CN114491631A - Nursing sensitive index information interaction method and monitoring device - Google Patents

Nursing sensitive index information interaction method and monitoring device Download PDF

Info

Publication number
CN114491631A
CN114491631A CN202210089776.XA CN202210089776A CN114491631A CN 114491631 A CN114491631 A CN 114491631A CN 202210089776 A CN202210089776 A CN 202210089776A CN 114491631 A CN114491631 A CN 114491631A
Authority
CN
China
Prior art keywords
data
information
user
child node
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210089776.XA
Other languages
Chinese (zh)
Other versions
CN114491631B (en
Inventor
杨俏兰
廖禄明
王亚丹
叶月果
陈蓉
朱梦露
林晓霓
岸婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong No 2 Peoples Hospital
Original Assignee
Guangdong No 2 Peoples Hospital
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong No 2 Peoples Hospital filed Critical Guangdong No 2 Peoples Hospital
Priority to CN202210089776.XA priority Critical patent/CN114491631B/en
Publication of CN114491631A publication Critical patent/CN114491631A/en
Application granted granted Critical
Publication of CN114491631B publication Critical patent/CN114491631B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • G16H40/20ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Biomedical Technology (AREA)
  • Epidemiology (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Alarm Systems (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The invention relates to a nursing sensitive index information interaction method, which comprises the following steps: taking each server for information reporting of each hospital in the hospital body as a sub-node, wherein each sub-node is in communication connection with different information acquisition devices, and all sub-nodes form a block chain network together; setting a corresponding monitoring interval for each information acquisition device, and judging that the value is abnormal when the corresponding value acquired by the information acquisition device is not in the set monitoring interval; when any child node has data report, acquiring data information acquired by an information acquisition device for generating data report by the child node, and judging whether the data information is abnormal or not; if the data information is abnormal, alarming and storing the information, and if the data information is normal, directly storing the data information; when data access is carried out, feeding back corresponding data according to the verification identity of the user; the invention ensures the data security and is not tampered on one hand, and protects the privacy of the user to a certain extent on the other hand.

Description

Nursing sensitive index information interaction method and monitoring device
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a nursing sensitive index information interaction method and device.
Background
The hospital body refers to a regional medical complex, which integrates medical resources in the same region, and generally comprises a third-level hospital, a second-level hospital, a community hospital and a village hospital in one region to form a medical complex. The aim is to solve the problem that people are difficult to see a doctor, people do not need to crowd the third-level hospital for catching a fever and a cold, and the problem that people are difficult to see a doctor can be solved in a small hospital.
However, there is a clear problem in the hospital, because most of the data of the user performing the inquiry at each time relates to personal privacy, is some sensitive information, and relates to the treatment result of the user, so when performing the interaction, on one hand, it is necessary to ensure the data to be safe and not to be tampered, and on the other hand, it is necessary to protect the privacy of the user to a certain extent.
Disclosure of Invention
The invention aims to solve at least one of the defects of the prior art and provides a nursing sensitive index information interaction method and device.
In order to achieve the above object, the present invention adopts the following technical means,
specifically, a nursing sensitive index information interaction method is provided, which comprises the following steps:
taking a server used for information reporting of each hospital in the hospital body as a sub-node and distributing a corresponding private key, wherein each sub-node is in communication connection with different information acquisition devices, and all the sub-nodes form a block chain network together;
setting a corresponding monitoring interval for each information acquisition device, and judging that the value is abnormal when the corresponding value acquired by the information acquisition device is not in the set monitoring interval;
when any child node has data report, acquiring data information acquired by an information acquisition device for generating data report by the child node, and judging whether the data information is abnormal or not;
if the data information is abnormal, alarming and storing the information, and if the data information is normal, directly storing the data information;
the information is stored in such a way that,
encrypting the data information as original data to form encrypted data, forming a data report form by the encrypted data and signing by the private key, broadcasting the signed data report form in a block chain network,
performing calculation verification of a preset rule on each of the other child nodes, creating a new block by the child node which passes the verification firstly, broadcasting a data report recorded by the block to all the child nodes in the block chain network, and covering a time stamp;
the remaining child nodes verify the validity of the data report through a consensus mechanism, and after the data report passes through the consensus mechanism, the new block is used as the last block in the block chain network to finish primary information storage;
when information access is carried out, authentication of the user is completed at any child node, data is not fed back to the user who fails authentication, encrypted data is fed back to the user who passes authentication but does not have corresponding original data lookup permission, and original data is fed back to the user who passes authentication and has corresponding original data lookup permission.
Further, specifically, each of the other child nodes performs calculation verification of the preset rule, including the following steps,
each child node calculates and searches a first numerical value, so that the first numerical value, a Hash value of the last block in the block chain network and a data report can calculate a Hash value meeting the following conditions through a SHA256 algorithm;
processing the private key of the child node corresponding to the first numerical value through an SECP256K1 algorithm to obtain a public key, converting the public key to obtain a hash value corresponding to the public key, taking the last 10 bits of the hash value corresponding to the public key, and determining that the condition is met when the last 10 bits of the hash value are the same as the last 10 bits of the hash value corresponding to the public key.
Further, specifically, the timestamp determination method includes the following,
defining all child nodes for calculating the first numerical value as force calculation nodes, randomly selecting other child nodes to complement the preset number together with the force calculation nodes when the number of the force calculation nodes is less than the preset number, and selecting the force calculation nodes of which the first numerical value is calculated by the preset number when the number of the force calculation nodes is more than the preset number; and calculating the root mean square value of the current time of the force node of the first numerical value, and taking the root mean square value as a time stamp.
Further, specifically, the user identity authentication includes one or more combinations of face recognition, fingerprint recognition, voiceprint recognition and account password recognition.
Further, specifically, the authority corresponding to the identity of the user may be adjusted, but each time adjustment is performed, the authority is reported as one time of data to be stored.
Further, the method may further comprise,
when the user identity authentication passes but does not have the corresponding original data reference right, the user can request to acquire the authorization of the user corresponding to the original data, and if the user corresponding to the original data confirms the authorization, the user can access the original data.
The invention also provides a nursing sensitive index information interaction monitoring device, which comprises the following components:
the block chain network construction module is used for taking each server for information reporting of each hospital in the hospital body as a sub-node and distributing a corresponding private key, each sub-node is in communication connection with different information acquisition devices, and all the sub-nodes form a block chain network together;
the abnormity judgment module is used for setting a corresponding monitoring interval for each information acquisition device, and judging that the value is abnormal when the corresponding value acquired by the information acquisition device is not in the set monitoring interval;
the data reporting module is used for acquiring data information acquired by an information acquisition device for generating data report by a child node and judging whether the data information is abnormal or not when the data report exists in any child node;
if the data information is abnormal, alarming and storing the information, and if the data information is normal, directly storing the data information;
the information is stored in such a way that,
encrypting the data information as original data to form encrypted data, forming a data report form by the encrypted data and signing by the private key, broadcasting the signed data report form in a block chain network,
performing calculation verification of a preset rule on each of the other child nodes, creating a new block by the child node which passes the verification firstly, broadcasting a data report recorded by the block to all the child nodes in the block chain network, and covering a time stamp;
the remaining child nodes verify the validity of the data report through a consensus mechanism, and after the data report passes through the consensus mechanism, the new block is used as the last block in the block chain network to finish primary information storage;
and the information access module is used for finishing the identity authentication of the user at any child node when information access is carried out, feeding back no data to the user who does not pass the identity authentication, feeding back encrypted data to the user who passes the identity authentication but does not have the corresponding original data reference authority, and feeding back the original data to the user who passes the identity authentication and has the corresponding original data reference authority.
The invention also proposes a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, implements the steps of any of the care-sensitive indicator information interaction methods.
The invention has the beneficial effects that:
the invention provides a nursing sensitive index information interaction method, which is characterized in that each server used for reporting information in a hospital body is used as a child node and jointly forms a block chain network, the information collected each time cannot be tampered through decentralized of the block chain network, in addition, data can be encrypted during data reporting, the personal privacy of a user is prevented from being leaked, in addition, whether the data is abnormal or not can be verified during data collection, on one hand, the data safety and the data are ensured and not tampered, and on the other hand, the privacy of the user is protected to a certain degree.
Drawings
The foregoing and other features of the present disclosure will become more apparent from the detailed description of the embodiments shown in conjunction with the drawings in which like reference characters designate the same or similar elements throughout the several views, and it is apparent that the drawings in the following description are merely some examples of the present disclosure and that other drawings may be derived therefrom by those skilled in the art without the benefit of any inventive faculty, and in which:
FIG. 1 is a flowchart illustrating a method for interacting information of a care-sensitive indicator according to the present invention.
Detailed Description
The conception, the specific structure and the technical effects produced by the present invention will be clearly and completely described in conjunction with the embodiments and the attached drawings, so as to fully understand the objects, the schemes and the effects of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The same reference numbers will be used throughout the drawings to refer to the same or like parts.
Referring to fig. 1, in embodiment 1, the present invention provides a nursing sensitive index information interaction method, including the following steps:
step 110, taking each server for information reporting of each hospital in the hospital body as a child node and distributing corresponding private keys, wherein each child node is in communication connection with different information acquisition devices, and all child nodes form a block chain network together;
step 120, setting a corresponding monitoring interval for each information acquisition device, and judging that the value is abnormal when the corresponding value acquired by the information acquisition device is not in the set monitoring interval;
step 130, when any child node has data report, acquiring data information acquired by an information acquisition device for generating data report by the child node, and judging whether the data information is abnormal;
if the data information is abnormal, alarming and storing the information, and if the data information is normal, directly storing the data information;
the information is stored in such a way that,
encrypting the data information as original data to form encrypted data, forming the encrypted data into a data report form, signing the data report form through the private key, broadcasting the signed data report form in a block chain network,
performing calculation verification of a preset rule on each of the other child nodes, creating a new block by the child node which passes the verification firstly, broadcasting a data report recorded by the block to all the child nodes in the block chain network, and covering a time stamp;
the remaining child nodes verify the validity of the data report through a consensus mechanism, and after the data report passes through the consensus mechanism, the new block is used as the last block in the block chain network to finish primary information storage;
step 140, when information access is performed, the user authentication is completed at any child node, data is not fed back to the user who does not pass the authentication, encrypted data is fed back to the user who passes the authentication but does not have the corresponding original data reference authority, and the original data is fed back to the user who passes the authentication and has the corresponding original data reference authority.
In the embodiment, each server used for information reporting in the hospital body is used as a child node and jointly forms a block chain network, information collected every time cannot be tampered through decentralized center of the block chain network, in addition, data can be encrypted during data reporting, personal privacy of a user is prevented from being leaked, in addition, whether the data are abnormal or not can be verified during data collection, on one hand, data safety is guaranteed and the data are not tampered, and on the other hand, privacy of the user is protected to a certain degree.
Specifically, as a preferred embodiment of the present invention, each of the other child nodes performs the calculation verification of the preset rule, including the following,
each child node calculates and searches a first numerical value, so that the first numerical value, a Hash value of the last block in the block chain network and a data report can calculate a Hash value meeting the following conditions through a SHA256 algorithm;
processing the private key of the child node corresponding to the first numerical value through an SECP256K1 algorithm to obtain a public key, converting the public key to obtain a hash value corresponding to the public key, taking the last 10 bits of the hash value corresponding to the public key, and determining that the condition is met when the last 10 bits of the hash value are the same as the last 10 bits of the hash value corresponding to the public key.
As a preferred embodiment of the present invention, specifically, the determination manner of the timestamp includes the following,
defining all child nodes for calculating the first numerical value as force calculation nodes, randomly selecting other child nodes to complement the preset number together with the force calculation nodes when the number of the force calculation nodes is less than the preset number, and selecting the force calculation nodes of which the first numerical value is calculated by the preset number when the number of the force calculation nodes is more than the preset number; and calculating the root mean square value of the current time of the force node of the first numerical value, and taking the root mean square value as a time stamp.
In the embodiment, the sub-node with strong computing power is found out by considering the accuracy of the timestamp, and the root mean square value of the current time of the found computing power node with strong computing power is calculated to be used as the timestamp, so that the accuracy of the timestamp can be better solved.
Specifically, as a preferred embodiment of the present invention, the authentication of the user includes one or more combinations of face recognition, fingerprint recognition, voiceprint recognition and account password recognition.
In the embodiment, in order to broaden the diversity of identity recognition, the identity authentication of the user is set to be a combination form of the biological information and the account password of the user, so that the identity recognition of the user is facilitated.
As a preferred embodiment of the present invention, specifically, the authority corresponding to the identity of the user may be adjusted, but each time the authority is adjusted, the authority is reported as one time of data to be stored.
As a preferred embodiment of the present invention, the method further comprises,
when the user identity authentication passes but does not have the corresponding original data reference right, the user can request to acquire the authorization of the user corresponding to the original data, and if the user corresponding to the original data confirms the authorization, the user can access the original data.
The invention also provides a nursing sensitive index information interaction monitoring device, which comprises the following components:
the block chain network construction module is used for taking each server for information reporting of each hospital in the hospital body as a sub-node and distributing a corresponding private key, each sub-node is in communication connection with different information acquisition devices, and all the sub-nodes form a block chain network together;
the abnormity judgment module is used for setting a corresponding monitoring interval for each information acquisition device, and judging that the value is abnormal when the corresponding value acquired by the information acquisition device is not in the set monitoring interval;
the data reporting module is used for acquiring data information acquired by an information acquisition device for generating data report by a child node and judging whether the data information is abnormal or not when the data report exists in any child node;
if the data information is abnormal, alarming and storing the information, and if the data information is normal, directly storing the data information;
the information is stored in such a way that,
encrypting the data information as original data to form encrypted data, forming a data report form by the encrypted data and signing by the private key, broadcasting the signed data report form in a block chain network,
performing calculation verification of a preset rule on each of the other child nodes, creating a new block by the child node which passes the verification firstly, broadcasting a data report recorded by the block to all the child nodes in the block chain network, and covering a time stamp;
the remaining child nodes verify the validity of the data report through a consensus mechanism, and after the data report passes through the consensus mechanism, the new block is used as the last block in the block chain network to finish primary information storage;
and the information access module is used for finishing the identity authentication of the user at any child node when information access is carried out, feeding back no data to the user who does not pass the identity authentication, feeding back encrypted data to the user who passes the identity authentication but does not have the corresponding original data reference authority, and feeding back the original data to the user who passes the identity authentication and has the corresponding original data reference authority.
The invention also proposes a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, implements the steps of any of the care-sensitive indicator information interaction methods.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one position, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium and can implement the steps of the above-described method embodiments when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or system capable of carrying said computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, etc. It should be noted that the computer readable medium includes content that can be suitably increased or decreased according to the requirements of legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunication signals according to legislation and patent practice.
While the present invention has been described in considerable detail and with particular reference to a few illustrative embodiments thereof, it is not intended to be limited to any such details or embodiments or any particular embodiments, but it is to be construed as effectively covering the intended scope of the invention by providing a broad, potential interpretation of such claims in view of the prior art with reference to the appended claims. Furthermore, the foregoing describes the invention in terms of embodiments foreseen by the inventor for which an enabling description was available, notwithstanding that insubstantial modifications of the invention, not presently foreseen, may nonetheless represent equivalent modifications thereto.
The above description is only a preferred embodiment of the present invention, and the present invention is not limited to the above embodiment, and the present invention shall fall within the protection scope of the present invention as long as the technical effects of the present invention are achieved by the same means. The invention is capable of other modifications and variations in its technical solution and/or its implementation, within the scope of protection of the invention.

Claims (8)

1. The nursing sensitive index information interaction method is characterized by comprising the following steps:
taking each server for information reporting of each hospital in the hospital body as a child node and distributing a corresponding private key, wherein each child node is in communication connection with different information acquisition devices, and all the child nodes form a block chain network together;
setting a corresponding monitoring interval for each information acquisition device, and judging that the value is abnormal when the corresponding value acquired by the information acquisition device is not in the set monitoring interval;
when any child node has data report, acquiring data information acquired by an information acquisition device for generating data report by the child node, and judging whether the data information is abnormal or not;
if the data information is abnormal, alarming and storing the information, and if the data information is normal, directly storing the data information;
the information is stored in such a manner that,
encrypting the data information as original data to form encrypted data, forming a data report form by the encrypted data and signing by the private key, broadcasting the signed data report form in a block chain network,
performing calculation verification of a preset rule on each of the other child nodes, creating a new block by the child node which passes the verification firstly, broadcasting a data report recorded by the block to all the child nodes in the block chain network, and covering a time stamp;
the remaining child nodes verify the validity of the data report through a consensus mechanism, and after the data report passes through the consensus mechanism, the new block is used as the last block in the block chain network to finish primary information storage;
when information access is carried out, authentication of the user is completed at any child node, data is not fed back to the user who fails authentication, encrypted data is fed back to the user who passes authentication but does not have corresponding original data lookup permission, and original data is fed back to the user who passes authentication and has corresponding original data lookup permission.
2. The method for interacting the care-sensitive index information according to claim 1, wherein specifically, each of the other sub-nodes performs the calculation verification of the preset rule, including the following steps,
each child node calculates and searches a first numerical value, so that the first numerical value, a Hash value of the last block in the block chain network and a data report can calculate a Hash value meeting the following conditions through a SHA256 algorithm;
processing the private key of the child node corresponding to the first numerical value through an SECP256K1 algorithm to obtain a public key, converting the public key to obtain a hash value corresponding to the public key, taking the last 10 bits of the hash value corresponding to the public key, and determining that the condition is met when the last 10 bits of the hash value are the same as the last 10 bits of the hash value corresponding to the public key.
3. The method for interacting care-sensitive indicator information according to claim 2, wherein the timestamp is determined in a manner including,
defining all child nodes for calculating the first numerical value as force calculation nodes, randomly selecting other child nodes to complement the preset number together with the force calculation nodes when the number of the force calculation nodes is less than the preset number, and selecting the force calculation nodes of which the first numerical value is calculated by the preset number when the number of the force calculation nodes is more than the preset number; and calculating the root mean square value of the current time of the force node of the first numerical value, and taking the root mean square value as a time stamp.
4. The method for interacting care-sensitive index information as recited in claim 1, wherein the user identity authentication specifically comprises one or more of face recognition, fingerprint recognition, voiceprint recognition and account password recognition.
5. The method for interacting care-sensitive indicator information as recited in claim 1, wherein the authority corresponding to the identity of the user is adjustable, and each adjustment is performed as a data report for data storage.
6. The care-sensitive indicator information interaction method of claim 5, further comprising,
when the user identity authentication passes but does not have the corresponding original data reference right, the user can request to acquire the authorization of the user corresponding to the original data, and if the user corresponding to the original data confirms the authorization, the user can access the original data.
7. Sensitive index information interaction monitoring devices of nursing, its characterized in that includes the following:
the block chain network construction module is used for taking each server for information reporting of each hospital in the hospital body as a sub-node and distributing a corresponding private key, each sub-node is in communication connection with different information acquisition devices, and all the sub-nodes form a block chain network together;
the abnormity judgment module is used for setting a corresponding monitoring interval for each information acquisition device, and judging that the value is abnormal when the corresponding value acquired by the information acquisition device is not in the set monitoring interval;
the data reporting module is used for acquiring data information acquired by an information acquisition device for generating data report by a child node and judging whether the data information is abnormal or not when the data report exists in any child node;
if the data information is abnormal, alarming and storing the information, and if the data information is normal, directly storing the data information;
the information is stored in such a way that,
encrypting the data information as original data to form encrypted data, forming a data report form by the encrypted data and signing by the private key, broadcasting the signed data report form in a block chain network,
performing calculation verification of a preset rule on each of the other child nodes, creating a new block by the child node which passes the verification firstly, broadcasting a data report recorded by the block to all the child nodes in the block chain network, and covering a time stamp;
the remaining child nodes verify the validity of the data report through a consensus mechanism, and after the data report passes through the consensus mechanism, the new block is used as the last block in the block chain network to finish primary information storage;
and the information access module is used for finishing the identity authentication of the user at any child node when information access is carried out, feeding back no data to the user who does not pass the identity authentication, feeding back encrypted data to the user who passes the identity authentication but does not have the corresponding original data reference authority, and feeding back the original data to the user who passes the identity authentication and has the corresponding original data reference authority.
8. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
CN202210089776.XA 2022-01-25 2022-01-25 Nursing sensitive index information interaction method and monitoring device Active CN114491631B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210089776.XA CN114491631B (en) 2022-01-25 2022-01-25 Nursing sensitive index information interaction method and monitoring device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210089776.XA CN114491631B (en) 2022-01-25 2022-01-25 Nursing sensitive index information interaction method and monitoring device

Publications (2)

Publication Number Publication Date
CN114491631A true CN114491631A (en) 2022-05-13
CN114491631B CN114491631B (en) 2024-04-02

Family

ID=81475261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210089776.XA Active CN114491631B (en) 2022-01-25 2022-01-25 Nursing sensitive index information interaction method and monitoring device

Country Status (1)

Country Link
CN (1) CN114491631B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150102A (en) * 2022-08-29 2022-10-04 大有科工数字认证服务(北京)有限公司 Communication supervision method and system based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
CN110046521A (en) * 2019-04-24 2019-07-23 成都派沃特科技股份有限公司 Decentralization method for secret protection
CN111627542A (en) * 2020-05-29 2020-09-04 深圳市易链信息技术有限公司 Block chain-based medical information sharing method, system and readable storage medium
CN112307458A (en) * 2020-10-29 2021-02-02 深圳市赛肯威科技有限公司 Light node uplink method and device, Internet of things central control terminal and block chain network
WO2021208952A1 (en) * 2020-04-17 2021-10-21 支付宝(杭州)信息技术有限公司 Block chain-based image data recording, obtaining and verifying

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
CN110046521A (en) * 2019-04-24 2019-07-23 成都派沃特科技股份有限公司 Decentralization method for secret protection
WO2021208952A1 (en) * 2020-04-17 2021-10-21 支付宝(杭州)信息技术有限公司 Block chain-based image data recording, obtaining and verifying
CN111627542A (en) * 2020-05-29 2020-09-04 深圳市易链信息技术有限公司 Block chain-based medical information sharing method, system and readable storage medium
CN112307458A (en) * 2020-10-29 2021-02-02 深圳市赛肯威科技有限公司 Light node uplink method and device, Internet of things central control terminal and block chain network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王亮;贺朗月;牛敬华;: "基于区块链的地学大数据管理", 国防科技, no. 02, 20 April 2018 (2018-04-20) *
褚孝鹏;: "区块链技术在医疗数据存储方面的应用研究", 信息技术与信息化, no. 06, 28 June 2020 (2020-06-28) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150102A (en) * 2022-08-29 2022-10-04 大有科工数字认证服务(北京)有限公司 Communication supervision method and system based on block chain

Also Published As

Publication number Publication date
CN114491631B (en) 2024-04-02

Similar Documents

Publication Publication Date Title
US6845453B2 (en) Multiple factor-based user identification and authentication
CN112182519B (en) Computer storage system security access method and access system
US9984220B2 (en) Method of authenticating a user holding a biometric certificate
US20090034735A1 (en) Auditing secret key cryptographic operations
DE102016225355A1 (en) Create a database for multi-factor dynamic authentication
ATE347706T1 (en) METHOD AND DEVICE FOR IDENTIFYING AN AUTHORIZED PERSON BY MEANS OF UNPREDICTABLE, ONCE-USEABLE PASSWORDS
CN109981290A (en) The communication system and method close based on no certificate label under a kind of intelligent medical environment
CN117113199A (en) File security management system and method based on artificial intelligence
CN110287670A (en) A kind of biological information and identity information correlating method, system and equipment
Gao Biometric authentication in smart grid
CN114491631A (en) Nursing sensitive index information interaction method and monitoring device
CN117272349A (en) Method, system and storage medium for protecting security of relational database
Gobi et al. A secured public key cryptosystem for biometric encryption
CN117371048B (en) Remote access data processing method, device, equipment and storage medium
EP2988291B1 (en) Method, system and computer program for personal data sharing
CN117353893B (en) Network information security verification method and system based on blockchain technology
Said et al. A multi-factor authentication-based framework for identity management in cloud applications
CN113591051A (en) Electronic file full life cycle information security system and method
CN110826038B (en) Data encryption and decryption method and device
CN116484341A (en) Digital information processing method and system based on hash encryption algorithm
CN112507355B (en) Personal health data storage system based on block chain
CN115831302A (en) Method and apparatus for managing disease control data
El-Yahyaoui et al. An improved framework for biometric Database's privacy
KR101864213B1 (en) Apparatus and method for biometric encryption
CN115174602A (en) Data processing method and system applied to fishery management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: Yang Qiaolan

Inventor after: Liao Luming

Inventor after: Wang Yadan

Inventor after: Ye Yueguo

Inventor after: Chen Rong

Inventor after: Zhu Menglu

Inventor after: Lin Xiaoni

Inventor after: Li Anting

Inventor before: Yang Qiaolan

Inventor before: Liao Luming

Inventor before: Wang Yadan

Inventor before: Ye Yueguo

Inventor before: Chen Rong

Inventor before: Zhu Menglu

Inventor before: Lin Xiaoni

Inventor before: An Ting

CB03 Change of inventor or designer information