CN108877883A - The drug administration monitoring expert system and working method of network malicious attack can be resisted - Google Patents

The drug administration monitoring expert system and working method of network malicious attack can be resisted Download PDF

Info

Publication number
CN108877883A
CN108877883A CN201810796904.8A CN201810796904A CN108877883A CN 108877883 A CN108877883 A CN 108877883A CN 201810796904 A CN201810796904 A CN 201810796904A CN 108877883 A CN108877883 A CN 108877883A
Authority
CN
China
Prior art keywords
patient
drug
message
value
medication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810796904.8A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810796904.8A priority Critical patent/CN108877883A/en
Publication of CN108877883A publication Critical patent/CN108877883A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The drug administration monitoring expert system that can resist network malicious attack of the invention and working method, including:Intelligent medicine box, sign measuring terminals and remote server;The measured value of the patient sign of acquisition is sent to intelligent medicine box by wireless signal by sign measuring terminals, and intelligent medicine box is suitable for for measured value being uploaded to remote server, and remote server realizes whether monitoring patient takes medicine by built-in drug administration judgment module.Network attack defense module is equipped in remote server, which includes:Controller, IDS policy server, distributed IDS equipment and flow cleaning center;When any IDS equipment detects the message with ddos attack feature, i.e., IDS policy server is reported to by SSL traffic channel;IDS policy server makes processing strategie corresponding with having the message of ddos attack feature, then shields the message by controller according to information is reported.

Description

The drug administration monitoring expert system and working method of network malicious attack can be resisted
Technical field
The present invention relates to medical information systems, and in particular to a kind of drug administration monitoring expert system and its working method.
Background technique
The aging of population of current social is had to face problem for entire society, family, individual, greatly For most the elderlys with diseases such as heart disease, diabetes, hypertension, it is right under the assistance of doctor that these diseases generally require patient The disease of its own carries out prolonged lasting management, follows in many aspects such as medication, daily life, diet, movement, rehabilitation physical therapies Set diagnosis and treatment plan is practiced.In the overall process of disease control, patient generally requires to be timed to hospital (especially base doctor Institute) follow-up is carried out, the disease progression of patient is tracked so as to doctor and adjusts doctor's advice in time.
Since this is a longer time process, often periods of months even the several years;And this process is often sent out Life needs patient to be independently spontaneously managed to the disease of oneself and health except clinical setting.Certain patients are due to recognizing Know that insufficient, selfdiscipline is strong or other odjective causes, it is difficult to accomplish strict implement doctor's advice, at regular time and quantity medication, on time Follow-up influences therapeutic effect so that the state of an illness occurs repeatedly or aggravates, and increases medical expense, hence it is imperative that some backmans Have to help its to carry out medical monitoring management.
Traditional medical profession requirements of process patient in timing carries out follow-up at doctor, not only time-consuming consumption wealth, but also patient There is the risk in clinical setting by cross-infection.And the rise of Tele medicine in recent years, doctor is passed through mutual Real-time tracking of networking monitors the state of an illness of patient, health status and key physiological index after understanding the medication of patient.Thus one, Conventional follow-up operation flow can be completed in the case where doctor and patient stay indoors.Especially for chronic sufferer Person, if doctor's advice implementation effect is good, patient profiles stablize, and relative physiologic index is without significant changes, then doctor can be with regard to this decision Current doctor's advice is adopted, hospital is arrived again without patient and carries out follow-up.
To solve the above problems, Chinese patent literature application publication number CN102855406A discloses one kind based on long-range doctor The intelligent medicine purchase system for the treatment of system and the monitoring of doctor's advice compliance is remotely supervised although technical solution description is taken medicine which solve patient The problem of control, but it is not directed to a certain disease and is monitored automatically, does not embody specific detection means yet.In for another example State patent document application number CN102292063A discloses a kind of method and apparatus for dispensing medicament, which is directed to Timely, the correct granting of drug, but unresolved the technical issues of effect after medication is monitored.
Summary of the invention
The object of the present invention is to provide a kind of drug administration monitoring expert system and working method, this system and working methods Detected by the data after taking medicine to patient, solve to patient the stipulated time whether take medicine and take medicine reasonability carry out The technical issues of judgement.
In order to solve the above-mentioned technical problems, the present invention provides a kind of drug administrations to monitor expert system, including:Intelligent medicine Case, sign measuring terminals and remote server;Wherein the sign measuring terminals lead to the measured value of the patient sign of acquisition It crosses wireless signal and is sent to intelligent medicine box, the intelligent medicine box is suitable for measured value being uploaded to remote server, the long-range clothes Business device realizes whether monitoring patient takes medicine by built-in drug administration judgment module, and/or to the reasonability of patient's medication into Row judgement, and judging result is sent to intelligent medicine box;And the reminding module by setting in intelligent medicine box reminds patient;And/or Judging result is sent to doctor's client.
Preferably, network attack defense module is equipped in the remote server, which includes:Control Device, IDS policy server, distributed IDS equipment and flow cleaning center processed;When any IDS equipment is detected with DDoS When the message of attack signature, i.e., IDS policy server is reported to by SSL traffic channel;The IDS policy server is according to upper It notifies breath, makes processing strategie corresponding with having the message of ddos attack feature, the message is then passed through into controller screen It covers or interchanger access interface flow corresponding to the message is redirected to flow cleaning center and be filtered;This long-range clothes Device be engaged in while realizing the purpose of medication monitoring, also has the function of resisting malicious attack, to guarantee that network is unobstructed.
Preferably, in order to which the message preferably to ddos attack feature screened, is filtered out;Include in the IDS equipment: Packet check module is cheated, the deceptive practices of link layer and internet layer address are detected;Packet check module is destroyed, to net Border layer and the abnormal behaviour of transport layer flag bit setting are detected;Exception message detection module, it is general to application layer and transport layer Big vast formula attack is detected;By the deception packet check module, destroy packet check module, exception message detection mould Block successively detects message;And if any detection module detection outgoing packet is there are when above-mentioned respective behavior, by the message It is transferred to IDS policy server;The IDS policy server is suitable for having deceptive practices when message, and attacks and threaten In the domain OpenFlow, then host is shielded by controller;Or threatened not in the domain OpenFlow when attacking, then it will by controller Interchanger access interface flow corresponding to the message is redirected to flow cleaning center and is filtered;The IDS decision service Device is further adapted for having abnormal behaviour when message, then is shielded by flow of the controller to attacker or attack host;With And when message has the formula attack that floods, then the IDS policy server will be corresponding to the message suitable for passing through controller Interchanger access interface flow is redirected to flow cleaning center and is filtered.
Another aspect, in order to solve the above-mentioned technical problem, the present invention also provides a kind of drug administrations to monitor expert system Working method, include the following steps:Step S100, by remotely monitoring whether patient takes medicine, step S200 takes medicine to patient Reasonability judged;Step S300, and according to judging result to remind patient, and/or judging result is sent to doctor Client.
Further, included the following steps in the step S100 by the method that remotely whether monitoring patient takes medicine:Step S110 establishes genius morbi value set;Step S120 obtains the measured value of any acquisition time in collection period, then According to the difference of the measured value of measured value acquisition time identical as previous cycle and interval time of acquisition time twice It calculates slope function SL (t);Whether step S130 establishes patient according to the slope function SL (t) and takes medicine judgment formula, i.e.,
IfWhen, then judge that patient does not take medicine;
In formula, exception corresponding to a characteristic value in genius morbi value set when σ 1 does not take medicine for preset patient's single Threshold value, it is describedThe accumulative threshold value of exception corresponding to characteristic value when not taking medicine repeatedly for preset patient, n1 are acquisition total time Number.
Further, further include by the method that remotely whether monitoring patient takes medicine in the step S100:According to the disease Multiple characteristic values establish the calculated result yr of corresponding medication judgment formula in sick characteristic value collectionm, establish being suitable for for multiple characteristic values Judge whether the judgment formula of medication;
I.e.Then judge that patient does not take medicine;
In formula, the ξ 1 is multiple features exception threshold corresponding to various features value of the preset patient when not taking medicine repeatedly Value, n2 are characterized the quantity of value, and m indicates the type of characteristic value.
Further, the method judged in the step S200 the reasonability of patient's medication includes the following steps:
Step S210 presets the mark of the corresponding human body indicators parameter of each acquisition time corresponding to genius morbi value set Quasi- value;Step S220 calculates the measured value of any acquisition time and the difference functions D of the standard value of identical acquisition time (t);Step S230 establishes patient's medication reasonability judgment formula according to the difference functions D (t), i.e.,
IfJudge that the taken medicine object of patient is not up to curative effect;
In formula, σ 2 be preset patient medication after not up to curative effect when characteristic value corresponding to outlier threshold,It is pre- If patient medication after not up to curative effect when characteristic value corresponding to extremely accumulative threshold value of more time points.
Further, the method judged in the step S200 the reasonability of patient's medication further includes following steps:
The calculating knot of corresponding medication reasonability judgment formula is established according to multiple characteristic values in the genius morbi value set Fruit yrm, that establishes multiple characteristic values is suitable for judging the rational formula of patient's medication;
I.e.Then judge that patient's medication is not up to curative effect;
In formula, the ξ 2 is multiple features corresponding to various features value when being not up to curative effect after default patient repeatedly take medicine Outlier threshold.
Further, in order to avoid patient is when a variety of drugs carry out mixed take, pharmacology conflict, the drug administration monitoring are generated The working method of expert system further includes:A method of the mixed clothes conflict of drug is effectively avoided, that is, establishes that drug is mixed to take safety Table is corresponded to, each unit item in the table is corresponding with the pharmacology information of each drug respectively, passes through the table each medicine to be taken to patient The pharmacology information of product successively carries out comparison of tabling look-up, to judge that each drug is the safety of mixed clothes.
Further, for special disease crowd, for example, the diseases such as heart disease, diabetes, hypertension, some drugs are that have Taboo, adverse reaction can be generated by wrongly taking, so the present invention also the drug is mixed take safety and correspond to table on the basis of, foundation The taboo drug of a certain disease compares sublist, i.e. the pharmacology with each taboo drug of the disease respectively of each unit item in the table Information is corresponding, takes safety mixed to the drug and correspond to after table tables look-up, then by taboo drug control sublist to trouble The pharmacology information of person's each drug to be taken successively carries out comparison of tabling look-up, to judge the drug to the disease safety.
Further, it monitors whether patient takes medicine by remote server, and/or the reasonability of patient's medication is sentenced It is disconnected;Network malicious attack in order to prevent, wherein the remote server uses SDN network framework;The SDN network framework packet It includes:Data plane, using plane and control plane;Data plane detects attack when being located at any IDS equipment in data plane When threat, notice enters attack type analysis process using plane;Using plane, for analyzing attack type, and Corresponding attack, which is customized, according to attack type threatens processing strategie;Plane is controlled, is connect to provide attack threat processing using plane Mouthful, and attack threat identification interface is provided for data plane.
Beneficial effects of the present invention:(1) drug administration of the invention monitoring expert system and working method realize remotely Whether take medicine to patient, and the reasonability of medication is judged;And genius morbi value set is established, whether comprehensive descision takes Medicine improves the accuracy of judgement, and further detects to the curative effect of medication, while also timely feedbacking to by judging result To doctor's client;(2) present invention can also resist network malicious attack, and to guarantee that server works normally, user terminal connection is suitable Freely.
Detailed description of the invention
In order to make the content of the present invention more clearly understood, below according to specific embodiment and in conjunction with attached drawing, The present invention is described in further detail, wherein
Fig. 1 shows the functional block diagram of drug administration monitoring expert system of the invention;
Fig. 2 shows the functional block diagrams of IDS equipment;
Fig. 3 shows the flow chart of the working method of drug administration monitoring expert system of the invention;
Fig. 4 shows the method flow diagram whether taken medicine in step S100 by remotely monitoring patient;
Fig. 5 shows the method flow diagram judged in step S200 the reasonability of patient's medication;
Fig. 6 shows the functional block diagram of this remote server.
Specific embodiment
In order to make the objectives, technical solutions and advantages of the present invention clearer, With reference to embodiment and join According to attached drawing, the present invention is described in more detail.It should be understood that these descriptions are merely illustrative, and it is not intended to limit this hair Bright range.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid this is unnecessarily obscured The concept of invention.
Embodiment 1
Fig. 1 shows the functional block diagram of drug administration monitoring expert system of the invention.
As shown in Figure 1, drug administration of the invention monitors expert system, including:Intelligent medicine box, sign measuring terminals, with And remote server;Wherein the measured value of the patient sign of acquisition is sent to intelligence by wireless signal by the sign measuring terminals Energy medicine-chest, the intelligent medicine box are suitable for for measured value being uploaded to remote server, and the remote server passes through built-in drug It takes judgment module and realizes whether monitoring patient takes medicine, and/or the reasonability of patient's medication is judged, and by judging result It is sent to intelligent medicine box;And the reminding module by setting in intelligent medicine box reminds patient;And/or judging result is sent to doctor Client.
Wherein, it will be described in detail in the following embodiments about the working method of drug administration judgment module.Doctor Raw client is specially the man-machine interactive system placed at doctor, and doctor can also be in the medication situation of consulting room monitoring patient.
Further, drug administration monitoring expert system can also be connected with pharmacy's drug administration management system, by drug Instructions of taking, into the memory of intelligence test and reminding medical kit, is suggested by network transmission with providing medication.
This intelligent medicine box also has medication amount detection function, when medication amount deficiency, is accordingly reminded.
The prompting includes but is not limited to use:Light emitting device, microphone or pass through the means such as sending short message by mobile phone. Described sign measuring terminals such as blood pressure instrument, blood glucose meter, pulse meter etc..Sign measuring terminals and intelligence test and reminding medical kit Connection type includes but is not limited to the modes such as bluetooth, wireless, wired.The intelligence test and reminding medical kit upload characteristic value, i.e., Connection type with remote server can be wireless (2G, 3G or 4G), the modes such as wired.
Further, as a kind of optional embodiment of the present embodiment.
Network attack defense module is equipped in the remote server, which includes:Controller, IDS policy server, distributed IDS equipment and flow cleaning center;When any IDS equipment is detected with ddos attack spy When the message of sign, i.e., IDS policy server is reported to by SSL traffic channel;The IDS policy server is according to above notifying Breath is made and has the corresponding processing strategie of the message of ddos attack feature, then by the message by controller shielding or Interchanger access interface flow corresponding to the message is redirected to flow cleaning center and is filtered by person.
Fig. 2 shows the functional block diagrams of IDS equipment.
As shown in Fig. 2, further, including in the IDS equipment:Packet check module is cheated, to link layer and internetwork layer The deceptive practices of address are detected;Packet check module is destroyed, the abnormal behaviour that internetwork layer and transport layer flag bit are arranged It is detected;Exception message detection module detects the formula attack that floods of application layer and transport layer;Pass through the deception Packet check module, destruction packet check module, exception message detection module successively detect message;And if any detection Module detects outgoing packet there are when above-mentioned respective behavior, then the message is transferred to IDS policy server;The IDS decision service Device is suitable for having deceptive practices when message, and attacks and threaten in the domain OpenFlow, then shields host by controller;Or works as and attack Threat is hit not in the domain OpenFlow, then is redirected to interchanger access interface flow corresponding to the message by controller Flow cleaning center is filtered;The IDS policy server is further adapted for having abnormal behaviour when message, then passes through controller pair Attacker or the flow for attacking host are shielded;And when message has the formula attack that floods, then the IDS decision takes Business device, which is suitable for that interchanger access interface flow corresponding to the message is redirected to flow cleaning center by controller, to carry out Filtering.
Wherein, ddos attack characterizing definition is:To the deceptive practices of link layer and internet layer address, to internetwork layer and transmission The abnormal behaviour of layer flag bit setting, and flood formula attack to application layer and transport layer.IDS is intrusion detection device. SDN is software defined network.
The present invention use from deception packet check module to destroy packet check module, then to exception message detection module according to The sequence of secondary detection, wherein each module obtains packet information and uses independent Interface design, and the coupling for reducing intermodule is closed Connection property;And each module improves the high cohesion of module using the program data structure of optimization, careful each processing sub-process of segmentation Characteristic.This detection ordering improves the detection efficiency to message data, and reduces omission factor.
Network equipment information binding table is called by the deception packet check module, and in the IDS policy server In the middle building unit time suitable for the first Hash table for being counted to packet cheating behavior, and set first Hash table In the first threshold values;The deception packet check module, the type for the message being encapsulated in Packet-In message is solved Analysis, to obtain corresponding source, purpose IP address, MAC Address and the interchanger DPID and the port that upload Packet-In message Number information, and each information is compared with the corresponding information in network equipment information binding table respectively;If above-mentioned in message Message is then transferred to and destroys packet check module by information matches;If the above- mentioned information in message mismatch, it is transferred to the IDS Policy server abandons message, and counts simultaneously to deceptive practices, when the count value is more than the first threshold values, Shielding sends the program and/or host of the message.
Specifically, the deception packet check module be used for message carry out first time judgement, that is, judge message whether be IP spoofing attack message, port spoofing attack message or MAC spoofing attack message.
Specific steps include:Parse source, target MAC (Media Access Control) address and interchanger entrance in ethernet frames first, then root Different messages is parsed according to different type of messages.When type of message be IP, ARP, RARP when, then parse corresponding source, Then these information are carried out matching of tabling look-up to the information in network equipment information binding table by purpose IP address, if being matched to phase The information answered then gives and destroys packet check resume module.If mismatching, which is transferred to the processing of IDS policy server; And simultaneously to deceptive practices carry out accumulated counts, when the count value be more than the first threshold values when, shielding send the message program and/ Or host.
Have a device manager module DeviceManagerImpl in Floodlight, when an equipment in a network Tracking equipment when mobile device, and equipment is defined according to new stream.
Equipment manager learns equipment from PacketIn request, and device network parameter is obtained from PacketIn message Information (information such as source, destination IP, MAC, VLAN) is distinguished equipment for interchanger or host by entity classification device.It is silent Entity classification device shows an equipment using MAC Address and/or vlan table in the case of recognizing, the two attributes can uniquely identify one A equipment.Another important information is the installation point (No. DPID of interchanger and port numbers) of equipment (at one In the region openflow, an equipment can only have an installation point, herein the region openflow refer to it is same The set of the connected multiple switch of Floodlight example.Equipment manager is also that IP address, installation point, equipment were provided with Time phase, last time timestamp is as judging their whether expired foundations.)
Therefore only DeviceManagerImpl module need to be called to provide inside network equipment information binding table module IDeviceService, at the same to the service addition IDeviceListener monitoring interface.
The monitoring interface that wherein IDeviceListener is provided has:
Interface name Function
public void deviceAdded(IDevice device) Host addition response
public void deviceRemoved(IDevice device) Host removes response
public void deviceMoved(IDevice device) Host mobility response
public void deviceIPV4AddrChanged(IDevice device) Host IP address changes response
public void deviceVlanChanged(IDevice device) Host VLAN changes response
ISP:IFloodlightProviderService,IDeviceService
Rely on interface:IFloodlightModule,IDeviceListener
Record in table according to the low and high level trigger mechanism of interchanger (cable extracts the low level of triggering PortDown, Cable pulls out the high level of triggering PortUp) record in binding table can be refreshed in real time.
The information that traditional ddos attack can not touch, modify SwitchDPID and SwitchPort can using this advantage With more flexible detection spoofing attack.
Constructed in the IDS policy server in the unit time be suitable for that the flag bit of message is arranged abnormal behaviour into The second Hash table that row counts, and set the second threshold values in second Hash table;The destruction packet check module is to report Each flag bit of text is detected, to judge whether each flag bit meets ICP/IP protocol specification;If each flag bit of message accords with It closes, then message is transferred to exception message detection module;If each flag bit of message is not met, it is transferred to the IDS decision service Device abandons message, and counts simultaneously to flag bit setting abnormal behaviour, when the count value is more than the second threshold values When, shielding sends the program and/or host of the message.
Specifically, the destruction packet check module, judge for carrying out second to message, that is, judge message whether be Attack message with malice flag bit feature.Wherein, the attack message with malice flag bit feature includes but is not limited to IP Attack message, TCP attack message.Implementation steps include:IP attack message and TCP/UDP attack message therein are realized each The detection of the flag bit of message, that is, identify whether each flag bit meets ICP/IP protocol specification.If meeting, just directly hand over By abnormal number packet check resume module.If not meeting, it is judged as attack message, is transferred to the processing of IDS policy server.
It is column with typical attacks such as TearDrop, there is an offset field and a fragment mark (MF) in the packet header IP, The case where if offset field is arranged to incorrect value by attacker, and IP fragmentation message just will appear coincidence or disconnect, target machine System will collapse.
In IP packet head, there are a protocol fields, which specifies which kind of agreement is the IP packet carry.The field Value is less than 100, if attacker sends the IP packet of largely protocol fields of the band greater than 100, target machine to target machine Protocol stack in system just will receive destruction, form attack.
Therefore in destroying packet check module, each flag bit of outgoing packet is extracted first, is then checked whether normal.
If normal, subsequent module for processing is given.
If abnormal, the data packet is abandoned, and count to corresponding Hash table counter.If counted in the unit time When device is more than second threshold values of setting, then IDS policy server is called to carry out shielding and/or directly screen to corresponding program Cover corresponding host.
After data packet by cheating packet check module filters out, number handled by subsequent destruction packet check module It is all true according to the address in packet.In this way, effectively avoiding target machine has received destruction message, target may be directly resulted in The protocol stack of machine collapses or even target machine directly collapses.
Processing function and the deception packet check process flow for destroying packet check module are substantially similar, and difference is to destroy What packet check module parsed is the flag bit of each message, whether normal then detects each flag bit.
If normal, just directly to the processing of subsequent exception message detection module.
If abnormal, the data packet is abandoned, and to counter in the corresponding Hash table of host application reference mechanism It counts.If it exceeds the threshold values of setting, then shield corresponding attacker or directly shielding attack host.
The Hash table for the formula attack message that floods for identification is constructed in the exception message detection module, is determined in the IDS Construct the third Hash table that is counted to the formula attack of flooding of being suitable in the unit time in plan server, and setting this Third threshold values in third Hash table;The exception message detection module, suitable for being sentenced according to the threshold values set in the Hash table Whether the message that breaks has attack;If without attack, by data distributing;If having attack, it is transferred to institute IDS policy server is stated, message is abandoned, and attack is counted simultaneously, when count value is more than third threshold values When, shielding sends the program and/or host of the message.
Specifically, the exception message detection module, for carrying out third time judgement to message, that is, judge message whether be The formula that floods attack message.
Specific steps include:Using the identification to building flood formula attack message in Hash table respective record carry out It is cumulative, and detect whether to be more than threshold value, to judge whether the being formula attack message that floods.
By above-mentioned deception packet check module, destroy filtering out for two modules of packet check module, subsequent module for processing Data packet substantially belong to data packet under normal circumstances.However, under normal circumstances, ddos attack generation is also had, existing In technology, generally only carries out deception packet check module, destroys packet check module, and in the technical scheme, in order to the greatest extent may be used Energy avoids ddos attack.
Following embodiment then passes through exception to after carrying out deception packet check module, destroying packet check modular filtration The specific embodiment of packet check module shield ddos attack.The embodiment is with UDPFlooding and ICMPFlooding For.
It about UDPFloodling, is not necessarily to establish the mechanism of connection using udp protocol, sends a large amount of UDP reports to target machine Text.Target machine can devote a tremendous amount of time processing UDP message, these UDP attack messages can not only make the caching for storing UDP message Overflow, and a large amount of network bandwidth can be occupied, target machine can not (or seldom) receive legal UDP message.
Since different hosts sends a large amount of UDP message packets to single host, so having the feelings of udp port occupancy certainly Condition, so the technical program can receive to the unreachable packet in the port of an ICMP.
So the technical program can establish a Hash table to All hosts, it is specifically used to store in the unit time and receives The number of the unreachable packet in the port ICMP.If it exceeds the threshold values of setting, then directly shield corresponding attacker.
About ICMPFloodling, ICMPFlooding is directly carried out to count in the unit time.If it exceeds corresponding Threshold values, then directly respective host is accordingly shielded, although this method is simple, directly effectively.
Therefore, exception message detection module carries out phase if the type of message detected is exception message detection type The counter answered detects whether to be more than threshold value, if it does not exceed the threshold, can also pass through optimal routing policy to the data packet It issues.Threshold value if more than then shields corresponding attacker, or is directly accordingly shielded to respective host.
The deception packet check module destroys any module judgement in packet check module and exception message detection module When the message is above-mentioned attack message, then the attack message is transferred to IDS policy server, that is, abandon the message, and shield Cover the program and/or host for sending the message.
When " deception packet check module ", " destroying packet check module " and " exception message detection module " need to abandon number When according to packet or needing to shield threat host.It calls directly IDS policy server and carries out corresponding threat processing operation.
The specific implementation steps of the IDS policy server include:
The step of abandoning the message, i.e. packet discard includes as follows:
OpenFlow interchanger can disappear the data envelope mounted in PacketIn when not being matched to corresponding flow table In breath, while there is this data packet in local caching in exchange opportunity, and data packet is stored in the buffer, there is a buffer area ID Number, this ID number can be also encapsulated in the buffer_id of PacketIn message, by way of Packetout, simultaneously Buffer_id in Packetout message fills in the buffer area ID for the data packet to be abandoned (in corresponding PacketIn message buffer_id)。
The step of shielding host includes as follows:
OpenFlow protocol streams table structure is as follows:
Packet header domain Counter Movement
The structure in its middle wrapping head domain is:
Include the steps that application program shield including as follows in IDS policy server:
Step 1:Corresponding matching field is filled in the packet header domain of flow table, and by the way that Wildcards mask field is arranged, To obtain shielding attacker or host information.Wherein, if you need to shield attacker, then following is filled in the domain of flow table packet header With field:IP, MAC, VLAN, SwtichDPID, SwtichPort, protocol type and its port numbers etc..If you need to shield host, then It is filled in the domain of flow table packet header:The matching fields such as IP, MAC, VLAN, SwtichDPID, SwtichPort.
Step 2:Flow table action lists are emptied, realize attacker/host data packet discarding.
Step 3:The record value in each Hash table is called, flow table time-out is calculated and is automatically deleted the time.
Step 4:Issue flow table mask program or host.
Therefore, the network of the technical program can be identified effectively and filter out attack package, be can be avoided remote server and disliked Meaning attack.
Embodiment 2
Fig. 3 shows the flow chart of the working method of drug administration monitoring expert system of the invention.
As shown in figure 3, the working method of drug administration monitoring expert system of the invention, includes the following steps:
Step S100, by remotely monitoring whether patient takes medicine;Step S200 sentences the reasonability of patient's medication It is disconnected;Step S300, and according to judging result to remind patient, and/or judging result is sent to doctor's client.
Fig. 4 shows the method flow diagram whether taken medicine in step S100 by remotely monitoring patient.
As shown in figure 4, specifically, it includes as follows for passing through the method that remotely whether monitoring patient takes medicine in the step S100 Step:
Step S110 establishes genius morbi value set.
Step S120 calculates slope function.The measured value for obtaining any acquisition time in collection period, further according to The interval time of the difference of the measured value of measured value acquisition time identical as previous cycle and twice acquisition time calculate Slope function SL (t).
Step S130, building medication judgment formula.It establishes patient according to the slope function SL (t) and whether takes medicine and judge public affairs Formula, i.e.,
IfWhen, then judge that patient does not take medicine;
In formula, exception corresponding to a characteristic value in genius morbi value set when σ 1 does not take medicine for preset patient's single Threshold value, it is describedThe accumulative threshold value of exception corresponding to characteristic value when not taking medicine repeatedly for preset patient, n1 are acquisition total time Number.
Further, further include by the method that remotely whether monitoring patient takes medicine in the step S100:
The calculated result yt of corresponding medication judgment formula is established according to multiple characteristic values in the genius morbi value setm, Establish the judgment formula for being suitable for judging whether medication of multiple characteristic values;
I.e.Then judge that patient does not take medicine;
In formula, the ξ 1 is multiple features exception threshold corresponding to various features value of the preset patient when not taking medicine repeatedly Value, n2 are characterized the quantity of value, and m indicates the type of characteristic value.
Fig. 5 shows the method flow diagram judged in step S200 the reasonability of patient's medication.
As shown in figure 5, specifically, the method judged in the step S200 the reasonability of patient's medication includes such as Lower step:
Step S210 presets relevant parameter, i.e., each acquisition time corresponding to default genius morbi value set is corresponding The standard value of human body indicators parameter.
Step S220, calculating difference calculate the measured value of any acquisition time and the standard value of identical acquisition time Difference functions D (t).
Step S230 establishes patient's medication reasonability judgment formula according to the difference functions D (t), i.e.,
IfThen judge that the taken medicine object of patient is not up to curative effect;
In formula, σ 2 be preset patient medication after not up to curative effect when characteristic value corresponding to outlier threshold,It is pre- If patient's medication after not up to curative effect when characteristic value corresponding to extremely accumulative threshold value of more time points, n1 is acquisition total time Number.
Further, the method judged in the step S200 the reasonability of patient's medication further includes following steps:
The calculating knot of corresponding medication reasonability judgment formula is established according to multiple characteristic values in the genius morbi value set Fruit yrm, that establishes multiple characteristic values is suitable for judging the rational formula of patient's medication;
I.e.Then judge that patient's medication is not up to curative effect;
In formula, the ξ 2 is multiple features corresponding to various features value when being not up to curative effect after default patient repeatedly take medicine Outlier threshold, n2 are characterized the quantity of value, and m indicates the type of characteristic value.
For a better understanding of the technical solution of the present invention, it is as follows as specific embodiment to illustrate hypertension.
One, the monitoring characteristic value of hypertensive patient is determined
The characteristic value of hypertensive patient's sign mainly has:Systolic pressure C1, diastolic pressure C2, Related Risk Factors quantity C3, root Genius morbi value set is established according to features described above value, wherein each characteristic value can be indicated with Cm, m indicates the kind of characteristic value Class.The feature of real-time measurement only has 2:Systolic pressure C1, diastolic pressure C2 do not need to measure for Related Risk Factors quantity C3, The parameter of diagnosis typing can be passed through by doctor.
The value of systolic pressure C1 and diastolic pressure C2 are regularly to be obtained by sign measuring terminals (blood pressure instrument) acquisition, and incite somebody to action Characteristic value is transferred in system by long-range intelligence test and reminding medical kit.
According to classification situation (normal, prehypertensive, I grade hypertension, II grades of hypertension, the high blood of III level of hypertension Pressure, simple systolic hypertension and hypertension emergency) and delamination (low danger, middle endanger, is high-risk and very high-risk) determine feature The standard value S1 and S2 of value.
The disease classification of hypertension is completed by table one:
The one hypertension grading table of comparisons of table
The disease layering of hypertension is completed by table two:
Two hypertension of table is layered the table of comparisons
Normal Diagnosis value after common medication
The normal value table of hypertension after the effectively medication of table three
According to table 3, characteristic value systolic pressure C is determined1, diastolic pressure C2Corresponding standard value S1=130 or S1=140 or S1= 150, S2=90 or S1=80.
Risk factor relevant to hypertension is mainly related with following medical history:Diabetes, obesity, homocysteine Mass formed by blood stasis hyperlipidemia, atherosclerosis, gout, nephrosis, family of stroke, smokes, drinks, heart disease family history etc..C3's takes Value is equal to current patient quantity shared in disease defined above, and when this value is changed, then C3 also changes. According to features of hypertension, the corresponding standard value S3=0 of Related Risk Factors quantity C3 is taken.
Two, determine that characteristic value measures frequency
The characteristics of according to human body, the blood pressure peak value of people appear in 10 points of the morning or so (t1) and mid-afternoon (t2), The blood pressure low peak of people appears in 1:00 AM or so (t3), because 1:00 AM is the sleeping time of people, thus with (t4) before sleeping The double measurement of (t5) substitutes after getting up with morning.
Judge whether a people has hypertension, general recommendations measures at t1 and t2 time point;And judge having for medication Effect property generally measures (t0) in the set time of every day.
In conclusion the feature of hypertension can be measured in t0, t1, t2, t4, t5.
Three, characteristic value slope function generates
For each characteristic index, slope function is generated:
SL1 (t)=(T1 (t)-T1 (t0))/(t-t0)
SL2 (t)=(T2 (t)-T2 (t0))/(t-t0)
Wherein t0 represents the previous day same time of measuring point, because according to the undulating value in one day of human blood-pressure, The measurement of same period just has comparative sense.
This two functions are also the point of series of discrete on two-dimensional coordinate, and consecutive points are connected with straight line, then also constituted Two line charts.
Four, characteristic value difference functions generate
In t0, t1, t2, t4, t5, totally 5 times measure the systolic pressure and diastolic pressure of blood pressure daily.
Systolic pressure is labeled as function T1 (t), and the measurement point at daily 5 time points is discrete point:T10、T11、T12、T14、 T15
Diastolic pressure is labeled as function T2 (t), and the measurement point at daily 5 time points is discrete point:T20、T21、T22、T24、 T25
Construct the difference functions of systolic pressure:
D1 (t)=T1 (t)-S1, wherein t=0,1,2,4,5
D2 (t)=T2 (t)-S2, wherein t=0,1,2,4,5
This two functions constitute multiple with discrete point on two-dimensional coordinate, and consecutive points straight line, which connects, then constitutes two foldings Line.
Five, the generation of anomaly parameter threshold value
In calculating below, need to use 4 important threshold parameters:σ1,σ2、
Outlier threshold corresponding to a characteristic value in genius morbi value set when σ 1 does not take medicine for preset patient's single, It is describedThe accumulative threshold value of exception corresponding to characteristic value when not taking medicine repeatedly for preset patient, by being surveyed to high blood pressure disease Examination is it can be concluded that empirical value, the σ 1=0.3 π of π → 0.5,Accuracy is relatively high.
Outlier threshold corresponding to characteristic value when σ 2 is is not up to curative effect after preset patient medication (can also be referred to as Disease reasonability anomaly parameter threshold value),When more corresponding to characteristic value when being not up to curative effect after taking medicine for preset patient Between put abnormal accumulative threshold value (disease reasonability outlier threshold can also be referred to as), by high blood pressure disease test it can be concluded that Empirical value, 2=10 → 20 σ,Accuracy is relatively high.
Six, characteristic value whether medication function generates, i.e. whether patient takes medicine judgment formula
Seven, the generation of characteristic value rational function, i.e. patient medication reasonability judgment formula
Eight, the calculated result of corresponding medication judgment formula is established according to multiple characteristic values in the genius morbi value set, Establish the judgment formula for being suitable for judging whether medication of multiple characteristic values;
The ξ 1 is multiple features outlier threshold corresponding to various features value of the preset patient when not taking medicine repeatedly, with It is that 5-8 is more reasonable according to the value of the test to hypertension.2 are characterized the quantity of value.
Nine, the calculating of corresponding medication reasonability judgment formula is established according to multiple characteristic values in the genius morbi value set As a result yrm, that establishes multiple characteristic values is suitable for judging the rational formula of patient's medication;
Wherein the ξ 2 is multiple features corresponding to various features value when being not up to curative effect after default patient repeatedly takes medicine Outlier threshold, with being that 5-8 is more reasonable according to the test of the hypertension value.
Ten, establish that drug is mixed to be taken safety and correspond to table.
The working method of drug administration monitoring expert system further includes:
Establish that drug is mixed to be taken safety and correspond to table, that is, each unit item in the table respectively with the pharmacology information phase of each drug It is corresponding, comparison of tabling look-up successively is carried out by the pharmacology information of the table each drug to be taken to patient, to judge that each drug is mixed clothes Safety.
Specifically, have between various drugs in system it is mixed take safety and correspond to table, can be with B matrix come table Show:
B matrix table is shown with the conflict test table of n kind drug, wherein:bij(i, j=1,2,, n) indicates i-th kind of drug and the In j:The conflicting of the mixed clothes of kind drug is 1 if do not conflicted, and having conflict then is 0.Since drug itself is incompatible, then It can be seen that bmm=1, i.e. diagonal line is 1, i.e., as follows
Assuming that certain patient takes m kind drug, then:
Judge that drug is mixed and takes security test.
Further, the drug it is mixed take safety and correspond to table further include:The taboo drug of a certain disease compares sublist, i.e., should Each unit item in table is corresponding with the pharmacology information of each taboo drug of the disease respectively, to the mixed clothes safety of the drug Property correspond to after table tabled look-up, then successively carried out by the pharmacology information that taboo drug compares the sublist each drug to be taken to patient It tables look-up comparison, to judge the drug to the disease safety.
Specifically, there being a disease taboo drug reference table in systems, can be indicated with T series vector:
The drug table of T series vector expression hypertension taboo, vector T m (m=1,2,, n) it indicates to be prohibited marked as m disease It takes medicine object table, wherein tmi.(i=1,2 ... nm) indicate the prohibited clothes of m disease certain drug.
Assuming that certain patient has x kind complication, y kind drug is currently taken, then:
Judge hypertension and complication medicine taboo security test.
As a kind of optional embodiment of the present embodiment, monitor whether patient takes medicine by remote server, and/or The reasonability of patient's medication is judged.
Fig. 6 shows the functional block diagram of this remote server.
As shown in Figure 6, wherein the remote server uses SDN network framework;The SDN network framework includes:Data Plane, using plane and control plane;Data plane, when detecting that attack threatens positioned at any IDS equipment in data plane, Notice enters attack type analysis process using plane;Using plane, for analyzing attack type, and according to attack The corresponding attack of type customization threatens processing strategie;Plane is controlled, threatens Processing Interface to provide attack using plane, and be number Attack threat identification interface is provided according to plane.
The attack threatens:DDOS attack threatens.
Wherein, SDN is software defined network.
Processing strategie, the attack prison of data plane are threatened about attack type analysis, attack using plane in Fig. 6 It surveys, attack threat shielding and routing optimality, and control the attack threat processing of plane, attack threat identification in embodiment 1 Middle expansion explanation, which is not described herein again.
Judging whether patient takes medicine in above-described embodiment, and/or to patient medication it is rational during, in advance Cicada patient illnesses and it is required take drugs information, which can be obtained by multiple channel, such as be led to by patient Intelligent medicine box is crossed to be inputted (input mode can be inputted using key-press input and speech recognition), or by remote server from It is obtained in medical diagnostic system.
It should be understood that above-mentioned specific embodiment of the invention is used only for exemplary illustration or explains of the invention Principle, but not to limit the present invention.Therefore, that is done without departing from the spirit and scope of the present invention is any Modification, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.In addition, appended claims purport of the present invention Covering the whole variations fallen into attached claim scope and boundary or this range and the equivalent form on boundary and is repairing Change example.

Claims (5)

1. a kind of working method of drug administration monitoring expert system, which is characterized in that including:Intelligent medicine box, sign measurement are eventually End and remote server;Wherein the sign measuring terminals send out the measured value of the patient sign of acquisition by wireless signal It send to intelligent medicine box, the intelligent medicine box is suitable for for measured value being uploaded to remote server, and the remote server passes through built-in Drug administration judgment module realize monitoring patient whether take medicine, and to patient medication reasonability judge, and will judgement As a result it is sent to intelligent medicine box;And the reminding module by setting in intelligent medicine box reminds patient;And judging result is sent to doctor Raw client;
Network attack defense module is equipped in the remote server, which includes:Controller, IDS determine Plan server, flow cleaning center and distributed IDS equipment;
When any IDS equipment detects the message with ddos attack feature, i.e., IDS is reported to by SSL traffic channel and determined Plan server;
The IDS policy server makes processing plan corresponding with having the message of ddos attack feature according to information is reported Slightly, then the message is shielded by controller;
Include in the IDS equipment:
Packet check module is cheated, the deceptive practices of link layer and internet layer address are detected;
Packet check module is destroyed, the abnormal behaviour that internetwork layer and transport layer flag bit are arranged detects;
Exception message detection module detects the formula attack that floods of application layer and transport layer;
By the deception packet check module, packet check module, exception message detection module are destroyed successively to message progress Detection;And if the message is transferred to IDS policy server there are when respective behavior by any detection module detection outgoing packet;
The IDS policy server is suitable for having deceptive practices when message, and attacks and threaten in the domain OpenFlow, then passes through control Device processed shields host;
The IDS policy server is further adapted for having abnormal behaviour when message, then is shielded by controller to attacker; And
When message has the formula attack that floods, then the IDS policy server will be corresponding to the message suitable for passing through controller Interchanger access interface flow be redirected to flow cleaning center and be filtered.
2. working method according to claim 1, which is characterized in that the work side of the drug administration monitoring expert system Method includes the following steps:
Step S100, by remotely monitoring whether patient takes medicine;
Step S200 judges the reasonability of patient's medication;
Step S300, and according to judging result to remind patient, and judging result is sent to doctor's client;
Included the following steps in the step S100 by the method that remotely whether monitoring patient takes medicine:
Step S110 establishes genius morbi value set;
Step S120 obtains the measured value of any acquisition time in collection period, further according to the measured value and the last week The interval time of the difference of the measured value of phase identical acquisition time and twice acquisition time calculate slope function SL (t);
Whether step S130 establishes patient according to the slope function SL (t) and takes medicine judgment formula, i.e.,
If yt>When 1, then judge that patient does not take medicine;T is any acquisition time in a collection period;
In formula, abnormal threshold corresponding to a characteristic value in genius morbi value set when σ 1 does not take medicine for preset patient's single Value, it is describedThe accumulative threshold value of exception corresponding to 1 characteristic value when not taking medicine repeatedly for preset patient, n1 is that acquisition is total secondary Number;
Further include by the method that remotely whether monitoring patient takes medicine in the step S100:
The calculated result yt of corresponding medication judgment formula is established according to multiple characteristic values in the genius morbi value setm(t), build The judgment formula for being suitable for judging whether medication of vertical multiple characteristic values;
I.e., then judge that patient does not take medicine;
It is described in formula1 is multiple features outlier threshold corresponding to various features value of the preset patient when not taking medicine repeatedly, N2 is characterized the quantity of value, and m indicates the type of characteristic value.
3. working method according to claim 2, which is characterized in that the reasonability of patient's medication in the step S200 The method judged includes the following steps:
Step S210 presets the standard of the corresponding human body indicators parameter of each acquisition time corresponding to genius morbi value set Value;
Step S220 calculates the measured value of any acquisition time and the difference functions D of the standard value of identical acquisition time (t);
Step S230 establishes patient's medication reasonability judgment formula according to the difference functions D (t), i.e.,
y2t=, if y2t>, then judge that the taken medicine object of patient is not up to curative effect;
In formula, σ 2 be preset patient medication after not up to curative effect when characteristic value corresponding to outlier threshold,It is preset Extremely accumulative threshold value of more time points corresponding to characteristic value when being not up to curative effect after patient's medication.
4. working method according to claim 2, which is characterized in that the reasonability of patient's medication in the step S200 The method judged further includes following steps:
The calculated result yr of corresponding medication reasonability judgment formula is established according to multiple characteristic values in the genius morbi value setm (t), that establishes multiple characteristic values is suitable for judging the rational formula of patient's medication;
I.e., then judge that patient's medication is not up to curative effect;
It is described in formula2 be after default patient repeatedly take medicine not up to curative effect when various features value corresponding to multiple features exception Threshold value;
The working method of drug administration monitoring expert system further includes:
Establish that drug is mixed to be taken safety and correspond to table, that is, each unit item in the table is corresponding with the pharmacology information of each drug respectively, Comparison of tabling look-up successively is carried out by the pharmacology information of the table each drug to be taken to patient, to judge the safety of the mixed clothes of each drug Property;
The drug is mixed to be taken safety and corresponds to table and further include:The taboo drug of a certain disease compares sublist, i.e. the taboo drug pair It is corresponding with the pharmacology information of each taboo drug of the disease respectively according to each unit item in sublist, to the mixed clothes of the drug Safety corresponds to after table tabled look-up, then compares the pharmacology information of the sublist each drug to be taken to patient successively by taboo drug Comparison of tabling look-up is carried out, to judge the drug to the disease safety;
It monitors whether patient takes medicine by remote server, and the reasonability of patient's medication is judged.
5. a kind of remote server SDN network framework, which is characterized in that including:Data plane is put down using plane and control Face;
Data plane detects that notice is entered using plane and attacked when attacking threat when being located at any IDS equipment in data plane Hit type analysis process;
Using plane, for analyzing attack type, and corresponding attack is customized according to attack type and threatens processing strategie;
Plane is controlled, threatens Processing Interface to provide attack using plane, and provide attack threat identification interface for data plane;
The drug is mixed to be taken safety and corresponds to table with B matrix to indicate:
B matrix table is shown with the conflict test table of n kind drug, wherein:, indicate that i-th kind of drug and jth kind drug mix clothes Conflicting, i, j=1,2 ... n are 1 if do not conflicted, and having conflict then is 0;If drug itself is incompatible,Arbitrary value in=1, m i, j;I.e. diagonal line is 1, i.e., as follows
Assuming that certain patient takes k kind drug, then:
Judge that drug is mixed and takes security test;
If, then medication object safety is mixed, it is dangerous otherwise to mix medication object.
CN201810796904.8A 2014-12-31 2014-12-31 The drug administration monitoring expert system and working method of network malicious attack can be resisted Pending CN108877883A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810796904.8A CN108877883A (en) 2014-12-31 2014-12-31 The drug administration monitoring expert system and working method of network malicious attack can be resisted

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410854293.XA CN104965966B (en) 2014-12-31 2014-12-31 Drug administration monitors expert system and its working method
CN201810796904.8A CN108877883A (en) 2014-12-31 2014-12-31 The drug administration monitoring expert system and working method of network malicious attack can be resisted

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201410854293.XA Division CN104965966B (en) 2014-12-31 2014-12-31 Drug administration monitors expert system and its working method

Publications (1)

Publication Number Publication Date
CN108877883A true CN108877883A (en) 2018-11-23

Family

ID=54220004

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201810796904.8A Pending CN108877883A (en) 2014-12-31 2014-12-31 The drug administration monitoring expert system and working method of network malicious attack can be resisted
CN201810798284.1A Pending CN108573746A (en) 2014-12-31 2014-12-31 A kind of drug administration monitoring expert system
CN201410854293.XA Expired - Fee Related CN104965966B (en) 2014-12-31 2014-12-31 Drug administration monitors expert system and its working method

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN201810798284.1A Pending CN108573746A (en) 2014-12-31 2014-12-31 A kind of drug administration monitoring expert system
CN201410854293.XA Expired - Fee Related CN104965966B (en) 2014-12-31 2014-12-31 Drug administration monitors expert system and its working method

Country Status (1)

Country Link
CN (3) CN108877883A (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106726601A (en) * 2016-12-02 2017-05-31 重庆软汇科技股份有限公司 Intelligent medicine box system
CN107506588A (en) * 2017-08-25 2017-12-22 中国联合网络通信集团有限公司 Sufferer eats medicine information distributing method and system
CN108272642A (en) * 2018-01-25 2018-07-13 守望科技(北京)有限公司 A kind of intelligent medicine box system and medication based reminding method
JP7346868B2 (en) * 2019-03-25 2023-09-20 オムロンヘルスケア株式会社 Medication status management device, method and program
JP7322450B2 (en) * 2019-03-25 2023-08-08 オムロンヘルスケア株式会社 Medication support information providing device, method and program
CN110444266A (en) * 2019-07-01 2019-11-12 江苏环亚医用科技集团股份有限公司 A kind of medication management method and apparatus based on diseases monitoring
CN110459311B (en) * 2019-08-28 2022-02-25 首都医科大学 Medicine taking reminding system and method for remotely monitoring medicine taking of patient
CN110739038B (en) * 2019-10-12 2022-08-19 深圳市宝安区人民医院 Medicine distribution system based on medical advice

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102487339A (en) * 2010-12-01 2012-06-06 中兴通讯股份有限公司 Attack preventing method for network equipment and device
CN103473625A (en) * 2013-08-16 2013-12-25 上海华美络信息技术有限公司 Chronic disease management system
CN103561011A (en) * 2013-10-28 2014-02-05 中国科学院信息工程研究所 Method and system for preventing blind DDoS attacks on SDN controllers
CN104188806A (en) * 2014-09-18 2014-12-10 常州金智涯医疗科技有限公司 Medicine reminder system for patients

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2389153B1 (en) * 2009-01-23 2014-03-12 Koninklijke Philips N.V. Method and apparatus for dispensing medication
CN102609626A (en) * 2012-03-14 2012-07-25 复旦大学 Intelligent medical service system based on RFID (radio frequency identification devices) and CDM (code division multiplex) technologies
CN102855406B (en) * 2012-09-14 2016-06-01 重庆市科学技术研究院 Based on the intelligent medicine purchase system of tele-medicine system and the monitoring of the doctor's advice property deferred to

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102487339A (en) * 2010-12-01 2012-06-06 中兴通讯股份有限公司 Attack preventing method for network equipment and device
CN103473625A (en) * 2013-08-16 2013-12-25 上海华美络信息技术有限公司 Chronic disease management system
CN103561011A (en) * 2013-10-28 2014-02-05 中国科学院信息工程研究所 Method and system for preventing blind DDoS attacks on SDN controllers
CN104188806A (en) * 2014-09-18 2014-12-10 常州金智涯医疗科技有限公司 Medicine reminder system for patients

Also Published As

Publication number Publication date
CN108573746A (en) 2018-09-25
CN104965966B (en) 2018-08-21
CN104965966A (en) 2015-10-07

Similar Documents

Publication Publication Date Title
CN104965966B (en) Drug administration monitors expert system and its working method
CN104966256A (en) Chronic disease medicine-taking monitoring expert system and working method thereof
Kabir et al. The impact of information spreading on epidemic vaccination game dynamics in a heterogeneous complex network-a theoretical approach
CN105796112B (en) Falls Among Old People detects monitor system
CN104539625B (en) Network security defense system based on software definition and working method thereof
Barakah et al. A survey of challenges and applications of wireless body area network (WBAN) and role of a virtual doctor server in existing architecture
CN105100181A (en) Monitoring system based on big data and working method thereof
CN110477925A (en) A kind of fall detection for home for the aged old man and method for early warning and system
CN110247928A (en) A kind of mimicry interchanger safe traffic control device and method
WO2000079466A2 (en) Telemedical expert service provision for intensive care units
WO2020224041A1 (en) Wearable device-based smart real-time health monitoring system, and implementation method therefor
CN102713912A (en) Method and apparatus for displaying data from medical devices
CN107040544A (en) A kind of intrusion detection method based on flow, apparatus and system
Chen et al. Cellular phone based online ECG processing for ambulatory and continuous detection
US20190098101A1 (en) Method and apparatus for modifying behavior of a user via a network
CN104967649B (en) Drug intelligently takes expert system and remote server
CN109582835A (en) Intelligent article management method and system
CN107169297A (en) A kind of health monitoring system based on home and community
Hassan et al. Integration of internet of things (IoT) in health care industry: an overview of benefits, challenges, and applications
CN104966255A (en) Intelligent medicine-taking expert system and work method thereof
Saleh et al. Privacy preservation for wireless sensor networks in healthcare: State of the art, and open research challenges
Navarro et al. Medical MoteCare: A distributed personal healthcare monitoring system
CN105991623A (en) Service interconnection relation auditing method and system
CN104966257A (en) Intelligent medicine-taking monitoring method and remote monitoring system
CN109166609B (en) Nursing data sharing method based on Internet of Things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123

RJ01 Rejection of invention patent application after publication