CN113726520A - Multi-authority revocable encrypted two-dimensional code electronic medical record based on block chain - Google Patents
Multi-authority revocable encrypted two-dimensional code electronic medical record based on block chain Download PDFInfo
- Publication number
- CN113726520A CN113726520A CN202110955312.8A CN202110955312A CN113726520A CN 113726520 A CN113726520 A CN 113726520A CN 202110955312 A CN202110955312 A CN 202110955312A CN 113726520 A CN113726520 A CN 113726520A
- Authority
- CN
- China
- Prior art keywords
- authority
- user
- dimensional code
- medical record
- patient
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Epidemiology (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a block chain-based multi-authority revocable encrypted two-dimensional code electronic medical record, wherein the authority of the electronic medical record comprises authority authentication after a user scans a two-dimensional code, and the user with access authority can continue to carry out authority matching; the right matching at least comprises that a first right user is the patient himself, and the patient can apply for accessing all medical record information belonging to the patient himself, but only has a read-only right; the second right user is a medical worker of a medical institution, the medical worker can apply for accessing and supplementing medical record information corresponding to symptoms, and has no access right to other information; the third authorized user is a cloud server, and the cloud server is only responsible for data transmission between other users and the blockchain and attribute revocation of the medical institution after the patient finishes the treatment.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a multi-authority revocable encrypted two-dimensional code electronic medical record based on a block chain.
Background
According to the '2020 development and statistics bulletin of health and health career of China' issued in 7 months in 2021, the total number of national medical and health institutions is up to 100 ten thousand, the total diagnosis and treatment times of the national medical and health institutions are up to 77.4 hundred million, and each medical institution generates massive medical data every day. When a patient is in a hospital, the patient usually needs to go through multiple stages of diagnosis and treatment, such as examination, operation, hospitalization, and double diagnosis, and the treatment needs to be performed by multiple doctors. Assuming that patient a has moved to hospital Q for a disease, hospital Q needs to hand over the information of patient a to a number of doctors at different positions for diagnosis. Doctor B is the principal doctor who needs to manage all basic information of the patient; doctor C is the attending physician and requires all the patient's case information; doctor D is a resident and only needs recent physical condition information of the patient. The information required for each phase is different and this involves personal privacy concerns for the patient. At present, the privacy protection authority is not set for the medical record of a patient, so that the privacy of different degrees can be leaked, and after the patient is discharged, the patient can not know that the medical record information of the patient can not be tampered or leaked, so that the situation that the patient does not have the control right for the medical data of the patient is formed, and the centralized information management system of a medical institution is easy to attack by hackers, internally leaked and tampered, and the medical privacy information safety of the patient can not be guaranteed.
Furthermore, in the existing medical data storage system, the operations of data collection, storage, transmission and the like all depend on each independent medical institution, namely the centralization degree is too high, and a patient does not have any control right on own medical data.
Secondly, part of the existing medical institutions directly upload all medical data of the patients to the block chain, which may cause the block storage pressure of the block chain to be too large, the invention only uploads the hash value of the encrypted data to the block chain, and the real medical data is stored in an interplanetary file system (IPFS) managed by an authority.
Finally, the existing electronic medical records and common medical records can externally see all information of patients, and the individual privacy of the patients cannot be protected in the inquiry process.
Disclosure of Invention
In view of the defects of the prior art, the invention aims to provide a block chain-based multi-authority revocable encrypted two-dimensional code electronic medical record, specifically, an encryption mechanism is used for carrying out hierarchical encryption on medical record contents of a patient, medical staff or a management mechanism scans a two-dimensional code to carry out identity authentication to obtain keys in different levels and corresponding decryption tokens (a user can obtain a random private key by scanning the two-dimensional code, and then obtains a ciphertext block which is sent by a cloud and accords with the user authority for initial decryption by uploading own attribute information, and obtains corresponding plaintext information by decrypting the ciphertext block with the private key), and the plaintext information (a data hash value and the key of the corresponding block) corresponding to the authority is obtained after decryption. And then, acquiring the original medical data stored in the interplanetary file system through a block chain according to the block hash value.
In order to achieve the technical purpose, the technical scheme adopted by the invention is as follows:
a block chain-based multi-authority revocable encrypted two-dimensional code electronic medical record is characterized in that the authority of the electronic medical record comprises authority authentication after a user scans a two-dimensional code, and the user with access authority can continue to perform authority matching; the right matching at least comprises that a first right user is the patient himself, and the patient can apply for accessing all medical record information belonging to the patient himself, but only has a read-only right; the second right user is a medical worker of a medical institution, the medical worker can apply for accessing and supplementing medical record information corresponding to symptoms, and has no access right to other information; the third authorized user is a cloud server, and the cloud server is only responsible for data transmission between other users and the blockchain and attribute revocation of the medical institution after the patient finishes the treatment.
It should be noted that when there is no right after scanning, the user without right will automatically quit accessing.
It should be further explained that the implementation manner of the multi-authority revocable encrypted two-dimensional code is as follows:
a registration stage: the global certificate authority CA performs registration authentication on the user and the attribute authority, and immediately sends a random number uid to the CA and a random number aid to the AAk after the authentication is passed;
AAk issues a private key public key: AAk calculates user authority, sends a secret key SK to the user and sends a public key PK to an encryption mechanism;
the key issuing authority PM distributes the public and private keys: the PM distributes a random public key PPKaid to the encryption mechanism EM, and simultaneously forms a two-dimensional code through calculation to distribute a private key PSKaid to the user;
and (3) an encryption stage: firstly, segmenting information based on user permission, primarily encrypting the information by using a PM issued random public key PPKaid to form a primary encryption ciphertext (FCT), secondarily encrypting the FCT by using an Access Structure (AS) and user attributes to finally form a secret text Set (SCT), and finally uploading the secondary encryption secret text Set (SCT) and the Access Structure (AS) to a cloud Server (Server);
and a decryption stage: the user uploads an attribute key SK and a global public key GPK to a server, the server primarily decrypts the ciphertext SCT based on the attribute through the global public key, the attribute key SK and an access mechanism AS to generate a primary decrypted ciphertext set FDC, and only returns the primary decrypted ciphertext which accords with the user authority according to the difference of the user authority, and does not return other information.
The medical treatment system has the advantages that the advantages of a block chain and the encrypted two-dimensional code with multiple removable authorities are combined, the privacy of a patient can be protected by the multiple authorities, and medical care personnel can only browse medical record information corresponding to diseases; in addition, the encryption mechanism EM is separated from the key issuing mechanism PM, and random numbers of the global certificate issuing mechanism CA are needed during decryption, so that hacker attack and collusion attack on patient information by a cloud server can be prevented, and the method is a first barrier for preventing medical data of the patient from being leaked; the secondary encryption based on the attribute is adopted to realize the sharing of the graded medical data, which is a second barrier for preventing the medical data of the patient from being leaked; the user part identification information is uploaded to the blockchain, and not all data is uploaded, so that the storage pressure of the blockchain can be relieved.
Drawings
FIG. 1 is a schematic flow diagram of the present invention;
fig. 2 is a diagram illustrating an implementation of a multi-rights revocable encrypted two-dimensional code according to the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings, and it should be noted that the present embodiment is based on the technical solution, and the detailed implementation and the specific operation process are provided, but the protection scope of the present invention is not limited to the present embodiment.
As shown in fig. 1, the invention is a block chain-based multi-authority revocable encrypted two-dimensional code electronic medical record, which is characterized in that the authority of the electronic medical record comprises authority authentication after a user scans a two-dimensional code, and the user with access authority can continue to perform authority matching; the right matching at least comprises that a first right user is the patient himself, and the patient can apply for accessing all medical record information belonging to the patient himself, but only has a read-only right; the second right user is a medical worker of a medical institution, the medical worker can apply for accessing and supplementing medical record information corresponding to symptoms, and has no access right to other information; the third authorized user is a cloud server, and the cloud server is only responsible for data transmission between other users and the blockchain and attribute revocation of the medical institution after the patient finishes the treatment.
Further, when there is no authority after scanning, the user without authority will automatically quit accessing.
Further, as shown in fig. 2, the multi-authority revocable encrypted two-dimensional code of the present invention is implemented in the following manner:
a registration stage: the global certificate authority CA performs registration authentication on the user and the attribute authority, and immediately sends a random number uid to the CA and a random number aid to the AAk after the authentication is passed;
AAk issues a private key public key: AAk calculates user authority, sends a secret key SK to the user and sends a public key PK to an encryption mechanism;
the key issuing authority PM distributes the public and private keys: the PM distributes a random public key PPKaid to the encryption mechanism EM, and simultaneously forms a two-dimensional code through calculation to distribute a private key PSKaid to the user;
and (3) an encryption stage: firstly, segmenting information based on user permission, primarily encrypting the information by using a PM issued random public key PPKaid to form a primary encryption ciphertext (FCT), secondarily encrypting the FCT by using an Access Structure (AS) and user attributes to finally form a secret text Set (SCT), and finally uploading the secondary encryption secret text Set (SCT) and the Access Structure (AS) to a cloud Server (Server);
and a decryption stage: the user uploads an attribute key SK and a global public key GPK to a server, the server primarily decrypts the ciphertext SCT based on the attribute through the global public key, the attribute key SK and an access mechanism AS to generate a primary decrypted ciphertext set FDC, and only returns the primary decrypted ciphertext which accords with the user authority according to the difference of the user authority, and does not return other information.
Based on the technical scheme of the invention, the following steps are realized:
1. only the patient himself/herself has access to all medical record information, and neither the cloud server nor the medical institution can modify the medical records without authorization.
2. And the attribute-based secondary encryption mode is adopted, namely the RSA encryption algorithm is utilized for the first encryption, and the access tree is constructed for the second time to carry out attribute-based secondary encryption, so that the information of the patient can be protected in an all-round way.
3. The encryption mechanism EM and the key issuing mechanism PM are separated, the random number of the global certificate issuing mechanism CA is needed during decryption, the encryption mechanism EM and the key issuing mechanism PM are balanced mutually, the cost of conspiracy attack on patient information is greatly increased, and the privacy information protection of the patient is guaranteed again.
4. The cloud server has the main function of attribute revocation, so that the medical record information of the patient cannot be contacted, and the dependence of the electronic medical record on the cloud server is effectively reduced.
Various modifications may be made by those skilled in the art based on the above technical solutions and concepts, and all such modifications or changes to other agents to be sprayed are intended to be included within the scope of the present invention.
Claims (3)
1. A block chain-based multi-authority revocable encrypted two-dimensional code electronic medical record is characterized in that the authority of the electronic medical record comprises authority authentication after a user scans a two-dimensional code, and the user with access authority can continue to perform authority matching; the right matching at least comprises that a first right user is the patient himself, and the patient can apply for accessing all medical record information belonging to the patient himself, but only has a read-only right; the second right user is a medical worker of a medical institution, the medical worker can apply for accessing and supplementing medical record information corresponding to symptoms, and has no access right to other information; the third authorized user is a cloud server, and the cloud server is only responsible for data transmission between other users and the blockchain and attribute revocation of the medical institution after the patient finishes the treatment.
2. The block chain based multi-authority revocable encrypted two-dimensional code electronic medical record according to claim 1, wherein when there is no authority after scanning, the user without authority will automatically quit accessing.
3. The block chain-based multi-authority revocable encrypted two-dimensional code electronic medical record according to claim 1, wherein the multi-authority revocable encrypted two-dimensional code is realized by the following steps: a registration stage: the global certificate authority CA performs registration authentication on the user and the attribute authority, and immediately sends a random number uid to the CA and a random number aid to the AAk after the authentication is passed;
AAk issues a private key public key: AAk calculates user authority, sends a secret key SK to the user and sends a public key PK to an encryption mechanism;
the key issuing authority PM distributes the public and private keys: the PM distributes a random public key PPKaid to the encryption mechanism EM, and simultaneously forms a two-dimensional code through calculation to distribute a private key PSKaid to the user;
and (3) an encryption stage: firstly, segmenting information based on user permission, primarily encrypting the information by using a PM issued random public key PPKaid to form a primary encryption ciphertext (FCT), secondarily encrypting the FCT by using an Access Structure (AS) and user attributes to finally form a secret text Set (SCT), and finally uploading the secondary encryption secret text Set (SCT) and the Access Structure (AS) to a cloud Server (Server);
and a decryption stage: the user uploads an attribute key SK and a global public key GPK to a server, the server primarily decrypts the ciphertext SCT based on the attribute through the global public key, the attribute key SK and an access mechanism AS to generate a primary decrypted ciphertext set FDC, and only returns the primary decrypted ciphertext which accords with the user authority according to the difference of the user authority, and does not return other information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110955312.8A CN113726520A (en) | 2021-08-19 | 2021-08-19 | Multi-authority revocable encrypted two-dimensional code electronic medical record based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110955312.8A CN113726520A (en) | 2021-08-19 | 2021-08-19 | Multi-authority revocable encrypted two-dimensional code electronic medical record based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113726520A true CN113726520A (en) | 2021-11-30 |
Family
ID=78676899
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110955312.8A Pending CN113726520A (en) | 2021-08-19 | 2021-08-19 | Multi-authority revocable encrypted two-dimensional code electronic medical record based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113726520A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115174235A (en) * | 2022-07-08 | 2022-10-11 | 慧之安信息技术股份有限公司 | Block chain-based internet of things revocable attribute encryption method |
CN115296845A (en) * | 2022-07-01 | 2022-11-04 | 中国科学院计算技术研究所 | Medical data hierarchical access control method and system based on attribute encryption |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090193267A1 (en) * | 2008-01-28 | 2009-07-30 | Chiasen Chung | Secure electronic medical record storage on untrusted portal |
WO2014201599A1 (en) * | 2013-06-17 | 2014-12-24 | 上海华和得易信息技术发展有限公司 | Method and system for information authentication authorization and secure use |
CN109559117A (en) * | 2018-11-14 | 2019-04-02 | 北京科技大学 | Block chain contract method for secret protection and system based on the encryption of attribute base |
CN110321721A (en) * | 2019-07-02 | 2019-10-11 | 石家庄铁道大学 | Electronic health record access control method based on block chain |
CN110517793A (en) * | 2019-09-02 | 2019-11-29 | 南京邮电大学 | A kind of interactive remote chcking ward system |
CN112307508A (en) * | 2020-10-01 | 2021-02-02 | 复旦大学 | Revocable data sharing system based on SGX, CP-ABE and block chain |
-
2021
- 2021-08-19 CN CN202110955312.8A patent/CN113726520A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090193267A1 (en) * | 2008-01-28 | 2009-07-30 | Chiasen Chung | Secure electronic medical record storage on untrusted portal |
WO2014201599A1 (en) * | 2013-06-17 | 2014-12-24 | 上海华和得易信息技术发展有限公司 | Method and system for information authentication authorization and secure use |
CN109559117A (en) * | 2018-11-14 | 2019-04-02 | 北京科技大学 | Block chain contract method for secret protection and system based on the encryption of attribute base |
CN110321721A (en) * | 2019-07-02 | 2019-10-11 | 石家庄铁道大学 | Electronic health record access control method based on block chain |
CN110517793A (en) * | 2019-09-02 | 2019-11-29 | 南京邮电大学 | A kind of interactive remote chcking ward system |
CN112307508A (en) * | 2020-10-01 | 2021-02-02 | 复旦大学 | Revocable data sharing system based on SGX, CP-ABE and block chain |
Non-Patent Citations (3)
Title |
---|
薛腾飞 等: "基于区块链的医疗数据共享模型研究", 《自动化学报》 * |
雷婉: "权限分离的医疗数据安全共享机制研究与实现", 《中国优秀硕士学位伦恩全文数据库(信息科技辑)》 * |
高丹 等: "基于可撤销外包属性加密的二维码加密", 《计算机科学》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115296845A (en) * | 2022-07-01 | 2022-11-04 | 中国科学院计算技术研究所 | Medical data hierarchical access control method and system based on attribute encryption |
CN115174235A (en) * | 2022-07-08 | 2022-10-11 | 慧之安信息技术股份有限公司 | Block chain-based internet of things revocable attribute encryption method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111986755B (en) | Data sharing system based on blockchain and attribute-based encryption | |
CN109741803A (en) | Medical data security cooperation system based on block chain | |
CN107391944A (en) | A kind of electronic health record shared system based on block chain | |
CN107635018B (en) | Cross-domain medical cloud storage system supporting emergency access control and safe deduplication | |
CN1939028A (en) | Accessing protected data on network storage from multiple devices | |
CN108040056A (en) | Safety medical treatment big data system based on Internet of Things | |
CN112422522B (en) | Medical data safety sharing method based on block chain | |
CN104683351A (en) | System and method for controlling anonymous hospitalizing and security access of medical information based on property | |
CN106407681B (en) | Cloud system environment personal health record storage access method | |
CN113726520A (en) | Multi-authority revocable encrypted two-dimensional code electronic medical record based on block chain | |
Du et al. | A medical information service platform based on distributed cloud and blockchain | |
KR20120041904A (en) | Proxy based privilege management method and apparatus for accessing health data in cloud computing environment | |
CN110808958A (en) | Medicine separation management system based on CP-ABE and block chain | |
Olakanmi et al. | FEACS: A fog enhanced expressible access control scheme with secure services delegation among carers in E-health systems | |
CN114912090A (en) | Block chain-based clinical test result mutual-recognition method and system | |
CN115883214A (en) | Electronic medical data sharing system and method based on alliance chain and CP-ABE | |
CN114553582A (en) | Electronic medical record sharing method based on national cryptographic algorithm and IPFS | |
JP2002111659A (en) | File encryption system, file encryption program and storage medium having recorded data | |
CN102057379B (en) | The method and system of health care data process | |
CN107659567A (en) | The ciphertext access control method and system of fine granularity lightweight based on public key cryptosyst | |
KR102605087B1 (en) | System and method for sharing patient's medical data in medical cloud environment | |
WO2014201599A1 (en) | Method and system for information authentication authorization and secure use | |
CN117294496A (en) | Intelligent home monitoring data safety management method based on blockchain | |
Fitri et al. | Secure attribute-based encryption with access control to data medical records | |
Rezaeibagha et al. | Multi-authority security framework for scalable EHR systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211130 |
|
RJ01 | Rejection of invention patent application after publication |