CN108573746A - A kind of drug administration monitoring expert system - Google Patents

A kind of drug administration monitoring expert system Download PDF

Info

Publication number
CN108573746A
CN108573746A CN201810798284.1A CN201810798284A CN108573746A CN 108573746 A CN108573746 A CN 108573746A CN 201810798284 A CN201810798284 A CN 201810798284A CN 108573746 A CN108573746 A CN 108573746A
Authority
CN
China
Prior art keywords
patient
drug
message
value
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810798284.1A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810798284.1A priority Critical patent/CN108573746A/en
Publication of CN108573746A publication Critical patent/CN108573746A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The drug administration of the present invention monitors expert system:Intelligent medicine box, sign measuring terminals and remote server;The measured value of the patient sign of acquisition is sent to intelligent medicine box by sign measuring terminals by wireless signal, and intelligent medicine box is suitable for measured value being uploaded to remote server, and remote server realizes whether monitoring patient takes medicine by built-in drug administration judgment module.Network attack defense module is equipped in remote server, which includes:Controller, IDS policy servers, distributed IDS equipment and flow cleaning center;When any IDS equipment detects the message with ddos attack feature, i.e., IDS policy servers are reported to by SSL traffic channel;IDS policy servers make processing strategy corresponding with having the message of ddos attack feature, then shield the message by controller according to information is reported.

Description

A kind of drug administration monitoring expert system
Technical field
The present invention relates to medical information systems, and in particular to a kind of drug administration monitoring expert system and its working method.
Background technology
The aging of population of current social is had to face problem for entire society, family, individual, greatly For most the elderlys with diseases such as heart disease, diabetes, hypertension, it is right under the assistance of doctor that these diseases generally require patient The disease of its own carries out prolonged lasting management, is followed in many aspects such as medication, daily life, diet, movement, rehabilitation physical therapies Set diagnosis and treatment plan is put into practice.In the overall process of disease control, patient generally requires to be timed to hospital (especially base doctor Institute) follow-up is carried out, so that doctor tracks the disease progression of patient and adjusts doctor's advice in time.
Since this is a longer time process, often periods of months even the several years;And this process is often sent out Life needs patient to be independently spontaneously managed to the disease of oneself and health except clinical setting.Certain patients are due to recognizing Know that insufficient, selfdiscipline is strong or other odjective causes, it is difficult to accomplish strict implement doctor's advice, at regular time and quantity medication, on time Follow-up so that the state of an illness occurs repeatedly or aggravates, and influences therapeutic effect, increases medical expense, hence it is imperative that some backmans Have to help its to carry out medical monitoring management.
Traditional medical profession requirements of process patient in timing carries out follow-up at doctor, not only takes consumption wealth, but also patient There is the risk by cross-infection in clinical setting.And the rise of Tele medicine in recent years so that doctor can be by mutual Real-time tracking of networking monitors the state of an illness of patient, understands the health status after the medication of patient and key physiological index.Thus one, Conventional follow-up operation flow can be completed in the case where doctor and patient stay indoors.Especially for chronic sufferer Person, if doctor's advice implementation effect is good, patient profiles stablize, and relative physiologic index can be with regard to this decision without significant changes, then doctor Current doctor's advice is adopted, hospital is arrived again without patient and carries out follow-up.
To solve the above problems, Chinese patent literature application publication number CN102855406A discloses one kind based on long-range doctor The intelligent medicine purchase system for the treatment of system and the monitoring of doctor's advice compliance is remotely supervised although technical solution description is taken medicine which solve patient The problem of control, but it does not embody specific detection means not for being monitored automatically with a certain disease yet.In for another example State patent document application number CN102292063A discloses a kind of method and apparatus for dispensing medicament, which is directed to Timely, the correct granting of drug, but unresolved the technical issues of effect after medication is monitored.
Invention content
The object of the present invention is to provide a kind of drug administration monitoring expert system and working method, this system and working methods Be detected by the data after taking medicine to patient, solve to patient the stipulated time whether take medicine and take medicine reasonability carry out The technical issues of judgement.
In order to solve the above technical problem, the present invention provides a kind of drug administrations to monitor expert system, including:Intelligent medicine Case, sign measuring terminals and remote server;The wherein described sign measuring terminals lead to the measured value of the patient sign of acquisition It crosses wireless signal and is sent to intelligent medicine box, the intelligent medicine box is suitable for measured value being uploaded to remote server, the long-range clothes Business device realizes whether monitoring patient takes medicine by built-in drug administration judgment module, and/or to the reasonability of patient's medication into Row judges, and will determine that result is sent to intelligent medicine box;And the reminding module by being set in intelligent medicine box reminds patient;And/or It will determine that result is sent to doctor's client.
Preferably, network attack defense module is equipped in the remote server, which includes:Control Device, IDS policy servers, distributed IDS equipment and flow cleaning center processed;When any IDS equipment is detected with DDoS When the message of attack signature, i.e., IDS policy servers are reported to by SSL traffic channel;The IDS policy servers are according to upper It notifies breath, makes tactful with the corresponding processing of the message of ddos attack feature, the message is then passed through into controller screen It covers or the interchanger access interface flow corresponding to the message is redirected to flow cleaning center and be filtered;This long-range clothes Device be engaged in while realizing the purpose of medication monitoring, also has the function of resisting malicious attack, to ensure that network is unobstructed.
Preferably, in order to preferably be screened, be filtered out to the message of ddos attack feature;Include in the IDS equipment: Packet check module is cheated, the deceptive practices of link layer and internet layer address are detected;Packet check module is destroyed, to net Border layer and the abnormal behaviour of transport layer flag bit setting are detected;Exception message detection module, it is general to application layer and transport layer Big vast formula attack is detected;By the deception packet check module, destroy packet check module, exception message detection mould Block is successively detected message;And if any detection module detection outgoing packet is there are when above-mentioned respective behavior, by the message It is transferred to IDS policy servers;The IDS policy servers are suitable for having deceptive practices when message, and attack and threaten In the domains OpenFlow, then host is shielded by controller;Or threatened not in the domains OpenFlow when attacking, then it will by controller Interchanger access interface flow corresponding to the message is redirected to flow cleaning center and is filtered;The IDS decision services Device is further adapted for having abnormal behaviour when message, then is shielded to the flow of attacker or attack host by controller;With And flood formula attack when message has, then be suitable for will be corresponding to the message by controller for the IDS policy servers Interchanger access interface flow is redirected to flow cleaning center and is filtered.
Another aspect, in order to solve the above-mentioned technical problem, the present invention also provides a kind of drug administrations to monitor expert system Working method, include the following steps:Whether step S100 is taken medicine by remote monitoring patient, step S200, is taken medicine to patient Reasonability judged;Step S300, and according to judging result to remind patient, and/or will determine that result is sent to doctor Client.
Further, included the following steps by the method whether remote monitoring patient takes medicine in the step S100:Step S110 establishes genius morbi value set;Step S120 obtains the measured value of any acquisition time in collection period, then According to the difference of the measured value of measured value acquisition time identical as previous cycle and interval time of acquisition time twice Calculate slope function SL (t);Whether step S130 establishes patient according to the slope function SL (t) and takes medicine judgment formula, i.e.,
IfWhen, then judge that patient does not take medicine;
In formula, the exception in genius morbi value set when σ 1 does not take medicine for preset patient's single corresponding to a characteristic value Threshold value, it is describedThe accumulative threshold value of exception corresponding to characteristic value when not taking medicine repeatedly for preset patient, n1 are total time of acquisition Number.
Further, further include by the method whether remote monitoring patient takes medicine in the step S100:According to the disease Multiple characteristic values establish the result of calculation yr of corresponding medication judgment formula in sick characteristic value collectionm, establish being suitable for for multiple characteristic values Judge whether the judgment formula of medication;
I.e.Then judge that patient does not take medicine;
In formula, the ξ 1 is the multiple features exception threshold corresponding to various features value of the preset patient when not taking medicine repeatedly Value, n2 are characterized the quantity of value, and m indicates the type of characteristic value.
Further, the method judged the reasonability of patient's medication in the step S200 includes the following steps:
Step S210 presets the mark of the corresponding human body indicators parameter of each acquisition time corresponding to genius morbi value set Quasi- value;Step S220 calculates the measured value of any acquisition time and the difference functions D of the standard value of identical acquisition time (t);Step S230 establishes patient's medication reasonability judgment formula, i.e., according to the difference functions D (t)
IfJudge that the taken medicine object of patient is not up to curative effect;
In formula, σ 2 is the outlier threshold corresponding to characteristic value when being not up to curative effect after preset patient takes medicine,It is pre- If patient medication after not up to curative effect when characteristic value corresponding to extremely accumulative threshold value of more time points.
Further, the method judged the reasonability of patient's medication in the step S200 further includes following steps:
The calculating knot of corresponding medication reasonability judgment formula is established according to multiple characteristic values in the genius morbi value set Fruit yrm, that establishes multiple characteristic values is suitable for judging the rational formula of patient's medication;
I.e.Then judge that patient's medication is not up to curative effect;
In formula, the ξ 2 is the multiple features corresponding to various features value when being not up to curative effect after default patient repeatedly takes medicine Outlier threshold.
Further, in order to avoid patient is when a variety of drugs carry out mixed take, pharmacology conflict, the drug administration monitoring are generated The working method of expert system further includes:A method of the mixed clothes conflict of drug is effectively avoided, that is, establishes that drug is mixed to take safety Table is corresponded to, each unit item in the table is corresponding with the pharmacology information of each drug respectively, passes through the table each medicine to be taken to patient The pharmacology information of product carries out comparison of tabling look-up successively, to judge that each drug is the safety of mixed clothes.
Further, for special disease crowd, for example, the diseases such as heart disease, diabetes, hypertension, some drugs are that have Taboo, wrongly take and will produce adverse reaction, so the present invention also the drug is mixed take safety and correspond to table on the basis of, establish The taboo drug of a certain disease compares sublist, i.e. the pharmacology with each taboo drug of the disease respectively of each unit item in the table Information is corresponding, takes safety mixed to the drug and corresponds to after table tables look-up, then compares sublist to suffering from by avoiding drug The pharmacology information of person's each drug to be taken carries out comparison of tabling look-up successively, to judge the drug to the disease safety.
Further, it monitors whether patient takes medicine by remote server, and/or the reasonability of patient's medication is sentenced It is disconnected;Network malicious attack in order to prevent, wherein the remote server uses SDN network framework;The SDN network framework packet It includes:Data plane, using plane and control plane;Data plane, when any IDS equipment detects attack in data plane When threat, notice enters attack type analysis process using plane;Using plane, for analyzing attack type, and Corresponding attack, which is customized, according to attack type threatens processing strategy;Control plane connects to provide attack threat processing using plane Mouthful, and provide attack threat identification interface for data plane.
Beneficial effects of the present invention:(1) drug administration of the invention monitoring expert system and working method realize remotely Whether take medicine to patient, and the reasonability of medication is judged;And genius morbi value set is established, whether comprehensive descision takes Medicine, improves the accuracy of judgement, and further to taking medicine the effect of be detected, while also to will determine that result timely feedbacks To doctor's client;(2) present invention can also resist network malicious attack, and to ensure that server works normally, user terminal connection is suitable Freely.
Description of the drawings
In order to make the content of the present invention more clearly understood, below according to specific embodiment and in conjunction with attached drawing, The present invention is described in further detail, wherein
Fig. 1 shows the functional block diagram of the drug administration monitoring expert system of the present invention;
Fig. 2 shows the functional block diagrams of IDS equipment;
Fig. 3 shows the flow chart of the working method of the drug administration monitoring expert system of the present invention;
Fig. 4 shows the method flow diagram whether taken medicine by remote monitoring patient in step S100;
Fig. 5 shows the method flow diagram that the reasonability taken medicine to patient in step S200 is judged;
Fig. 6 shows the functional block diagram of this remote server.
Specific implementation mode
In order to make the objectives, technical solutions and advantages of the present invention clearer, With reference to embodiment and join According to attached drawing, the present invention is described in more detail.It should be understood that these descriptions are merely illustrative, and it is not intended to limit this hair Bright range.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid this is unnecessarily obscured The concept of invention.
Embodiment 1
Fig. 1 shows the functional block diagram of the drug administration monitoring expert system of the present invention.
As shown in Figure 1, the drug administration of the present invention monitors expert system, including:Intelligent medicine box, sign measuring terminals, with And remote server;The measured value of the patient sign of acquisition is sent to intelligence by the wherein described sign measuring terminals by wireless signal Energy medicine-chest, the intelligent medicine box are suitable for measured value being uploaded to remote server, and the remote server passes through built-in drug It takes judgment module and realizes whether monitoring patient takes medicine, and/or the reasonability of patient's medication is judged, and will determine that result It is sent to intelligent medicine box;And the reminding module by being set in intelligent medicine box reminds patient;And/or it will determine that result is sent to doctor Client.
Wherein, it will be described in detail in the following embodiments about the working method of drug administration judgment module.Doctor Raw client is specially the man-machine interactive system placed at doctor, and doctor can also monitor the medication situation of patient in consulting room.
Further, drug administration monitoring expert system can also be connected with pharmacy's drug administration management system, by drug Instructions of taking with providing medication by the memory of network transmission to intelligence test and reminding medical kit, being suggested.
This intelligent medicine box also there is medication amount detection function accordingly to be reminded when medication amount deficiency.
The prompting includes but not limited to use:Light-emitting device, microphone or pass through the means such as sending short message by mobile phone. The sign measuring terminals are such as blood pressure instrument, blood glucose meter, pulse meter.Sign measuring terminals and intelligence test and reminding medical kit Connection type includes but not limited to the modes such as bluetooth, wireless, wired.The intelligence test uploads characteristic value with reminding medical kit, i.e., Connection type with remote server can be wireless (2G, 3G or 4G), the modes such as wired.
Further, as a kind of optional embodiment of the present embodiment.
Network attack defense module is equipped in the remote server, which includes:Controller, IDS policy servers, distributed IDS equipment and flow cleaning center;When any IDS equipment is detected with ddos attack spy When the message of sign, i.e., IDS policy servers are reported to by SSL traffic channel;The IDS policy servers are according to above notifying Breath, make it is tactful with the corresponding processing of the message of ddos attack feature, then by the message by controller shielding or Interchanger access interface flow corresponding to the message is redirected to flow cleaning center and is filtered by person.
Fig. 2 shows the functional block diagrams of IDS equipment.
As shown in Fig. 2, further, including in the IDS equipment:Packet check module is cheated, to link layer and internetwork layer The deceptive practices of address are detected;Packet check module is destroyed, the abnormal behaviour that internetwork layer and transport layer flag bit are arranged It is detected;Exception message detection module is detected the formula attack that floods of application layer and transport layer;Pass through the deception Packet check module, destruction packet check module, exception message detection module are successively detected message;And if any detection Module detects outgoing packet there are when above-mentioned respective behavior, then the message is transferred to IDS policy servers;The IDS decision services Device is suitable for having deceptive practices when message, and attacks and threaten in the domains OpenFlow, then shields host by controller;Or works as and attack Threat is hit not in the domains OpenFlow, then is redirected to the interchanger access interface flow corresponding to the message by controller Flow cleaning center is filtered;The IDS policy servers are further adapted for having abnormal behaviour when message, then pass through controller pair Attacker or the flow for attacking host are shielded;And when message has the formula attack that floods, then the IDS decisions take Business device, which is suitable for that the interchanger access interface flow corresponding to the message is redirected to flow cleaning center by controller, to carry out Filtering.
Wherein, ddos attack characterizing definition is:To the deceptive practices of link layer and internet layer address, to internetwork layer and transmission The abnormal behaviour of layer flag bit setting, and flood formula attack to application layer and transport layer.IDS is intrusion detection device. SDN is software defined network.
The present invention use from deception packet check module to destroy packet check module, then to exception message detection module according to The sequence of secondary detection, wherein each module obtains packet information and uses independent Interface design, and the coupling for reducing intermodule is closed Connection property;And each module improves the high cohesion of module using the program data structure of optimization, careful each processing sub-process of segmentation Characteristic.This detection ordering improves the detection efficiency to message data, and reduces omission factor.
Network equipment information binding table is called by the deception packet check module, and in the IDS policy servers In the middle structure unit interval suitable for the first Hash table for being counted to packet cheating behavior, and set first Hash table In the first threshold values;The deception packet check module, the type for the message being encapsulated in Packet-In message is solved Analysis, to obtain corresponding source, purpose IP address, MAC Address and the interchanger DPID and the port that upload Packet-In message Number information, and each information is compared with the corresponding information in network equipment information binding table respectively;If above-mentioned in message Message is then transferred to and destroys packet check module by information matches;If the above- mentioned information in message mismatches, it is transferred to the IDS Policy server abandons message, and is counted simultaneously to deceptive practices, when the count value is more than the first threshold values, Shielding sends the program and/or host of the message.
Specifically, the deception packet check module be used for message carry out first time judgement, that is, judge message whether be IP spoofing attack message, port spoofing attack message or MAC spoofing attack messages.
Specific steps include:Parse source, target MAC (Media Access Control) address and interchanger entrance in ethernet frames first, then root Different messages is parsed according to different type of messages.When type of message be IP, ARP, RARP when, then parse corresponding source, Then these information are carried out matching of tabling look-up by purpose IP address to the information in network equipment information binding table, if being matched to phase The information answered then gives and destroys packet check resume module.If mismatching, which is transferred to the processing of IDS policy servers; And simultaneously to deceptive practices carry out accumulated counts, when the count value be more than the first threshold values when, shielding send the message program and/ Or host.
There are one device manager module DeviceManagerImpl in Floodlight, when an equipment in a network Tracking equipment when mobile device, and equipment is defined according to new stream.
Equipment manager learns equipment from PacketIn requests, and device network parameter is obtained from PacketIn messages Information (information such as source, destination IP, MAC, VLAN) is distinguished equipment for interchanger or host by entity classification device.It is silent Entity classification device shows that an equipment, the two attributes can uniquely identify one using MAC Address and/or vlan table in the case of recognizing A equipment.Another important information is the installation point (No. DPID of interchanger and port numbers) of equipment (at one In the regions openflow, equipment can only there are one installation point, herein the regions openflow refer to it is same The set of the connected multiple switch of Floodlight examples.Equipment manager is also IP address, installation point, equipment were provided with Time phase, the last time timestamp foundation whether expired as them are judged.)
Therefore only DeviceManagerImpl modules need to be called to provide inside network equipment information binding table module IDeviceService, at the same to the service add IDeviceListener monitoring interface.
The monitoring interface that wherein IDeviceListener is provided has:
Interface name Function
public void deviceAdded(IDevice device) Host addition response
public void deviceRemoved(IDevice device) Host removes response
public void deviceMoved(IDevice device) Host mobility responds
public void deviceIPV4AddrChanged(IDevice device) Host IP address changes response
public void deviceVlanChanged(IDevice device) Host VLAN changes response
ISP:IFloodlightProviderService,IDeviceService
Rely on interface:IFloodlightModule,IDeviceListener
Record in table according to the low and high level trigger mechanism of interchanger (cable extracts the low level of triggering PortDown, Cable pulls out the high level of triggering PortUp) record in binding table can be refreshed in real time.
The information that traditional ddos attack can not touch, change SwitchDPID and SwitchPort can using this advantage With more flexible detection spoofing attack.
Built in the IDS policy servers in the unit interval be suitable for the flag bit of message be arranged abnormal behaviour into The second Hash table that row counts, and set the second threshold values in second Hash table;The destruction packet check module is to report Each flag bit of text is detected, to judge whether each flag bit meets ICP/IP protocol specification;If each flag bit of message accords with It closes, then message is transferred to exception message detection module;If each flag bit of message is not met, it is transferred to the IDS decision services Device abandons message, and is counted simultaneously to flag bit setting abnormal behaviour, when the count value is more than the second threshold values When, shielding sends the program and/or host of the message.
Specifically, the destruction packet check module, judge for carrying out second to message, that is, judge message whether be Attack message with malice flag bit feature.Wherein, the attack message with malice flag bit feature includes but not limited to IP Attack message, TCP attack messages.Implementation steps include:IP attack message and TCP/UDP attack messages therein are realized each The detection of the flag bit of message, that is, identify whether each flag bit meets ICP/IP protocol specification.If meeting, just directly hand over By abnormal number packet check resume module.If not meeting, it is judged as attack message, is transferred to the processing of IDS policy servers.
It is row with typical attacks such as TearDrop, there are one offset field and a fragment mark (MF) in the packet header IP, The case where if offset field is arranged to incorrect value by attacker, and IP fragmentation message just will appear coincidence or disconnect, target machine System will collapse.
In IP packet head, there are a protocol fields, which specifies which kind of agreement is the IP packet carry.The field Value is less than 100, if attacker sends the IP packet of largely protocol fields of the band more than 100, target machine to target machine Protocol stack in system will be destroyed, and attack is formed.
Therefore in destroying packet check module, each flag bit of outgoing packet is extracted first, is then checked whether normal.
If normal, subsequent module for processing is given.
If abnormal, the data packet is abandoned, and count to corresponding Hash table counter.If unit interval inside counting When device is more than second threshold values of setting, then IDS policy servers is called to carry out shielding and/or directly screen to corresponding program Cover corresponding host.
After data packet by cheating packet check module filters out, the subsequent number destroyed handled by packet check module All it is true according to the address in packet.In this way, effectively avoiding target machine has received destruction message, target may be directly resulted in The protocol stack of machine collapses or even target machine directly collapses.
Processing function and the deception packet check process flow for destroying packet check module are substantially similar, and difference lies in destructions What packet check module parsed is the flag bit of each message, whether normal then detects each flag bit.
If normal, just directly to the processing of subsequent exception message detection module.
If abnormal, the data packet is abandoned, and to the corresponding Hash table inside counting device of host application reference mechanism It counts.If it exceeds the threshold values of setting, then shield corresponding attacker or directly shielding attack host.
The Hash table for the formula attack message that floods for identification is built in the exception message detection module, is determined in the IDS Build the third Hash table that is counted to the formula attack that floods of being suitable in the unit interval in plan server, and setting this Third threshold values in third Hash table;The exception message detection module, suitable for being sentenced according to the threshold values set in the Hash table Whether the message that breaks has attack;If without attack, by data distributing;If having attack, it is transferred to institute IDS policy servers are stated, message is abandoned, and attack is counted simultaneously, when count value is more than third threshold values When, shielding sends the program and/or host of the message.
Specifically, the exception message detection module, for carrying out third time judgement to message, that is, judge message whether be The formula that floods attack message.
Specific steps include:Using to the identification of structure flood formula attack message in Hash table respective record carry out It is cumulative, and detect whether to be more than threshold value, to judge whether the being formula attack message that floods.
By above-mentioned deception packet check module, destroy filtering out for packet check two modules of module, subsequent module for processing Data packet substantially belong to data packet under normal circumstances.However, under normal circumstances, ddos attack generation is also had, existing In technology, normally only carries out deception packet check module, destroys packet check module, and in the technical scheme, in order to the greatest extent may be used Energy avoids ddos attack.
Following embodiment is to after carrying out deception packet check module, destroying packet check modular filtration, then passes through exception The specific implementation mode of packet check module shield ddos attack.The embodiment is with UDPFlooding and ICMPFlooding For.
About UDPFloodling, the mechanism using udp protocol without establishing connection sends a large amount of UDP reports to target machine Text.Target machine can devote a tremendous amount of time processing UDP messages, these UDP attack messages can not only make the caching of storage UDP messages Overflow, and a large amount of network bandwidth can be occupied, target machine can not (or seldom) receive legal UDP messages.
Since different hosts sends a large amount of UDP message packets to single host, so having the feelings of udp port occupancy certainly Condition, so the technical program can receive the unreachable packet in port of an ICMP.
So the technical program can establish All hosts one Hash table, it is specifically used to receive in the storage unit interval The number of the unreachable packet in the ports ICMP.If it exceeds the threshold values of setting, then directly shield corresponding attacker.
About ICMPFloodling, unit interval inside counting is directly carried out for ICMPFlooding.If it exceeds corresponding Threshold values, then directly respective host is accordingly shielded, although this method is simple, directly effectively.
Therefore, exception message detection module carries out phase if the type of message detected is exception message detection type The counter answered detects whether to be more than threshold value, if it does not exceed the threshold, optimal routing policy also can be passed through to the data packet It issues.Threshold value if more than then shields corresponding attacker, or is directly accordingly shielded to respective host.
The deception packet check module destroys any module judgement in packet check module and exception message detection module When the message is above-mentioned attack message, then the attack message is transferred to IDS policy servers, that is, abandon the message, and shield Cover the program and/or host for sending the message.
When " deception packet check module ", " destroying packet check module " and " exception message detection module " need to abandon number When according to packet or needing to shield threat host.It directly invokes IDS policy servers and carries out corresponding threat processing operation.
The specific implementation steps of the IDS policy servers include:
The step of abandoning the message, i.e. packet discard includes as follows:
OpenFlow interchangers be not matched to corresponding flow table, and the data envelope can disappear mounted in PacketIn In breath, while there is this data packet in local caching in exchange opportunity, and data packet is stored in the buffer, and there are one buffer area ID Number, this ID number can be also encapsulated in the buffer_id of PacketIn message, by the form of Packetout, simultaneously Buffer_id in Packetout message fills in the buffer area ID for the data packet to be abandoned (in corresponding PacketIn message buffer_id)。
The step of shielding host includes as follows:
OpenFlow agreement flow table structures are as follows:
Packet header domain Counter Action
The structure in its middle wrapping head domain is:
Include the steps that application program shield including as follows in IDS policy servers:
Step 1:Corresponding matching field is filled in the packet header domain of flow table, and by the way that Wildcards mask fields are arranged, To obtain shielding attacker or host information.Wherein, if you need to shield attacker, then following is filled in the domain of flow table packet header With field:IP, MAC, VLAN, SwtichDPID, SwtichPort, protocol type and its port numbers etc..If you need to shield host, then It is filled in the domain of flow table packet header:The matching fields such as IP, MAC, VLAN, SwtichDPID, SwtichPort.
Step 2:Flow table action lists are emptied, realize the data packet discarding of attacker/host.
Step 3:The record value in each Hash table is called, flow table time-out is calculated and is automatically deleted the time.
Step 4:Issue flow table mask program or host.
Therefore, the network of the technical program can effectively identify and filter out attack package, remote server can be avoided to be disliked Meaning attack.
Embodiment 2
Fig. 3 shows the flow chart of the working method of the drug administration monitoring expert system of the present invention.
As shown in figure 3, the working method of the drug administration monitoring expert system of the present invention, includes the following steps:
Whether step S100 is taken medicine by remote monitoring patient;Step S200 sentences the reasonability of patient's medication It is disconnected;Step S300, and according to judging result to remind patient, and/or will determine that result is sent to doctor's client.
Fig. 4 shows the method flow diagram whether taken medicine by remote monitoring patient in step S100.
As shown in figure 4, specifically, the method whether taken medicine by remote monitoring patient in the step S100 includes as follows Step:
Step S110 establishes genius morbi value set.
Step S120 calculates slope function.The measured value for obtaining any acquisition time in collection period, further according to The interval time of the difference of the measured value of measured value acquisition time identical as previous cycle and twice acquisition time calculate Slope function SL (t).
Step S130, structure medication judgment formula.It establishes patient according to the slope function SL (t) and whether takes medicine and judge public affairs Formula, i.e.,
IfWhen, then judge that patient does not take medicine;
In formula, the exception in genius morbi value set when σ 1 does not take medicine for preset patient's single corresponding to a characteristic value Threshold value, it is describedThe accumulative threshold value of exception corresponding to characteristic value when not taking medicine repeatedly for preset patient, n1 are total time of acquisition Number.
Further, further include by the method whether remote monitoring patient takes medicine in the step S100:
The result of calculation yt of corresponding medication judgment formula is established according to multiple characteristic values in the genius morbi value setm, Establish the judgment formula for being suitable for judging whether medication of multiple characteristic values;
I.e.Then judge that patient does not take medicine;
In formula, the ξ 1 is the multiple features exception threshold corresponding to various features value of the preset patient when not taking medicine repeatedly Value, n2 are characterized the quantity of value, and m indicates the type of characteristic value.
Fig. 5 shows the method flow diagram that the reasonability taken medicine to patient in step S200 is judged.
As shown in figure 5, specifically, the method judged the reasonability of patient's medication in the step S200 includes such as Lower step:
Step S210 presets relevant parameter, i.e., each acquisition time corresponding to default genius morbi value set is corresponding The standard value of human body indicators parameter.
Step S220, calculating difference calculate the standard value of the measured value and identical acquisition time of any acquisition time Difference functions D (t).
Step S230 establishes patient's medication reasonability judgment formula, i.e., according to the difference functions D (t)
IfThen judge that the taken medicine object of patient is not up to curative effect;
In formula, σ 2 is the outlier threshold corresponding to characteristic value when being not up to curative effect after preset patient takes medicine,It is pre- If patient's medication after not up to curative effect when characteristic value corresponding to extremely accumulative threshold value of more time points, n1 is total time of acquisition Number.
Further, the method judged the reasonability of patient's medication in the step S200 further includes following steps:
The calculating knot of corresponding medication reasonability judgment formula is established according to multiple characteristic values in the genius morbi value set Fruit yrm, that establishes multiple characteristic values is suitable for judging the rational formula of patient's medication;
I.e.Then judge that patient's medication is not up to curative effect;
In formula, the ξ 2 is the multiple features corresponding to various features value when being not up to curative effect after default patient repeatedly takes medicine Outlier threshold, n2 are characterized the quantity of value, and m indicates the type of characteristic value.
For a better understanding of the technical solution of the present invention, it is as follows as specific embodiment to illustrate hypertension.
One, the monitoring characteristic value of hypertensive patient is determined
The characteristic value of hypertensive patient's sign mainly has:Systolic pressure C1, diastolic pressure C2, Related Risk Factors quantity C3, root Genius morbi value set is established according to features described above value, wherein each characteristic value can be indicated with Cm, m indicates the kind of characteristic value Class.The feature measured in real time only has 2:Systolic pressure C1, diastolic pressure C2 need not measure Related Risk Factors quantity C3, Can the parameter of diagnosis typing be passed through by doctor.
The value of systolic pressure C1 and diastolic pressure C2 are regularly to acquire to obtain by sign measuring terminals (blood pressure instrument), and incite somebody to action Characteristic value is transferred to by long-range intelligence test and reminding medical kit in system.
According to classification situation (normal, prehypertensive, I grade hypertension, II grades of hypertension, the high blood of III level of hypertension Pressure, simple systolic hypertension and hypertension emergency) and delamination (low danger, middle endanger, is high-risk and very high-risk) determine feature The standard value S1 and S2 of value.
The disease classification of hypertension is completed by table one:
The one hypertension grading table of comparisons of table
The disease layering of hypertension is completed by table two:
Two hypertension of table is layered the table of comparisons
Normal Diagnosis value after common medication
The normal value table of hypertension after the effectively medication of table three
According to table 3, characteristic value systolic pressure C is determined1, diastolic pressure C2Corresponding standard value S1=130 or S1=140 or S1= 150, S2=90 or S1=80.
It is mainly related with following medical history to the relevant risk factor of hypertension:Diabetes, obesity, homocysteine Mass formed by blood stasis hyperlipidemia, atherosclerosis, gout, nephrosis, family of stroke, smokes, drinks, heart disease family history etc..C3's takes Value is equal to current patient quantity shared in disease defined above, and when this value is changed, then C3 also changes. According to features of hypertension, the corresponding standard value S3=0 of Related Risk Factors quantity C3 are taken.
Two, determine that characteristic value measures frequency
The blood pressure peak value of the characteristics of according to human body, people appear in 10 points or so of the morning (t1) and mid-afternoon (t2), The blood pressure low peak of people appears in 1:00 AM or so (t3), because 1:00 AM is the sleeping time of people, thus with (t4) before sleeping The double measurement of (t5) substitutes after getting up with morning.
Judge whether a people has hypertension, general recommendations to be measured at t1 and t2 time points;And judge having for medication Effect property generally measures (t0) in the set time of every day.
In conclusion the feature of hypertension can be measured in t0, t1, t2, t4, t5.
Three, characteristic value slope function generates
For each characteristic index, slope function is generated:
SL1 (t)=(T1 (t)-T1 (t0))/(t-t0)
SL2 (t)=(T2 (t)-T2 (t0))/(t-t0)
Wherein t0 represents the previous day same time of measuring point, because according to the undulating value in one day of human blood-pressure, The measurement of same period just has comparative sense.
This two functions are also the point of series of discrete on two-dimensional coordinate, and consecutive points are connected with straight line, then also constituted Two line charts.
Four, characteristic value difference functions generate
In t0, t1, t2, t4, t5, totally 5 times measure the systolic pressure and diastolic pressure of blood pressure daily.
Systolic pressure is labeled as function T1 (t), and the measurement point at daily 5 time points is discrete point:T10、T11、T12、T14、 T15
Diastolic pressure is labeled as function T2 (t), and the measurement point at daily 5 time points is discrete point:T20、T21、T22、T24、 T25
Construct the difference functions of systolic pressure:
D1 (t)=T1 (t)-S1, wherein t=0,1,2,4,5
D2 (t)=T2 (t)-S2, wherein t=0,1,2,4,5
This two functions constitute multiple with discrete point on two-dimensional coordinate, and consecutive points straight line, which connects, then constitutes two foldings Line.
Five, the generation of anomaly parameter threshold value
In calculating below, need to use 4 important threshold parameters:σ1、σ2、
Outlier threshold in genius morbi value set when σ 1 does not take medicine for preset patient's single corresponding to a characteristic value, It is describedThe accumulative threshold value of exception corresponding to characteristic value when not taking medicine repeatedly for preset patient, by being surveyed to high blood pressure disease Examination can obtain empirical value, the σ 1=0.3 π of π → 0.5,Accuracy is relatively high.
σ 2, which is the outlier threshold corresponding to characteristic value when being not up to curative effect after preset patient takes medicine, (can also be referred to as Disease reasonability anomaly parameter threshold value),For preset patient take medicine after not up to curative effect when characteristic value corresponding to it is more when Between put abnormal accumulative threshold value (disease reasonability outlier threshold can also be referred to as), by that can be obtained to high blood pressure disease test Empirical value, 2=10 → 20 σ,Accuracy is relatively high.
Six, characteristic value whether medication function generates, i.e. whether patient takes medicine judgment formula
Seven, the generation of characteristic value rational function, i.e. patient medication reasonability judgment formula
Eight, the result of calculation of corresponding medication judgment formula is established according to multiple characteristic values in the genius morbi value set, Establish the judgment formula for being suitable for judging whether medication of multiple characteristic values;
ifthen
It does not take medicine
else
Normal medication
The ξ 1 is the multiple features outlier threshold corresponding to various features value of the preset patient when not taking medicine repeatedly, with According to the experiment to hypertension, the value is that 5-8 is more reasonable.2 are characterized the quantity of value.
Nine, the calculating of corresponding medication reasonability judgment formula is established according to multiple characteristic values in the genius morbi value set As a result yrm, that establishes multiple characteristic values is suitable for judging the rational formula of patient's medication;
ifthen
Medication is reasonable
else
It takes medicine unreasonable
The wherein ξ 2 be default patient repeatedly after medication not up to curative effect when various features value corresponding to multiple features Outlier threshold, with being that 5-8 is more reasonable according to the value to the experiment of hypertension.
Ten, establish that drug is mixed to be taken safety and correspond to table.
The working method of drug administration monitoring expert system further includes:
Establish that drug is mixed to be taken safety and correspond to table, that is, each unit item in the table respectively with the pharmacology information phase of each drug It is corresponding, comparison of tabling look-up is carried out by the pharmacology information of the table each drug to be taken to patient successively, to judge that each drug is mixed clothes Safety.
Specifically, mixed between having various drugs in system takes safety and corresponds to table, it can be with B matrixes come table Show:
B matrix tables are shown with the conflict test table of n kind drugs, wherein:bij(i, j=1,2,, n) indicates i-th kind of drug and the In j:The conflicting of the mixed clothes of kind drug is 1 if do not conflicted, and it is 0 to have conflict then.Since drug itself is incompatible, then It can be seen that bmm=
1, i.e. diagonal line is 1, i.e., as follows
Assuming that certain patient takes m kind drugs, then:
Judge that drug is mixed and takes security test.
ifthen
Mixed medication object safety
else
Mixed medication object is dangerous
Further, the drug it is mixed take safety and correspond to table further include:The taboo drug of a certain disease compares sublist, i.e., should Each unit item in table is corresponding with each taboo pharmacology information of drug of the disease respectively, to the mixed clothes safety of the drug Property correspond to after table tabled look-up, then compare by avoiding drug the pharmacology information of the sublist each drug to be taken to patient and carry out successively It tables look-up comparison, to judge the drug to the disease safety.
Specifically, depositing in systems, there are one diseases to avoid drug reference table, can be indicated with T series vector:
The drug table of T series vector expression hypertension taboos, vector T m (m=1,2,, n) it indicates to be prohibited marked as m diseases Medication object table, wherein tmi.(i=1,2 ... nm) indicate the prohibited clothes of m diseases certain drug.
Assuming that certain patient has x kind complication, y kind drugs are currently taken, then:
Judge hypertension and complication medicine taboo security test.
ifthen
Medication is without taboo
else
Medication taboo
As a kind of optional embodiment of the present embodiment, monitor whether patient takes medicine by remote server, and/or The reasonability of patient's medication is judged.
Fig. 6 shows the functional block diagram of this remote server.
As shown in Figure 6, wherein the remote server uses SDN network framework;The SDN network framework includes:Data Plane, using plane and control plane;Data plane, when any IDS equipment detects that attack threatens in data plane, Notice enters attack type analysis process using plane;Using plane, for analyzing attack type, and according to attack The corresponding attack of type customization threatens processing strategy;Control plane threatens Processing Interface to provide attack using plane, and is number Attack threat identification interface is provided according to plane.
The attack threatens:DDOS attack threatens.
Wherein, SDN is software defined network.
In Fig. 6 processing strategy, the attack prison of data plane are threatened about attack type analysis, attack using plane It surveys, attack threatens shielding and the attack threat of routing optimality and control plane processing, attack threat identification are in embodiment 1 Middle expansion explanation, which is not described herein again.
Judging whether patient takes medicine in above-described embodiment, and/or to patient medication it is rational during, in advance Cicada patient illnesses and required drug administration information, which can be obtained by multiple channel, such as be led to by patient Cross intelligent medicine box inputted (input mode may be used key-press input and speech recognition input), or by remote server from It is obtained in medical diagnostic system.
It should be understood that the above-mentioned specific implementation mode of the present invention is used only for exemplary illustration or explains the present invention's Principle, but not to limit the present invention.Therefore, that is done without departing from the spirit and scope of the present invention is any Modification, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.In addition, appended claims purport of the present invention Covering the whole variations fallen into attached claim scope and boundary or this range and the equivalent form on boundary and is repairing Change example.

Claims (5)

1. a kind of drug administration monitors expert system, which is characterized in that including:Intelligent medicine box, sign measuring terminals, and it is long-range Server;The measured value of the patient sign of acquisition is sent to intelligent medicine by the wherein described sign measuring terminals by wireless signal Case, the intelligent medicine box are suitable for measured value being uploaded to remote server, and the remote server passes through built-in drug administration Judgment module realizes whether monitoring patient takes medicine, and judges the reasonability of patient's medication, and will determine that result is sent to Intelligent medicine box;And the reminding module by being set in intelligent medicine box reminds patient;And it will determine that result is sent to doctor's client;
Network attack defense module is equipped in the remote server, which includes:Controller, IDS determine Plan server, flow cleaning center and distributed IDS equipment;
When any IDS equipment detects the message with ddos attack feature, i.e., IDS is reported to by SSL traffic channel and determined Plan server;
The IDS policy servers make processing plan corresponding with having the message of ddos attack feature according to information is reported Slightly, then the message is shielded by controller;
Include in the IDS equipment:
Packet check module is cheated, the deceptive practices of link layer and internet layer address are detected;
Packet check module is destroyed, the abnormal behaviour that internetwork layer and transport layer flag bit are arranged is detected;
Exception message detection module is detected the formula attack that floods of application layer and transport layer;
By the deception packet check module, packet check module, exception message detection module are destroyed successively to message progress Detection;And if any detection module detects outgoing packet there are when respective behavior, which is transferred to IDS policy servers;
The IDS policy servers are suitable for having deceptive practices when message, and attack and threaten in the domains OpenFlow, then pass through control Device processed shields host;
The IDS policy servers are further adapted for having abnormal behaviour when message, then are shielded to attacker by controller; And
It floods formula attack when message has, be then suitable for will be corresponding to the message by controller for the IDS policy servers Interchanger access interface flow be redirected to flow cleaning center and be filtered.
2. drug administration according to claim 1 monitors expert system, which is characterized in that the drug administration monitors expert When system works, include the following steps:
Whether step S100 is taken medicine by remote monitoring patient;
Step S200 judges the reasonability of patient's medication;
Step S300, and according to judging result to remind patient, and will determine that result is sent to doctor's client;
Included the following steps by the method whether remote monitoring patient takes medicine in the step S100:
Step S110 establishes genius morbi value set;
Step S120 obtains the measured value of any acquisition time in collection period, further according to the measured value and the last week The interval time of the difference of the measured value of phase identical acquisition time and twice acquisition time calculate slope function SL (t);
Whether step S130 establishes patient according to the slope function SL (t) and takes medicine judgment formula, i.e.,
If yt>When 1, then judge that patient does not take medicine;T is any acquisition time in a collection period;
In formula, the abnormal threshold in genius morbi value set when σ 1 does not take medicine for preset patient's single corresponding to a characteristic value Value, it is described1 is the accumulative threshold value of exception corresponding to characteristic value when preset patient does not take medicine repeatedly, and n1 is that acquisition is total secondary Number;
Further include by the method whether remote monitoring patient takes medicine in the step S100:
The result of calculation yt of corresponding medication judgment formula is established according to multiple characteristic values in the genius morbi value setm(t), build The judgment formula for being suitable for judging whether medication of vertical multiple characteristic values;
I.e., then judge that patient does not take medicine;
It is described in formula1 is the multiple features outlier threshold corresponding to various features value of the preset patient when not taking medicine repeatedly, N2 is characterized the quantity of value, and m indicates the type of characteristic value.
3. drug administration according to claim 1 monitors expert system, which is characterized in that the remote server uses SDN network framework;
The SDN network framework includes:Data plane, using plane and control plane;
Data plane, when any IDS equipment detects that attack threatens in data plane, notice is entered using plane attacks Hit type analysis flow;
Using plane, for analyzing attack type, and corresponding attack is customized according to attack type and threatens processing strategy;
Control plane threatens Processing Interface to provide attack using plane, and provides attack threat identification interface for data plane;
The drug is mixed to be taken safety and corresponds to table with B matrixes to indicate:
B matrix tables are shown with the conflict test table of n kind drugs, wherein:bij, indicate that i-th kind of drug and jth kind drug mix rushing for clothes Prominent property, i, j=1,2 ... n, if do not conflicted, bijIt is 1, there is conflict then bijIt is 0;If drug itself is incompatible, bmm Arbitrary value in=1, m i, j;I.e. diagonal line is 1, i.e., as follows
Assuming that certain patient takes k kind drugs, then:
Judge that drug is mixed and takes security test;
If, then medication object safety is mixed, it is dangerous otherwise to mix medication object.
4. a kind of method that reasonability to patient's medication is judged, which is characterized in that include the following steps:
Step S210 presets the standard of the corresponding human body indicators parameter of each acquisition time corresponding to genius morbi value set Value;
Step S220 calculates the measured value of any acquisition time and the difference functions D of the standard value of identical acquisition time (t);
Step S230 establishes patient's medication reasonability judgment formula, i.e., according to the difference functions D (t)
y2t=,
If y2t>, then judge that the taken medicine object of patient is not up to curative effect;
In formula, σ 2 is the outlier threshold corresponding to characteristic value when being not up to curative effect after preset patient takes medicine,It is preset The extremely accumulative threshold value of more time points corresponding to characteristic value when being not up to curative effect after patient's medication.
5. according to the method described in claim 4, it is characterized in that, further including following steps:
The result of calculation yr of corresponding medication reasonability judgment formula is established according to multiple characteristic values in the genius morbi value setm (t), that establishes multiple characteristic values is suitable for judging the rational formula of patient's medication;
I.e., then judge that patient's medication is not up to curative effect;
It is described in formula2 be the multiple features exception corresponding to various features value when being not up to curative effect after default patient repeatedly takes medicine Threshold value;
The working method of drug administration monitoring expert system further includes:
Establish that drug is mixed to be taken safety and correspond to table, that is, each unit item in the table is corresponding with the pharmacology information of each drug respectively, Comparison of tabling look-up is carried out successively by the pharmacology information of the table each drug to be taken to patient, to judge the safety of the mixed clothes of each drug Property;
The drug is mixed to be taken safety and corresponds to table and further include:The taboo drug of a certain disease compares sublist, i.e. the taboo drug pair It is corresponding with each taboo pharmacology information of drug of the disease respectively according to each unit item in sublist, to the mixed clothes of the drug Safety corresponds to after table tabled look-up, then compares the pharmacology information of the sublist each drug to be taken to patient successively by avoiding drug Comparison of tabling look-up is carried out, to judge the drug to the disease safety;
It monitors whether patient takes medicine by remote server, and the reasonability of patient's medication is judged.
CN201810798284.1A 2014-12-31 2014-12-31 A kind of drug administration monitoring expert system Pending CN108573746A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810798284.1A CN108573746A (en) 2014-12-31 2014-12-31 A kind of drug administration monitoring expert system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410854293.XA CN104965966B (en) 2014-12-31 2014-12-31 Drug administration monitors expert system and its working method
CN201810798284.1A CN108573746A (en) 2014-12-31 2014-12-31 A kind of drug administration monitoring expert system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201410854293.XA Division CN104965966B (en) 2014-12-31 2014-12-31 Drug administration monitors expert system and its working method

Publications (1)

Publication Number Publication Date
CN108573746A true CN108573746A (en) 2018-09-25

Family

ID=54220004

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201810796904.8A Pending CN108877883A (en) 2014-12-31 2014-12-31 The drug administration monitoring expert system and working method of network malicious attack can be resisted
CN201810798284.1A Pending CN108573746A (en) 2014-12-31 2014-12-31 A kind of drug administration monitoring expert system
CN201410854293.XA Expired - Fee Related CN104965966B (en) 2014-12-31 2014-12-31 Drug administration monitors expert system and its working method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201810796904.8A Pending CN108877883A (en) 2014-12-31 2014-12-31 The drug administration monitoring expert system and working method of network malicious attack can be resisted

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201410854293.XA Expired - Fee Related CN104965966B (en) 2014-12-31 2014-12-31 Drug administration monitors expert system and its working method

Country Status (1)

Country Link
CN (3) CN108877883A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110459311A (en) * 2019-08-28 2019-11-15 首都医科大学 The medication alert system and method remotely monitored for patient's medication
CN110739038A (en) * 2019-10-12 2020-01-31 深圳市宝安区人民医院 Medicine distribution system based on medical advice
CN113557573A (en) * 2019-03-25 2021-10-26 欧姆龙健康医疗事业株式会社 Medication assistance information providing device, method, and program

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106726601A (en) * 2016-12-02 2017-05-31 重庆软汇科技股份有限公司 Intelligent medicine box system
CN107506588A (en) * 2017-08-25 2017-12-22 中国联合网络通信集团有限公司 Sufferer eats medicine information distributing method and system
CN108272642A (en) * 2018-01-25 2018-07-13 守望科技(北京)有限公司 A kind of intelligent medicine box system and medication based reminding method
JP7346868B2 (en) * 2019-03-25 2023-09-20 オムロンヘルスケア株式会社 Medication status management device, method and program
CN110444266A (en) * 2019-07-01 2019-11-12 江苏环亚医用科技集团股份有限公司 A kind of medication management method and apparatus based on diseases monitoring

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102487339A (en) * 2010-12-01 2012-06-06 中兴通讯股份有限公司 Attack preventing method for network equipment and device
CN103473625A (en) * 2013-08-16 2013-12-25 上海华美络信息技术有限公司 Chronic disease management system
CN103561011A (en) * 2013-10-28 2014-02-05 中国科学院信息工程研究所 Method and system for preventing blind DDoS attacks on SDN controllers
CN104188806A (en) * 2014-09-18 2014-12-10 常州金智涯医疗科技有限公司 Medicine reminder system for patients

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2389153B1 (en) * 2009-01-23 2014-03-12 Koninklijke Philips N.V. Method and apparatus for dispensing medication
CN102609626A (en) * 2012-03-14 2012-07-25 复旦大学 Intelligent medical service system based on RFID (radio frequency identification devices) and CDM (code division multiplex) technologies
CN102855406B (en) * 2012-09-14 2016-06-01 重庆市科学技术研究院 Based on the intelligent medicine purchase system of tele-medicine system and the monitoring of the doctor's advice property deferred to

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102487339A (en) * 2010-12-01 2012-06-06 中兴通讯股份有限公司 Attack preventing method for network equipment and device
CN103473625A (en) * 2013-08-16 2013-12-25 上海华美络信息技术有限公司 Chronic disease management system
CN103561011A (en) * 2013-10-28 2014-02-05 中国科学院信息工程研究所 Method and system for preventing blind DDoS attacks on SDN controllers
CN104188806A (en) * 2014-09-18 2014-12-10 常州金智涯医疗科技有限公司 Medicine reminder system for patients

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113557573A (en) * 2019-03-25 2021-10-26 欧姆龙健康医疗事业株式会社 Medication assistance information providing device, method, and program
CN110459311A (en) * 2019-08-28 2019-11-15 首都医科大学 The medication alert system and method remotely monitored for patient's medication
CN110459311B (en) * 2019-08-28 2022-02-25 首都医科大学 Medicine taking reminding system and method for remotely monitoring medicine taking of patient
CN110739038A (en) * 2019-10-12 2020-01-31 深圳市宝安区人民医院 Medicine distribution system based on medical advice
CN110739038B (en) * 2019-10-12 2022-08-19 深圳市宝安区人民医院 Medicine distribution system based on medical advice

Also Published As

Publication number Publication date
CN104965966B (en) 2018-08-21
CN104965966A (en) 2015-10-07
CN108877883A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
CN104965966B (en) Drug administration monitors expert system and its working method
CN104966256A (en) Chronic disease medicine-taking monitoring expert system and working method thereof
CN105100181A (en) Monitoring system based on big data and working method thereof
US20100153374A1 (en) System for Monitoring and Recording Hand Hygiene Performance
CN110247928A (en) A kind of mimicry interchanger safe traffic control device and method
WO2020224041A1 (en) Wearable device-based smart real-time health monitoring system, and implementation method therefor
CN108777703A (en) A kind of abnormal behaviour processing method and system based on block chain
WO2000079466A2 (en) Telemedical expert service provision for intensive care units
CN102713912A (en) Method and apparatus for displaying data from medical devices
CN107040544A (en) A kind of intrusion detection method based on flow, apparatus and system
CN104967649B (en) Drug intelligently takes expert system and remote server
CN110075378A (en) A kind of haemodialysis data information monitoring system
Hassan et al. Integration of internet of things (IoT) in health care industry: an overview of benefits, challenges, and applications
CN104966255A (en) Intelligent medicine-taking expert system and work method thereof
Saleh et al. Privacy preservation for wireless sensor networks in healthcare: State of the art, and open research challenges
CN106572103A (en) Hidden port detection method based on SDN network architecture
Navarro et al. Medical MoteCare: A distributed personal healthcare monitoring system
CN111180055B (en) Hospital supervision system and method
CN104966257A (en) Intelligent medicine-taking monitoring method and remote monitoring system
CN105991623A (en) Service interconnection relation auditing method and system
CN109166609B (en) Nursing data sharing method based on Internet of Things
CN109785965A (en) A kind of health evaluating method, health evaluating device and computer readable storage medium
Yeole et al. Ensuring security and privacy in IoT for healthcare applications
Reeves et al. Remotely supporting care provision for older adults
CN108463160A (en) Respiratory capacity monitoring and evaluation before pulse oximetry to detect respiratory compromise and eliminate false desaturation alarm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180925

RJ01 Rejection of invention patent application after publication