CN113127849A - Private information using method and system and computer readable storage medium - Google Patents

Private information using method and system and computer readable storage medium Download PDF

Info

Publication number
CN113127849A
CN113127849A CN202110274468.XA CN202110274468A CN113127849A CN 113127849 A CN113127849 A CN 113127849A CN 202110274468 A CN202110274468 A CN 202110274468A CN 113127849 A CN113127849 A CN 113127849A
Authority
CN
China
Prior art keywords
information
private
private information
privacy
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110274468.XA
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110274468.XA priority Critical patent/CN113127849A/en
Publication of CN113127849A publication Critical patent/CN113127849A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The invention discloses a method and a system for using privacy information and a computer readable storage medium, wherein the method for using the privacy information comprises the following steps: establishing related rules for the use of the private information; receiving a use request of the private information; analyzing the use request, and acquiring the information of the user, the information to be used, the scene of the use information and the use method of the information; whether the information can be used and the usage right are determined according to the relevant rule of the use of the private information. The private information use system includes: the system comprises a request receiving module, a rule storage module and an analysis module. According to the method and the system for using the privacy information and the computer readable storage medium, the privacy information in mass information data can be effectively protected, the information safety is ensured, various influences and losses caused by leakage of the privacy information of a user are avoided, the privacy information without authority of the user can be hidden, or the corresponding privacy information is replaced by the virtual information, the use record is kept, and the privacy information is protected while a secret divulging path is searched and confirmed.

Description

Private information using method and system and computer readable storage medium
Technical Field
The invention relates to the technical field of data processing, in particular to a method and a system for using private information and a computer readable storage medium.
Background
With the continuous development of science and technology, the importance of information in the internet era is more and more obvious, the information is shared among different levels and different departments, the reasonable configuration of social resources is facilitated, the social operation cost is lower, and the opportunity of creating wealth by the society is more. However, as the large data is gradually popularized and developed, the problem of leakage of user privacy data is more prominent.
In the current data system, for privacy information, the data storage system does not have a perfect privacy protection system, and the information is still stored through the traditional accounting system, so that the information is very easy to attack and steal, and a large amount of privacy is leaked and sold. Because the privacy information cannot be completely protected by the system, a large number of privacy information leakage accidents frequently occur.
Therefore, there is an urgent need for a method and a system for using private information, and a computer-readable storage medium, which can effectively protect the private information in the private information data, ensure the information security, and avoid various influences and losses caused by the leakage of the private information.
Disclosure of Invention
The main purposes of the invention are: the method and the system for using the private information and the computer readable storage medium are provided, the information, the used information, the scene of the used information and the using method of the information of a user are obtained by analyzing the use of the private information, whether the use and the use permission are allowed or not is determined according to the relevant rules of the use of the private information, the private information in mass information data can be effectively protected, the information safety is ensured, various influences and losses caused by the leakage of the private information of the user are avoided, the private information without permission of the user can be hidden, or the corresponding private information is replaced by virtual information, the use record is kept, and a disclosure path is searched and confirmed while the private information is protected.
In order to achieve the above object, the present invention provides a method for using private information, the method comprising:
establishing related rules for the use of the private information;
receiving a use request of the private information;
analyzing the use request, and acquiring the information of the user, the information to be used, the scene of the use information and the use method of the information;
whether the information can be used and the usage right are determined according to the relevant rule of the use of the private information.
The method for using the private information further comprises the step of determining whether the private information can be used and the use authority according to the relevant rules used by the private information after the private information is received.
The method for using the private information includes the range of information allowed to be used, the usage scene, the method for using the private information, the usage purpose, and the object of use.
In the method for using the private information, the information and the result obtained by applying the processing and processing of the private information also belong to the private information, and the use of the information and the result obtained by applying the processing and processing of the private information also needs to determine whether the information can be used and the use authority according to the relevant rules of the use of the private information.
In the method for using the private information, the relevant rules for using the private information include the range of information that is allowed or not allowed to be used for the user and the usage scenario thereof, and the method for using the private information.
The private information use method as described above, further comprising: different levels/scores are set for different private information and users, different correction levels are set for different use scenes and different use methods of the private information, and when whether the use is allowed or not and the use right are determined, the comprehensive level/score of the use of the private information can be calculated according to the levels of the private information and the users and the correction levels of the use scenes and the use methods of the private information, so that the comprehensive result of the use of the private information is given.
The private information use method as described above, further comprising: for the structured data information, the user can be allowed to use the data information after hiding or replacing the part which is not authorized to be used by the user with the virtual information.
The private information use method as described above, further comprising: and obtaining result feedback of the use of the privacy information, and adjusting related rules of the use of the privacy information according to the result feedback.
The private information using method as described above, which is applicable to at least one of medical private information use, financial private information use, restaurant private information use, education private information use, travel private information use, transportation private information use.
The present invention also provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the private information using method as described above.
The present invention also provides a private information use system, including:
the request receiving module is used for receiving a use request of the privacy information;
the rule storage module is used for storing relevant rules used by the privacy information;
and the analysis module is used for analyzing the use request, acquiring the information of the user, the information required to be used, the scene of the use information and the use method of the information, and determining whether to allow the use and the use permission according to the related rule of the use of the privacy information.
The invention discloses a method and a system for using privacy information and a computer readable storage medium, wherein the method for using the privacy information comprises the following steps: establishing related rules for the use of the private information; receiving a use request of the private information; analyzing the use request, and acquiring the information of the user, the information to be used, the scene of the use information and the use method of the information; whether the information can be used and the usage right are determined according to the relevant rule of the use of the private information. The private information use system includes: the system comprises a request receiving module, a rule storage module and an analysis module. According to the method and the system for using the privacy information and the computer readable storage medium, the privacy information in mass information data can be effectively protected, the information safety is ensured, various influences and losses caused by leakage of the privacy information of a user are avoided, the privacy information without authority of the user can be hidden, or the corresponding privacy information is replaced by the virtual information, the use record is kept, and the privacy information is protected while a secret divulging path is searched and confirmed.
Drawings
Fig. 1 is a flowchart of a method for using private information according to a first embodiment of the present invention.
Fig. 2 is a schematic diagram of a system for using private information according to a second embodiment of the present invention.
Detailed Description
To further explain the technical means and effects of the present invention adopted to achieve the intended purpose, the following detailed description of the embodiments of the present invention is provided in conjunction with the accompanying drawings and examples.
A first embodiment of the present invention is described with reference to fig. 1. Fig. 1 is a flowchart of a method for using private information according to a first embodiment of the present invention. As shown in the figure, the method for using the privacy information of the present invention includes:
s1: and establishing related rules for the use of the private information.
The method for using the private information can standardize the use of private data of different industries and different systems, including the medical industry, the financial industry, the catering industry, the education industry, the tourism industry, the transportation industry and the like, and can be applied to at least one of the use of the medical private information, the use of the financial private information, the use of the catering private information, the use of the education private information, the use of the tourism private information and the use of the transportation private information. In the use process of data, different industries have different data application systems, and different data application systems have different use scenes. Relevant rules for the use of private information include: the method aims at different industries, different systems, different users and use scenes thereof, and allows or disallows the use of information range and private information.
For example: the use method of the privacy information can comprise the following steps: reading, copying, viewing, calculating, processing, comparing, processing, storing, etc. of information. In the medical industry, users of medical privacy information may be: hospitals, medical authorities, health care agencies, insurance companies, jurisdictions, patients, family members, patient units, doctors, nurses, pharmacists, physical therapists, nursing staff, emergency centers, teachers, schools, and the like. The medical data required for use may include: medical advice, medical records, medical calendars, prescriptions, electronic medical records, treatment records, examination orders, laboratory orders, surgical records, billing orders, dispensing records, patient information, patient family information, doctor information, pharmacist information, nurse information, medication information, prescription audit information, purchase information, adverse reaction information, and the like. The usage scenario may be: hospital/medical administration/health care committee based requirements, medical insurance system/insurance company based requirements for insurance cost accounting/reimbursement/claims settlement, case based requirements for judicial agencies, patient/family/patient unit based requirements for understanding of medical conditions, and the like. In the transportation industry, the private information may include: origin, destination, departure time, arrival time, flight/train number, seat number, passenger information, credential information, etc. The private information may also include business information and other information that needs to be kept secret.
The relevant rules for the private information use of the invention are established based on various information use specifications, can also comprise rules established by various levels set by law and regulation regulations/relevant organizations/experts, can also comprise rules established based on information reforming/information analysis/big data analysis, can also comprise rules and indexes established through artificial intelligence deep learning, can also comprise rules and indexes obtained through data mining analysis and after data statistical analysis/artificial intelligence deep learning, and thus, the rules and the indexes are instructive in the actual use process. The relevant rules for the use of the private information may also be established by a combination of the above methods. The related rules used by the privacy information can be continuously updated and adjusted in the using process, and the updating and the adjusting can be performed manually or automatically through data statistical analysis/artificial intelligence deep learning.
S2: a request for use of private information is received.
The request for using the private information may be information given to the user, information required to be used, a scene of the information to be used, and a method of using the information. The use request can be an electronic request received by a data interface, or a use request of paper privacy information, and then the use request is converted into the electronic request by the technologies of manual entry, OCR and the like.
S3: the use request is analyzed to obtain the information of the user, the information required to be used, the scene of the use information and the use method of the information.
In response to the received private information use request, it is necessary to first obtain the user's information, the information to be used, the scene of the use information, and the method of using the information by analyzing the use request.
The method for using the private information can further comprise using a multi-dimensional element attribute dictionary of the private information, a semantic recognition technology, translation of different languages and an OCR recognition technology to acquire the information of the user, the information required to be used, the scene of the information to be used and the method for using the information from the use request of the private information. The information required to be used in the request for using the private information and the actual data information may have different descriptions and different standards, and need to be converted. For example: patients with creatinine clearance 25 ml/min were requested to take drug relief. First, the creatinine clearance rate of 25 ml/min should be converted into severe renal insufficiency by using a multi-dimensional element attribute dictionary of private information, a semantic recognition technology, translation of different languages, an OCR recognition technology, and the like.
S4: whether the use is allowed and the use authority are determined according to the relevant rule of the use of the privacy information.
After the information of the user, the information required to be used, the scene of the use information and the use method of the information are obtained from the use request, whether the use is allowed or not and the use authority are determined according to the relevant rule of the use of the privacy information. The use authority of the private information includes a range of information allowed to be used, a use scene, a use method of the private information, a use purpose, a use object, and the like.
The method for using the privacy information can be used for other users to acquire the privacy information data, and can also be used for determining whether the privacy information can be used and the use permission according to the related rules used by the privacy information after receiving the privacy information data. The method for using the private information can protect the private information when actively requiring the information and also can protect the private information when passively acquiring the information, so that the private information can be safely and reasonably protected in different information transmission ways.
In the invention, the information and the result obtained by applying the privacy information processing and processing also belong to the privacy information, and the use of the information and the result obtained by applying the privacy information processing and processing also needs to determine whether the information can be used and the use permission according to the related rule of the use of the privacy information. For example: the user acquires the examination information of the user, analyzes the diagnosis result of the user according to the examination information of the user, and further analyzes the related prescription, the medication information and the treatment result. Since the examination information of the user includes the privacy information of the user, the diagnosis result, the related prescription, the medication information, the treatment result, and the like obtained by analyzing and processing the examination information of the user are all related to the privacy of the user, and thus are all the subjects to be subjected to privacy protection.
By incorporating the information and results obtained by processing and processing the application privacy information into the object of privacy protection, the method for using the privacy information can perform privacy protection in the whole process from the generation of the information to the use of the information, and can also protect only a part of the information by setting.
The method for using the private information can set different grades/scores aiming at different private information and users, and set different correction grades for different using methods of various using scenes and the private information, and can calculate the comprehensive grade/score of the using request of the private information according to the grade of the private information and the users and the correction grade of the using methods of various using scenes and the private information when determining whether to allow the use and the use right, so as to provide the comprehensive result of the using request of the private information.
F is a result of integration of the use request of the private information, T is a level of the private information, P is a modification level of the use method of the private information, T (P) is a level of the private information modified by the use method, S is a level of the user, Q is a modification level of the scene of the use information, and S (Q) is a level of the user modified by the use scene. The specific calculation formula is as follows,
Figure BDA0002975476010000101
for example: in order to count the effect of the medication relief, the medical administration requires the use of the medical history of the patient taking the medication relief and files for the statistics. The method for using the private information extracts the information of the user, the information required to be used, the scene of the used information and the using method of the information from the obtained using request, and determines the corresponding level according to the relevant rules of the private information.
The user is a medical administration with the grade of 10;
the scene of the use information is the effect of the statistical medicine, and the correction level is + 0.5%;
the required private information is the medical history of the patient, and the level is 8;
the use method of the privacy information is copying, and the correction level is + 1';
then, s (q) ≧ t (p) ≧ 9, use is permitted, and the right of use includes copying data.
In the present invention, the related operations may be restricted for the difference of the usage rights. For example: without copy rights, the copy operation may be restricted. According to different use authorities, the use method of the private information can comprise the following steps: read-only, copy, etc., for example: through methods such as remote desktop, system pop-up frame/pop-up window and the like, the user can see the relevant information without remaining in the local/local server. The method can also comprise repeated monitoring during the use of the private information, and can ensure and supervise the correct use of the private information by methods such as installing a camera, screen monitoring, anti-screen capturing tools and the like, so as to accord with the use permission.
In the present invention, the relevant rules for the use of the private information may further include: the minimum necessary information range required for the user's usage purpose can be realized for different users, usage purposes, and information required to be used. The necessary result can be obtained by different information combinations, and the privacy content and degree related to the different information combinations can be the same or different. When the use request of the privacy information is received again, for different users, use purposes and information required to be used, the minimum necessary information range required by the use purposes of the users is provided according to the related rules of the use of the privacy information, the acquisition of related unnecessary information is avoided, and the risk of privacy disclosure can be greatly controlled.
The method for using the private information of the present invention may further include: for the structured data information, the user can be allowed to use the data information after the part which is not authorized to be used by the user is hidden. For the structured data information, it may be data information of multiple regions/units/persons, or it may be multiple data information such as user name/age/sex/disease description/treatment scheme, etc., and according to the authority of the user, it may first hide the part of the user that is not authorized to use, such as user name, data information of special unit person, etc., and then allow the user to use. Therefore, the user can obtain the required information, and unnecessary information leakage is avoided.
The method for using the private information of the present invention may further include: and replacing part of the private information with the virtual information and providing the virtual information to the user, and keeping the use record. The virtual information is adopted to replace the private information, so that the private data can be protected and the information safety can be improved under the condition that the use of the information is not influenced. For example: the user name/contact/certificate number, etc. may be replaced with virtual information. Meanwhile, the use record is kept, and the way of disclosure and responsibility tracing can be traced according to the virtual information. For example: the same information and the information taken by different users have different virtual information, once the secret is divulged, the divulged information can be used for inquiring the information of which the secret is divulged, and therefore the divulging way is found. For users who violate the relevant rules for the use of the private information, different penalties such as limiting the use, reducing the level, compensating for the loss, pursuing legal obligations, etc. can be given according to different practical situations.
The method for using the private information of the present invention may further include: and obtaining result feedback of the use of the privacy information, and adjusting related rules of the use of the privacy information according to the result feedback. The purpose of using the private information is not to influence the normal use of the information, and the private data can be protected, so that the information safety is improved. Excessive secrecy may affect the normal use of the information, while too low secrecy may result in leakage of the information. Therefore, the relevant rules for using the privacy information need to be continuously adjusted according to the result feedback of using the privacy information, so that the comprehensive effect of using the privacy information is the best.
Adjustment of relevant rules for use of private information, including addition, subtraction, change of authority, expansion and contraction of scope, and the like, may be performed based on laws and regulations, relevant agencies, statistical data analysis, artificial intelligence deep learning.
A second embodiment of the present invention is seen in figure 2. Fig. 2 is a schematic diagram of a system for using private information according to a second embodiment of the present invention. As shown in the drawing, a private information use system of the present invention includes: a request receiving module 11, a rule storage module 12 and an analysis module 13.
A request receiving module 11, configured to receive a use request of the private information;
a rule storage module 12, configured to store relevant rules used by the private information;
and the analysis module 13 is used for analyzing the use request, acquiring the information of the user, the information required to be used, the scene of the use information and the use method of the information, and determining whether to allow the use and the use permission according to the relevant rules of the use of the privacy information.
The technical features of the system for using the private information and the method for using the private information of the present invention are in one-to-one correspondence, and the description of the method for using the private information can be referred to, which is not repeated herein.
A third embodiment of the present invention is a computer-readable storage medium storing a computer program that, when executed by a processor, implements the steps of the private information using method as described above.
The technical features of a computer-readable storage medium of the present invention and a method and a system for using private information of the present invention are in one-to-one correspondence, and the description of the method and the system for using private information may be referred to, and will not be repeated herein.
In summary, the method and system for using private information and the computer-readable storage medium of the present invention include: establishing related rules for the use of the private information; receiving a use request of the private information; analyzing the use request, and acquiring the information of the user, the information to be used, the scene of the use information and the use method of the information; whether the information can be used and the usage right are determined according to the relevant rule of the use of the private information. The private information use system includes: the system comprises a request receiving module, a rule storage module and an analysis module. According to the method and the system for using the privacy information and the computer readable storage medium, the privacy information in mass information data can be effectively protected, the information safety is ensured, various influences and losses caused by leakage of the privacy information of a user are avoided, the privacy information without authority of the user can be hidden, or the corresponding privacy information is replaced by the virtual information, the use record is kept, and the privacy information is protected while a secret divulging path is searched and confirmed.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (11)

1. A method for using private information, the method comprising:
establishing related rules for the use of the private information;
receiving a use request of the private information;
analyzing the use request, and acquiring the information of the user, the information to be used, the scene of the use information and the use method of the information;
whether the information can be used and the usage right are determined according to the relevant rule of the use of the private information.
2. The private information using method according to claim 1, characterized in that: the method also comprises the step of determining whether the private information can be used and the use permission according to the relevant rules used by the private information after receiving the private information.
3. The private information using method according to claim 1, characterized in that: the use authority of the private information comprises the range of information allowed to be used, a use scene, a use method of the private information, use purposes and a use object.
4. The private information using method according to claim 1, characterized in that: information and results obtained by applying the privacy information processing and processing also belong to the privacy information, and the use of the information and results obtained by applying the privacy information processing and processing also needs to determine whether the information can be used and the use permission according to relevant rules used by the privacy information.
5. The private information using method according to claim 1, characterized in that: the relevant rules for the use of the private information comprise the range of information which is allowed or not allowed to be used and the use method of the private information aiming at the user and the use scene thereof.
6. The private information using method according to claim 1, characterized in that: the private information use method further includes: different levels/scores are set for different private information and users, different correction levels are set for different use scenes and different use methods of the private information, and when whether the use is allowed or not and the use right are determined, the comprehensive level/score of the use of the private information can be calculated according to the levels of the private information and the users and the correction levels of the use scenes and the use methods of the private information, so that the comprehensive result of the use of the private information is given.
7. The private information use method according to claim 1, further comprising: for the structured data information, the user can be allowed to use the data information after hiding or replacing the part which is not authorized to be used by the user with the virtual information.
8. The private information use method according to claim 1, further comprising: and obtaining result feedback of the use of the privacy information, and adjusting related rules of the use of the privacy information according to the result feedback.
9. The private information using method according to claim 1, characterized in that: the privacy information using method can be applied to at least one of medical privacy information use, financial privacy information use, catering privacy information use, education privacy information use, tourism privacy information use and transportation privacy information use.
10. A computer-readable storage medium characterized by: the computer-readable storage medium stores a computer program which, when executed by a processor, implements the steps of the private information usage method of any one of claims 1-9.
11. A private information use system, characterized in that the system comprises:
the request receiving module is used for receiving a use request of the privacy information;
the rule storage module is used for storing relevant rules used by the privacy information;
and the analysis module is used for analyzing the use request, acquiring the information of the user, the information required to be used, the scene of the use information and the use method of the information, and determining whether to allow the use and the use permission according to the related rule of the use of the privacy information.
CN202110274468.XA 2021-03-14 2021-03-14 Private information using method and system and computer readable storage medium Pending CN113127849A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110274468.XA CN113127849A (en) 2021-03-14 2021-03-14 Private information using method and system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110274468.XA CN113127849A (en) 2021-03-14 2021-03-14 Private information using method and system and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN113127849A true CN113127849A (en) 2021-07-16

Family

ID=76773428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110274468.XA Pending CN113127849A (en) 2021-03-14 2021-03-14 Private information using method and system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113127849A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874351A (en) * 2016-12-27 2017-06-20 浙江宇视科技有限公司 A kind of authority control method and equipment
CN107273754A (en) * 2016-04-08 2017-10-20 中兴通讯股份有限公司 A kind of data access control method and device
CN108763959A (en) * 2018-05-31 2018-11-06 深圳市零度智控科技有限公司 Medical method for protecting privacy, device and computer readable storage medium
CN109033846A (en) * 2018-06-08 2018-12-18 浙江捷尚人工智能研究发展有限公司 Privacy of user guard method and system
CN110569652A (en) * 2019-08-29 2019-12-13 武汉大学 Dynamic access control method based on user role adjustment
CN111353163A (en) * 2018-12-24 2020-06-30 华为技术有限公司 Method, device and storage medium for determining access authority
CN111597564A (en) * 2020-05-12 2020-08-28 Oppo广东移动通信有限公司 Data access and permission configuration method, device, terminal and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273754A (en) * 2016-04-08 2017-10-20 中兴通讯股份有限公司 A kind of data access control method and device
CN106874351A (en) * 2016-12-27 2017-06-20 浙江宇视科技有限公司 A kind of authority control method and equipment
CN108763959A (en) * 2018-05-31 2018-11-06 深圳市零度智控科技有限公司 Medical method for protecting privacy, device and computer readable storage medium
CN109033846A (en) * 2018-06-08 2018-12-18 浙江捷尚人工智能研究发展有限公司 Privacy of user guard method and system
CN111353163A (en) * 2018-12-24 2020-06-30 华为技术有限公司 Method, device and storage medium for determining access authority
CN110569652A (en) * 2019-08-29 2019-12-13 武汉大学 Dynamic access control method based on user role adjustment
CN111597564A (en) * 2020-05-12 2020-08-28 Oppo广东移动通信有限公司 Data access and permission configuration method, device, terminal and storage medium

Similar Documents

Publication Publication Date Title
Hiller et al. Privacy and security in the implementation of health information technology (electronic health records): US and EU compared
US20060136270A1 (en) Medical claim data transfer to medical deposit box and/or medical visit record
Breaux Legal requirements acquisition for the specification of legally compliant information systems
US20040117215A1 (en) Record system
US20080288407A1 (en) Method, system and computer program product for detecting and preventing fraudulent health care claims
US20160071226A1 (en) Method and System for Validating Compliance of Medical Records
Wright et al. Will Community Health Centers Survive COVID‐19?
Omary et al. Challenges to E-healthcare adoption in developing countries: A case study of Tanzania
Teng et al. Levels and influencing factors of mental workload among intensive care unit nurses: A systematic review and meta‐analysis
CN113127849A (en) Private information using method and system and computer readable storage medium
United States. Congress. Office of Technology Assessment Protecting privacy in computerized medical information
Mendelson et al. Medical confidentiality and patient privacy
US20070038628A1 (en) System and method for exchanging documents
Gaunt et al. Security of the electronic health care record-professional and ethical implications
Hutabarat et al. The Urgency Of Legal Protection Against The Implementation Of Electronic Information Technology-Based Medical Records In Regulation Of The Minister Of Health Of The Republic Of Indonesia Number 269 Of 2008
Saniei et al. PHDD: corpus of physical health data disclosure on Twitter during COVID-19 pandemic
Valverde The European electronic health record. Critics and future
Lyons et al. Pharmaceutical clinical trials transparency and privacy
CN110766004B (en) Medical identification data processing method and device, electronic equipment and readable medium
Hamilton Identification and evaluation of the security requirements in medical applications
Davidson et al. Universal Health Care Identifiers: The Challenge of Linking Medical Records
Lang et al. Online Therapeutic Portals for Sharing Health Research: Comparative Guidance amid Regulatory Uncertainty
WO2006060626A2 (en) Medical claim data transfer to medical deposit box and/or medical visit record
Szalados Medical Records and Confidentiality: Evolving Liability Issues Inherent in the Electronic Health Record, HIPAA, and Cybersecurity
Ekweani et al. Certificates of Confidentiality Following Enactment of the 21st Century Cures Act

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination