CN111832040A - Risk coefficient evaluation system, device and medium based on public and private key encryption - Google Patents

Risk coefficient evaluation system, device and medium based on public and private key encryption Download PDF

Info

Publication number
CN111832040A
CN111832040A CN202010459686.6A CN202010459686A CN111832040A CN 111832040 A CN111832040 A CN 111832040A CN 202010459686 A CN202010459686 A CN 202010459686A CN 111832040 A CN111832040 A CN 111832040A
Authority
CN
China
Prior art keywords
score
private key
server
department
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010459686.6A
Other languages
Chinese (zh)
Inventor
黄家昌
何晴晴
陈杜添
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Ecan Information Technology Co ltd
Original Assignee
Fujian Ecan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Ecan Information Technology Co ltd filed Critical Fujian Ecan Information Technology Co ltd
Priority to CN202010459686.6A priority Critical patent/CN111832040A/en
Publication of CN111832040A publication Critical patent/CN111832040A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Databases & Information Systems (AREA)
  • Biomedical Technology (AREA)
  • Epidemiology (AREA)
  • Medical Informatics (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The invention provides a risk coefficient evaluation system, equipment and medium based on public and private key encryption in the computer field, the system includes: the rule setting module is used for setting an evaluation rule and a weight coefficient and creating a public key and a private key; the public key sending module is used for sending the public key to the financial terminal, the hand anesthesia terminal and the department terminal; the data request module is used for sending medical data acquisition requests to the financial terminal, the hand anesthesia terminal and the department terminal; the private key encryption module is used for encrypting and sending the medical data to the server by using the received public key based on the received medical data acquisition request; the risk coefficient evaluation module is used for decrypting the medical data by using the private key, evaluating the medical data by using the evaluation rule and the weight coefficient and generating a risk coefficient; and the data safety storage module is used for storing the medical data and the risk data into the one-time programmable memory. The invention has the advantages that: the safety of the related data of the risk coefficient is greatly improved.

Description

Risk coefficient evaluation system, device and medium based on public and private key encryption
Technical Field
The invention relates to the field of computers, in particular to a risk coefficient evaluation system, equipment and medium based on public and private key encryption.
Background
Medical personnel are required to carry varying degrees of risk in the diagnosis of a patient, and this risk exists throughout the course of diagnosis, treatment and rehabilitation. The types and the conditions of patients to be treated in different outpatient and emergency departments are different, the born clinical risk coefficients are different, and the determination of the risk coefficients is helpful for improving the medical quality, so that the demand of evaluating the risk coefficients of the outpatient and emergency departments is generated.
However, conventionally, evaluation data of risk coefficients of hospital departments have no corresponding safety protection mechanisms in the acquisition stage and the storage stage, and both have risks of being stolen and tampered, and once the data is stolen or tampered, evaluation of the risk coefficients is directly affected, so that great potential safety hazards exist. Therefore, how to provide a risk coefficient evaluation system, device and medium based on public-private key encryption to improve the security of the data related to the risk coefficient becomes a problem to be solved urgently.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a risk coefficient evaluation system, device and medium based on public-private key encryption, so as to improve the security of the data related to the risk coefficient.
In a first aspect, the invention provides a risk coefficient evaluation system based on public and private key encryption, which comprises a rule setting module, a public key sending module, a data request module, a private key encryption module, a risk coefficient evaluation module and a data security storage module;
the rule setting module is used for setting an evaluation rule and a weight coefficient of medical data on the server and creating a pair of public key and private key;
the public key sending module is used for sending the public key to the financial terminal, the hand anesthesia terminal and the department terminal by the server;
the data request module is used for sending medical data acquisition requests to the financial terminal, the hand anesthesia terminal and the department terminal by the server respectively;
the private key encryption module is used for encrypting the medical data by using the received public key based on the received medical data acquisition request by the financial terminal, the hand anesthesia terminal and the department terminal and sending the medical data to the server through a TCP (transmission control protocol);
the risk coefficient evaluation module is used for decrypting the received medical data by the server by using the private key, evaluating the medical data by using the evaluation rule and the weight coefficient and generating a risk coefficient;
and the data safety storage module is used for storing the medical data and the risk coefficient into the one-time programmable memory by the server.
Further, in the rule setting module, the evaluation rule specifically includes:
setting a highest score and a decrement value, sorting the data to be scored from high to low, assigning the highest score to the data sorted first, assigning the data sorted second with the highest score minus the decrement value, assigning the data sorted third with the decrement value obtained by subtracting 2 times from the highest score, and so on.
Further, in the rule setting module, the weighting coefficients of the medical data are specifically:
the operating department weight coefficients of the medical income ratio per hospital discharge, the three-fourth-level operation ratio, the comprehensive nursing amount, the consultation amount, the large rescue amount and the emergency department transfer patient amount are a 1%, a 2%, a 3%, a 4%, a 5% and a 6% in sequence, and the non-operating department weight coefficients are b 1%, b 2%, b 3%, b 4%, b 5% and b 6% in sequence; wherein a 1% + a 2% + a 3% + a 4% + a 5% + a 6% + 1, b 1% + b 2% + b 3% + b 4% + b 5% + b 6% + 1.
Further, the public key sending module specifically includes:
and the server sends the public key to the financial terminal, the hand anesthesia terminal and the department terminal through a TCP protocol.
Further, the private key encryption module specifically includes:
the financial terminal encrypts the number of people discharged from each hospital department, the hospitalization cost and the hospitalization medical income with medicines and consumables deducted by using the received public key based on the received medical data acquisition request, and then sends the encrypted public key to the server through a TCP (transmission control protocol);
the hand anesthesia terminal encrypts the three-fourth-level operation cases and the total operation cases of each hospitalized department by using the received public key based on the received medical data acquisition request, and then sends the encrypted results to the server through a TCP (transmission control protocol);
the department terminal encrypts the number of primary care cases, the number of special care cases, the number of intensive care cases, the bed occupation date, the amount of consultation from a clinician to each hospital department, the amount of heavy rescue and the amount of emergency department transfer patients by using the received public key based on the received medical data acquisition request, and then sends the encrypted public key to the server through a TCP protocol.
Further, the risk coefficient evaluation module specifically includes:
the server decrypts the received medical data by using the private key to obtain the number of people discharged from hospital, the hospitalization cost, the hospitalization medical income with medicines and consumables deducted, the number of third-fourth-level operation cases, the number of total operation cases, the number of first-level nursing cases, the number of special-level nursing cases, the number of intensive care cases, the bed occupation date, the consultation amount from a clinician to each hospitalization department, the large rescue amount and the patient amount in an emergency department;
the server scores the medical income proportion of each discharged person by using the evaluation rule to generate a first score; the medical income per discharge is equal to the medical income per discharge/the medical income per discharge; the medical income cost per discharge is equal to the medical income/discharge times of hospitalization; the cost of each person who is discharged is equal to the hospitalization cost/the number of persons who are discharged;
the server scores all the three-level and four-level operation proportions by using the evaluation rule to generate a second score; the three-four stage operation ratio is three-four stage operation example number/total operation example number;
the server scores all the comprehensive nursing amounts by using the evaluation rule to generate a third score; the comprehensive care amount is (number of primary care cases + number of special care conversion × 1.2+ number of intensive care conversion × 1.5)/day of bed occupation; the special nursing conversion number is the number of special nursing cases/24; the intensive care conversion number is the number of intensive care cases/24;
the server scores each consultation amount by using the evaluation rule to generate a fourth score;
the server scores all the large rescue quantities by using the evaluation rule to generate a fifth value;
the server scores the patient quantity of each emergency department transfer room by using the evaluation rule to generate a sixth score;
the server calculates a risk coefficient based on the first score, the second score, the third score, the fourth score, the fifth score, the sixth score and the weight coefficient:
surgical department risk factor ═ first score a 1% + second score a 2% + third score a 3% + fourth score a 4% + fifth score a 5% + sixth score a 6%;
non-surgical department risk factor + b 1% + b 2% + b 3% + b 4% + b 5% + b 6%.
Further, the one-time programmable memory is an eFuse memory or an OTP memory.
Further, the financial terminal, the hand anesthesia terminal and the department terminal are mobile phones, tablet computers, notebooks or desktop computers.
In a second aspect, the present invention provides a risk coefficient evaluation device based on public-private key encryption, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the system according to the first aspect when executing the program.
In a third aspect, the present invention provides a risk factor evaluation medium based on public-private key encryption, on which a computer program is stored, which when executed by a processor implements the system according to the first aspect.
One or more technical solutions provided in the embodiments of the present invention have at least the following technical effects or advantages:
the method comprises the steps that a pair of public key and private key is established on a server, and as data encrypted by the public key can only be decrypted by the private key and data encrypted by the private key can only be decrypted by the public key, the medical data is encrypted and decrypted by adopting an asymmetric public-private key encryption method, so that the medical data is prevented from being stolen in the transmission process; by storing the medical data and the risk coefficient into the one-time programmable memory, the one-time programmable memory can only be written once and cannot be modified for two times, so that data is prevented from being distorted, source tracing at the later stage is facilitated, and the safety of the related data of the risk coefficient is greatly improved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram of a risk coefficient evaluation system based on public-private key encryption according to the present invention.
Fig. 2 is a hardware architecture diagram of the present invention.
Fig. 3 is a flowchart of a risk coefficient evaluation system based on public-private key encryption according to the present invention.
Fig. 4 is a schematic structural diagram of a risk coefficient evaluation device based on public-private key encryption according to the present invention.
Fig. 5 is a schematic structural diagram of a risk coefficient evaluation medium based on public-private key encryption according to the present invention.
Detailed Description
The embodiment of the application provides a risk coefficient evaluation system, equipment and medium based on public and private key encryption, so that the safety of the related data of the risk coefficient is improved.
The technical scheme in the embodiment of the application has the following general idea: a pair of public key and private key is established in a server, and then the medical data is encrypted and decrypted by using the asymmetric encryption technology of the public key and the private key, so that the medical data is prevented from being stolen in the transmission process; by storing the risk coefficient related data (medical data and risk coefficients) into the one-time programmable memory, data is prevented from being distorted, and safety is improved.
Example one
The present embodiment provides a risk coefficient evaluation system based on public-private key encryption, as shown in fig. 1 to 3, including a rule setting module, a public key sending module, a data request module, a private key encryption module, a risk coefficient evaluation module, and a data security storage module;
the rule setting module is used for setting an evaluation rule and a weight coefficient of medical data on the server and creating a pair of public key and private key;
the Public Key and the Private Key are a Key pair (i.e., a Public Key and a Private Key) obtained by an algorithm, the Public Key is a Public part of the Key pair, and the Private Key is an unpublished part. The public key is typically used to encrypt session keys, verify digital signatures, or encrypt data that can be decrypted with a corresponding private key. The key pair derived by such an algorithm is guaranteed to be unique worldwide. When using this key pair, if one of the keys is used to encrypt a piece of data, the other key must be used to decrypt the piece of data. For example, encrypting data with a public key necessitates decryption with the private key, and if encrypting with the private key, also must decrypt with the public key, otherwise decryption will not succeed.
The public key sending module is used for sending the public key to the financial terminal, the hand anesthesia terminal and the department terminal by the server;
the data request module is used for sending medical data acquisition requests to the financial terminal, the hand anesthesia terminal and the department terminal by the server respectively;
the private key encryption module is used for encrypting the medical data by using the received public key based on the received medical data acquisition request by the financial terminal, the hand anesthesia terminal and the department terminal and sending the medical data to the server through a TCP (transmission control protocol); the medical data comprises the number of discharged persons in each hospitalization department, hospitalization cost, hospitalization medical income with medicines and consumables deducted, the number of third-fourth-level operation cases, the number of total operation cases, the number of first-level nursing cases, the number of special-level nursing cases, the number of intensive care cases, bed occupation date, the consultation amount from a clinician to each hospitalization department, large rescue amount and the amount of patients in an emergency transfer room; the Transmission Control Protocol (TCP) is a connection-oriented, reliable transport layer communication Protocol based on a byte stream;
the risk coefficient evaluation module is used for decrypting the received medical data by the server by using the private key, evaluating the medical data by using the evaluation rule and the weight coefficient and generating a risk coefficient; the risk coefficients include operating room risk coefficients and non-operating room risk coefficients;
and the data safety storage module is used for storing the medical data and the risk coefficient into the one-time programmable memory by the server. After the data is stored in the one-time programmable memory, the data can not be changed and cleared any more.
In the rule setting module, the evaluation rule is specifically:
setting a highest score and a decrement value, sorting the data to be scored from high to low, assigning the highest score to the data sorted first, assigning the data sorted second with the highest score minus the decrement value, assigning the data sorted third with the decrement value obtained by subtracting 2 times from the highest score, and so on.
In the rule setting module, the weighting coefficients of the medical data are specifically:
the operating department weight coefficients of the medical income ratio per hospital discharge, the three-fourth-level operation ratio, the comprehensive nursing amount, the consultation amount, the large rescue amount and the emergency department transfer patient amount are a 1%, a 2%, a 3%, a 4%, a 5% and a 6% in sequence, and the non-operating department weight coefficients are b 1%, b 2%, b 3%, b 4%, b 5% and b 6% in sequence; wherein a 1% + a 2% + a 3% + a 4% + a 5% + a 6% + 1, b 1% + b 2% + b 3% + b 4% + b 5% + b 6% + 1. Wherein the values of a1, a2, a3, a4, a5 and a6 are preferably 10, 30, 10 and 10, and the values of b1, b2, b3, b4, b5 and b6 are preferably 10, 0, 40, 30, 10 and 10.
The public key sending module specifically comprises:
and the server sends the public key to the financial terminal, the hand anesthesia terminal and the department terminal through a TCP protocol.
The private key encryption module is specifically as follows:
the financial terminal encrypts the number of people discharged from each hospital department, the hospitalization cost and the hospitalization medical income with medicines and consumables deducted by using the received public key based on the received medical data acquisition request, and then sends the encrypted public key to the server through a TCP (transmission control protocol);
the hand anesthesia terminal encrypts the three-fourth-level operation cases and the total operation cases of each hospitalized department by using the received public key based on the received medical data acquisition request, and then sends the encrypted results to the server through a TCP (transmission control protocol);
the department terminal encrypts the number of primary care cases, the number of special care cases, the number of intensive care cases, the bed occupation date, the amount of consultation from a clinician to each hospital department, the amount of heavy rescue and the amount of emergency department transfer patients by using the received public key based on the received medical data acquisition request, and then sends the encrypted public key to the server through a TCP protocol.
The risk coefficient evaluation module specifically comprises:
the server decrypts the received medical data by using the private key to obtain the number of people discharged from hospital, the hospitalization cost, the hospitalization medical income with medicines and consumables deducted, the number of third-fourth-level operation cases, the number of total operation cases, the number of first-level nursing cases, the number of special-level nursing cases, the number of intensive care cases, the bed occupation date, the consultation amount from a clinician to each hospitalization department, the large rescue amount and the patient amount in an emergency department;
the server scores the medical income proportion of each discharged person by using the evaluation rule to generate a first score; the medical income per discharge is equal to the medical income per discharge/the medical income per discharge; the medical income cost per discharge is equal to the medical income/discharge times of hospitalization; the cost of each person who is discharged is equal to the hospitalization cost/the number of persons who are discharged;
for example, a maximum score of 10 and a decrement of 0.2, the first score is calculated as follows:
Figure BDA0002510558290000071
Figure BDA0002510558290000081
the server scores all the three-level and four-level operation proportions by using the evaluation rule to generate a second score; the three-four stage operation ratio is three-four stage operation example number/total operation example number;
the server scores all the comprehensive nursing amounts by using the evaluation rule to generate a third score; the comprehensive care amount is (number of primary care cases + number of special care conversion × 1.2+ number of intensive care conversion × 1.5)/day of bed occupation; the special nursing conversion number is the number of special nursing cases/24; the intensive care conversion number is the number of intensive care cases/24;
the server scores each consultation amount by using the evaluation rule to generate a fourth score;
the server scores all the large rescue quantities by using the evaluation rule to generate a fifth value;
the server scores the patient quantity of each emergency department transfer room by using the evaluation rule to generate a sixth score;
the server calculates a risk coefficient based on the first score, the second score, the third score, the fourth score, the fifth score, the sixth score and the weight coefficient:
surgical department risk factor ═ first score a 1% + second score a 2% + third score a 3% + fourth score a 4% + fifth score a 5% + sixth score a 6%;
non-surgical department risk factor + b 1% + b 2% + b 3% + b 4% + b 5% + b 6%.
The one-time programmable memory is eFuse memory or OTP memory.
The financial terminal, the hand anesthesia terminal and the department terminal are mobile phones, tablet computers, notebooks or desktop computers.
Based on the same inventive concept, the application also provides equipment corresponding to the system in the first embodiment, which is detailed in the second embodiment.
Example two
The present embodiment provides a risk coefficient evaluation device based on public-private key encryption, as shown in fig. 4, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and when the processor executes the computer program, any implementation manner of the first embodiment may be implemented.
Since the apparatus described in this embodiment is an apparatus used for implementing the system in the first embodiment of the present application, a person skilled in the art can understand a specific implementation manner of the apparatus in this embodiment and various variations thereof based on the system described in the first embodiment of the present application, and therefore a detailed description of how to implement the method in the embodiment of the present application by the apparatus is not provided herein. The equipment used by those skilled in the art to implement the system in the embodiments of the present application is within the scope of the present application.
Based on the same inventive concept, the application also provides a medium corresponding to the system in the first embodiment, which is detailed in the third embodiment.
EXAMPLE III
The present embodiment provides a risk factor evaluation medium based on public-private key encryption, as shown in fig. 5, on which a computer program is stored, and when the computer program is executed by a processor, any one of the embodiments may be implemented.
The technical scheme provided in the embodiment of the application at least has the following technical effects or advantages:
the method comprises the steps that a pair of public key and private key is established on a server, and as data encrypted by the public key can only be decrypted by the private key and data encrypted by the private key can only be decrypted by the public key, the medical data is encrypted and decrypted by adopting an asymmetric public-private key encryption method, so that the medical data is prevented from being stolen in the transmission process; by storing the medical data and the risk coefficient into the one-time programmable memory, the one-time programmable memory can only be written once and cannot be modified for two times, so that data is prevented from being distorted, source tracing at the later stage is facilitated, and the safety of the related data of the risk coefficient is greatly improved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.

Claims (10)

1. A risk coefficient evaluation system based on public-private key encryption is characterized in that: the system comprises a rule setting module, a public key sending module, a data request module, a private key encryption module, a risk coefficient evaluation module and a data security storage module;
the rule setting module is used for setting an evaluation rule and a weight coefficient of medical data on the server and creating a pair of public key and private key;
the public key sending module is used for sending the public key to the financial terminal, the hand anesthesia terminal and the department terminal by the server;
the data request module is used for sending medical data acquisition requests to the financial terminal, the hand anesthesia terminal and the department terminal by the server respectively;
the private key encryption module is used for encrypting the medical data by using the received public key based on the received medical data acquisition request by the financial terminal, the hand anesthesia terminal and the department terminal and sending the medical data to the server through a TCP (transmission control protocol);
the risk coefficient evaluation module is used for decrypting the received medical data by the server by using the private key, evaluating the medical data by using the evaluation rule and the weight coefficient and generating a risk coefficient;
and the data safety storage module is used for storing the medical data and the risk coefficient into the one-time programmable memory by the server.
2. The system of claim 1, wherein the risk factor evaluation system based on public-private key encryption comprises: in the rule setting module, the evaluation rule is specifically:
setting a highest score and a decrement value, sorting the data to be scored from high to low, assigning the highest score to the data sorted first, assigning the data sorted second with the highest score minus the decrement value, assigning the data sorted third with the decrement value obtained by subtracting 2 times from the highest score, and so on.
3. The system of claim 1, wherein the risk factor evaluation system based on public-private key encryption comprises: in the rule setting module, the weighting coefficients of the medical data are specifically:
the operating department weight coefficients of the medical income ratio per hospital discharge, the three-fourth-level operation ratio, the comprehensive nursing amount, the consultation amount, the large rescue amount and the emergency department transfer patient amount are a 1%, a 2%, a 3%, a 4%, a 5% and a 6% in sequence, and the non-operating department weight coefficients are b 1%, b 2%, b 3%, b 4%, b 5% and b 6% in sequence; wherein a 1% + a 2% + a 3% + a 4% + a 5% + a 6% + 1, b 1% + b 2% + b 3% + b 4% + b 5% + b 6% + 1.
4. The system of claim 1, wherein the risk factor evaluation system based on public-private key encryption comprises: the public key sending module specifically comprises:
and the server sends the public key to the financial terminal, the hand anesthesia terminal and the department terminal through a TCP protocol.
5. The system of claim 1, wherein the risk factor evaluation system based on public-private key encryption comprises: the private key encryption module is specifically as follows:
the financial terminal encrypts the number of people discharged from each hospital department, the hospitalization cost and the hospitalization medical income with medicines and consumables deducted by using the received public key based on the received medical data acquisition request, and then sends the encrypted public key to the server through a TCP (transmission control protocol);
the hand anesthesia terminal encrypts the three-fourth-level operation cases and the total operation cases of each hospitalized department by using the received public key based on the received medical data acquisition request, and then sends the encrypted results to the server through a TCP (transmission control protocol);
the department terminal encrypts the number of primary care cases, the number of special care cases, the number of intensive care cases, the bed occupation date, the amount of consultation from a clinician to each hospital department, the amount of heavy rescue and the amount of emergency department transfer patients by using the received public key based on the received medical data acquisition request, and then sends the encrypted public key to the server through a TCP protocol.
6. The system according to claim 3 or 5, wherein the risk factor evaluation system based on public-private key encryption comprises: the risk coefficient evaluation module specifically comprises:
the server decrypts the received medical data by using the private key to obtain the number of people discharged from hospital, the hospitalization cost, the hospitalization medical income with medicines and consumables deducted, the number of third-fourth-level operation cases, the number of total operation cases, the number of first-level nursing cases, the number of special-level nursing cases, the number of intensive care cases, the bed occupation date, the consultation amount from a clinician to each hospitalization department, the large rescue amount and the patient amount in an emergency department;
the server scores the medical income proportion of each discharged person by using the evaluation rule to generate a first score; the medical income per discharge is equal to the medical income per discharge/the medical income per discharge; the medical income cost per discharge is equal to the medical income/discharge times of hospitalization; the cost of each person who is discharged is equal to the hospitalization cost/the number of persons who are discharged;
the server scores all the three-level and four-level operation proportions by using the evaluation rule to generate a second score; the three-four stage operation ratio is three-four stage operation example number/total operation example number;
the server scores all the comprehensive nursing amounts by using the evaluation rule to generate a third score; the comprehensive care amount is (number of primary care cases + number of special care conversion × 1.2+ number of intensive care conversion × 1.5)/day of bed occupation; the special nursing conversion number is the number of special nursing cases/24; the intensive care conversion number is the number of intensive care cases/24;
the server scores each consultation amount by using the evaluation rule to generate a fourth score;
the server scores all the large rescue quantities by using the evaluation rule to generate a fifth value;
the server scores the patient quantity of each emergency department transfer room by using the evaluation rule to generate a sixth score;
the server calculates a risk coefficient based on the first score, the second score, the third score, the fourth score, the fifth score, the sixth score and the weight coefficient:
surgical department risk factor ═ first score a 1% + second score a 2% + third score a 3% + fourth score a 4% + fifth score a 5% + sixth score a 6%;
non-surgical department risk factor + b 1% + b 2% + b 3% + b 4% + b 5% + b 6%.
7. The system of claim 1, wherein the risk factor evaluation system based on public-private key encryption comprises: the one-time programmable memory is eFuse memory or OTP memory.
8. The system of claim 1, wherein the risk factor evaluation system based on public-private key encryption comprises: the financial terminal, the hand anesthesia terminal and the department terminal are mobile phones, tablet computers, notebooks or desktop computers.
9. An outpatient and emergency department risk factor assessment device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program implements a system according to any one of claims 1 to 8.
10. An outpatient and emergency department risk factor evaluation medium having a computer program stored thereon, wherein the program, when executed by a processor, implements a system according to any one of claims 1 to 8.
CN202010459686.6A 2020-05-27 2020-05-27 Risk coefficient evaluation system, device and medium based on public and private key encryption Pending CN111832040A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010459686.6A CN111832040A (en) 2020-05-27 2020-05-27 Risk coefficient evaluation system, device and medium based on public and private key encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010459686.6A CN111832040A (en) 2020-05-27 2020-05-27 Risk coefficient evaluation system, device and medium based on public and private key encryption

Publications (1)

Publication Number Publication Date
CN111832040A true CN111832040A (en) 2020-10-27

Family

ID=72913462

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010459686.6A Pending CN111832040A (en) 2020-05-27 2020-05-27 Risk coefficient evaluation system, device and medium based on public and private key encryption

Country Status (1)

Country Link
CN (1) CN111832040A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2014185447A1 (en) * 2013-05-15 2017-02-23 日本電気株式会社 Verification system, node, verification method and program
CN109194523A (en) * 2018-10-01 2019-01-11 西安电子科技大学 The multi-party diagnostic model fusion method and system, cloud server of secret protection
CN110535656A (en) * 2019-07-31 2019-12-03 阿里巴巴集团控股有限公司 Medical data processing method, device, equipment and server
CN111107066A (en) * 2019-12-06 2020-05-05 中国联合网络通信集团有限公司 Sensitive data transmission method and system, electronic equipment and storage medium
CN111128322A (en) * 2019-12-06 2020-05-08 北京先通康桥医药科技有限公司 Block chain-based medical data processing method, server and system
CN111191896A (en) * 2019-12-23 2020-05-22 福建亿能达信息技术股份有限公司 Method and system for evaluating key technology difficulty of clinical department

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2014185447A1 (en) * 2013-05-15 2017-02-23 日本電気株式会社 Verification system, node, verification method and program
CN109194523A (en) * 2018-10-01 2019-01-11 西安电子科技大学 The multi-party diagnostic model fusion method and system, cloud server of secret protection
CN110535656A (en) * 2019-07-31 2019-12-03 阿里巴巴集团控股有限公司 Medical data processing method, device, equipment and server
CN111107066A (en) * 2019-12-06 2020-05-05 中国联合网络通信集团有限公司 Sensitive data transmission method and system, electronic equipment and storage medium
CN111128322A (en) * 2019-12-06 2020-05-08 北京先通康桥医药科技有限公司 Block chain-based medical data processing method, server and system
CN111191896A (en) * 2019-12-23 2020-05-22 福建亿能达信息技术股份有限公司 Method and system for evaluating key technology difficulty of clinical department

Similar Documents

Publication Publication Date Title
CN110008746B (en) Block chain-based medical record storage, sharing and safety claim settlement model and method
US9419951B1 (en) System and method for secure three-party communications
Lee et al. An architecture and management platform for blockchain-based personal health record exchange: development and usability study
US10164950B2 (en) Controlling access to clinical data analyzed by remote computing resources
Adesina et al. Ensuring the security and privacy of information in mobile health-care communication systems
CN109117662B (en) Block chain-based electronic medical record security searching method
US8538018B2 (en) Methods and apparatus for mixing encrypted data with unencrypted data
WO2012018495A2 (en) Anonymous healthcare and records system
US7451315B2 (en) Coordinating, auditing, and controlling multi-site data collection without sharing sensitive data
CN106202945A (en) A kind of doctors and patients information management system of high security
CN107579980A (en) Lightweight double call control system in medical Internet of Things
CN110808958A (en) Medicine separation management system based on CP-ABE and block chain
CN113536378A (en) Traceable attribute-based cleanable signature method and system
CN112364376A (en) Attribute agent re-encryption medical data sharing method
CN111832040A (en) Risk coefficient evaluation system, device and medium based on public and private key encryption
Lin et al. A chaos-based visual encryption mechanism for clinical EEG signals
Rubio et al. A robust and simple security extension for the medical standard SCP-ECG
CN115001709B (en) Trusted acquisition and privacy protection method suitable for digital medical data
CN116599706A (en) Block chain-based data sharing fine granularity access control method for Internet of things
CN105068756B (en) The storage access method of electronic health care case history
Dey et al. Internet of Things e-health revolution: secured transmission of homeopathic e-medicines through chaotic key formation
Suneetha et al. A Secure Framework For Enhancing Data Privacy And Access Control In Healthcare Cloud Management Systems
US9514307B2 (en) Method for producing a secured data object and system
CN111832041B (en) Performance assessment system, device and medium based on public and private key encryption
Yee et al. Bridging a gap in the proposed personal health record

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201027