CN108737334A - A kind of ECG detecting data uploading system and method - Google Patents

A kind of ECG detecting data uploading system and method Download PDF

Info

Publication number
CN108737334A
CN108737334A CN201710250601.1A CN201710250601A CN108737334A CN 108737334 A CN108737334 A CN 108737334A CN 201710250601 A CN201710250601 A CN 201710250601A CN 108737334 A CN108737334 A CN 108737334A
Authority
CN
China
Prior art keywords
detecting data
ecg detecting
ciphertext
client
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710250601.1A
Other languages
Chinese (zh)
Inventor
李国君
陈岚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Microelectronics of CAS
Original Assignee
Institute of Microelectronics of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Microelectronics of CAS filed Critical Institute of Microelectronics of CAS
Priority to CN201710250601.1A priority Critical patent/CN108737334A/en
Publication of CN108737334A publication Critical patent/CN108737334A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/0002Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network
    • A61B5/0004Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network characterised by the type of physiological signal transmitted
    • A61B5/0006ECG or EEG signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • Molecular Biology (AREA)
  • Biophysics (AREA)
  • Pathology (AREA)
  • Biomedical Technology (AREA)
  • Heart & Thoracic Surgery (AREA)
  • Physiology (AREA)
  • Physics & Mathematics (AREA)
  • Surgery (AREA)
  • Animal Behavior & Ethology (AREA)
  • General Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Veterinary Medicine (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of ECG detecting data uploading system and methods, wherein, the ECG detecting data uploading system generates public key and private key using rivest, shamir, adelman, and public key is handed down to client so that client determines symmetric encipherment algorithm and generates key, since private key is not transmitted in server and client side, the ciphertext that key is encrypted is intercepted and captured in transmission process by third party even from public key, since third party does not have private key, ciphertext can not be decrypted, to be unable to get key, also it can not just decrypt using the encrypted ECG detecting data of key, this just improves the privacy degrees of ECG detecting data transmission procedure;And within the system, public key is generated merely with rivest, shamir, adelman and private key improves the encryption efficiency of ECG detecting data without directly ECG detecting data are encrypted using rivest, shamir, adelman.

Description

A kind of ECG detecting data uploading system and method
Technical field
This application involves fields of communication technology, more specifically to a kind of ECG detecting data uploading system and method.
Background technology
ECG detecting data are to reflect the significant data of human heart health, and electrocardiographic examination is also that clinical cardiovascular disease is examined The disconnected important method being commonly used, the preservation and management of the ECG detecting data that electrocardiographic examination generates have weight for a user Want meaning.
Inventor has found being transmitted and be stored in the cut-and-try process of server by network by ECG detecting data, If ECG detecting data are encrypted using symmetric encipherment algorithm merely, it is likely that key is caused to be cut in transmission process It obtains, so that the ECG detecting data of encrypted transmission are once trapped, so that it may to be passed using the secret key decryption electrocardio being trapped Transmission of data, and then lead to the leakage of ECG detecting data, and significant data of the ECG detecting data as health state of user, Importance and privacy are self-evident, therefore the secrecy that symmetric encipherment algorithm is difficult to meet in ECG detecting data transmission procedure is wanted It asks;
And since the data volume of ECG detecting data is generally large, if using rivest, shamir, adelman to ECG detecting number According to being encrypted, then again encryption efficiency can be caused low problem.
Invention content
In order to solve the above technical problems, the present invention provides a kind of ECG detecting data uploading system and method, to realize On the basis of confidentiality in the transmission process for promoting ECG detecting data, promoted to the mesh of ECG detecting data encryption efficiency 's.
To realize the above-mentioned technical purpose, an embodiment of the present invention provides following technical solutions:
A kind of ECG detecting data uploading system, including:Server and at least one client, wherein
The server is handed down to client for generating public key and private key, and by the public key, and receives the visitor The key ciphertext that family end is sent, and the key ciphertext is decrypted using the private key, key is obtained, and described in reception The ECG detecting data ciphertext that client uploads, and be decrypted using ECG detecting data ciphertext described in the key pair, it obtains To ECG detecting data;
The client, the public key issued for receiving server, and determine that symmetric cryptography is calculated according to the public key Method, and key is generated according to determining symmetric encipherment algorithm, and the key is encrypted according to the public key, it obtains Key ciphertext, and the key ciphertext is sent to the server, and carried out according to the key pair ECG detecting data Encryption, obtains ECG detecting data ciphertext, and the ECG detecting data ciphertext is uploaded to the server.
Preferably, the server, is additionally operable to:
The upload request ciphertext that the client is sent is received, and is carried out using upload request ciphertext described in the key pair Decryption, obtains client identity verification information, and judges whether the client identity verification information meets default verification item Part, and if so, execute the ECG detecting data ciphertext for receiving the client and uploading, the step for;
The client is additionally operable to when detecting client identity verification information, and generation includes the client body The ECG detecting data upload requests of part verification information, and according to ECG detecting data upload requests described in the key pair into Row encryption, obtains upload request ciphertext, and the upload request ciphertext is sent to the server.
Preferably, the client determines symmetric encipherment algorithm according to the public key, is specifically used for:
Each digits of the MD5 values of the public key is summed, and by the number remainder of summed result and symmetric encipherment algorithm, root The symmetric encipherment algorithm type chosen is determined according to remainder result.
Preferably, described that the ECG detecting data ciphertext is uploaded to the server, it is specifically used for:
Judge whether the size of the ECG detecting data ciphertext is more than default size;If it is, default using first The ECG detecting data ciphertext is uploaded to the server by pattern;If it is not, then using the second preset mode by the heart Electric-examination measured data ciphertext is uploaded to the server.
Preferably, described that the ECG detecting data ciphertext is uploaded to the server using the first preset mode, have Body is used for:
Piecemeal is carried out to the ECG detecting data ciphertext according to current system conditions, it is close to obtain polylith ECG detecting data Text, and established and connected with the server by way of socket connections, upload the polylith ECG detecting data ciphertext extremely The server.
Preferably, in first preset mode, the server is additionally operable to:
The ECG detecting data ciphertext and its client network state uploaded according to all client requests determines each The task priority of a client, and determine that the upload of the client is suitable according to the task priority of the client Sequence.
Preferably, described that the ECG detecting data ciphertext is uploaded to the server using the second preset mode, have Body is used for:
It is established and is connected using Web Service interfaces and the server, and the ECG detecting data ciphertext is uploaded To the server.
A kind of ECG detecting data uploading method, is applied to server, and the ECG detecting data uploading method includes:
Public key and private key are generated, and the public key is handed down to client;
The key ciphertext that the client is sent is received, and the key ciphertext is decrypted using the private key, is obtained To key;
The ECG detecting data ciphertext that the client uploads is received, and utilizes the key pair ECG detecting data ciphertext It is decrypted, obtains ECG detecting data.
Preferably, further include before in the ECG detecting data ciphertext for receiving the client upload:
The upload request ciphertext that the client is sent is received, and is carried out using upload request ciphertext described in the key pair Decryption, obtains client identity verification information;
Judge whether the client identity verification information meets default verification condition;
If so, the ECG detecting data ciphertext for receiving the client and uploading is executed, the step for.
Preferably, when the client is in the first preset mode, further include:
The ECG detecting data ciphertext and its client network state uploaded according to all client requests determines each The task priority of a client, and determine that the upload of the client is suitable according to the task priority of the client Sequence.
A kind of ECG detecting data uploading method, is applied to client, and the ECG detecting data uploading method includes:
The public key that server issues is received, and symmetric encipherment algorithm is determined according to the public key;
Key is generated according to determining symmetric encipherment algorithm;
The key is encrypted according to the public key, obtains key ciphertext, and the key ciphertext is sent to institute State server;
It is encrypted according to the key pair ECG detecting data, obtains ECG detecting data ciphertext, and by the electrocardio Detection data ciphertext is uploaded to the server.
Preferably, described to be encrypted according to the key pair ECG detecting data, before, further include:
When detecting client identity verification information, generation includes the electrocardio inspection of the client identity verification information Measured data upload request;
It is encrypted according to ECG detecting data upload requests described in the key pair, obtains upload request ciphertext, and will The upload request ciphertext is sent to the server.
Preferably, described that symmetric encipherment algorithm is determined according to the public key, including:
Each digits of the MD5 values of the public key is summed, and by the number remainder of summed result and symmetric encipherment algorithm, root The symmetric encipherment algorithm type chosen is determined according to remainder result.
Preferably, described that the ECG detecting data ciphertext is uploaded to the server, including:
Judge whether the size of the ECG detecting data ciphertext is more than default size;
If it is, the ECG detecting data ciphertext is uploaded to the server using the first preset mode;
If it is not, then the ECG detecting data ciphertext is uploaded to the server using the second preset mode.
Preferably, described that the ECG detecting data ciphertext is uploaded to the server using the first preset mode, it wraps It includes:
Piecemeal is carried out to the ECG detecting data ciphertext according to current system conditions, it is close to obtain polylith ECG detecting data Text, and established and connected with the server by way of socket connections, upload the polylith ECG detecting data ciphertext extremely The server.
Preferably, described that the ECG detecting data ciphertext is uploaded to the server using the second preset mode, it wraps It includes:
It is established and is connected using Web Service interfaces and the server, and the ECG detecting data ciphertext is uploaded To the server.
It can be seen from the above technical proposal that an embodiment of the present invention provides a kind of ECG detecting data uploading system and sides Method, wherein the ECG detecting data uploading system generates public key and private key using rivest, shamir, adelman, and public key is issued To client so that client determines symmetric encipherment algorithm and generates key, since private key carries out not in server and client side Transmission, is intercepted and captured the ciphertext that key is encrypted even from public key in transmission process by third party, due to third party Without private key, ciphertext can not be decrypted, to be unable to get key, also can not just be decrypted using the encrypted electrocardio of key Detection data, this just improves the privacy degrees of ECG detecting data transmission procedure;And within the system, merely with asymmetric Encryption Algorithm generates public key and private key, without directly ECG detecting data are encrypted using rivest, shamir, adelman, is promoted The encryption efficiencies of ECG detecting data.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of process flow signal for ECG detecting data uploading system that one embodiment of the application provides Figure;
Fig. 2 is a kind of structural schematic diagram for ECG detecting data uploading system that one embodiment of the application provides;
Fig. 3 is a kind of process flow signal for ECG detecting data uploading system that another embodiment of the application provides Figure;
Fig. 4 is a kind of process flow signal for ECG detecting data uploading system that another embodiment of the application provides Figure;
Fig. 5 is a kind of process flow signal for ECG detecting data uploading system that the further embodiment of the application provides Figure;
Fig. 6 is a kind of flow diagram for ECG detecting data uploading method that one embodiment of the application provides;
Fig. 7 is a kind of flow diagram for ECG detecting data uploading method that another embodiment of the application provides;
Fig. 8 is a kind of flow diagram for ECG detecting data uploading method that another embodiment of the application provides;
Fig. 9 is a kind of flow diagram for ECG detecting data uploading method that the further embodiment of the application provides;
Figure 10 is a kind of flow signal for ECG detecting data uploading method that the preferred embodiment of the application provides Figure;
Figure 11 is that a kind of flow for ECG detecting data uploading method that another preferred embodiment of the application provides is shown It is intended to;
Figure 12 is that a kind of flow for ECG detecting data uploading method that another preferred embodiment of the application provides is shown It is intended to;
Figure 13 is that a kind of flow for ECG detecting data uploading method that another preferred embodiment of the application provides is shown It is intended to;
Figure 14 is that a kind of flow for ECG detecting data uploading method that another preferred embodiment of the application provides is shown It is intended to.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The embodiment of the present application provides a kind of ECG detecting data uploading system, as depicted in figs. 1 and 2, including:Server With at least one client, wherein
Server is handed down to client for generating public key and private key, and by public key, and receives the close of client transmission Key ciphertext, and key ciphertext is decrypted using private key, key is obtained, and receive the ECG detecting data that client uploads Ciphertext, and be decrypted using key pair ECG detecting data ciphertext, obtain ECG detecting data;
Client, the public key issued for receiving server, and symmetric encipherment algorithm is determined according to public key, and according to true Fixed symmetric encipherment algorithm generates key, and key is encrypted according to public key, obtains key ciphertext, and by key ciphertext It is sent to server, and is encrypted according to key pair ECG detecting data, obtains ECG detecting data ciphertext, and by electrocardio Detection data ciphertext is uploaded to the server.
Fig. 1 is the communication process schematic diagram of the server and client side of the ECG detecting data uploading system, and Fig. 2 is institute State the structural schematic diagram of ECG detecting data uploading system;
Heart disease is a kind of irregularly triggering property disease, needs the physical condition of long-term observation patient, records its electrocardio Parameter, portable electrocardiogram (ECG) data monitoring device are not only able to provide accurate data information for doctor, moreover it is possible to strive for for patient Valuable treatment time, diagnosis and prevention for cardiovascular disease have important practical significance.Portable cardiac monitors Equipment will produce a large amount of data, and electrocardiogram (ECG) data is one of personal health core data, if without encryption, is intercepted, attacks Incalculable consequence can be caused after hitting.Electrocardiogram (ECG) data amount is big, slower using asymmetric encryption, and symmetric cryptographic key is used to hold It is easily intercepted, safety cannot be guaranteed.The embodiment of the present application is proposed with the use of symmetric cryptography and asymmetric encryption Electrocardiogram (ECG) data is encrypted in method, can not only ensure electrocardiogram (ECG) data transmission safety again can solve resource consumption excessively ask Topic.
Specifically, the ECG detecting data uploading system generates public key and private key using rivest, shamir, adelman, and will The public key is handed down to client so that client determines symmetric encipherment algorithm and generates key, due to private key not in server and It is transmitted in client, the ciphertext that key is encrypted is cut in transmission process by third party even from public key It obtains, since third party does not have private key, ciphertext can not be decrypted, to be unable to get key, also can not just decrypt use The encrypted ECG detecting data of key, this just improves the privacy degrees of ECG detecting data transmission procedure;And in the system In, public key and private key are generated merely with rivest, shamir, adelman, without directly utilizing rivest, shamir, adelman to ECG detecting number According to being encrypted, the encryption efficiency of ECG detecting data is improved.
On the basis of the above embodiments, in another embodiment of the application, as shown in figure 3, server, is also used In:
The upload request ciphertext that client is sent is received, and is decrypted using key pair upload request ciphertext, visitor is obtained Family end authentication information, and judge whether client identity verification information meets default verification condition, and if so, hold Row receives the ECG detecting data ciphertext that client uploads, the step for;
Client is additionally operable to when detecting client identity verification information, and generation includes client identity verification letter The ECG detecting data upload requests of breath, and be encrypted according to ECG detecting data upload requests described in key pair, it obtains Upload request ciphertext, and upload request ciphertext is sent to server.
It should be noted that when server judgement client identity verification information is unsatisfactory for default verification condition, in other words When server detects that authentication information is forged identity verification information or failure authentication information, it is believed that just It has been trapped in the key used, there are certain risks, therefore regenerate public key and private key, to carry out the update of key, So that client is again encrypted ECG detecting data upload requests;
To further increase the confidentiality that upload request is sent to server process, client includes client in generation While the ECG detecting data upload requests of authentication information, present system time is recorded, symmetric encipherment algorithm can be used Client identity verification information and present system time are encrypted, and according to key pair ECG detecting data upload requests It is encrypted, obtains upload request ciphertext;Since the upload request ciphertext is related to present system time, for forging body Part verification information or failure authentication information, since time anomaly can be identified by server rapidly;Similarly, since client Authentication information can be one day there are Use Limitation, this timeliness, can also be 12 hours, the application is to client identity The specific length of the Use Limitation of verification information does not limit, specifically depending on actual conditions.
On the basis of the above embodiments, in another embodiment of the application, as shown in figure 4, the client root Symmetric encipherment algorithm is determined according to public key, is specifically used for:
Each digits of the MD5 values of public key is summed, and by the number remainder of summed result and symmetric encipherment algorithm, according to taking Remaining result determines the symmetric encipherment algorithm type chosen.
It should be noted that present embodiments providing a kind of tool determining symmetric encipherment algorithm specifically according to the public key Body process, wherein the number of the symmetric encipherment algorithm refers to the quantity of symmetric encipherment algorithm spare in system;For example, certain The sum of each digit of MD5 (Message Digest, informative abstract) value of the public key once generated is 1000002, standby in system The number of symmetric encipherment algorithm is 5, respectively A, B, C, D, E, and the number of symmetric encipherment algorithm is 5, the MD5 values of public key The sum of each digit is 2 with the result after the number remainder of symmetric encipherment algorithm, then finally determining symmetric encipherment algorithm is B.
In the other embodiment of the application, symmetric encipherment algorithm can also be determined in other way, for example, can be with The random number generated by the seed that issues public key and server make logical operation (with or it is non-and combinations thereof) after, then to patrolling The result for collecting operation carries out the operation of hash algorithm, is finally calculated according to symmetric cryptography spare in the result of Hash operation and system Method determines the symmetric encipherment algorithm selected.The application is to determining that the detailed process of symmetric encipherment algorithm is not done according to the public key It limits, specifically depending on actual conditions.
On the basis of the above embodiments, in another embodiment of the application, as shown in figure 5, the client will ECG detecting data ciphertext is uploaded to server, is specifically used for:
Judge whether the size of ECG detecting data ciphertext is more than default size;If it is, utilizing the first preset mode ECG detecting data ciphertext is uploaded to server;If it is not, then will be in ECG detecting data ciphertext using the second preset mode Reach server.
It should be noted that the default size is generally the ECG detecting data generated during an ECG detecting Size, this size is different and different according to used ECG detecting equipment, under normal circumstances, the default size Size in number million (M) range, the application does not limit the specific value of the default size, specifically regard actual conditions Depending on.
Specifically, ECG detecting data ciphertext is uploaded to server by the client using the first preset mode, specifically For:
Piecemeal is carried out to ECG detecting data ciphertext according to current system conditions, obtains polylith ECG detecting data ciphertext, And established and connected with server by way of socket connections, polylith ECG detecting data ciphertext is uploaded to server.
It should be noted that in the specific use process, client uploads the ECG detecting data ciphertext of piecemeal successfully Afterwards, whether user end to server is inquired succeeds, and completes this time to upload if success, if no success, according to clothes The job_id that business device issues applies for that server is opened socket and uploaded again.Until the ECG detecting data ciphertext of all piecemeals is complete Portion uploads successfully, final to realize entire upload Mission Success.Client is sent by Web Service to server all Job_id, and each blocked file of server is notified to upload success, by all piecemeal electrocardiogram (ECG) datas after server inspection Ciphertext merges, and is preserved after being then decrypted with key.
In the first preset mode, server is additionally operable to:
The ECG detecting data ciphertext and its client network state uploaded according to all clients request determines each visitor The task priority at family end, and the upload of client is determined sequentially according to the task priority of client.
Specifically, in systems, server is established the ponds socket of fixed quantity and is attached with client, inspects periodically Server hardware upgrade case and spread scenarios are updated the ponds socket initialization quantity.If the ponds server socket There is client application big file uploading when there is no idle, at this moment can also generate corresponding job_id and is preserved, and Task is stored in priority query, to achieve the effect that equilibrium.According to the ECG detecting number of ECG detecting data ciphertext The priority in priority query is determined according to size and ECG detecting data task grade.If the ponds socket are being handled Task is all the task of low priority, then current task priority is higher, can pass through transmission speed, priority, required time Etc. parameters carry out decision and terminate a small amount of socket handled in advance, and adjust the priority for the task that is terminated, be moved to end Task priority can be improved, then these tasks are added in priority query.Speed is uploaded after big file block Quickly, if priority is higher, the task of high priority is by carry out upload process earlier for degree.
On the basis of the above embodiments, in the further embodiment of the application, the client is default using second ECG detecting data ciphertext is uploaded to server by pattern, is specifically used for:
It is established and is connected using Web Service interfaces and server, and ECG detecting data ciphertext is uploaded to server.
It should be noted that when the ECG detecting data ciphertext that client is uploaded is less than default size, profit With Web Service upload and there is larger performance advantage, and when the ECG detecting data ciphertext for needing to upload is larger, The Socket of long connection then has larger performance advantage.
In the other embodiment of the application, big small documents of client combination ECG detecting data ciphertext and the characteristics of deposit, Using different transmission strategy, for small documents ECG detecting data ciphertext by Web Service interfaces into being transmitted, and The ECG detecting data ciphertext of big file is then transmitted by way of socket connections, compared to Web Service Transmission mode, the transmission mode data transmission efficiency and stability of socket can higher, therefore, this also just improves system Efficiency of transmission and stability.
Correspondingly, the embodiment of the present application also provides a kind of ECG detecting data uploading methods, as shown in fig. 6, being applied to Server, the ECG detecting data uploading method include:
S101:Public key and private key are generated, and public key is handed down to client;
S102:The key ciphertext that client is sent is received, and key ciphertext is decrypted using private key, obtains key;
S103, receive client upload ECG detecting data ciphertext, and using key pair ECG detecting data ciphertext into Row decryption, obtains ECG detecting data.
Heart disease is a kind of irregularly triggering property disease, needs the physical condition of long-term observation patient, records its electrocardio Parameter, portable electrocardiogram (ECG) data monitoring device are not only able to provide accurate data information for doctor, moreover it is possible to strive for for patient Valuable treatment time, diagnosis and prevention for cardiovascular disease have important practical significance.Portable cardiac monitors Equipment will produce a large amount of data, and electrocardiogram (ECG) data is one of personal health core data, if without encryption, is intercepted, attacks Incalculable consequence can be caused after hitting.Electrocardiogram (ECG) data amount is big, slower using asymmetric encryption, and symmetric cryptographic key is used to hold It is easily intercepted, safety cannot be guaranteed.The embodiment of the present application is proposed with the use of symmetric cryptography and asymmetric encryption Electrocardiogram (ECG) data is encrypted in method, can not only ensure electrocardiogram (ECG) data transmission safety again can solve resource consumption excessively ask Topic.
Specifically, the ECG detecting data uploading system generates public key and private key using rivest, shamir, adelman, and will Public key is handed down to client so that client determines symmetric encipherment algorithm and generates key, since private key is not in server and client It is transmitted in end, the ciphertext that key is encrypted is intercepted and captured in transmission process by third party even from public key, by Do not have private key in third party, ciphertext can not be decrypted, to be unable to get key, can not just decrypt yet and be added using key Close ECG detecting data, this just improves the privacy degrees of ECG detecting data transmission procedure;And it is within the system, only sharp Public key and private key are generated with rivest, shamir, adelman, without directly adding to ECG detecting data using rivest, shamir, adelman It is close, improve the encryption efficiency of ECG detecting data.
On the basis of the above embodiments, in another embodiment of the application, as shown in fig. 7, in step S103, it Before, it may also include:
S201 is received the upload request ciphertext that client is sent, and is decrypted using key pair upload request ciphertext, is obtained To client identity verification information;
S202, judges whether client identity verification information meets default verification condition;If so, thening follow the steps S103.
It should be noted that when server judgement client identity verification information is unsatisfactory for default verification condition, that is, When server detects that authentication information is forged identity verification information or failure authentication information, it is believed that just It has been trapped in the key used, there are certain risks, therefore regenerate public key and private key, to carry out the update of key, So that client is again encrypted ECG detecting data upload requests;
To further increase the confidentiality that upload request is sent to server process, client includes client in generation While the ECG detecting data upload requests of authentication information, present system time is recorded, symmetric encipherment algorithm can be used Client identity verification information and present system time are encrypted, and according to key pair ECG detecting data upload requests It is encrypted, obtains upload request ciphertext;Since the upload request ciphertext is related to present system time, for forging body Part verification information or failure authentication information, since time anomaly can be identified by server rapidly;Similarly, since client Authentication information can be one day there are Use Limitation, this timeliness, can also be 12 hours, the application is to client identity The specific length of the Use Limitation of verification information does not limit, specifically depending on actual conditions.
On the basis of the above embodiments, in another embodiment of the application, as shown in figure 8, working as the client When in the first preset mode, further include:
S301:The ECG detecting data ciphertext and its client network state uploaded according to all clients request determines each The task priority of a client, and the upload of client is determined sequentially according to the task priority of client.
Specifically, in systems, server is established the ponds socket of fixed quantity and is attached with client, inspects periodically Server hardware upgrade case and spread scenarios are updated the ponds socket initialization quantity.If the ponds server socket There is client application big file uploading when there is no idle, at this moment can also generate corresponding job_id and is preserved, and Task is stored in priority query, to achieve the effect that equilibrium.According to the ECG detecting number of ECG detecting data ciphertext The priority in priority query is determined according to size and ECG detecting data task grade.If the ponds socket are being handled Task is all the task of low priority, then current task priority is higher, can pass through transmission speed, priority, required time Etc. parameters carry out decision and terminate a small amount of socket handled in advance, and adjust the priority for the task that is terminated, be moved to end Task priority can be improved, then these tasks are added in priority query.Speed is uploaded after big file block Quickly, if priority is higher, the task of high priority is by carry out upload process earlier for degree.
Correspondingly, the embodiment of the present application also provides a kind of ECG detecting data uploading methods, as shown in figure 9, being applied to Client, the ECG detecting data uploading method include:
S401:The public key that server issues is received, and symmetric encipherment algorithm is determined according to public key;
S402:Key is generated according to determining symmetric encipherment algorithm;
S403:Key is encrypted according to public key, obtains key ciphertext, and key ciphertext is sent to server;
S404 is encrypted according to key pair ECG detecting data, obtains ECG detecting data ciphertext, and by ECG detecting Data ciphertext is uploaded to server.
Specifically, in one embodiment of the application, as shown in Figure 10, symmetrical add, is determined according to public key in step S401 The specific implementation procedure of close algorithm, including:
S4011:Each digits of the MD5 values of public key is summed, and by the number remainder of summed result and symmetric encipherment algorithm, The symmetric encipherment algorithm type chosen is determined according to remainder result.
It should be noted that present embodiments providing a kind of tool determining symmetric encipherment algorithm specifically according to the public key Body process, wherein the number of the symmetric encipherment algorithm refers to the quantity of symmetric encipherment algorithm spare in system;For example, certain The sum of each digit of MD5 (Message Digest, informative abstract) value of the public key once generated is 1000002, standby in system The number of symmetric encipherment algorithm is 5, respectively A, B, C, D, E, and the number of symmetric encipherment algorithm is 5, the MD5 values of public key The sum of each digit is 2 with the result after the number remainder of symmetric encipherment algorithm, then finally determining symmetric encipherment algorithm is B.
In the other embodiment of the application, symmetric encipherment algorithm can also be determined in other way, for example, can be with The random number generated by the seed that issues public key and server make logical operation (with or it is non-and combinations thereof) after, then to patrolling The result for collecting operation carries out the operation of hash algorithm, is finally calculated according to symmetric cryptography spare in the result of Hash operation and system Method determines the symmetric encipherment algorithm selected.The application is to determining that the detailed process of symmetric encipherment algorithm is not done according to the public key It limits, specifically depending on actual conditions.
It on the basis of the above embodiments, as shown in figure 11, will in step S404 in another embodiment of the application ECG detecting data ciphertext is uploaded to the specific implementation procedure of server, as shown in figure 11, including:
S4041:Judge whether the size of ECG detecting data ciphertext is more than default size;If so, thening follow the steps S4042;If it is not, thening follow the steps S4043;
ECG detecting data ciphertext is uploaded to server by S4042 using the first preset mode;
ECG detecting data ciphertext is uploaded to server by S4043 using the second preset mode.
It should be noted that the default size is generally the ECG detecting data generated during an ECG detecting Size, this size is different and different according to used ECG detecting equipment, under normal circumstances, the default size Size in number million (M) range, the application does not limit the specific value of the default size, specifically regard actual conditions Depending on.
Specifically, as shown in figure 12, ECG detecting data ciphertext is uploaded to using the first preset mode in step S4042 The specific implementation procedure of server, including:
Piecemeal is carried out to ECG detecting data ciphertext according to current system conditions, obtains polylith ECG detecting data ciphertext, And established and connected with server by way of socket connections, polylith ECG detecting data ciphertext is uploaded to server.
It should be noted that in the specific use process, client uploads the ECG detecting data ciphertext of piecemeal successfully Afterwards, whether user end to server is inquired succeeds, and completes this time to upload if success, if no success, according to clothes The job_id that business device issues applies for that server is opened socket and uploaded again.Until the ECG detecting data ciphertext of all piecemeals is complete Portion uploads successfully, final to realize entire upload Mission Success.Client is sent by Web Service to server all Job_id, and each blocked file of server is notified to upload success, by all piecemeal electrocardiogram (ECG) datas after server inspection Ciphertext merges, and is preserved after being then decrypted with key.
Specifically, as shown in figure 13, ECG detecting data ciphertext is uploaded to clothes with the second preset mode in step S4043 The specific implementation procedure of business device, including:
It is established and is connected using Web Service interfaces and the server, and ECG detecting data ciphertext is uploaded to clothes Business device.
It should be noted that when the ECG detecting data ciphertext that client is uploaded is less than default size, profit With Web Service upload and there is larger performance advantage, and when the ECG detecting data ciphertext for needing to upload is larger, The Socket of long connection then has larger performance advantage.
On the basis of the above embodiments, in another embodiment of the application, as shown in figure 14, step S403 it Before, further include following steps:
S501, when detecting client identity verification information, generation includes the electrocardio of client identity verification information Detection data upload request;
S502 is encrypted according to key pair ECG detecting data upload requests, obtains upload request ciphertext, and will upload Request ciphertext is sent to server.
In conclusion the embodiment of the present application provides a kind of ECG detecting data uploading system and method, wherein the heart Electric-examination measured data uploading system generates public key and private key using rivest, shamir, adelman, and public key is handed down to client for visitor Family end determines symmetric encipherment algorithm and generates key, since private key is not transmitted in server and client side, even from Public key is intercepted and captured the ciphertext that key is encrypted in transmission process by third party, since third party does not have private key, nothing Ciphertext is decrypted in method, to be unable to get key, also can not just decrypt using the encrypted ECG detecting data of key, this is just Improve the privacy degrees of ECG detecting data transmission procedure;And it within the system, is generated merely with rivest, shamir, adelman Public key and private key improve ECG detecting number without directly ECG detecting data are encrypted using rivest, shamir, adelman According to encryption efficiency.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with other The difference of embodiment, just to refer each other for identical similar portion between each embodiment.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest range caused.

Claims (16)

1. a kind of ECG detecting data uploading system, which is characterized in that including:Server and at least one client, wherein
The server is handed down to client for generating public key and private key, and by the public key, and receives the client The key ciphertext of transmission, and the key ciphertext is decrypted using the private key, key is obtained, and receive the client The ECG detecting data ciphertext uploaded is held, and is decrypted using ECG detecting data ciphertext described in the key pair, the heart is obtained Electric-examination measured data;
The client, the public key issued for receiving server, and symmetric encipherment algorithm is determined according to the public key, with And key is generated according to determining symmetric encipherment algorithm, and the key is encrypted according to the public key, obtain key Ciphertext, and the key ciphertext is sent to the server, and be encrypted according to the key pair ECG detecting data, ECG detecting data ciphertext is obtained, and the ECG detecting data ciphertext is uploaded to the server.
2. system according to claim 1, which is characterized in that the server is additionally operable to:
The upload request ciphertext that the client is sent is received, and is solved using upload request ciphertext described in the key pair It is close, client identity verification information is obtained, and judge whether the client identity verification information meets default verification condition, And if so, execute the ECG detecting data ciphertext for receiving the client and uploading, the step for;
The client is additionally operable to when detecting client identity verification information, and generation includes that the client identity is tested The ECG detecting data upload requests of information are demonstrate,proved, and are added according to ECG detecting data upload requests described in the key pair It is close, upload request ciphertext is obtained, and the upload request ciphertext is sent to the server.
3. system according to claim 1, which is characterized in that the client determines that symmetric cryptography is calculated according to the public key Method is specifically used for:
Each digits of the MD5 values of the public key is summed, and by the number remainder of summed result and symmetric encipherment algorithm, according to taking Remaining result determines the symmetric encipherment algorithm type chosen.
4. system according to claim 1, which is characterized in that it is described the ECG detecting data ciphertext is uploaded to it is described Server is specifically used for:
Judge whether the size of the ECG detecting data ciphertext is more than default size;If it is, utilizing the first preset mode The ECG detecting data ciphertext is uploaded to the server;If it is not, then the electrocardio is examined using the second preset mode Measured data ciphertext is uploaded to the server.
5. system according to claim 4, which is characterized in that described to utilize the first preset mode by the ECG detecting number It is uploaded to the server according to ciphertext, is specifically used for:
Piecemeal is carried out to the ECG detecting data ciphertext according to current system conditions, obtains polylith ECG detecting data ciphertext, And established and connected with the server by way of socket connections, the polylith ECG detecting data ciphertext is uploaded to described Server.
6. system according to claim 5, which is characterized in that in first preset mode, the server is also used In:
The ECG detecting data ciphertext and its client network state uploaded according to all client requests determines each institute The task priority of client is stated, and determines the upload sequence of the client according to the task priority of the client.
7. system according to claim 4, which is characterized in that described to utilize the second preset mode by the ECG detecting number It is uploaded to the server according to ciphertext, is specifically used for:
It is established and is connected using Web Service interfaces and the server, and the ECG detecting data ciphertext is uploaded to institute State server.
8. a kind of ECG detecting data uploading method, which is characterized in that be applied to server, ECG detecting data upload side Method includes:
Public key and private key are generated, and the public key is handed down to client;
The key ciphertext that the client is sent is received, and the key ciphertext is decrypted using the private key, is obtained close Key;
The ECG detecting data ciphertext that the client uploads is received, and is carried out using the key pair ECG detecting data ciphertext Decryption, obtains ECG detecting data.
9. according to the method described in claim 8, it is characterized in that, in the ECG detecting number for receiving the client and uploading According to ciphertext, before, further include:
The upload request ciphertext that the client is sent is received, and is solved using upload request ciphertext described in the key pair It is close, obtain client identity verification information;
Judge whether the client identity verification information meets default verification condition;
If so, the ECG detecting data ciphertext for receiving the client and uploading is executed, the step for.
10. according to the method described in claim 8, it is characterized in that, when the client is in the first preset mode, also wrap It includes:
The ECG detecting data ciphertext and its client network state uploaded according to all client requests determines each institute The task priority of client is stated, and determines the upload sequence of the client according to the task priority of the client.
11. a kind of ECG detecting data uploading method, which is characterized in that be applied to client, the ECG detecting data upload Method includes:
The public key that server issues is received, and symmetric encipherment algorithm is determined according to the public key;
Key is generated according to determining symmetric encipherment algorithm;
The key is encrypted according to the public key, obtains key ciphertext, and the key ciphertext is sent to the clothes Business device;
It is encrypted according to the key pair ECG detecting data, obtains ECG detecting data ciphertext, and by the ECG detecting Data ciphertext is uploaded to the server.
12. according to the method for claim 11, which is characterized in that described to be carried out according to the key pair ECG detecting data It encrypts, before, further includes:
When detecting client identity verification information, generation includes the ECG detecting number of the client identity verification information According to upload request;
It is encrypted according to ECG detecting data upload requests described in the key pair, obtains upload request ciphertext, and will be described Upload request ciphertext is sent to the server.
13. according to the method for claim 11, which is characterized in that it is described that symmetric encipherment algorithm is determined according to the public key, Including:
Each digits of the MD5 values of the public key is summed, and by the number remainder of summed result and symmetric encipherment algorithm, according to taking Remaining result determines the symmetric encipherment algorithm type chosen.
14. according to the method for claim 11, which is characterized in that described that the ECG detecting data ciphertext is uploaded to institute Server is stated, including:
Judge whether the size of the ECG detecting data ciphertext is more than default size;
If it is, the ECG detecting data ciphertext is uploaded to the server using the first preset mode;
If it is not, then the ECG detecting data ciphertext is uploaded to the server using the second preset mode.
15. according to the method for claim 14, which is characterized in that described to utilize the first preset mode by the ECG detecting Data ciphertext is uploaded to the server, including:
Piecemeal is carried out to the ECG detecting data ciphertext according to current system conditions, obtains polylith ECG detecting data ciphertext, And established and connected with the server by way of socket connections, the polylith ECG detecting data ciphertext is uploaded to described Server.
16. according to the method for claim 14, which is characterized in that described to utilize the second preset mode by the ECG detecting Data ciphertext is uploaded to the server, including:
It is established and is connected using Web Service interfaces and the server, and the ECG detecting data ciphertext is uploaded to institute State server.
CN201710250601.1A 2017-04-17 2017-04-17 A kind of ECG detecting data uploading system and method Pending CN108737334A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710250601.1A CN108737334A (en) 2017-04-17 2017-04-17 A kind of ECG detecting data uploading system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710250601.1A CN108737334A (en) 2017-04-17 2017-04-17 A kind of ECG detecting data uploading system and method

Publications (1)

Publication Number Publication Date
CN108737334A true CN108737334A (en) 2018-11-02

Family

ID=63924183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710250601.1A Pending CN108737334A (en) 2017-04-17 2017-04-17 A kind of ECG detecting data uploading system and method

Country Status (1)

Country Link
CN (1) CN108737334A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110620792A (en) * 2019-10-24 2019-12-27 福建星网视易信息系统有限公司 Communication encryption method, communication device, system, and computer-readable storage medium
CN112350824A (en) * 2020-10-27 2021-02-09 杭州安恒信息技术股份有限公司 Key distribution method, system and computer equipment in data sharing exchange

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101958907A (en) * 2010-09-30 2011-01-26 中兴通讯股份有限公司 Method, system and device for transmitting key
CN103401678A (en) * 2013-07-30 2013-11-20 成都卫士通信息产业股份有限公司 Method for ensuring data transmission safety of Internet of things
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN104821944A (en) * 2015-04-28 2015-08-05 广东小天才科技有限公司 Hybrid encrypted network data security method and system
CN106487783A (en) * 2016-09-28 2017-03-08 深圳市速美特电子科技有限公司 The encryption method connecting for vehicle communication and device
CN106506470A (en) * 2016-10-31 2017-03-15 大唐高鸿信安(浙江)信息科技有限公司 network data security transmission method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101958907A (en) * 2010-09-30 2011-01-26 中兴通讯股份有限公司 Method, system and device for transmitting key
CN103401678A (en) * 2013-07-30 2013-11-20 成都卫士通信息产业股份有限公司 Method for ensuring data transmission safety of Internet of things
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN104821944A (en) * 2015-04-28 2015-08-05 广东小天才科技有限公司 Hybrid encrypted network data security method and system
CN106487783A (en) * 2016-09-28 2017-03-08 深圳市速美特电子科技有限公司 The encryption method connecting for vehicle communication and device
CN106506470A (en) * 2016-10-31 2017-03-15 大唐高鸿信安(浙江)信息科技有限公司 network data security transmission method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
主编: "《商业智能理论与应用实践》", 31 August 2012 *
王雷等主编: "《计算机网络原理基础教程》", 28 February 2016 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110620792A (en) * 2019-10-24 2019-12-27 福建星网视易信息系统有限公司 Communication encryption method, communication device, system, and computer-readable storage medium
CN112350824A (en) * 2020-10-27 2021-02-09 杭州安恒信息技术股份有限公司 Key distribution method, system and computer equipment in data sharing exchange

Similar Documents

Publication Publication Date Title
Nguyen et al. BEdgeHealth: A decentralized architecture for edge-based IoMT networks using blockchain
Ghubaish et al. Recent advances in the internet-of-medical-things (IoMT) systems security
CN102077545B (en) Personal security manager for ubiquitous patient monitoring
CN107257381B (en) Task allocation system model for privacy protection space crowdsourcing and implementation method
Ding et al. Lightweight privacy-preserving identity-based verifiable IoT-based health storage system
US9252942B2 (en) Method and system for secure multiparty cloud computation
Barua et al. Secure and quality of service assurance scheduling scheme for wban with application to ehealth
CN111986755A (en) Data sharing system based on block chain and attribute-based encryption
Sathya et al. Secured remote health monitoring system
US20070140479A1 (en) Privacy-preserving data aggregation using homomorphic encryption
CN110162998B (en) Identity encryption equivalence test method, device, system and medium based on user group
CN108521393A (en) Data interactive method, device, system, computer equipment and storage medium
JP2012151831A5 (en)
Castiglione et al. On secure data management in health-care environment
Xu et al. A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems
Zegeye Exploiting bluetooth low energy pairing vulnerability in telemedicine
CN103475474B (en) Method for providing and acquiring shared enciphered data and identity authentication equipment
CN109981275A (en) Data transmission method, device, system, equipment and storage medium
Gowtham et al. Privacy enhanced data communication protocol for wireless body area network
CN108737334A (en) A kind of ECG detecting data uploading system and method
Zhao et al. Lightweight Privacy‐Preserving Data Sharing Scheme for Internet of Medical Things
Wang et al. Data transmission and access protection of community medical internet of things
Panda et al. Blockchain-enabled emergency detection and response in mobile healthcare system
CN113890890B (en) Efficient data management method applied to intelligent medical system
CN102611561B (en) A kind of peer-to-peer network charging or the method and system of statistical information checking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181102

RJ01 Rejection of invention patent application after publication