CN116508111A - Control method of working mode, monitoring equipment, monitoring system and readable storage medium - Google Patents

Control method of working mode, monitoring equipment, monitoring system and readable storage medium Download PDF

Info

Publication number
CN116508111A
CN116508111A CN202080107213.8A CN202080107213A CN116508111A CN 116508111 A CN116508111 A CN 116508111A CN 202080107213 A CN202080107213 A CN 202080107213A CN 116508111 A CN116508111 A CN 116508111A
Authority
CN
China
Prior art keywords
information
monitoring
mode
preset
privacy mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202080107213.8A
Other languages
Chinese (zh)
Inventor
郑力
权宁辉
张启凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Mindray Bio Medical Electronics Co Ltd
Original Assignee
Shenzhen Mindray Bio Medical Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Mindray Bio Medical Electronics Co Ltd filed Critical Shenzhen Mindray Bio Medical Electronics Co Ltd
Publication of CN116508111A publication Critical patent/CN116508111A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • G16H40/60ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices
    • G16H40/67ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation

Abstract

A control method of an operation mode, applied to a monitoring device, the control method comprising: when the monitoring device detects a first operation in a normal mode, the monitoring device acquires first identity verification information according to first operation information corresponding to the first operation (S301); when the first authentication information matches with preset first authentication information, the monitoring device switches from the normal mode to a preset privacy mode (S302). Therefore, the authorized user can set the working mode of the monitoring device, the information security is improved, and the use experience of the user is improved.

Description

Control method of working mode, monitoring equipment, monitoring system and readable storage medium Technical Field
The present disclosure relates to the field of medical technologies, and in particular, to a method for controlling a working mode, a monitoring device, a monitoring system, and a readable storage medium.
Background
In the monitoring process, under the condition that the monitor is normally connected with the central station, the monitor end can enter a privacy mode when patient information needs to be protected from non-clinical personnel such as visitors. In the privacy mode, patient information and monitored data are not displayed on the monitor to protect the patient information from non-clinical personnel such as guests, while in the privacy mode the monitor is still monitoring the patient, but the monitored data is only displayed on the central monitoring system.
However, this type of privacy mode still has problems, such as careless touching of the monitor's screen or keys by non-medical personnel, which can easily cause exiting the privacy mode to reveal patient information.
Disclosure of Invention
In view of the above, the present invention provides a control method for an operation mode, a monitoring device, a monitoring system and a readable storage medium for solving the above problems.
In a first aspect, the present application provides a control method of an operation mode, applied to a monitoring device, where the control method includes:
when the monitoring device detects a first operation in a common mode, the monitoring device acquires first identity verification information according to first operation information corresponding to the first operation;
and when the first authentication information is matched with preset first authentication information, the monitoring equipment is switched to a preset privacy mode from the common mode.
In a second aspect, the present application provides a control method of another operation mode, applied to a monitoring system, where the monitoring system includes a monitoring device and a central station, the control method includes:
when the monitoring equipment detects a first operation in a common mode, the monitoring equipment wakes up the function of the acquisition device and acquires first identity verification information of a user corresponding to the first operation, which is acquired by the acquisition device;
When the first authentication information is matched with preset first authentication information, the monitoring equipment is switched from the common mode to a preset privacy mode;
the monitoring device sends a first control instruction to the central station after entering the preset privacy mode;
the central station receives the first control instruction and switches the monitoring management mode of the current patient monitored by the monitoring equipment from a common mode to a preset privacy mode according to the first control instruction.
In a third aspect, the present application provides a method for controlling a working mode, where the method includes that a central station receives a first control instruction sent by a monitoring device that is in communication connection with the central station, where the first control instruction is an instruction sent to the central station after the monitoring device enters a preset privacy mode; the central station determines a display section of a current patient monitored by the monitoring device on the central station according to the first control instruction; the central station switches the display mode of the display section from a common mode to a privacy mode corresponding to a preset privacy mode on the monitoring device.
In a fourth aspect, the present application provides a monitoring device, including a processor, where the processor is configured to, when the monitoring device detects a first operation in a normal mode, obtain first authentication information according to first operation information corresponding to the first operation, and control the monitoring device to switch from the normal mode to a preset privacy mode when the first authentication information matches with preset first authentication information.
In a fifth aspect, the present application provides a monitoring system, including the monitoring device and a central station, where the central station includes a processor, and the processor of the central station is configured to receive a first control instruction sent by the monitoring device after entering a preset privacy mode, and to enter, according to the first control instruction, a monitoring management mode of a current patient monitored by the monitoring device from a normal mode to the preset privacy mode.
In a sixth aspect, the present application provides a readable storage medium having stored thereon an interactive program which, when executed by a processor, performs a method of controlling an operating mode as described above.
The application provides a control method of an operating mode, monitoring equipment, a monitoring system and a readable storage medium. The control method of the working mode is based on the fact that when the monitoring device detects a first operation in a common mode, the monitoring device acquires first identity verification information according to first operation information corresponding to the first operation; when the first authentication information is matched with preset first authentication information, the monitoring equipment is switched from the common mode to a preset privacy mode, so that only authorized users such as medical staff can set the working mode and other settings of the monitoring equipment, the problem that the privacy mode is easy to be quitted by misoperation of unauthorized users is solved, the safety and usability of the privacy mode are improved, the equipment is independent of a central station connected with the equipment in a communication mode, the switching between the common mode and the privacy mode can be realized, and the use experience of the users is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of program modules of a monitoring device according to an embodiment of the present application.
Fig. 2 is a schematic diagram of program modules of a monitoring system according to an embodiment of the present application.
Fig. 3 is a flowchart illustrating steps of a method for controlling an operation mode in a first embodiment of the present application.
Fig. 4 is an interface diagram of a patient information management interface displayed by the monitoring device of fig. 1.
Fig. 5 is an interface diagram of a privacy settings interface displayed by the monitoring device of fig. 1.
Fig. 6 is an interface diagram of a privacy attribute setting interface displayed by the monitoring device of fig. 1.
Fig. 7 is an interface diagram of the monitoring device in fig. 1 in a screen-locked state in a preset privacy mode.
Fig. 8 is an interface diagram of a first embodiment of the monitoring device of fig. 1 unlocking the monitoring device in a preset privacy mode.
Fig. 9 is an interface diagram of a second embodiment of the monitoring device of fig. 1 unlocking the monitoring device in a preset privacy mode.
Fig. 10 is an unlocked interface diagram of the monitoring device of fig. 1 in a third embodiment of unlocking the monitoring device in a preset privacy mode.
Fig. 11 is a flowchart illustrating steps of a method for controlling an operation mode in a second embodiment of the present application.
DETAILED DESCRIPTION OF EMBODIMENT (S) OF INVENTION
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
At present, the existing monitoring equipment can enter a privacy mode only by relying on a central station which is in communication connection with the monitoring equipment, and the monitoring equipment cannot be directly switched between a common mode and the privacy mode, so that medical staff cannot directly set the working mode of the monitoring equipment, the workload of the medical staff is increased, and the user experience is reduced. Further, the existing monitoring equipment does not display private information, monitoring information and alarm information of a patient in a privacy mode, so that family members cannot remind medical staff at the first time when the monitoring equipment generates the alarm information, and the risk of illness state delay of the patient is greatly increased. In addition, the central station which is in communication connection with the monitoring equipment can still display private information and monitored information of the patient monitored by the monitoring equipment, so that leakage of privacy of the patient has a certain risk, and user experience is reduced.
Furthermore, the operating mode of the central station is not synchronized with the setting of the operating mode of the monitoring device. For example, after the monitoring device enters the privacy mode, the central station remains in the normal mode. Non-clinical healthcare personnel can reset the alarm of the monitoring device, for example, modify the alarm parameter threshold or turn off the alarm function, thereby greatly increasing the risk of patient delays. Furthermore, the patient information which can be exported by the user at the central station, the printed detection report and the checked patient information all contain private information of the patient, so that the risk of leakage of privacy of the patient is greatly increased, and the experience of the user is reduced.
Referring to fig. 1, fig. 1 is a schematic diagram illustrating program modules of a monitoring device 100 according to an embodiment of the present application. The monitoring device 100 includes, but is not limited to, a sensor 10 and a processor 20, a display 30, and a collection device 40 communicatively coupled to the sensor 10. The processor 20 is configured to, when the monitoring device detects a first operation in a normal mode, obtain first authentication information according to first operation information corresponding to the first operation; and when the first authentication information is matched with preset first authentication information, the monitoring equipment is switched to a preset privacy mode from the common mode.
In this way, in the present application, based on when the monitoring device detects a first operation in a normal mode, the monitoring device wakes up a function of an acquisition device, and acquires first authentication information of a user corresponding to the first operation acquired by the acquisition device; when the first authentication information is matched with preset first authentication information, the monitoring equipment is switched from the common mode to a preset privacy mode, so that only authorized users such as medical staff can set the working mode and other settings of the monitoring equipment, the problem that the privacy mode is easy to be quitted by misoperation of unauthorized users is solved, the safety and usability of the privacy mode are improved, the equipment is independent of a central station connected with the equipment in a communication mode, the switching between the common mode and the privacy mode can be realized, and the use experience of the users is improved.
The processor 20 is further configured to determine the information content displayed by the monitoring device 100 according to the preset privacy mode, where the information content displayed by the different privacy modes is different. Thus, different privacy modes are applied to different scenes, different display requirements of the user on the monitoring device 100 in different scenes are met, the display functions are diversified, and the user experience is improved.
For example, in a home visit scenario, it is generally not desirable to visit the home and browse the private information and the monitored information of the patient, so the monitoring device 100 does not display the private information and the monitored information corresponding to the current patient in the preset privacy mode, so that the visitor or the non-clinical staff cannot browse the private information or other important information of the patient, and the information security and the security of using the monitoring device 100 by the patient are improved. In addition, the monitoring device 100 can display the alarm information generated by the monitoring device 100 in the preset privacy mode, so that the family members can remind medical staff at the first time when the monitoring device 100 generates the alarm information, and the risk of patient illness delay is greatly reduced.
Under the scene of daily guardianship, medical staff hopes to browse patient's guardianship information in real time to the state of convenient understanding patient, consequently guardianship equipment 100 can show in the privacy mode of predetermineeing guardianship information and the alarm information that current patient corresponds, and not show the privacy information that current patient corresponds, thereby make things convenient for medical staff in time to know patient's state of illness, visitor or non-clinical staff can not browse patient's privacy information or other important information simultaneously, have improved information security and patient's security of using guardianship equipment 100.
Under the scene that nurses visit, shift and central station observe, medical personnel generally need observe and record and print patient's physiological parameter, even revise current patient's alarm parameter, therefore the central station is after entering privacy mode, and the central station can show patient's guardianship information and alarm information etc.. In addition, after entering the privacy mode, the central station does not contain private information of the patient, and performs identity information verification before the deriving operation; the printed detection report does not contain patient information, and identity information verification is carried out before the printing operation; when the patient information is checked, the private information of the patient is not displayed and is encrypted before the checking operation, so that a visitor or a non-clinical person cannot browse the private information or other important information of the patient, and the information safety and the safety of the patient in using the monitoring device 100 are improved. It should be noted that the central station may establish a communication connection with the monitoring device to perform centralized management on the monitoring information of the monitoring device.
It should be understood by those skilled in the art that the illustrated monitoring device 100 of fig. 1 is merely an example and not limiting of the monitoring device 100, and that the monitoring device 100 may include more or less components than those illustrated in fig. 1, or may combine certain components, or different components, e.g., the monitoring device 100 may further include a power module, an a/D converter, a printer, etc.
The monitoring device 100 may be used to monitor one or more vital sign parameters of a patient's heart, respiration, body temperature, pulse oxygen saturation, heart rate, blood oxygen, non-invasive blood pressure, exercise, sleep. The monitoring device 100 may be a portable monitoring device, a transportable monitoring device, or a mobile monitoring device.
The sensor 10 and the processor 20, the display 30 and the acquisition device 40 may be connected by a wired communication protocol or a wireless communication protocol, so that data interaction between the sensor 10 and the processor 20 may be performed. The wireless communication protocol includes, but is not limited to: the world wide web, metropolitan area networks, intranets, generation mobile communication networks (2G, 3G, 4G, and 5G), wireless local area networks, and/or WiFi (Wireless Fidelity ) networks.
The sensor 10 user collects the monitored parameters of the patient. Wherein the monitored parameters may include physiological parameters and non-physiological parameters. The physiological parameters include, but are not limited to, any of electrocardiography, respiration, body temperature, pulse oxygen saturation, pulse rate, blood oxygen, non-invasive blood pressure, invasive blood pressure. The non-physiological parameters include, but are not limited to, any of a kinetic parameter, a sleep parameter. Such as, but not limited to, motion energy consumption, motion time, number of motion steps, and ratio of bed-to-bed times. Such as, but not limited to, sleep time, deep sleep, sleep quality.
In one embodiment, the sensor 10 may be independently disposed outside the monitoring device 100 to be detachably connected to the monitoring device 100. The sensor 10 is used to acquire monitoring parameters of a patient. The processor 20 is also configured to process the monitored parameters from the sensor 10 to obtain monitored information and control the display 30 to display the monitored information. The sensor 10 includes, but is not limited to, an electrocardiograph, respiration, blood oxygen, blood pressure, body temperature, etc. monitoring attachment. Wherein the monitoring device 100 is provided with several connection interfaces. The several connection ports may be an electrocardiographic/respiratory interface, a blood oxygen interface, an invasive blood pressure interface, a non-invasive blood pressure interface, and/or a body temperature interface, etc. The monitoring information monitoring accessory is electrically connected to the monitoring device 100 through the connection interface. In other embodiments, the sensor 10 may also be integrated on the monitoring device 100.
In some embodiments, the sensor 10 may also be, but is not limited to, a motion sensor, an acoustic wave detection sensor. The motion sensor is, for example, an acceleration sensor. The acceleration sensor may be used to acquire motion parameters and sleep parameters of the patient. The acoustic wave detection sensor may be used to acquire sleep parameters of a patient.
The processor 20 may also be used to control the cooperation of the various functional devices within the monitoring device 100. The processor 20 may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The processor 20 is a control center of the monitoring device 100 and connects various portions of the overall monitoring device 100 using various interfaces and lines.
The display 30 is used for providing visual display output for a user and receiving operation instructions input by the user. In particular, the display 30 may be used to provide a visual display interface for a user, such as, but not limited to, a parameter interface, an alarm interface, a privacy settings interface, a privacy attributes settings interface, and a privacy protection interface. The parameter interface displayed by the display 30 is used to display the monitored information. The alarm interface displayed by the display 30 is used to display alarm information. The privacy setting interface displayed by the display 30 is used for displaying at least one privacy mode option corresponding to at least one privacy mode, so that the user can select and determine the preset privacy mode. The privacy attribute setting interface displayed by the display 30 is configured to display at least one function item, so that the processor 20 of the monitoring device 100 generates editing operation information corresponding to an editing request based on the editing request input on at least some of the at least one function item, updates a privacy mode defined in a privacy mode option according to the editing operation information, and uses the privacy mode defined in the updated privacy mode option as the preset privacy mode. The privacy preserving interface displayed by the display 30 means that the content information displayed by the display 30 is set to a black screen to prevent a visitor or non-clinical person from being unable to view private information or other important information of the patient. Specifically, after entering the preset privacy mode, the monitoring device 100 switches from the unlocking state to the screen locking state after reaching the preset screen locking time, and the monitoring device 100 enters the preset privacy mode and is in the screen locking state and corresponds to the displayed interface.
The processor 20 is configured to generate an alarm message when it is detected that the physiological parameter value acquired by the sensor 10 exceeds a preset threshold or that the monitoring device 100 is abnormally operated. Specifically, the processor 20 may be configured to determine whether to generate alarm information for the physiological parameter data collected by the sensor 10 according to the alarm threshold value of the preset monitoring index. The processor 20 may also be configured to generate alarm information when an operational anomaly of the monitoring device 100, such as a line connection malfunction, power supply anomaly, etc., is detected. The alarm interface of the display 30 is used to display the alarm information. In some embodiments, a parameter interface of display 30 may also be used to display the alarm information.
The collecting device 40 is used for collecting authentication information of a user and sending the collected authentication information to the processor 20. The processor 20 is configured to obtain the authentication information collected by the collecting device 40, determine whether the obtained authentication information matches with preset authentication information, and determine that the monitoring device can be switched from the normal mode to a preset privacy mode or from the preset privacy mode when the authentication information matches with the preset authentication information, so that only an authorized user can set the operation mode of the monitoring device 100, and after the monitoring device 100 enters the preset privacy mode, the user can only access the designated information content in the information content displayed by the monitoring device 100, thereby reducing the risk that the private information or other important information of the patient is seen and operated by a visitor or a non-clinical person, and improving the information security. Acquisition device 40 includes, but is not limited to, at least one of a biometric acquisition device, a character recognition unit, and a radio frequency identifier. The biological characteristic acquisition device is used for acquiring first biological characteristic information of the user corresponding to the first operation. The biometric acquisition device includes, but is not limited to, at least one of an image sensor, a fingerprint sensor, and a voice sensor. The character recognition unit is used for recognizing first character information corresponding to the first operation. The character recognition unit includes, but is not limited to, at least one of a gesture recognizer and a track recognizer. The radio frequency identifier is used for reading first radio frequency identification (Radio Frequency Identification; RFID) information corresponding to the work card.
Wherein the image sensor may be used to collect facial information of a user. The face information includes, but is not limited to, face information, iris information, and the like. The fingerprint sensor is used for collecting fingerprint information. The voice sensor is used for collecting voice information of a user. The voice information includes at least one of voice content and voice color information. The gesture recognizer is configured to recognize a gesture input by a user, and the processor 20 is configured to determine whether the input gesture matches one or more gestures in a set of preset gesture types. The track identifier is used for identifying a motion track of a gesture input by a user, and the processor 20 is used for judging whether the motion track of the input gesture is matched with one or more gesture tracks in a preset gesture track type set.
In this embodiment, the monitoring device 100 further includes a memory 50, an input-output module 60, and an alarm module 70. The sensor 10, processor 20, display 30, memory 50, input output module 60, and alarm module 70 may be coupled by a communication bus.
The input/output device 60 is used for inputting operation instructions by a user. The input/output device 60 is, for example, but not limited to, an input device such as a keyboard, a mouse, a touch panel, a remote controller, and an output device such as a USB socket or a network interface. Processor 20 is also configured to control alarm module 70 to generate an alarm based on the alarm information. Specifically, the alarm module 70 is configured to output an alarm prompt, so that a medical staff can execute a corresponding rescue measure, and can know the condition of a patient and the working state of equipment in real time, thereby avoiding the negligence of the medical staff or the patient, and improving the monitoring safety. The alarm module 70 is, for example, but not limited to, a light emitting diode or a buzzer.
The memory 50 is used to store patient privacy information, alarm information, monitoring information, etc. The memory 50 may be used to store computer programs and/or modules that the processor 20 performs various functions of the monitoring device 100 by running or executing the computer programs and/or modules stored in the memory 50 and invoking data stored in the memory 50. The memory 50 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, application programs required for a plurality of functions (such as a sound playing function, an image playing function, etc.), and the like; the data storage area may store data (such as audio data, phonebooks, etc.) created according to the use of the handset, etc. In addition, the memory 50 may include high-speed random access memory, and may also include nonvolatile memory, such as a hard disk, memory, plug-in hard disk, smart Media Card (SMC), secure Digital (SD) Card, flash Card (Flash Card), multiple disk storage devices, flash memory devices, or other volatile solid-state storage devices.
Referring to fig. 1 and fig. 2 together, fig. 2 is a block diagram illustrating a monitoring system 1000 according to an embodiment of the present application. The monitoring system 1000 includes, but is not limited to, the monitoring device 100 described above and a central station 300 communicatively coupled to the monitoring device 100. The central station 300 is configured to receive monitoring information sent by the monitoring device 100, and perform centralized monitoring on the monitoring information.
In some embodiments, the monitoring device 100 and the central station 300 may form an interconnection platform through a BeneLink to enable the central station 300 to access the monitored information monitored by the monitoring device 100. In other embodiments, the monitoring device 100 and the central station 300 may establish a data connection through a communication module. The communication module may be, but is not limited to, wifi, bluetooth, or 2G, 3G, 4G, 5G, etc. communication modules for mobile communication.
The processor 20 of the monitoring device 100 is further configured to send a control command to the central station 300 after the monitoring device 100 enters the preset privacy mode, so that the central station 300 can switch the monitoring management mode of the current patient monitored by the monitoring device 100 from the normal mode to the preset privacy mode according to the control command.
The processor 20 is also configured to perform all steps in the control method of the following operation mode. For example, step S301 to step S302 in fig. 2, and the like. Specifically, the memory 50 stores program code 501, and the processor 20 is configured to invoke the program code 501 of the memory 50 to execute all the steps in the alarm method.
The monitoring device 100 may be used to monitor physiological and non-physiological parameters of a patient. The monitoring device 100 is further communicatively connected to a central station 300, and the central station 300 is configured to receive monitoring information sent by the monitoring device 100 and perform centralized monitoring on the monitoring information. The monitoring device 100 includes, but is not limited to, a sensor 10, a processor 20, a display 30, a collection device 40, and a memory 50 that are electrically connected to each other. The sensor 10, processor 20, display 30, acquisition device 40, and memory 50 may be coupled by a communication bus. It should be understood by those skilled in the art that fig. 1 is only an example of the monitoring system 1000 and is not meant to limit the monitoring system 1000, and the monitoring device 100 and the monitoring system 1000 may include more or less components than those shown in fig. 1, or may combine some components, or different components, e.g., the monitoring system 1000 may further include a monitor, a video amplifier, a video distributor, a video switcher, a picture divider, a monitoring management platform, etc.
Wherein the number of monitoring devices 100 may include one or more. The central station 300 establishes data communication with at least one monitoring device 100. The central station 300 includes a processor 302, a display 304, and a memory 306. In some embodiments, the functions of the processor 302, the display 304, and the memory 306 of the central station 300 may include the same functions as the processor 20, the display 30, and the memory 50 of the monitoring device 100, and are not described herein. For example, the processor 302 may also be configured to process the monitoring data collected by the sensor 10 to obtain monitoring information and control the display 304 to display the monitoring information. The functions of the processor 302, the display 304 and the memory 306 of the central station 300 may also include the functions of the processor 20, the display 30 and the memory 50 of the monitoring device 100, which are not available, for example, the processor 302 may receive and process monitoring data or alarm information directly transmitted by different monitoring devices 100 through the communication module. The processor 30 is a control center of the central station 300 and connects various parts of the entire central station 300 using various interfaces and lines.
The processor 302 of the central station 300 is configured to, after receiving a first control instruction sent by the monitoring device 100 to the central station after entering the preset privacy mode, switch the monitoring management mode of the current patient monitored by the monitoring device from the normal mode to the preset privacy mode according to the first control instruction.
In this way, in the present application, based on when the monitoring device detects a first operation in a normal mode, the monitoring device wakes up a function of an acquisition device, and acquires first authentication information of a user corresponding to the first operation acquired by the acquisition device; when the first authentication information is matched with preset first authentication information, the monitoring equipment is switched from the common mode to a preset privacy mode; the monitoring device sends a first control instruction to the central station after entering the preset privacy mode; the central station receives the first control instruction and switches the monitoring management mode of the current patient monitored by the monitoring equipment from a common mode to a preset privacy mode according to the first control instruction; therefore, only authorized users such as medical staff can set the working mode and other settings of the monitoring device, the problem that the privacy mode is easy to be quitted by misoperation of unauthorized users is solved, the safety and usability of the privacy mode are improved, the device is independent of a central station connected with the device in a communication mode, the switching between the common mode and the privacy mode can be realized, and the use experience of the user is improved. In addition, after the monitoring device enters a preset privacy mode, a first control instruction is sent to the central station, so that after the central station receives the first control instruction, the monitoring management mode of the current patient monitored by the monitoring device is switched from a common mode to the preset privacy mode according to the first control instruction, and therefore the monitoring device end and the central station section synchronously enter the preset privacy mode, a visitor or a non-clinical person cannot browse private information or other important information of the patient, and information safety and safety of the patient using the monitoring device 100 are further improved.
The processor 302 is further configured to determine information content displayed by the central station 300 according to the preset privacy mode, where information content displayed by different privacy modes is different. Thus, different privacy modes are applied to different scenes, different display requirements of the user on the central station 300 in different scenes are met, the display functions are diversified, and the user experience is improved.
The processor 302 is further configured to perform all steps in the control method of the following operation mode. For example, steps S101 to S107 in fig. 4 and the like. Specifically, the processor 302 is configured to invoke the program code 307 of the memory 306 to perform all the steps in the review method described above.
The embodiment of the invention discloses a control method of a working mode, which can be based on the fact that when monitoring equipment detects a first operation in a common mode, the monitoring equipment acquires first identity verification information according to first operation information corresponding to the first operation; when the first authentication information is matched with the preset first authentication information, the monitoring device is switched from the common mode to the preset privacy mode, so that an authorized user can directly set the working mode of the monitoring device, the workload of medical staff is reduced, the information safety is improved, and the use experience of the user is improved. Each of which is described in detail below.
Referring to fig. 3, fig. 3 is a flowchart illustrating a method for controlling an operation mode according to an embodiment of the present application. As shown in fig. 3, the control method of the operation mode is applied to the monitoring device 100. Specifically, the control method of the working mode comprises the following steps.
In step S301, when the monitoring device detects a first operation in the normal mode, the monitoring device acquires first identity verification information according to first operation information corresponding to the first operation.
The monitoring device obtains first identity verification information according to first operation information corresponding to the first operation, and specifically includes:
when the first operation information is matched with preset first operation information, the monitoring equipment acquires first biological characteristic information acquired by a biological characteristic acquisition device and takes the first biological characteristic information as the first identity verification information, wherein the biological characteristic acquisition device comprises at least one of an image sensor, a fingerprint sensor and a voice sensor; or alternatively, the process may be performed,
when the first operation information is matched with preset first operation information, the monitoring device acquires first character information recognized by a character recognition unit and takes the first character information as first identity verification information, wherein the character recognition unit comprises at least one of a gesture recognizer and a track recognizer; or alternatively, the process may be performed,
When the first operation information is matched with preset first operation information, the monitoring equipment acquires first radio frequency identification information read by a radio frequency identifier, and takes the first radio frequency identification information as the first identity verification information.
When the first operation information matches with the preset first operation information, the function of the acquisition device 40 of the monitoring device 100 is awakened, so that the acquisition device 40 acquires the first authentication information, and the acquisition device 40 includes the biometric acquisition device, the character recognition unit and the radio frequency identifier.
In this embodiment, the first operation is an operation of triggering the monitoring device 100 to switch from the normal mode to a preset privacy mode. The first operation is a touch operation input by the user on the monitoring device 100 according to a preset rule. The touch operation conforming to the preset rule refers to an operation that the first operation information matches preset first operation information, where the preset first operation information may be customized according to a user or factory default setting of the monitoring device 100. The first operation may include, but is not limited to, clicking, sliding, holding, etc. The preset first operation information includes, but is not limited to, preset touch information or voice information. The preset touch information includes, but is not limited to, a pressing position, a pressing time, a pressing force, a touch area, a number of touch points (for example, different touch points may be generated when different fingers of a user touch a designated area of the display 30), a touch area, or a touch track. The preset voice information includes, but is not limited to, at least one of voice content and tone information.
Specifically, in the present embodiment, when the monitoring device is in the normal mode, the monitoring device 100 displays a normal display interface. When the monitoring device 100 detects a first operation on the common display interface in the common mode, first operation information corresponding to the first operation is acquired, and first identity verification information is acquired according to the first operation information. In some embodiments, the first operation may be a touch operation input by a user on the common display interface, where the touch operation meets a preset rule, for example, a touch operation input by a user on a privacy function control displayed on the common display interface; or the touch operation input by the user on the preset control area of the common display interface. In other embodiments, the first operation may also be a touch operation input by the user on a privacy setting button provided on the monitoring device 100, where the privacy setting button is a mechanical button.
For example, the first operation is a press operation, the preset first operation information is a preset pressing position, and when the pressing position of the first operation information matches the preset pressing position, the monitoring device 100 acquires the first authentication information acquired by the acquisition device 40. The preset pressing position can be a position corresponding to a privacy setting button or a position corresponding to a privacy function control displayed on the common display interface. For another example, the first operation is a voice input operation, the first operation information is first voice information, and the preset first operation information is preset first voice information. The voice content of the preset voice information is, for example, but not limited to, keywords related to the privacy mode, such as "enter privacy mode" or "privacy mode". When the content of the first voice information matches with the content of the preset first voice information, the monitoring device 100 acquires tone information of the first voice information acquired by the voice sensor, and takes the tone information as the first identity verification information.
For example, the first operation is a sliding operation, the first operation information is a touch area corresponding to the first operation, and the preset first operation information is a preset touch area corresponding to the preset first operation. When the touch area matches the preset touch area, the monitoring device 100 acquires the first character information recognized by the character recognition unit, and uses the first character information as the first authentication information.
Step S303, when the first authentication information matches with the preset first authentication information, the monitoring device switches from the normal mode to the preset privacy mode.
The processor 20 acquires the first authentication information acquired by the acquisition device 40, judges whether the acquired first authentication information is matched with preset first authentication information, and determines that the monitoring device can be switched from the normal mode to a preset privacy mode when the first authentication information is matched with the preset first authentication information, so that only an authorized user can set the working mode of the monitoring device 100, and after the monitoring device 100 enters the preset privacy mode, the user can only access the designated information content in the information content displayed by the monitoring device 100, thereby reducing the risk that the privacy of a patient or other important information is seen and operated by visitors or non-clinical staff, and improving the information security.
The preset first identity verification information is biological characteristic information, character information or radio frequency identification information with identity identification characteristics. The biometric information includes, but is not limited to, at least one of face information, iris information, fingerprint information, and voice information. The character information includes, but is not limited to, at least one of numbers, gestures, text, graphics. In this embodiment, the preset first authentication information is authentication information preset in the monitoring device 100 by the user. The preset first authentication information may be one or more.
The normal mode refers to an operation mode in which the authority to which the monitoring device 100 is accessed is not limited. Specifically, after the monitoring device 100 enters the normal mode, the user may access all patient information corresponding to the current patient monitored by the monitoring device 100, and may perform functional operations such as deleting, modifying, or deriving editing with respect to the data stored in the monitoring device 100. The all patient information includes basic information of the patient and all monitoring information. The privacy mode refers to an operation mode in which the right to which the monitoring device 100 is accessed is limited. Specifically, after the monitoring device 100 enters the privacy mode, the user cannot access all patient information corresponding to the current patient monitored by the monitoring device 100, or the user can only access non-private information in all patient information corresponding to the current patient, that is, the user cannot access private information in all patient information, and the user cannot perform the functional operations of deleting, changing or deriving editing with respect to the data stored in the monitoring device 100.
The control method further includes: and determining information content displayed by the monitoring equipment according to the preset privacy modes, wherein the display content corresponding to different privacy modes is different.
Different privacy modes of the monitoring device 100 may be suitable for different scenarios. In this embodiment, the preset privacy mode includes, but is not limited to, at least one of a first privacy mode, a second privacy mode, a third privacy mode and a custom privacy mode, so that the monitoring device 100 can be applied to different usage scenarios. For example, after the monitoring device 100 enters the first privacy mode, the monitoring device 100 displays the alarm information generated by the monitoring device, and does not display the private information corresponding to the current patient monitored by the monitoring device 100 and the monitored information generated by the monitoring device, so that the first privacy mode of the monitoring device 100 may be suitable for use scenarios with moderate privacy requirements, such as a family viewing scenario. After the monitoring device 100 enters the second privacy mode, the monitoring device 100 displays the alarm information and the monitoring information generated by the monitoring device, and does not display the private information corresponding to the current patient monitored by the monitoring device, so that the second privacy mode of the monitoring device 100 can be suitable for use scenes with low privacy requirements, such as daily monitoring scenes, and clinical staff can know the current state of the patient conveniently. After the monitoring device 100 enters the third privacy mode, the monitoring device 100 does not display the private information corresponding to the current patient monitored by the monitoring device, and the alarm information and the monitoring information generated by the monitoring device, so that the third privacy mode of the monitoring device 100 can be suitable for a use scenario with a higher privacy requirement, such as a scenario visited by a specific person. After the monitoring device 100 enters the custom privacy mode, the monitoring device 100 determines and displays the information content displayed by the monitoring device 100 according to the custom rule.
Wherein the self-defined scene mode may be a combination of the first privacy mode, the second privacy mode, and the third privacy mode. For example, the privacy mode of the combination of the first privacy mode and the second privacy mode may comprehensively consider the family viewing time period. For example, the first privacy mode is set from 8 am to 6 pm, and the second privacy mode is set from 7 pm to 7 am, so that private information and monitoring information of a patient cannot be seen when family members visit in daytime, the safety of monitoring is improved, and monitoring information of the patient is checked when medical staff visit at night, so that the working efficiency of medical staff is improved. The embodiment of the invention does not limit the customized rule.
Wherein the private information includes, but is not limited to, at least one of a name, a medical record number, a patient type, a gender, an age, a date of birth, a date of receipt, a height, a weight, a bed number, a care group, and a doctor of the current patient.
Specifically, in some embodiments, the information content displayed by the monitoring device 100 in the preset privacy mode may be filtered according to a preset filtering condition, that is, the private information is removed. In other embodiments, the information content displayed by the monitoring device 100 in the preset privacy mode may hide the private information and display special symbols, such as "×" or ellipsis "… …", at the location where the private information is displayed. Thus, the user can flexibly and secretly control the information content displayed by the monitoring device 100 in the visitor mode, thereby avoiding the risk that the privacy of the user or other important information is seen by the visitor, and improving the information security.
Optionally, the first privacy mode, the second privacy mode, the third privacy mode and the custom privacy mode may set different privacy classes for the display content in addition to different differences from the display content, for example, the first privacy mode and the second privacy mode are the first privacy class and are lower privacy classes, and the operation of the central station may be directly performed to release the privacy mode to enter the normal mode and enter the normal mode; for another example, the third privacy mode is the second privacy level and is the higher privacy level, and the privacy mode can be released to enter the normal mode only by receiving the operation instruction sent by the monitoring device corresponding to the display section; for the self-defined privacy mode, the privacy level can be preset for each piece of hidden content, so that when the content with a high privacy level is selected, the self-defined privacy mode is the second privacy level, otherwise, if the selected hidden content is all the lower privacy level, the self-defined privacy mode is the first privacy level, and the user-defined privacy mode can be directly operated on the central station to release the privacy mode to enter the common mode.
The control method further includes:
when the monitoring device detects a second operation in the preset privacy mode, the monitoring device acquires second identity verification information according to second operation information corresponding to the second operation;
And when the second authentication information is matched with preset second authentication information, the monitoring equipment is switched from the preset privacy mode to the common mode.
In this embodiment, the second operation is an operation of triggering the monitoring device 100 to switch from the preset privacy mode to the normal mode. The second operation may include, but is not limited to, clicking, sliding, holding, etc. The second operation information includes, but is not limited to, touch information or voice information. Wherein the second operation may be the same as the first operation or may be different from the first operation. For example, the first operation is a click operation and the second operation is a slide operation.
The preset second identity verification information is biological characteristic information, character information or radio frequency identification information with identity identification characteristics. The biometric information includes, but is not limited to, at least one of face information, iris information, fingerprint information, and voice information. The character information includes, but is not limited to, at least one of numbers, gestures, text, graphics. In this embodiment, the preset second authentication information is authentication information preset in the monitoring device 100 by the user. The preset second authentication information may be one or more.
The monitoring device obtains second identity verification information according to second operation information corresponding to the second operation, and specifically includes:
when the second operation information is matched with preset second operation information, the monitoring equipment acquires second biological characteristic information acquired by the biological characteristic acquisition device and takes the second biological characteristic information as the second identity verification information, wherein the biological characteristic acquisition device comprises at least one of an image sensor, a fingerprint sensor and a voice sensor; or alternatively, the process may be performed,
when the second operation information is matched with preset second operation information, the monitoring device acquires the second character information acquired by the character recognition unit and takes the second character information as the second identity verification information, wherein the character recognition unit comprises at least one of a gesture recognizer and a track recognizer; or alternatively, the process may be performed,
and when the second operation information is matched with preset second operation information, the monitoring equipment acquires second radio frequency identification information read by the radio frequency identifier, and takes the second radio frequency identification information as the second identity verification information.
Wherein the first operation and the second operation may be the same or different. The first authentication information and the second authentication information may be the same or different. The second authentication information may be obtained in the same or similar manner to the first authentication information, so that the second authentication information may be obtained by referring to the first authentication information, which is not described in detail in the present application.
Optionally, for the preset privacy mode, privacy classes of different classes, such as a first class and a second class lower than the first class, may be set, when the monitoring device is in the preset privacy mode, for example, the first class, a switching mode one may be adopted, a control instruction sent by the central station is received, and switching from the privacy mode to the normal mode is completed according to the control instruction; if the second level is the second level, the second switching mode may be adopted, and the monitoring device itself may complete switching from the privacy mode to the normal mode after receiving the second operation.
It can be understood that the correspondence between the privacy level and the corresponding switching mode may be replaced or combined, for example, when the privacy mode is the first level, the mode one and the mode two may be supported simultaneously, and when the privacy mode is the second level, only one of the two switching modes may be supported; for another example, when the privacy mode is the first level, the first mode and the second mode are supported simultaneously, and only when the first mode cannot be used, the second mode can be adopted; at this time, when the privacy mode is the second level, the first mode and the second mode are supported simultaneously, and there is no priority difference between the two modes.
The control method further includes:
after the monitoring device enters the normal mode, the monitoring device displays private information, monitoring information and alarm information corresponding to the current patient monitored by the monitoring device.
After the monitoring device enters the normal mode, the user may access all patient information corresponding to the current patient monitored by the monitoring device 100, and may perform deleting, changing or deriving editing function operations on the data stored by the monitoring device 100, for example, the medical staff may change the alarm threshold, derive the monitored information of the patient, and view the monitored information, the alarm information, the private information, and the like of the patient.
Preferably, in some embodiments, the control method further comprises:
when the monitoring equipment receives an operation command in the preset privacy mode, the monitoring equipment executes corresponding target function operation according to the operation command; wherein the target function operation includes at least one of deriving monitored information of the current patient, printing monitored information of the current patient, displaying basic information of the current patient; the derived monitoring information of the current patient, the printed monitoring information of the current patient, the displayed monitoring information of the current patient and the displayed basic information of the current patient do not contain private information corresponding to the current patient. Therefore, the risk that private information or other important information of the current patient is seen by visitors or non-clinical staff is reduced, and the information safety and the safety of the patient in using the monitoring device are further improved.
As shown in fig. 4, in the preset privacy mode, the patient information management interface displayed by the monitoring device 100 masks private information of the patient, and the user cannot edit basic information of the patient. The basic information refers to basic information of the current patient displayed on a patient management interface, including, but not limited to, at least one of a name, a medical record number, a patient type, a gender, an age, a birth date, a receiving date, a height, a weight, a bed number, a care group, and a doctor of the current patient. In this embodiment, the basic information includes at least the private information, and the basic information may further include non-monitored information such as a contact manner, identity information, and the like of the current patient.
The control method further includes:
and when the monitoring device receives a specified operation in the preset privacy mode, prohibiting execution of corresponding specified functions, wherein the specified operation comprises at least one of modifying basic information of the current patient and modifying alarm setting, so that risks that private information or other important information of the current patient is seen and operated by visitors or non-clinical staff are reduced, and information safety and safety of the patient using the monitoring device are improved.
Preferably, before the performing the corresponding target function operation, the control method further includes:
the monitoring equipment acquires third identity verification information;
when the third identity verification information is matched with preset third identity verification information, the monitoring equipment executes the corresponding target function operation, wherein the preset third identity verification information is biological characteristic information, character information or radio frequency identification information with identity identification characteristics; the biological characteristic information comprises at least one of face information, iris information, fingerprint information and sound information; the character information comprises at least one of numbers, gestures, characters and graphics.
The monitoring device acquires third identity verification information based on the fact that the monitoring device receives an operation command in the preset privacy mode; and when the third identity verification information is matched with the preset third identity verification information, the monitoring equipment executes corresponding target function operation according to the operation command, so that only an authorized user can execute the target function operation, and the safety of using the monitoring equipment by a patient is improved.
In some embodiments, the monitoring device includes at least one privacy mode. Before the monitoring device switches from the normal mode to the preset privacy mode, the control method further includes:
the monitoring device determines the preset privacy mode from the at least one privacy mode.
The monitoring device determines the preset privacy mode from the at least one privacy mode, and specifically includes:
the monitoring equipment displays a privacy setting interface; wherein the privacy settings interface displays at least one privacy mode option;
based on a selection operation input on any one of the at least one privacy mode option, the monitoring device determines a privacy mode defined in the selected privacy mode option as the preset privacy mode.
Referring to fig. 5, fig. 5 is an interface diagram of a privacy setting interface displayed by the monitoring device 100. The privacy settings interface displays the at least one privacy mode option. In this embodiment, the at least one privacy mode option includes, but is not limited to, at least one of a first monitoring mode option corresponding to the first monitoring mode, a second monitoring mode option corresponding to the second monitoring mode, a third monitoring mode option corresponding to the third monitoring mode, and a custom privacy mode option corresponding to the custom privacy mode. The privacy mode corresponding to the at least one privacy mode option displayed on the privacy setting interface may be set by the user, or may be set by the monitoring device 100 by default.
The monitoring device determines, based on a selection operation input on any one of the at least one privacy mode option, a privacy mode defined in the selected privacy mode option as the preset privacy mode, and specifically includes:
based on editing operations input on any privacy mode option of the at least one privacy mode option, the monitoring device displays a privacy attribute setting interface, wherein the privacy attribute setting interface displays at least one function item, and the at least one function item comprises at least one of a mode switching function item, an automatic screen locking function item, a printing function item, a viewing function item, a deriving function item and an alarm setting function item;
based on the edit request input on at least part of the at least one function item, the monitoring device generates edit operation information corresponding to the edit request;
and according to the editing operation information, the monitoring device updates the privacy mode defined in the privacy mode option, and takes the privacy mode defined in the updated privacy mode option as the preset privacy mode.
Referring to fig. 6, fig. 6 is an interface diagram of a privacy attribute setting interface displayed by the monitoring device 100. As shown in fig. 6, in this embodiment, the at least one function item may be set by the user, or may be set by the monitoring device 100 by default. Specifically, the privacy attribute setting interface displays the mode switching function item, the automatic screen locking function item and the printing function item. Specifically, each privacy mode corresponds to one authentication information, so that the switching between different privacy modes can be realized by setting different authentication information. In this embodiment, different privacy modes correspond to different switch gestures. For example, the first privacy mode corresponds to a first gesture, the second privacy mode corresponds to a second gesture, the third privacy mode corresponds to a third gesture, and the first gesture, the second gesture and the third gesture are all different, so that a user can realize the switching function of the privacy mode by changing the gestures, the operation is flexible, the workload of medical staff is reduced, and the user experience is improved.
The automatic screen locking function item can be set to be opened or closed. When the automatic screen locking function item is set to be on, the monitoring device 100 may switch from the unlocked state to the screen locked state after reaching a preset screen locking time after entering a preset privacy mode, and may switch from the screen locked state to the unlocked state through a preset unlocking mode. For example, the screen locking time is set to 5 minutes, the unlocking mode is gesture unlocking, and the gesture unlocking can be double-click. At this time, the monitoring device 100 switches from the unlock state to the lock state after 5 minutes after entering the preset privacy mode, and displays a privacy protection interface; when the monitoring device 100 receives a double click operation in the screen locking state, the monitoring device 100 switches from the screen locking state to the unlocking state. When the auto lock screen function item is set to off, the monitoring device 100 is always in an unlocked state after entering a preset privacy mode.
In this embodiment, the monitoring device has an unlock state and a lock state in the preset privacy mode, and the control method further includes:
when the monitoring equipment reaches a preset screen locking time in the unlocking state, the monitoring equipment is switched from the unlocking state to the screen locking state, wherein in the screen locking state, the monitoring equipment does not display private information corresponding to a current patient monitored by the monitoring equipment, alarm information generated by the monitoring equipment and monitoring information; and in the unlocking state, the monitoring equipment displays the alarm information generated by the monitoring equipment and does not display the private information corresponding to the current patient monitored by the monitoring equipment and the monitoring information generated by the monitoring equipment, or the monitoring equipment displays the alarm information and the monitoring information generated by the monitoring equipment and does not display the private information corresponding to the current patient monitored by the monitoring equipment.
Referring to fig. 7, fig. 7 is an interface diagram of the monitoring device 100 in a screen-locked state in a preset privacy mode. The monitoring device 100 displays less content information in the locked state than the monitoring device 100 displays in the unlocked state. The monitoring device 100 displays a privacy preserving interface in the locked state. The privacy preserving interface may be in a black screen state to save power consumption of the monitoring device 100. The content information displayed by the privacy preserving interface may further include, but is not limited to, at least one of time information and hint information. In this embodiment, the content information displayed by the monitoring device 100 in the screen-locked state includes prompt information for indicating that the monitoring device 100 continues to monitor. The prompt to indicate that the monitoring device 100 is continuously monitoring may include, but is not limited to, "continuously monitoring" or "monitoring" to prompt the user that the monitoring device 100 is performing monitoring tasks. The content information displayed by the monitoring device 100 in the locked state may further include prompt information characterizing the execution of the unlocking of the monitoring device 100. The prompt information characterizing unlocking the monitoring device 100 includes, but is not limited to, "touch screen resume display" or "touch screen to unlock the monitoring device" to prompt the user to perform unlocking of the monitoring device 100 by operating the screen.
The control method further includes: and when the monitoring equipment receives unlocking operation in the screen locking state, the monitoring equipment is switched to the unlocking state from the screen locking state. The unlocking operation includes, but is not limited to, sliding, clicking, long pressing, multi-touch and the like.
When the monitoring device receives an unlocking operation in the screen locking state, the monitoring device is switched from the screen locking state to the unlocking state, and the method specifically comprises the following steps:
when the monitoring equipment receives unlocking operation in the screen locking state, the monitoring equipment acquires fourth identity verification information;
when the fourth identity verification information is matched with preset fourth identity verification information, the monitoring equipment is switched from the screen locking state to the unlocking state, wherein the preset fourth identity verification information is biological characteristic information, character information or radio frequency identification information with identity identification characteristics; the biological characteristic information comprises at least one of face information, iris information, fingerprint information and sound information; the character information comprises at least one of numbers, gestures, characters and graphics.
Referring to fig. 8, fig. 8 is an interface diagram of a first embodiment of the monitoring device 100 unlocking the monitoring device 100 in a preset privacy mode. In this embodiment, the fourth authentication information is character information. When the monitoring equipment receives unlocking operation in the screen locking state, an unlocking window is popped up; and after a preset password is input in the unlocking window, the monitoring equipment is switched from the screen locking state to the unlocking state.
The unlocking window comprises a password input box for a user to input a password. The unlocking window also displays words of 'determination' and 'cancellation' or words of 'yes' and 'no' for asking whether to exit the privacy protection interface. When the user selects 'determining', the privacy protection interface is exited; when the user selects "cancel," exit from the privacy preserving interface is refused. The unlocking window also displays the word of forgetting the password, thereby facilitating the user to retrieve the password through a preset path.
Referring to fig. 9, fig. 9 is an interface diagram of a second embodiment of the monitoring device 100 unlocking the monitoring device 100 in a preset privacy mode. In a second embodiment, the monitoring device 100 may also determine whether to exit the privacy preserving interface by a gesture operation on an unlock window of the privacy preserving interface. For example, when a single finger or a double finger touches the boundary of the unlocking window and slides to one side, the privacy protection interface is determined to be withdrawn; when the single finger or the double fingers touch the boundary of the unlocking window and slide to the opposite side, the rejection of exiting the privacy protection interface is determined, so that the user is provided with an opportunity to select whether to exit the privacy protection interface or not, and the interaction experience of the user is improved.
Referring to fig. 10, fig. 10 is an interface diagram of a third embodiment of the monitoring device 100 unlocking the monitoring device 100 in a preset privacy mode. In a third embodiment, the monitoring device 100 may also determine whether to exit the privacy preserving interface by a touch trajectory entered at the privacy preserving interface. For example, when the touch track is matched with the shape of the preset touch track, determining to exit the privacy protection interface; and refusing to exit the privacy protection interface when the touch track is not matched with the shape of the preset touch track.
In other embodiments, the privacy protection interface may be exited in other manners, for example, a touch operation input in a preset area, which is not specifically limited in this application. For example, a person skilled in the art may also determine whether to exit the privacy preserving interface by face information, iris information, fingerprint information, voice information, and radio frequency identification information.
In some embodiments, the control method further comprises:
when the monitoring equipment detects that the monitoring equipment generates the alarm information in the screen locking state, the monitoring equipment is switched from the screen locking state to the unlocking state, the alarm information is displayed, and the private information and the monitoring information are not displayed; or alternatively, the process may be performed,
When the monitoring equipment detects that the monitoring equipment generates alarm information in the screen locking state, the monitoring equipment is switched from the screen locking state to the unlocking state, the alarm information and the monitoring information are displayed, and the private information is not displayed;
and when the monitoring equipment detects the release of the alarm in the unlocking state, the monitoring equipment is switched from the unlocking state to the screen locking state.
According to the embodiment of the application, when the monitoring equipment detects that the monitoring equipment generates the alarm information in the screen locking state, the monitoring equipment is switched from the screen locking state to the unlocking state, so that a user can know the condition of a patient in time conveniently, and can receive the alarm information to take corresponding rescue measures in time, and the risk of illness state delay is reduced.
Referring again to fig. 6, the print function item may also be set to on or off. In some embodiments, the monitoring device 100 is unable to print the current patient's monitoring information and privacy information when the print function is set to on. When the monitoring device 100 receives the unlocking printing operation, the monitoring device 100 may print the monitored information of the current patient, and the monitored information of the current patient printed by the monitoring device 100 does not include private information corresponding to the current patient. Specifically, when the print function item is set to be on and the monitoring device 100 receives an operation of printing the monitored information of the current patient after entering a preset privacy mode, the monitoring device acquires third authentication information; and when the third authentication information matches with the preset third authentication information, the monitoring device 100 may print the monitored information of the current patient, where the printed monitored information of the current patient does not include the private information corresponding to the current patient. When the printing function item is set to be closed, the monitoring device 100 may print the monitored information and the private information of the current patient in real time after entering the preset privacy mode, and the printed monitored information of the current patient does not include the private information corresponding to the current patient. Therefore, only the authorized user can print the monitoring information and the private information of the current patient, or the monitoring information of the current patient printed by the unauthorized user in the privacy mode does not contain the private information corresponding to the current patient, so that the safety of using the monitoring equipment by the patient is improved.
In other embodiments, the privacy attribute settings interface may also display view functionality, export functionality, and alarm settings functionality. The setting modes of the view function item, the export function item and the alarm setting function item can refer to the setting modes of the mode switching function item, the automatic screen locking function item and the printing function item, and the setting modes are not repeated. Specifically, the view function item, the derive function item, and the alarm setting function item may be set to be turned on or off, and the unlock mode for receiving, viewing, deriving, and setting an alarm is set accordingly, so as to enable a user to view the monitoring information of the current patient, derive the monitoring information of the current patient, and set an alarm threshold of the monitoring device 100.
In some other embodiments, the monitoring device determines the preset privacy mode from the at least one privacy mode, specifically including:
the monitoring equipment acquires fifth identity verification information which is input currently;
when the obtained fifth identity verification information is matched with the preset specific identity verification information, the monitoring equipment determines a privacy mode corresponding to the currently input fifth identity verification information according to the matched corresponding relation between the preset specific identity verification information and the privacy mode, and the preset specific identity verification information comprises preset specific character information as the preset privacy mode.
Wherein, different privacy modes correspond to different preset specific authentication information. For example, the preset specific authentication information is preset specific character information, and the preset specific character information includes preset first specific character information, second specific character information and third specific character information. The preset first specific character information corresponds to the first privacy mode; the preset second specific character information corresponds to the second privacy mode, and the preset third specific character information corresponds to the third privacy mode. And when the monitoring equipment acquires that the currently input fifth authentication information is the preset first specific character information, the first privacy mode is used as the preset privacy mode. Therefore, the user can determine the preset privacy mode based on the input character information, so that the user experience is improved, and the workload and the work difficulty of the user are reduced.
The control method further includes:
after the monitoring device enters the preset privacy mode, the monitoring device sends a control command to the central station, so that the central station can switch the monitoring management mode of the current patient monitored by the monitoring device from the normal mode to the preset privacy mode according to the control command.
The monitoring device 100 and the central station 300 can form an interconnection platform through a BeneLink to realize that the central station 300 accesses the monitoring information monitored by the monitoring device 100. Thus, after the monitoring device 100 enters the preset privacy mode, the corresponding central station 300 enters the preset privacy mode in the monitoring management mode of the current patient monitored by the monitoring device, so that the user cannot browse the private information of the patient at the monitoring device end and the central station section, the risk that the private information or other important information of the patient is seen and operated by visitors or non-clinical staff is avoided, and the information safety and the safety of the patient using the monitoring device are improved.
In a first embodiment, the control method of the working mode is based on that when the monitoring device detects a first operation in a normal mode, the monitoring device obtains first identity verification information according to first operation information corresponding to the first operation; when the first authentication information is matched with preset first authentication information, the monitoring equipment is switched from the common mode to a preset privacy mode, so that only authorized users such as medical staff can set the working mode and other settings of the monitoring equipment, the problem that the privacy mode is easy to be quitted by misoperation of unauthorized users is solved, the safety and usability of the privacy mode are improved, the equipment is independent of a central station connected with the equipment in a communication mode, the switching between the common mode and the privacy mode can be realized, and the use experience of the users is improved.
The embodiment of the invention discloses a control method of another working mode, which can be based on the fact that when monitoring equipment detects a first operation in a common mode, the monitoring equipment acquires first identity verification information according to first operation information corresponding to the first operation; when the first authentication information is matched with preset first authentication information, the monitoring equipment is switched from the common mode to a preset privacy mode; the monitoring device sends a first control instruction to the central station after entering the preset privacy mode; the central station receives the first control instruction, and switches the monitoring management mode of the current patient monitored by the monitoring equipment from a common mode to a preset privacy mode according to the first control instruction, so that an authorized user can directly set the working mode of the monitoring equipment, and the central station can set the working mode consistent with the monitoring equipment based on the working mode of the monitoring equipment, thereby improving the information safety and the safety of the patient in using the monitoring equipment, reducing the workload of medical staff, improving the information safety and improving the use experience of the user. Each of which is described in detail below.
Referring to fig. 11, fig. 11 is a flowchart illustrating a method for controlling an operation mode according to an embodiment of the present application. The control method is applied to the monitoring system 1000, and the control method in the embodiment of the present application is described in detail below. The control method of the working mode comprises the following steps.
Step S101, when the monitoring device detects a first operation in a normal mode, the monitoring device wakes up a function of an acquisition device, and acquires first authentication information of a user corresponding to the first operation, which is acquired by the acquisition device.
Specifically, the method step S301 in the embodiment of fig. 3 may be referred to, and will not be described herein.
Step S103, when the first authentication information matches with the preset first authentication information, the monitoring device switches from the normal mode to the preset privacy mode.
Specifically, the method step S302 in the embodiment referring to fig. 3 may be correspondingly referred to, and will not be described herein.
Step S105, the monitoring device sends a first control instruction to the central station after entering the preset privacy mode.
The first control instruction carries basic information of a current patient monitored by the monitoring equipment.
In step S107, the central station receives the first control instruction, and switches the monitoring management mode of the current patient monitored by the monitoring device from the normal mode to the preset privacy mode according to the first control instruction.
The central station receives the first control instruction, and according to the first control instruction, the central station switches the monitoring management mode of the current patient monitored by the monitoring device from a common mode to a preset privacy mode, and specifically comprises the following steps:
the central station receives the first control instruction and acquires the identity information of the current patient monitored by the monitoring equipment according to the first control instruction;
and switching the monitoring management mode of the current patient monitored by the monitoring equipment from the common mode to the preset privacy mode by the central station according to the identity information of the current patient.
In some embodiments, the control method further comprises:
when the monitoring device detects a second operation in the preset privacy mode, the monitoring device acquires second identity verification information according to second operation information corresponding to the second operation;
when the second authentication information is matched with preset second authentication information, the monitoring equipment is switched from the preset privacy mode to the common mode;
The monitoring equipment sends a second control instruction to the central station after entering the common mode;
the central station receives the second control instruction, and switches the monitoring management mode of the current patient monitored by the monitoring equipment from the preset privacy mode to the common mode according to the second control instruction.
Wherein the second control instruction carries basic information of the current patient monitored by the monitoring device.
The central station receives the second control instruction, and switches the monitoring management mode of the current patient monitored by the monitoring device from the preset privacy mode to the common mode according to the second control instruction, and specifically comprises the following steps:
the central station receives the second control instruction and acquires basic information of a current patient monitored by the monitoring equipment according to the second control instruction;
and according to the basic information of the current patient, the central station switches the monitoring management mode of the current patient monitored by the monitoring equipment from the preset privacy mode to the common mode.
The basic information includes private information of the current patient. Wherein the private information includes at least one of a name, a medical record number, a patient type, a sex, an age, a birth date, a reception date, a height, a weight, a bed number, a nursing group, and a doctor of the current patient.
It is understood that the central station 300 may perform centralized monitoring of one or more monitoring devices 100. When the central station 300 performs centralized monitoring on a plurality of monitoring devices 100, the central station 300 only switches the monitoring management mode of the patient monitored by the monitoring device 100 entering the preset privacy mode from the normal mode to the preset privacy mode, so that the central station 300 can set the monitoring management mode of the patient monitored by the corresponding monitoring device 100 based on the working mode of the monitoring device 100, that is, the working mode of the monitoring device 100 and the monitoring management mode of the central station 300 can be synchronously switched between the preset privacy mode and the normal mode, the setting of the monitoring management mode of the central station 300 is intelligent, the flexibility is high, the workload and the working difficulty of a user are reduced, the risk that private information of the patient or other important information is seen and operated by a visitor or a non-clinical person from the monitoring device 100 and the central station 300 is avoided, and the information safety and the safety of the patient using the monitoring device 100 are improved.
In this embodiment, the control method further includes: the monitoring device can determine information content displayed by the monitoring device according to the preset privacy mode, wherein display content corresponding to different privacy modes is different. It should be noted that, the switching between the privacy mode and the normal mode of the monitoring device, the display modes and the editing operations in the normal mode and the privacy mode may refer to the description of the control method of the working mode in the first embodiment, which is not repeated herein.
The control method further includes: the central station may also determine information content displayed by the central station according to the preset privacy mode, where display content corresponding to different privacy modes is different.
Different privacy modes of the central station 300 may be applicable to different scenarios. In the present embodiment, the preset privacy modes of the central station 300 include, but are not limited to, at least one of a first privacy mode, a second privacy mode, a third privacy mode, and a self-defined privacy mode, so that the central station 300 can be applied to different usage scenarios. For example, after the central station 300 enters the first privacy mode, the central station 300 displays the alarm information generated by the monitoring device 100 or itself, and does not display the private information corresponding to the current patient monitored by the monitoring device 100 and the monitored information generated by the monitoring device 100 or itself, so that the first privacy mode of the central station 300 can be applied to a use scenario in which privacy requirements are medium, such as a scenario in which family members visit. After the central station 300 enters the second privacy mode, the central station 300 displays the alarm information and the monitoring information generated by the monitoring device or the central station 300, and does not display the private information corresponding to the current patient monitored by the monitoring device, so that the second privacy mode of the central station 300 can be suitable for use scenes with low privacy requirements, such as daily monitoring scenes, and clinical staff can know the current state of the patient conveniently. After the central station 300 enters the third privacy mode, the central station 300 does not display the private information corresponding to the current patient monitored by the monitoring device and the alarm information and the monitoring information generated by the monitoring device or the monitoring device, so that the third privacy mode of the central station 300 can be suitable for a use scene with higher privacy requirements, such as a scene visited by a specific person. After the central station 300 enters the custom privacy mode, the central station 300 determines and displays the information content displayed by the central station 300 according to the custom rules.
Wherein the self-defined scene mode may be a combination of the first privacy mode, the second privacy mode, and the third privacy mode. For example, the privacy mode of the combination of the first privacy mode and the second privacy mode may comprehensively consider the family viewing time period. For example, the first privacy mode is set from 8 am to 6 pm, and the second privacy mode is set from 7 pm to 7 am, so that private information and monitoring information of a patient cannot be seen when family members visit in daytime, the safety of monitoring is improved, and monitoring information of the patient is checked when medical staff visit at night, so that the working efficiency of medical staff is improved. The embodiment of the invention does not limit the customized rule.
Wherein the private information includes, but is not limited to, at least one of a name, a medical record number, a patient type, a gender, an age, a date of birth, a date of receipt, a height, a weight, a bed number, a care group, and a doctor of the current patient.
Specifically, in some embodiments, the information content displayed by the central station 300 in the preset privacy mode may be filtered according to a preset filtering condition, that is, the private information is removed. In other embodiments, the content of the information displayed by the central station 300 in the preset privacy mode may hide the private information and display a special symbol, such as "×" or ellipsis "… …", at the location where the private information is displayed. Thus, the user can flexibly and secretly control the information content displayed by the central station 300 in the visitor mode, thereby avoiding the risk that the privacy of the user or other important information is seen by the visitor and improving the information security.
In this embodiment, the control method further includes:
after the central station enters the first privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station displays alarm information and monitoring information corresponding to the current patient and does not display private information corresponding to the current patient; or alternatively, the process may be performed,
after the central station enters the second privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station displays alarm information corresponding to the current patient and does not display private information and monitoring information corresponding to the current patient; or alternatively, the process may be performed,
after the central station enters the third privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station does not display private information, alarm information and monitoring information corresponding to the current patient;
after the central station enters the third privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station determines and displays the information content displayed by the central station according to the self-defined rule.
The alarm information and the monitoring information may be generated by the monitoring device 100 or generated by the central station 300. Because the monitoring device 100 enters the preset privacy mode, the central station 300 in communication connection with the monitoring device 100 also correspondingly enters the preset privacy mode, and in the preset privacy mode, the monitoring device 100 and the central station 300 do not display the private information corresponding to the current patient, so that the user cannot browse the patient information from the monitoring device end and the central station end, and further the information safety and the safety of the patient using the monitoring device are improved.
It should be noted that, the entering of the preset privacy mode by the central station 300 corresponds to the entering of the monitoring device 100 into the preset privacy mode, that is, different privacy modes of the monitoring device 100 are applicable to different scenes and are applicable to the central station 300.
The control method further includes:
when the central station receives an operation command in the preset privacy mode, the central station executes corresponding target function operation according to the operation command; wherein the target function operation includes at least one of deriving monitored information of the current patient, printing monitored information of the current patient, displaying basic information of the current patient; the derived monitoring information of the current patient, the printed monitoring information of the current patient, the displayed monitoring information of the current patient and the displayed basic information of the current patient do not contain private information corresponding to the current patient.
The control method further includes:
the central station acquires sixth authentication information;
when the central station is matched with preset sixth identity verification information, the central station executes the corresponding target function operation, wherein the preset sixth identity verification information is biological characteristic information, character information or radio frequency identification information with identity identification characteristics; the biological characteristic information comprises at least one of face information, iris information, fingerprint information and sound information; the character information comprises at least one of numbers, gestures, characters and graphics.
In a second embodiment, the control method of the working mode is based on that when the monitoring device detects a first operation in a normal mode, the monitoring device wakes up a function of an acquisition device and acquires first authentication information of a user corresponding to the first operation, acquired by the acquisition device; when the first authentication information is matched with preset first authentication information, the monitoring equipment is switched from the common mode to a preset privacy mode; the monitoring device sends a first control instruction to the central station after entering the preset privacy mode; the central station receives the first control instruction and switches the monitoring management mode of the current patient monitored by the monitoring equipment from a common mode to a preset privacy mode according to the first control instruction; therefore, only authorized users such as medical staff can set the working mode and other settings of the monitoring device, the problem that the privacy mode is easy to be quitted by misoperation of unauthorized users is solved, the safety and usability of the privacy mode are improved, the device is independent of a central station connected with the device in a communication mode, the switching between the common mode and the privacy mode can be realized, and the use experience of the user is improved. In addition, after the monitoring device enters a preset privacy mode, a first control instruction is sent to the central station, so that after the central station receives the first control instruction, the monitoring management mode of the current patient monitored by the monitoring device is switched from a common mode to the preset privacy mode according to the first control instruction, and therefore the monitoring device end and the central station section synchronously enter the preset privacy mode, a visitor or a non-clinical person cannot browse private information or other important information of the patient, and information safety and safety of the patient using the monitoring device 100 are further improved.
The embodiment of the invention also provides a computer storage medium, wherein the computer storage medium can store a program, and the program execution comprises part or all of the steps of the control method of any one of the working modes described in the method embodiment.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts described, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required for the present invention.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, such as the above-described division of units, merely a division of logic functions, and there may be additional manners of dividing in actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, or may be in electrical or other forms.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units described above, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied in essence or a part contributing to the prior art or all or part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc., in particular may be a processor in the computer device) to execute all or part of the steps of the above-mentioned method according to the embodiments of the present invention. Wherein the aforementioned storage medium may comprise: a U-disk, a removable hard disk, a magnetic disk, an optical disk, a Read-Only Memory (abbreviated as ROM), a random access Memory (abbreviated as Random Access Memory, RAM), or the like.
The foregoing has outlined rather broadly the more detailed description of embodiments of the invention in order that the detailed description of the principles and embodiments of the invention may be implemented in order that the detailed description of the embodiments may be implemented in conjunction with the methods and core concepts of the invention; meanwhile, as those skilled in the art will appreciate, according to the idea of the present invention, there are variations in specific embodiments and application ranges, and the above description should not be construed as limiting the present invention.

Claims (39)

  1. A method for controlling an operation mode, applied to a monitoring device, the method comprising:
    when the monitoring device detects a first operation in a common mode, the monitoring device acquires first identity verification information according to first operation information corresponding to the first operation;
    and when the first authentication information is matched with preset first authentication information, the monitoring equipment is switched to a preset privacy mode from the common mode.
  2. The control method according to claim 1, characterized in that the control method further comprises: and the monitoring equipment determines information content displayed by the monitoring equipment according to the preset privacy modes, wherein the display content corresponding to different privacy modes is different.
  3. The control method of claim 2, wherein the preset privacy mode includes at least one of a first privacy mode, a second privacy mode, a third privacy mode, and a custom privacy mode, the control method further comprising:
    after the monitoring equipment enters the first privacy mode, the monitoring equipment displays alarm information generated by the monitoring equipment, and does not display private information corresponding to the current patient monitored by the monitoring equipment and monitoring information generated by the monitoring equipment; or alternatively, the process may be performed,
    after the monitoring equipment enters the second privacy mode, the monitoring equipment displays alarm information and monitoring information generated by the monitoring equipment, and does not display private information corresponding to the current patient monitored by the monitoring equipment; or alternatively, the process may be performed,
    after the monitoring equipment enters the third privacy mode, the monitoring equipment does not display private information corresponding to the current patient monitored by the monitoring equipment, alarm information and monitoring information generated by the monitoring equipment; or alternatively, the process may be performed,
    after the monitoring device enters the custom privacy mode, the monitoring device determines and displays information content displayed by the monitoring device according to custom rules.
  4. The control method according to claim 1, characterized in that the control method further comprises:
    when the monitoring device detects a second operation in the preset privacy mode, the monitoring device acquires second identity verification information according to second operation information corresponding to the second operation;
    and when the second authentication information is matched with preset second authentication information, the monitoring equipment is switched from the preset privacy mode to the common mode.
  5. The control method according to claim 4, characterized in that the control method further comprises:
    after the monitoring device enters the normal mode, the monitoring device displays private information, monitoring information and alarm information corresponding to the current patient monitored by the monitoring device.
  6. The control method according to claim 3 or 5, wherein the private information includes at least one of a name, a medical record number, a patient type, a sex, an age, a date of birth, a date of reception, a height, a weight, a bed number, a care group, and a doctor of the current patient.
  7. The control method according to claim 1 or 4, wherein the preset first authentication information and the preset second authentication information are biometric information, character information, or radio frequency identification information having an identification feature; the biological characteristic information comprises at least one of face information, iris information, fingerprint information and sound information; the character information comprises at least one of numbers, gestures, characters and graphics.
  8. The control method of claim 7, wherein the monitoring device obtains first authentication information according to first operation information corresponding to the first operation, and specifically includes:
    when the first operation information is matched with preset first operation information, the monitoring equipment acquires first biological characteristic information acquired by a biological characteristic acquisition device and takes the first biological characteristic information as the first identity verification information, wherein the biological characteristic acquisition device comprises at least one of an image sensor, a fingerprint sensor and a voice sensor; or alternatively, the process may be performed,
    when the first operation information is matched with preset first operation information, the monitoring device acquires first character information recognized by a character recognition unit and takes the first character information as first identity verification information, wherein the character recognition unit comprises at least one of a gesture recognizer and a track recognizer; or alternatively, the process may be performed,
    when the first operation information is matched with preset first operation information, the monitoring equipment acquires first radio frequency identification information read by a radio frequency identifier, and takes the first radio frequency identification information as the first identity verification information;
    The monitoring device obtains second identity verification information according to second operation information corresponding to the second operation, and specifically includes:
    when the second operation information is matched with preset second operation information, the monitoring equipment acquires second biological characteristic information acquired by the biological characteristic acquisition device and takes the second biological characteristic information as the second identity verification information, wherein the biological characteristic acquisition device comprises at least one of an image sensor, a fingerprint sensor and a voice sensor; or alternatively, the process may be performed,
    when the second operation information is matched with preset second operation information, the monitoring device acquires the second character information acquired by the character recognition unit and takes the second character information as the second identity verification information, wherein the character recognition unit comprises at least one of a gesture recognizer and a track recognizer; or alternatively, the process may be performed,
    and when the second operation information is matched with preset second operation information, the monitoring equipment acquires second radio frequency identification information read by the radio frequency identifier, and takes the second radio frequency identification information as the second identity verification information.
  9. The control method according to claim 1, characterized in that the control method further comprises:
    when the monitoring equipment receives an operation command in the preset privacy mode, the monitoring equipment executes corresponding target function operation according to the operation command; wherein the target function operation includes at least one of deriving monitored information of the current patient, printing monitored information of the current patient, displaying basic information of the current patient; the derived monitoring information of the current patient, the printed monitoring information of the current patient, the displayed monitoring information of the current patient and the displayed basic information of the current patient do not contain private information corresponding to the current patient.
  10. The control method of claim 9, wherein prior to said performing the corresponding target function operation, the control method further comprises:
    the monitoring equipment acquires third identity verification information;
    when the third identity verification information is matched with preset third identity verification information, the monitoring equipment executes the corresponding target function operation, wherein the preset third identity verification information is biological characteristic information, character information or radio frequency identification information with identity identification characteristics; the biological characteristic information comprises at least one of face information, iris information, fingerprint information and sound information; the character information comprises at least one of numbers, gestures, characters and graphics.
  11. The control method of claim 1, wherein the monitoring device comprises at least one privacy mode; before the monitoring device switches from the normal mode to the preset privacy mode, the control method further includes:
    the monitoring device determines the preset privacy mode from the at least one privacy mode.
  12. The control method of claim 11, wherein the monitoring device determines the preset privacy mode from the at least one privacy mode, specifically comprising:
    the monitoring equipment displays a privacy setting interface; wherein the privacy settings interface displays at least one privacy mode option;
    based on a selection operation input on any one of the at least one privacy mode option, the monitoring device determines a privacy mode defined in the selected privacy mode option as the preset privacy mode.
  13. The control method according to claim 12, wherein the monitoring device determines a privacy mode defined in the selected privacy mode option as the preset privacy mode based on a selection operation inputted on any one of the at least one privacy mode option, specifically comprising:
    Based on editing operations input on any privacy mode option of the at least one privacy mode option, the monitoring device displays a privacy attribute setting interface, wherein the privacy attribute setting interface displays at least one function item, and the at least one function item comprises at least one of a mode switching function item, an automatic screen locking function item, a printing function item, a viewing function item, a deriving function item and an alarm setting function item;
    based on the edit request input on at least part of the at least one function item, the monitoring device generates edit operation information corresponding to the edit request;
    and according to the editing operation information, the monitoring device updates the privacy mode defined in the privacy mode option, and takes the privacy mode defined in the updated privacy mode option as the preset privacy mode.
  14. The control method of claim 13, wherein the monitoring device has an unlocked state and a locked state in the preset privacy mode, the control method further comprising:
    when the monitoring equipment reaches a preset screen locking time in the unlocking state, the monitoring equipment is switched from the unlocking state to the screen locking state, wherein in the screen locking state, the monitoring equipment does not display private information corresponding to a current patient monitored by the monitoring equipment, alarm information generated by the monitoring equipment and monitoring information; in the unlocking state, the monitoring equipment displays alarm information generated by the monitoring equipment, and does not display private information corresponding to the current patient monitored by the monitoring equipment and monitoring information generated by the monitoring equipment; or the monitoring device displays the alarm information and the monitoring information generated by the monitoring device, and does not display private information corresponding to the current patient monitored by the monitoring device.
  15. The control method according to claim 14, characterized in that the control method further comprises:
    and when the monitoring equipment receives unlocking operation in the screen locking state, the monitoring equipment is switched to the unlocking state from the screen locking state.
  16. The control method of claim 15, wherein when the monitoring device receives an unlock operation in the screen-locked state, the monitoring device switches from the screen-locked state to the unlock state, specifically comprising:
    when the monitoring equipment receives unlocking operation in the screen locking state, the monitoring equipment acquires fourth identity verification information;
    when the fourth identity verification information is matched with preset fourth identity verification information, the monitoring equipment is switched from the screen locking state to the unlocking state, wherein the preset fourth identity verification information is biological characteristic information, character information or radio frequency identification information with identity identification characteristics; the biological characteristic information comprises at least one of face information, iris information, fingerprint information and sound information; the character information comprises at least one of numbers, gestures, characters and graphics.
  17. The control method according to claim 14, characterized in that the control method further comprises:
    when the monitoring equipment detects that the monitoring equipment generates the alarm information in the screen locking state, the monitoring equipment is switched from the screen locking state to the unlocking state, the alarm information is displayed, and the private information and the monitoring information are not displayed; or alternatively, the process may be performed,
    when the monitoring equipment detects that the monitoring equipment generates alarm information in the screen locking state, the monitoring equipment is switched from the screen locking state to the unlocking state, the alarm information and the monitoring information are displayed, and the private information is not displayed;
    and when the monitoring equipment detects the release of the alarm in the unlocking state, the monitoring equipment is switched from the unlocking state to the screen locking state.
  18. The control method of claim 11, wherein the monitoring device determines the preset privacy mode from the at least one privacy mode, specifically comprising:
    the monitoring equipment acquires fifth identity verification information which is input currently;
    when the obtained fifth identity verification information is matched with the preset specific identity verification information, the monitoring equipment determines a privacy mode corresponding to the currently input fifth identity verification information according to the matched corresponding relation between the preset specific identity verification information and the privacy mode, and the preset specific identity verification information comprises preset specific character information as the preset privacy mode.
  19. The control method according to claim 1, characterized in that the control method further comprises:
    after the monitoring device enters the preset privacy mode, the monitoring device sends a control command to the central station, so that the central station can switch the monitoring management mode of the current patient monitored by the monitoring device from the normal mode to the preset privacy mode according to the control command.
  20. The control method of claim 4, wherein the preset privacy mode includes a first privacy level and a second privacy level, the first privacy level being lower than the second privacy level, the control method further comprising:
    when the preset privacy class is the first privacy class and the monitoring equipment enters the preset privacy mode, the monitoring equipment receives a control instruction sent by a central station and switches the preset privacy mode into a common mode according to the control instruction; or alternatively, the first and second heat exchangers may be,
    when the preset privacy level is the second privacy level and the monitoring device has entered the preset privacy mode, if the monitoring device detects the second operation, the monitoring device triggers a step of switching from the preset privacy mode to the normal mode.
  21. A method of controlling an operation mode, the method being applied to a monitoring system, the monitoring system including a monitoring device and a central station, the method comprising:
    when the monitoring equipment detects a first operation in a common mode, the monitoring equipment wakes up the function of the acquisition device and acquires first identity verification information of a user corresponding to the first operation, which is acquired by the acquisition device;
    when the first authentication information is matched with preset first authentication information, the monitoring equipment is switched from the common mode to a preset privacy mode;
    the monitoring device sends a first control instruction to the central station after entering the preset privacy mode;
    the central station receives the first control instruction and switches the monitoring management mode of the current patient monitored by the monitoring equipment from the normal mode to the preset privacy mode according to the first control instruction.
  22. The control method according to claim 21, characterized in that the control method includes:
    when the monitoring device detects a second operation in the preset privacy mode, the monitoring device acquires second identity verification information according to second operation information corresponding to the second operation;
    When the second authentication information is matched with preset second authentication information, the monitoring equipment is switched from the preset privacy mode to the common mode;
    the monitoring equipment sends a second control instruction to the central station after entering the common mode;
    the central station receives the second control instruction, and switches the monitoring management mode of the current patient monitored by the monitoring equipment from the preset privacy mode to the common mode according to the second control instruction.
  23. The control method according to claim 21 or 22, wherein the first control instruction and the second control instruction each carry private information corresponding to the current patient, wherein the private information includes at least one of a name, a medical record number, a patient type, a sex, an age, a date of birth, a date of receipt, a height, a weight, a bed number, a care group, and a doctor of the current patient.
  24. The control method according to claim 21, characterized in that the control method further comprises: and the central station determines information content displayed by the central station according to the preset privacy modes, wherein the display content corresponding to different privacy modes is different.
  25. The control method of claim 24, wherein the preset privacy mode of the central station includes at least one of a first privacy mode, a second privacy mode, a third privacy mode, and a custom privacy mode, the control method further comprising:
    after the central station enters the first privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station displays alarm information and monitoring information corresponding to the current patient and does not display private information corresponding to the current patient; or alternatively, the process may be performed,
    after the central station enters the second privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station displays alarm information corresponding to the current patient and does not display private information and monitoring information corresponding to the current patient; or alternatively, the process may be performed,
    after the central station enters the third privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station does not display private information, alarm information and monitoring information corresponding to the current patient; or alternatively, the process may be performed,
    after the central station enters the custom privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station determines and displays the information content displayed by the central station according to the custom rule.
  26. The control method according to claim 21, characterized in that the control method further comprises:
    when the central station receives an operation command in the preset privacy mode, the central station executes corresponding target function operation according to the operation command; wherein the target function operation includes at least one of deriving monitored information of the current patient, printing monitored information of the current patient, displaying basic information of the current patient; the derived monitoring information of the current patient, the printed monitoring information of the current patient, the displayed monitoring information of the current patient and the displayed basic information of the current patient do not contain private information corresponding to the current patient.
  27. The control method according to claim 26, characterized in that the control method further comprises:
    the central station acquires sixth authentication information;
    when the sixth identity verification information acquired by the central station is matched with preset sixth identity verification information, the central station executes the corresponding target function operation, wherein the preset sixth identity verification information is biological characteristic information, character information or radio frequency identification information with identity identification characteristics; the biological characteristic information comprises at least one of face information, iris information, fingerprint information and sound information; the character information comprises at least one of numbers, gestures, characters and graphics.
  28. A control method of an operation mode, applied to a central station, the control method comprising:
    the method comprises the steps that a central station receives a first control instruction sent by monitoring equipment in communication connection with the central station, wherein the first control instruction is an instruction sent to the central station after the monitoring equipment enters a preset privacy mode;
    the central station determines a display section of a current patient monitored by the monitoring device on the central station according to the first control instruction;
    the central station switches the display mode of the display section from a common mode to a privacy mode corresponding to a preset privacy mode on the monitoring device.
  29. The control method according to claim 28, characterized in that the control method further comprises:
    the central station receives a second control instruction, wherein the second control instruction is an instruction sent to the central station after the monitoring equipment is switched from a preset privacy mode to a common mode;
    the central station determines a display section of the current patient monitored by the monitoring device on the central station according to the second control instruction;
    the central station switches the display mode of the display section from a privacy mode to a normal mode.
  30. The control method of claim 29, wherein the first control instruction and the second control instruction each carry private information corresponding to the current patient, wherein the private information includes at least one of a name, a medical record number, a patient type, a gender, an age, a date of birth, a date of receipt, a height, a weight, a bed number, a care group, and a doctor of the current patient.
  31. The control method according to claim 30, characterized in that the control method further comprises: and the central station determines information content displayed by the central station according to the preset privacy modes, wherein the display content corresponding to different privacy modes is different.
  32. The control method of claim 28, wherein the preset privacy mode of the central station includes at least one of a first privacy mode, a second privacy mode, a third privacy mode, and a custom privacy mode.
  33. The control method according to claim 32, characterized in that the control method further comprises:
    after the central station enters the first privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station displays alarm information and monitoring information corresponding to the current patient and does not display private information corresponding to the current patient; or alternatively, the process may be performed,
    After the central station enters the second privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station displays alarm information corresponding to the current patient and does not display private information and monitoring information corresponding to the current patient; or alternatively, the process may be performed,
    after the central station enters the third privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station does not display private information, alarm information and monitoring information corresponding to the current patient; or alternatively, the process may be performed,
    after the central station enters the custom privacy mode into the monitoring management mode of the current patient monitored by the monitoring equipment, the central station determines and displays the information content displayed by the central station according to the custom rule.
  34. The control method of claim 32, wherein the method further comprises:
    when the privacy mode corresponding to the display section is a first privacy mode or a second privacy mode, the central station receives an operation instruction aiming at the display section and switches the display mode of the display section from the corresponding privacy mode to a common mode according to the operation instruction; or alternatively, the first and second heat exchangers may be,
    When the privacy mode corresponding to the display section is the third privacy mode, the central station receives an operation instruction sent by the monitoring equipment corresponding to the display section, and switches the display mode of the display section from the corresponding privacy mode to the common mode according to the operation instruction.
  35. The control method according to claim 28, characterized in that the control method further comprises:
    when the central station receives an operation command in the preset privacy mode, the central station executes corresponding target function operation according to the operation command; wherein the target function operation includes at least one of deriving monitored information of the current patient, printing monitored information of the current patient, displaying basic information of the current patient; the derived monitoring information of the current patient, the printed monitoring information of the current patient, the displayed monitoring information of the current patient and the displayed basic information of the current patient do not contain private information corresponding to the current patient.
  36. The control method according to claim 35, characterized in that the control method further comprises:
    The central station acquires seventh identity verification information;
    when the seventh authentication information acquired by the central station is matched with preset sixth authentication information, the central station executes the corresponding target function operation, wherein the preset sixth authentication information is biological characteristic information, character information or radio frequency identification information with identity identification characteristics; the biological characteristic information comprises at least one of face information, iris information, fingerprint information and sound information; the character information comprises at least one of numbers, gestures, characters and graphics.
  37. The monitoring device is characterized by comprising a processor, wherein the processor is used for acquiring first authentication information according to first operation information corresponding to a first operation when the monitoring device detects the first operation in a common mode, and controlling the monitoring device to switch from the common mode to a preset privacy mode when the first authentication information is matched with the preset first authentication information.
  38. A monitoring system comprising the monitoring device of claim 28 and a central station, the central station comprising a processor, the processor of the central station configured to receive a first control instruction sent by the monitoring device after entering a preset privacy mode, and to enter a monitoring management mode of a current patient monitored by the monitoring device from a normal mode to the preset privacy mode according to the first control instruction.
  39. A readable storage medium, characterized in that the readable storage medium has stored thereon an interactive program, which when executed by a processor performs the method of controlling an operation mode according to any one of claims 1-20.
CN202080107213.8A 2020-12-17 2020-12-17 Control method of working mode, monitoring equipment, monitoring system and readable storage medium Pending CN116508111A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/137311 WO2022126528A1 (en) 2020-12-17 2020-12-17 Working mode control method, monitoring device, monitoring system and readable storage medium

Publications (1)

Publication Number Publication Date
CN116508111A true CN116508111A (en) 2023-07-28

Family

ID=82058820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080107213.8A Pending CN116508111A (en) 2020-12-17 2020-12-17 Control method of working mode, monitoring equipment, monitoring system and readable storage medium

Country Status (2)

Country Link
CN (1) CN116508111A (en)
WO (1) WO2022126528A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115240281A (en) * 2022-09-23 2022-10-25 平安银行股份有限公司 Private information display method and device, storage medium and mobile terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150213206A1 (en) * 2012-09-13 2015-07-30 Parkland Center For Clinical Innovation Holistic hospital patient care and management system and method for automated staff monitoring
US9472206B2 (en) * 2013-06-17 2016-10-18 Google Technology Holdings LLC Privacy mode for always-on voice-activated information assistant
CN106778348A (en) * 2016-12-23 2017-05-31 北京奇虎科技有限公司 A kind of method and apparatus for isolating private data
CN109785954A (en) * 2017-11-10 2019-05-21 深圳市天工测控技术有限公司 A kind of patient care device, method and system

Also Published As

Publication number Publication date
WO2022126528A1 (en) 2022-06-23

Similar Documents

Publication Publication Date Title
US7706896B2 (en) User interface and identification in a medical device system and method
US7698002B2 (en) Systems and methods for user interface and identification in a medical device
US20080097176A1 (en) User interface and identification in a medical device systems and methods
US10130747B2 (en) Performing an apheresis procedure on a human subject with identity input data
US20120088983A1 (en) Implantable medical device and method of controlling the same
US20180358113A1 (en) Two-factor authentication in a pulse oximetry system
CN112789584A (en) Interface display method and device for medical equipment and medical equipment
CN104224116B (en) Medical energy converter and using method thereof and operation equipment
WO2005124624A1 (en) Biomeric information reader and system
WO2008042220A2 (en) User interface and identification in a medical device systems and methods
CN110084930B (en) Hospital supervision system for nurse station based on HIS
US20140067419A1 (en) Medical support device and system
CN116508111A (en) Control method of working mode, monitoring equipment, monitoring system and readable storage medium
JP7323449B2 (en) Systems and methods for optimizing user experience based on patient situation, user role, current workflow and display proximity
CN115485004A (en) System and method for remote control of life-critical medical devices
CN113140302A (en) Authority management method of mobile electrocardiogram equipment, mobile electrocardiogram equipment and storage medium
CN108322903A (en) Emmergency call method, device, system and electronic equipment
KR20090065716A (en) Ubiquitous security and healthcare system using the iris
KR101244817B1 (en) personal health record backup system and method at the same
JP2006048670A (en) Medical information processing system, storage medium for medical information processing, and reader for medical information processing
CN114469021A (en) Method for reviewing alarm event, monitoring equipment and monitoring system
CN111564190A (en) Information pushing method based on neck massager and neck massager
US20190320899A1 (en) Proximity based data acquisition and display
CN110856109B (en) Monitor control method and system
CN104182604A (en) Telemedicine information system, monitoring method and computer-accessible storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination