CN116884556B - Medical data safety sharing platform based on inline block chain - Google Patents

Medical data safety sharing platform based on inline block chain Download PDF

Info

Publication number
CN116884556B
CN116884556B CN202311148619.2A CN202311148619A CN116884556B CN 116884556 B CN116884556 B CN 116884556B CN 202311148619 A CN202311148619 A CN 202311148619A CN 116884556 B CN116884556 B CN 116884556B
Authority
CN
China
Prior art keywords
data
sharing
attack
alarm
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311148619.2A
Other languages
Chinese (zh)
Other versions
CN116884556A (en
Inventor
王樱蓉
邹保文
吴响
曹俊
王丽丽
王换换
张永婷
李怡聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Huiruikang Intelligent Technology Co ltd
Xuzhou Medical University
Original Assignee
Suzhou Huiruikang Intelligent Technology Co ltd
Xuzhou Medical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Huiruikang Intelligent Technology Co ltd, Xuzhou Medical University filed Critical Suzhou Huiruikang Intelligent Technology Co ltd
Priority to CN202311148619.2A priority Critical patent/CN116884556B/en
Publication of CN116884556A publication Critical patent/CN116884556A/en
Application granted granted Critical
Publication of CN116884556B publication Critical patent/CN116884556B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/213Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H80/00ICT specially adapted for facilitating communication between medical practitioners or patients, e.g. for collaborative diagnosis, therapy or health monitoring

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Databases & Information Systems (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Public Health (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Epidemiology (AREA)
  • Primary Health Care (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computing Systems (AREA)
  • Biomedical Technology (AREA)
  • Pathology (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a medical data security sharing platform based on an inline blockchain, which comprises a data interface module, a sharing function module, a resource feedback module and a resource supply pool, wherein the data interface module is used for connecting local user equipment and is configured with an equipment vulnerability detection function; the sharing function module is accessed to the detected equipment to perform risk detection on the data to be shared; uploading data summary information to an outer layer block chain by a local user; uploading data information to an inner layer block chain by a local user; when a request end user initiates a sharing request on the outer layer block chain, the inner layer block chain is linked based on the sharing request to start an automatic sharing task; the resource feedback module is used for realizing data sharing transaction record and transaction traceability, realizing comprehensive maintenance of the whole data sharing process, constructing a resource attack pool and designing an intelligent attack detection optimization method, and greatly improving the performances of model precision, efficiency and the like.

Description

Medical data safety sharing platform based on inline block chain
Technical Field
The invention relates to the technical field of data security sharing, in particular to a medical data security sharing platform based on an inline block chain.
Background
Medical research and healthcare require the use of large amounts of data, such as patient history, image data, genetic data, etc.; since these data are typically scattered throughout various medical institutions, research institutions, and data warehouses, it is difficult to make efficient use of them; to solve this problem, medical data sharing has been developed; by sharing data, medical researchers and medical care workers can better understand the occurrence and development rules of diseases and develop new diagnosis methods and treatment schemes, so that the accuracy and success rate of diagnosis and treatment of the diseases are improved; medical data sharing also presents some risks that personal sensitive information sharing may lead to privacy leaks, such as medical records, genetic data, etc.; the traditional data sharing platform adopts encryption technology, access control, attack detection and other means to ensure the security and privacy of data, the traditional homomorphic encryption technology requires the platform to have higher hardware performance, the access control can not realize tracing the sharing process, and the intelligent attack detection model still has the problems of low detection precision, low efficiency and the like; therefore, designing a traceable, safe and efficient data sharing platform is a hotspot problem of current research.
Disclosure of Invention
The invention aims to provide a medical data security sharing platform based on an inline blockchain, which can effectively solve the problems.
In order to solve the technical problems, the invention adopts the following technical scheme: an inline blockchain-based medical data secure sharing platform, the platform comprising:
the data interface module is used for connecting local user equipment and is configured with an equipment vulnerability detection function;
the sharing function module is accessed to the detected equipment and executes:
performing risk detection on the data to be shared;
uploading data summary information to an outer layer block chain by a local user;
uploading data information to an inner layer block chain by a local user;
when a request end user initiates a sharing request on the outer layer block chain, the inner layer block chain is linked based on the sharing request to start an automatic sharing task;
and the resource feedback module is used for realizing data sharing transaction records and transaction tracing.
Preferably, when performing the device vulnerability detection function, performing vulnerability detection on the user device by starting an intelligent attack detection model, if a vulnerability is found, initiating an alarm, defining the network device vulnerability attack detection result as N_a, defining the first layer alarm threshold as N, and if the vulnerability is found, determining that the first layer alarm threshold is NAn alarm is initiated.
Preferably, the risk detection is: starting an intelligent attack detection model to detect data to be uploaded, if a risk is found, initiating an alarm, defining the detection result of the data to be uploaded as U_d, defining a second-layer alarm threshold as U, and if the risk is found, determining that the second-layer alarm threshold is UAn alarm is initiated.
Preferably, in the sharing function module, the outer layer blockchain is further used for recording sharing transaction information and sharing result information, and supporting all user accesses on the chain; the inner layer blockchain only supports automation operations.
Preferably, the resource feedback module further has the function of requesting the local data and the data operation result to be uploaded by the request end user, and starts the intelligent attack detection model to realize attack detection on the uploading result.
Further preferably, when attack detection is implemented on the uploading result, an alarm is initiated if a risk is found; each layer of alarm needs to manually confirm whether to release the alarm continuing task and define the detection result of the result data to be uploaded as U_r, define the second layer of alarm threshold as R, if soAn alarm is initiated.
Preferably, the platform further comprises a resource supply pool, wherein the resource supply pool is used for storing the classified attack detection results and for optimally training the intelligent attack detection model.
Preferably, the optimization training of the intelligent attack detection model is specifically as follows:
s1, acquiring a known attack characteristic data set T from a resource supply pool, and copying to form a copy set
S2, copying the set according to the designed attack characteristic change methodPerforming operation until all features are changed to form variation set +.>
S3, gathering the variationCombining with the known attack characteristic data set T to form a new attack characteristic set +.>
S4, carrying out parameter selection on the intelligent attack detection model by adopting an optimization method to obtain an optimal parameter model;
s5, utilizing attack feature setThe optimal parametric model is trained.
Further preferably, the attack characteristic change method is as follows: using copy setsCalculating a Chebyshev distance formula to obtain a distance threshold; copy set->Substituting a distance threshold value into a Chebyshev distance formula to obtain a plurality of groups of unknown attack characteristics, calculating the characteristic variation direction and variation range, and screening the plurality of groups of unknown attack characteristics according to the calculation result to finally obtain a variation set of the unknown attack meeting the requirements>
Further preferably, the parameter selection is performed by adopting an optimization method, and the obtaining of the optimal parameter model is specifically as follows:
s1, taking the model detection accuracy as an optimization objective function, and taking the corresponding parameter set as an optimal parameter set when the detection rate is highest;
s2, giving a parameter change range, and dividing parameters in a smaller interval;
s3, randomly selecting a group of parameter sets p for model training, and storing the parameter sets p and model accuracyIs an optimal value;
s4, producing a random rotation direction vector i and corresponding step length C (i), wherein the parameter set p is shifted by the step length C (i) in the rotation direction to produce a new parameter set
S5, calculatingModel accuracy of->Comparison->And->The parameter set with higher storage accuracy is the latest optimal parameter set;
s6, repeating the steps S3-S5 until the accuracy rate is not changed, wherein the current parameter set is the optimal parameter of the model.
The invention has the beneficial effects that: according to the invention, different information uploaded by a local user is classified and transmitted to the outer layer block chain and the inner layer block chain through the sharing function module, and when a request end user initiates a sharing request on the outer layer block chain, an automatic sharing task is started based on the linkage of the sharing request, so that the safety of data sharing and traceability of transactions are ensured, and an alarm function is arranged in the data interface module, the sharing function module and the resource feedback module, so that a three-layer attack alarm architecture is realized, the safety monitoring of the whole data sharing process is realized, meanwhile, the interaction between the user and an alarm system is allowed, the fault tolerance of the system is improved, and further the comprehensive maintenance of the whole data sharing process is realized.
In addition, according to the invention, through the arrangement of the resource attack pool, the intelligent attack detection model can be optimized and trained, so that the performances of model precision, efficiency and the like are greatly improved.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention.
In the drawings:
FIG. 1 is an overall flow chart of the present invention;
FIG. 2 is a schematic diagram of a shared functional module in the present invention;
FIG. 3 is a schematic diagram of an optimization process of the intelligent attack detection model in the invention;
FIG. 4 is a flow chart of a multi-layered alarm system architecture according to the present invention.
Detailed Description
The present invention will be specifically described with reference to examples below in order to make the objects and advantages of the present invention more apparent.
It should be understood that the following text is merely used to describe one embodiment or several specific embodiments of the present invention for secure sharing of medical data based on an inline blockchain, and is not intended to limit the scope of the present invention in any way.
In an embodiment, as shown in fig. 1, a medical data secure sharing platform based on an inline blockchain includes a data interface module, a sharing function module, a resource feedback module and a resource supply pool;
the data interface module is used for connecting local user equipment and is configured with an equipment vulnerability detection function, and vulnerability detection is carried out on the user equipment by starting an intelligent attack detection model, wherein the vulnerability detection of the user equipment is characterized in that a large number of TCP SYN connection requests and UDP data packets in network traffic are generated;
behavior of frequently accessing a particular URL, using an unknown protocol, within the device log; software information in the device;
the security strength of the weak password of the device; whether or not there is an un-patched;
the detected device enters a shared function module, as shown in fig. 2, which is a schematic diagram of the shared function module;
the sharing function module accesses the detected equipment and executes:
firstly, carrying out risk detection on data to be shared;
the detection characteristics of the data to be uploaded by the user are as follows:
the log of the local equipment includes the relevant user login information, access time, IP address and data operation record; whether deviating from the mean, standard deviation, or being in the extreme percentile; whether the data exhibits a distinct peak or long tail distribution; whether certain data points have extremely high or low values is rare or unusual; whether a data point is abnormal in its change from surrounding data points;
then uploading the data abstract information to an outer layer block chain by the local user, wherein the outer layer block chain is used for recording sharing transaction information and sharing result information besides the data abstract information and supporting all users on the chain to access;
uploading data information to an inner layer block chain by a local user, wherein the inner layer block chain only supports automatic operation and does not support access;
when a request end user initiates a sharing request on the outer layer block chain, the inner layer block chain is linked based on the sharing request to start an automatic sharing task, such as transmission, mining, storage and the like;
the resource feedback module is used for realizing data sharing transaction record and transaction tracing, and also has the functions of requesting a user to upload local data and data operation results, and starting an intelligent attack detection model to realize attack detection on the uploading results;
and the resource supply pool is used for storing the classified attack detection results and optimally training the intelligent attack detection model according to the calibrated attack characteristics.
As shown in fig. 3, the optimization process of the intelligent attack detection model is schematically shown, and the optimization training of the intelligent attack detection model is specifically:
s1, acquiring a known attack characteristic data set T from a resource supply pool, and copying to form a copy set
S2, copying the set according to the designed attack characteristic change methodPerforming operation until all features are changed to form variation set +.>
S3, gathering the variationCombining with the known attack characteristic data set T to form a new attack characteristic set +.>
S4, carrying out parameter selection on the intelligent attack detection model by adopting an optimization method to obtain an optimal parameter model;
s5, utilizing attack feature setTraining an optimal parameter model;
the attack characteristic change method comprises the following steps: using copy setsCalculating a Chebyshev distance formula to obtain a distance threshold; copy set->Substituting a distance threshold value into a Chebyshev distance formula to obtain a plurality of groups of unknown attack characteristics, calculating the characteristic variation direction and variation range, and screening the plurality of groups of unknown attack characteristics according to the calculation result to finally obtain a variation set of the unknown attack meeting the requirements>
For example, assume that an attack is known to be characterized byPost-varietal characteristics are as followsThe chebyshev distance formula is:
wherein a and B are features in sets A and B, +.>Corresponding vector coordinates; next to this, the process is carried out,calculating the minimum distance threshold in set A +.>Maximum distance threshold->,/>Confirm the characteristic expansion range, ++>Determining a characteristic expansion direction; randomly selecting features in set A>Substituting the formula to calculate the corresponding expansion characteristic +.>The method comprises the steps of carrying out a first treatment on the surface of the The calculation process is looped until all known features are expanded.
The optimization method comprises the following steps:
s1, taking the model detection accuracy as an optimization objective function, and taking the corresponding parameter set as an optimal parameter set when the detection rate is highest;
s2, giving a parameter change range, and dividing parameters in a smaller interval;
s3, randomly selecting a group of parameter sets p for model training, and storing the parameter sets p and model accuracyIs an optimal value;
s4, producing a random rotation direction vector i and corresponding step length C (i), wherein the parameter set p is shifted by the step length C (i) in the rotation direction to produce a new parameter set
S5, calculatingModel accuracy of->Comparison->And->The parameter set with higher storage accuracy is the latest optimal parameter set;
s6, repeating the steps S3-S5 until the accuracy rate is not changed, wherein the current parameter set is the optimal parameter of the model.
In addition, in another embodiment of the secure sharing platform of the present invention, as shown in fig. 4, a flow chart of a multi-layer early warning system architecture is provided, and a three-layer attack alarm architecture is built in the platform, specifically:
the first layer alarm is arranged at the data interface module, the user equipment is accessed to the system, vulnerability detection is carried out on the user equipment, if the vulnerability is found, the alarm is initiated, the network equipment vulnerability attack detection result is defined as N_a, the first layer alarm threshold is defined as N, and if the vulnerability is found, the first layer alarm threshold is defined as NThen an alarm is initiated;
the second layer of alarm is arranged at the shared functional module, the data to be uploaded is detected, if the risk is found, the alarm is initiated, the detection result of the data to be uploaded is defined as U_d, the threshold value of the second layer of alarm is defined as U, and if the risk is found, the second layer of alarm is defined as UAn alarm is initiated.
The third layer of alarm is arranged at the resource feedback module and used for detecting the result to be uploaded, if the risk is found, the alarm is initiated, the result to be uploaded is defined as U_r, the second layer of alarm threshold is defined as R, and if the risk is found, the alarm is initiatedThen an alarm is initiated;
each layer of alarms needs to manually confirm whether to release the alarm continuing task or not by a user, so that the safety monitoring of the whole data sharing process is realized; meanwhile, the user is allowed to interact with the early warning system, and the fault tolerance of the system is improved.
While the embodiments of the present invention have been described in detail with reference to the drawings, the present invention is not limited to the above embodiments, and it will be apparent to those skilled in the art that various equivalent changes and substitutions can be made therein without departing from the principles of the present invention, and such equivalent changes and substitutions should also be considered to be within the scope of the present invention.

Claims (7)

1. An inline blockchain-based medical data secure sharing platform, the platform comprising:
the data interface module is used for connecting local user equipment and is configured with an equipment vulnerability detection function;
the sharing function module is accessed to the detected equipment and executes:
performing risk detection on the data to be shared;
uploading data summary information to an outer layer block chain by a local user;
uploading data information to an inner layer block chain by a local user; and
when a request end user initiates a sharing request on an outer layer block chain, the inner layer block chain is linked based on the sharing request to start an automatic sharing task;
the resource feedback module is used for realizing data sharing transaction records and transaction tracing;
the resource feedback module is also provided with a request end user for uploading local data and data operation results, and an intelligent attack detection model is started to realize attack detection on the uploading results;
the platform also comprises a resource supply pool, wherein the resource supply pool is used for storing the classified attack detection results and is used for optimally training an intelligent attack detection model;
the optimization training of the intelligent attack detection model specifically comprises the following steps:
s1, acquiring known attacks from a resource supply poolThe characteristic data set T is copied to form a copy set
S2, assembling according to designed attack characteristic change methodPerforming operation until all features are changed to form variation set +.>
S3, gathering the variationCombining with the known attack feature set T to form a new attack feature set +.>
S4, carrying out parameter selection on the intelligent attack detection model by adopting an optimization method to obtain an optimal parameter model;
s5, utilizing attack feature setThe optimal parametric model is trained.
2. The inline blockchain-based medical data secure sharing platform of claim 1, wherein: when the device vulnerability detection function is performed, vulnerability detection is performed on the user device by starting an intelligent attack detection model, if a vulnerability is found, an alarm is initiated, a network device vulnerability attack detection result is defined as N_a, a first layer alarm threshold is defined as N, and if the vulnerability is found, the first layer alarm threshold is defined as NAn alarm is initiated.
3. An inlined region based as defined in claim 1The medical data safety sharing platform of block chain, its characterized in that: the risk detection is as follows: starting an intelligent attack detection model to detect data to be uploaded, if a risk is found, initiating an alarm, defining the detection result of the data to be uploaded as U_d, defining a second-layer alarm threshold as U, and if the risk is found, determining that the second-layer alarm threshold is UAn alarm is initiated.
4. The inline blockchain-based medical data secure sharing platform of claim 1, wherein: in the sharing function module, the outer layer blockchain is also used for recording sharing transaction information and sharing result information and supporting all user accesses on the chain; the inner layer blockchain only supports automation operations.
5. The inline blockchain-based medical data secure sharing platform of claim 1, wherein: when attack detection is realized on the uploading result, if the risk is found, an alarm is initiated; each layer of alarm needs to manually confirm whether to release the alarm continuing task by a user, define the detection result of the result data to be uploaded as U_r, define the second layer of alarm threshold as R, and if soAn alarm is initiated.
6. The inline blockchain-based medical data secure sharing platform of claim 1, wherein: the attack characteristic change method comprises the following steps: known attack feature copy setCalculating a Chebyshev distance formula to obtain a distance threshold; copy set of attack characteristics->Substituting the distance threshold value into Chebyshev distance formula to obtain multiple groups of unknown attacksClicking the features, calculating the feature variation direction and variation range, and screening multiple groups of unknown attack features according to the calculation result to obtain the unknown attack variation feature set +.>
7. The inline blockchain-based medical data secure sharing platform of claim 1, wherein: the optimization method is adopted for parameter selection, and the optimal parameter model is obtained specifically as follows:
s1, taking the model detection accuracy as an optimization objective function, and taking the corresponding parameter set as an optimal parameter set when the accuracy is highest;
s2, giving a parameter change range, and dividing parameters in a smaller interval;
s3, randomly selecting a group of parameter sets p for model training, and storing the parameters p and the model accuracyIs an optimal value;
s4, producing a random rotation direction vector i and corresponding step length C (i), wherein the parameter set p is shifted by the step length C (i) in the rotation direction to produce a new parameter set
S5, calculatingModel accuracy of->Comparison->And->Store itThe parameter set with higher storage accuracy is the latest optimal parameter set;
s6, repeating the steps S3-S5 until the accuracy rate is not changed, wherein the current parameter set is the optimal parameter of the model.
CN202311148619.2A 2023-09-07 2023-09-07 Medical data safety sharing platform based on inline block chain Active CN116884556B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311148619.2A CN116884556B (en) 2023-09-07 2023-09-07 Medical data safety sharing platform based on inline block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311148619.2A CN116884556B (en) 2023-09-07 2023-09-07 Medical data safety sharing platform based on inline block chain

Publications (2)

Publication Number Publication Date
CN116884556A CN116884556A (en) 2023-10-13
CN116884556B true CN116884556B (en) 2024-01-12

Family

ID=88262580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311148619.2A Active CN116884556B (en) 2023-09-07 2023-09-07 Medical data safety sharing platform based on inline block chain

Country Status (1)

Country Link
CN (1) CN116884556B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111698322A (en) * 2020-06-11 2020-09-22 福州数据技术研究院有限公司 Medical data safety sharing method based on block chain and federal learning
CN112559625A (en) * 2020-12-09 2021-03-26 国网安徽省电力有限公司物资分公司 Power business material information storage system and method based on block chain
WO2021218885A1 (en) * 2020-04-28 2021-11-04 万维数码智能有限公司 Security and confidentiality protection method and system for data transmission
CN114024719A (en) * 2021-10-13 2022-02-08 北京八分量信息科技有限公司 Medical information safety management system based on block chain technology
CN114553523A (en) * 2022-02-21 2022-05-27 平安普惠企业管理有限公司 Attack detection method and device based on attack detection model, medium and equipment
CN114567491A (en) * 2022-03-03 2022-05-31 北京雁翎网卫智能科技有限公司 Medical record sharing method and system based on zero trust principle and block chain technology
CN114884678A (en) * 2022-05-11 2022-08-09 深圳嘉业产业发展有限公司 Block chain-based data security management method and system
CN116389012A (en) * 2023-05-29 2023-07-04 国家卫生健康委统计信息中心 Medical health data trusted sharing method based on blockchain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021218885A1 (en) * 2020-04-28 2021-11-04 万维数码智能有限公司 Security and confidentiality protection method and system for data transmission
CN111698322A (en) * 2020-06-11 2020-09-22 福州数据技术研究院有限公司 Medical data safety sharing method based on block chain and federal learning
CN112559625A (en) * 2020-12-09 2021-03-26 国网安徽省电力有限公司物资分公司 Power business material information storage system and method based on block chain
CN114024719A (en) * 2021-10-13 2022-02-08 北京八分量信息科技有限公司 Medical information safety management system based on block chain technology
CN114553523A (en) * 2022-02-21 2022-05-27 平安普惠企业管理有限公司 Attack detection method and device based on attack detection model, medium and equipment
CN114567491A (en) * 2022-03-03 2022-05-31 北京雁翎网卫智能科技有限公司 Medical record sharing method and system based on zero trust principle and block chain technology
CN114884678A (en) * 2022-05-11 2022-08-09 深圳嘉业产业发展有限公司 Block chain-based data security management method and system
CN116389012A (en) * 2023-05-29 2023-07-04 国家卫生健康委统计信息中心 Medical health data trusted sharing method based on blockchain

Also Published As

Publication number Publication date
CN116884556A (en) 2023-10-13

Similar Documents

Publication Publication Date Title
JP6952849B2 (en) Session security partition and application profiler
US20220224723A1 (en) Ai-driven defensive cybersecurity strategy analysis and recommendation system
US11032323B2 (en) Parametric analysis of integrated operational technology systems and information technology systems
Wang et al. An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks
US11997069B2 (en) Intelligent firewall access rules
US20170277873A1 (en) Characterizing user behavior via intelligent identity analytics
US20210281609A1 (en) Rating organization cybersecurity using probe-based network reconnaissance techniques
CN108616529A (en) A kind of method for detecting abnormality and system based on Business Stream
CN106330852A (en) Abnormality prediction method, abnormality prediction system, and abnormality prediction device
WO2021216163A2 (en) Ai-driven defensive cybersecurity strategy analysis and recommendation system
WO2024198285A1 (en) Method and system for reporting alarm event by vehicle-mounted firewall on basis of probe mechanism
CN111953665B (en) Server attack access identification method and system, computer equipment and storage medium
Baho et al. Analysis of consumer IoT device vulnerability quantification frameworks
CN107733966A (en) A kind of attachment means of block catenary system and conventional center IT system
TWI610196B (en) Network attack pattern determination apparatus, determination method, and computer program product thereof
CN116884556B (en) Medical data safety sharing platform based on inline block chain
CN108076006A (en) A kind of lookup is by the method and log management server of attack host
CN113947152A (en) Network trust relationship tree generation method based on behavior cognition
JP7305898B2 (en) Operation response method, operation response device, electronic device and storage medium
RU2747514C2 (en) System and method for categorizing application on computing device
WO2016173327A1 (en) Method and device for detecting website attack
Das et al. Cyber-Physical Security Issues and Challenges Using Machine Learning and Deep Learning Technologies
TW201719455A (en) Metadata server, network device and automatic resource management method
JP2011022886A (en) Filtering program, filtering device, and filtering method
RU2747099C1 (en) Automated cybersecurity event testing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: No. 801-802, Floor 8, Building 2, Smart Valley Park, the Taihu Lake Software Industrial Park, No. 1463, Wuzhong Avenue, Yuexi Street, Suzhou Economic Development Zone, Jiangsu Province, 215000

Applicant after: Suzhou Huiruikang Intelligent Technology Co.,Ltd.

Applicant after: XUZHOU MEDICAL University

Address before: 221000 No. 209 Tongshan Road, Yunlong District, Xuzhou City, Jiangsu Province

Applicant before: XUZHOU MEDICAL University

Applicant before: Suzhou Huiruikang Intelligent Technology Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant