CN108763959A - Medical method for protecting privacy, device and computer readable storage medium - Google Patents

Medical method for protecting privacy, device and computer readable storage medium Download PDF

Info

Publication number
CN108763959A
CN108763959A CN201810562228.8A CN201810562228A CN108763959A CN 108763959 A CN108763959 A CN 108763959A CN 201810562228 A CN201810562228 A CN 201810562228A CN 108763959 A CN108763959 A CN 108763959A
Authority
CN
China
Prior art keywords
operational order
private data
information
permission levels
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810562228.8A
Other languages
Chinese (zh)
Inventor
郭立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lingdu Intelligent Control Technology Co Ltd
Original Assignee
Shenzhen Lingdu Intelligent Control Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lingdu Intelligent Control Technology Co Ltd filed Critical Shenzhen Lingdu Intelligent Control Technology Co Ltd
Priority to CN201810562228.8A priority Critical patent/CN108763959A/en
Publication of CN108763959A publication Critical patent/CN108763959A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Medical Informatics (AREA)
  • Bioethics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Epidemiology (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Medical Treatment And Welfare Office Work (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of medical method for protecting privacy comprising:When receiving the operational order of the first private data, the Permission Levels of the operational order are obtained;Verification information is obtained according to the Permission Levels, determines whether the operational order is verified according to the verification information;When the operational order is verified, it is the second private data to mark first private data;The corresponding operation of the operational order is executed to second private data, and real-time tracing is carried out to second private data.The invention also discloses a kind of medical privacy information protection device and computer readable storage mediums.The present invention realizes different verifications when carrying out different operation to medical private data, and after being operated to the medical treatment private data, carries out data tracking protection, it is ensured that the information security of medical private data avoids the leakage of medical privacy.

Description

Medical method for protecting privacy, device and computer readable storage medium
Technical field
The present invention relates to a kind of technical field of data processing more particularly to medical method for protecting privacy, device and meters Calculation machine readable storage medium storing program for executing.
Background technology
Currently, with the gradual universal and development of big data, the leakage problem of privacy of user data is also more prominent.When Before, in medical system, for the privacy information of patient, there is no perfect secret protection bodies for the data-storage system of hospital System, is still to be stored to the information of patient by traditional book keeping operation formula system, completely open to attack, so as to cause It a large amount of privacy leakage and is peddled.It is completely protected since patient privacy information is unable to get system, a large amount of medical treatment is hidden The accident of private leakage is even more to occur again and again.
The above is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that the above is existing skill Art.
Invention content
The main purpose of the present invention is to provide a kind of medical method for protecting privacy, it is intended to solve medical privacy and be easy The technical issues of leakage.
To achieve the above object, the present invention provides a kind of medical method for protecting privacy, and the medical treatment privacy information is protected Maintaining method includes the following steps:
When receiving the operational order of the first private data, the Permission Levels of the operational order are obtained;
Verification information is obtained according to the Permission Levels, determines whether the operational order is verified according to the verification information Pass through;
When the operational order is verified, it is the second private data to mark first private data;
The corresponding operation of the operational order is executed to second private data, and second private data is carried out Real-time tracing.
In one embodiment, described when receiving the operational order of the first private data, obtain the operational order Permission Levels the step of further include:
When receiving the operational order of the first private data, determine whether first private data is locking privacy number According to;
When it is locking private data to determine first private data, the operational order is rejected;
When it is non-locking private data to determine first private data, the Permission Levels of the operational order are obtained.
In one embodiment, described when it is non-locking private data to determine first private data, described in acquisition The step of Permission Levels of operational order includes:
It parses the operational order and obtains parsing information;
The Permission Levels of the operational order are determined according to the parsing information.
In one embodiment, described the step of determining the Permission Levels of the operational order according to the parsing information, wraps It includes:
The corresponding action type of the operational order is determined according to the parsing information;
When the action type is sharing operation type, determine that the Permission Levels of the operational order are the first permission grade Not;
When the action type is unshared action type, determine that the Permission Levels of the operational order are the second permission Rank.
In one embodiment, the Permission Levels include the first Permission Levels and the second Permission Levels, described according to institute It states verification information and determines that the step of whether operational order is verified includes:
When the Permission Levels are the first Permission Levels, manager's verification information is obtained, is verified based on the manager Information verifies the operational order, wherein meets manager's verification information in the authority information of the operational order Requirement when, determine that the operational order is verified;
When the Permission Levels are the second Permission Levels, manager's verification information and authorized party's verification information, base are obtained In manager's verification information and authorized party's verification information, the operational order is verified, wherein in the behaviour When making the authority information that instructs, while meeting the requirement of manager's verification information and authorized party's verification information, determine The operational order is verified.
In one embodiment, label first private data includes for the step of the second private data:
Obtain the label information of first private data;
First private data is marked according to the label information.
In one embodiment, described and to second private data carry out real-time tracing the step of after, the doctor Treating method for protecting privacy further includes:
When receiving the operational order again of second private data, the mandate letter of second private data is obtained Breath;
Based on operational order again described in authorization message verification, it is described operational order is verified again when, according to institute It states again operational order and respective operations is executed to second private data.
In one embodiment, described and to second private data carry out real-time tracing the step of include:
Obtain the operation label of second private data;
It is marked according to the operation, tracks the courses of action of second private data.
In addition, to achieve the above object, the present invention also provides a kind of medical privacy information protection device, the medical treatment privacy Information protection device includes:Memory, processor and it is stored in the doctor that can be run on the memory and on the processor Privacy information protection program is treated, the medical treatment privacy information protection program realizes such as any of the above-described when being executed by the processor The step of described medical method for protecting privacy.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium Medical privacy information protection program is stored on storage medium, the medical treatment privacy information protection program is real when being executed by processor The step of existing medical method for protecting privacy as described in any one of the above embodiments.
A kind of medical method for protecting privacy proposed by the present invention, by referring in the operation for receiving the first private data When enabling, the Permission Levels of the operational order are obtained;Verification information is obtained according to the Permission Levels, according to the verification information Determine whether the operational order is verified;When the operational order is verified, label first private data is Second private data;The corresponding operation of the operational order is executed to second private data, and to the second privacy number According to real-time tracing is carried out, different verifications when carrying out different operation to medical private data are realized, and hidden to the medical treatment After private data manipulation, data tracking protection is carried out, it is ensured that the information security of medical private data avoids medical privacy Leakage.
Description of the drawings
Fig. 1 is the medical privacy information protection apparatus structure in the hardware running environment that the embodiment of the present invention is related to Schematic diagram;
Fig. 2 is the flow diagram of the medical method for protecting privacy first embodiment of the present invention;
Fig. 3 is the flow diagram of the medical method for protecting privacy second embodiment of the present invention;
Fig. 4 is the flow diagram of the medical method for protecting privacy 3rd embodiment of the present invention;
Fig. 5 is the flow diagram of the medical method for protecting privacy fourth embodiment of the present invention;
Fig. 6 is the flow diagram of the present invention the 5th embodiment of medical method for protecting privacy;
Fig. 7 is the flow diagram of the medical method for protecting privacy sixth embodiment of the present invention;
Fig. 8 is the flow diagram of the present invention the 7th embodiment of medical method for protecting privacy;
Fig. 9 is the flow diagram of the present invention the 8th embodiment of medical method for protecting privacy.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Medical privacy information protection in the hardware running environment being related to as shown in FIG. 1, FIG. 1 is the embodiment of the present invention The schematic diagram of apparatus structure.
Terminal of the embodiment of the present invention can be PC, can also be smart mobile phone, tablet computer, E-book reader, MP3 (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3) Player, MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard sound Frequency level 4) the packaged type terminal device with display function such as player, pocket computer.
As shown in Figure 1, the terminal may include:Processor 1001, such as CPU, network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these components. User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 may include optionally that the wired of standard connects Mouth, wireless interface (such as WI-FI interfaces).Memory 1005 can be high-speed RAM memory, can also be stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
Optionally, terminal can also include camera, RF (Radio Frequency, radio frequency) circuit, sensor, audio Circuit, WiFi module etc..Wherein, sensor such as optical sensor, motion sensor and other sensors.Specifically, light Sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can according to the light and shade of ambient light come The brightness of display screen is adjusted, proximity sensor can close display screen and/or backlight when mobile terminal is moved in one's ear.As One kind of motion sensor, gravity accelerometer can detect in all directions the size of (generally three axis) acceleration, quiet Size and the direction that can detect that gravity when only, the application that can be used to identify mobile terminal posture are (such as horizontal/vertical screen switching, related Game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Certainly, mobile terminal can also match The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor are set, details are not described herein.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap It includes than illustrating more or fewer components, either combines certain components or different components arrangement.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage media Believe module, Subscriber Interface Module SIM and medical privacy information protection program.
In terminal shown in Fig. 1, network interface 1004 is mainly used for connecting background server, is carried out with background server Data communicate;User interface 1003 is mainly used for connecting client (user terminal), with client into row data communication;And processor 1001 can be used for calling the medical privacy information protection program stored in memory 1005.
When processor 1001 calls the medical privacy information protection program stored in memory 1005, following operation is executed:
When receiving the operational order of the first private data, the Permission Levels of the operational order are obtained;
When receiving the operational order of the first private data, the Permission Levels of the operational order are obtained;
Verification information is obtained according to the Permission Levels, determines whether the operational order is verified according to the verification information Pass through;
When the operational order is verified, it is the second private data to mark first private data;
The corresponding operation of the operational order is executed to second private data, and second private data is carried out Real-time tracing.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
When receiving the operational order of the first private data, determine whether first private data is locking privacy number According to;
When it is locking private data to determine first private data, the operational order is rejected;
When it is non-locking private data to determine first private data, the Permission Levels of the operational order are obtained.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
It parses the operational order and obtains parsing information;
The Permission Levels of the operational order are determined according to the parsing information.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
The corresponding action type of the operational order is determined according to the parsing information;
When the action type is sharing operation type, determine that the Permission Levels of the operational order are the first permission grade Not;
When the action type is unshared action type, determine that the Permission Levels of the operational order are the second permission Rank.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
When the Permission Levels are the first Permission Levels, manager's verification information is obtained, is verified based on the manager Information verifies the operational order, wherein meets manager's verification information in the authority information of the operational order Requirement when, determine that the operational order is verified;
When the Permission Levels are the second Permission Levels, manager's verification information and authorized party's verification information, base are obtained In manager's verification information and authorized party's verification information, the operational order is verified, wherein in the behaviour When making the authority information that instructs, while meeting the requirement of manager's verification information and authorized party's verification information, determine The operational order is verified.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
Obtain the label information of first private data;
First private data is marked according to the label information.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
When receiving the operational order again of second private data, the mandate letter of second private data is obtained Breath;
Based on operational order again described in authorization message verification, it is described operational order is verified again when, according to institute It states again operational order and respective operations is executed to second private data.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
Obtain the operation label of second private data;
It is marked according to the operation, tracks the courses of action of second private data.
The present invention provides a kind of medical method for protecting privacy, is that medical privacy information of the invention is protected with reference to Fig. 2, Fig. 2 The flow diagram of maintaining method first embodiment.
In the present embodiment, which includes:
Step S1000 obtains the permission grade of the operational order when receiving the operational order of the first private data Not;
In the present embodiment, which is currently stored private data, identity information, contact such as patient The privacy informations such as mode and medical record information;When receiving the operational order of first private data, then the operational order is obtained Permission Levels, wherein the operational order to first private data include the inquiry to first private data, modification, insert The operational orders such as enter, delete.Specifically, when getting the operational order of the first private data, first private data is determined Whether it is that locking private data then rejects the operational order when it is locking private data to determine first private data; When it is non-locking private data to determine first private data, the Permission Levels of the operational order are obtained.By parsing the behaviour Make instruction and obtain corresponding parsing information, it may be determined that the Permission Levels of the operational order;Wherein, according to the parsing information true The action type of the fixed operational order is sharing operation type, and the Permission Levels of the operational order are the first Permission Levels;True When the fixed action type is unshared action type, it is determined that the Permission Levels of the operational order are the second Permission Levels.
Step S2000 obtains verification information according to the Permission Levels, determines that the operation refers to according to the verification information Whether order is verified;
In the present embodiment, when getting Permission Levels, corresponding verification can then be got according to the Permission Levels Information.Specifically, which includes the first Permission Levels and the second Permission Levels, in the permission grade for getting operational order Not Wei the first Permission Levels when, then obtain manager's verification information, manager's verification information be currently to first privacy Data carry out the verification information that preservation side presets storage.The operational order is tested based on manager's verification information Card, if the authority information of the operational order meets the corresponding requirement of manager's verification information, it is determined that the operational order is verified Pass through.
When the Permission Levels are the second Permission Levels, then manager's verification information and authorized party's verification information are obtained, it should Authorized party's verification information is the verification information of first private data owner, based on manager's verification information and the mandate Square verification information verifies the operational order;If the authority information of the operational order meets manager's verification information simultaneously Requirement corresponding with authorized party's verification information, it is determined that the operational order is verified.
Step S3000, when the operational order is verified, it is the second privacy number to mark first private data According to;
In the present embodiment, when the operational order is verified, then first private data is marked, after label First private data be the second private data.Wherein, it can be stain mode to be marked to first private data Label carries out stain label so that can be with by the label information by unique label information to first private data Uniquely get first private data.Specifically, obtain first private data the first handle cursor and this first The label information of private data is marked the first handle cursor according to the label information, can be obtained marking the when of completing Get second private data.Wherein, which, which is used for uniquely identifying, is directed toward a certain target resource, by this One handle cursor can accurately obtain the target resource of the first handle cursor direction;Therefore, the first of user is being got When private data, then the corresponding first handle cursor of first private data is obtained simultaneously, which is carried out dirty Point marks, and the first handle cursor after label is then the second handle cursor;Detecting that program passes through the second handle cursor When reading corresponding first private data, then stain label is carried out to each byte in first private data, after label First private data be second private data.
Step S4000 executes the corresponding operation of the operational order to second private data, and hidden to described second Private data carry out real-time tracing.
In the present embodiment, when it is the second private data to mark first private data, then to second private data The currently corresponding operation of the operational order is executed, the corresponding operation of the current operational order can be the behaviour such as to change, delete, inquire Make.Further, by obtain second private data operation label can to the courses of action of second private data into Line trace, wherein operation label is this operation content information to second private data, which is The information such as the content of the time, operation that operate to second private data, the requesting party of operation are specifically included;It will be in the operation Hold the operation that information preservation is second private data to mark, it is primary right each time to preserve the operation of second private data The operation label answered can trace into the courses of action of second private data by obtaining operation label.
The medical method for protecting privacy that the present embodiment proposes, by the operational order for receiving the first private data When, obtain the Permission Levels of the operational order;Verification information is obtained according to the Permission Levels, it is true according to the verification information Whether the fixed operational order is verified;When the operational order is verified, it is the to mark first private data Two private datas;The corresponding operation of the operational order is executed to second private data, and to second private data Real-time tracing is carried out, realizes different verifications when carrying out different operation to medical private data, and to the medical treatment privacy After data manipulation, data tracking protection is carried out, it is ensured that the information security of medical private data avoids letting out for medical privacy Dew.
Based on first embodiment, the second embodiment of the medical method for protecting privacy of the proposition present invention, reference Fig. 3, In the present embodiment, step S1000 includes:
Step S1100, when receiving the operational order of the first private data, determine first private data whether be Lock private data;
Step S1200 rejects the operation and refers to when it is locking private data to determine first private data It enables;
Step S1300 obtains the operational order when it is non-locking private data to determine first private data Permission Levels.
In the present embodiment, the first private data includes locking private data and non-locking private data, first hidden at this When private data are locking private data, that is, indicate that first private data forbids any operation to the data;It is first hidden at this When private data are non-locking data, that is, indicate that first private data allows the relevant operation to the data.
When receiving the operational order of the first private data, then it needs to be determined that whether first private data is that locking is hidden Private data, specifically, the label information of the first private data can determine whether first private data is locking private data, If the label information of first private data is locking label, it is determined that first private data is locking private data;If should The label information of first private data is non-locking label, it is determined that first private data is non-locking private data.True When fixed first private data is locking private data, then the operational order is rejected;Determining that first private data is When non-locking private data, the Permission Levels of the operational order are obtained.
The medical method for protecting privacy that the present embodiment proposes, by the operational order for receiving the first private data When, it determines whether first private data is locking private data, is then determining that first private data is that locking is hidden When private data, the operational order is rejected, then when it is non-locking private data to determine first private data, is obtained The Permission Levels for taking the operational order realize the determination to private data corresponding states so that the private data be lock When determining private data, to the enhanced protection of the private data.
Based on second embodiment, the 3rd embodiment of the medical method for protecting privacy of the proposition present invention, reference Fig. 4, In the present embodiment, step S1300 includes:
Step S1310 parses the operational order and obtains parsing information;
Step S1320 determines the Permission Levels of the operational order according to the parsing information.
In the present embodiment, if the label information of first private data is non-locking label, it is determined that first privacy Data are non-locking private data;When it is non-locking private data to determine first private data, the operational order is obtained Permission Levels.Specifically, when it is non-locking private data to determine first private data, to current first private data pair The operational order answered is parsed, it is hereby achieved that the corresponding parsing information of the operational order, according to the parsing information Determine the corresponding Permission Levels of the operational order.
In the parsing information for getting the operational order, the operation class of the operational order is determined according to the parsing information Type, the action type include sharing operation type and unshared action type;The sharing operation type indicates the current operation It is the operation for the purpose of the content for sharing first private data to instruct corresponding operation;The unshared action type indicates Corresponding operate of the current operational order is the not operation for the purpose of the content for sharing first private data.In the operation class When type is sharing operation type, it is determined that the Permission Levels of the operational order are the first Permission Levels, are determining the action type For unshared action type when, it is determined that the Permission Levels of the operational order be the second Permission Levels.
The medical method for protecting privacy that the present embodiment proposes obtains parsing information by parsing the operational order, The Permission Levels that the operational order is determined then according to the parsing information, realize to the Permission Levels of the operational order It obtains, further realizes and the verification of the medical treatment privacy information is protected according to the Permission Levels.
Based on 3rd embodiment, the fourth embodiment of the medical method for protecting privacy of the proposition present invention, reference Fig. 5, In the present embodiment, step S1320 includes:
Step S1321 determines the corresponding action type of the operational order according to the parsing information;
Step S1322 determines that the Permission Levels of the operational order are when the action type is sharing operation type First Permission Levels;
Step S1323 determines the Permission Levels of the operational order when the action type is unshared action type For the second Permission Levels.
In the present embodiment, when getting the parsing information, determine that the operational order is corresponding according to the parsing information Action type, wherein the action type includes sharing operation type and unshared action type.Include in the parsing information The information such as the corresponding requestor information of the operational order, operation target can determine that the current operation refers to according to the parsing information Enable corresponding action type.When it is sharing operation type to determine the action type, that is, indicate that the current operational order is corresponding Operation is the operation for the purpose of the content for sharing first private data, it is determined that the Permission Levels of the operational order are first Permission Levels;When it is unshared action type to determine the action type, that is, indicate the corresponding operation of the current operational order not It is the operation for the purpose of the content for sharing first private data, it is determined that the Permission Levels of the operational order are the second permission Rank.
The medical method for protecting privacy that the present embodiment proposes, by determining that the operation refers to according to the parsing information Corresponding action type is enabled, then when the action type is sharing operation type, determines the permission grade of the operational order Not Wei the first Permission Levels, then the action type be unshared action type when, determine the permission of the operational order Rank is the second Permission Levels, realizes the determination to the Permission Levels of the operational order, further realizes in the operation Different rights verification when instruction is different rights rank.
Based on first embodiment, the 5th embodiment of the medical method for protecting privacy of the proposition present invention, reference Fig. 6, In the present embodiment, step S2000 includes:
Step S2100 obtains manager's verification information when the Permission Levels are the first Permission Levels, based on described Manager's verification information verifies the operational order, wherein meets the management in the authority information of the operational order When the requirement of square verification information, determine that the operational order is verified;
Step S2200 obtains manager's verification information and authorized party tests when the Permission Levels are the second Permission Levels Information is demonstrate,proved, manager's verification information and authorized party's verification information is based on, the operational order is verified, In, in the authority information of the operational order, while meeting manager's verification information and authorized party's verification information It is required that when, determine that the operational order is verified.
In the present embodiment, which is and currently carries out preservation side to first private data to set in advance Surely the verification information stored, manager's verification information include corresponding manager to the preset power of the first private data Limit requires;Authorized party's verification information is the verification information of first private data owner, which is usually user I, authorized party's verification information is when operating first private data, by remotely sending verification information to mandate The mode of Fang Suoyou terminals is obtained, and can also be obtained by the verification mode that authorized party sets.
When the Permission Levels for getting operational order are the first Permission Levels, then manager's verification information is obtained, is based on Manager's verification information verifies the operational order.Specifically, when getting manager's verification information, simultaneously The corresponding authority information of the operational order is obtained, the authority information of the operational order includes the operational order corresponding requests side The authority information of authority information and the operational order respective operations.If the authority information of the operational order meets manager verification The corresponding requirement of information, it is determined that the operational order is verified;If the authority information of the operational order does not meet the manager The corresponding requirement of verification information, it is determined that the operational order authentication failed.When the Permission Levels are the second Permission Levels, then obtain Manager's verification information and authorized party's verification information are taken, based on manager's verification information and authorized party's verification information to the behaviour Make instruction to be verified.If the authority information of the operational order meets manager's verification information simultaneously and the authorized party verifies letter Cease corresponding requirement, it is determined that the operational order is verified;If the authority information of the operational order does not meet the manager and tests Demonstrate,prove at least one corresponding requirement in information and authorized party's verification information, it is determined that the operational order authentication failed.
The medical method for protecting privacy that the present embodiment proposes, by being the first Permission Levels in the Permission Levels When, manager's verification information is obtained, the operational order is verified based on manager's verification information, wherein in institute When stating the authority information of operational order and meeting the requirement of manager's verification information, determines that the operational order is verified, connect It when the Permission Levels are the second Permission Levels, obtains manager's verification information and authorized party's verification information, based on described Manager's verification information and authorized party's verification information, verify the operational order, wherein in the operational order Authority information, while when meeting the requirement of manager's verification information and authorized party's verification information, determining the behaviour Pass through as command verification, realize the verification of the operational order to different rights rank, further realizes to privacy number According to different operation when, different degrees of protection.
Based on first embodiment, the sixth embodiment of the medical method for protecting privacy of the proposition present invention, reference Fig. 7, In the present embodiment, step S3000 includes:
Step S3100 obtains the label information of first private data;
Step S3200 is marked first private data according to the label information.
In the present embodiment, when the operational order is verified, then the label information of first private data, root are obtained First private data can be marked according to the label information.Specifically, specific interior corresponding to first private data Hold the content that information should include many bytes, the entire first privacy number can then be got by the first handle cursor According to;Therefore, when getting the first private data, then the first handle cursor of first private data, first handle are obtained Cursor is the corresponding handle cursor without label of first private data.By the label information got, to this First handle cursor is marked, and the first handle cursor after label is then the second handle cursor.Detecting that program passes through When the second handle cursor reads corresponding first private data, then dirt is carried out to each byte in first private data Point marks, and first private data after label is second private data.
The medical method for protecting privacy that the present embodiment proposes, the label by obtaining first private data are believed Breath, first private data is marked then according to the label information, realize by label information to this first The label of private data further realizes the data tracking to first private data according to the label information.
Based on first embodiment, the 7th embodiment of the medical method for protecting privacy of the proposition present invention, reference Fig. 8, In the present embodiment, the step of step S4000 after, which further includes:
Step S5000 obtains second private data when receiving the operational order again of second private data Authorization message;
Step S6000 is verified based on operational order again described in authorization message verification in the operational order again When, respective operations are executed to second private data according to the operational order again.
In the present embodiment, this again operational order be to second private data again carry out respective operations finger It enables, when receiving the operational order again of second private data, then obtains the authorization message of second private data.The mandate Information is the authorization message of the corresponding owner of second private data, can be to the operational order again according to the authorization message It is verified;When the corresponding Permission Levels of operational order meet the authorization message again for this, that is, determine that operational order is verified again for this Pass through;When the corresponding Permission Levels of operational order do not meet the authorization message again for this, that is, determine that operational order verification is lost again for this It loses.Wherein, when determining this operational order being verified again, then according to this, operational order grasps second private data again Make.For example, for a certain second private data, the authorization message of second private data is that it is highest only to allow Permission Levels The operation that the requesting party of Permission Levels inquires and changes;Obtain the corresponding Permission Levels of operational order again, wherein this is again The Permission Levels of the corresponding requesting party of operational order are highest level, and the corresponding operation of operational order is inquiry again for this, it is determined that The Permission Levels of the operational order again meet the authorization message, that is, determine that operational order is verified again for this.
The medical method for protecting privacy that the present embodiment proposes, by receiving grasping again for second private data When instructing, the authorization message of second private data is obtained, is then based on operating again described in authorization message verification and refers to Enable, it is described operational order is verified again when, corresponding behaviour is executed to second private data according to the operational order again Make, realizes when being operated again to second private data, to the track protection of second private data.
Based on first embodiment, the 8th embodiment of the medical method for protecting privacy of the proposition present invention, reference Fig. 9, In the present embodiment, step S4000 includes:
Step S4100 obtains the operation label of second private data;
Step S4200 is marked according to the operation, tracks the courses of action of second private data.
It in the present embodiment, can be to the behaviour of second private data by obtaining the operation label of second private data Make path into line trace, wherein operation label is this operation content information to second private data.Specifically, Since each byte carries label information in second private data, as long as detecting to carrying label letter When the data of breath carry out relevant operation, then it can be got according to the label information currently in the operation of second private data Hold information, which is the content for having specifically included the time, operation that operates to second private data, operates The information such as requesting party;The operation that the operation content information preservation is second private data is marked, it is second hidden to this each time The operation of private data preserves primary corresponding operation label, and the second privacy number can be traced by obtaining operation label According to courses of action.
The medical method for protecting privacy that the present embodiment proposes, by the operation mark for obtaining second private data Note is marked then according to the operation, is tracked the courses of action of second private data, is realized to the second private data Path trace so that it is traceable to all operations of private data, protect the information security of private data.
In addition, to achieve the above object, the present invention also proposes a kind of computer readable storage medium, described computer-readable Medical privacy information protection program is stored on storage medium, the medical treatment privacy information protection program is real when being executed by processor Now following operation:
When receiving the operational order of the first private data, the Permission Levels of the operational order are obtained;
Verification information is obtained according to the Permission Levels, determines whether the operational order is verified according to the verification information Pass through;
When the operational order is verified, it is the second private data to mark first private data;
The corresponding operation of the operational order is executed to second private data, and second private data is carried out Real-time tracing.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
When receiving the operational order of the first private data, determine whether first private data is locking privacy number According to;
When it is locking private data to determine first private data, the operational order is rejected;
When it is non-locking private data to determine first private data, the Permission Levels of the operational order are obtained.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
It parses the operational order and obtains parsing information;
The Permission Levels of the operational order are determined according to the parsing information.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
The corresponding action type of the operational order is determined according to the parsing information;
When the action type is sharing operation type, determine that the Permission Levels of the operational order are the first permission grade Not;
When the action type is unshared action type, determine that the Permission Levels of the operational order are the second permission Rank.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
When the Permission Levels are the first Permission Levels, manager's verification information is obtained, is verified based on the manager Information verifies the operational order, wherein meets manager's verification information in the authority information of the operational order Requirement when, determine that the operational order is verified;
When the Permission Levels are the second Permission Levels, manager's verification information and authorized party's verification information, base are obtained In manager's verification information and authorized party's verification information, the operational order is verified, wherein in the behaviour When making the authority information that instructs, while meeting the requirement of manager's verification information and authorized party's verification information, determine The operational order is verified.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
Obtain the label information of first private data;
First private data is marked according to the label information.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
When receiving the operational order again of second private data, the mandate letter of second private data is obtained Breath;
Based on operational order again described in authorization message verification, it is described operational order is verified again when, according to institute It states again operational order and respective operations is executed to second private data.
Further, following operation is also realized when the medical privacy information protection program is executed by the processor:
Obtain the operation label of second private data;
It is marked according to the operation, tracks the courses of action of second private data.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or system including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or system.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions use so that a station terminal equipment (can be mobile phone, Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. it is a kind of medical treatment method for protecting privacy, which is characterized in that it is described medical treatment method for protecting privacy include:
When receiving the operational order of the first private data, the Permission Levels of the operational order are obtained;
Verification information is obtained according to the Permission Levels, it is logical to determine whether the operational order is verified according to the verification information It crosses;
When the operational order is verified, it is the second private data to mark first private data;
The corresponding operation of the operational order is executed to second private data, and second private data is carried out real-time Tracking.
2. medical treatment method for protecting privacy as described in claim 1, which is characterized in that described to receive the first privacy number According to operational order when, the step of Permission Levels for obtaining the operational order further includes:
When receiving the operational order of the first private data, determine whether first private data is locking private data;
When it is locking private data to determine first private data, the operational order is rejected;
When it is non-locking private data to determine first private data, the Permission Levels of the operational order are obtained.
3. medical treatment method for protecting privacy as claimed in claim 2, which is characterized in that described to determine first privacy When data are non-locking private data, the step of Permission Levels for obtaining the operational order, includes:
It parses the operational order and obtains parsing information;
The Permission Levels of the operational order are determined according to the parsing information.
4. medical treatment method for protecting privacy as claimed in claim 3, which is characterized in that described true according to the parsing information The step of Permission Levels of the operational order include calmly:
The corresponding action type of the operational order is determined according to the parsing information;
When the action type is sharing operation type, determine that the Permission Levels of the operational order are the first Permission Levels;
When the action type is unshared action type, determine that the Permission Levels of the operational order are the second permission grade Not.
5. medical treatment method for protecting privacy as described in claim 1, which is characterized in that the Permission Levels include the first power Rank and the second Permission Levels are limited, it is described to determine that the step of whether operational order is verified is wrapped according to the verification information It includes:
When the Permission Levels are the first Permission Levels, manager's verification information is obtained, is based on manager's verification information The operational order is verified, wherein meet wanting for manager's verification information in the authority information of the operational order When asking, determine that the operational order is verified;
When the Permission Levels are the second Permission Levels, manager's verification information and authorized party's verification information are obtained, is based on institute Manager's verification information and authorized party's verification information are stated, the operational order is verified, wherein is referred in the operation The authority information of order, while when meeting the requirement of manager's verification information and authorized party's verification information, determine described in Operational order is verified.
6. medical treatment method for protecting privacy as described in claim 1, which is characterized in that label the first privacy number Include according to for the step of the second private data:
Obtain the label information of first private data;
First private data is marked according to the label information.
7. medical treatment method for protecting privacy as described in claim 1, which is characterized in that described and to the second privacy number After the step of carrying out real-time tracing, the medical treatment method for protecting privacy further includes:
When receiving the operational order again of second private data, the authorization message of second private data is obtained;
Based on operational order again described in authorization message verification, it is described operational order is verified again when, according to it is described again Operational order executes respective operations to second private data.
8. medical treatment method for protecting privacy as described in claim 1, which is characterized in that described and to the second privacy number Include according to the step of carrying out real-time tracing:
Obtain the operation label of second private data;
It is marked according to the operation, tracks the courses of action of second private data.
9. a kind of medical treatment privacy information protection device, which is characterized in that the medical treatment privacy information protection device includes:Storage Device, processor and the medical privacy information protection program that is stored on the memory and can run on the processor, institute It states and realizes such as medical treatment described in any item of the claim 1 to 8 when medical privacy information protection program is executed by the processor The step of method for protecting privacy.
10. a kind of computer readable storage medium, which is characterized in that it is hidden to be stored with medical treatment on the computer readable storage medium Private information protection program, the medical treatment privacy information protection program are realized when being executed by processor as any in claim 1 to 8 Described in medical method for protecting privacy the step of.
CN201810562228.8A 2018-05-31 2018-05-31 Medical method for protecting privacy, device and computer readable storage medium Withdrawn CN108763959A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810562228.8A CN108763959A (en) 2018-05-31 2018-05-31 Medical method for protecting privacy, device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810562228.8A CN108763959A (en) 2018-05-31 2018-05-31 Medical method for protecting privacy, device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN108763959A true CN108763959A (en) 2018-11-06

Family

ID=64002412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810562228.8A Withdrawn CN108763959A (en) 2018-05-31 2018-05-31 Medical method for protecting privacy, device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108763959A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127849A (en) * 2021-03-14 2021-07-16 曹庆恒 Private information using method and system and computer readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127849A (en) * 2021-03-14 2021-07-16 曹庆恒 Private information using method and system and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN108347444A (en) Identity identifying method, device based on block chain and computer readable storage medium
CN107547514A (en) Identity identifying method, system and computer-readable recording medium
CN107704770A (en) Sensitive information desensitization method, system, equipment and readable storage medium storing program for executing
CN107315937A (en) A kind of method for secret protection, mobile terminal and computer-readable recording medium
CN107240157B (en) Near field communication security control method, mobile terminal and computer readable storage medium
CN108510022A (en) A kind of Quick Response Code generates, verification method and server
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN108256303A (en) Electronic device, auth method and storage medium
CN106255102B (en) Terminal equipment identification method and related equipment
CN109257336A (en) It is a kind of based on the encrypted message processing method of block chain, terminal device
CN107317680A (en) Labeling method, system and the computer-readable recording medium of secured account numbers
CN107506646A (en) Detection method, device and the computer-readable recording medium of malicious application
CN107861669A (en) The switching method and mobile terminal of a kind of custom system
CN107395560A (en) Safety check and its initiation, management method, equipment, server and storage medium
CN108197441A (en) Flexible screen terminal and its solution lock control method, computer readable storage medium
CN110069229A (en) Screen sharing method, mobile terminal and computer readable storage medium
CN107770443A (en) A kind of image processing method, mobile terminal and computer-readable recording medium
CN108206892A (en) Guard method, device, mobile terminal and the storage medium of contact person's privacy
CN104899488B (en) Numeric value transfer and device
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CN108540458A (en) A kind of method of client checks, equipment, server and storage medium
CN107426441A (en) A kind of displaying method of terminal, terminal and computer-readable recording medium
CN107347117A (en) A kind of message management method, mobile terminal and computer-readable recording medium
CN108763959A (en) Medical method for protecting privacy, device and computer readable storage medium
CN107346392A (en) Terminal system change recognition methods, device and readable storage medium storing program for executing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20181106

WW01 Invention patent application withdrawn after publication