CN108573737A - A kind of storage method of electronic health record, device, equipment and storage medium - Google Patents

A kind of storage method of electronic health record, device, equipment and storage medium Download PDF

Info

Publication number
CN108573737A
CN108573737A CN201711424940.3A CN201711424940A CN108573737A CN 108573737 A CN108573737 A CN 108573737A CN 201711424940 A CN201711424940 A CN 201711424940A CN 108573737 A CN108573737 A CN 108573737A
Authority
CN
China
Prior art keywords
file
target
cryptographic hash
target data
data file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711424940.3A
Other languages
Chinese (zh)
Other versions
CN108573737B (en
Inventor
郭杏荣
杨赵伟
王育林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jin Bo Xunrui Network Technology Co Ltd
Beijing Jinxun Ruibo Network Technology Co Ltd
Beijing Kingsoft Cloud Network Technology Co Ltd
Beijing Kingsoft Cloud Technology Co Ltd
Original Assignee
Beijing Jin Bo Xunrui Network Technology Co Ltd
Beijing Kingsoft Cloud Network Technology Co Ltd
Beijing Kingsoft Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jin Bo Xunrui Network Technology Co Ltd, Beijing Kingsoft Cloud Network Technology Co Ltd, Beijing Kingsoft Cloud Technology Co Ltd filed Critical Beijing Jin Bo Xunrui Network Technology Co Ltd
Priority to CN201711424940.3A priority Critical patent/CN108573737B/en
Publication of CN108573737A publication Critical patent/CN108573737A/en
Application granted granted Critical
Publication of CN108573737B publication Critical patent/CN108573737B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

An embodiment of the present invention provides a kind of storage method of electronic health record, device, equipment and storage medium, this method belongs to big data technical field of memory, including:The file number of the electronic health record of generation is recorded on the file of establishment, target case cover files are obtained, obtains the first cryptographic Hash, invocation target block catenary system stores the first cryptographic Hash, and within the storage system by the storage of target case cover files;Obtain storage location of first cryptographic Hash in target block catenary system, obtain the instruction action for obtaining i-th of target data file, to update electronic health record, after obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, target back cover file is generated according to the instruction of winding up the case of acquisition, obtains the second cryptographic Hash, invocation target block catenary system stores the second cryptographic Hash, and within the storage system by the storage of target back cover file.Method provided in this embodiment avoids the behavior that electronic health record data are tampered.

Description

A kind of storage method of electronic health record, device, equipment and storage medium
Technical field
The present invention relates to big data technical field of memory, more particularly to a kind of storage method of electronic health record, device, set Standby and storage medium.
Background technology
Electronic health record refers to medical worker during curative activity, word that use information system generates, symbol, figure The digital informations such as table, figure, number, image, and can realize storage, management, transmission and the medical records reappeared, it is case history A kind of record form, including door (urgency) are diagnosed a disease and are gone through and inpatient cases.
According to code requirement, electronic medical record system should be operating personnel and provides proprietary identity and means of identification, And corresponding authority is set.The use of operating personnel's identity proprietary to itself is responsible for.Meanwhile medical institutions should be patient Electronic health record assigns unique patient's identity, to ensure the authenticity, consistency, company of patient basis and its medical records Continuous property, integrality.In addition, examining electronic health record by the door (urgency) of medical institutions' keeping, the holding time is medical from patient's last time From no less than 15 years;In hospital the electronic health record holding time from patient last time leave hospital from no less than 30 years.
Currently, planning commission's (full name is defended in electronic medical record system use:National health and Family Planning Committee) centralized purchasing, Data are then stored directly in the computer room for defending planning commission's management or report daily to defending planning commission.The scheme of this centralization data storage, Still it is difficult to avoid that the behavior for even finding data tampering.
Invention content
In view of this, the embodiment of the present invention be designed to provide a kind of storage method of electronic health record, device, equipment and Storage medium, the behavior being tampered to avoid electronic health record data.
Specific technical solution is as follows:
The file number of the electronic health record of generation is recorded on the file of establishment, obtains target case cover files, wherein described File number is that the unique encodings of the electronic health record are generated according to predetermined manner, and the target case cover files are for creating initial electricity The file of sub- case history;
The first cryptographic Hash for obtaining the target case cover files calls preset target block catenary system storage described first Cryptographic Hash, and the target case cover files are stored in preset storage system;
Obtain storage location of first cryptographic Hash in the target block catenary system, wherein the storage location It is uniquely determined by block number and transaction coding;
The instruction action for obtaining i-th of target data file is obtained, to update the electronic health record, wherein i is mesh The serial number of data file is marked, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein described Target back cover file is for forbidding updating target data file to the electronic health record;
The second cryptographic Hash for obtaining the target back cover file calls preset target block catenary system storage described second Cryptographic Hash, and the target back cover file is stored in preset storage system.
Further, the instruction action obtained for obtaining i-th of target data file, to update the electronics disease It goes through, including:
Judge whether the instruction action obtained includes newly-increased instruction or revision instruction, wherein the newly-increased instruction for for The instruction of i-th of target data file is obtained, the revision instruction is for being obtained after being revised to former target data file I-th of target data file instruction, the original target data file serial number 1 ..., the corresponding institute of any serial number in i-1 The target data file that need to be revised;
If the instruction action obtained is newly-increased instruction, it is corresponding with the target data file to obtain i-th of target data file The i-th cryptographic Hash preset target block catenary system is called according to the storage location of the file number and first cryptographic Hash I-th cryptographic Hash is stored, and i-th of target data file is stored in preset storage system;
If the instruction action obtained is revision instruction, it is corresponding with the target data file to obtain i-th of target data file The i-th cryptographic Hash;According to the file number and the former target data file, obtains former target data file and correspond to cryptographic Hash Storage location calls preset target block catenary system to store i-th cryptographic Hash, and will according to acquired storage location I-th of target data file is stored in preset storage system;Wherein, i-th of target data file of acquisition is revised It is to carry out the file of revision acquisition to former target data file by the way of additional Description of Revision, and revised i-th of mesh Mark data file quote the former target data file target block catenary system storage location.
Further, in i-th of target data file of the acquisition the i-th cryptographic Hash corresponding with the target data file, According to the storage location of the file number and first cryptographic Hash, preset target block catenary system storage described i-th is called Cryptographic Hash, and after i-th of target data file is stored in preset storage system, further include:
Obtain storage location of i-th cryptographic Hash in the target block catenary system.
Further, the target case cover files, target back cover file are to record the first mesh with preset coded format Information is marked, the first object information includes file number, file type, instruction action and file content, and the file type is Target case cover files, target back cover file.
Further, the target data file is to record the second target information with preset coded format, described the Two target informations include file number, file type, name file, instruction action and file content, and the file type further includes Target data file.
Further, the coded format includes XML coded formats, JSON coded formats, pure file format or binary system Format.
Further, the target data file include first page of illness case file, progress note file, nursing history file, Examine checklist or discharge record;
Described instruction action includes newly-increased instruction, signature instruction or revision instruction, wherein the signature instruction for mechanism or The instruction that operator signs to target data file;
The file content includes data content, generates the unique identifier of the mechanism coding and patient of electronic health record.
Further, preset target block catenary system is called to store i-th cryptographic Hash described, and by described i-th After a target data file is stored in preset storage system, further include:
Obtain storage location of i-th cryptographic Hash in the target block catenary system.
Further, in second cryptographic Hash for obtaining the target back cover file, preset target block chain is called System stores second cryptographic Hash, and after the target back cover file is stored in preset storage system, further includes:
Obtain storage location of second cryptographic Hash in the target block catenary system.
Further, in second cryptographic Hash for obtaining the target back cover file, preset target block chain is called System stores second cryptographic Hash, and after the target back cover file is stored in preset storage system, further includes:
It is instructed according to the signature of reception, coding, the operator of operator's institutional affiliation is obtained from preset configuration file Corresponding coding;
According to the corresponding coding of the operator, operator's i-th of target data file of preset first key pair is utilized It signs;
According to the coding of operator's institutional affiliation, using preset second key of operator's institutional affiliation respectively to described I target data file and the signature of operator are signed;
I-th of target data is signed documents and is submitted to preset storage system, wherein i-th of target data label Administration's file is i-th of target data file after signature;
The jth cryptographic Hash that i-th of target data signs documents is obtained, is called described in preset target block catenary system storage Jth cryptographic Hash, wherein j is that i-th of target signs documents the serial number of corresponding cryptographic Hash, and i≤M, M are the total of target data file Number.
Further, the jth cryptographic Hash to sign documents in i-th of target data of the acquisition, calls preset target area After block catenary system stores the jth cryptographic Hash, further include:
File destination is successively read according to timestamp from preset storage system and target signs documents, wherein described File destination is target case cover files, i-th of target data file or target back cover file, and it is i-th that the target, which signs documents, File after a target data file signature;
For each file destination, verify whether the file destination is judged as effective document;
Whether if the file destination is effective document, it is effective text to verify the corresponding target of the file destination and sign documents Part;
If the target signs documents as effective document, which is signed documents with the target and is associated.
Further, described to be directed to each file destination, it verifies whether the file destination is judged as effective document, wraps It includes:
For each file destination, judge whether the corresponding mechanism coding of the file destination is consistent with authority signature;
If the corresponding mechanism coding of the file destination is consistent with authority signature, judge that the corresponding operator of the file destination compiles Whether code signs consistent with operator;
If the corresponding operator's coding of the file destination is consistent with operator's signature, judge that the file destination is effectively literary Part.
Further, whether it is effective document that the corresponding target of described verification file destination signs documents, including:
Judge whether the corresponding target of the file destination corresponding mechanism coding that signs documents is consistent with authority signature;
If the target signs documents, corresponding mechanism coding is consistent with authority signature, and it is corresponding to judge that the target signs documents Whether operator encodes consistent with operator's signature;
If the target signs documents, corresponding operator coding is consistent with operator's signature, judge the target sign documents for Effective document.
A kind of storage method of the electronic health record based on block chain is applied to target block catenary system, the method includes:
The first cryptographic Hash obtained from client is stored, and by the storage location of first cryptographic Hash of acquisition It is sent in client, wherein first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, the target Case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating just The file of beginning electronic health record, the file number are that the unique encodings of the electronic health record are generated according to predetermined manner, the storage Position is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of i-th cryptographic Hash of acquisition is sent out It is sent in client, wherein i-th cryptographic Hash is that client is dynamic according to the instruction for obtaining i-th of target data file Make the cryptographic Hash of i-th of the target data file obtained, i is the serial number of target data file, and i is natural number, and i≤M, M are mesh Mark the sum of data file;
The second cryptographic Hash obtained from client is stored, and by the storage location of second cryptographic Hash of acquisition It is sent in client, wherein second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, the target Back cover file is for forbidding updating target data file to the electronic health record.
Further, the first cryptographic Hash obtained from client is stored described, and by described the first of acquisition After the storage location of cryptographic Hash is sent in client, the method further includes:
The jth cryptographic Hash obtained from client is stored, and the storage location of the jth cryptographic Hash of acquisition is sent out It is sent in client, wherein the jth cryptographic Hash is the cryptographic Hash that i-th of target data signs documents, i-th of target Data signing file is i-th of target data file after signature, and j is that i-th of target signs documents the serial number of corresponding cryptographic Hash.
Further, the first cryptographic Hash obtained from client is stored described, and by described the first of acquisition Before the storage location of cryptographic Hash is sent in client, the method further includes:
It verifies the first prewired physical equipment key and whether preset first key is consistent, wherein first physics Device keys are the corresponding physical equipment key of a node, and first key is close with the physical equipment cipher key match of the node Key;
If the first physical equipment key is consistent with the first key, the private key label of first object key devices are called Name interface;
It verifies the second prewired physical equipment key or preset-key and whether preset second key is consistent;Wherein, institute It is the physical equipment key that operating personnel are equipped with to state the second physical equipment key, and the key of each operating personnel is different, first Key is the key for the physical equipment cipher key match being equipped with the operating personnel;
If the second physical equipment key or preset-key and second key agreement, call the second target cipher key to set Standby private key signature interface.
Further, it if in the second physical equipment key or preset-key and second key agreement, adjusts After private key signature interface with the second target cipher key equipment, further include:
Judge submit file destination cryptographic Hash transaction mechanism digital signature and operator's digital signature respectively whether with section The preset key of point and the preset cipher key match of operator;
If the mechanism digital signature and operator's digital signature of file destination cryptographic Hash transaction are preset with node respectively Whether key and the preset cipher key match of operator, the storage location where judging the file destination cryptographic Hash are correct, wherein mesh Mark file is target case cover files, target back cover file or i-th of target data file.
If correct, the file destination is received, and the file destination is determined as effective document.
Further, the second cryptographic Hash obtained from client is stored described, and by described the second of acquisition Before the storage location of cryptographic Hash is sent in client, further include:
For each node, judge whether the node is specified contract node;
If specified contract node, the precondition that preset intelligent contract performer calls all effective contracts is triggered, Judge whether conditions present is consistent with default intelligence and the default precondition of about n, wherein n is the coding of intelligent contract;
If the conditions present is consistent with the intelligence and the default precondition of about n, instruction contract node triggering executes Default shell script.
A kind of storage device of the electronic health record based on block chain, is applied to client, and described device includes:
Case cover files generation module, the file for the file number of the electronic health record of generation to be recorded in establishment obtain Target case cover files, wherein the file number is that the unique encodings of the electronic health record are generated according to predetermined manner, the target Case cover files are used to create the file of initiating electron case history;
First cryptographic Hash acquisition module, the first cryptographic Hash for obtaining the target case cover files, calls preset mesh It marks block catenary system and stores first cryptographic Hash, and the target case cover files are stored in preset storage system;
First storage location acquisition module, for obtaining first cryptographic Hash depositing in the target block catenary system Storage space is set, wherein the storage location is uniquely determined by block number and transaction coding;
Electronic health record update module, for obtaining the instruction action for obtaining i-th of target data file, to update State electronic health record, wherein i is the serial number of target data file, and i is natural number, and i≤M, M are the sum of target data file;
Case cover files generation module, for after obtaining M target data file, mesh to be generated according to the instruction of winding up the case of acquisition Mark back cover file, wherein the target back cover file is for forbidding updating target data file to the electronic health record;
Second cryptographic Hash acquisition module, the second cryptographic Hash for obtaining the target back cover file, calls preset mesh It marks block catenary system and stores second cryptographic Hash, and the target back cover file is stored in preset storage system.
A kind of storage device of the electronic health record based on block chain, is applied to target block catenary system, and described device includes:
First acquisition module, for being stored to the first cryptographic Hash obtained from client, and by described the of acquisition The storage location of one cryptographic Hash is sent in client, wherein first cryptographic Hash is the target cover text that client creates The cryptographic Hash of part, the target case cover files are that the file number of the electronic health record of generation is recorded in the file of establishment by client Upper acquisition, the file for creating initiating electron case history, the file number is to generate the electronic health record according to predetermined manner Unique encodings, the storage location by block number and transaction coding uniquely determine;
Second acquisition module, for being stored to the i-th cryptographic Hash obtained from client, and by described the i-th of acquisition The storage location of cryptographic Hash is sent in client, wherein i-th cryptographic Hash is client according to for obtaining i-th of mesh The cryptographic Hash of i-th of target data file of the instruction action acquisition of data file is marked, i is the serial number of target data file, and i is Natural number, i≤M, M are the sum of target data file;
Third acquisition module, for being stored to the second cryptographic Hash obtained from client, and by described the of acquisition The storage location of two cryptographic Hash is sent in client, wherein second cryptographic Hash is the target back cover text that client generates The cryptographic Hash of part, the target back cover file are for forbidding updating target data file to the electronic health record.
At the another aspect that the present invention is implemented, a kind of electronic equipment, including processor and machine readable storage are additionally provided Medium, the machine readable storage medium are stored with the machine-executable instruction that can be executed by the processor, the processing Device is promoted by the machine-executable instruction:When run on a computer so that computer executes any of the above-described described The storage method of electronic health record based on block chain.
At the another aspect that the present invention is implemented, a kind of computer readable storage medium is additionally provided, it is described computer-readable Computer program is stored in storage medium, when the computer program is executed by processor so that computer executes above-mentioned The storage method of any electronic health record based on block chain.
At the another aspect that the present invention is implemented, a kind of computer program product including instruction is additionally provided, when it is being counted When being run on calculation machine so that computer executes the storage method of any of the above-described electronic health record based on block chain.
Storage method, device, equipment and the storage medium of a kind of electronic health record provided in an embodiment of the present invention, can pass through The file number of the electronic health record of generation is recorded on the file of establishment, target case cover files is obtained, obtains the target cover First cryptographic Hash of file calls preset target block catenary system to store first cryptographic Hash, and by the target cover File is stored in preset storage system;Obtain storage position of first cryptographic Hash in the target block catenary system It sets, obtains the instruction action for obtaining i-th of target data file, to update electronic health record, obtaining M target data text After part, target back cover file is generated according to the instruction of winding up the case of acquisition, the second cryptographic Hash of the target back cover file is obtained, calls Preset target block catenary system stores second cryptographic Hash, and the target back cover file is stored in preset storage and is In system.This method is by the way that the content data file of electronic health record to be stored in preset storage system, by the data file Cryptographic Hash be stored in target block catenary system, and by being arranged for forbidding updating target data file to electronic health record Target back cover file avoids the behavior that electronic health record data are tampered.Certainly, it implements any of the products of the present invention or method must It is not necessarily required to reach all the above advantage simultaneously.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the flow chart of the storage method of the first electronic health record based on block chain provided in an embodiment of the present invention;
Fig. 2 is the flow chart of the storage method of the second provided in an embodiment of the present invention electronic health record based on block chain;
Fig. 3 is the flow chart of the storage method of the third electronic health record based on block chain provided in an embodiment of the present invention;
Fig. 4 is the flow chart of the storage method of the 4th kind of electronic health record based on block chain provided in an embodiment of the present invention;
Fig. 5 is the flow chart of the storage method of the 5th kind of electronic health record based on block chain provided in an embodiment of the present invention;
Fig. 6 is the schematic diagram of the storage device of the first electronic health record based on block chain provided in an embodiment of the present invention;
Fig. 7 is the schematic diagram of the storage device of the second provided in an embodiment of the present invention electronic health record based on block chain;
Fig. 8 is the structural schematic diagram of a kind of electronic equipment of the embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Target block catenary system is made of a series of physical node and the block chain software program run thereon.Node it Between have direct or indirect network connection, communicated using P2P (peer-to-peer, point-to-point) mode.Each node is write Enter data permission and same franchise.
Multiple blocks that each block chain is created by the corresponding node of the block chain are constituted, and each block has the block counts According to content and data fingerprint signature, next block can record the block number and fingerprint signature of a block.
Electronic health record software, that is, client has user interface, and user is medical worker.The user of electronic health record software Interface program operates on computer terminal.In a medical institutions, usually there are multiple computer terminals.Electronic health record software will Invocation target block catenary system accesses electronic health record data.Therefore the node of computer terminal and place medical institutions is that have directly Network connection.Usually, there are one nodes for a medical institutions.
Therefore, embodiment provided by the invention is applied to target block catenary system, and the electronic health record based on the system Software, the two all need to use embodiment provided by the invention, just can be with cooperating.
In order to easier to understand to the embodiment of the present invention, the title now occurred to the embodiment of the present invention is solved as follows It releases:
Block chain (block chain):It is a kind of to apply the distributed book keeping operation technology in bit coin earliest.Block chain can It is stored for data, is different from centralised storage and general distributed storage technology, first, the data of block chain store, Need the agreement of multiple distributed nodes be just identified as effectively, avoiding problems due to single or a small number of nodes intentionally or accidentally Mistake, caused error in data;Secondly, the data content of the storage of block chain has data fingerprint signature as used SHA (Secure Hash Algorithm, Secure Hash Algorithm) algorithm, is that can not forge according to this fingerprint of the technology being currently known , also ensure that tamper or can not being found having distorted for data;In addition, the identity of book keeping operation person can adopt With the digital signature based on public key-key mechanism so that its identity is easily identified by public key, and makes its row by key For non-repudiation.Basic technology of the block chain as bit coin is opened as the development of bit coin in recent years has been obtained for verifying Begin to flourish in finance and payment technical field.
Block (block):It is a memory block, it can be envisaged that be one piece of hard disk.Entire target block catenary system, be exactly by One piece of hard disk combination for connecing one piece forms a huge memory space.Each block has its data content and data fingerprint Signature.Next piece of block can also record the block number and fingerprint signature of a block, ensure in this way this chain be it is complete, It is consistent and can not forging.Each block can store storage in a certain size arbitrary content, such as the block of bit coin Be a rule " transaction ".
Node (node):Refer to the node that block chain is added, have calculating and storage capacity, and by network directly or It is indirectly connected with.A component part of each node as block chain, the node processes of operational objective block catenary system.Each Node can be freely written data toward a new block, if other nodes are approved, that is to say, that and the block is authorized to, or by If a number of other nodes are agreed to, which permanently will be recorded and stored by all nodes, and no longer be changed.Newly Data will by new block be connected on its later store.
Intelligent contract (smart contract):Refer to one kind that the trust data Development of storage technology based on block chain gets up Script technology.It allows to store one section of script in block chain in advance, and its precondition of triggering.Once the precondition at It is vertical, script operation will be triggered.For example, precondition can be:If on January 4th, 2018, Index of Shanghai Stock Exchange closing quotation was more than 3000 Point, script are that account A just transfers accounts 1 bit coin to account B.Due to precondition be it is objective can verify that, once so condition It sets up, the actuator of contract will trigger script operation and transfer accounts, and obtain the trust of all nodes, because of each node It can verify.The embodiment of the present invention is based on intelligent contract technology, realizes the Quality Control of electronic health record.
Electronic health record:Include mainly door or emergency record from data content:Door or emergency record homepage, case history note Record, analysis report, medical imaging data etc..
Inpatient cases:First page of illness case, admission records, progress note, discharge record, death record, Operation Agreement Letters, anesthesia Letter of consent, treatment of blood transfusion informed consent form, special examined or special treatment letter of consent are critically ill or seriously ill notification sheet, auxiliary examination Report, temperature chart, nursing record form, Nursing evaluation list, medical imaging report, pathological replacement list, doctor's advice list etc..
Three-level is signed:A electronic health record, it is necessary to first completion be filled in by physician and submit signature, then transfer to its higher level Doctor checks and signs, then is checked and signed by the head of the department.Three-level sign primarily to the science of therapeutic scheme, effectively, build Vertical clearly divisions of responsibility, and improve the quality of electronic health record.Similarly, there is also two-stage signatures in terms of nurse.
Record room:It is responsible for the section office that electronic health record received, deposited pipe in hospital specially.When receiving electronic health record, medical record Room can also improve the content of probation homepage according to the rules.
It signs (Sign):The electronic health record content that medical worker fills in it, checks or handles is signed after confirmation is errorless Administration.
Quality Control:Electronic health record quality control.By professional in the Quality Control Dept. of hospital or section room, to electronic health record content Gap filling macadam, timeliness and reasonability are exercised supervision and are checked.It, can also be by computer program by rule under information system Then is reminded and judged automatically.
The embodiment of the present invention be based on an existing electronic medical record system, in conjunction with/transformation block chain core technology come The method for realizing the functional requirement of medical record data storage, the signature and Quality Control of electronic medical record system.
Fig. 1 is a kind of flow chart of the storage method of the electronic health record based on block chain provided in an embodiment of the present invention, is answered For client, the above method includes:
The file number of the electronic health record of generation is recorded on the file of establishment by S101, obtains target case cover files, In, above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are for creating Build the file of initiating electron case history;
Wherein, above-mentioned predetermined manner be can by each node when archives are created according to the generating algorithm of existing file number It generates, a node corresponds to a medical institutions, and the generation method of each medical institutions' selection file number can be different, the present invention Embodiment does not limit this.
In order to be understood more clearly to electronic health record, now the data file of electronic health record is described in detail:Each Patient will produce a electronic health record in a hospital course, and a electronic health record can be considered as a file or archives Bag, the inside are equipped with the different types of documentation of different time points.The system that the method that the embodiment of the present invention proposes is realized A unique file number is distributed for every a electronic health record (Electronic Medical Record).The number of electronic health record According to that can be divided into multiple files (File), wherein recording its information with certain coded format, file has different type, wherein mesh Mark cover (Cover) file is the specific type of system:The certain types of file is especially set out, implicit, is not belonging to The visible electronic health record content of doctors and patients.
It should be noted that creating an electronic health record is equivalent to the target case cover files and if only if an electronic health record It is submitted storage, a file number is assigned per portion electronic health record.
In addition, the first cryptographic Hash of target case cover files is stored in target block catenary system, in order to avoid in area Excessive data content is stored in block chain, according to the memory mechanism of block chain, although block chain can store in excessive data Hold, but the storage scheme efficiency is poor, block chain is not the file for especially properly storing large volume, so being by digital signature The corresponding cryptographic Hash of file is stored in block chain, and this document refers to target case cover files, target back cover file or M target Data file.
S102 obtains the first cryptographic Hash of above-mentioned target case cover files, and preset target block catenary system is called to store The first cryptographic Hash is stated, and above-mentioned target case cover files are stored in preset storage system;
It has been calculated it should be noted that the acquisition of first cryptographic Hash can be obtained from other clients or system Cryptographic Hash, can also be calculated in the client.
In addition, according to the characteristic of block chain, block chain, which stores file destination cryptographic Hash, to be stored according to timestamp , the file destination in the embodiment of the present invention is for target case cover files, target back cover file or i-th of target data text Part.
In addition, target block catenary system storage is similar with distributed network storage system, a set of API can be also provided (Application Programming Interface, application programming interface), accesses to upper layer application, that is, client Data.
Above-mentioned storage system can be distributed network storage system, centralised storage system, block chain storage system, magnetic Band or CD, above-mentioned block chain storage system include first object block catenary system and removable medium, and removable medium can be with For tape or CD.
Above-mentioned distributed network storage system can be understood as data dispersion being stored in more independent equipment.Tradition Network store system all data are stored using the storage server concentrated, storage server becomes the bottleneck of system performance, It is also the focus of reliability and safety, the needs of Mass storage application cannot be met.Distributed network storage system uses Expansible system structure shares storage load using more storage servers, and storage information is positioned using location server, it The reliability, availability and access efficiency for not only increasing system, are also easy to extend, if the use of distributed network storage system Client/server can also be changed once master library is changed from the data in library, to bring storage Information Security to reduce.
Based on the above-mentioned description to target block catenary system, although monolithic backup file can be stored in first object area In block catenary system, but due to block chain it is improper storage large volume file, for the file of large volume for, using divide Cloth network store system can be very good to solve persistent data storage, by the above-mentioned description to storage system it is found that distribution Formula network store system is a kind of preferable storage mode.
Specifically,
Using target case cover files, corresponding first cryptographic Hash of above-mentioned target case cover files is calculated according to following expression;
Above-mentioned expression formula:Hash=HASH (file);
Wherein, HASH () is hash function, and hash is the first cryptographic Hash, and file is the content of target case cover files;
It should be noted that the embodiment of the present invention proposes the calculating side of the computational methods and above-mentioned first cryptographic Hash of cryptographic Hash Method is similar, then this is repeated no more.
It is noted that above-mentioned first cryptographic Hash is the number obtained by logical operation according to the data of the content of file Value, the hash values that different files obtains are different, and the corresponding file content of identical hash values is identical, with file Title is unrelated, and hash values are related to file content, that is to say, that the name of different files is directed to, as long as corresponding hash values phase Together, it is meant that the corresponding content of two files is the same.
S103 obtains storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage Position is uniquely determined by block number and transaction coding;
It should be noted that according to the characteristic of block chain, the cryptographic Hash of file destination is in target area in the embodiment of the present invention The storage location of block catenary system is uniquely determined by block number transaction coding corresponding with its of its correspondence storage, can be made For the corresponding data of subsequent access storage location, transaction coding can be understood as the cryptographic Hash of the transaction;
In addition, when the corresponding cryptographic Hash of a file destination is submitted to and is stored in target block catenary system, all can The return value of the target block catenary system is obtained, which is the corresponding cryptographic Hash of the file destination in target block catenary system In storage location.
S104 obtains the instruction action for obtaining i-th of target data file, to update above-mentioned electronic health record, wherein I is the serial number of target data file, and i is natural number, and i≤M, M are the sum of target data file
Wherein, which can be revision instruction or newly-increased instruction.
It can be understood as it should be noted that updating above-mentioned electronic health record by increasing i-th of target data file newly or repairing It orders i-th of target data file and has reached the purpose for updating the electronic health record.
In addition, the target data file known to upper description is to record the second target information with preset coded format, Above-mentioned second target information includes file number, file type, name file, instruction action and file content, above-mentioned file type It further include target data file.The coded format include X XML (eXtensible Markup Language) coded format, JSON (JavaScript Object Notation, JS object tag) coded format, pure file format or binary format.It should Target data file includes first page of illness case file, progress note file, nursing history file, examines checklist or discharge record. The instruction action includes newly-increased instruction, signature instruction or revision instruction, and above-mentioned signature instruction is mechanism or operator to number of targets The instruction signed according to file;This document content include data content, generate electronic health record mechanism coding and patient only One identifier, the content that the embodiment of the present invention includes to the target data file are not intended to limit.
Specifically,
Judge whether the instruction action obtained includes newly-increased instruction or revision instruction, wherein above-mentioned newly-increased instruction for for The instruction of i-th of target data file is obtained, above-mentioned revision instruction is for being obtained after being revised to former target data file I-th of target data file instruction, above-mentioned original target data file serial number 1 ..., the corresponding institute of any serial number in i-1 The target data file that need to be revised;
If the instruction action obtained is newly-increased instruction, it is corresponding with the target data file to obtain i-th of target data file The i-th cryptographic Hash preset target block catenary system is called according to the storage location of above-mentioned file number and above-mentioned first cryptographic Hash Above-mentioned i-th cryptographic Hash is stored, and above-mentioned i-th of target data file is stored in preset storage system;
In this step, above-mentioned i-th cryptographic Hash is stored in the preset target block catenary system of above-mentioned calling, and by above-mentioned i-th After a target data file is stored in preset storage system, the above method further includes obtaining above-mentioned i-th cryptographic Hash upper State the storage location in target block catenary system.
Obtain storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system.
If the instruction action obtained is revision instruction, it is corresponding with the target data file to obtain i-th of target data file The i-th cryptographic Hash;According to above-mentioned file number and above-mentioned former target data file, obtains former target data file and correspond to cryptographic Hash Storage location calls preset target block catenary system to store above-mentioned i-th cryptographic Hash, and will according to acquired storage location Above-mentioned i-th of target data file is stored in preset storage system;Wherein, i-th of target data file of acquisition is revised It is to carry out the file of revision acquisition to former target data file by the way of additional Description of Revision, and revised i-th of mesh Mark data file quotes the storage location in target block catenary system of above-mentioned former target data file.
In this step, preset target block catenary system is being called to store above-mentioned i-th cryptographic Hash, and by above-mentioned i-th of mesh After mark data file is stored in preset storage system, further include:
Obtain storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system.
S105 generates target back cover file after obtaining M target data file according to the instruction of winding up the case of acquisition, wherein Above-mentioned target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
Wherein, the target case cover files, target back cover file are to record first object information with preset coded format, Above-mentioned first object information includes file number, file type, instruction action and file content, and above-mentioned file type is target cover File, target back cover file.
It should be noted that target back cover file is for forbidding updating target data file to above-mentioned electronic health record, It can be understood as:Target back cover file is for forbidding carrying out newly-increased target data file to electronic health record or forbid to electronics disease The file that target data file in going through is revised;
It is noted that a electronic health record of winding up the case is equivalent to add the file of a back cover type i.e. target envelope for it Bottom file.Once target back cover file is submitted storage, any newly-increased file and revision file thereafter are accordingly to be regarded as in vain.To this Electronic health record operates effectively only to the signature of existing file.It follows that the file of back cover type have and only there are one.
S106 obtains the second cryptographic Hash of above-mentioned target back cover file, and preset target block catenary system is called to store The second cryptographic Hash is stated, and above-mentioned target back cover file is stored in preset storage system.
By upper description it is found that target back cover file is similar with target case cover files, the two is that the embodiment of the present invention provides Certain types of file, this document is implicit, that is to say, that is not belonging to the visible electronic health record content of doctors and patients.
It should be noted that Record room can also improve probation according to the rules before generating target case cover files The content of homepage.
For the file of electronic health record, a kind of operation is defined:It signs (Sign).It represents the particular person by specific node Member signs one or more files.I.e. after S106, further include:
It is instructed according to the signature of reception, coding, the operator of operator's institutional affiliation is obtained from preset configuration file Corresponding coding;
According to the corresponding coding of aforesaid operations people, operator's i-th of target data file of preset first key pair is utilized It signs;
According to the coding of operator's institutional affiliation, using preset second key of operator's institutional affiliation respectively to above-mentioned I target data file and the signature of operator are signed;
I-th of target data is signed documents and is submitted to preset storage system, wherein above-mentioned i-th of target data label Administration's file is i-th of target data file after signature;
The jth cryptographic Hash that i-th of target data signs documents is obtained, calls preset target block catenary system storage above-mentioned Jth cryptographic Hash, j are that i-th of target signs documents the serial number of corresponding cryptographic Hash.
Wherein, which can be that three-level is signed.
It according to the characteristic of block chain it is found that since the storage location of return is unique, also means that, it is known that storage position It sets, which target data file can be known.
It should be noted that the cryptographic Hash to each file and the corresponding cryptographic Hash to sign documents, are all considered as a hop count According in the submission sequential storage to block chain according to node.For the structure of some target block, according to the area of block chain Block structure, it is only necessary to define the structure of " transaction ".
Due to storing the corresponding cryptographic Hash to sign documents of target data file in target block catenary system, when one When data is generated and submitted, client is signed using the data key of operator, it is possible thereby to ensure operator couple The non repudiation of data content and time;Then client is signed using the data key of mechanism and the signature of operator Name, it is possible thereby to ensure non repudiation of the mechanism for data content and its operator.
The generation time of target data file cryptographic Hash in the block can be substantially determined by the timestamp of block head, In, which is generated by the node of submission data.In a block, file is temporally to stab ascending sort.It is next The timestamp of block, and a upper block timestamp can be more than.Thus characteristic ensures, the sequence of data storage and node submission are suitable Sequence is almost the same so that the time of the target data file cryptographic Hash can not be distorted afterwards, non-repudiation, it should Data are the cryptographic Hash of target data file.
In the jth cryptographic Hash that i-th of target data of above-mentioned acquisition signs documents, preset target block catenary system is called to deposit After storing up above-mentioned jth cryptographic Hash, further include:
File destination is successively read according to timestamp from preset storage system and target signs documents, wherein above-mentioned File destination is target case cover files, i-th of target data file or target back cover file, and it is i-th that above-mentioned target, which signs documents, File after a target data file signature;
For each file destination, verify whether the file destination is judged as effective document;
Whether if the file destination is effective document, it is effective text to verify the corresponding target of the file destination and sign documents Part;
If the target signs documents as effective document, which is signed documents with the target and is associated.
When needing to illustrate, reading program can depositing from any target complete data file for storing electronic health record The content of block is from the beginning successively read in storage system according to timestamp, and screens the literary from first target cover of each electronic health record Part to the All Files between first target back cover file, and to the cryptographic Hash of any all files for storing electronic health record by It is successively read according to timestamp.It is hereby achieved that electronic health record file sequence and its signature, i.e., a is electronic health record.It has only One file number and patient ID.The target data file or corresponding signature can be verified using the cryptographic Hash of target data file Whether file is tampered.
For each file destination, verifies the file destination and whether be judged as a kind of embodiment of effective document and be:
For each file destination, judge whether the corresponding mechanism coding of the file destination is consistent with authority signature;
If the corresponding mechanism coding of the file destination is consistent with authority signature, judge that the corresponding operator of the file destination compiles Whether code signs consistent with operator;
If the corresponding operator's coding of the file destination is consistent with operator's signature, judge that the file destination is effectively literary Part.
The embodiment further increases file destination in electronic health record by the identity of identification mechanism and operator Safety.
Whether verify the corresponding target of the file destination and sign documents is that a kind of embodiment of effective document is:
Judge whether the corresponding target of the file destination corresponding mechanism coding that signs documents is consistent with authority signature;
If the target signs documents, corresponding mechanism coding is consistent with authority signature, and it is corresponding to judge that the target signs documents Whether operator encodes consistent with operator's signature;
If the target signs documents, corresponding operator coding is consistent with operator's signature, judge the target sign documents for Effective document.
The embodiment is further increased in electronic health record and is signed documents by the identity of identification mechanism and operator Safety.
It follows that method provided in an embodiment of the present invention ensure that electronic health record by newly-increased target back cover file Target data file cannot be updated, and all content data files for constituting electronic health record are stored in preset storage system In, the corresponding cryptographic Hash of each file destination is stored in target block catenary system, electronic health record data is avoided and is tampered Behavior.
Fig. 2 is the schematic diagram of the storage method of the second provided in an embodiment of the present invention electronic health record based on block chain, Applied to target block catenary system, the above method includes:
S201 stores the first cryptographic Hash obtained from client, and depositing above-mentioned first cryptographic Hash of acquisition Storage space, which is set, to be sent in client, wherein and above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, on It is that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain to state target case cover files, is used for The file of initiating electron case history is created, above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, on Storage location is stated to be uniquely determined by block number and transaction coding;
Based on the description to target case cover files it is found that when obtaining the first cryptographic Hash, target block catenary system selection first It is stored after cryptographic Hash and by it according to timestamp, and the storage location of the first cryptographic Hash is back in client.
Before S201, further include:
It verifies the first prewired physical equipment key and whether preset first key is consistent, wherein above-mentioned first physics Device keys are the corresponding physical equipment key of a node, and first key is close with the physical equipment cipher key match of the node Key;
If above-mentioned first physical equipment key is consistent with above-mentioned first key, the private key label of first object key devices are called Name interface;
It verifies the second prewired physical equipment key or preset-key and whether preset second key is consistent;Wherein, on It is the physical equipment key that operating personnel are equipped with to state the second physical equipment key, and the key of each operating personnel is different, first Key is the key for the physical equipment cipher key match being equipped with the operating personnel;
If above-mentioned second physical equipment key or preset-key and above-mentioned second key agreement, call the second target cipher key to set Standby private key signature interface.
If in above-mentioned second physical equipment key or preset-key and above-mentioned second key agreement, the second target cipher key is called After the private key signature interface of equipment, further include:
Judge submit file destination cryptographic Hash transaction mechanism digital signature and operator's digital signature respectively whether with section The preset key of point and the preset cipher key match of operator;
If the mechanism digital signature and operator's digital signature of file destination cryptographic Hash transaction are preset with node respectively Whether key and the preset cipher key match of operator, the storage location where judging the file destination cryptographic Hash are correct, wherein mesh Mark file is target case cover files, target back cover file or i-th of target data file.
If correct, the file destination is received, and the file destination is determined as effective document.
It is noted that in order to ensure the node for possessing write-in permission is legal node, public key-key is equally used Mechanism is key devices i.e. the first physical equipment key that each node is equipped with physics, once the equipment is detached with node, then The node can not just call the private key signature interface of key devices, to make the data that it is subsequently submitted not by other in block chain Node is received.Each key devices have unique key, can uniquely indicate a node.
Likewise, carrying out self-corresponding signer in order to ensure signing, equally use public key-key mechanism for each medical care The virtual key devices of the second physical equipment key or preset-key, that is, software of staffing physics.When being signed, palpus will The equipment is connected to operating terminal, and otherwise system can not can not just call the private key signature interface of key devices, to make it carry The data of friendship are not received by other nodes in local node and block chain.Each key devices have unique key, can be with The uniquely identity of one signer of mark.
Since the data of block chain are stored in by same, whole on each node, this distributed storage System naturally has data reliability, can easily cope with long-term preservation and various disasters.
In addition, the embodiment of the present invention can specify that:If any one block is combined into the half of target block catenary system The above quantity node is received, then all data in the block, which are considered as, has stored success.According to block chain agreement, node receives The method of one block B creates a new block and is connected on after B.It can ensure in this way, any data in block can not possibly It is tampered again.Because once distorting, then the hash values of the block can change, the inevitable hash with its subsequent block record Value misfits.
S202 stores the i-th cryptographic Hash obtained from client, and by the storage of above-mentioned i-th cryptographic Hash of acquisition Position is sent in client, wherein above-mentioned i-th cryptographic Hash is client according to for obtaining i-th of target data file The cryptographic Hash for i-th of target data file that instruction action obtains, i are the serial number of target data file, and i is natural number, i≤M, M is the sum of target data file;
Based on the description to target data file it is found that when obtaining the i-th cryptographic Hash, target block catenary system selection i-th is breathed out It after uncommon value and is stored, and the storage location of the i-th cryptographic Hash is back in client.
S203 stores the second cryptographic Hash obtained from client, and depositing above-mentioned second cryptographic Hash of acquisition Storage space, which is set, to be sent in client, wherein and above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, on It is for forbidding updating target data file to above-mentioned electronic health record to state target back cover file.
Based on the description to target back cover file it is found that when obtaining the second cryptographic Hash, target block catenary system selection second It after cryptographic Hash and is stored, and the storage location of the second cryptographic Hash is back in client.
Before S203, further include:
For each node, judge whether the node is specified contract node;
If specified contract node, the precondition that preset intelligent contract performer calls all effective contracts is triggered, Judge whether conditions present is consistent with default intelligence and the default precondition of about n, wherein n is the coding of intelligent contract;
If above-mentioned conditions present is consistent with above-mentioned intelligence and the default precondition of about n, instruction contract node triggering executes Default shell script.
The embodiment of the present invention provides the Quality Control function of electronic health record using intelligent contract, defines certain coded format first Treaty content, including condition and script.
Intelligent contract performer on node calls the condition of all effective contracts automatically.Once condition is satisfied, i.e., by The specified contract side's node of contract executes action script.Script executes the result generated need not relationship with block chain, such as can To be to send a short message to remind to someone.
There is script, so that it may to realize following Quality Control function:
1) once detecting has back cover type file to be signed a certain electronic health record, this part of electronic health record of just winding up the case.
2) once electronic medical record is created i.e. cover type file submission, it should which trigger notice requires to create in 8 hours Progress note for the first time.
3) before file destination such as discharge record is signed, medical staff should be reminded to create day daily the patient that is critically ill Normal progress note.
4) after subordinate doctor signs documents, higher level doctor is prompted to sign documents.
After S203, further include:
The jth cryptographic Hash obtained from client is stored, and the storage location of the above-mentioned jth cryptographic Hash of acquisition is sent out It is sent in client, wherein above-mentioned jth cryptographic Hash is the cryptographic Hash that i-th of target data signs documents, above-mentioned i-th of target Data signing file is i-th of target data file after signature, and j is that i-th of target signs documents the serial number of corresponding cryptographic Hash.
Method provided in an embodiment of the present invention is stored by the cryptographic Hash for obtaining client according to timestamp, and will The storage location of the cryptographic Hash of acquisition is sent in client, it is therefore prevented that electronic health record is tampered, and is subsequent examination electronic health record Target data file whether be tampered and prepare.
Fig. 3 is the flow chart of the storage method of the second provided in an embodiment of the present invention electronic health record based on block chain, Applied to client, the above method includes:
The file number of the electronic health record of generation is recorded on the file of establishment by S301, obtains target case cover files, In, above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are for creating Build the file of initiating electron case history;
Wherein, step S301~S303 is identical as the method that step S101~S103 in Fig. 1 embodiments is executed respectively.Cause This, all embodiments in Fig. 1 are suitable for Fig. 3, and can reach same or analogous advantageous effect, and details are not described herein.
S302 obtains the first cryptographic Hash of above-mentioned target case cover files, and preset target block catenary system is called to store The first cryptographic Hash is stated, and above-mentioned target case cover files are stored in preset storage system;
S303 obtains storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage Position is uniquely determined by block number and transaction coding;
S304 judges whether the instruction action obtained includes newly-increased instruction or revision instruction, wherein above-mentioned newly-increased instruction is Instruction for obtaining i-th of target data file, above-mentioned revision instruction be for being revised to former target data file after The instruction of i-th of the target data file obtained, above-mentioned original target data file serial number 1 ..., any serial number corresponds in i-1 Required revision target data file, i be target data file serial number, i is natural number, and i≤M, M are target data file Sum;If the instruction action obtained is newly-increased instruction, S305 is executed, if the instruction action obtained is revision instruction, is executed S307;
S305 obtains i-th of target data file the i-th cryptographic Hash corresponding with the target data file, according to above-mentioned shelves The storage location of Reference Number and above-mentioned first cryptographic Hash calls preset target block catenary system to store above-mentioned i-th cryptographic Hash, and will Above-mentioned i-th of target data file is stored in preset storage system;
It should be noted that storage system stores i-th of target data file, target block catenary system stores the number of targets According to corresponding i-th cryptographic Hash of file, electronic health record file is permanently stored without what is distorted to realize, if storage system is wherein The data file of one equipment storage is tampered, and can be also found, i.e., stores the corresponding data file by target block chain Cryptographic Hash carry out verifying whether the data file is tampered, to realize to electronic health record carry out consistency inspection.
In addition, i-th of target data file of this step is increased fresh target data file.
S306 obtains storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system;
Wherein, this step obtains target block chain after preset target block catenary system will be called to store the i-th cryptographic Hash The return value of the storage location of i-th cryptographic Hash in system, convenient for utilizing i.e. i-th Hash of the storage location subsequent access data Value.
S307 obtains i-th of target data file the i-th cryptographic Hash corresponding with the target data file;According to above-mentioned shelves Reference Number and above-mentioned former target data file obtain the storage location that above-mentioned former target data file corresponds to cryptographic Hash, according to being obtained The storage location taken calls preset target block catenary system to store above-mentioned i-th cryptographic Hash, and by above-mentioned i-th of target data File is stored in preset storage system;Wherein, i-th of target data file for revising acquisition is using additional Description of Revision Mode to former target data file carry out revision acquisition file, and revised i-th of target data file reference it is above-mentioned The storage location in target block catenary system of former target data file;
It should be noted that being determined by the characteristic of target block catenary system, any data are once stored, and are that cannot repair Change and deletes.Then it is by the way of additional Description of Revision so if to revise a file.Such as:To case history homepage It is revised, to point out that it is the content based on which target data file i.e. case history homepage and this revision, the revision Content can be the data of new data or increment on the basis of former target data file, but the target obtained after revising Data file i.e. i-th target data file is a fresh target data file, former target data file content it is constant and its in Hold and its cryptographic Hash is still stored in corresponding storage system, newly-increased instruction, modification instruction make client and the friendship of operator Mutually more convenient, hommization.
S308 obtains storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system;
S309 generates target back cover file after obtaining M target data file according to the instruction of winding up the case of acquisition, wherein Above-mentioned target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
Wherein, step S309~S310 is identical as the method that step S105~S106 in Fig. 1 embodiments is executed respectively.Cause This, all embodiments in Fig. 1 are suitable for Fig. 3, and can reach same or analogous advantageous effect, and details are not described herein.
S310 obtains the second cryptographic Hash of above-mentioned target back cover file, and preset target block catenary system is called to store The second cryptographic Hash is stated, and above-mentioned target back cover file is stored in preset storage system;
S311 obtains storage location of above-mentioned second cryptographic Hash in above-mentioned target block catenary system;
S312 is instructed according to the signature of reception, and coding, the behaviour of operator's institutional affiliation are obtained from preset configuration file Make the corresponding coding of people;
Wherein, preset configuration file is the file that client is pre-configured with and distributes, it can be understood as operator logs in After client, the configuration file can be read, obtains coding, the corresponding coding of operator of operator's institutional affiliation.
S313 utilizes operator's i-th of target data of preset first key pair according to the corresponding coding of aforesaid operations people File is signed;
In this step, the identity of the operator can be known according to the corresponding coding of operator, to be somebody's turn to do using key pair Target data file is signed, which is the key set in advance, and each operation has key per capita, it is possible thereby to ensure Operator is to the data content i.e. non repudiation of the target data file and time.
S314 is right respectively using preset second key of operator's institutional affiliation according to the coding of operator's institutional affiliation Above-mentioned i-th of target data file and the signature of operator are signed;
In this step, the second key is the key of operator's institutional affiliation, the data key using mechanism and operator Signature sign, it is possible thereby to ensure mechanism can not support for the data content i.e. target data file and its operator Lai Xing.
I-th of target data is signed documents and is submitted to preset storage system by S315, wherein above-mentioned i-th of number of targets According to i-th of target data file after signing documents as signature;
It should be noted that can be easy to read the storage location of this document using the key assignments that storage system returns.
S316 obtains the jth cryptographic Hash that i-th of target data signs documents, preset target block catenary system is called to deposit Store up above-mentioned jth cryptographic Hash, wherein j is that i-th of target signs documents the serial number of corresponding cryptographic Hash.
J and i in this step are one-to-one, that is to say, that each target data file corresponds to a number of targets According to signing documents.
It follows that the present invention implements the method provided by newly-increased target back cover file, it ensure that electronic health record cannot All file destination contents storage that signs documents corresponding with the file destination for being increased newly or being revised, and electronic health record will be constituted In preset storage system, sign documents corresponding with the file destination of the corresponding cryptographic Hash of each file destination is stored in In target block catenary system, the Quality Control to electronic health record can be reached by signature, it is also ensured that operator is to data content The non repudiation of data content and its operator is further prevented with the non repudiation of time, and guarantee mechanism The behavior that the data of submission are tampered.
Fig. 4 is the schematic diagram of the storage method of the 4th kind of electronic health record based on block chain provided in an embodiment of the present invention, Applied to client, the above method includes:
The file number of the electronic health record of generation is recorded on the file of establishment by S401, obtains target case cover files, In, above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are for creating Build the file of initiating electron case history;
Wherein, step S401~S416 is identical as the method that step S301~S316 in Fig. 3 embodiments is executed respectively.Cause This, all embodiments in Fig. 3 are suitable for Fig. 4, and can reach same or analogous advantageous effect, and details are not described herein.
S402 obtains the first cryptographic Hash of above-mentioned target case cover files, and preset target block catenary system is called to store The first cryptographic Hash is stated, and above-mentioned target case cover files are stored in preset storage system;
S403 obtains storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage Position is uniquely determined by block number and transaction coding;
S404 judges whether the instruction action obtained includes newly-increased instruction or revision instruction, wherein above-mentioned newly-increased instruction is Instruction for obtaining i-th of target data file, above-mentioned revision instruction be for being revised to former target data file after The instruction of i-th of the target data file obtained, above-mentioned original target data file serial number 1 ..., any serial number corresponds in i-1 Required revision target data file, i be target data file serial number, i is natural number, and i≤M, M are target data file Sum;If the instruction action obtained is newly-increased instruction, S405 is executed, if the instruction action obtained is revision instruction, is executed S407;
S405 obtains i-th of target data file the i-th cryptographic Hash corresponding with the target data file;According to above-mentioned shelves The storage location of Reference Number and above-mentioned first cryptographic Hash calls preset target block catenary system to store above-mentioned i-th cryptographic Hash, and will Above-mentioned i-th of target data file is stored in preset storage system;
S406 obtains storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system;
S407 obtains i-th of target data file the i-th cryptographic Hash corresponding with the target data file;According to above-mentioned shelves Reference Number and above-mentioned former target data file obtain the storage location that above-mentioned former target data file corresponds to cryptographic Hash, according to being obtained The storage location taken calls preset target block catenary system to store above-mentioned i-th cryptographic Hash, and by above-mentioned i-th of target data File is stored in preset storage system;Wherein, i-th of target data file for revising acquisition is using additional Description of Revision Mode to former target data file carry out revision acquisition file, and revised i-th of target data file reference it is above-mentioned The storage location in target block catenary system of former target data file;
S408 obtains storage location of above-mentioned i-th cryptographic Hash in above-mentioned target block catenary system;
S409 generates target back cover file after obtaining M target data file according to the instruction of winding up the case of acquisition, wherein Above-mentioned target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
S410 obtains the second cryptographic Hash of above-mentioned target back cover file, and preset target block catenary system is called to store The second cryptographic Hash is stated, and above-mentioned target back cover file is stored in preset storage system;
S411 obtains storage location of above-mentioned second cryptographic Hash in above-mentioned target block catenary system;
S412 is instructed according to the signature of reception, and coding, the behaviour of operator's institutional affiliation are obtained from preset configuration file Make the corresponding coding of people;
S413 utilizes operator's i-th of target data of preset first key pair according to the corresponding coding of aforesaid operations people File is signed;
S414 is right respectively using preset second key of operator's institutional affiliation according to the coding of operator's institutional affiliation Above-mentioned i-th of target data file and the signature of operator are signed;
I-th of target data is signed documents and is submitted to preset storage system by S415, wherein above-mentioned i-th of number of targets According to i-th of target data file after signing documents as signature;
S416 obtains the jth cryptographic Hash that i-th of target data signs documents, preset target block catenary system is called to deposit Store up above-mentioned jth cryptographic Hash, j is that i-th of target signs documents the serial number of corresponding cryptographic Hash;
S417 is successively read file destination according to timestamp from preset storage system and target signs documents, wherein Above-mentioned file destination be target case cover files, i-th of target data file or target back cover file, above-mentioned target sign documents for File after i-th of target data file signature;
Based on the above-mentioned description to storage system, it is known that storage system stores the All Files of electronic health record according to timestamp Content, reads the file destination of storage according to timestamp one by one, and a complete electronics is illustrated according to chronological order Case history.
S418 judges whether the corresponding mechanism coding of the file destination is consistent with authority signature for each file destination; If the corresponding mechanism coding of the file destination is consistent with authority signature, S419 is executed;
Using the consistency of inspection body coding and authority signature in this step, inconsistency is excluded, that is to say, that exclude Illegal file.
It should be noted that the file destination in S418~S420 can be understood as the text of the either objective in electronic health record Part.
S419 judges whether the corresponding operator's coding of the file destination and operator's signature are consistent, if the file destination Corresponding operator's coding is consistent with operator's signature, executes S420;
The consistency for checking operator's coding and operator's signature is utilized in this step, it is ensured that each file destination is effective File.
S420 judges the file destination for effective document, and it is corresponding to judge that the corresponding target of the file destination signs documents Whether mechanism coding is consistent with authority signature;If the target signs documents, corresponding mechanism coding is consistent with authority signature, executes S421;
After judging whether file destination is effective document, it is also necessary to which whether judge that target signs documents is effective document.
It should be noted that the embodiment of the present invention is to judging that the sequence that file destination and target sign documents does not limit.
The either objective file pair that can be understood as in electronic health record in addition, the target in S420~S422 signs documents The target answered signs documents.
S421, judge the target sign documents corresponding operator coding and operator's signature it is whether consistent;If the target The corresponding operator's coding that signs documents is consistent with operator's signature, executes S422;
The consistency for checking operator's coding and operator's signature is utilized in this step, it is ensured that each target signs documents and is Effective document.
S422 judges that the target signs documents as effective document, which is signed documents with the target and is closed Connection.
After judging that file destination and target sign documents and be effective document, needs the two being associated, make its reading After taking a file destination, it just can directly find the corresponding target of the file destination and sign documents.
It follows that the present invention implements the method provided by newly-increased target back cover file, the mesh of electronic health record ensure that Mark data file cannot be added or revise, and all file destination contents for constituting electronic health record are corresponding with the file destination Sign documents and be stored in preset storage system, the corresponding cryptographic Hash of each file destination is corresponding with the file destination It signs documents and is stored in target block catenary system, it is ensured that non repudiation and machine of the operator to data content and time Structure is for the non repudiation of data content and its operator, the behavior for preventing the data of submission to be tampered;In addition, passing through difference The mechanism and operation human effectiveness for verifying signature, eliminate invalid signature, ensure that electronic health record file sequence and its label The correctness of administration.
Fig. 5 is the schematic diagram of the storage method of the 5th kind of electronic health record based on block chain provided in an embodiment of the present invention, Applied to target block catenary system, the above method includes:
S501, verifies the first prewired physical equipment key and whether preset first key is consistent, if above-mentioned first object It is consistent with above-mentioned first key to manage device keys, executes S502, wherein above-mentioned first physical equipment key is that a node corresponds to Physical equipment key, first key is key with the physical equipment cipher key match of the node;
This step provides cipher key access using physical key equipment, it is ensured that personal identification, the safety of authority identity Property.
It should be noted that a mechanism corresponds to a node.
S502 calls the private key signature interface of first object key devices;
This step is to sign to mechanism calling the private key signature interface, and first object key devices are to be used for One node of unique mark, and there is unique key.
S503, verifies the second prewired physical equipment key or preset-key and whether preset second key is consistent;If The second prewired physical equipment key or preset-key and preset second key agreement, execute S504, wherein above-mentioned second object Manage device keys be operating personnel be equipped with physical equipment key, the key of each operating personnel is different, first key be with The key for the physical equipment cipher key match that the operating personnel are equipped with;
This step is arranged the second physical equipment key and is for increasing the safety of electronic health record.
S504 calls the private key signature interface of the second target cipher key equipment;
This step is the second target cipher key equipment in order to sign respectively to operator calling the private key signature interface It is to be used for one signer of unique mark i.e. operator, and there is unique key.
S505, judge submit file destination cryptographic Hash transaction mechanism digital signature and operator's digital signature respectively whether With the preset key of node and the preset cipher key match of operator;If the file destination cryptographic Hash transaction mechanism digital signature and Operator's digital signature with the preset key of node and the preset cipher key match of operator, executes S506 respectively;
This step be for decision node whether the reception mechanism digital signature and operator's digital signature.
The digital signature can be understood as that the transaction of file destination cryptographic Hash is encrypted, and obtains a string of character strings, needs It is decrypted using node or operator's corresponding key pair character string, if the character string can be unlocked, then it is assumed that the two Match, which can be understood as the storage of data.
In addition, digital signature be related to a hash function, the public key of sender, sender private key.Digital signature has Two effects, first, can determine that message is strictly to be signed and issued by sender, second is that digital signature can determine that message Integrality.
The operation principle of digital signature is:When sending file destination, sender is breathed out with a hash function from file destination Its abstract is generated in uncommon value transaction, then abstract is encrypted with the private key of itself, encrypted abstract will be used as the target The digital signature of file cryptographic Hash transaction and the transaction of file destination cryptographic Hash send jointly to recipient, recipient first with hair Hash function as the side of sending calculates message digest from the original target file cryptographic Hash transaction received, then again with hair The additional digital signature of the transaction is decrypted in the public key for the side of sending, if the two abstracts are identical, so recipient's energy Confirm that the digital signature is sender.
S506, whether the storage location where judging the file destination cryptographic Hash is correct, if correct, executes S507, In, file destination is target case cover files, target back cover file or i-th of target data file.
This step by verify file destination cryptographic Hash storage location, come judge the node whether receive the target text Part.
S507 receives the file destination, and the file destination is determined as effective document;
After being verified according to S505~S506 to the file destination, it just can be determined that whether the node receives target text Part, and determine that it is effective document.
S508 stores the first cryptographic Hash obtained from client, and depositing above-mentioned first cryptographic Hash of acquisition Storage space, which is set, to be sent in client, wherein and above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, on It is that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain to state target case cover files, is used for The file of initiating electron case history is created, above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, on Storage location is stated to be uniquely determined by block number and transaction coding;
Wherein, step S508~S509 is identical as the method that step S201~S202 in Fig. 2 embodiments is executed respectively.Cause This, all embodiments in Fig. 2 are suitable for Fig. 5, and can reach same or analogous advantageous effect, and details are not described herein.
S509 stores the i-th cryptographic Hash obtained from client, and by the storage of above-mentioned i-th cryptographic Hash of acquisition Position is sent in client, wherein above-mentioned i-th cryptographic Hash is i-th that client is obtained according to newly-increased instruction or revision instruction The cryptographic Hash of a target data file, i are natural number, and i≤M, M are the sum of target data file;
S510 judges whether the node is specified contract node for each node;If specified contract node, executes S511;
It should be noted that embodiment provided by the invention does not limit the sequence of S510, contract node is to reach in advance At the node of contractual agreement.
S511 triggers the precondition that preset intelligent contract performer calls all effective contracts, judges conditions present It is whether consistent with default intelligence and the default precondition of about n, if above-mentioned conditions present and above-mentioned intelligence and about n's is default preposition It is consistent, execute S512, wherein n is the coding of intelligent contract;
Effective contract refers to that a contract is effective;The default precondition refers to the operation item set in advance Part, such as precondition are that time conditions for example daily 0 point or event condition such as receive message.
S512, instruction contract node triggering, which executes, presets shell script;
When conditions present is matched with precondition, need to execute the shell script.
S513 stores the second cryptographic Hash obtained from client, and depositing above-mentioned second cryptographic Hash of acquisition Storage space, which is set, to be sent in client, wherein and above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, on It is for forbidding updating target data file to above-mentioned electronic health record to state target back cover file.
Wherein, step S513 is identical as the method that the step S203 in Fig. 2 embodiments is executed.Therefore, all realities in Fig. 2 It applies example and is suitable for Fig. 5, and can reach same or analogous advantageous effect, details are not described herein.
S514 stores the jth cryptographic Hash obtained from client, and by the storage of the above-mentioned jth cryptographic Hash of acquisition Position is sent in client, wherein the cryptographic Hash that above-mentioned jth cryptographic Hash signs documents for i-th of target data, above-mentioned i-th A target data sign documents as signature after i-th of target data file, j is that i-th of target signs documents corresponding cryptographic Hash Serial number.
The value of the j and i of this step are one-to-one, i.e. when i is 1, j is also that 1, i maximum values are M, and j is also M.
It follows that the method that the present invention implements to provide is deposited by the cryptographic Hash for obtaining client according to timestamp Storage, and the storage location of the cryptographic Hash of acquisition is sent in client, it is therefore prevented that electronic health record is tampered, and is subsequent examination electricity Whether the target data file of sub- case history, which is tampered, prepares, in addition, being each node by using public key-key mechanism It is equipped with the key devices of physics, it is ensured that the node for possessing write-in permission is legal node, by using public key-key mechanism Key devices physics or that software is virtual are equipped with for each medical staff, ensure that signature carrys out self-corresponding signer, by It is stored on each node by same, whole in the data of block chain, therefore this distributed storage system can protect The reliability for demonstrate,proving data, copes with long-term preservation and various disasters.
With it is above-mentioned corresponding based on the electronic health record storage method of block chain, the embodiment of the present application also provides based on block The electronic health record storage device of chain.
Fig. 6 is the schematic diagram of the first electronic health record storage device based on block chain provided in an embodiment of the present invention, is answered For client, the above method includes:
Case cover files generation module 601, the file for the file number of the electronic health record of generation to be recorded in establishment, is obtained Obtain target case cover files, wherein above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, above-mentioned mesh Mark case cover files are used to create the file of initiating electron case history;
First cryptographic Hash acquisition module 602, the first cryptographic Hash for obtaining above-mentioned target case cover files are called preset Target block catenary system stores above-mentioned first cryptographic Hash, and above-mentioned target case cover files are stored in preset storage system;
First storage location acquisition module 603, for obtaining above-mentioned first cryptographic Hash in above-mentioned target block catenary system Storage location, wherein above-mentioned storage location by block number and transaction coding uniquely determine;
Electronic health record update module 604, for obtaining the instruction action for obtaining i-th of target data file, with more New above-mentioned electronic health record, wherein i is the serial number of target data file, and i is natural number, and i≤M, M are the total of target data file Number;
Case cover files generation module 605, for after obtaining M target data file, being given birth to according to the instruction of winding up the case of acquisition At target back cover file, wherein above-mentioned target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
Second cryptographic Hash acquisition module 606, the second cryptographic Hash for obtaining above-mentioned target back cover file are called preset Target block catenary system stores above-mentioned second cryptographic Hash, and above-mentioned target back cover file is stored in preset storage system.
Wherein, above-mentioned electronic health record update module 604 may include:
First judging submodule, whether the instruction action for judging to obtain includes newly-increased instruction or revision instruction, wherein Above-mentioned newly-increased instruction is the instruction for obtaining i-th of target data file, and above-mentioned revision instruction is for former target data The instruction for i-th of target data file that file obtains after being revised, above-mentioned original target data file serial number 1 ..., i-1 In any serial number it is corresponding needed for revise target data file;If the instruction action obtained is newly-increased instruction, the i-th Hash is triggered Value increases submodule newly, if the instruction action obtained is revision instruction, the i-th cryptographic Hash of triggering revises submodule;
Above-mentioned i-th cryptographic Hash increases submodule newly, corresponding with the target data file for obtaining i-th of target data file The i-th cryptographic Hash preset target block catenary system is called according to the storage location of above-mentioned file number and above-mentioned first cryptographic Hash Above-mentioned i-th cryptographic Hash is stored, and above-mentioned i-th of target data file is stored in preset storage system;
Above-mentioned i-th cryptographic Hash revises submodule, corresponding with the target data file for obtaining i-th of target data file The i-th cryptographic Hash;According to above-mentioned file number and above-mentioned former target data file, obtains above-mentioned former target data file and correspond to Hash The storage location of value calls preset target block catenary system to store above-mentioned i-th cryptographic Hash according to acquired storage location, And above-mentioned i-th of target data file is stored in preset storage system;Wherein, i-th of target data of acquisition is revised File is to carry out the file of revision acquisition to former target data file by the way of additional Description of Revision, and revised i-th A target data file quotes the storage location in target block catenary system of above-mentioned former target data file;
Above-mentioned apparatus can also include:
First storage location acquisition module, for obtaining above-mentioned i-th cryptographic Hash depositing in above-mentioned target block catenary system Storage space is set.
Above-mentioned apparatus can also include:
Second storage location acquisition module, for obtaining above-mentioned second cryptographic Hash depositing in above-mentioned target block catenary system Storage space is set.
Above-mentioned apparatus can also include:
Acquisition module is encoded, for being instructed according to the signature of reception, is obtained belonging to operator from preset configuration file The coding of mechanism, the corresponding coding of operator;
First signature acquisition module, is used for according to the corresponding coding of aforesaid operations people, close using operator preset first I-th of target data file of key pair is signed;
Second signature acquisition module, it is default using operator's institutional affiliation for the coding according to operator's institutional affiliation The second key sign respectively to the signature of above-mentioned i-th of target data file and operator;
First submits module, and preset storage system is submitted to for i-th of target data to sign documents, wherein on State i-th of target data file after i-th of target data signs documents as signature;
Jth cryptographic Hash acquisition module, the jth cryptographic Hash to sign documents for obtaining i-th of target data are called preset Target block catenary system stores above-mentioned jth cryptographic Hash, wherein and j is that i-th of target signs documents the serial number of corresponding cryptographic Hash, i≤ M, M are the sum of target data file.
Above-mentioned apparatus can also include:
Read module, for being successively read file destination and target signature text according to timestamp from preset storage system Part, wherein above-mentioned file destination is target case cover files, i-th of target data file or target back cover file, above-mentioned target label It is the file after i-th of target data file signature to affix one's name to file;
First authentication module, for for each file destination, verifying whether the file destination is judged as effective document, If the file destination is effective document, triggering the second verification submodule;
Whether above-mentioned second authentication module is effective document for verifying the corresponding target of the file destination and signing documents, If the target signs documents as effective document, triggering association submodule;
Above-mentioned relating module is associated for the file destination to sign documents with the target.
Specifically, above-mentioned first authentication module includes:
Second judgment submodule judges the corresponding mechanism coding of the file destination and machine for being directed to each file destination Whether structure signature is consistent, if the corresponding mechanism coding of the file destination is consistent with authority signature, triggers third judging submodule;
Above-mentioned third judging submodule, for judging whether the corresponding operator's coding of the file destination and operator sign Unanimously;If the corresponding operator's coding of the file destination is consistent with operator's signature, the first effective document decision sub-module is triggered;
Above-mentioned first effective document decision sub-module, for judging the file destination for effective document.
Specifically, above-mentioned second authentication module includes:
4th judging submodule, for judging that the corresponding target of the file destination signs documents corresponding mechanism coding and machine Whether structure signature is consistent;If the target signs documents, corresponding mechanism coding is consistent with authority signature, and triggering the 5th judges submodule Block;
Above-mentioned 5th judging submodule, for judging that the target signs documents corresponding operator coding and operator's signature Whether consistent, if the target signs documents, corresponding operator's coding is consistent with operator's signature, and the second effective document of triggering is sentenced Stator modules;
Above-mentioned second effective document decision sub-module, for judging that the target signs documents as effective document.
Fig. 7 is the schematic diagram of the second provided in an embodiment of the present invention electronic health record storage device based on block chain, is answered For target block catenary system, the above method includes:
First acquisition module 701, for being stored to the first cryptographic Hash obtained from client, and by the above-mentioned of acquisition The storage location of first cryptographic Hash is sent in client, wherein above-mentioned first cryptographic Hash is the target cover that client creates The cryptographic Hash of file, above-mentioned target case cover files are that the file number of the electronic health record of generation is recorded in the text of establishment by client It is obtained on part, the file for creating initiating electron case history, above-mentioned file number is to generate above-mentioned electronics disease according to predetermined manner The unique encodings gone through, above-mentioned storage location are uniquely determined by block number and transaction coding;
Second acquisition module 702, for being stored to the i-th cryptographic Hash obtained from client, and by the above-mentioned of acquisition The storage location of i-th cryptographic Hash is sent in client, wherein above-mentioned i-th cryptographic Hash is client according to for obtaining i-th The cryptographic Hash for i-th of target data file that the instruction action of target data file obtains, i are the serial number of target data file, i For natural number, i≤M, M are the sum of target data file;
Third acquisition module 703, for being stored to the second cryptographic Hash obtained from client, and by the above-mentioned of acquisition The storage location of second cryptographic Hash is sent in client, wherein above-mentioned second cryptographic Hash is the target back cover that client generates The cryptographic Hash of file, above-mentioned target back cover file are for forbidding updating target data file to above-mentioned electronic health record.
Wherein, above-mentioned apparatus can also include:
4th acquisition module, for being stored to the jth cryptographic Hash obtained from client, and by the above-mentioned jth of acquisition The storage location of cryptographic Hash is sent in client, wherein above-mentioned jth cryptographic Hash is the Kazakhstan that i-th of target data signs documents Uncommon value, above-mentioned i-th of target data sign documents as signature after i-th of target data file, j is i-th of target signature text Part corresponds to the serial number of cryptographic Hash.
Above-mentioned apparatus can also include:
Third authentication module, it is whether consistent for verifying the first prewired physical equipment key and preset first key, Wherein, above-mentioned first physical equipment key is the corresponding physical equipment key of a node, and first key is the object with the node The matched key of device keys is managed, if above-mentioned first physical equipment key is consistent with above-mentioned first key, the first signature of triggering connects Mouth calling module;
Above-mentioned first signature interface calling module, the private key signature interface for calling first object key devices;
4th authentication module, for verifying the second prewired physical equipment key or preset-key and preset second key It is whether consistent, if above-mentioned second physical equipment key or preset-key and above-mentioned second key agreement, trigger the second signature interface Calling module, wherein above-mentioned second physical equipment key is the physical equipment key that operating personnel are equipped with, each operating personnel's Key is different, and first key is the key for the physical equipment cipher key match being equipped with the operating personnel;
Above-mentioned second signature interface calling module, the private key signature interface for calling the second target cipher key equipment.
Above-mentioned apparatus can also include:
6th judgment module submits the mechanism digital signature of file destination cryptographic Hash transaction and operator digital for judging Signature respectively whether with the preset key of node and the preset cipher key match of operator, if the file destination cryptographic Hash transaction machine Structure digital signature and operator's digital signature trigger the 7th respectively with the preset key of node and the preset cipher key match of operator Judgment module;
Above-mentioned 7th judgment module, it is whether correct for the storage location where judging the file destination cryptographic Hash, if Correctly, file destination receiving module is triggered, wherein file destination is target case cover files, target back cover file or i-th of target Data file.
File destination receiving module is determined as effective document for receiving the file destination, and by the file destination.
Above-mentioned apparatus can also include:
8th judgment module judges whether the node is specified contract node, if specified close for being directed to each node About node triggers intelligent contract performer;
Above-mentioned intelligence contract performer calls the preposition of all effective contracts for triggering preset intelligent contract performer Condition judges whether conditions present is consistent with default intelligence and the default precondition of about n, if above-mentioned conditions present and above-mentioned intelligence Can be consistent with the default precondition of about n, trigger indicating module;Wherein, n is the coding of intelligent contract;
Above-mentioned indicating module is used to indicate the triggering of contract node and executes default shell script.
The embodiment of the present invention additionally provides a kind of electronic equipment, including processor and machine readable storage medium, above-mentioned machine Device readable storage medium storing program for executing is stored with the machine-executable instruction that can be executed by above-mentioned processor, and above-mentioned processor is by above-mentioned machine Executable instruction promotes:Realize the storage method of two kinds of electronic health records based on block chain provided in an embodiment of the present invention.
Specifically, the storage method of the first electronic health record based on block chain, including:
Above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are used In the file for creating initiating electron case history;
The first cryptographic Hash for obtaining above-mentioned target case cover files calls preset target block catenary system storage above-mentioned first Cryptographic Hash, and above-mentioned target case cover files are stored in preset storage system;
Obtain storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage location It is uniquely determined by block number and transaction coding;
The instruction action for obtaining i-th of target data file is obtained, to update above-mentioned electronic health record, wherein i is mesh The serial number of data file is marked, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein above-mentioned Target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
The second cryptographic Hash for obtaining above-mentioned target back cover file calls preset target block catenary system storage above-mentioned second Cryptographic Hash, and above-mentioned target back cover file is stored in preset storage system.
It can be seen that executing electronic equipment provided in this embodiment, by newly-increased target back cover file, electronics disease ensure that The target data file gone through cannot be updated, and all content data files for constituting electronic health record are stored in preset storage In system, the corresponding cryptographic Hash of each file destination is stored in target block catenary system, avoids electronic health record data quilt The behavior distorted.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided Storage mode is identical, and which is not described herein again.
The storage method of second of electronic health record based on block chain, including:
The first cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned first cryptographic Hash of acquisition It is sent in client, wherein above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, above-mentioned target Case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating just The file of beginning electronic health record, above-mentioned file number are that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, above-mentioned storage Position is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of above-mentioned i-th cryptographic Hash of acquisition is sent out It is sent in client, wherein above-mentioned i-th cryptographic Hash is that client is dynamic according to the instruction for obtaining i-th of target data file Make the cryptographic Hash of i-th of the target data file obtained, i is the serial number of target data file, and i is natural number, and i≤M, M are mesh Mark the sum of data file;
The second cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned second cryptographic Hash of acquisition It is sent in client, wherein above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, above-mentioned target Back cover file is for forbidding updating target data file to above-mentioned electronic health record.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processing, DSP), it is application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete Door or transistor logic, discrete hardware components.
It follows that execute electronic equipment provided in this embodiment, by the cryptographic Hash that obtains client according to the time Stamp is stored, and the storage location of the cryptographic Hash of acquisition is sent in client, it is therefore prevented that electronic health record is tampered, after being Whether the target data file of continuous inspection electronic health record, which is tampered, prepares.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided Storage mode is identical, and which is not described herein again.
In another embodiment provided by the invention, a kind of electronic equipment is additionally provided, as shown in figure 8, including processor 801, communication interface 802, memory 803 and communication bus 804, wherein processor 801, communication interface 802, memory 803 are logical It crosses communication bus 804 and completes mutual communication,
Memory 803, for storing computer program;
Processor 801 when for executing the program stored on memory 803, realizes provided in an embodiment of the present invention two The storage method of electronic health record of the kind based on block chain.
Specifically, the storage method of the first electronic health record based on block chain, including:
Above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are used In the file for creating initiating electron case history;
The first cryptographic Hash for obtaining above-mentioned target case cover files calls preset target block catenary system storage above-mentioned first Cryptographic Hash, and above-mentioned target case cover files are stored in preset storage system;
Obtain storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage location It is uniquely determined by block number and transaction coding;
The instruction action for obtaining i-th of target data file is obtained, to update above-mentioned electronic health record, wherein i is mesh The serial number of data file is marked, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein above-mentioned Target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
The second cryptographic Hash for obtaining above-mentioned target back cover file calls preset target block catenary system storage above-mentioned second Cryptographic Hash, and above-mentioned target back cover file is stored in preset storage system.
It can be seen that executing electronic equipment provided in this embodiment, by newly-increased target back cover file, electronics disease ensure that The target data file gone through cannot be updated, and all content data files for constituting electronic health record are stored in preset storage In system, the corresponding cryptographic Hash of each file destination is stored in target block catenary system, avoids electronic health record data quilt The behavior distorted.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided Storage mode is identical, and which is not described herein again.
The storage method of second of electronic health record based on block chain, including:
The first cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned first cryptographic Hash of acquisition It is sent in client, wherein above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, above-mentioned target Case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating just The file of beginning electronic health record, above-mentioned file number are that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, above-mentioned storage Position is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of above-mentioned i-th cryptographic Hash of acquisition is sent out It is sent in client, wherein above-mentioned i-th cryptographic Hash is that client is dynamic according to the instruction for obtaining i-th of target data file Make the cryptographic Hash of i-th of the target data file obtained, i is the serial number of target data file, and i is natural number, and i≤M, M are mesh Mark the sum of data file;
The second cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned second cryptographic Hash of acquisition It is sent in client, wherein above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, above-mentioned target Back cover file is for forbidding updating target data file to above-mentioned electronic health record.
The communication bus that above-mentioned electronic equipment is mentioned can be Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..The communication bus can be divided into address bus, data/address bus, controlling bus etc..For just It is only indicated with a thick line in expression, figure, it is not intended that an only bus or a type of bus.
Communication interface is for the communication between above-mentioned electronic equipment and other equipment.
Memory may include random access memory (Random Access Memory, RAM), can also include non-easy The property lost memory (Non-Volatile Memory, NVM), for example, at least a magnetic disk storage.Optionally, memory may be used also To be at least one storage device for being located remotely from aforementioned processor.
Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processing, DSP), it is application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing It is field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete Door or transistor logic, discrete hardware components.
Method provided in an embodiment of the present invention can be applied to electronic equipment.Specifically, the electronic equipment can be:It is desk-top Computer, portable computer, intelligent mobile terminal, server etc..It is not limited thereto, any electricity that the present invention may be implemented Sub- equipment, all belongs to the scope of protection of the present invention.
It follows that execute electronic equipment provided in this embodiment, by the cryptographic Hash that obtains client according to the time Stamp is stored, and the storage location of the cryptographic Hash of acquisition is sent in client, it is therefore prevented that electronic health record is tampered, after being Whether the target data file of continuous inspection electronic health record, which is tampered, prepares.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided Storage mode is identical, and which is not described herein again.
In another embodiment provided by the invention, a kind of computer readable storage medium, above computer are additionally provided Computer program is stored in readable storage medium storing program for executing, when above computer program is executed by processor so that computer executes The storage method of two kinds of electronic health records based on block chain of above-described embodiment.
Specifically, the storage method of the first electronic health record based on block chain, including:
Above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are used In the file for creating initiating electron case history;
The first cryptographic Hash for obtaining above-mentioned target case cover files calls preset target block catenary system storage above-mentioned first Cryptographic Hash, and above-mentioned target case cover files are stored in preset storage system;
Obtain storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage location It is uniquely determined by block number and transaction coding;
The instruction action for obtaining i-th of target data file is obtained, to update above-mentioned electronic health record, wherein i is mesh The serial number of data file is marked, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein above-mentioned Target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
The second cryptographic Hash for obtaining above-mentioned target back cover file calls preset target block catenary system storage above-mentioned second Cryptographic Hash, and above-mentioned target back cover file is stored in preset storage system.
It can be seen that when executing the application program stored in computer readable storage medium provided in this embodiment, pass through Newly-increased target back cover file, ensure that the target data file of electronic health record cannot be updated, and the institute that will constitute electronic health record There is content data file to be stored in preset storage system, the corresponding cryptographic Hash of each data file is stored in target block In catenary system, the behavior that electronic health record data are tampered is avoided.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided Storage mode is identical, and which is not described herein again.
The storage method of second of electronic health record based on block chain, including:
The first cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned first cryptographic Hash of acquisition It is sent in client, wherein above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, above-mentioned target Case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating just The file of beginning electronic health record, above-mentioned file number are that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, above-mentioned storage Position is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of above-mentioned i-th cryptographic Hash of acquisition is sent out It is sent in client, wherein above-mentioned i-th cryptographic Hash is that client is dynamic according to the instruction for obtaining i-th of target data file Make the cryptographic Hash of i-th of the target data file obtained, i is the serial number of target data file, and i is natural number, and i≤M, M are mesh Mark the sum of data file;
The second cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned second cryptographic Hash of acquisition It is sent in client, wherein above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, above-mentioned target Back cover file is for forbidding updating target data file to above-mentioned electronic health record.
It follows that when executing the application program stored in computer readable storage medium provided in this embodiment, pass through The cryptographic Hash that client obtains is stored according to timestamp, and the storage location of the cryptographic Hash of acquisition is sent to client In, it is therefore prevented that whether electronic health record is tampered, be tampered and prepare for the target data file of subsequent examination electronic health record.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided Storage mode is identical, and which is not described herein again.
In another embodiment provided by the invention, a kind of computer program product including instruction is additionally provided, when it When running on computers so that computer executes the storage method of two kinds of electronic health records based on block chain of above-described embodiment.
Specifically, the storage method of the first electronic health record based on block chain, including:
Above-mentioned file number is that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, and above-mentioned target case cover files are used In the file for creating initiating electron case history;
The first cryptographic Hash for obtaining above-mentioned target case cover files calls preset target block catenary system storage above-mentioned first Cryptographic Hash, and above-mentioned target case cover files are stored in preset storage system;
Obtain storage location of above-mentioned first cryptographic Hash in above-mentioned target block catenary system, wherein above-mentioned storage location It is uniquely determined by block number and transaction coding;
The instruction action for obtaining i-th of target data file is obtained, to update above-mentioned electronic health record, wherein i is mesh The serial number of data file is marked, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein above-mentioned Target back cover file is for forbidding updating target data file to above-mentioned electronic health record;
The second cryptographic Hash for obtaining above-mentioned target back cover file calls preset target block catenary system storage above-mentioned second Cryptographic Hash, and above-mentioned target back cover file is stored in preset storage system.
It can be seen that when executing computer program product provided in this embodiment, by newly-increased target back cover file, ensure The target data file of electronic health record cannot be updated, and all content data files for constituting electronic health record are stored in pre- If storage system in, the corresponding cryptographic Hash of each data file is stored in target block catenary system, avoid electronics disease It counts one by one according to the behavior being tampered.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided Storage mode is identical, and which is not described herein again.
The storage method of second of electronic health record based on block chain, including:
The first cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned first cryptographic Hash of acquisition It is sent in client, wherein above-mentioned first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, above-mentioned target Case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating just The file of beginning electronic health record, above-mentioned file number are that the unique encodings of above-mentioned electronic health record are generated according to predetermined manner, above-mentioned storage Position is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of above-mentioned i-th cryptographic Hash of acquisition is sent out It is sent in client, wherein above-mentioned i-th cryptographic Hash is that client is dynamic according to the instruction for obtaining i-th of target data file Make the cryptographic Hash of i-th of the target data file obtained, i is the serial number of target data file, and i is natural number, and i≤M, M are mesh Mark the sum of data file;
The second cryptographic Hash obtained from client is stored, and by the storage location of above-mentioned second cryptographic Hash of acquisition It is sent in client, wherein above-mentioned second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, above-mentioned target Back cover file is for forbidding updating target data file to above-mentioned electronic health record.
It follows that when executing computer program product provided in this embodiment, pass through the cryptographic Hash for obtaining client It is stored according to timestamp, and the storage location of the cryptographic Hash of acquisition is sent in client, it is therefore prevented that electronic health record quilt It distorts, whether is tampered and prepares for the target data file of subsequent examination electronic health record.
The embodiment of above-mentioned related content electronic health record storage method is deposited with what preceding method embodiment part provided Storage mode is identical, and which is not described herein again.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its arbitrary combination real It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.Above computer program Product includes one or more computer instructions.On computers load and execute above computer program instruction when, all or It partly generates according to above-mentioned flow or function of the embodiment of the present invention.Above computer can be all-purpose computer, special meter Calculation machine, computer network or other programmable devices.Above computer instruction can be stored in computer readable storage medium In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, above computer Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or Data center is transmitted.Above computer readable storage medium storing program for executing can be any usable medium that computer can access or It is comprising data storage devices such as one or more usable mediums integrated server, data centers.Above-mentioned usable medium can be with It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state disk Solid State Disk (SSD)) etc..
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including above-mentioned element.
Each embodiment in this specification is all made of relevant mode and describes, identical similar portion between each embodiment Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for device, For electronic equipment, computer readable storage medium or computer program product embodiments, since it is substantially similar to method reality Example is applied, so description is fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
It above are only presently preferred embodiments of the present invention above, be not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (23)

1. a kind of storage method of the electronic health record based on block chain, which is characterized in that be applied to client, the method packet It includes:
The file number of the electronic health record of generation is recorded on the file of establishment, obtains target case cover files, wherein the archives Number it is the unique encodings that the electronic health record is generated according to predetermined manner, the target case cover files are for creating initiating electron disease The file gone through;
The first cryptographic Hash for obtaining the target case cover files calls preset target block catenary system to store first Hash Value, and the target case cover files are stored in preset storage system;
Obtain storage location of first cryptographic Hash in the target block catenary system, wherein the storage location is by area Block number and transaction coding uniquely determine;
The instruction action for obtaining i-th of target data file is obtained, to update the electronic health record, wherein i is number of targets According to the serial number of file, i is natural number, and i≤M, M are the sum of target data file;
After obtaining M target data file, target back cover file is generated according to the instruction of winding up the case of acquisition, wherein the target Back cover file is for forbidding updating target data file to the electronic health record;
The second cryptographic Hash for obtaining the target back cover file calls preset target block catenary system to store second Hash Value, and the target back cover file is stored in preset storage system.
2. the method as described in claim 1, which is characterized in that the finger obtained for obtaining i-th of target data file Order acts, to update the electronic health record, including:
Judge whether the instruction action obtained includes newly-increased instruction or revision instruction, wherein the newly-increased instruction is for obtaining The instruction of i-th of target data file, the revision instruction are i-th for being obtained after being revised to former target data file The instruction of a target data file, the original target data file serial number 1 ..., the corresponding required revision of any serial number in i-1 Target data file;
If the instruction action obtained is newly-increased instruction, i-th of target data file corresponding with the target data file i-th is obtained Cryptographic Hash calls preset target block catenary system to store according to the storage location of the file number and first cryptographic Hash I-th cryptographic Hash, and i-th of target data file is stored in preset storage system;
If the instruction action obtained is revision instruction, i-th of target data file corresponding with the target data file i-th is obtained Cryptographic Hash;According to the file number and the former target data file, the storage that former target data file corresponds to cryptographic Hash is obtained Preset target block catenary system is called to store i-th cryptographic Hash, and will be described according to acquired storage location in position I-th of target data file is stored in preset storage system;Wherein, i-th of target data file for revising acquisition is to adopt The file of revision acquisition, and revised i-th of number of targets are carried out to former target data file with the mode of additional Description of Revision According to file quote the former target data file target block catenary system storage location.
3. method as claimed in claim 2, which is characterized in that called described in preset target block catenary system storage described I-th cryptographic Hash, and after i-th of target data file is stored in preset storage system, the method further includes:
Obtain storage location of i-th cryptographic Hash in the target block catenary system.
4. method according to any one of claims 1 to 3, which is characterized in that the target case cover files, target back cover text Part is to record first object information with preset coded format, and the first object information includes file number, file type, refers to It is target case cover files, target back cover file to enable action and file content, the file type.
5. method as claimed in claim 4, which is characterized in that the target data file is remembered with preset coded format The second target information is recorded, second target information includes in file number, file type, name file, instruction action and file Hold, the file type further includes target data file.
6. method as claimed in claim 5, which is characterized in that the coded format includes XML coded formats, JSON coding lattice Formula, pure file format or binary format.
7. method as claimed in claim 6, which is characterized in that the target data file includes first page of illness case file, the course of disease It records file, nursing history file, examine checklist or discharge record;
Described instruction action includes newly-increased instruction, signature instruction or revision instruction, wherein the signature instruction is mechanism or operation The instruction that people signs to target data file;
The file content includes data content, generates the unique identifier of the mechanism coding and patient of electronic health record.
8. the method as described in claim 1, which is characterized in that in second Hash for obtaining the target back cover file Value calls preset target block catenary system to store second cryptographic Hash, and the target back cover file is stored in default Storage system in after, the method further includes:
Obtain storage location of second cryptographic Hash in the target block catenary system.
9. the method as described in any one of claim 5~8, which is characterized in that obtain the target back cover file described The second cryptographic Hash, call preset target block catenary system to store second cryptographic Hash, and by the target back cover file After being stored in preset storage system, the method further includes:
It is instructed according to the signature of reception, the coding of operator's institutional affiliation is obtained from preset configuration file, operator corresponds to Coding;
According to the corresponding coding of the operator, carried out using i-th of target data file of the preset first key pair of operator Signature;
According to the coding of operator's institutional affiliation, using preset second key of operator's institutional affiliation respectively to described i-th Target data file and the signature of operator are signed;
I-th of target data is signed documents and is submitted to preset storage system, wherein i-th of target data signature text Part is i-th of target data file after signature;
The jth cryptographic Hash that i-th of target data signs documents is obtained, preset target block catenary system is called to store the jth Cryptographic Hash, wherein j is that i-th of target signs documents the serial number of corresponding cryptographic Hash, and i≤M, M are the sum of target data file.
10. method as claimed in claim 9, which is characterized in that in the jth that i-th of target data of the acquisition signs documents Cryptographic Hash, after calling preset target block catenary system to store the jth cryptographic Hash, the method further includes:
File destination is successively read according to timestamp from preset storage system and target signs documents, wherein the target File is target case cover files, i-th of target data file or target back cover file, and the target signs documents as i-th of mesh Mark the file after data file signature;
For each file destination, verify whether the file destination is judged as effective document;
Whether if the file destination is effective document, it is effective document to verify the corresponding target of the file destination and sign documents;
If the target signs documents as effective document, which is signed documents with the target and is associated.
11. method as claimed in claim 10, which is characterized in that it is described to be directed to each file destination, verify the file destination Whether effective document is judged as, including:
For each file destination, judge whether the corresponding mechanism coding of the file destination is consistent with authority signature;
If the corresponding mechanism coding of the file destination is consistent with authority signature, judge the file destination corresponding operator coding and Whether operator's signature is consistent;
If the corresponding operator's coding of the file destination is consistent with operator's signature, judge the file destination for effective document.
12. method as claimed in claim 10, which is characterized in that the corresponding target of described verification file destination signs documents Whether it is effective document, including:
Judge whether the corresponding target of the file destination corresponding mechanism coding that signs documents is consistent with authority signature;
If the target signs documents, corresponding mechanism coding is consistent with authority signature, judges that the target signs documents corresponding operation Whether people encodes consistent with operator's signature;
If the target signs documents, corresponding operator's coding is consistent with operator's signature, and it is effective to judge that the target signs documents File.
13. a kind of storage method of the electronic health record based on block chain, which is characterized in that be applied to target block catenary system, institute The method of stating includes:
The first cryptographic Hash obtained from client is stored, and the storage location of first cryptographic Hash of acquisition is sent Into client, wherein first cryptographic Hash is the cryptographic Hash for the target case cover files that client creates, the target cover File is that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain, for creating initial electricity The file of sub- case history, the file number are that the unique encodings of the electronic health record are generated according to predetermined manner, the storage location It is uniquely determined by block number and transaction coding;
The i-th cryptographic Hash obtained from client is stored, and the storage location of i-th cryptographic Hash of acquisition is sent to In client, wherein i-th cryptographic Hash is that client is obtained according to the instruction action for obtaining i-th of target data file The cryptographic Hash of i-th of the target data file obtained, i are the serial number of target data file, and i is natural number, and i≤M, M are number of targets According to the sum of file;
The second cryptographic Hash obtained from client is stored, and the storage location of second cryptographic Hash of acquisition is sent Into client, wherein second cryptographic Hash is the cryptographic Hash for the target back cover file that client generates, the target back cover File is for forbidding updating target data file to the electronic health record.
14. method as claimed in claim 13, which is characterized in that carried out to the first cryptographic Hash obtained from client described Storage, and after the storage location of first cryptographic Hash of acquisition is sent in client, the method further includes:
The jth cryptographic Hash obtained from client is stored, and the storage location of the jth cryptographic Hash of acquisition is sent to In client, wherein the jth cryptographic Hash is the cryptographic Hash that i-th of target data signs documents, i-th of target data I-th of target data file after signing documents as signature, j are that i-th of target signs documents the serial number of corresponding cryptographic Hash.
15. method as claimed in claim 13, which is characterized in that carried out to the first cryptographic Hash obtained from client described Storage, and before the storage location of first cryptographic Hash of acquisition is sent in client, the method further includes:
It verifies the first prewired physical equipment key and whether preset first key is consistent, wherein first physical equipment Key is the corresponding physical equipment key of a node, and first key is the key with the physical equipment cipher key match of the node;
If the first physical equipment key is consistent with the first key, the private key signature of first object key devices is called to connect Mouthful;
It verifies the second prewired physical equipment key or preset-key and whether preset second key is consistent;Wherein, described Two physical equipment keys are the physical equipment key that operating personnel are equipped with, and the key of each operating personnel is different, first key For the key for the physical equipment cipher key match being equipped with the operating personnel;
If the second physical equipment key or preset-key and second key agreement, call the second target cipher key equipment Private key signature interface.
16. method as claimed in claim 15, which is characterized in that if in the second physical equipment key or presetting close Key and second key agreement, after the private key signature interface for calling the second target cipher key equipment, the method further includes:
Judge to submit the mechanism digital signature of file destination cryptographic Hash transaction and operator's digital signature whether pre- with node respectively If the preset cipher key match of key and operator;
If the file destination cryptographic Hash transaction mechanism digital signature and operator's digital signature respectively with the preset key of node With the preset cipher key match of operator, whether the storage location where judging the file destination cryptographic Hash is correct, wherein target text Part is target case cover files, target back cover file or i-th of target data file;
If correct, the file destination is received, and the file destination is determined as effective document.
17. the method described in claim 16, which is characterized in that carried out to the second cryptographic Hash obtained from client described Storage, and before the storage location of second cryptographic Hash of acquisition is sent in client, the method further includes:
For each node, judge whether the node is specified contract node;
If specified contract node, the precondition that preset intelligent contract performer calls all effective contracts is triggered, is judged Whether conditions present is consistent with default intelligence and the default precondition of about n, wherein n is the coding of intelligent contract;
If the conditions present is consistent with the intelligence and the default precondition of about n, instruction contract node triggering executes default Shell script.
18. a kind of storage device of the electronic health record based on block chain, which is characterized in that be applied to client, described device packet It includes:
Case cover files generation module, the file for the file number of the electronic health record of generation to be recorded in establishment obtain target Case cover files, wherein the file number is that the unique encodings of the electronic health record are generated according to predetermined manner, the target cover File is used to create the file of initiating electron case history;
First cryptographic Hash acquisition module, the first cryptographic Hash for obtaining the target case cover files, calls preset target area Block catenary system stores first cryptographic Hash, and the target case cover files are stored in preset storage system;
First storage location acquisition module, for obtaining storage position of first cryptographic Hash in the target block catenary system It sets, wherein the storage location is uniquely determined by block number and transaction coding;
Electronic health record update module, for obtaining the instruction action for obtaining i-th of target data file, to update the electricity Sub- case history, wherein i is the serial number of target data file, and i is natural number, and i≤M, M are the sum of target data file;
Case cover files generation module, for after obtaining M target data file, target envelope to be generated according to the instruction of winding up the case of acquisition Bottom file, wherein the target back cover file is for forbidding updating target data file to the electronic health record;
Second cryptographic Hash acquisition module, the second cryptographic Hash for obtaining the target back cover file, calls preset target area Block catenary system stores second cryptographic Hash, and the target back cover file is stored in preset storage system.
19. a kind of storage device of the electronic health record based on block chain, which is characterized in that be applied to target block catenary system, institute Stating device includes:
First acquisition module is breathed out for being stored to the first cryptographic Hash obtained from client, and by described the first of acquisition The storage location of uncommon value is sent in client, wherein first cryptographic Hash is the target case cover files that client creates Cryptographic Hash, the target case cover files are that the file number of the electronic health record of generation is recorded on the file of establishment by client to obtain , the file for creating initiating electron case history, the file number is to generate the electronic health record only according to predetermined manner One coding, the storage location are uniquely determined by block number and transaction coding;
Second acquisition module, for being stored to the i-th cryptographic Hash obtained from client, and by i-th Hash of acquisition The storage location of value is sent in client, wherein i-th cryptographic Hash is client according to for obtaining i-th of number of targets According to the cryptographic Hash for i-th of target data file that the instruction action of file obtains, i is the serial number of target data file, and i is nature Number, i≤M, M are the sum of target data file;
Third acquisition module is breathed out for being stored to the second cryptographic Hash obtained from client, and by described the second of acquisition The storage location of uncommon value is sent in client, wherein second cryptographic Hash is the target back cover file that client generates Cryptographic Hash, the target back cover file are for forbidding updating target data file to the electronic health record.
20. a kind of electronic equipment, which is characterized in that including processor and machine readable storage medium, the machine readable storage Media storage has the machine-executable instruction that can be executed by the processor, and the processor is by the machine-executable instruction Promote:Realize any method and step of claim 1~12.
21. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Program realizes claim 1~12 any method and step when the computer program is executed by processor.
22. a kind of electronic equipment, which is characterized in that including processor and machine readable storage medium, the machine readable storage Media storage has the machine-executable instruction that can be executed by the processor, and the processor is by the machine-executable instruction Promote:Realize any method and step of claim 13~17.
23. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Program realizes claim 13~17 any method and step when the computer program is executed by processor.
CN201711424940.3A 2017-12-25 2017-12-25 Storage method, device, equipment and storage medium of electronic medical record Active CN108573737B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711424940.3A CN108573737B (en) 2017-12-25 2017-12-25 Storage method, device, equipment and storage medium of electronic medical record

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711424940.3A CN108573737B (en) 2017-12-25 2017-12-25 Storage method, device, equipment and storage medium of electronic medical record

Publications (2)

Publication Number Publication Date
CN108573737A true CN108573737A (en) 2018-09-25
CN108573737B CN108573737B (en) 2020-08-07

Family

ID=63575989

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711424940.3A Active CN108573737B (en) 2017-12-25 2017-12-25 Storage method, device, equipment and storage medium of electronic medical record

Country Status (1)

Country Link
CN (1) CN108573737B (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108876227A (en) * 2018-09-28 2018-11-23 国网河南省电力公司南阳供电公司 A kind of power grid material supply quotient's hierarchical management system
CN109255251A (en) * 2018-10-31 2019-01-22 安徽中科智链信息科技有限公司 File data based on block chain technology protects system and method
CN109376172A (en) * 2018-09-27 2019-02-22 精硕科技(北京)股份有限公司 Data capture method and system based on block chain
CN109409135A (en) * 2018-10-19 2019-03-01 北京金山云网络技术有限公司 A kind of characteristic information preparation method, device, equipment and the storage medium of data
CN109886692A (en) * 2019-03-08 2019-06-14 泰康保险集团股份有限公司 Data transmission method, device, medium and electronic equipment based on block chain
CN109949882A (en) * 2018-11-15 2019-06-28 陕西医链区块链集团有限公司 Medical block chain data storage system
CN110197707A (en) * 2019-05-23 2019-09-03 泰康保险集团股份有限公司 Medical record information processing method, device, medium and electronic equipment based on block chain
CN110378133A (en) * 2019-06-28 2019-10-25 深圳市元征科技股份有限公司 A kind of document protection method, device, electronic equipment and storage medium
CN110993112A (en) * 2019-11-20 2020-04-10 泰康保险集团股份有限公司 Tumor treatment case management method, system, medium and electronic device based on block chain
CN111475538A (en) * 2019-01-24 2020-07-31 北京京东尚科信息技术有限公司 Data processing method, device and storage medium
CN111523135A (en) * 2020-07-06 2020-08-11 飞天诚信科技股份有限公司 PDF file electronic signature method and device
CN111767427A (en) * 2019-04-02 2020-10-13 浙江宇视科技有限公司 Video information storage method and data storage domain
CN111782338A (en) * 2018-12-12 2020-10-16 阿里巴巴集团控股有限公司 Data processing method and system based on intelligent contract of block chain
CN112100171A (en) * 2020-08-12 2020-12-18 北京大学 Method and device for establishing content index for random consensus diagram book
CN113254979A (en) * 2021-06-26 2021-08-13 环球数科集团有限公司 Credible examination system for protecting business privacy and computer storage medium
CN113611383A (en) * 2021-08-20 2021-11-05 平安国际智慧城市科技股份有限公司 Medical information acquisition method and device, electronic equipment and storage medium
CN114185997A (en) * 2022-02-17 2022-03-15 天津眧合数字科技有限公司 Pet information credible storage system based on block chain
CN116631564A (en) * 2023-07-25 2023-08-22 汶上县人民医院 Emergency electronic medical record management system and management method
CN117037988A (en) * 2023-08-22 2023-11-10 广州视景医疗软件有限公司 Electronic medical record storage method and device based on blockchain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150205929A1 (en) * 2014-01-23 2015-07-23 Dror Samuel Brama Method, System and Program Product for Transferring Genetic and Health Data
WO2017074017A1 (en) * 2015-10-26 2017-05-04 주식회사 아이알엠 Method for building cloud-based medical image database for protection of patient information and reading medical image therefrom
CN106682530A (en) * 2017-01-10 2017-05-17 杭州电子科技大学 Method and device for medical information sharing privacy protection based on blockchain technology
CN106777923A (en) * 2016-11-30 2017-05-31 谭小刚 Information for hospital supervising platform and monitoring and managing method
CN106934243A (en) * 2017-03-17 2017-07-07 北京好运到信息科技有限公司 A kind of electronic health record management method and system
CN107368750A (en) * 2017-06-23 2017-11-21 雷虹 The implementation method and device of electronic health record based on block chain
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150205929A1 (en) * 2014-01-23 2015-07-23 Dror Samuel Brama Method, System and Program Product for Transferring Genetic and Health Data
WO2017074017A1 (en) * 2015-10-26 2017-05-04 주식회사 아이알엠 Method for building cloud-based medical image database for protection of patient information and reading medical image therefrom
CN106777923A (en) * 2016-11-30 2017-05-31 谭小刚 Information for hospital supervising platform and monitoring and managing method
CN106682530A (en) * 2017-01-10 2017-05-17 杭州电子科技大学 Method and device for medical information sharing privacy protection based on blockchain technology
CN106934243A (en) * 2017-03-17 2017-07-07 北京好运到信息科技有限公司 A kind of electronic health record management method and system
CN107368750A (en) * 2017-06-23 2017-11-21 雷虹 The implementation method and device of electronic health record based on block chain
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
沈鑫: ""区块链技术综述"", 《网络与信息安全学报》 *
谭霜 等: ""云存储中的数据完整性证明研究及进展"", 《计算机学报》 *
黄永刚: ""基于区块链技术的电子健康档案安全建设"", 《中华医学图书情报杂志》 *

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109376172A (en) * 2018-09-27 2019-02-22 精硕科技(北京)股份有限公司 Data capture method and system based on block chain
CN108876227A (en) * 2018-09-28 2018-11-23 国网河南省电力公司南阳供电公司 A kind of power grid material supply quotient's hierarchical management system
CN109409135A (en) * 2018-10-19 2019-03-01 北京金山云网络技术有限公司 A kind of characteristic information preparation method, device, equipment and the storage medium of data
CN109409135B (en) * 2018-10-19 2021-06-22 北京金山云网络技术有限公司 Method, device, equipment and storage medium for acquiring characteristic information of data
CN109255251A (en) * 2018-10-31 2019-01-22 安徽中科智链信息科技有限公司 File data based on block chain technology protects system and method
CN109255251B (en) * 2018-10-31 2023-10-10 安徽中科晶格技术有限公司 File data protection system and method based on block chain technology
CN109949882A (en) * 2018-11-15 2019-06-28 陕西医链区块链集团有限公司 Medical block chain data storage system
CN111782338A (en) * 2018-12-12 2020-10-16 阿里巴巴集团控股有限公司 Data processing method and system based on intelligent contract of block chain
CN111782338B (en) * 2018-12-12 2024-05-03 创新先进技术有限公司 Data processing method and system based on blockchain intelligent contract
CN111475538A (en) * 2019-01-24 2020-07-31 北京京东尚科信息技术有限公司 Data processing method, device and storage medium
CN109886692B (en) * 2019-03-08 2021-05-07 泰康保险集团股份有限公司 Data transmission method, device, medium and electronic equipment based on block chain
CN109886692A (en) * 2019-03-08 2019-06-14 泰康保险集团股份有限公司 Data transmission method, device, medium and electronic equipment based on block chain
CN111767427B (en) * 2019-04-02 2024-04-05 浙江宇视科技有限公司 Video information storage method and data storage domain
CN111767427A (en) * 2019-04-02 2020-10-13 浙江宇视科技有限公司 Video information storage method and data storage domain
CN110197707B (en) * 2019-05-23 2021-07-30 泰康保险集团股份有限公司 Block chain-based medical record information processing method, device, medium and electronic equipment
CN110197707A (en) * 2019-05-23 2019-09-03 泰康保险集团股份有限公司 Medical record information processing method, device, medium and electronic equipment based on block chain
CN110378133A (en) * 2019-06-28 2019-10-25 深圳市元征科技股份有限公司 A kind of document protection method, device, electronic equipment and storage medium
CN110993112A (en) * 2019-11-20 2020-04-10 泰康保险集团股份有限公司 Tumor treatment case management method, system, medium and electronic device based on block chain
CN110993112B (en) * 2019-11-20 2023-04-18 泰康保险集团股份有限公司 Tumor treatment case management method, system, medium and electronic device based on block chain
CN111523135A (en) * 2020-07-06 2020-08-11 飞天诚信科技股份有限公司 PDF file electronic signature method and device
CN112100171A (en) * 2020-08-12 2020-12-18 北京大学 Method and device for establishing content index for random consensus diagram book
CN113254979A (en) * 2021-06-26 2021-08-13 环球数科集团有限公司 Credible examination system for protecting business privacy and computer storage medium
CN113611383A (en) * 2021-08-20 2021-11-05 平安国际智慧城市科技股份有限公司 Medical information acquisition method and device, electronic equipment and storage medium
CN113611383B (en) * 2021-08-20 2024-02-02 深圳平安智慧医健科技有限公司 Medical information acquisition method, device, electronic equipment and storage medium
CN114185997B (en) * 2022-02-17 2022-05-13 天津眧合数字科技有限公司 Pet information credible storage system based on block chain
CN114185997A (en) * 2022-02-17 2022-03-15 天津眧合数字科技有限公司 Pet information credible storage system based on block chain
CN116631564B (en) * 2023-07-25 2023-10-10 汶上县人民医院 Emergency electronic medical record management system and management method
CN116631564A (en) * 2023-07-25 2023-08-22 汶上县人民医院 Emergency electronic medical record management system and management method
CN117037988A (en) * 2023-08-22 2023-11-10 广州视景医疗软件有限公司 Electronic medical record storage method and device based on blockchain
CN117037988B (en) * 2023-08-22 2024-05-17 广州视景医疗软件有限公司 Electronic medical record storage method and device based on blockchain

Also Published As

Publication number Publication date
CN108573737B (en) 2020-08-07

Similar Documents

Publication Publication Date Title
CN108573737A (en) A kind of storage method of electronic health record, device, equipment and storage medium
Elangovan et al. Application of blockchain technology in hospital information system
Dubovitskaya et al. Secure and trustable electronic medical records sharing using blockchain
Saha et al. Review on “Blockchain technology based medical healthcare system with privacy issues”
TWI815905B (en) System and method for regulating a value of a cryptocurrency used in a health care network
US10490304B2 (en) Device-driven non-intermediated blockchain system over a social integrity network
US20200090795A1 (en) Method and system for sharing privacy data based on smart contracts
CN108460290A (en) A kind of Electronic Health Record management system and method
CN108665953A (en) A kind of prescription executes method, apparatus, equipment and storage medium
US20220191048A1 (en) Cryptographically Verifiable, Portable Certificate
Stroetmann et al. United in diversity: legal challenges on the road towards interoperable eHealth solutions in Europe
Wu et al. A patient-centric interoperable framework for health information exchange via blockchain
Koushik et al. Performance analysis of blockchain-based medical records management system
Ciampi et al. Modernizing healthcare by using blockchain
Kushch et al. Blockchain tree for ehealth
Jafri et al. Blockchain applications for the healthcare sector: Uses beyond Bitcoin
Zhang et al. [Retracted] Design and Application of Electronic Rehabilitation Medical Record (ERMR) Sharing Scheme Based on Blockchain Technology
TW200535746A (en) A method for protecting information integrity
Rghioui et al. Blockchain-based Electronic Healthcare Information System Optimized for Developing Countries.
Sapra et al. A blockchain solution for the privacy of patients’ medical data
US11985227B2 (en) Method and a system for securing data, especially data of biotechnological laboratories
CN112883028B (en) Medical data trusted memory management system based on blockchain
CN109949889B (en) Electronic medical record nursing system
KR20060110114A (en) System of managing electrical medical information and method of generating electrical medical information
Deborah et al. Blockchain: a possible alternative to achieving health information exchange (hie)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant