CN114491631B - Nursing sensitive index information interaction method and monitoring device - Google Patents

Nursing sensitive index information interaction method and monitoring device Download PDF

Info

Publication number
CN114491631B
CN114491631B CN202210089776.XA CN202210089776A CN114491631B CN 114491631 B CN114491631 B CN 114491631B CN 202210089776 A CN202210089776 A CN 202210089776A CN 114491631 B CN114491631 B CN 114491631B
Authority
CN
China
Prior art keywords
data
information
user
node
child node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210089776.XA
Other languages
Chinese (zh)
Other versions
CN114491631A (en
Inventor
杨俏兰
廖禄明
王亚丹
叶月果
陈蓉
朱梦露
林晓霓
岸婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong No 2 Peoples Hospital
Original Assignee
Guangdong No 2 Peoples Hospital
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong No 2 Peoples Hospital filed Critical Guangdong No 2 Peoples Hospital
Priority to CN202210089776.XA priority Critical patent/CN114491631B/en
Publication of CN114491631A publication Critical patent/CN114491631A/en
Application granted granted Critical
Publication of CN114491631B publication Critical patent/CN114491631B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • G16H40/20ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Biomedical Technology (AREA)
  • Epidemiology (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Alarm Systems (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The invention relates to a nursing sensitive index information interaction method, which comprises the following steps: taking a server used for reporting information at each position of each hospital in the medical conjunct as a sub-node, wherein each sub-node is in communication connection with different information acquisition devices, and all the sub-nodes jointly form a block chain network; setting a corresponding monitoring interval for each information acquisition device, and judging that the corresponding numerical value acquired by the information acquisition device is abnormal when the corresponding numerical value is not in the set monitoring interval; when any child node has data reporting, acquiring data information acquired by an information acquisition device for generating the data reporting by the child node, and judging whether the data information is abnormal or not; if the data information is abnormal, alarming and information storage are carried out, and if the data information is normal, direct storage is carried out; when data access is performed, corresponding data is fed back according to the verification identity of the user; the invention ensures the safety of the data and is not tampered on one hand, and protects the privacy of the user to a certain extent on the other hand.

Description

Nursing sensitive index information interaction method and monitoring device
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a nursing sensitive index information interaction method and device.
Background
The medical union refers to an regional medical union, and medical resources in the same region are integrated together, and a medical union is generally formed by a tertiary hospital, a secondary hospital, a community hospital and a village hospital in one region. Aims to solve the problem of difficult seeing by common people, the fever and the common cold are not needed to be extruded into a third-level hospital, and the problem of difficult seeing can be solved in a small hospital.
However, a significant problem exists in the medical conjunct, because most of the data of each inquiry of the user relates to personal privacy, is sensitive information and is related to the treatment result of the user, when the user interacts, the data needs to be ensured to be safe and not tampered, and the privacy of the user needs to be protected to a certain extent.
Disclosure of Invention
The invention aims to at least solve one of the defects in the prior art and provides a nursing sensitive index information interaction method and device.
In order to achieve the above object, the present invention adopts the following technical scheme,
specifically, a nursing sensitive index information interaction method is provided, which comprises the following steps:
taking a server used for reporting information at each hospital in the medical conjunct as a sub-node and distributing a corresponding private key, wherein each sub-node is connected with different information acquisition devices in a communication way, and all the sub-nodes jointly form a block chain network;
setting a corresponding monitoring interval for each information acquisition device, and judging that the corresponding numerical value acquired by the information acquisition device is abnormal when the corresponding numerical value is not in the set monitoring interval;
when any child node has data reporting, acquiring data information acquired by an information acquisition device for generating the data reporting by the child node, and judging whether the data information is abnormal or not;
if the data information is abnormal, alarming and information storage are carried out, and if the data information is normal, direct storage is carried out;
the information is stored in such a way that,
encrypting the data information as original data to form encrypted data, forming a data report form by the encrypted data, signing the data report form by the private key, broadcasting the signed data report form in a blockchain network,
each other child node performs calculation verification of a preset rule, a new block is created by the child node which passes the verification first, and a data report list recorded by the block is broadcasted to all child nodes in the block chain network and is provided with a time stamp;
the rest child nodes verify the validity of the data report list through a consensus mechanism, and after passing through the consensus mechanism, the new block is used as the last block in the block chain network to finish one-time information storage;
when information access is performed, user authentication is completed at any child node, data is not fed back to users which are not passed through the authentication, encrypted data is fed back to users which are passed through the authentication and do not have corresponding original data review authority, and original data is fed back to users which are passed through the authentication and have corresponding original data review authority.
Further, specifically, each of the other child nodes performs a calculation verification of the preset rule, including the following,
each child node calculates and searches a first value, so that the first value, a Hash value of a last block in the blockchain network and a data report form can calculate a Hash value meeting the condition through an SHA256 algorithm, and the Hash value meets the following condition;
and processing the private key of the child node corresponding to the first numerical value through an SECP256K1 algorithm to obtain a public key, converting the public key to obtain a hash value corresponding to the public key, taking the last 10 bits of the hash value corresponding to the public key, and judging that the condition is met when the last 10 bits of the hash value are the last 10 bits of the hash value corresponding to the public key.
Further, in particular, the determination of the time stamp includes,
defining all the child nodes for calculating the first value as power calculation nodes, randomly selecting other child nodes to complement the power calculation nodes by the preset number when the number of the power calculation nodes is smaller than the preset number, and selecting the power calculation nodes for calculating the first value by the preset number when the number of the power calculation nodes exceeds the preset number; the root mean square value of the current time of the power node of the first value is calculated and taken as a time stamp.
Further, specifically, the authentication of the user includes one or more of face recognition, fingerprint recognition, voiceprint recognition, and account password recognition.
Further, specifically, the authority corresponding to the identity of the user can be adjusted, but when each adjustment is performed, the authority is used as one data report to store data.
Further, the method also comprises the steps of,
when the user identity verification passes but does not have the corresponding original data reference right, the user can request to acquire the authorization of the user corresponding to the original data, and if the user corresponding to the original data confirms the authorization, the user can access the original data.
The invention also provides a nursing sensitive index information interaction monitoring device, which comprises the following steps:
the system comprises a block chain network construction module, a storage module and a storage module, wherein the block chain network construction module is used for taking a server used for information reporting at each position of each hospital in a medical conjunct as a sub-node and distributing a corresponding private key, each sub-node is in communication connection with different information acquisition devices, and all the sub-nodes jointly form a block chain network;
the abnormality judging module is used for setting a corresponding monitoring interval for each information acquisition device, and judging that the corresponding numerical value acquired by the information acquisition device is abnormal when the corresponding numerical value is not in the set monitoring interval;
the data reporting module is used for acquiring data information acquired by the information acquisition device for generating data reporting by any child node when the data reporting exists in the child node, and judging whether the data information is abnormal or not;
if the data information is abnormal, alarming and information storage are carried out, and if the data information is normal, direct storage is carried out;
the information is stored in such a way that,
encrypting the data information as original data to form encrypted data, forming a data report form by the encrypted data, signing the data report form by the private key, broadcasting the signed data report form in a blockchain network,
each other child node performs calculation verification of a preset rule, a new block is created by the child node which passes the verification first, and a data report list recorded by the block is broadcasted to all child nodes in the block chain network and is provided with a time stamp;
the rest child nodes verify the validity of the data report list through a consensus mechanism, and after passing through the consensus mechanism, the new block is used as the last block in the block chain network to finish one-time information storage;
and the information access module is used for completing the identity verification of the user at any sub-node when the information access is performed, feeding back no data to the user which does not pass the identity verification, feeding back the encrypted data to the user which passes the identity verification but does not have the corresponding original data reference authority, and feeding back the original data to the user which passes the identity verification and has the corresponding original data reference authority.
The invention also proposes a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the care sensitive index information interaction method according to any one of the claims.
The beneficial effects of the invention are as follows:
the invention provides a nursing sensitive index information interaction method, which uses a server for reporting information at each part in a medical conjunct as a sub-node and forms a blockchain network together, the information collected each time cannot be tampered through the decentralization of the blockchain network, in addition, the data can be encrypted when the data is reported, the personal privacy of a user is prevented from being leaked, in addition, whether the data has abnormality or not is verified when the data is collected, on one hand, the data safety is ensured and the data cannot be tampered, and on the other hand, the privacy of the user is protected to a certain extent.
Drawings
The above and other features of the present disclosure will become more apparent from the detailed description of the embodiments illustrated in the accompanying drawings, in which like reference numerals designate like or similar elements, and which, as will be apparent to those of ordinary skill in the art, are merely some examples of the present disclosure, from which other drawings may be made without inventive effort, wherein:
fig. 1 is a flowchart of a method for interacting information of nursing sensitive indexes according to the present invention.
Detailed Description
The conception, specific structure, and technical effects produced by the present invention will be clearly and completely described below with reference to the embodiments and the drawings to fully understand the objects, aspects, and effects of the present invention. It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other. The same reference numbers will be used throughout the drawings to refer to the same or like parts.
Referring to fig. 1, embodiment 1 of the present invention provides a nursing sensitive index information interaction method, which includes the following steps:
step 110, taking a server used for reporting information at each hospital in the medical conjunct as a sub-node and distributing a corresponding private key, wherein each sub-node is in communication connection with different information acquisition devices, and all sub-nodes jointly form a blockchain network;
step 120, setting a corresponding monitoring interval for each information acquisition device, and judging that the corresponding numerical value acquired by the information acquisition device is abnormal when the corresponding numerical value is not in the set monitoring interval;
130, when any child node reports data, acquiring data information acquired by an information acquisition device for generating the data report by the child node, and judging whether the data information is abnormal or not;
if the data information is abnormal, alarming and information storage are carried out, and if the data information is normal, direct storage is carried out;
the information is stored in such a way that,
encrypting the data information as original data to form encrypted data, forming a data report form by the encrypted data, signing the data report form by the private key, broadcasting the signed data report form in a blockchain network,
each other child node performs calculation verification of a preset rule, a new block is created by the child node which passes the verification first, and a data report list recorded by the block is broadcasted to all child nodes in the block chain network and is provided with a time stamp;
the rest child nodes verify the validity of the data report list through a consensus mechanism, and after passing through the consensus mechanism, the new block is used as the last block in the block chain network to finish one-time information storage;
and 140, when information access is performed, user authentication is completed at any sub-node, data is not fed back to users which do not pass the authentication, encrypted data is fed back to users which pass the authentication but do not have corresponding original data review authority, and the original data is fed back to users which pass the authentication and have corresponding original data review authority.
In this embodiment, the server used for reporting information in each medical conjunct is used as a child node, and forms a blockchain network together, so that the information collected each time cannot be tampered by decentralization of the blockchain network, in addition, the data can be encrypted when the data is reported, personal privacy of a user is prevented from being revealed, in addition, whether the data is abnormal or not is verified when the data is collected, on one hand, the data security is ensured and the data cannot be tampered, and on the other hand, the privacy of the user is protected to a certain extent.
As a preferred embodiment of the present invention, specifically, each of the other child nodes performs calculation verification of a preset rule, including the following,
each child node calculates and searches a first value, so that the first value, a Hash value of a last block in the blockchain network and a data report form can calculate a Hash value meeting the condition through an SHA256 algorithm, and the Hash value meets the following condition;
and processing the private key of the child node corresponding to the first numerical value through an SECP256K1 algorithm to obtain a public key, converting the public key to obtain a hash value corresponding to the public key, taking the last 10 bits of the hash value corresponding to the public key, and judging that the condition is met when the last 10 bits of the hash value are the last 10 bits of the hash value corresponding to the public key.
As a preferred embodiment of the present invention, in particular, the determination method of the time stamp includes the following,
defining all the child nodes for calculating the first value as power calculation nodes, randomly selecting other child nodes to complement the power calculation nodes by the preset number when the number of the power calculation nodes is smaller than the preset number, and selecting the power calculation nodes for calculating the first value by the preset number when the number of the power calculation nodes exceeds the preset number; the root mean square value of the current time of the power node of the first value is calculated and taken as a time stamp.
In this embodiment, considering the accuracy of the time stamp, the child node with strong computing power is found out, and the root mean square value of the current time of the found child node with strong computing power is calculated as the time stamp, so that the problem of the accuracy of the time stamp can be solved well.
As a preferred embodiment of the present invention, specifically, the authentication of the user includes one or more of face recognition, fingerprint recognition, voiceprint recognition, and account password recognition.
In this embodiment, in order to widen the diversity of identity recognition, the authentication of the user is set to be a combination form of the biological information of the user and the account password, so that the user can conveniently perform the identity recognition.
As a preferred embodiment of the present invention, specifically, the authority corresponding to the identity of the user may be adjusted, but each time the user adjusts, the authority is used as a data report to store data.
As a preferred embodiment of the invention, the method further comprises,
when the user identity verification passes but does not have the corresponding original data reference right, the user can request to acquire the authorization of the user corresponding to the original data, and if the user corresponding to the original data confirms the authorization, the user can access the original data.
The invention also provides a nursing sensitive index information interaction monitoring device, which comprises the following steps:
the system comprises a block chain network construction module, a storage module and a storage module, wherein the block chain network construction module is used for taking a server used for information reporting at each position of each hospital in a medical conjunct as a sub-node and distributing a corresponding private key, each sub-node is in communication connection with different information acquisition devices, and all the sub-nodes jointly form a block chain network;
the abnormality judging module is used for setting a corresponding monitoring interval for each information acquisition device, and judging that the corresponding numerical value acquired by the information acquisition device is abnormal when the corresponding numerical value is not in the set monitoring interval;
the data reporting module is used for acquiring data information acquired by the information acquisition device for generating data reporting by any child node when the data reporting exists in the child node, and judging whether the data information is abnormal or not;
if the data information is abnormal, alarming and information storage are carried out, and if the data information is normal, direct storage is carried out;
the information is stored in such a way that,
encrypting the data information as original data to form encrypted data, forming a data report form by the encrypted data, signing the data report form by the private key, broadcasting the signed data report form in a blockchain network,
each other child node performs calculation verification of a preset rule, a new block is created by the child node which passes the verification first, and a data report list recorded by the block is broadcasted to all child nodes in the block chain network and is provided with a time stamp;
the rest child nodes verify the validity of the data report list through a consensus mechanism, and after passing through the consensus mechanism, the new block is used as the last block in the block chain network to finish one-time information storage;
and the information access module is used for completing the identity verification of the user at any sub-node when the information access is performed, feeding back no data to the user which does not pass the identity verification, feeding back the encrypted data to the user which passes the identity verification but does not have the corresponding original data reference authority, and feeding back the original data to the user which passes the identity verification and has the corresponding original data reference authority.
The invention also proposes a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the care sensitive index information interaction method according to any one of the claims.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical modules, i.e., may be located in one place, or may be distributed over a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
In addition, each functional module in each embodiment of the present invention may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module. The integrated modules may be implemented in hardware or in software functional modules.
The integrated modules, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on this understanding, the present invention may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or system capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium includes content that may be suitably scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to such legislation and patent practice, such that the computer readable medium does not include electrical carrier signals and telecommunication signals.
While the present invention has been described in considerable detail and with particularity with respect to several described embodiments, it is not intended to be limited to any such detail or embodiments or any particular embodiment, but is to be construed as providing broad interpretation of such claims by reference to the appended claims in view of the prior art so as to effectively encompass the intended scope of the invention. Furthermore, the foregoing description of the invention has been presented in its embodiments contemplated by the inventors for the purpose of providing a useful description, and for the purposes of providing a non-essential modification of the invention that may not be presently contemplated, may represent an equivalent modification of the invention.
The present invention is not limited to the above embodiments, but is merely preferred embodiments of the present invention, and the present invention should be construed as being limited to the above embodiments as long as the technical effects of the present invention are achieved by the same means. Various modifications and variations are possible in the technical solution and/or in the embodiments within the scope of the invention.

Claims (8)

1. The nursing sensitive index information interaction method is characterized by comprising the following steps of:
taking a server used for reporting information at each hospital in the medical conjunct as a sub-node and distributing a corresponding private key, wherein each sub-node is connected with different information acquisition devices in a communication way, and all the sub-nodes jointly form a block chain network;
setting a corresponding monitoring interval for each information acquisition device, and judging that the corresponding numerical value acquired by the information acquisition device is abnormal when the corresponding numerical value is not in the set monitoring interval;
when any child node has data reporting, acquiring data information acquired by an information acquisition device for generating the data reporting by the child node, and judging whether the data information is abnormal or not;
if the data information is abnormal, alarming and information storage are carried out, and if the data information is normal, direct storage is carried out;
the information is stored in such a way that,
encrypting the data information as original data to form encrypted data, forming a data report form by the encrypted data, signing the data report form by the private key, broadcasting the signed data report form in a blockchain network,
each other child node performs calculation verification of a preset rule, a new block is created by the child node which passes the verification first, and a data report list recorded by the block is broadcasted to all child nodes in the block chain network and is provided with a time stamp;
the rest child nodes verify the validity of the data report list through a consensus mechanism, and after passing through the consensus mechanism, the new block is used as the last block in the block chain network to finish one-time information storage;
when information access is performed, user authentication is completed at any child node, data is not fed back to users which are not passed through the authentication, encrypted data is fed back to users which are passed through the authentication and do not have corresponding original data review authority, and original data is fed back to users which are passed through the authentication and have corresponding original data review authority.
2. The method for interaction of care sensitive index information according to claim 1, wherein the computing verification of the preset rule is performed by each of the other child nodes, including,
each child node calculates and searches a first value, so that the first value, a Hash value of a last block in the blockchain network and a data report form can calculate a Hash value meeting the condition through an SHA256 algorithm, and the Hash value meets the following condition;
and processing the private key of the child node corresponding to the first numerical value through an SECP256K1 algorithm to obtain a public key, converting the public key to obtain a hash value corresponding to the public key, taking the last 10 bits of the hash value corresponding to the public key, and judging that the condition is met when the last 10 bits of the hash value are the last 10 bits of the hash value corresponding to the public key.
3. The method for interaction of care sensitive index information according to claim 2, wherein the determining means of the time stamp comprises,
defining all the child nodes for calculating the first value as power calculation nodes, randomly selecting other child nodes to complement the power calculation nodes by the preset number when the number of the power calculation nodes is smaller than the preset number, and selecting the power calculation nodes for calculating the first value by the preset number when the number of the power calculation nodes exceeds the preset number; the root mean square value of the current time of the power node of the first value is calculated and taken as a time stamp.
4. The method for interaction of care sensitive index information according to claim 1, wherein the authentication of the user comprises one or more of face recognition, fingerprint recognition, voiceprint recognition, and account password recognition.
5. The method for interaction of information of sensitive indicators of care according to claim 1, wherein the rights corresponding to the identity of the user can be specifically adjusted, but each time the rights are adjusted, the rights are reported as data for data storage.
6. The method of claim 5, further comprising,
when the user identity verification passes but does not have the corresponding original data reference right, the user can request to acquire the authorization of the user corresponding to the original data, and if the user corresponding to the original data confirms the authorization, the user can access the original data.
7. Nursing sensitive index information interaction monitoring device, its characterized in that includes following:
the system comprises a block chain network construction module, a storage module and a storage module, wherein the block chain network construction module is used for taking a server used for information reporting at each position of each hospital in a medical conjunct as a sub-node and distributing a corresponding private key, each sub-node is in communication connection with different information acquisition devices, and all the sub-nodes jointly form a block chain network;
the abnormality judging module is used for setting a corresponding monitoring interval for each information acquisition device, and judging that the corresponding numerical value acquired by the information acquisition device is abnormal when the corresponding numerical value is not in the set monitoring interval;
the data reporting module is used for acquiring data information acquired by the information acquisition device for generating data reporting by any child node when the data reporting exists in the child node, and judging whether the data information is abnormal or not;
if the data information is abnormal, alarming and information storage are carried out, and if the data information is normal, direct storage is carried out;
the information is stored in such a way that,
encrypting the data information as original data to form encrypted data, forming a data report form by the encrypted data, signing the data report form by the private key, broadcasting the signed data report form in a blockchain network,
each other child node performs calculation verification of a preset rule, a new block is created by the child node which passes the verification first, and a data report list recorded by the block is broadcasted to all child nodes in the block chain network and is provided with a time stamp;
the rest child nodes verify the validity of the data report list through a consensus mechanism, and after passing through the consensus mechanism, the new block is used as the last block in the block chain network to finish one-time information storage;
and the information access module is used for completing the identity verification of the user at any sub-node when the information access is performed, feeding back no data to the user which does not pass the identity verification, feeding back the encrypted data to the user which passes the identity verification but does not have the corresponding original data reference authority, and feeding back the original data to the user which passes the identity verification and has the corresponding original data reference authority.
8. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method according to any of claims 1-6.
CN202210089776.XA 2022-01-25 2022-01-25 Nursing sensitive index information interaction method and monitoring device Active CN114491631B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210089776.XA CN114491631B (en) 2022-01-25 2022-01-25 Nursing sensitive index information interaction method and monitoring device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210089776.XA CN114491631B (en) 2022-01-25 2022-01-25 Nursing sensitive index information interaction method and monitoring device

Publications (2)

Publication Number Publication Date
CN114491631A CN114491631A (en) 2022-05-13
CN114491631B true CN114491631B (en) 2024-04-02

Family

ID=81475261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210089776.XA Active CN114491631B (en) 2022-01-25 2022-01-25 Nursing sensitive index information interaction method and monitoring device

Country Status (1)

Country Link
CN (1) CN114491631B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150102A (en) * 2022-08-29 2022-10-04 大有科工数字认证服务(北京)有限公司 Communication supervision method and system based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
CN110046521A (en) * 2019-04-24 2019-07-23 成都派沃特科技股份有限公司 Decentralization method for secret protection
CN111627542A (en) * 2020-05-29 2020-09-04 深圳市易链信息技术有限公司 Block chain-based medical information sharing method, system and readable storage medium
CN112307458A (en) * 2020-10-29 2021-02-02 深圳市赛肯威科技有限公司 Light node uplink method and device, Internet of things central control terminal and block chain network
WO2021208952A1 (en) * 2020-04-17 2021-10-21 支付宝(杭州)信息技术有限公司 Block chain-based image data recording, obtaining and verifying

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
CN110046521A (en) * 2019-04-24 2019-07-23 成都派沃特科技股份有限公司 Decentralization method for secret protection
WO2021208952A1 (en) * 2020-04-17 2021-10-21 支付宝(杭州)信息技术有限公司 Block chain-based image data recording, obtaining and verifying
CN111627542A (en) * 2020-05-29 2020-09-04 深圳市易链信息技术有限公司 Block chain-based medical information sharing method, system and readable storage medium
CN112307458A (en) * 2020-10-29 2021-02-02 深圳市赛肯威科技有限公司 Light node uplink method and device, Internet of things central control terminal and block chain network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
区块链技术在医疗数据存储方面的应用研究;褚孝鹏;;信息技术与信息化;20200628(06);全文 *
基于区块链的地学大数据管理;王亮;贺朗月;牛敬华;;国防科技;20180420(02);全文 *

Also Published As

Publication number Publication date
CN114491631A (en) 2022-05-13

Similar Documents

Publication Publication Date Title
EP3451579B1 (en) Multiple-phase rewritable blockchain
CN108681966B (en) Information supervision method and device based on block chain
US10305875B1 (en) Hybrid blockchain
CN112182519B (en) Computer storage system security access method and access system
CN111415163B (en) Block chain-based service processing and verifying method, system and verifying node
EP3474172A1 (en) Access control using a blockchain
JP2016131335A (en) Information processing method, information processing program and information processing device
CN108494783B (en) Protection method of cloud data
CN114491631B (en) Nursing sensitive index information interaction method and monitoring device
CN110740140A (en) network information security supervision system based on cloud platform
CN106921489B (en) Data encryption method and device
Barman et al. A blockchain‐based approach to secure electronic health records using fuzzy commitment scheme
Hicks et al. Vams: Verifiable auditing of access to confidential data
CN115831302A (en) Method and apparatus for managing disease control data
CN105118117A (en) Entrance guard identification device and method
CN115174602A (en) Data processing method and system applied to fishery management
CN118018336B (en) Data transmission method, server and storage medium
CN117353893B (en) Network information security verification method and system based on blockchain technology
CN117675200B (en) Identity-based verifiable data aggregation analysis system under assistance of SGX
CN117407849B (en) Industrial data security protection method and system based on industrial Internet technology
CN116798153B (en) Access control authorization opening method and device
Dilmaghani A privacy-preserving solution for storage and processing of personal health records against brute-force attacks
CN113806778A (en) Data management method, system and storage medium based on big data platform
CN116471030A (en) Intelligent cabinet linkage control system for entry and exit of property involved in case
CN117675200A (en) Identity-based verifiable data aggregation analysis system under assistance of SGX

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: Yang Qiaolan

Inventor after: Liao Luming

Inventor after: Wang Yadan

Inventor after: Ye Yueguo

Inventor after: Chen Rong

Inventor after: Zhu Menglu

Inventor after: Lin Xiaoni

Inventor after: Li Anting

Inventor before: Yang Qiaolan

Inventor before: Liao Luming

Inventor before: Wang Yadan

Inventor before: Ye Yueguo

Inventor before: Chen Rong

Inventor before: Zhu Menglu

Inventor before: Lin Xiaoni

Inventor before: An Ting

CB03 Change of inventor or designer information