CN109033873B - Data desensitization method for preventing privacy leakage - Google Patents

Data desensitization method for preventing privacy leakage Download PDF

Info

Publication number
CN109033873B
CN109033873B CN201810796961.6A CN201810796961A CN109033873B CN 109033873 B CN109033873 B CN 109033873B CN 201810796961 A CN201810796961 A CN 201810796961A CN 109033873 B CN109033873 B CN 109033873B
Authority
CN
China
Prior art keywords
data
association
database
tables
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810796961.6A
Other languages
Chinese (zh)
Other versions
CN109033873A (en
Inventor
刘贤洪
贾宗华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Intelligent Health Technology Co ltd
Original Assignee
Sichuan Changhong Intelligent Health Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Intelligent Health Technology Co ltd filed Critical Sichuan Changhong Intelligent Health Technology Co ltd
Priority to CN201810796961.6A priority Critical patent/CN109033873B/en
Publication of CN109033873A publication Critical patent/CN109033873A/en
Application granted granted Critical
Publication of CN109033873B publication Critical patent/CN109033873B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Epidemiology (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to the field of big data and discloses a data desensitization method for preventing privacy leakage. The method specifically comprises the following steps: removing the explicit association according to the same index field among different data tables of the database; defining a cryptography function aiming at index fields among the data tables, and processing the associated ID; and calculating the associated ID value according to the cryptography function, and performing data access after writing the associated ID value. The technical scheme of the invention mainly adopts the cryptology thought to perform algorithm processing on the associated fields among the data tables and remove the strong associated coupling between different tables and different data of the database and the user information, so that even under the condition of acquiring the super authority of the user database, the association among the data and the information cannot be known, and the obtained data and the user cannot confirm the relationship, thereby realizing the privacy protection of the data. The method can effectively prevent privacy leakage caused by direct access of the database due to platform attack, ghost and the like.

Description

Data desensitization method for preventing privacy leakage
Technical Field
The invention relates to the field of big data, in particular to a data desensitization method for preventing privacy leakage.
Background
With the development of intellectualization and networking, the information era is the data acquisition era. The purposeful collection, arrangement, processing, analysis and utilization of data are obvious characteristics of the big data era.
The data acquisition mode can be automatically acquired by a sensor, can be automatically acquired by intelligent equipment, and can also be performed by mode backgrounds such as app and user browsing webpages. The content of data collection at present relates to the aspects of individuals. Data has become the cornerstone of all our information applications. The data acquisition brings great convenience for individuals on the one hand, and brings potential privacy leakage risks at the same time.
In the field of medical health, the digital hospital age based on electronic medical records is basically realized at present. The informatization of hospitals forms a highly integrated hospital information management system based on electronic medical records and centered on patient information. The electronic medical record is an important clinical information resource which is necessary for modern medical institutions to carry out efficient and high-quality clinical diagnosis, scientific research and medical management work, and is also a main information source of resident health files. The standardized electronic medical record and the construction of a new generation hospital information system taking the standardized electronic medical record as a core are the premise basis for realizing the clinical information sharing and the interconnection and intercommunication and the cooperative service of medical institutions in the regional range by taking resident individuals as mainlines, can ensure that the health files of residents are 'output active and data', can also help to implement and standardize clinical paths, realize the supervision of medical processes and improve the medical treatment level and the emergency command capability. A standard electronic medical record system or similar medical informatization system includes a very large amount of user information, including:
(1) patient basic information. Such as demographic information, socioeconomic information, relatives information, social security information, and biological information
(2) Basic health information. Including the current medical history, the past medical history, the immunization history, the allergy history, the menstruation history, the family history, the disability condition and the like
(3) A summary of the hygiene events. Including the servicing activities that occur over the patient's past medical facility visits.
(4) Expense record
(5) And (5) recording the outpatient and emergency diagnosis and treatment. Comprises the hospitalization records of the outpatient medical record, the outpatient prescription, the examination and examination record and the like (6). Including medical record, medical advice, treatment record, nursing record, etc
(7) And recording the health physical examination. A routine physical examination record which mainly aims at health monitoring and preventive health care.
The data are generally collected by related mechanisms and stored in related data centers in a database mode and the like, so that powerful support is provided for future treatment, prevention, health care and the like of users, and data support is provided for scientific research, decision support and the like of hospitals. Data provides convenience to patients and medical institutions, and also poses the risk of privacy leakage for patients or users. For example, the medical information database includes privacy information such as user contact information, identification cards, addresses, family members, etc., and also includes some sensitive privacy information of personal health of the user, such as HIV, hepatitis, etc., which will have a great influence on the user.
Data or privacy disclosure involves three main approaches: 1. personal devices, passwords, etc. are lost, resulting in personal information leakage. For example, if a personal mobile phone is lost, or a password of an app is lost, a third party enters the app after acquiring the password, so that personal information is leaked; 2. platform, data, etc. intrusions result in large volumes of data leakage. The existing data center, information system, etc. are all communicated with the network, once an external invader enters a platform and a system, the external invader can easily export, even copy and remove database files in batches, and steal user information; 3. and (4) carrying out ghost stealing. Internal network managers, operation and maintenance personnel, database managers, third-party system developers and the like can easily contact the database, and become an important threat of leakage.
In the existing database, the information of general users is stored in a sub-table mode, and different tables are associated through a certain field. To ensure that the database is copied and accessed without data leakage, the best method is to encrypt the database, but after the database is encrypted, new problems are caused, such as incapability of quick retrieval, data statistical analysis, and data mining, which further cause a great reduction in the access speed of the database and an increase in additional deployment cost.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: in response to the above-identified problems, a data desensitization method for preventing privacy disclosure is provided.
The technical scheme adopted by the invention is as follows: a data desensitization method for preventing privacy leakage specifically comprises the following processes: step 1, removing explicit association according to the same index field among different data tables of a database; step 2, defining a cryptography function aiming at the index fields among the data tables, and processing the associated ID; and 3, calculating the association ID value according to the cryptography function, and performing data access after writing the association ID value.
Further, the specific process of step 1 is as follows: step 11, index association is carried out through the same index fields of different data tables of the database; and step 12, respectively defining the same index fields among different databases to ensure that the index field values among different tables are completely different.
Further, the specific process of step 2 is as follows: step 21, defining a cryptographic function ID ═ f (M1, M2 … Mn, R, … Key) for the index field between the data tables; the ID is an index association ID of the table, M1 and M2, Mn is data characteristics related to a user, R is a random number, Key is a Key selected for the operation, and f is an encryption function or a one-way hash algorithm of a finite field; and step 22, calculating a cryptographic function to ensure that the index field of each data table is completely different from the index field value of the data table.
Further, the specific process of step 3 is as follows: step 31, during forward query, calculating a correlation ID value according to a cryptographic function ID ═ f (M1, M2 … Mn, R, … Key); step 32, writing the calculated associated ID value as the index field value of the data table; and step 33, performing data access and reversely inquiring the required data characteristics.
Compared with the prior art, the beneficial effects of adopting the technical scheme are as follows:
(1) the technical scheme of the invention mainly adopts the cryptology thought to perform algorithm processing on the associated fields among the data tables and remove the strong associated coupling between different tables and different data of the database and the user information, so that even under the condition of acquiring the super authority of the user database, the association among the data and the information cannot be known, and the obtained data and the user cannot confirm the relationship, thereby realizing the privacy protection of the data. The method can effectively prevent privacy leakage caused by direct access of the database due to platform attack, ghost and the like.
(2) The method can prevent private data from being leaked, and meanwhile, the method has no influence on data mining and use, realizes balance between safety and performance and data utilization, and simultaneously meets the requirements of data mining, modeling, statistical analysis, artificial intelligence, decision support and other big data applications. The balance of safety protection and data use is achieved.
(3) The method is suitable for all fields related to user data acquisition, including medical health, electronic commerce, mobile application, internet service and the like.
Detailed Description
The present invention will be further described with reference to the following examples.
The structure of the database has a great influence on the performance and efficiency of the database, especially in the case of a very large amount of data. An application database, or data center, typically includes several data tables, each of which is made up of several different fields, with associations between tables, typically being made through certain fields or foreign keys. For example, a hospital health record database, which includes 4 data tables (a real database has several tables, which are only illustrated by simple contents), data table 1 is a basic information table including ID numbers, nicknames, names, identification numbers, etc. of persons, and data table 2 is a contact list recording mobile phone numbers, e-mails, home addresses, and other data related to home privacy. The data table 3 is a personal profile file table, and records the medical card number, blood type, allergy history, chronic disease, infectious disease and other history conditions of the user. The data table 4 is a physical examination table, and data which needs to be emphasized and kept secret, such as HIV screening, hepatitis B screening and the like of a user, are stored in the physical examination table. The data table 1 can be associated with the contact information, address, etc. of the user's individual and family in table 2 by the person ID (defined as RY _ ID), can be associated with the health record in table 3 of the user by the ID to acquire the history medical history, family history, etc. of the user, and can be acquired by the record ID (defined as DA _ ID) in table 3 to acquire the physical examination table of the user in table 4. If a person normally or abnormally obtains the access authority of the database, all privacy information of the user in the data table can be obtained through the method, and potential harm is caused to the leakage of the user privacy. However, if we remove the associated ID (personnel ID, file ID, etc.) in the data table, the data becomes irrelevant, and only pure data irrelevant to a certain person is used, so that even if the data is leaked, privacy can not be leaked, and meanwhile, the data can still be utilized normally.
A data desensitization method for preventing privacy leakage specifically comprises the following processes:
step 1, removing explicit association according to the same index field among different data tables of a database;
wherein, the specific process of the step 1 is as follows: step 11, index association is carried out through the same index fields of different data tables of the database; the data table 1 and the data table 2 are indexed and associated through RY _ ID, namely RY _ ID of the data table 1 and RY _ ID of the data table 2 are the same, and association between basic information and contact information is performed through the same ID to form complete information. Similarly, the same mechanism is used for index association between the data tables 1 and 2, between the data tables 2 and 3, and between the data tables 3 and 4; and step 12, respectively defining the same index fields among different databases, so that the index field values among different tables are completely different and irregularly circulated. RY _ ID of Table 2 is defined as RY _ ID2, RY _ ID of Table 3 is RY _ ID3, DA _ ID of Table 4 is DA _ ID4 (even defined as field names whose names are totally unrelated), and their corresponding values are redefined, i.e., RY _ ID ≠ RY _ ID2 ≠ RY _ ID3, DA _ ID ≠ DA _ ID 4.
Step 2, defining a cryptography function aiming at the index fields among the data tables, and processing the associated ID;
the specific process of the step 2 is as follows: step 21, defining a cryptographic function ID ═ f (M1, M2 … Mn, R, … Key) for the index field between the data tables. The ID is an index association ID of the table, and M1 and M2, the Mn is data characteristics related to the user and can be used as information of identity characteristics, or data characteristics related to the user information of the index table, such as information of name, identity card, social security card and the like, or the ID, the number and the content of M of the user, and can be flexibly selected according to needs; r is a random number, is optional, and can ensure that the ID numbers of all records of the same user are different after the use; key is a Key selected for the operation, and is selectable; f is an encryption function or a one-way hash algorithm of a finite field, and if the forward connection of the data table is considered, and the reverse direction is not supported, the hash function can be used; if forward and reverse connection indices are to be considered, symmetric or asymmetric encryption algorithms may be chosen, such as AES, SM4, RSA, ECC, etc. And step 22, calculating a cryptographic function to ensure that the index field of each data table is completely different from the index field value of the data table. Under the condition of increasing random numbers, different data records of the user also have no relation at all, and under the condition of not mastering keys and algorithms, anyone can not directly analyze and obtain the related information of the user through the data of the database.
And 3, calculating the association ID value according to the cryptography function, and performing data access after writing the association ID value.
Wherein, the specific process of the step 3 is as follows: step 31, during forward query, according to the cryptographic function
ID=f(M1、M2…Mn、R、…Key),
That is, the associate ID value is calculated according to the known conditions M1, M2 … Mn, R, … Key. And step 32, writing the calculated association ID value as the index field value of the data table. In step 33, if a record is known and data access is to be performed, and whose data is to be checked, then (M1, M2 … Mn, R) ═ f can be used-1(ID, Key), calculate the Key word M, use M to confirm and inquire.
Taking data table 2 as an example, taking the data in table 2 as an example for access: let us define an index function of
RY_ID2=f(XM\\SFZHM、Key)
If f is AES algorithm and \ \ is character combination operation, we want to search a person of Zhang III, 51013019560704341, and his ID is
RY _ ID2 ═ AES (zhangsan 51013019560704341, Key)
The obtained value RY _ ID2 is written in the data table 2. In the forward query, the data RY _ ID2 of the user can be obtained by the same calculation. When the user inquires the data of whom reversely, only AES (RY _ ID2, Key) needs to be calculated, and the user information is zhang san 5101301956070434.
By using the technical scheme of the embodiment, the associated information of the database is removed, so that the irrelevance between the user information and the user data can be ensured, and the purpose of protecting the privacy of the user can be achieved under the condition that the data of the extreme end is leaked. Meanwhile, through the selection of the algorithm and the selection of the parameters, the decoupling between the data can be realized according to the requirement, and the recovery of the data information can also be realized. Under the condition of protecting the privacy of the user, technical conditions are provided for the utilization of the data. The method achieves a balance between security and data utilization.
The invention is not limited to the foregoing embodiments. The invention extends to any novel feature or any novel combination of features disclosed in this specification and any novel method or process steps or any novel combination of features disclosed. Those skilled in the art to which the invention pertains will appreciate that insubstantial changes or modifications can be made without departing from the spirit of the invention as defined by the appended claims.

Claims (2)

1. A data desensitization method for preventing privacy disclosure is characterized by specifically comprising the following processes: step 1, removing explicit association according to the same index field among different data tables of a database; step 2, defining a cryptographic function aiming at the index field between the data tables after the explicit association is removed, and processing the association ID; step 3, calculating an association ID value according to a cryptography function, and performing data access after the association ID value is written in;
the specific process of the step 1 is as follows: step 11, index association is carried out through the same index fields of different data tables of the database; step 12, defining the same index fields among different databases respectively, so that the index field values among different tables are completely different;
the specific process of the step 2 is as follows: step 21, defining a cryptographic function ID ═ f (M1, M2 … Mn, R, … Key) for the index field between the data tables; the ID is an index association ID of the table, M1 and M2, Mn is data characteristics related to a user, R is a random number, Key is a Key selected for the operation, and f is an encryption function or a one-way hash algorithm of a finite field; and step 22, calculating a cryptographic function to ensure that the index field of each data table is completely different from the index field value of the data table.
2. The data desensitization method according to claim 1, wherein, at the time of forward query, the association ID value is calculated according to a cryptographic function ID ═ f (M1, M2 … Mn, R, … Key), step 31; step 32, writing the calculated associated ID value as the index field value of the data table; and step 33, performing data access and reversely inquiring the required data characteristics.
CN201810796961.6A 2018-07-19 2018-07-19 Data desensitization method for preventing privacy leakage Active CN109033873B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810796961.6A CN109033873B (en) 2018-07-19 2018-07-19 Data desensitization method for preventing privacy leakage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810796961.6A CN109033873B (en) 2018-07-19 2018-07-19 Data desensitization method for preventing privacy leakage

Publications (2)

Publication Number Publication Date
CN109033873A CN109033873A (en) 2018-12-18
CN109033873B true CN109033873B (en) 2020-11-17

Family

ID=64643590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810796961.6A Active CN109033873B (en) 2018-07-19 2018-07-19 Data desensitization method for preventing privacy leakage

Country Status (1)

Country Link
CN (1) CN109033873B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111382459B (en) * 2018-12-27 2022-05-17 财团法人工业技术研究院 Private data integration method and server
CN109918430B (en) * 2019-01-22 2022-09-23 中国人民解放军战略支援部队信息工程大学 5G user data disassociation storage system and access method
CN110138792B (en) * 2019-05-21 2020-01-14 上海市疾病预防控制中心 Public health geographic data privacy removal processing method and system
CN111711674B (en) * 2020-06-05 2023-03-14 华南师范大学 Cloud computing method based on Internet of things
CN111859438A (en) * 2020-07-31 2020-10-30 上海观安信息技术股份有限公司 Reversible desensitization encryption algorithm with specified length
CN112541193B (en) * 2020-12-10 2024-05-24 支付宝(杭州)信息技术有限公司 Protection method and device for private data
CN113257375A (en) * 2021-05-12 2021-08-13 中国疾病预防控制中心病毒病预防控制所 Method for desensitizing sudden acute infectious disease data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504668A (en) * 2009-03-24 2009-08-12 北京理工大学 Cryptograph index supported database transparent encryption method
CN102243630A (en) * 2010-05-12 2011-11-16 北京安华金和科技有限公司 Method for establishing database cipher text indexes without partial ordering relation
CN106874401A (en) * 2016-12-30 2017-06-20 中安威士(北京)科技有限公司 A kind of ciphertext index method of data base-oriented encrypted fields fuzzy search
CN106934030A (en) * 2016-12-08 2017-07-07 戴林 The ciphertext index method and Ku Nei encryption systems of a kind of data base-oriented encryption

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7266699B2 (en) * 2001-08-30 2007-09-04 Application Security, Inc. Cryptographic infrastructure for encrypting a database
US10339336B2 (en) * 2003-06-11 2019-07-02 Oracle International Corporation Method and apparatus for encrypting database columns
US7519835B2 (en) * 2004-05-20 2009-04-14 Safenet, Inc. Encrypted table indexes and searching encrypted tables
TW200802029A (en) * 2005-09-26 2008-01-01 Ingrian Networks Inc System and method for protecting sensitive data in a database
CN101859306B (en) * 2009-04-07 2013-01-23 日电(中国)有限公司 Method and equipment for generating blind index table, and united keyword search method and equipment
CN102594779B (en) * 2011-01-05 2016-03-02 中国移动通信集团公司 A kind of user data processing method and equipment thereof
CN105824825B (en) * 2015-01-06 2019-10-18 中国移动通信集团湖南有限公司 A kind of sensitive data recognition methods and device
CN107145799A (en) * 2017-05-04 2017-09-08 山东浪潮云服务信息科技有限公司 A kind of data desensitization method and device
CN107798253B (en) * 2017-10-31 2020-04-03 新华三大数据技术有限公司 Data desensitization method and device
CN108021822A (en) * 2017-11-30 2018-05-11 广州天鹏计算机科技有限公司 The desensitization method and system of data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504668A (en) * 2009-03-24 2009-08-12 北京理工大学 Cryptograph index supported database transparent encryption method
CN102243630A (en) * 2010-05-12 2011-11-16 北京安华金和科技有限公司 Method for establishing database cipher text indexes without partial ordering relation
CN106934030A (en) * 2016-12-08 2017-07-07 戴林 The ciphertext index method and Ku Nei encryption systems of a kind of data base-oriented encryption
CN106874401A (en) * 2016-12-30 2017-06-20 中安威士(北京)科技有限公司 A kind of ciphertext index method of data base-oriented encrypted fields fuzzy search

Also Published As

Publication number Publication date
CN109033873A (en) 2018-12-18

Similar Documents

Publication Publication Date Title
CN109033873B (en) Data desensitization method for preventing privacy leakage
EP3531656B1 (en) Block chain-based data processing method and device
Yüksel et al. Research issues for privacy and security of electronic health services
US8566113B2 (en) Methods, systems and computer program products for providing a level of anonymity to patient records/information
Lubarsky Re-identification of “anonymized data”
US20030074564A1 (en) Encryption system for allowing immediate universal access to medical records while maintaining complete patient control over privacy
MX2014014368A (en) System for anonymizing and aggregating protected health information.
Kanwal et al. Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud
JP2015187828A (en) information management system
Khan et al. Development of national health data warehouse Bangladesh: Privacy issues and a practical solution
RU2664406C2 (en) Method and system for making multisite performance indicator anonymous and for controlling actions and re- identification of anonymous data
Huda et al. A privacy management architecture for patient-controlled personal health record system
WO2021062310A1 (en) Utilizing a user's health data stored over a health care network for disease prevention
US20240119174A1 (en) Personal Data Anonymization System (PDAS) with Customized Token
CN115831302A (en) Method and apparatus for managing disease control data
Afzal et al. Trusted framework for health information exchange
Lynda et al. Data security and privacy in e-health cloud: Comparative study
Asija et al. A survey on security and privacy of healthcare data
Clark et al. Computer vision for locating buried objects
Dhyani E-Health data risks & protection for public cloud: An elderly healthcare usecase for Swedish municipality
Bose et al. A Survey on Privacy of Health Data Lifecycle: A Taxonomy, Review, and Future Directions
Siegenthaler et al. Sharing private information across distributed databases
Siegenthaler et al. Privacy enforcement for distributed healthcare queries
Hu et al. The design and implementation of the privacy protection system of a Regional Health Information Platform
RU2748052C1 (en) Method and system for medical data exchange

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant