being tampered to avoid electronic health record data.
Specific technical solution is as follows:
The file number of the electronic health record of generation is recorded on the file of establishment, obtains target case cover files, wherein described
File number is that the unique encodings of the electronic health record are generated according to predetermined manner, and the target case cover files are for creating initial electricity
The file of sub- case history;
The first cryptographic Hash for obtaining the target case cover files calls preset target block catenary system storage described first
Cryptographic Hash, and the target case cover files are stored in preset storage system;
Obtain storage location of first cryptographic Hash in the target block catenary system, wherein the storage location
It is uniquely determined by block number and transaction coding;
The instruction action for obtaining i-th of target data file is obtained, to update the electronic health record, wherein i is mesh
The serial number of data file is marked, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein described
Target back cover file is for forbidding updating target data file to the electronic health record;
The second cryptographic Hash for obtaining the target back cover file calls preset target block catenary system storage described second
Cryptographic Hash, and the target back cover file is stored in preset storage system.
Further, the instruction action obtained for obtaining i-th of target data file, to update the electronics disease
It goes through, including:
Judge whether the instruction action obtained includes newly-increased instruction or revision instruction, wherein the newly-increased instruction for for
The instruction of i-th of target data file is obtained, the revision instruction is for being obtained after being revised to former target data file
I-th of target data file instruction, the original target data file serial number 1 ..., the corresponding institute of any serial number in i-1
The target data file that need to be revised;
If the instruction action obtained is newly-increased instruction, it is corresponding with the target data file to obtain i-th of target data file
The i-th cryptographic Hash preset target block catenary system is called according to the storage location of the file number and first cryptographic Hash
I-th cryptographic Hash is stored, and i-th of target data file is stored in preset storage system;
If the instruction action obtained is revision instruction, it is corresponding with the target data file to obtain i-th of target data file
The i-th cryptographic Hash;According to the file number and the former target data file, obtains former target data file and correspond to cryptographic Hash
Storage location calls preset target block catenary system to store i-th cryptographic Hash, and will according to acquired storage location
I-th of target data file is stored in preset storage system;Wherein, i-th of target data file of acquisition is revised
It is to carry out the file of revision acquisition to former target data file by the way of additional Description of Revision, and revised i-th of mesh
Mark data file quote the former target data file target block catenary system storage location.
Further, in i-th of target data file of the acquisition the i-th cryptographic Hash corresponding with the target data file,
According to the storage location of the file number and first cryptographic Hash, preset target block catenary system storage described i-th is called
Cryptographic Hash, and after i-th of target data file is stored in preset storage system, further include:
Obtain storage location of i-th cryptographic Hash in the target block catenary system.
Further, the target case cover files, target back cover file are to record the first mesh with preset coded format
Information is marked, the first object information includes file number, file type, instruction action and file content, and the file type is
Target case cover files, target back cover file.
Further, the target data file is to record the second target information with preset coded format, described the
Two target informations include file number, file type, name file, instruction action and file content, and the file type further includes
Target data file.
Further, the coded format includes XML coded formats, JSON coded formats, pure file format or binary system
Format.
Further, the target data file include first page of illness case file, progress note file, nursing history file,
Examine checklist or discharge record;
Described instruction action includes newly-increased instruction, signature instruction or revision instruction, wherein the signature instruction for mechanism or
The instruction that operator signs to target data file;
The file content includes data content, generates the unique identifier of the mechanism coding and patient of electronic health record.
Further, preset target block catenary system is called to store i-th cryptographic Hash described, and by described i-th
After a target data file is stored in preset storage system, further include:
Obtain storage location of i-th cryptographic Hash in the target block catenary system.
Further, in second cryptographic Hash for obtaining the target back cover file, preset target block chain is called
System stores second cryptographic Hash, and after the target back cover file is stored in preset storage system, further includes:
Obtain storage location of second cryptographic Hash in the target block catenary system.
Further, in second cryptographic Hash for obtaining the target back cover file, preset target block chain is called
System stores second cryptographic Hash, and after the target back cover file is stored in preset storage system, further includes:
It is instructed according to the signature of reception, coding, the operator of operator's institutional affiliation is obtained from preset configuration file
Corresponding coding;
According to the corresponding coding of the operator, operator's i-th of target data file of preset first key pair is utilized
It signs;
According to the coding of operator's institutional affiliation, using preset second key of operator's institutional affiliation respectively to described
I target data file and the signature of operator are signed;
I-th of target data is signed documents and is submitted to preset storage system, wherein i-th of target data label
Administration's file is i-th of target data file after signature;
The jth cryptographic Hash that i-th of target data signs documents is obtained, is called described in preset target block catenary system storage
Jth cryptographic Hash, wherein j is that i-th of target signs documents the serial number of corresponding cryptographic Hash, and i≤M, M are the total of target data file
Number.
Further, the jth cryptographic Hash to sign documents in i-th of target data of the acquisition, calls preset target area
After block catenary system stores the jth cryptographic Hash, further include:
File destination is successively read according to timestamp from preset storage system and target signs documents, wherein described
File destination is target case cover files, i-th of target data file or target back cover file, and it is i-th that the target, which signs documents,
File after a target data file signature;
For each file destination, verify whether the file destination is judged as effective document;
Whether if the file destination is effective document, it is effective text to verify the corresponding target of the file destination and sign documents
Part;
If the target signs documents as effective document, which is signed documents with the target and is associated.
Further, described to be directed to each file destination, it verifies whether the file destination is judged as effective document, wraps
It includes:
For each file destination, judge whether the corresponding mechanism coding of the file destination is consistent with authority signature;
If the corresponding mechanism coding of the file destination is consistent with authority signature, judge that the corresponding operator of the file destination compiles
Whether code signs consistent with operator;
If the corresponding operator's coding of the file destination is consistent with operator's signature, judge that the file destination is effectively literary
Part.
Further, whether it is effective document that the corresponding target of described verification file destination signs documents, including:
Judge whether the corresponding target of the file destination corresponding mechanism coding that signs documents is consistent with authority signature;
If the target signs documents, corresponding mechanism coding is consistent with authority signature, and it is corresponding to judge that the target signs documents
Whether operator encodes consistent with operator's signature;
If the target signs documents, corresponding operator coding is consistent with operator's signature, judge the target sign documents for
Effective document.
A kind of storage method of the electronic health record based on block chain is applied to target block catenary system, the method includes:
The first cryptographic Hash obtained from client is stored, and by the storage location of first cryptographic Hash of acquisition
It is sent in client, wherein first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, the target
Case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating just
The file of beginning electronic health record, the file number are that the unique encodings of the electronic health record are generated according to predetermined manner, the storage
Position is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of i-th cryptographic Hash of acquisition is sent out
It is sent in client, wherein i-th cryptographic Hash is that client is dynamic according to the instruction for obtaining i-th of target data file
Make the cryptographic Hash of i-th of the target data file obtained, i is the serial number of target data file, and i is natural number, and i≤M, M are mesh
Mark the sum of data file;
The second cryptographic Hash obtained from client is stored, and by the storage location of second cryptographic Hash of acquisition
It is sent in client, wherein second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, the target
Back cover file is for forbidding updating target data file to the electronic health record.
Further, the first cryptographic Hash obtained from client is stored described, and by described the first of acquisition
After the storage location of cryptographic Hash is sent in client, the method further includes:
The jth cryptographic Hash obtained from client is stored, and the storage location of the jth cryptographic Hash of acquisition is sent out
It is sent in client, wherein the jth cryptographic Hash is the cryptographic Hash that i-th of target data signs documents, i-th of target
Data signing file is i-th of target data file after signature, and j is that i-th of target signs documents the serial number of corresponding cryptographic Hash.
Further, the first cryptographic Hash obtained from client is stored described, and by described the first of acquisition
Before the storage location of cryptographic Hash is sent in client, the method further includes:
It verifies the first prewired physical equipment key and whether preset first key is consistent, wherein first physics
Device keys are the corresponding physical equipment key of a node, and first key is close with the physical equipment cipher key match of the node
Key;
If the first physical equipment key is consistent with the first key, the private key label of first object key devices are called
Name interface;
It verifies the second prewired physical equipment key or preset-key and whether preset second key is consistent;Wherein, institute
It is the physical equipment key that operating personnel are equipped with to state the second physical equipment key, and the key of each operating personnel is different, first
Key is the key for the physical equipment cipher key match being equipped with the operating personnel;
If the second physical equipment key or preset-key and second key agreement, call the second target cipher key to set
Standby private key signature interface.
Further, it if in the second physical equipment key or preset-key and second key agreement, adjusts
After private key signature interface with the second target cipher key equipment, further include:
Judge submit file destination cryptographic Hash transaction mechanism digital signature and operator's digital signature respectively whether with section
The preset key of point and the preset cipher key match of operator;
If the mechanism digital signature and operator's digital signature of file destination cryptographic Hash transaction are preset with node respectively
Whether key and the preset cipher key match of operator, the storage location where judging the file destination cryptographic Hash are correct, wherein mesh
Mark file is target case cover files, target back cover file or i-th of target data file.
If correct, the file destination is received, and the file destination is determined as effective document.
Further, the second cryptographic Hash obtained from client is stored described, and by described the second of acquisition
Before the storage location of cryptographic Hash is sent in client, further include:
For each node, judge whether the node is specified contract node;
If specified contract node, the precondition that preset intelligent contract performer calls all effective contracts is triggered,
Judge whether conditions present is consistent with default intelligence and the default precondition of about n, wherein n is the coding of intelligent contract;
If the conditions present is consistent with the intelligence and the default precondition of about n, instruction contract node triggering executes
Default shell script.
A kind of storage device of the electronic health record based on block chain, is applied to client, and described device includes:
Case cover files generation module, the file for the file number of the electronic health record of generation to be recorded in establishment obtain
Target case cover files, wherein the file number is that the unique encodings of the electronic health record are generated according to predetermined manner, the target
Case cover files are used to create the file of initiating electron case history;
First cryptographic Hash acquisition module, the first cryptographic Hash for obtaining the target case cover files, calls preset mesh
It marks block catenary system and stores first cryptographic Hash, and the target case cover files are stored in preset storage system;
First storage location acquisition module, for obtaining first cryptographic Hash depositing in the target block catenary system
Storage space is set, wherein the storage location is uniquely determined by block number and transaction coding;
Electronic health record update module, for obtaining the instruction action for obtaining i-th of target data file, to update
State electronic health record, wherein i is the serial number of target data file, and i is natural number, and i≤M, M are the sum of target data file;
Case cover files generation module, for after obtaining M target data file, mesh to be generated according to the instruction of winding up the case of acquisition
Mark back cover file, wherein the target back cover file is for forbidding updating target data file to the electronic health record;
Second cryptographic Hash acquisition module, the second cryptographic Hash for obtaining the target back cover file, calls preset mesh
It marks block catenary system and stores second cryptographic Hash, and the target back cover file is stored in preset storage system.
A kind of storage device of the electronic health record based on block chain, is applied to target block catenary system, and described device includes:
First acquisition module, for being stored to the first cryptographic Hash obtained from client, and by described the of acquisition
The storage location of one cryptographic Hash is sent in client, wherein first cryptographic Hash is the target cover text that client creates
The cryptographic Hash of part, the target case cover files are that the file number of the electronic health record of generation is recorded in the file of establishment by client
Upper acquisition, the file for creating initiating electron case history, the file number is to generate the electronic health record according to predetermined manner
Unique encodings, the storage location by block number and transaction coding uniquely determine;
Second acquisition module, for being stored to the i-th cryptographic Hash obtained from client, and by described the i-th of acquisition
The storage location of cryptographic Hash is sent in client, wherein i-th cryptographic Hash is client according to for obtaining i-th of mesh
The cryptographic Hash of i-th of target data file of the instruction action acquisition of data file is marked, i is the serial number of target data file, and i is
Natural number, i≤M, M are the sum of target data file;
Third acquisition module, for being stored to the second cryptographic Hash obtained from client, and by described the of acquisition
The storage location of two cryptographic Hash is sent in client, wherein second cryptographic Hash is the target back cover text that client generates
The cryptographic Hash of part, the target back cover file are for forbidding updating target data file to the electronic health record.
At the another aspect that the present invention is implemented, a kind of electronic equipment, including processor and machine readable storage are additionally provided
Medium, the machine readable storage medium are stored with the machine-executable instruction that can be executed by the processor, the processing
Device is promoted by the machine-executable instruction:When run on a computer so that computer executes any of the above-described described
The storage method of electronic health record based on block chain.
At the another aspect that the present invention is implemented, a kind of computer readable storage medium is additionally provided, it is described computer-readable
Computer program is stored in storage medium, when the computer program is executed by processor so that computer executes above-mentioned
The storage method of any electronic health record based on block chain.
At the another aspect that the present invention is implemented, a kind of computer program product including instruction is additionally provided, when it is being counted
When being run on calculation machine so that computer executes the storage method of any of the above-described electronic health record based on block chain.
Storage method, device, equipment and the storage medium of a kind of electronic health record provided in an embodiment of the present invention, can pass through
The file number of the electronic health record of generation is recorded on the file of establishment, target case cover files is obtained, obtains the target cover
First cryptographic Hash of file calls preset target block catenary system to store first cryptographic Hash, and by the target cover
File is stored in preset storage system;Obtain storage position of first cryptographic Hash in the target block catenary system
It sets, obtains the instruction action for obtaining i-th of target data file, to update electronic health record, obtaining M target data text
After part, target back cover file is generated according to the instruction of winding up the case of acquisition, the second cryptographic Hash of the target back cover file is obtained, calls
Preset target block catenary system stores second cryptographic Hash, and the target back cover file is stored in preset storage and is
In system.This method is by the way that the content data file of electronic health record to be stored in preset storage system, by the data file
Cryptographic Hash be stored in target block catenary system, and by being arranged for forbidding updating target data file to electronic health record
Target back cover file avoids the behavior that electronic health record data are tampered.Certainly, it implements any of the products of the present invention or method must
It is not necessarily required to reach all the above advantage simultaneously.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is the flow chart of the storage method of the first electronic health record based on block chain provided in an embodiment of the present invention;
Fig. 2 is the flow chart of the storage method of the second provided in an embodiment of the present invention electronic health record based on block chain;
Fig. 3 is the flow chart of the storage method of the third electronic health record based on block chain provided in an embodiment of the present invention;
Fig. 4 is the flow chart of the storage method of the 4th kind of electronic health record based on block chain provided in an embodiment of the present invention;
Fig. 5 is the flow chart of the storage method of the 5th kind of electronic health record based on block chain provided in an embodiment of the present invention;
Fig. 6 is the schematic diagram of the storage device of the first electronic health record based on block chain provided in an embodiment of the present invention;
Fig. 7 is the schematic diagram of the storage device of the second provided in an embodiment of the present invention electronic health record based on block chain;
Fig. 8 is the structural schematic diagram of a kind of electronic equipment of the embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Target block catenary system is made of a series of physical node and the block chain software program run thereon.Node it
Between have direct or indirect network connection, communicated using P2P (peer-to-peer, point-to-point) mode.Each node is write
Enter data permission and same franchise.
Multiple blocks that each block chain is created by the corresponding node of the block chain are constituted, and each block has the block counts
According to content and data fingerprint signature, next block can record the block number and fingerprint signature of a block.
Electronic health record software, that is, client has user interface, and user is medical worker.The user of electronic health record software
Interface program operates on computer terminal.In a medical institutions, usually there are multiple computer terminals.Electronic health record software will
Invocation target block catenary system accesses electronic health record data.Therefore the node of computer terminal and place medical institutions is that have directly
Network connection.Usually, there are one nodes for a medical institutions.
Therefore, embodiment provided by the invention is applied to target block catenary system, and the electronic health record based on the system
Software, the two all need to use embodiment provided by the invention, just can be with cooperating.
In order to easier to understand to the embodiment of the present invention, the title now occurred to the embodiment of the present invention is solved as follows
It releases:
Block chain (block chain):It is a kind of to apply the distributed book keeping operation technology in bit coin earliest.Block chain can
It is stored for data, is different from centralised storage and general distributed storage technology, first, the data of block chain store,
Need the agreement of multiple distributed nodes be just identified as effectively, avoiding problems due to single or a small number of nodes intentionally or accidentally
Mistake, caused error in data;Secondly, the data content of the storage of block chain has data fingerprint signature as used SHA
(Secure Hash Algorithm, Secure Hash Algorithm) algorithm, is that can not forge according to this fingerprint of the technology being currently known
, also ensure that tamper or can not being found having distorted for data;In addition, the identity of book keeping operation person can adopt
With the digital signature based on public key-key mechanism so that its identity is easily identified by public key, and makes its row by key
For non-repudiation.Basic technology of the block chain as bit coin is opened as the development of bit coin in recent years has been obtained for verifying
Begin to flourish in finance and payment technical field.
Block (block):It is a memory block, it can be envisaged that be one piece of hard disk.Entire target block catenary system, be exactly by
One piece of hard disk combination for connecing one piece forms a huge memory space.Each block has its data content and data fingerprint
Signature.Next piece of block can also record the block number and fingerprint signature of a block, ensure in this way this chain be it is complete,
It is consistent and can not forging.Each block can store storage in a certain size arbitrary content, such as the block of bit coin
Be a rule " transaction ".
Node (node):Refer to the node that block chain is added, have calculating and storage capacity, and by network directly or
It is indirectly connected with.A component part of each node as block chain, the node processes of operational objective block catenary system.Each
Node can be freely written data toward a new block, if other nodes are approved, that is to say, that and the block is authorized to, or by
If a number of other nodes are agreed to, which permanently will be recorded and stored by all nodes, and no longer be changed.Newly
Data will by new block be connected on its later store.
Intelligent contract (smart contract):Refer to one kind that the trust data Development of storage technology based on block chain gets up
Script technology.It allows to store one section of script in block chain in advance, and its precondition of triggering.Once the precondition at
It is vertical, script operation will be triggered.For example, precondition can be:If on January 4th, 2018, Index of Shanghai Stock Exchange closing quotation was more than 3000
Point, script are that account A just transfers accounts 1 bit coin to account B.Due to precondition be it is objective can verify that, once so condition
It sets up, the actuator of contract will trigger script operation and transfer accounts, and obtain the trust of all nodes, because of each node
It can verify.The embodiment of the present invention is based on intelligent contract technology, realizes the Quality Control of electronic health record.
Electronic health record:Include mainly door or emergency record from data content:Door or emergency record homepage, case history note
Record, analysis report, medical imaging data etc..
Inpatient cases:First page of illness case, admission records, progress note, discharge record, death record, Operation Agreement Letters, anesthesia
Letter of consent, treatment of blood transfusion informed consent form, special examined or special treatment letter of consent are critically ill or seriously ill notification sheet, auxiliary examination
Report, temperature chart, nursing record form, Nursing evaluation list, medical imaging report, pathological replacement list, doctor's advice list etc..
Three-level is signed:A electronic health record, it is necessary to first completion be filled in by physician and submit signature, then transfer to its higher level
Doctor checks and signs, then is checked and signed by the head of the department.Three-level sign primarily to the science of therapeutic scheme, effectively, build
Vertical clearly divisions of responsibility, and improve the quality of electronic health record.Similarly, there is also two-stage signatures in terms of nurse.
Record room:It is responsible for the section office that electronic health record received, deposited pipe in hospital specially.When receiving electronic health record, medical record
Room can also improve the content of probation homepage according to the rules.
It signs (Sign):The electronic health record content that medical worker fills in it, checks or handles is signed after confirmation is errorless
Administration.
Quality Control:Electronic health record quality control.By professional in the Quality Control Dept. of hospital or section room, to electronic health record content
Gap filling macadam, timeliness and reasonability are exercised supervision and are checked.It, can also be by computer program by rule under information system
Then is reminded and judged automatically.
The embodiment of the present invention be based on an existing electronic medical record system, in conjunction with/transformation block chain core technology come
The method for realizing the functional requirement of medical record data storage, the signature and Quality Control of electronic medical record system.
Fig. 1 is a kind of flow chart of the storage method of the electronic health record based on block chain provided in an embodiment of the present invention, is answered
For client, the above method includes:
The file number of the electronic health record of generation is recorded on the file of establishment by S101, obtains target case cover files,
In, above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are for creating
Build the file of initiating electron case history;
Wherein, above-mentioned predetermined manner be can by each node when archives are created according to the generating algorithm of existing file number
It generates, a node corresponds to a medical institutions, and the generation method of each medical institutions' selection file number can be different, the present invention
Embodiment does not limit this.
In order to be understood more clearly to electronic health record, now the data file of electronic health record is described in detail:Each
Patient will produce a electronic health record in a hospital course, and a electronic health record can be considered as a file or archives
Bag, the inside are equipped with the different types of documentation of different time points.The system that the method that the embodiment of the present invention proposes is realized
A unique file number is distributed for every a electronic health record (Electronic Medical Record).The number of electronic health record
According to that can be divided into multiple files (File), wherein recording its information with certain coded format, file has different type, wherein mesh
Mark cover (Cover) file is the specific type of system:The certain types of file is especially set out, implicit, is not belonging to
The visible electronic health record content of doctors and patients.
It should be noted that creating an electronic health record is equivalent to the target case cover files and if only if an electronic health record
It is submitted storage, a file number is assigned per portion electronic health record.
In addition, the first cryptographic Hash of target case cover files is stored in target block catenary system, in order to avoid in area
Excessive data content is stored in block chain, according to the memory mechanism of block chain, although block chain can store in excessive data
Hold, but the storage scheme efficiency is poor, block chain is not the file for especially properly storing large volume, so being by digital signature
The corresponding cryptographic Hash of file is stored in block chain, and this document refers to target case cover files, target back cover file or M target
Data file.
S102 obtains the first cryptographic Hash of above-mentioned target case cover files, and preset target block catenary system is called to store
The first cryptographic Hash is stated, and above-mentioned target case cover files are stored in preset storage system;
It has been calculated it should be noted that the acquisition of first cryptographic Hash can be obtained from other clients or system
Cryptographic Hash, can also be calculated in the client.
In addition, according to the characteristic of block chain, block chain, which stores file destination cryptographic Hash, to be stored according to timestamp
, the file destination in the embodiment of the present invention is for target case cover files, target back cover file or i-th of target data text
Part.
In addition, target block catenary system storage is similar with distributed network storage system, a set of API can be also provided
(Application Programming Interface, application programming interface), accesses to upper layer application, that is, client
Data.
Above-mentioned storage system can be distributed network storage system, centralised storage system, block chain storage system, magnetic
Band or CD, above-mentioned block chain storage system include first object block catenary system and removable medium, and removable medium can be with
For tape or CD.
Above-mentioned distributed network storage system can be understood as data dispersion being stored in more independent equipment.Tradition
Network store system all data are stored using the storage server concentrated, storage server becomes the bottleneck of system performance,
It is also the focus of reliability and safety, the needs of Mass storage application cannot be met.Distributed network storage system uses
Expansible system structure shares storage load using more storage servers, and storage information is positioned using location server, it
The reliability, availability and access efficiency for not only increasing system, are also easy to extend, if the use of distributed network storage system
Client/server can also be changed once master library is changed from the data in library, to bring storage Information Security to reduce.
Based on the above-mentioned description to target block catenary system, although monolithic backup file can be stored in first object area
In block catenary system, but due to block chain it is improper storage large volume file, for the file of large volume for, using divide
Cloth network store system can be very good to solve persistent data storage, by the above-mentioned description to storage system it is found that distribution
Formula network store system is a kind of preferable storage mode.
Specifically,
Using target case cover files, corresponding first cryptographic Hash of above-mentioned target case cover files is calculated according to following expression;
Above-mentioned expression formula:Hash=HASH (file);
Wherein, HASH () is hash function, and hash is the first cryptographic Hash, and file is the content of target case cover files;
It should be noted that the embodiment of the present invention proposes the calculating side of the computational methods and above-mentioned first cryptographic Hash of cryptographic Hash
Method is similar, then this is repeated no more.
It is noted that above-mentioned first cryptographic Hash is the number obtained by logical operation according to the data of the content of file
Value, the hash values that different files obtains are different, and the corresponding file content of identical hash values is identical, with file
Title is unrelated, and hash values are related to file content, that is to say, that the name of different files is directed to, as long as corresponding hash values phase
Together, it is meant that the corresponding content of two files is the same.
S103 obtains storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage
Position is uniquely determined by block number and transaction coding;
It should be noted that according to the characteristic of block chain, the cryptographic Hash of file destination is in target area in the embodiment of the present invention
The storage location of block catenary system is uniquely determined by block number transaction coding corresponding with its of its correspondence storage, can be made
For the corresponding data of subsequent access storage location, transaction coding can be understood as the cryptographic Hash of the transaction;
In addition, when the corresponding cryptographic Hash of a file destination is submitted to and is stored in target block catenary system, all can
The return value of the target block catenary system is obtained, which is the corresponding cryptographic Hash of the file destination in target block catenary system
In storage location.
S104 obtains the instruction action for obtaining i-th of target data file, to update above-mentioned electronic health record, wherein
I is the serial number of target data file, and i is natural number, and i≤M, M are the sum of target data file
Wherein, which can be revision instruction or newly-increased instruction.
It can be understood as it should be noted that updating above-mentioned electronic health record by increasing i-th of target data file newly or repairing
It orders i-th of target data file and has reached the purpose for updating the electronic health record.
In addition, the target data file known to upper description is to record the second target information with preset coded format,
Above-mentioned second target information includes file number, file type, name file, instruction action and file content, above-mentioned file type
It further include target data file.The coded format include X XML (eXtensible Markup Language) coded format,
JSON (JavaScript Object Notation, JS object tag) coded format, pure file format or binary format.It should
Target data file includes first page of illness case file, progress note file, nursing history file, examines checklist or discharge record.
The instruction action includes newly-increased instruction, signature instruction or revision instruction, and above-mentioned signature instruction is mechanism or operator to number of targets
The instruction signed according to file;This document content include data content, generate electronic health record mechanism coding and patient only
One identifier, the content that the embodiment of the present invention includes to the target data file are not intended to limit.
Specifically,
Judge whether the instruction action obtained includes newly-increased instruction or revision instruction, wherein above-mentioned newly-increased instruction for for
The instruction of i-th of target data file is obtained, above-mentioned revision instruction is for being obtained after being revised to former target data file
I-th of target data file instruction, above-mentioned original target data file serial number 1 ..., the corresponding institute of any serial number in i-1
The target data file that need to be revised;
If the instruction action obtained is newly-increased instruction, it is corresponding with the target data file to obtain i-th of target data file
The i-th cryptographic Hash preset target block catenary system is called according to the storage location of above-mentioned file number and above-mentioned first cryptographic Hash
Above-mentioned i-th cryptographic Hash is stored, and above-mentioned i-th of target data file is stored in preset storage system;
In this step, above-mentioned i-th cryptographic Hash is stored in the preset target block catenary system of above-mentioned calling, and by above-mentioned i-th
After a target data file is stored in preset storage system, the above method further includes obtaining above-mentioned i-th cryptographic Hash upper
State the storage location in target block catenary system.
Obtain storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system.
If the instruction action obtained is revision instruction, it is corresponding with the target data file to obtain i-th of target data file
The i-th cryptographic Hash;According to above-mentioned file number and above-mentioned former target data file, obtains former target data file and correspond to cryptographic Hash
Storage location calls preset target block catenary system to store above-mentioned i-th cryptographic Hash, and will according to acquired storage location
Above-mentioned i-th of target data file is stored in preset storage system;Wherein, i-th of target data file of acquisition is revised
It is to carry out the file of revision acquisition to former target data file by the way of additional Description of Revision, and revised i-th of mesh
Mark data file quotes the storage location in target block catenary system of above-mentioned former target data file.
In this step, preset target block catenary system is being called to store above-mentioned i-th cryptographic Hash, and by above-mentioned i-th of mesh
After mark data file is stored in preset storage system, further include:
Obtain storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system.
S105 generates target back cover file after obtaining M target data file according to the instruction of winding up the case of acquisition, wherein
Above-mentioned target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
Wherein, the target case cover files, target back cover file are to record first object information with preset coded format,
Above-mentioned first object information includes file number, file type, instruction action and file content, and above-mentioned file type is target cover
File, target back cover file.
It should be noted that target back cover file is for forbidding updating target data file to above-mentioned electronic health record,
It can be understood as:Target back cover file is for forbidding carrying out newly-increased target data file to electronic health record or forbid to electronics disease
The file that target data file in going through is revised;
It is noted that a electronic health record of winding up the case is equivalent to add the file of a back cover type i.e. target envelope for it
Bottom file.Once target back cover file is submitted storage, any newly-increased file and revision file thereafter are accordingly to be regarded as in vain.To this
Electronic health record operates effectively only to the signature of existing file.It follows that the file of back cover type have and only there are one.
S106 obtains the second cryptographic Hash of above-mentioned target back cover file, and preset target block catenary system is called to store
The second cryptographic Hash is stated, and above-mentioned target back cover file is stored in preset storage system.
By upper description it is found that target back cover file is similar with target case cover files, the two is that the embodiment of the present invention provides
Certain types of file, this document is implicit, that is to say, that is not belonging to the visible electronic health record content of doctors and patients.
It should be noted that Record room can also improve probation according to the rules before generating target case cover files
The content of homepage.
For the file of electronic health record, a kind of operation is defined:It signs (Sign).It represents the particular person by specific node
Member signs one or more files.I.e. after S106, further include:
It is instructed according to the signature of reception, coding, the operator of operator's institutional affiliation is obtained from preset configuration file
Corresponding coding;
According to the corresponding coding of aforesaid operations people, operator's i-th of target data file of preset first key pair is utilized
It signs;
According to the coding of operator's institutional affiliation, using preset second key of operator's institutional affiliation respectively to above-mentioned
I target data file and the signature of operator are signed;
I-th of target data is signed documents and is submitted to preset storage system, wherein above-mentioned i-th of target data label
Administration's file is i-th of target data file after signature;
The jth cryptographic Hash that i-th of target data signs documents is obtained, calls preset target block catenary system storage above-mentioned
Jth cryptographic Hash, j are that i-th of target signs documents the serial number of corresponding cryptographic Hash.
Wherein, which can be that three-level is signed.
It according to the characteristic of block chain it is found that since the storage location of return is unique, also means that, it is known that storage position
It sets, which target data file can be known.
It should be noted that the cryptographic Hash to each file and the corresponding cryptographic Hash to sign documents, are all considered as a hop count
According in the submission sequential storage to block chain according to node.For the structure of some target block, according to the area of block chain
Block structure, it is only necessary to define the structure of " transaction ".
Due to storing the corresponding cryptographic Hash to sign documents of target data file in target block catenary system, when one
When data is generated and submitted, client is signed using the data key of operator, it is possible thereby to ensure operator couple
The non repudiation of data content and time;Then client is signed using the data key of mechanism and the signature of operator
Name, it is possible thereby to ensure non repudiation of the mechanism for data content and its operator.
The generation time of target data file cryptographic Hash in the block can be substantially determined by the timestamp of block head,
In, which is generated by the node of submission data.In a block, file is temporally to stab ascending sort.It is next
The timestamp of block, and a upper block timestamp can be more than.Thus characteristic ensures, the sequence of data storage and node submission are suitable
Sequence is almost the same so that the time of the target data file cryptographic Hash can not be distorted afterwards, non-repudiation, it should
Data are the cryptographic Hash of target data file.
In the jth cryptographic Hash that i-th of target data of above-mentioned acquisition signs documents, preset target block catenary system is called to deposit
After storing up above-mentioned jth cryptographic Hash, further include:
File destination is successively read according to timestamp from preset storage system and target signs documents, wherein above-mentioned
File destination is target case cover files, i-th of target data file or target back cover file, and it is i-th that above-mentioned target, which signs documents,
File after a target data file signature;
For each file destination, verify whether the file destination is judged as effective document;
Whether if the file destination is effective document, it is effective text to verify the corresponding target of the file destination and sign documents
Part;
If the target signs documents as effective document, which is signed documents with the target and is associated.
When needing to illustrate, reading program can depositing from any target complete data file for storing electronic health record
The content of block is from the beginning successively read in storage system according to timestamp, and screens the literary from first target cover of each electronic health record
Part to the All Files between first target back cover file, and to the cryptographic Hash of any all files for storing electronic health record by
It is successively read according to timestamp.It is hereby achieved that electronic health record file sequence and its signature, i.e., a is electronic health record.It has only
One file number and patient ID.The target data file or corresponding signature can be verified using the cryptographic Hash of target data file
Whether file is tampered.
For each file destination, verifies the file destination and whether be judged as a kind of embodiment of effective document and be:
For each file destination, judge whether the corresponding mechanism coding of the file destination is consistent with authority signature;
If the corresponding mechanism coding of the file destination is consistent with authority signature, judge that the corresponding operator of the file destination compiles
Whether code signs consistent with operator;
If the corresponding operator's coding of the file destination is consistent with operator's signature, judge that the file destination is effectively literary
Part.
The embodiment further increases file destination in electronic health record by the identity of identification mechanism and operator
Safety.
Whether verify the corresponding target of the file destination and sign documents is that a kind of embodiment of effective document is:
Judge whether the corresponding target of the file destination corresponding mechanism coding that signs documents is consistent with authority signature;
If the target signs documents, corresponding mechanism coding is consistent with authority signature, and it is corresponding to judge that the target signs documents
Whether operator encodes consistent with operator's signature;
If the target signs documents, corresponding operator coding is consistent with operator's signature, judge the target sign documents for
Effective document.
The embodiment is further increased in electronic health record and is signed documents by the identity of identification mechanism and operator
Safety.
It follows that method provided in an embodiment of the present invention ensure that electronic health record by newly-increased target back cover file
Target data file cannot be updated, and all content data files for constituting electronic health record are stored in preset storage system
In, the corresponding cryptographic Hash of each file destination is stored in target block catenary system, electronic health record data is avoided and is tampered
Behavior.
Fig. 2 is the schematic diagram of the storage method of the second provided in an embodiment of the present invention electronic health record based on block chain,
Applied to target block catenary system, the above method includes:
S201 stores the first cryptographic Hash obtained from client, and depositing above-mentioned first cryptographic Hash of acquisition
Storage space, which is set, to be sent in client, wherein and above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, on
It is that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain to state target case cover files, is used for
The file of initiating electron case history is created, above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, on
Storage location is stated to be uniquely determined by block number and transaction coding;
Based on the description to target case cover files it is found that when obtaining the first cryptographic Hash, target block catenary system selection first
It is stored after cryptographic Hash and by it according to timestamp, and the storage location of the first cryptographic Hash is back in client.
Before S201, further include:
It verifies the first prewired physical equipment key and whether preset first key is consistent, wherein above-mentioned first physics
Device keys are the corresponding physical equipment key of a node, and first key is close with the physical equipment cipher key match of the node
Key;
If above-mentioned first physical equipment key is consistent with above-mentioned first key, the private key label of first object key devices are called
Name interface;
It verifies the second prewired physical equipment key or preset-key and whether preset second key is consistent;Wherein, on
It is the physical equipment key that operating personnel are equipped with to state the second physical equipment key, and the key of each operating personnel is different, first
Key is the key for the physical equipment cipher key match being equipped with the operating personnel;
If above-mentioned second physical equipment key or preset-key and above-mentioned second key agreement, call the second target cipher key to set
Standby private key signature interface.
If in above-mentioned second physical equipment key or preset-key and above-mentioned second key agreement, the second target cipher key is called
After the private key signature interface of equipment, further include:
Judge submit file destination cryptographic Hash transaction mechanism digital signature and operator's digital signature respectively whether with section
The preset key of point and the preset cipher key match of operator;
If the mechanism digital signature and operator's digital signature of file destination cryptographic Hash transaction are preset with node respectively
Whether key and the preset cipher key match of operator, the storage location where judging the file destination cryptographic Hash are correct, wherein mesh
Mark file is target case cover files, target back cover file or i-th of target data file.
If correct, the file destination is received, and the file destination is determined as effective document.
It is noted that in order to ensure the node for possessing write-in permission is legal node, public key-key is equally used
Mechanism is key devices i.e. the first physical equipment key that each node is equipped with physics, once the equipment is detached with node, then
The node can not just call the private key signature interface of key devices, to make the data that it is subsequently submitted not by other in block chain
Node is received.Each key devices have unique key, can uniquely indicate a node.
Likewise, carrying out self-corresponding signer in order to ensure signing, equally use public key-key mechanism for each medical care
The virtual key devices of the second physical equipment key or preset-key, that is, software of staffing physics.When being signed, palpus will
The equipment is connected to operating terminal, and otherwise system can not can not just call the private key signature interface of key devices, to make it carry
The data of friendship are not received by other nodes in local node and block chain.Each key devices have unique key, can be with
The uniquely identity of one signer of mark.
Since the data of block chain are stored in by same, whole on each node, this distributed storage
System naturally has data reliability, can easily cope with long-term preservation and various disasters.
In addition, the embodiment of the present invention can specify that:If any one block is combined into the half of target block catenary system
The above quantity node is received, then all data in the block, which are considered as, has stored success.According to block chain agreement, node receives
The method of one block B creates a new block and is connected on after B.It can ensure in this way, any data in block can not possibly
It is tampered again.Because once distorting, then the hash values of the block can change, the inevitable hash with its subsequent block record
Value misfits.
S202 stores the i-th cryptographic Hash obtained from client, and by the storage of above-mentioned i-th cryptographic Hash of acquisition
Position is sent in client, wherein above-mentioned i-th cryptographic Hash is client according to for obtaining i-th of target data file
The cryptographic Hash for i-th of target data file that instruction action obtains, i are the serial number of target data file, and i is natural number, i≤M,
M is the sum of target data file;
Based on the description to target data file it is found that when obtaining the i-th cryptographic Hash, target block catenary system selection i-th is breathed out
It after uncommon value and is stored, and the storage location of the i-th cryptographic Hash is back in client.
S203 stores the second cryptographic Hash obtained from client, and depositing above-mentioned second cryptographic Hash of acquisition
Storage space, which is set, to be sent in client, wherein and above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, on
It is for forbidding updating target data file to above-mentioned electronic health record to state target back cover file.
Based on the description to target back cover file it is found that when obtaining the second cryptographic Hash, target block catenary system selection second
It after cryptographic Hash and is stored, and the storage location of the second cryptographic Hash is back in client.
Before S203, further include:
For each node, judge whether the node is specified contract node;
If specified contract node, the precondition that preset intelligent contract performer calls all effective contracts is triggered,
Judge whether conditions present is consistent with default intelligence and the default precondition of about n, wherein n is the coding of intelligent contract;
If above-mentioned conditions present is consistent with above-mentioned intelligence and the default precondition of about n, instruction contract node triggering executes
Default shell script.
The embodiment of the present invention provides the Quality Control function of electronic health record using intelligent contract, defines certain coded format first
Treaty content, including condition and script.
Intelligent contract performer on node calls the condition of all effective contracts automatically.Once condition is satisfied, i.e., by
The specified contract side's node of contract executes action script.Script executes the result generated need not relationship with block chain, such as can
To be to send a short message to remind to someone.
There is script, so that it may to realize following Quality Control function:
1) once detecting has back cover type file to be signed a certain electronic health record, this part of electronic health record of just winding up the case.
2) once electronic medical record is created i.e. cover type file submission, it should which trigger notice requires to create in 8 hours
Progress note for the first time.
3) before file destination such as discharge record is signed, medical staff should be reminded to create day daily the patient that is critically ill
Normal progress note.
4) after subordinate doctor signs documents, higher level doctor is prompted to sign documents.
After S203, further include:
The jth cryptographic Hash obtained from client is stored, and the storage location of the above-mentioned jth cryptographic Hash of acquisition is sent out
It is sent in client, wherein above-mentioned jth cryptographic Hash is the cryptographic Hash that i-th of target data signs documents, above-mentioned i-th of target
Data signing file is i-th of target data file after signature, and j is that i-th of target signs documents the serial number of corresponding cryptographic Hash.
Method provided in an embodiment of the present invention is stored by the cryptographic Hash for obtaining client according to timestamp, and will
The storage location of the cryptographic Hash of acquisition is sent in client, it is therefore prevented that electronic health record is tampered, and is subsequent examination electronic health record
Target data file whether be tampered and prepare.
Fig. 3 is the flow chart of the storage method of the second provided in an embodiment of the present invention electronic health record based on block chain,
Applied to client, the above method includes:
The file number of the electronic health record of generation is recorded on the file of establishment by S301, obtains target case cover files,
In, above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are for creating
Build the file of initiating electron case history;
Wherein, step S301~S303 is identical as the method that step S101~S103 in Fig. 1 embodiments is executed respectively.Cause
This, all embodiments in Fig. 1 are suitable for Fig. 3, and can reach same or analogous advantageous effect, and details are not described herein.
S302 obtains the first cryptographic Hash of above-mentioned target case cover files, and preset target block catenary system is called to store
The first cryptographic Hash is stated, and above-mentioned target case cover files are stored in preset storage system;
S303 obtains storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage
Position is uniquely determined by block number and transaction coding;
S304 judges whether the instruction action obtained includes newly-increased instruction or revision instruction, wherein above-mentioned newly-increased instruction is
Instruction for obtaining i-th of target data file, above-mentioned revision instruction be for being revised to former target data file after
The instruction of i-th of the target data file obtained, above-mentioned original target data file serial number 1 ..., any serial number corresponds in i-1
Required revision target data file, i be target data file serial number, i is natural number, and i≤M, M are target data file
Sum;If the instruction action obtained is newly-increased instruction, S305 is executed, if the instruction action obtained is revision instruction, is executed
S307;
S305 obtains i-th of target data file the i-th cryptographic Hash corresponding with the target data file, according to above-mentioned shelves
The storage location of Reference Number and above-mentioned first cryptographic Hash calls preset target block catenary system to store above-mentioned i-th cryptographic Hash, and will
Above-mentioned i-th of target data file is stored in preset storage system;
It should be noted that storage system stores i-th of target data file, target block catenary system stores the number of targets
According to corresponding i-th cryptographic Hash of file, electronic health record file is permanently stored without what is distorted to realize, if storage system is wherein
The data file of one equipment storage is tampered, and can be also found, i.e., stores the corresponding data file by target block chain
Cryptographic Hash carry out verifying whether the data file is tampered, to realize to electronic health record carry out consistency inspection.
In addition, i-th of target data file of this step is increased fresh target data file.
S306 obtains storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system;
Wherein, this step obtains target block chain after preset target block catenary system will be called to store the i-th cryptographic Hash
The return value of the storage location of i-th cryptographic Hash in system, convenient for utilizing i.e. i-th Hash of the storage location subsequent access data
Value.
S307 obtains i-th of target data file the i-th cryptographic Hash corresponding with the target data file;According to above-mentioned shelves
Reference Number and above-mentioned former target data file obtain the storage location that above-mentioned former target data file corresponds to cryptographic Hash, according to being obtained
The storage location taken calls preset target block catenary system to store above-mentioned i-th cryptographic Hash, and by above-mentioned i-th of target data
File is stored in preset storage system;Wherein, i-th of target data file for revising acquisition is using additional Description of Revision
Mode to former target data file carry out revision acquisition file, and revised i-th of target data file reference it is above-mentioned
The storage location in target block catenary system of former target data file;
It should be noted that being determined by the characteristic of target block catenary system, any data are once stored, and are that cannot repair
Change and deletes.Then it is by the way of additional Description of Revision so if to revise a file.Such as:To case history homepage
It is revised, to point out that it is the content based on which target data file i.e. case history homepage and this revision, the revision
Content can be the data of new data or increment on the basis of former target data file, but the target obtained after revising
Data file i.e. i-th target data file is a fresh target data file, former target data file content it is constant and its in
Hold and its cryptographic Hash is still stored in corresponding storage system, newly-increased instruction, modification instruction make client and the friendship of operator
Mutually more convenient, hommization.
S308 obtains storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system;
S309 generates target back cover file after obtaining M target data file according to the instruction of winding up the case of acquisition, wherein
Above-mentioned target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
Wherein, step S309~S310 is identical as the method that step S105~S106 in Fig. 1 embodiments is executed respectively.Cause
This, all embodiments in Fig. 1 are suitable for Fig. 3, and can reach same or analogous advantageous effect, and details are not described herein.
S310 obtains the second cryptographic Hash of above-mentioned target back cover file, and preset target block catenary system is called to store
The second cryptographic Hash is stated, and above-mentioned target back cover file is stored in preset storage system;
S311 obtains storage location of above-mentioned second cryptographic Hash in above-mentioned target block catenary system;
S312 is instructed according to the signature of reception, and coding, the behaviour of operator's institutional affiliation are obtained from preset configuration file
Make the corresponding coding of people;
Wherein, preset configuration file is the file that client is pre-configured with and distributes, it can be understood as operator logs in
After client, the configuration file can be read, obtains coding, the corresponding coding of operator of operator's institutional affiliation.
S313 utilizes operator's i-th of target data of preset first key pair according to the corresponding coding of aforesaid operations people
File is signed;
In this step, the identity of the operator can be known according to the corresponding coding of operator, to be somebody's turn to do using key pair
Target data file is signed, which is the key set in advance, and each operation has key per capita, it is possible thereby to ensure
Operator is to the data content i.e. non repudiation of the target data file and time.
S314 is right respectively using preset second key of operator's institutional affiliation according to the coding of operator's institutional affiliation
Above-mentioned i-th of target data file and the signature of operator are signed;
In this step, the second key is the key of operator's institutional affiliation, the data key using mechanism and operator
Signature sign, it is possible thereby to ensure mechanism can not support for the data content i.e. target data file and its operator
Lai Xing.
I-th of target data is signed documents and is submitted to preset storage system by S315, wherein above-mentioned i-th of number of targets
According to i-th of target data file after signing documents as signature;
It should be noted that can be easy to read the storage location of this document using the key assignments that storage system returns.
S316 obtains the jth cryptographic Hash that i-th of target data signs documents, preset target block catenary system is called to deposit
Store up above-mentioned jth cryptographic Hash, wherein j is that i-th of target signs documents the serial number of corresponding cryptographic Hash.
J and i in this step are one-to-one, that is to say, that each target data file corresponds to a number of targets
According to signing documents.
It follows that the present invention implements the method provided by newly-increased target back cover file, it ensure that electronic health record cannot
All file destination contents storage that signs documents corresponding with the file destination for being increased newly or being revised, and electronic health record will be constituted
In preset storage system, sign documents corresponding with the file destination of the corresponding cryptographic Hash of each file destination is stored in
In target block catenary system, the Quality Control to electronic health record can be reached by signature, it is also ensured that operator is to data content
The non repudiation of data content and its operator is further prevented with the non repudiation of time, and guarantee mechanism
The behavior that the data of submission are tampered.
Fig. 4 is the schematic diagram of the storage method of the 4th kind of electronic health record based on block chain provided in an embodiment of the present invention,
Applied to client, the above method includes:
The file number of the electronic health record of generation is recorded on the file of establishment by S401, obtains target case cover files,
In, above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are for creating
Build the file of initiating electron case history;
Wherein, step S401~S416 is identical as the method that step S301~S316 in Fig. 3 embodiments is executed respectively.Cause
This, all embodiments in Fig. 3 are suitable for Fig. 4, and can reach same or analogous advantageous effect, and details are not described herein.
S402 obtains the first cryptographic Hash of above-mentioned target case cover files, and preset target block catenary system is called to store
The first cryptographic Hash is stated, and above-mentioned target case cover files are stored in preset storage system;
S403 obtains storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage
Position is uniquely determined by block number and transaction coding;
S404 judges whether the instruction action obtained includes newly-increased instruction or revision instruction, wherein above-mentioned newly-increased instruction is
Instruction for obtaining i-th of target data file, above-mentioned revision instruction be for being revised to former target data file after
The instruction of i-th of the target data file obtained, above-mentioned original target data file serial number 1 ..., any serial number corresponds in i-1
Required revision target data file, i be target data file serial number, i is natural number, and i≤M, M are target data file
Sum;If the instruction action obtained is newly-increased instruction, S405 is executed, if the instruction action obtained is revision instruction, is executed
S407;
S405 obtains i-th of target data file the i-th cryptographic Hash corresponding with the target data file;According to above-mentioned shelves
The storage location of Reference Number and above-mentioned first cryptographic Hash calls preset target block catenary system to store above-mentioned i-th cryptographic Hash, and will
Above-mentioned i-th of target data file is stored in preset storage system;
S406 obtains storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system;
S407 obtains i-th of target data file the i-th cryptographic Hash corresponding with the target data file;According to above-mentioned shelves
Reference Number and above-mentioned former target data file obtain the storage location that above-mentioned former target data file corresponds to cryptographic Hash, according to being obtained
The storage location taken calls preset target block catenary system to store above-mentioned i-th cryptographic Hash, and by above-mentioned i-th of target data
File is stored in preset storage system;Wherein, i-th of target data file for revising acquisition is using additional Description of Revision
Mode to former target data file carry out revision acquisition file, and revised i-th of target data file reference it is above-mentioned
The storage location in target block catenary system of former target data file;
S408 obtains storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system;
S409 generates target back cover file after obtaining M target data file according to the instruction of winding up the case of acquisition, wherein
Above-mentioned target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
S410 obtains the second cryptographic Hash of above-mentioned target back cover file, and preset target block catenary system is called to store
The second cryptographic Hash is stated, and above-mentioned target back cover file is stored in preset storage system;
S411 obtains storage location of above-mentioned second cryptographic Hash in above-mentioned target block catenary system;
S412 is instructed according to the signature of reception, and coding, the behaviour of operator's institutional affiliation are obtained from preset configuration file
Make the corresponding coding of people;
S413 utilizes operator's i-th of target data of preset first key pair according to the corresponding coding of aforesaid operations people
File is signed;
S414 is right respectively using preset second key of operator's institutional affiliation according to the coding of operator's institutional affiliation
Above-mentioned i-th of target data file and the signature of operator are signed;
I-th of target data is signed documents and is submitted to preset storage system by S415, wherein above-mentioned i-th of number of targets
According to i-th of target data file after signing documents as signature;
S416 obtains the jth cryptographic Hash that i-th of target data signs documents, preset target block catenary system is called to deposit
Store up above-mentioned jth cryptographic Hash, j is that i-th of target signs documents the serial number of corresponding cryptographic Hash;
S417 is successively read file destination according to timestamp from preset storage system and target signs documents, wherein
Above-mentioned file destination be target case cover files, i-th of target data file or target back cover file, above-mentioned target sign documents for
File after i-th of target data file signature;
Based on the above-mentioned description to storage system, it is known that storage system stores the All Files of electronic health record according to timestamp
Content, reads the file destination of storage according to timestamp one by one, and a complete electronics is illustrated according to chronological order
Case history.
S418 judges whether the corresponding mechanism coding of the file destination is consistent with authority signature for each file destination;
If the corresponding mechanism coding of the file destination is consistent with authority signature, S419 is executed;
Using the consistency of inspection body coding and authority signature in this step, inconsistency is excluded, that is to say, that exclude
Illegal file.
It should be noted that the file destination in S418~S420 can be understood as the text of the either objective in electronic health record
Part.
S419 judges whether the corresponding operator's coding of the file destination and operator's signature are consistent, if the file destination
Corresponding operator's coding is consistent with operator's signature, executes S420;
The consistency for checking operator's coding and operator's signature is utilized in this step, it is ensured that each file destination is effective
File.
S420 judges the file destination for effective document, and it is corresponding to judge that the corresponding target of the file destination signs documents
Whether mechanism coding is consistent with authority signature;If the target signs documents, corresponding mechanism coding is consistent with authority signature, executes
S421;
After judging whether file destination is effective document, it is also necessary to which whether judge that target signs documents is effective document.
It should be noted that the embodiment of the present invention is to judging that the sequence that file destination and target sign documents does not limit.
The either objective file pair that can be understood as in electronic health record in addition, the target in S420~S422 signs documents
The target answered signs documents.
S421, judge the target sign documents corresponding operator coding and operator's signature it is whether consistent;If the target
The corresponding operator's coding that signs documents is consistent with operator's signature, executes S422;
The consistency for checking operator's coding and operator's signature is utilized in this step, it is ensured that each target signs documents and is
Effective document.
S422 judges that the target signs documents as effective document, which is signed documents with the target and is closed
Connection.
After judging that file destination and target sign documents and be effective document, needs the two being associated, make its reading
After taking a file destination, it just can directly find the corresponding target of the file destination and sign documents.
It follows that the present invention implements the method provided by newly-increased target back cover file, the mesh of electronic health record ensure that
Mark data file cannot be added or revise, and all file destination contents for constituting electronic health record are corresponding with the file destination
Sign documents and be stored in preset storage system, the corresponding cryptographic Hash of each file destination is corresponding with the file destination
It signs documents and is stored in target block catenary system, it is ensured that non repudiation and machine of the operator to data content and time
Structure is for the non repudiation of data content and its operator, the behavior for preventing the data of submission to be tampered;In addition, passing through difference
The mechanism and operation human effectiveness for verifying signature, eliminate invalid signature, ensure that electronic health record file sequence and its label
The correctness of administration.
Fig. 5 is the schematic diagram of the storage method of the 5th kind of electronic health record based on block chain provided in an embodiment of the present invention,
Applied to target block catenary system, the above method includes:
S501, verifies the first prewired physical equipment key and whether preset first key is consistent, if above-mentioned first object
It is consistent with above-mentioned first key to manage device keys, executes S502, wherein above-mentioned first physical equipment key is that a node corresponds to
Physical equipment key, first key is key with the physical equipment cipher key match of the node;
This step provides cipher key access using physical key equipment, it is ensured that personal identification, the safety of authority identity
Property.
It should be noted that a mechanism corresponds to a node.
S502 calls the private key signature interface of first object key devices;
This step is to sign to mechanism calling the private key signature interface, and first object key devices are to be used for
One node of unique mark, and there is unique key.
S503, verifies the second prewired physical equipment key or preset-key and whether preset second key is consistent;If
The second prewired physical equipment key or preset-key and preset second key agreement, execute S504, wherein above-mentioned second object
Manage device keys be operating personnel be equipped with physical equipment key, the key of each operating personnel is different, first key be with
The key for the physical equipment cipher key match that the operating personnel are equipped with;
This step is arranged the second physical equipment key and is for increasing the safety of electronic health record.
S504 calls the private key signature interface of the second target cipher key equipment;
This step is the second target cipher key equipment in order to sign respectively to operator calling the private key signature interface
It is to be used for one signer of unique mark i.e. operator, and there is unique key.
S505, judge submit file destination cryptographic Hash transaction mechanism digital signature and operator's digital signature respectively whether
With the preset key of node and the preset cipher key match of operator;If the file destination cryptographic Hash transaction mechanism digital signature and
Operator's digital signature with the preset key of node and the preset cipher key match of operator, executes S506 respectively;
This step be for decision node whether the reception mechanism digital signature and operator's digital signature.
The digital signature can be understood as that the transaction of file destination cryptographic Hash is encrypted, and obtains a string of character strings, needs
It is decrypted using node or operator's corresponding key pair character string, if the character string can be unlocked, then it is assumed that the two
Match, which can be understood as the storage of data.
In addition, digital signature be related to a hash function, the public key of sender, sender private key.Digital signature has
Two effects, first, can determine that message is strictly to be signed and issued by sender, second is that digital signature can determine that message
Integrality.
The operation principle of digital signature is:When sending file destination, sender is breathed out with a hash function from file destination
Its abstract is generated in uncommon value transaction, then abstract is encrypted with the private key of itself, encrypted abstract will be used as the target
The digital signature of file cryptographic Hash transaction and the transaction of file destination cryptographic Hash send jointly to recipient, recipient first with hair
Hash function as the side of sending calculates message digest from the original target file cryptographic Hash transaction received, then again with hair
The additional digital signature of the transaction is decrypted in the public key for the side of sending, if the two abstracts are identical, so recipient's energy
Confirm that the digital signature is sender.
S506, whether the storage location where judging the file destination cryptographic Hash is correct, if correct, executes S507,
In, file destination is target case cover files, target back cover file or i-th of target data file.
This step by verify file destination cryptographic Hash storage location, come judge the node whether receive the target text
Part.
S507 receives the file destination, and the file destination is determined as effective document;
After being verified according to S505~S506 to the file destination, it just can be determined that whether the node receives target text
Part, and determine that it is effective document.
S508 stores the first cryptographic Hash obtained from client, and depositing above-mentioned first cryptographic Hash of acquisition
Storage space, which is set, to be sent in client, wherein and above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, on
It is that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain to state target case cover files, is used for
The file of initiating electron case history is created, above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, on
Storage location is stated to be uniquely determined by block number and transaction coding;
Wherein, step S508~S509 is identical as the method that step S201~S202 in Fig. 2 embodiments is executed respectively.Cause
This, all embodiments in Fig. 2 are suitable for Fig. 5, and can reach same or analogous advantageous effect, and details are not described herein.
S509 stores the i-th cryptographic Hash obtained from client, and by the storage of above-mentioned i-th cryptographic Hash of acquisition
Position is sent in client, wherein above-mentioned i-th cryptographic Hash is i-th that client is obtained according to newly-increased instruction or revision instruction
The cryptographic Hash of a target data file, i are natural number, and i≤M, M are the sum of target data file;
S510 judges whether the node is specified contract node for each node;If specified contract node, executes
S511;
It should be noted that embodiment provided by the invention does not limit the sequence of S510, contract node is to reach in advance
At the node of contractual agreement.
S511 triggers the precondition that preset intelligent contract performer calls all effective contracts, judges conditions present
It is whether consistent with default intelligence and the default precondition of about n, if above-mentioned conditions present and above-mentioned intelligence and about n's is default preposition
It is consistent, execute S512, wherein n is the coding of intelligent contract;
Effective contract refers to that a contract is effective;The default precondition refers to the operation item set in advance
Part, such as precondition are that time conditions for example daily 0 point or event condition such as receive message.
S512, instruction contract node triggering, which executes, presets shell script;
When conditions present is matched with precondition, need to execute the shell script.
S513 stores the second cryptographic Hash obtained from client, and depositing above-mentioned second cryptographic Hash of acquisition
Storage space, which is set, to be sent in client, wherein and above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, on
It is for forbidding updating target data file to above-mentioned electronic health record to state target back cover file.
Wherein, step S513 is identical as the method that the step S203 in Fig. 2 embodiments is executed.Therefore, all realities in Fig. 2
It applies example and is suitable for Fig. 5, and can reach same or analogous advantageous effect, details are not described herein.
S514 stores the jth cryptographic Hash obtained from client, and by the storage of the above-mentioned jth cryptographic Hash of acquisition
Position is sent in client, wherein the cryptographic Hash that above-mentioned jth cryptographic Hash signs documents for i-th of target data, above-mentioned i-th
A target data sign documents as signature after i-th of target data file, j is that i-th of target signs documents corresponding cryptographic Hash
Serial number.
The value of the j and i of this step are one-to-one, i.e. when i is 1, j is also that 1, i maximum values are M, and j is also M.
It follows that the method that the present invention implements to provide is deposited by the cryptographic Hash for obtaining client according to timestamp
Storage, and the storage location of the cryptographic Hash of acquisition is sent in client, it is therefore prevented that electronic health record is tampered, and is subsequent examination electricity
Whether the target data file of sub- case history, which is tampered, prepares, in addition, being each node by using public key-key mechanism
It is equipped with the key devices of physics, it is ensured that the node for possessing write-in permission is legal node, by using public key-key mechanism
Key devices physics or that software is virtual are equipped with for each medical staff, ensure that signature carrys out self-corresponding signer, by
It is stored on each node by same, whole in the data of block chain, therefore this distributed storage system can protect
The reliability for demonstrate,proving data, copes with long-term preservation and various disasters.
With it is above-mentioned corresponding based on the electronic health record storage method of block chain, the embodiment of the present application also provides based on block
The electronic health record storage device of chain.
Fig. 6 is the schematic diagram of the first electronic health record storage device based on block chain provided in an embodiment of the present invention, is answered
For client, the above method includes:
Case cover files generation module 601, the file for the file number of the electronic health record of generation to be recorded in establishment, is obtained
Obtain target case cover files, wherein above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, above-mentioned mesh
Mark case cover files are used to create the file of initiating electron case history;
First cryptographic Hash acquisition module 602, the first cryptographic Hash for obtaining above-mentioned target case cover files are called preset
Target block catenary system stores above-mentioned first cryptographic Hash, and above-mentioned target case cover files are stored in preset storage system;
First storage location acquisition module 603, for obtaining above-mentioned first cryptographic Hash in above-mentioned target block catenary system
Storage location, wherein above-mentioned storage location by block number and transaction coding uniquely determine;
Electronic health record update module 604, for obtaining the instruction action for obtaining i-th of target data file, with more
New above-mentioned electronic health record, wherein i is the serial number of target data file, and i is natural number, and i≤M, M are the total of target data file
Number;
Case cover files generation module 605, for after obtaining M target data file, being given birth to according to the instruction of winding up the case of acquisition
At target back cover file, wherein above-mentioned target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
Second cryptographic Hash acquisition module 606, the second cryptographic Hash for obtaining above-mentioned target back cover file are called preset
Target block catenary system stores above-mentioned second cryptographic Hash, and above-mentioned target back cover file is stored in preset storage system.
Wherein, above-mentioned electronic health record update module 604 may include:
First judging submodule, whether the instruction action for judging to obtain includes newly-increased instruction or revision instruction, wherein
Above-mentioned newly-increased instruction is the instruction for obtaining i-th of target data file, and above-mentioned revision instruction is for former target data
The instruction for i-th of target data file that file obtains after being revised, above-mentioned original target data file serial number 1 ..., i-1
In any serial number it is corresponding needed for revise target data file;If the instruction action obtained is newly-increased instruction, the i-th Hash is triggered
Value increases submodule newly, if the instruction action obtained is revision instruction, the i-th cryptographic Hash of triggering revises submodule;
Above-mentioned i-th cryptographic Hash increases submodule newly, corresponding with the target data file for obtaining i-th of target data file
The i-th cryptographic Hash preset target block catenary system is called according to the storage location of above-mentioned file number and above-mentioned first cryptographic Hash
Above-mentioned i-th cryptographic Hash is stored, and above-mentioned i-th of target data file is stored in preset storage system;
Above-mentioned i-th cryptographic Hash revises submodule, corresponding with the target data file for obtaining i-th of target data file
The i-th cryptographic Hash;According to above-mentioned file number and above-mentioned former target data file, obtains above-mentioned former target data file and correspond to Hash
The storage location of value calls preset target block catenary system to store above-mentioned i-th cryptographic Hash according to acquired storage location,
And above-mentioned i-th of target data file is stored in preset storage system;Wherein, i-th of target data of acquisition is revised
File is to carry out the file of revision acquisition to former target data file by the way of additional Description of Revision, and revised i-th
A target data file quotes the storage location in target block catenary system of above-mentioned former target data file;
Above-mentioned apparatus can also include:
First storage location acquisition module, for obtaining above-mentioned i-th cryptographic Hash depositing in above-mentioned target block catenary system
Storage space is set.
Above-mentioned apparatus can also include:
Second storage location acquisition module, for obtaining above-mentioned second cryptographic Hash depositing in above-mentioned target block catenary system
Storage space is set.
Above-mentioned apparatus can also include:
Acquisition module is encoded, for being instructed according to the signature of reception, is obtained belonging to operator from preset configuration file
The coding of mechanism, the corresponding coding of operator;
First signature acquisition module, is used for according to the corresponding coding of aforesaid operations people, close using operator preset first
I-th of target data file of key pair is signed;
Second signature acquisition module, it is default using operator's institutional affiliation for the coding according to operator's institutional affiliation
The second key sign respectively to the signature of above-mentioned i-th of target data file and operator;
First submits module, and preset storage system is submitted to for i-th of target data to sign documents, wherein on
State i-th of target data file after i-th of target data signs documents as signature;
Jth cryptographic Hash acquisition module, the jth cryptographic Hash to sign documents for obtaining i-th of target data are called preset
Target block catenary system stores above-mentioned jth cryptographic Hash, wherein and j is that i-th of target signs documents the serial number of corresponding cryptographic Hash, i≤
M, M are the sum of target data file.
Above-mentioned apparatus can also include:
Read module, for being successively read file destination and target signature text according to timestamp from preset storage system
Part, wherein above-mentioned file destination is target case cover files, i-th of target data file or target back cover file, above-mentioned target label
It is the file after i-th of target data file signature to affix one's name to file;
First authentication module, for for each file destination, verifying whether the file destination is judged as effective document,
If the file destination is effective document, triggering the second verification submodule;
Whether above-mentioned second authentication module is effective document for verifying the corresponding target of the file destination and signing documents,
If the target signs documents as effective document, triggering association submodule;
Above-mentioned relating module is associated for the file destination to sign documents with the target.
Specifically, above-mentioned first authentication module includes:
Second judgment submodule judges the corresponding mechanism coding of the file destination and machine for being directed to each file destination
Whether structure signature is consistent, if the corresponding mechanism coding of the file destination is consistent with authority signature, triggers third judging submodule;
Above-mentioned third judging submodule, for judging whether the corresponding operator's coding of the file destination and operator sign
Unanimously;If the corresponding operator's coding of the file destination is consistent with operator's signature, the first effective document decision sub-module is triggered;
Above-mentioned first effective document decision sub-module, for judging the file destination for effective document.
Specifically, above-mentioned second authentication module includes:
4th judging submodule, for judging that the corresponding target of the file destination signs documents corresponding mechanism coding and machine
Whether structure signature is consistent;If the target signs documents, corresponding mechanism coding is consistent with authority signature, and triggering the 5th judges submodule
Block;
Above-mentioned 5th judging submodule, for judging that the target signs documents corresponding operator coding and operator's signature
Whether consistent, if the target signs documents, corresponding operator's coding is consistent with operator's signature, and the second effective document of triggering is sentenced
Stator modules;
Above-mentioned second effective document decision sub-module, for judging that the target signs documents as effective document.
Fig. 7 is the schematic diagram of the second provided in an embodiment of the present invention electronic health record storage device based on block chain, is answered
For target block catenary system, the above method includes:
First acquisition module 701, for being stored to the first cryptographic Hash obtained from client, and by the above-mentioned of acquisition
The storage location of first cryptographic Hash is sent in client, wherein above-mentioned first cryptographic Hash is the target cover that client creates
The cryptographic Hash of file, above-mentioned target case cover files are that the file number of the electronic health record of generation is recorded in the text of establishment by client
It is obtained on part, the file for creating initiating electron case history, above-mentioned file number is to generate above-mentioned electronics disease according to predetermined manner
The unique encodings gone through, above-mentioned storage location are uniquely determined by block number and transaction coding;
Second acquisition module 702, for being stored to the i-th cryptographic Hash obtained from client, and by the above-mentioned of acquisition
The storage location of i-th cryptographic Hash is sent in client, wherein above-mentioned i-th cryptographic Hash is client according to for obtaining i-th
The cryptographic Hash for i-th of target data file that the instruction action of target data file obtains, i are the serial number of target data file, i
For natural number, i≤M, M are the sum of target data file;
Third acquisition module 703, for being stored to the second cryptographic Hash obtained from client, and by the above-mentioned of acquisition
The storage location of second cryptographic Hash is sent in client, wherein above-mentioned second cryptographic Hash is the target back cover that client generates
The cryptographic Hash of file, above-mentioned target back cover file are for forbidding updating target data file to above-mentioned electronic health record.
Wherein, above-mentioned apparatus can also include:
4th acquisition module, for being stored to the jth cryptographic Hash obtained from client, and by the above-mentioned jth of acquisition
The storage location of cryptographic Hash is sent in client, wherein above-mentioned jth cryptographic Hash is the Kazakhstan that i-th of target data signs documents
Uncommon value, above-mentioned i-th of target data sign documents as signature after i-th of target data file, j is i-th of target signature text
Part corresponds to the serial number of cryptographic Hash.
Above-mentioned apparatus can also include:
Third authentication module, it is whether consistent for verifying the first prewired physical equipment key and preset first key,
Wherein, above-mentioned first physical equipment key is the corresponding physical equipment key of a node, and first key is the object with the node
The matched key of device keys is managed, if above-mentioned first physical equipment key is consistent with above-mentioned first key, the first signature of triggering connects
Mouth calling module;
Above-mentioned first signature interface calling module, the private key signature interface for calling first object key devices;
4th authentication module, for verifying the second prewired physical equipment key or preset-key and preset second key
It is whether consistent, if above-mentioned second physical equipment key or preset-key and above-mentioned second key agreement, trigger the second signature interface
Calling module, wherein above-mentioned second physical equipment key is the physical equipment key that operating personnel are equipped with, each operating personnel's
Key is different, and first key is the key for the physical equipment cipher key match being equipped with the operating personnel;
Above-mentioned second signature interface calling module, the private key signature interface for calling the second target cipher key equipment.
Above-mentioned apparatus can also include:
6th judgment module submits the mechanism digital signature of file destination cryptographic Hash transaction and operator digital for judging
Signature respectively whether with the preset key of node and the preset cipher key match of operator, if the file destination cryptographic Hash transaction machine
Structure digital signature and operator's digital signature trigger the 7th respectively with the preset key of node and the preset cipher key match of operator
Judgment module;
Above-mentioned 7th judgment module, it is whether correct for the storage location where judging the file destination cryptographic Hash, if
Correctly, file destination receiving module is triggered, wherein file destination is target case cover files, target back cover file or i-th of target
Data file.
File destination receiving module is determined as effective document for receiving the file destination, and by the file destination.
Above-mentioned apparatus can also include:
8th judgment module judges whether the node is specified contract node, if specified close for being directed to each node
About node triggers intelligent contract performer;
Above-mentioned intelligence contract performer calls the preposition of all effective contracts for triggering preset intelligent contract performer
Condition judges whether conditions present is consistent with default intelligence and the default precondition of about n, if above-mentioned conditions present and above-mentioned intelligence
Can be consistent with the default precondition of about n, trigger indicating module;Wherein, n is the coding of intelligent contract;
Above-mentioned indicating module is used to indicate the triggering of contract node and executes default shell script.
The embodiment of the present invention additionally provides a kind of electronic equipment, including processor and machine readable storage medium, above-mentioned machine
Device readable storage medium storing program for executing is stored with the machine-executable instruction that can be executed by above-mentioned processor, and above-mentioned processor is by above-mentioned machine
Executable instruction promotes:Realize the storage method of two kinds of electronic health records based on block chain provided in an embodiment of the present invention.
Specifically, the storage method of the first electronic health record based on block chain, including:
Above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are used
In the file for creating initiating electron case history;
The first cryptographic Hash for obtaining above-mentioned target case cover files calls preset target block catenary system storage above-mentioned first
Cryptographic Hash, and above-mentioned target case cover files are stored in preset storage system;
Obtain storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage location
It is uniquely determined by block number and transaction coding;
The instruction action for obtaining i-th of target data file is obtained, to update above-mentioned electronic health record, wherein i is mesh
The serial number of data file is marked, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein above-mentioned
Target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
The second cryptographic Hash for obtaining above-mentioned target back cover file calls preset target block catenary system storage above-mentioned second
Cryptographic Hash, and above-mentioned target back cover file is stored in preset storage system.
It can be seen that executing electronic equipment provided in this embodiment, by newly-increased target back cover file, electronics disease ensure that
The target data file gone through cannot be updated, and all content data files for constituting electronic health record are stored in preset storage
In system, the corresponding cryptographic Hash of each file destination is stored in target block catenary system, avoids electronic health record data quilt
The behavior distorted.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided
Storage mode is identical, and which is not described herein again.
The storage method of second of electronic health record based on block chain, including:
The first cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned first cryptographic Hash of acquisition
It is sent in client, wherein above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, above-mentioned target
Case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating just
The file of beginning electronic health record, above-mentioned file number are that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, above-mentioned storage
Position is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of above-mentioned i-th cryptographic Hash of acquisition is sent out
It is sent in client, wherein above-mentioned i-th cryptographic Hash is that client is dynamic according to the instruction for obtaining i-th of target data file
Make the cryptographic Hash of i-th of the target data file obtained, i is the serial number of target data file, and i is natural number, and i≤M, M are mesh
Mark the sum of data file;
The second cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned second cryptographic Hash of acquisition
It is sent in client, wherein above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, above-mentioned target
Back cover file is for forbidding updating target data file to above-mentioned electronic health record.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit,
CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal
Processing, DSP), it is application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete
Door or transistor logic, discrete hardware components.
It follows that execute electronic equipment provided in this embodiment, by the cryptographic Hash that obtains client according to the time
Stamp is stored, and the storage location of the cryptographic Hash of acquisition is sent in client, it is therefore prevented that electronic health record is tampered, after being
Whether the target data file of continuous inspection electronic health record, which is tampered, prepares.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided
Storage mode is identical, and which is not described herein again.
In another embodiment provided by the invention, a kind of electronic equipment is additionally provided, as shown in figure 8, including processor
801, communication interface 802, memory 803 and communication bus 804, wherein processor 801, communication interface 802, memory 803 are logical
It crosses communication bus 804 and completes mutual communication,
Memory 803, for storing computer program;
Processor 801 when for executing the program stored on memory 803, realizes provided in an embodiment of the present invention two
The storage method of electronic health record of the kind based on block chain.
Specifically, the storage method of the first electronic health record based on block chain, including:
Above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are used
In the file for creating initiating electron case history;
The first cryptographic Hash for obtaining above-mentioned target case cover files calls preset target block catenary system storage above-mentioned first
Cryptographic Hash, and above-mentioned target case cover files are stored in preset storage system;
Obtain storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage location
It is uniquely determined by block number and transaction coding;
The instruction action for obtaining i-th of target data file is obtained, to update above-mentioned electronic health record, wherein i is mesh
The serial number of data file is marked, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein above-mentioned
Target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
The second cryptographic Hash for obtaining above-mentioned target back cover file calls preset target block catenary system storage above-mentioned second
Cryptographic Hash, and above-mentioned target back cover file is stored in preset storage system.
It can be seen that executing electronic equipment provided in this embodiment, by newly-increased target back cover file, electronics disease ensure that
The target data file gone through cannot be updated, and all content data files for constituting electronic health record are stored in preset storage
In system, the corresponding cryptographic Hash of each file destination is stored in target block catenary system, avoids electronic health record data quilt
The behavior distorted.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided
Storage mode is identical, and which is not described herein again.
The storage method of second of electronic health record based on block chain, including:
The first cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned first cryptographic Hash of acquisition
It is sent in client, wherein above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, above-mentioned target
Case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating just
The file of beginning electronic health record, above-mentioned file number are that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, above-mentioned storage
Position is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of above-mentioned i-th cryptographic Hash of acquisition is sent out
It is sent in client, wherein above-mentioned i-th cryptographic Hash is that client is dynamic according to the instruction for obtaining i-th of target data file
Make the cryptographic Hash of i-th of the target data file obtained, i is the serial number of target data file, and i is natural number, and i≤M, M are mesh
Mark the sum of data file;
The second cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned second cryptographic Hash of acquisition
It is sent in client, wherein above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, above-mentioned target
Back cover file is for forbidding updating target data file to above-mentioned electronic health record.
The communication bus that above-mentioned electronic equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral Component
Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard
Architecture, EISA) bus etc..The communication bus can be divided into address bus, data/address bus, controlling bus etc..For just
It is only indicated with a thick line in expression, figure, it is not intended that an only bus or a type of bus.
Communication interface is for the communication between above-mentioned electronic equipment and other equipment.
Memory may include random access memory (Random Access Memory, RAM), can also include non-easy
The property lost memory (Non-Volatile Memory, NVM), for example, at least a magnetic disk storage.Optionally, memory may be used also
To be at least one storage device for being located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit,
CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal
Processing, DSP), it is application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete
Door or transistor logic, discrete hardware components.
Method provided in an embodiment of the present invention can be applied to electronic equipment.Specifically, the electronic equipment can be:It is desk-top
Computer, portable computer, intelligent mobile terminal, server etc..It is not limited thereto, any electricity that the present invention may be implemented
Sub- equipment, all belongs to the scope of protection of the present invention.
It follows that execute electronic equipment provided in this embodiment, by the cryptographic Hash that obtains client according to the time
Stamp is stored, and the storage location of the cryptographic Hash of acquisition is sent in client, it is therefore prevented that electronic health record is tampered, after being
Whether the target data file of continuous inspection electronic health record, which is tampered, prepares.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided
Storage mode is identical, and which is not described herein again.
In another embodiment provided by the invention, a kind of computer readable storage medium, above computer are additionally provided
Computer program is stored in readable storage medium storing program for executing, when above computer program is executed by processor so that computer executes
The storage method of two kinds of electronic health records based on block chain of above-described embodiment.
Specifically, the storage method of the first electronic health record based on block chain, including:
Above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are used
In the file for creating initiating electron case history;
The first cryptographic Hash for obtaining above-mentioned target case cover files calls preset target block catenary system storage above-mentioned first
Cryptographic Hash, and above-mentioned target case cover files are stored in preset storage system;
Obtain storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage location
It is uniquely determined by block number and transaction coding;
The instruction action for obtaining i-th of target data file is obtained, to update above-mentioned electronic health record, wherein i is mesh
The serial number of data file is marked, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein above-mentioned
Target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
The second cryptographic Hash for obtaining above-mentioned target back cover file calls preset target block catenary system storage above-mentioned second
Cryptographic Hash, and above-mentioned target back cover file is stored in preset storage system.
It can be seen that when executing the application program stored in computer readable storage medium provided in this embodiment, pass through
Newly-increased target back cover file, ensure that the target data file of electronic health record cannot be updated, and the institute that will constitute electronic health record
There is content data file to be stored in preset storage system, the corresponding cryptographic Hash of each data file is stored in target block
In catenary system, the behavior that electronic health record data are tampered is avoided.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided
Storage mode is identical, and which is not described herein again.
The storage method of second of electronic health record based on block chain, including:
The first cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned first cryptographic Hash of acquisition
It is sent in client, wherein above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, above-mentioned target
Case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating just
The file of beginning electronic health record, above-mentioned file number are that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, above-mentioned storage
Position is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of above-mentioned i-th cryptographic Hash of acquisition is sent out
It is sent in client, wherein above-mentioned i-th cryptographic Hash is that client is dynamic according to the instruction for obtaining i-th of target data file
Make the cryptographic Hash of i-th of the target data file obtained, i is the serial number of target data file, and i is natural number, and i≤M, M are mesh
Mark the sum of data file;
The second cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned second cryptographic Hash of acquisition
It is sent in client, wherein above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, above-mentioned target
Back cover file is for forbidding updating target data file to above-mentioned electronic health record.
It follows that when executing the application program stored in computer readable storage medium provided in this embodiment, pass through
The cryptographic Hash that client obtains is stored according to timestamp, and the storage location of the cryptographic Hash of acquisition is sent to client
In, it is therefore prevented that whether electronic health record is tampered, be tampered and prepare for the target data file of subsequent examination electronic health record.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided
Storage mode is identical, and which is not described herein again.
In another embodiment provided by the invention, a kind of computer program product including instruction is additionally provided, when it
When running on computers so that computer executes the storage method of two kinds of electronic health records based on block chain of above-described embodiment.
Specifically, the storage method of the first electronic health record based on block chain, including:
Above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are used
In the file for creating initiating electron case history;
The first cryptographic Hash for obtaining above-mentioned target case cover files calls preset target block catenary system storage above-mentioned first
Cryptographic Hash, and above-mentioned target case cover files are stored in preset storage system;
Obtain storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage location
It is uniquely determined by block number and transaction coding;
The instruction action for obtaining i-th of target data file is obtained, to update above-mentioned electronic health record, wherein i is mesh
The serial number of data file is marked, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein above-mentioned
Target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
The second cryptographic Hash for obtaining above-mentioned target back cover file calls preset target block catenary system storage above-mentioned second
Cryptographic Hash, and above-mentioned target back cover file is stored in preset storage system.
It can be seen that when executing computer program product provided in this embodiment, by newly-increased target back cover file, ensure
The target data file of electronic health record cannot be updated, and all content data files for constituting electronic health record are stored in pre-
If storage system in, the corresponding cryptographic Hash of each data file is stored in target block catenary system, avoid electronics disease
It counts one by one according to the behavior being tampered.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided
Storage mode is identical, and which is not described herein again.
The storage method of second of electronic health record based on block chain, including:
The first cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned first cryptographic Hash of acquisition
It is sent in client, wherein above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, above-mentioned target
Case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating just
The file of beginning electronic health record, above-mentioned file number are that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, above-mentioned storage
Position is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of above-mentioned i-th cryptographic Hash of acquisition is sent out
It is sent in client, wherein above-mentioned i-th cryptographic Hash is that client is dynamic according to the instruction for obtaining i-th of target data file
Make the cryptographic Hash of i-th of the target data file obtained, i is the serial number of target data file, and i is natural number, and i≤M, M are mesh
Mark the sum of data file;
The second cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned second cryptographic Hash of acquisition
It is sent in client, wherein above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, above-mentioned target
Back cover file is for forbidding updating target data file to above-mentioned electronic health record.
It follows that when executing computer program product provided in this embodiment, pass through the cryptographic Hash for obtaining client
It is stored according to timestamp, and the storage location of the cryptographic Hash of acquisition is sent in client, it is therefore prevented that electronic health record quilt
It distorts, whether is tampered and prepares for the target data file of subsequent examination electronic health record.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided
Storage mode is identical, and which is not described herein again.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its arbitrary combination real
It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.Above computer program
Product includes one or more computer instructions.On computers load and execute above computer program instruction when, all or
It partly generates according to above-mentioned flow or function of the embodiment of the present invention.Above computer can be all-purpose computer, special meter
Calculation machine, computer network or other programmable devices.Above computer instruction can be stored in computer readable storage medium
In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, above computer
Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center
User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or
Data center is transmitted.Above computer readable storage medium storing program for executing can be any usable medium that computer can access or
It is comprising data storage devices such as one or more usable mediums integrated server, data centers.Above-mentioned usable medium can be with
It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state disk
Solid State Disk (SSD)) etc..
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including above-mentioned element.
Each embodiment in this specification is all made of relevant mode and describes, identical similar portion between each embodiment
Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for device,
For electronic equipment, computer readable storage medium or computer program product embodiments, since it is substantially similar to method reality
Example is applied, so description is fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
It above are only presently preferred embodiments of the present invention above, be not intended to limit the scope of the present invention.It is all
Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention
It is interior.
Claims (23)
1. a kind of storage method of the electronic health record based on block chain, which is characterized in that be applied to client, the method packet
It includes:
The file number of the electronic health record of generation is recorded on the file of establishment, obtains target case cover files, wherein the archives
Number it is the unique encodings that the electronic health record is generated according to predetermined manner, the target case cover files are for creating initiating electron disease
The file gone through;
The first cryptographic Hash for obtaining the target case cover files calls preset target block catenary system to store first Hash
Value, and the target case cover files are stored in preset storage system;
Obtain storage location of first cryptographic Hash in the target block catenary system, wherein the storage location is by area
Block number and transaction coding uniquely determine;
The instruction action for obtaining i-th of target data file is obtained, to update the electronic health record, wherein i is number of targets
According to the serial number of file, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein the target
Back cover file is for forbidding updating target data file to the electronic health record;
The second cryptographic Hash for obtaining the target back cover file calls preset target block catenary system to store second Hash
Value, and the target back cover file is stored in preset storage system.
2. the method as described in claim 1, which is characterized in that the finger obtained for obtaining i-th of target data file
Order acts, to update the electronic health record, including:
Judge whether the instruction action obtained includes newly-increased instruction or revision instruction, wherein the newly-increased instruction is for obtaining
The instruction of i-th of target data file, the revision instruction are i-th for being obtained after being revised to former target data file
The instruction of a target data file, the original target data file serial number 1 ..., the corresponding required revision of any serial number in i-1
Target data file;
If the instruction action obtained is newly-increased instruction, i-th of target data file corresponding with the target data file i-th is obtained
Cryptographic Hash calls preset target block catenary system to store according to the storage location of the file number and first cryptographic Hash
I-th cryptographic Hash, and i-th of target data file is stored in preset storage system;
If the instruction action obtained is revision instruction, i-th of target data file corresponding with the target data file i-th is obtained
Cryptographic Hash;According to the file number and the former target data file, the storage that former target data file corresponds to cryptographic Hash is obtained
Preset target block catenary system is called to store i-th cryptographic Hash, and will be described according to acquired storage location in position
I-th of target data file is stored in preset storage system;Wherein, i-th of target data file for revising acquisition is to adopt
The file of revision acquisition, and revised i-th of number of targets are carried out to former target data file with the mode of additional Description of Revision
According to file quote the former target data file target block catenary system storage location.
3. method as claimed in claim 2, which is characterized in that called described in preset target block catenary system storage described
I-th cryptographic Hash, and after i-th of target data file is stored in preset storage system, the method further includes:
Obtain storage location of i-th cryptographic Hash in the target block catenary system.
4. method according to any one of claims 1 to 3, which is characterized in that the target case cover files, target back cover text
Part is to record first object information with preset coded format, and the first object information includes file number, file type, refers to
It is target case cover files, target back cover file to enable action and file content, the file type.
5. method as claimed in claim 4, which is characterized in that the target data file is remembered with preset coded format
The second target information is recorded, second target information includes in file number, file type, name file, instruction action and file
Hold, the file type further includes target data file.
6. method as claimed in claim 5, which is characterized in that the coded format includes XML coded formats, JSON coding lattice
Formula, pure file format or binary format.
7. method as claimed in claim 6, which is characterized in that the target data file includes first page of illness case file, the course of disease
It records file, nursing history file, examine checklist or discharge record;
Described instruction action includes newly-increased instruction, signature instruction or revision instruction, wherein the signature instruction is mechanism or operation
The instruction that people signs to target data file;
The file content includes data content, generates the unique identifier of the mechanism coding and patient of electronic health record.
8. the method as described in claim 1, which is characterized in that in second Hash for obtaining the target back cover file
Value calls preset target block catenary system to store second cryptographic Hash, and the target back cover file is stored in default
Storage system in after, the method further includes:
Obtain storage location of second cryptographic Hash in the target block catenary system.
9. the method as described in any one of claim 5~8, which is characterized in that obtain the target back cover file described
The second cryptographic Hash, call preset target block catenary system to store second cryptographic Hash, and by the target back cover file
After being stored in preset storage system, the method further includes:
It is instructed according to the signature of reception, the coding of operator's institutional affiliation is obtained from preset configuration file, operator corresponds to
Coding;
According to the corresponding coding of the operator, carried out using i-th of target data file of the preset first key pair of operator
Signature;
According to the coding of operator's institutional affiliation, using preset second key of operator's institutional affiliation respectively to described i-th
Target data file and the signature of operator are signed;
I-th of target data is signed documents and is submitted to preset storage system, wherein i-th of target data signature text
Part is i-th of target data file after signature;
The jth cryptographic Hash that i-th of target data signs documents is obtained, preset target block catenary system is called to store the jth
Cryptographic Hash, wherein j is that i-th of target signs documents the serial number of corresponding cryptographic Hash, and i≤M, M are the sum of target data file.
10. method as claimed in claim 9, which is characterized in that in the jth that i-th of target data of the acquisition signs documents
Cryptographic Hash, after calling preset target block catenary system to store the jth cryptographic Hash, the method further includes:
File destination is successively read according to timestamp from preset storage system and target signs documents, wherein the target
File is target case cover files, i-th of target data file or target back cover file, and the target signs documents as i-th of mesh
Mark the file after data file signature;
For each file destination, verify whether the file destination is judged as effective document;
Whether if the file destination is effective document, it is effective document to verify the corresponding target of the file destination and sign documents;
If the target signs documents as effective document, which is signed documents with the target and is associated.
11. method as claimed in claim 10, which is characterized in that it is described to be directed to each file destination, verify the file destination
Whether effective document is judged as, including:
For each file destination, judge whether the corresponding mechanism coding of the file destination is consistent with authority signature;
If the corresponding mechanism coding of the file destination is consistent with authority signature, judge the file destination corresponding operator coding and
Whether operator's signature is consistent;
If the corresponding operator's coding of the file destination is consistent with operator's signature, judge the file destination for effective document.
12. method as claimed in claim 10, which is characterized in that the corresponding target of described verification file destination signs documents
Whether it is effective document, including:
Judge whether the corresponding target of the file destination corresponding mechanism coding that signs documents is consistent with authority signature;
If the target signs documents, corresponding mechanism coding is consistent with authority signature, judges that the target signs documents corresponding operation
Whether people encodes consistent with operator's signature;
If the target signs documents, corresponding operator's coding is consistent with operator's signature, and it is effective to judge that the target signs documents
File.
13. a kind of storage method of the electronic health record based on block chain, which is characterized in that be applied to target block catenary system, institute
The method of stating includes:
The first cryptographic Hash obtained from client is stored, and the storage location of first cryptographic Hash of acquisition is sent
Into client, wherein first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, the target cover
File is that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating initial electricity
The file of sub- case history, the file number are that the unique encodings of the electronic health record are generated according to predetermined manner, the storage location
It is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of i-th cryptographic Hash of acquisition is sent to
In client, wherein i-th cryptographic Hash is that client is obtained according to the instruction action for obtaining i-th of target data file
The cryptographic Hash of i-th of the target data file obtained, i are the serial number of target data file, and i is natural number, and i≤M, M are number of targets
According to the sum of file;
The second cryptographic Hash obtained from client is stored, and the storage location of second cryptographic Hash of acquisition is sent
Into client, wherein second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, the target back cover
File is for forbidding updating target data file to the electronic health record.
14. method as claimed in claim 13, which is characterized in that carried out to the first cryptographic Hash obtained from client described
Storage, and after the storage location of first cryptographic Hash of acquisition is sent in client, the method further includes:
The jth cryptographic Hash obtained from client is stored, and the storage location of the jth cryptographic Hash of acquisition is sent to
In client, wherein the jth cryptographic Hash is the cryptographic Hash that i-th of target data signs documents, i-th of target data
I-th of target data file after signing documents as signature, j are that i-th of target signs documents the serial number of corresponding cryptographic Hash.
15. method as claimed in claim 13, which is characterized in that carried out to the first cryptographic Hash obtained from client described
Storage, and before the storage location of first cryptographic Hash of acquisition is sent in client, the method further includes:
It verifies the first prewired physical equipment key and whether preset first key is consistent, wherein first physical equipment
Key is the corresponding physical equipment key of a node, and first key is the key with the physical equipment cipher key match of the node;
If the first physical equipment key is consistent with the first key, the private key signature of first object key devices is called to connect
Mouthful;
It verifies the second prewired physical equipment key or preset-key and whether preset second key is consistent;Wherein, described
Two physical equipment keys are the physical equipment key that operating personnel are equipped with, and the key of each operating personnel is different, first key
For the key for the physical equipment cipher key match being equipped with the operating personnel;
If the second physical equipment key or preset-key and second key agreement, call the second target cipher key equipment
Private key signature interface.
16. method as claimed in claim 15, which is characterized in that if in the second physical equipment key or presetting close
Key and second key agreement, after the private key signature interface for calling the second target cipher key equipment, the method further includes:
Judge to submit the mechanism digital signature of file destination cryptographic Hash transaction and operator's digital signature whether pre- with node respectively
If the preset cipher key match of key and operator;
If the file destination cryptographic Hash transaction mechanism digital signature and operator's digital signature respectively with the preset key of node
With the preset cipher key match of operator, whether the storage location where judging the file destination cryptographic Hash is correct, wherein target text
Part is target case cover files, target back cover file or i-th of target data file;
If correct, the file destination is received, and the file destination is determined as effective document.
17. the method described in claim 16, which is characterized in that carried out to the second cryptographic Hash obtained from client described
Storage, and before the storage location of second cryptographic Hash of acquisition is sent in client, the method further includes:
For each node, judge whether the node is specified contract node;
If specified contract node, the precondition that preset intelligent contract performer calls all effective contracts is triggered, is judged
Whether conditions present is consistent with default intelligence and the default precondition of about n, wherein n is the coding of intelligent contract;
If the conditions present is consistent with the intelligence and the default precondition of about n, instruction contract node triggering executes default
Shell script.
18. a kind of storage device of the electronic health record based on block chain, which is characterized in that be applied to client, described device packet
It includes:
Case cover files generation module, the file for the file number of the electronic health record of generation to be recorded in establishment obtain target
Case cover files, wherein the file number is that the unique encodings of the electronic health record are generated according to predetermined manner, the target cover
File is used to create the file of initiating electron case history;
First cryptographic Hash acquisition module, the first cryptographic Hash for obtaining the target case cover files, calls preset target area
Block catenary system stores first cryptographic Hash, and the target case cover files are stored in preset storage system;
First storage location acquisition module, for obtaining storage position of first cryptographic Hash in the target block catenary system
It sets, wherein the storage location is uniquely determined by block number and transaction coding;
Electronic health record update module, for obtaining the instruction action for obtaining i-th of target data file, to update the electricity
Sub- case history, wherein i is the serial number of target data file, and i is natural number, and i≤M, M are the sum of target data file;
Case cover files generation module, for after obtaining M target data file, target envelope to be generated according to the instruction of winding up the case of acquisition
Bottom file, wherein the target back cover file is for forbidding updating target data file to the electronic health record;
Second cryptographic Hash acquisition module, the second cryptographic Hash for obtaining the target back cover file, calls preset target area
Block catenary system stores second cryptographic Hash, and the target back cover file is stored in preset storage system.
19. a kind of storage device of the electronic health record based on block chain, which is characterized in that be applied to target block catenary system, institute
Stating device includes:
First acquisition module is breathed out for being stored to the first cryptographic Hash obtained from client, and by described the first of acquisition
The storage location of uncommon value is sent in client, wherein first cryptographic Hash is the target case cover files that client creates
Cryptographic Hash, the target case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain
, the file for creating initiating electron case history, the file number is to generate the electronic health record only according to predetermined manner
One coding, the storage location are uniquely determined by block number and transaction coding;
Second acquisition module, for being stored to the i-th cryptographic Hash obtained from client, and by i-th Hash of acquisition
The storage location of value is sent in client, wherein i-th cryptographic Hash is client according to for obtaining i-th of number of targets
According to the cryptographic Hash for i-th of target data file that the instruction action of file obtains, i is the serial number of target data file, and i is nature
Number, i≤M, M are the sum of target data file;
Third acquisition module is breathed out for being stored to the second cryptographic Hash obtained from client, and by described the second of acquisition
The storage location of uncommon value is sent in client, wherein second cryptographic Hash is the target back cover file that client generates
Cryptographic Hash, the target back cover file are for forbidding updating target data file to the electronic health record.
20. a kind of electronic equipment, which is characterized in that including processor and machine readable storage medium, the machine readable storage
Media storage has the machine-executable instruction that can be executed by the processor, and the processor is by the machine-executable instruction
Promote:Realize any method and step of claim 1~12.
21. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
Program realizes claim 1~12 any method and step when the computer program is executed by processor.
22. a kind of electronic equipment, which is characterized in that including processor and machine readable storage medium, the machine readable storage
Media storage has the machine-executable instruction that can be executed by the processor, and the processor is by the machine-executable instruction
Promote:Realize any method and step of claim 13~17.
23. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
Program realizes claim 13~17 any method and step when the computer program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711424940.3A CN108573737B (en) | 2017-12-25 | 2017-12-25 | Storage method, device, equipment and storage medium of electronic medical record |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711424940.3A CN108573737B (en) | 2017-12-25 | 2017-12-25 | Storage method, device, equipment and storage medium of electronic medical record |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108573737A true CN108573737A (en) | 2018-09-25 |
CN108573737B CN108573737B (en) | 2020-08-07 |
Family
ID=63575989
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711424940.3A Active CN108573737B (en) | 2017-12-25 | 2017-12-25 | Storage method, device, equipment and storage medium of electronic medical record |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108573737B (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108876227A (en) * | 2018-09-28 | 2018-11-23 | 国网河南省电力公司南阳供电公司 | A kind of power grid material supply quotient's hierarchical management system |
CN109255251A (en) * | 2018-10-31 | 2019-01-22 | 安徽中科智链信息科技有限公司 | File data based on block chain technology protects system and method |
CN109376172A (en) * | 2018-09-27 | 2019-02-22 | 精硕科技(北京)股份有限公司 | Data capture method and system based on block chain |
CN109409135A (en) * | 2018-10-19 | 2019-03-01 | 北京金山云网络技术有限公司 | A kind of characteristic information preparation method, device, equipment and the storage medium of data |
CN109886692A (en) * | 2019-03-08 | 2019-06-14 | 泰康保险集团股份有限公司 | Data transmission method, device, medium and electronic equipment based on block chain |
CN109949882A (en) * | 2018-11-15 | 2019-06-28 | 陕西医链区块链集团有限公司 | Medical block chain data storage system |
CN110197707A (en) * | 2019-05-23 | 2019-09-03 | 泰康保险集团股份有限公司 | Medical record information processing method, device, medium and electronic equipment based on block chain |
CN110378133A (en) * | 2019-06-28 | 2019-10-25 | 深圳市元征科技股份有限公司 | A kind of document protection method, device, electronic equipment and storage medium |
CN110993112A (en) * | 2019-11-20 | 2020-04-10 | 泰康保险集团股份有限公司 | Tumor treatment case management method, system, medium and electronic device based on block chain |
CN111475538A (en) * | 2019-01-24 | 2020-07-31 | 北京京东尚科信息技术有限公司 | Data processing method, device and storage medium |
CN111523135A (en) * | 2020-07-06 | 2020-08-11 | 飞天诚信科技股份有限公司 | PDF file electronic signature method and device |
CN111767427A (en) * | 2019-04-02 | 2020-10-13 | 浙江宇视科技有限公司 | Video information storage method and data storage domain |
CN111782338A (en) * | 2018-12-12 | 2020-10-16 | 阿里巴巴集团控股有限公司 | Data processing method and system based on intelligent contract of block chain |
CN112100171A (en) * | 2020-08-12 | 2020-12-18 | 北京大学 | Method and device for establishing content index for random consensus diagram book |
CN113254979A (en) * | 2021-06-26 | 2021-08-13 | 环球数科集团有限公司 | Credible examination system for protecting business privacy and computer storage medium |
CN113611383A (en) * | 2021-08-20 | 2021-11-05 | 平安国际智慧城市科技股份有限公司 | Medical information acquisition method and device, electronic equipment and storage medium |
CN114185997A (en) * | 2022-02-17 | 2022-03-15 | 天津眧合数字科技有限公司 | Pet information credible storage system based on block chain |
CN116631564A (en) * | 2023-07-25 | 2023-08-22 | 汶上县人民医院 | Emergency electronic medical record management system and management method |
CN117037988A (en) * | 2023-08-22 | 2023-11-10 | 广州视景医疗软件有限公司 | Electronic medical record storage method and device based on blockchain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150205929A1 (en) * | 2014-01-23 | 2015-07-23 | Dror Samuel Brama | Method, System and Program Product for Transferring Genetic and Health Data |
WO2017074017A1 (en) * | 2015-10-26 | 2017-05-04 | 주식회사 아이알엠 | Method for building cloud-based medical image database for protection of patient information and reading medical image therefrom |
CN106682530A (en) * | 2017-01-10 | 2017-05-17 | 杭州电子科技大学 | Method and device for medical information sharing privacy protection based on blockchain technology |
CN106777923A (en) * | 2016-11-30 | 2017-05-31 | 谭小刚 | Information for hospital supervising platform and monitoring and managing method |
CN106934243A (en) * | 2017-03-17 | 2017-07-07 | 北京好运到信息科技有限公司 | A kind of electronic health record management method and system |
CN107368750A (en) * | 2017-06-23 | 2017-11-21 | 雷虹 | The implementation method and device of electronic health record based on block chain |
CN107391944A (en) * | 2017-07-27 | 2017-11-24 | 北京太云科技有限公司 | A kind of electronic health record shared system based on block chain |
-
2017
- 2017-12-25 CN CN201711424940.3A patent/CN108573737B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150205929A1 (en) * | 2014-01-23 | 2015-07-23 | Dror Samuel Brama | Method, System and Program Product for Transferring Genetic and Health Data |
WO2017074017A1 (en) * | 2015-10-26 | 2017-05-04 | 주식회사 아이알엠 | Method for building cloud-based medical image database for protection of patient information and reading medical image therefrom |
CN106777923A (en) * | 2016-11-30 | 2017-05-31 | 谭小刚 | Information for hospital supervising platform and monitoring and managing method |
CN106682530A (en) * | 2017-01-10 | 2017-05-17 | 杭州电子科技大学 | Method and device for medical information sharing privacy protection based on blockchain technology |
CN106934243A (en) * | 2017-03-17 | 2017-07-07 | 北京好运到信息科技有限公司 | A kind of electronic health record management method and system |
CN107368750A (en) * | 2017-06-23 | 2017-11-21 | 雷虹 | The implementation method and device of electronic health record based on block chain |
CN107391944A (en) * | 2017-07-27 | 2017-11-24 | 北京太云科技有限公司 | A kind of electronic health record shared system based on block chain |
Non-Patent Citations (3)
Title |
---|
沈鑫: ""区块链技术综述"", 《网络与信息安全学报》 * |
谭霜 等: ""云存储中的数据完整性证明研究及进展"", 《计算机学报》 * |
黄永刚: ""基于区块链技术的电子健康档案安全建设"", 《中华医学图书情报杂志》 * |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109376172A (en) * | 2018-09-27 | 2019-02-22 | 精硕科技(北京)股份有限公司 | Data capture method and system based on block chain |
CN108876227A (en) * | 2018-09-28 | 2018-11-23 | 国网河南省电力公司南阳供电公司 | A kind of power grid material supply quotient's hierarchical management system |
CN109409135A (en) * | 2018-10-19 | 2019-03-01 | 北京金山云网络技术有限公司 | A kind of characteristic information preparation method, device, equipment and the storage medium of data |
CN109409135B (en) * | 2018-10-19 | 2021-06-22 | 北京金山云网络技术有限公司 | Method, device, equipment and storage medium for acquiring characteristic information of data |
CN109255251A (en) * | 2018-10-31 | 2019-01-22 | 安徽中科智链信息科技有限公司 | File data based on block chain technology protects system and method |
CN109255251B (en) * | 2018-10-31 | 2023-10-10 | 安徽中科晶格技术有限公司 | File data protection system and method based on block chain technology |
CN109949882A (en) * | 2018-11-15 | 2019-06-28 | 陕西医链区块链集团有限公司 | Medical block chain data storage system |
CN111782338A (en) * | 2018-12-12 | 2020-10-16 | 阿里巴巴集团控股有限公司 | Data processing method and system based on intelligent contract of block chain |
CN111782338B (en) * | 2018-12-12 | 2024-05-03 | 创新先进技术有限公司 | Data processing method and system based on blockchain intelligent contract |
CN111475538A (en) * | 2019-01-24 | 2020-07-31 | 北京京东尚科信息技术有限公司 | Data processing method, device and storage medium |
CN109886692B (en) * | 2019-03-08 | 2021-05-07 | 泰康保险集团股份有限公司 | Data transmission method, device, medium and electronic equipment based on block chain |
CN109886692A (en) * | 2019-03-08 | 2019-06-14 | 泰康保险集团股份有限公司 | Data transmission method, device, medium and electronic equipment based on block chain |
CN111767427B (en) * | 2019-04-02 | 2024-04-05 | 浙江宇视科技有限公司 | Video information storage method and data storage domain |
CN111767427A (en) * | 2019-04-02 | 2020-10-13 | 浙江宇视科技有限公司 | Video information storage method and data storage domain |
CN110197707B (en) * | 2019-05-23 | 2021-07-30 | 泰康保险集团股份有限公司 | Block chain-based medical record information processing method, device, medium and electronic equipment |
CN110197707A (en) * | 2019-05-23 | 2019-09-03 | 泰康保险集团股份有限公司 | Medical record information processing method, device, medium and electronic equipment based on block chain |
CN110378133A (en) * | 2019-06-28 | 2019-10-25 | 深圳市元征科技股份有限公司 | A kind of document protection method, device, electronic equipment and storage medium |
CN110993112A (en) * | 2019-11-20 | 2020-04-10 | 泰康保险集团股份有限公司 | Tumor treatment case management method, system, medium and electronic device based on block chain |
CN110993112B (en) * | 2019-11-20 | 2023-04-18 | 泰康保险集团股份有限公司 | Tumor treatment case management method, system, medium and electronic device based on block chain |
CN111523135A (en) * | 2020-07-06 | 2020-08-11 | 飞天诚信科技股份有限公司 | PDF file electronic signature method and device |
CN112100171A (en) * | 2020-08-12 | 2020-12-18 | 北京大学 | Method and device for establishing content index for random consensus diagram book |
CN113254979A (en) * | 2021-06-26 | 2021-08-13 | 环球数科集团有限公司 | Credible examination system for protecting business privacy and computer storage medium |
CN113611383A (en) * | 2021-08-20 | 2021-11-05 | 平安国际智慧城市科技股份有限公司 | Medical information acquisition method and device, electronic equipment and storage medium |
CN113611383B (en) * | 2021-08-20 | 2024-02-02 | 深圳平安智慧医健科技有限公司 | Medical information acquisition method, device, electronic equipment and storage medium |
CN114185997B (en) * | 2022-02-17 | 2022-05-13 | 天津眧合数字科技有限公司 | Pet information credible storage system based on block chain |
CN114185997A (en) * | 2022-02-17 | 2022-03-15 | 天津眧合数字科技有限公司 | Pet information credible storage system based on block chain |
CN116631564B (en) * | 2023-07-25 | 2023-10-10 | 汶上县人民医院 | Emergency electronic medical record management system and management method |
CN116631564A (en) * | 2023-07-25 | 2023-08-22 | 汶上县人民医院 | Emergency electronic medical record management system and management method |
CN117037988A (en) * | 2023-08-22 | 2023-11-10 | 广州视景医疗软件有限公司 | Electronic medical record storage method and device based on blockchain |
CN117037988B (en) * | 2023-08-22 | 2024-05-17 | 广州视景医疗软件有限公司 | Electronic medical record storage method and device based on blockchain |
Also Published As
Publication number | Publication date |
---|---|
CN108573737B (en) | 2020-08-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108573737A (en) | A kind of storage method of electronic health record, device, equipment and storage medium | |
Elangovan et al. | Application of blockchain technology in hospital information system | |
Dubovitskaya et al. | Secure and trustable electronic medical records sharing using blockchain | |
Saha et al. | Review on “Blockchain technology based medical healthcare system with privacy issues” | |
TWI815905B (en) | System and method for regulating a value of a cryptocurrency used in a health care network | |
US10490304B2 (en) | Device-driven non-intermediated blockchain system over a social integrity network | |
US20200090795A1 (en) | Method and system for sharing privacy data based on smart contracts | |
CN108460290A (en) | A kind of Electronic Health Record management system and method | |
CN108665953A (en) | A kind of prescription executes method, apparatus, equipment and storage medium | |
US20220191048A1 (en) | Cryptographically Verifiable, Portable Certificate | |
Stroetmann et al. | United in diversity: legal challenges on the road towards interoperable eHealth solutions in Europe | |
Wu et al. | A patient-centric interoperable framework for health information exchange via blockchain | |
Koushik et al. | Performance analysis of blockchain-based medical records management system | |
Ciampi et al. | Modernizing healthcare by using blockchain | |
Kushch et al. | Blockchain tree for ehealth | |
Jafri et al. | Blockchain applications for the healthcare sector: Uses beyond Bitcoin | |
Zhang et al. | [Retracted] Design and Application of Electronic Rehabilitation Medical Record (ERMR) Sharing Scheme Based on Blockchain Technology | |
TW200535746A (en) | A method for protecting information integrity | |
Rghioui et al. | Blockchain-based Electronic Healthcare Information System Optimized for Developing Countries. | |
Sapra et al. | A blockchain solution for the privacy of patients’ medical data | |
US11985227B2 (en) | Method and a system for securing data, especially data of biotechnological laboratories | |
CN112883028B (en) | Medical data trusted memory management system based on blockchain | |
CN109949889B (en) | Electronic medical record nursing system | |
KR20060110114A (en) | System of managing electrical medical information and method of generating electrical medical information | |
Deborah et al. | Blockchain: a possible alternative to achieving health information exchange (hie) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |