TW200535746A - A method for protecting information integrity - Google Patents

A method for protecting information integrity Download PDF

Info

Publication number
TW200535746A
TW200535746A TW94124845A TW94124845A TW200535746A TW 200535746 A TW200535746 A TW 200535746A TW 94124845 A TW94124845 A TW 94124845A TW 94124845 A TW94124845 A TW 94124845A TW 200535746 A TW200535746 A TW 200535746A
Authority
TW
Taiwan
Prior art keywords
record
file
records
medical
code
Prior art date
Application number
TW94124845A
Other languages
Chinese (zh)
Other versions
TWI297873B (en
Inventor
Jing-Jang Hwang
rong-long Cai
shu-ling Zhou
Original Assignee
Univ Chang Gung
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Chang Gung filed Critical Univ Chang Gung
Priority to TW94124845A priority Critical patent/TW200535746A/en
Publication of TW200535746A publication Critical patent/TW200535746A/en
Application granted granted Critical
Publication of TWI297873B publication Critical patent/TWI297873B/zh

Links

Abstract

This patent application presents a novel method for structuring the electronic patient records as a compound document, based on the current practices of collecting the paper-form patient records in a hospital. This invention further devises a method for protecting information integrity to utilizing the new structural features of the compound-document. The novel methods as devised is more effective and efficient as compared with other methods that utilize integrity protection codes.

Description

200535746 九、發明說明: 【發明所屬之技術領域】 本發明係屬—種應用密碼學方法保護電子病歷安全性 的資訊安全技術領域,尤指一種藉由設計可整合同…之 電子病歷記錄的複合式文件架構與複合式文件的資料直確 性保護方法’使電子病歷系統可滿足電子病歷安全保護中對 於貧料完整性及正確性保護的要求。200535746 IX. Description of the invention: [Technical field to which the invention belongs] The present invention belongs to the field of information security technology that uses cryptographic methods to protect the security of electronic medical records, especially a compound that is designed to integrate electronic medical records with ... Data file structure and composite file data integrity protection method 'enables the electronic medical record system to meet the requirements for the integrity and correctness of the poor data in the electronic medical record security protection.

【先前技術】 按’由於資訊科技的引人,使得f療照護領域獲得重大 的變革,特別是在運作時程、儲存成本及資訊共享鱼交換上 的效率已大幅度提升,且亦使得資訊應用的主要議題,尤发 是機密性(C〇nfldentlallty)、完整性(GQmpieteness),、、 正(Correctness)及隱私性(Privacy)的保護,成為 相關研究最迫切需要達成的目標。- ' 為了達成上述的安全需求,必須滿足的基礎條件便是對 原始產出資訊的保護,亦即保護病歷記錄之原始内容的真確 ^生,才旎建構其他滿足安全保護需求的應用方式。 藉此,在電子病歷的發展現況中,資料完整性及正確性 的保護已成為主要議題,其中,可參考的文獻包括 Gropper及Sean Doyle兩人所發明的方法,現已送交美國專 利局進行審核,申請案編號為us 2〇〇3/〇 1 77446 Αι •,這個方 法所要達成的目標之一,係設計_個可透過電子方式傳送之 文件的架構及方法,文件中仍保有與其他相關文件連結之標 記而不破壞原始文件所提供之完整性,同時讓使用者能將= 200535746 •主要文件相關的所有附株致人々4 相關資訊的呈現…:卜二重新組織在-份播案中,使 讓使用者重新思考草…其中’重新组織是用以表示系統 ’、附件在整份文件中的重要性, 否將此-附件納入整合後的檔案中; 、 方法可讓醫師在一攻女v底翻 關樓幸整-成a 療期間中’將所有的診療相 ^ 完整的記錄,包括將診療内容與X光片、 才欢%報告等相關附件隹 嘣丨付件术結成一份完整的病歷記 始文件所提供之完整缺 保有原 Θ ^ ,…、、而,由於診療記錄上的醫師簽章 疋指示文件結束的標記’所以此一方法以適用於一次門診記 =,作為早—診療病歷的完整性及正確性保護為其設計之目 杯而非對由多筆診療記錄組成的個人電子病歷記錄提供所 需的保護。 此外,相關文獻還包括Thomas Μ. Walker及Mark Madden 兩人所發明的方法,專利編號為us 6, 684, 2 76 Μ。在對美 國國内現行之電子病歷管理系統、診療記錄的處理流程及醫 療照護保險相關法令的規範進行研究後,此方法將一般的診 療流程分為五個部份,病史探尋(History Taking[Previous technology] Press' Because of the attractiveness of information technology, major changes have been made in the field of medical treatment and care, especially the operating time, storage cost and efficiency of information sharing fish exchange have been greatly improved, and it also makes information applications The main issues, especially the protection of confidentiality (Integrity), integrity (GQmpieteness), integrity (Correctness) and privacy (Privacy), have become the most urgently needed goals for related research. -'In order to achieve the above-mentioned security requirements, the basic condition that must be met is the protection of the original output information, that is, to protect the authenticity of the original content of the medical record, so as to construct other application methods that meet the security protection requirements. In this way, in the current state of the development of electronic medical records, the protection of data integrity and correctness has become the main issue. Among them, referenced documents include the methods invented by Cropper and Sean Doyle, which have been sent to the US Patent Office for Review, application number is us 20003 / 〇1 77446 Aι •, one of the goals to be achieved by this method is to design the structure and method of a document that can be transmitted electronically, and the document still retains other related Marking of document links without destroying the integrity provided by the original document, while enabling users to present = 200535746 • All attached plants related to the main document 4 Presentation of relevant information ...: Bu Er reorganized in the case To make the user rethink the grass ... of which 'reorganization is used to indicate the system' and the importance of the attachment in the entire document, whether to include this-attachment in the integrated file; The attacking woman v bottom turn off the building Xingzheng-Cheng a during the treatment period 'All the diagnosis and treatment phase ^ A complete record, including the diagnosis and treatment content with X-rays, Cai Huan% report and other related attachments 隹丨 Payment operation forms a complete medical history record. The complete absence of the original Θ ^, ..., is due to the physician ’s signature on the diagnosis and treatment records and the mark indicating the end of the file, so this method is applicable to An outpatient record =, as the protection of the integrity and correctness of the early-stage medical records, it is designed for the purpose rather than the personal electronic medical records composed of multiple medical records to provide the required protection. In addition, the related literature also includes the method invented by Thomas M. Walker and Mark Madden, patent number us 6, 684, 2 76 Μ. After studying the current domestic electronic medical record management system, the treatment process of diagnosis and treatment records, and the regulations of medical care insurance related laws and regulations, this method divides the general diagnosis and treatment process into five parts. History Taking

Segment),理學檢查(phySicai £xaminati〇n segment); χ 光片(X-Ray Segment );治療計畫(Treatment pian $egment ) ’醫療保險記錄(Record Segment );並針對每個 過程是否需要診療醫師及病人同時在場進行分析,在不會減 少病患珍療時間及品質的前題下將某些流程縮短,並提出一 個改良後的電子病歷系統架構,使醫療保險記錄的製作更具 效率且能維持原始病歷的完整性,並且建立滿足整合、正確 6 200535746 '以及合乎法令規範之要求的醫療文件; 根據上述專利所提出之 及殹瘆# $ 义/ v看,其係將病歷記錄 及西療保險纪錄的處理與 治療計晝的流程同時進行,二史"、理學檢查結果以及 止於醫師撰窝、△忘 使母-伤病歷記錄的撰寫程序中 止方、面師撰爲治療計晝之時;亦即 錄外的四項程序時,分一 仃* 了醫療保險記 斤兩貧料於診療的同時截取至李 統中特定的處理樣板,使整 〗戳取至乐 生於病患與醫師同時在場的”時療保險記錄的產 豕日7 0療蚪間内完成,而不必延長醫 師對病歷記錄的處理時間及 敕雕、六如从1方 扃心的寺待時間,藉以將 ΐ'Γ=Γ高:而且仍可使電子病歷内的資訊保有完 ,的一生”僅以適用於-次門診記錄,作為單-診療病 的元』及正確性保護為其設計之目標,而非對多筆診療 。己錄組成的個人電子病歷記錄提供所需的保護。 „前述1解決方案巾,其完整性及正確性㈣範圍均為 早-診療之個別子記錄或整合性記錄,且僅以個人病歷樓中 的部份内容,並未對整份病歷進行保護,但,事實上,敫合 個別診療記錄的整份電子病歷之完整性及正確性保護,:: 解決目前電子病歷相關研究議題的關鍵; 疋 緣此,國内已有研究指出,改採利用集合多筆醫療照講 記錄成為一次整合性的醫療照護記錄,再對此—整合性資: 進行電子簽章運算的方法,達到確保醫療照護記錄之完整性 及正雄性的目標♦’ Α 了要使完整性及正確性檢驗更呈效率 在該研究中還提出利用可信賴第三者的概念,以獨立機構作 為整合性醫療照護記錄之訊息摘要的儲存處,做為驗證時的 200535746 依據; 然而,整合性醫療照護記錄方法,已將醫療機構平曰營 運所需具備的資料完整性及正確性納人安全保護之中,但, 對於f不斷增加的醫療照護記錄内容而言,就需不斷地重覆 口曰有及新乓的w療照護記錄,並重新計算整合後的訊息 摘要及务早值,因此,記錄愈多,訊息摘要的計算就愈複雜, 運作效率也因此愈不佳。 • 此外’在真確性保護方法的研究中,Jacques Debiez、Segment), physical examination (phySicai £ xaminati〇n segment); X-Ray Segment (X-Ray Segment); Treatment Plan (Treatment pian $ egment) 'Medical Insurance Record (Record Segment); and whether each process requires diagnosis and treatment Physicians and patients are present at the same time for analysis, shortening certain processes under the premise that it will not reduce the time and quality of patients' treatment, and propose an improved electronic medical record system architecture to make the production of medical insurance records more efficient. It can maintain the integrity of the original medical records, and establish medical documents that meet the requirements of integration, correctness, and compliance with laws and regulations. According to the above-mentioned patents and the # 殹 瘆 义 / v see, it is the medical records and The treatment of western medical insurance records and the treatment schedule are performed simultaneously. The second history ", the results of the physical examination, and the procedures for writing the records of the doctors, △ forgotten mother-injury medical records were terminated, and the face doctors wrote the treatment plans. At the time of day; that is, when the four procedures are not recorded, the medical insurance records are divided into two parts. At the same time, they are intercepted to a specific treatment model of Li Tongzhong. Make the whole stamp to be taken within 70 days of the birth day of the "Time Treatment Insurance Record" that was born when the patient and the doctor were present at the same time, without having to extend the processing time of the medical record and the engraving, Liuru From the time spent at the temple of 1 side, you can increase ΐ'Γ = Γ: and still keep the information in the electronic medical record, a lifetime "only applies to-outpatient records, as a single-diagnosis of the disease ”And the protection of correctness are the goals of its design, not for multiple diagnosis and treatment. A personal electronic medical record consisting of recorded records provides the required protection. „The foregoing 1 solution towel is complete and correct. The scope is an individual sub-record or integrated record of early-diagnosis and treatment, and only a part of the personal medical record building does not protect the entire medical record. However, in fact, the integrity and correctness of the entire electronic medical record that combines individual medical records is :: The key to solving the current research issues related to electronic medical records; For this reason, domestic studies have pointed out that the use of collections Multiple medical care records become an integrated medical care record, and then this—integrated resources: The method of performing electronic signature calculations to achieve the goal of ensuring the integrity of medical care records and positive males ♦ 'Α Integrity and correctness tests are more efficient. In this study, the concept of using a trusted third party was also proposed, and an independent institution was used as the storage place for the information summary of integrated medical care records as the 200535746 basis for verification; however, The integrated medical care record method has incorporated the completeness and correctness of the data required for the ordinary operation of medical institutions into human security protection, but For the ever-increasing content of medical care records, it is necessary to continuously repeat the oral and new medical care records and recalculate the integrated message summary and early value. Therefore, the more records, the more information The more complex the calculation of the abstract, the less efficient it is. • In addition, in the study of methods of authenticity protection, Jacques Debiez,

Ws P. Hughes& AxeUe Apvrniu人設計的方法,巧 妙地利用雜湊函數為序列性眘 生貝枓的保濩提供檢查值,專利編 號為US 6, 640, 294 〇此專利所捭φ认次立丨古士 ^ 哥扪所柃出的貪料真確性檢驗方法與 計算訊息摘要之雜凑函數的原理相同’其將存放於同一儲存 媒體中的許多資东4·,# & 々 ^ 、 為一糸列的循序資料區段,將此序列 寅料當作糸統的輸入值,抵皮 循序地輸入至相對應的序列單向赫 序函數,中具*有與輸入的資料區段相同之次序的單向赫序函 •數内=仃運异’亚在計算每—資料區段的檢查值時,使用當 次運异之資料區段的内容一 ^ 則一人連f獲侍的輸出值作為 该次運算的輸入,取得此次曾欠 ”、 運^之貝枓&奴的檢查值,該檢 查值也同時作為下一個杳# ^ 入值。 個貝枓區段計算檢查值時的第二個輸 循序完成每一資料區段的檢查值運 區段與其檢查值連結,則蚊個、將。亥貝枓 、正们、級程元成後,便能以由資料 段連結相應之檢查值所產 _ 、 ΠΠ 亩" "產生的一個串列貢料,作為檢驗全部 貝枓之真確性的依據;其中,一 乐列的輸入值可為同一份文 200535746 件分割出的不同資料區段 一 仏文件各自作為不同的資料 區段’貧料區段的個數盥單 — 筑/、早向赫序幽數的個數相同,且除第 一份資料區段的計算外,黛-一 弟一至弟η個資料區段在計算檢查 值時,均會將前一個資料區々 、十匚奴所计异出的檢查值納入本次檢 查值的計算,即,在η為 π八Α丨之正整數的情況下,第η個 資料區段在計算檢杳值時 —值%會將弟η-1個資料區段計算而得 的檢查值引入,連同筮加次 们貝料區段的資料一起進行檢查值 的運算,藉以獲得筮 ^ 又仔弟η個貧料區段的檢查值。 此方法讓序列文件的亩a & /rT # /、$性保護及檢驗更具效率,但仍 未克服使用訊息摘要方本& 调赘万法的弱點——無法鑑別來源是否正 確,由於訊息摘要方法呈古 有Α開且易於取得的特性,任何人 均可在3隻得相同訊自;(:¾ ^ ^ 心要四數及訊息本身的情況下,計算出 相同的訊息摘要,因此,在訊息接收者未知訊息内容的前提 下任何Λ心及其汛息摘要都可作為正確且保有資料真確性 的U專遞給接收者’使偽造訊息被誤認為真,另外,此法 須藉由循序计异來檢驗所存訊息的資料真確性,有意竄改資 料者仍可經由竄改杳料ρ π & 鼠文貝料1 2 3段中某部份資料,並循序完成前後 的相關计开而達成鼠改訊息内容的目的,因此,訊息儲存裝 1 是否獲得安全的㈣成為此法維護資料真確性的關鍵;不 2 過此法仍可作為計算循序文件之真確性保護值的前置步 驟,使此類運算能更具效率。 3 【發明内容】 為此,本創作之主要目的係提供一種用於保護數位文件 之貝料凡整性及正確性的方法,其係設計一個能夠符合醫療 200535746 機構言運之的電子病歷記錄儲存方法即提出創新的複合 式電子病歷記_構’以符合醫護人員對病歷的操作及管理 需求,且能切實達成病歷資料的完整性及正確性保護。 又本創作之次一目的係提供一種用於保護數位文件之 貢料完整性及正確性的方法,其係設計出一個能運作於複合 弋文件的資料凡整性及正確性保護方法,並具有更佳的運算 效率。 . 為了達到上述之目的,本創作係提供—種用於保護數位 文件之資料完整性及正確性的方法,其係包含: 將多份數位文件組合為一份複合式文件; 2被組合的數位文件、建構為上述複合式文件的循 貝文件; :別:算屬於上述循序成員文件之每—成員文件的成 貝文件檢查碼; 叶算一個屬於該複合式文件的複合式文件檢查碼; 私計為t述每—成員文件提供個別的持久性記憶—體空間以 存成員文件檢查碼; 檢查=供一個持久性記憶m以儲存± i^複合式文件 由此’這裡談到的所有成員文件檢查碼及複合式文件檢 :可用於提供驗證資訊以更有效率地備測並找出未經授 m的資料變更。 藉由利用複合式文件的概念’設計-個儲存電子病歷記 性的文件架構’使電子病歷記錄能符合傳統病歷的操作特 ’並設計一個資料完整性與正確性保護方法,使用多層次 10 200535746 :檢查碼計算方法’讓多份具有相關性及順序性的文件能择 得更有效的完整性與正讀性保護。 又 本發明所提出之複合式電子病歷儲存架構,搭配同時提 出的複合式文件之完整性與正確性保護機制,將使電子病歷 系統具備更周延的保護能力’並且讓醫療資訊系統於計算: 全性驗證標記時,能有優於現行方法的運作效率。 接下來會列舉本發明之較佳實施例,並配合圖示及圖 號’對本發明其他的目的及效能做進一步的說明,期能使責 審查委員對本發明有更詳細的瞭解,並使熟悉制技術者= 據以實施’以下所述者僅在於解釋較佳實施例,而非在於限 制本發明之範圍,故凡有以本發明之發明精神為基礎,而為 输之發明任何形式的變更或修飾,皆屬於本發明意圖保 濩之範®壽。 【實施方式】 1 ·本發明提供的功能 本發明提供了三項新的設計: 第,汉计一個運作在複合式文件架構上的資料完整性 及正確性保護方法; 弟-,設計符合傳統病歷記錄架構之功能的複合式·電子 病歷記錄架構; 第一將複口式文件之貧料完整性及正確性保護方法應 用於複合式電子病歷記錄架構。 這些設計不僅能用於保護複合式文件的資料完整性及 11 200535746 正^還能讓電子病㈣統依需求獨地擴增每次的診斷 病歷於同—病患之病歷檔案中’而且有效率地保護整份電子 病歷記錄的資料完整性及正確性。 本發明所提出的資料完整性及正確性保護方法,並未要 求醫院對運行中的電子病歷系統進行變更,原始系統内使用 的任何儲存架構、表單或記錄的呈現法則甚至是醫療人員對 病歷記錄簽章的規範都可維持原制,然而,本發明所提出的 複合式電子病歷記錄架構能提供一個更符合傳統病歷管理 規則,以及更具效率之資料完整性及正確性保護與檢驗的方 法,以病患為主體來管理並保護其全部的病歷記錄,因此, 右能同時採行所提出的電子病歷記錄架構,將可得到後續說 明中列舉出的效用。 在闡述本發明之前,必須說明資訊真確性與資料完整性 及正確性兩者間的關連。在IS〇/IEC 1〇丨81_6 ( Inf〇rmati⑽ technology — Open Systems Interconnection 一 一 Security frameworks for open systems: Integrity framework)文件中所闡述之破壞資料真確性的操作共有五 項,分別是非授權的資料修改、非授權的資料刪除、非授權 的資料創造、非授權的資料增加以及非授權的資料重複使 用,因此具有資料的正確性及資料的真品性兩項意涵,亦 即,資料必須是正確無誤,且其產生過程必須是正當、經授 權以及非造假的。 而資訊真確性則較資料真確性的定義更為廣泛,這是由 於資料具有一些相關的屬性,例如資料的呈現法則,會對資 12 200535746 料的解讀產生影響’可能使接收資料者 ^ 訊,所以’對相關屬性的保護, :全不同的貢 之一;另外,資料完整性及正確性所代表貝;1真確性的要素 義,與資料真確性是一致 、、文全性保護意 j堇疋使用的翻譯名詞不相同, 由此’負成真確性所涵芸 杜 我摩巳圍,自然也包含了眘祖々 正性及正確性。而本發明所設計的方法, 、Z凡 Φ ^ ^ ^ ^ , $保醫療機構的 的保護,因此具有伴f資1± w 達成-貝料真確性 匁保邊貝矾真確性的能力。 病歷電子化研究.已發展多年, JT ^ ^ 千T將病歷貝料的完整性及 雀f列為重要課題,而1 “ 墟卜4 ” 而/、所明的病歷資料的完整性及正Ws P. Hughes & AxeUe Apvrniu's method, cleverly uses a hash function to provide a check value for the protection of a serial cautious beetle. The patent number is US 6,640,294. The method used by Brother 扪 to test the authenticity of the material is the same as that of the hash function used to calculate the message digest. 'It will be stored in the same storage medium for many assets. 4 &#; Sequential data section of the sequence, as the input value of the system, is input to the corresponding sequence one-way Hertzian function in sequence, in which the order with * has the same order as the input data section Xiang Hexian • Numbers = 仃 运 异 'When calculating the check value of each data section, the content of the data section of the current difference is used ^, then the output value of one person f is served as the time The input of the operation is to obtain the check value of this time ", which is the default value. This check value is also used as the next input value at the same time. This is the second time when the check value is calculated in each frame. Input sequentially complete the check value of each data section. After checking the value link, the mosquitoes, generals, Haibei, Zhengmen, and Cheng Yuanyuan will be able to use a series of tributary materials produced by the data section to link the corresponding check values _, ΠΠ acres " " As the basis for checking the authenticity of all the shellfish; among them, the input value of a music column can be the different data sections divided by the same document 200535746. Each file is regarded as a different data section 'lean material section'. Counting list — The number of early / heavy sequence numbers is the same, and except for the calculation of the first data section, the Dai-yidiyi to η data sections will calculate the check value, will The inspection values calculated by the former data area 々 and the ten 匚 slaves are included in the calculation of the inspection value. That is, if η is a positive integer of π 八 A 丨, the η data section is calculating the inspection value. Value time-value% will introduce the check value calculated from the η-1 data section, and perform the check value calculation together with the data of the 筮 Plus Zimbe material section, so as to obtain Check value of lean section. This method makes the sequence file MU a & / rT # /, $ Sex protection and inspection are more efficient, but the weakness of using the message digest & adjustment method is still not overcome-it is impossible to identify whether the source is correct, because the message summary method is ancient and easy to obtain. , Anyone can get the same message from 3; (: ¾ ^ ^ Calculate the same message digest with the number of four and the message itself. Therefore, any receiver who knows the content of the message is unknown. Both the flood digest and its digest can be used as the correct U-post to maintain the authenticity of the information to the recipients, so that the forged information is mistakenly considered to be true. In addition, this method must verify the authenticity of the information in the stored information through sequential calculations and intentional tampering. The data person can still tamper with some of the data in the ρ π & rat text shell 1 2 3 section, and complete the relevant planning before and after to achieve the purpose of the rat change message content. Therefore, the message storage 1 Obtaining a safe plutonium becomes the key to maintaining the authenticity of the data; however, this method can still be used as a pre-step for calculating the true protection value of a sequential file, making such operations more efficient. [Summary of the Invention] To this end, the main purpose of this creation is to provide a method for protecting the integrity and correctness of digital materials, which is to design an electronic medical record storage that can meet the requirements of the medical 200535746 institution. The method is to propose an innovative composite electronic medical record _ structure to meet the medical staff's operation and management needs of medical records, and can effectively achieve the integrity and correctness of medical record data protection. The second purpose of this creation is to provide a method for protecting the integrity and correctness of digital documents. It is to design a method for protecting the integrity and correctness of data in composite files. Better computing efficiency. In order to achieve the above purpose, this creation provides a method for protecting the integrity and correctness of the data of digital documents, which includes: combining multiple digital documents into a composite document; 2 combined digital Documents, structured documents that are structured as the above-mentioned composite documents;: Don't: be counted into the document file of each of the above-mentioned sequential member documents; check the code of a composite document that belongs to the composite document; Each of the member files is considered to provide individual persistent memory—the body space is used to store the member file check code; check = for a persistent memory m to store ± i ^ composite files from which all the member files mentioned here Check code and composite document inspection: It can be used to provide verification information to more efficiently prepare for testing and find out unauthorised data changes. By using the concept of a composite file 'designing a document structure for storing electronic medical records' to make electronic medical records conform to the operating characteristics of traditional medical records' and designing a method of data integrity and correctness protection, using multiple levels 10 200535746 : Check code calculation method 'allows multiple copies of relevant and sequential documents to be selected for more effective integrity and readability protection. In addition, the composite electronic medical record storage structure proposed by the present invention, combined with the integrity and correctness protection mechanism of the composite file proposed at the same time, will make the electronic medical record system have more extensive protection capabilities and allow the medical information system to calculate: It has better operation efficiency than the existing methods when it comes to sexual verification mark. Next, the preferred embodiments of the present invention will be enumerated, and other purposes and effects of the present invention will be further explained in conjunction with the illustrations and figure numbers. It is hoped that the review committee will have a more detailed understanding of the present invention and familiarize them with the system. Technician = According to the implementation of 'The following is only to explain the preferred embodiment, rather than to limit the scope of the invention, so anyone who changes or loses the invention in any form based on the spirit of the invention Modifications belong to the scope of this invention. [Embodiments] 1. The functions provided by the present invention The present invention provides three new designs: First, Han Ji is a method for protecting the integrity and correctness of data operating on a compound file structure; Brother-, the design conforms to traditional medical records The function of the composite structure of the record structure of the electronic medical record structure; First, the method of protecting the integrity and correctness of the compound file is applied to the composite electronic medical record structure. These designs can not only be used to protect the data integrity of composite documents and 11 200535746, but also allow the electronic disease system to independently expand each diagnosis's medical records in the same patient's medical records as needed, and to be efficient Protect the integrity and correctness of the entire electronic medical record. The data integrity and correctness protection method proposed by the present invention does not require the hospital to change the electronic medical record system in operation, and any storage structure, form or record presentation rules used in the original system, or even medical personnel's records of medical records The specifications of the signature can be maintained in the original system. However, the composite electronic medical record structure proposed by the present invention can provide a more consistent method for traditional medical record management, and a more efficient method for protecting and verifying the integrity and correctness of data. The patient is the main body to manage and protect all its medical records. Therefore, you can adopt the proposed electronic medical record structure at the same time, and you will get the utility listed in the subsequent description. Before explaining the present invention, it is necessary to explain the relationship between the authenticity of information and the integrity and correctness of data. There are five operations for destroying the authenticity of data described in IS〇 / IEC 1〇 丨 81_6 (Infomati⑽ technology — Open Systems Interconnection-Security frameworks for open systems: Integrity framework) documents, which are unauthorized data modifications. , Unauthorized data deletion, unauthorized data creation, unauthorized data increase, and unauthorized data reuse, so it has two meanings: the correctness of the data and the authenticity of the data, that is, the data must be correct , And the process of its creation must be legitimate, authorized, and not fraudulent. The authenticity of information is more extensive than the definition of authenticity of data. This is because the data has some related attributes, such as the presentation rules of the data, which will affect the interpretation of the data. Therefore, 'protection of related attributes: one of completely different tributes; in addition, the completeness and correctness of the data represent; 1 the essential meaning of authenticity, consistent with the authenticity of the data, and the meaning of comprehensive protection The translation terms used by 疋 are not the same. Therefore, 'negative truthfulness' implies that we can understand the nature of the imagination, and naturally include the positivity and correctness of Shen Zu々. However, the method designed by the present invention, Z Fan Φ ^ ^ ^ ^, $ protects the protection of medical institutions, so it has the ability to achieve the authenticity of the material with the accuracy of 1 ± w. Electronic medical records research has been developed for many years. JT ^ ^ Thousands have listed the integrity of medical records and birds as important topics, and 1 "Market 4" and / or the completeness and correctness of the medical records

性所欲達成的安全保護功能,正I前、f -I b 舁則述貢訊真確性保護The safety protection function that sex desires to achieve, just before I, f -I b, it is said that Gongxun authenticity protection

、目4示相同 病歷記錄之資料士敕日T t A ' T又貝枓凡整且正確無誤,因此,基 广達成之目標相同的這個理由,雖然使用資訊真確性較能 :達本發明之真意’仍然依循此—領域研究的前例,在說明 电子病歷資料的保護方法時採用「資料完整性及正確4. Item 4 shows the data of the same medical records T t A 'T and the date is correct and correct. Therefore, the reason why Jiguang achieves the same goal, although the authenticity of the information is better: "True intentions" still follow this-the precedent of field research, when explaining the protection method of electronic medical record data, "data integrity and correctness

士:rj J 叫 〇 2·保護資料完整性及正確性的資訊安全技術 一般用於保護貧料完整性及正確性的資訊安全技術是 種%為「檢查碼」的方法,在實際運作上,檢查碼是利用 數學函式對原始訊息進行運算,獲得一個較短且固定長度的 檢驗值,附在原始訊息之後,提供接收方作為確認訊息在傳 k過私中疋否文到任何改變之用,這些改變包含未經授權的 創造、增加、修改、部份刪除以及全部刪除;確認的方法, 13 200535746 疋&接收到的訊息透過同—數學函式的計算,獲得—個比對 用的k驗值’再將接收到的檢查值與重新計算而得的檢驗值 比對,當兩者相等,接收方可確認訊息未被修改,反之,訊 息的元整性及正確性已遭破壞。Taxi: rj J 〇2. Information security technology to protect the integrity and correctness of data Information security technology generally used to protect the integrity and correctness of lean materials is a "check code" method. In actual operation, The check code is a mathematical function that operates on the original message to obtain a short and fixed-length test value. It is attached to the original message and provides the receiver as a confirmation message to confirm whether the message was transmitted in a private way. These changes include unauthorized creation, addition, modification, partial deletion, and total deletion; the method of confirmation, 13 200535746 疋 & received information obtained through the calculation of the same-mathematical functions, a comparison for 'K-check value' then compares the received check value with the re-calculated check value. When the two are equal, the receiver can confirm that the message has not been modified. Otherwise, the integrity and correctness of the message have been destroyed.

廣泛使用的檢查碼技術可概分為兩類,其一為不需使用 金输即可計异獲得的檢查碼,另—為需使用㈣計算才能產 生的檢查碼。屬⑨第一類的檢查碼計算函式稱為「#凑函數 或單向赫序函數」,此類函數具有將多項數值對應到單一 函數值的功此,加上難以由任意二訊息求得相同雜凑值的碰 撞阻抗特性’因此廣泛用於將輸入訊息濃縮為足以代表該訊 息之較短訊息的處理。屬於第二類的檢查碼則使用金鑰密碼 本四數將汛心以及金输當作函數的輸入值,取得一個與訊 息及金输具有關係的檢查值,在檢查時,需再次輸人訊息及 金鑰,當二者均正確則可獲得相符的檢查碼,若再次輪入的 訊息與金鑰有一不正確,則難以獲得正確的檢查值。 屬於第二類的檢查碼計算方法又可進一步區分為兩 類’ -類疋製作檢查碼者及驗證檢查碼者使用相同金鑰的方 法,稱為「對稱式密碼法」,所得之檢查值常稱作「保護封 钛」,另颂疋製作檢查碼者及驗證檢查碼者使用成對金鑰 中之不同金鑰的方法,稱為「非對稱式密碼法」,所得檢查 值則稱作婁文位僉章」。因此,在製作及驗證檢查碼的過程 中,若使用對稱式密碼法,冑方需具有同一把金鑰才能完 成’右使用非對稱式密碼法,則雙方需具有成對金鑰中相對 應之錢才行,所以,訊息之完整性及正確性輯護有賴於 14 200535746 金鑰的保護。 另外,由於單向赫序函數是一個公開的方法,在1· 受到保護或隱藏的情況下,影響檢驗結果的因素僅有1Z曰 否正確一項,因此,惡意破壞者只需使用相同的函數便== 用偽造的訊息產生符合規範的檢查碼並通過驗證,造自 〇fL ^ 之完整性及正確性受到破壞。若使用金鍮密碼學方法,則可 在製作及驗證檢查碼的雙方安全保護其所持有之密碼學^ 鑰的情況下,避免完整性及正確性受到破壞,但其運算== 相較於不需使用金鑰的單向赫序函數來說,慢了許^ ^ ^ 此,實務上的做法是利用單向赫序函數可濃縮原始訊息之^ 性,由單向赫序函數求出足以代表原始訊息之赫序函數值, 再以金鍮密碼學方法對此—#序函數值運算,求得訊息的檢 查碼以增強汛息之完整性及正確性保護並提升運算速度。 3 ·本發明所設計的複合式文件之資料完整性及正確性保護The widely used check code technology can be roughly divided into two types. One is the check code that can be obtained without the use of gold loss, and the other is the check code that can be generated using ㈣ calculation. The check code calculation function belonging to the first category is called "#cous function or one-way Hertzian function". This type of function has the function of corresponding multiple values to a single function value. In addition, it is difficult to obtain from any two messages. The collision resistance characteristic of the same hash value is therefore widely used in the process of condensing an input message into a short message sufficient to represent the message. The check code belonging to the second type uses the key codebook and four numbers to take Xin Xin and gold loss as the input values of the function to obtain a check value related to the message and gold loss. During the check, you need to enter the message again. And key, when both are correct, a matching check code can be obtained. If the message re-entered and the key are incorrect, it is difficult to obtain a correct check value. The check code calculation method that belongs to the second type can be further divided into two types.-The type of method in which the check key is made by the person who makes the check code and the person who verifies the check code is called "symmetric cryptography". The check value obtained is often It is called "protected titanium", and the method by which the check code maker and verification check coder use different keys in the paired key is called "asymmetric cryptography", and the check value is called Lou Literary Seals ". Therefore, in the process of making and verifying the check code, if the symmetric cipher method is used, the party must have the same key to complete the 'right use of asymmetric cipher method, then both parties must have the corresponding one of the paired keys. Money only works, so the integrity and correctness of information depends on the protection of 14 200535746 keys. In addition, because the one-way Hertzian function is a public method, when 1 · is protected or hidden, the factor that affects the test result is only 1Z, which is correct. Therefore, malicious vandals need only use the same function. = == Generates a check code that complies with the specifications with forged information and passes verification. The integrity and correctness of the code created from 0fL ^ are damaged. If you use Golden Cryptography, you can protect the integrity and correctness of the cryptographic ^ key held by the two parties making and verifying the check code to prevent damage to the integrity and correctness, but its operation == compared to For one-way Hertzian functions that do not require a key, it is a bit slower ^ ^ ^ Therefore, the practical approach is to use one-way Hertzian functions to condense the ^ of the original message. It represents the value of the Hertzian function of the original message, and then calculates this by using the Golden Cryptography method to #order the value of the function. The check code of the message is obtained to enhance the integrity and correctness of the flood information, and to increase the calculation speed. 3 · Protection of data integrity and correctness of composite documents designed by the present invention

方法 ^ 本舍明所&出之複合式文件的資料完整性及正端性保 焱方法,是將針對單一訊息來源所設計的檢查碼運算方法, Λ個頗具巧思的方式改良,使其能適用於可不斷增加内容 白勺才复-V . 口 ^文件。此方法之原理是將複合式文件中同層文件的 檢查碼速纟士 L. 一 %…為一暫存記錄,再計算該暫存記錄的檢查碼作為 ^ ^層文件的檢查碼,因此在實施時,如第~圖所示,會將 刀/、有一層架構的複合式文件(1 ο 〇 ),所包含的每一成員 15 200535746 文件(1 0 1 )及(1 0 1 1 )之資料完整性及正確性檢查碼,連結為 一份暫存記錄’再對其進行產生檢查碼的運算,獲得足以代 表整份複合式文件的檢查碼(1 〇 3 ),即可使整份文件獲得適 當的資料完整性及正確性保護。 另外,由於每一層文件的檢查碼是以固定順序連結產生 暫存記錄,因此當同層文件間之次序受到改變,或者是其中 的部伤文件遭文未經技權的刪除,則連結產生的暫存記錄就 會改變,由暫存§己錄计鼻獲得的檢查碼亦將改變,而能檢驗 #出更動文件次序或是部份刪除的破壞行為。請參閱第一圖所 示之(104)中的第一式。上述說明可表示如下: CCd= CCFCCCF(Mo) I lCCF(Mi) | |CCF(M2) | | · · · I lCCF(Mn) I I · · ·); 其中: CCD表示整份複合式文件的檢查碼(l〇8) ( Checki叫Method ^ The data integrity and correctness guarantee method of the composite document produced by Ben & Sham & Co., Ltd. is to improve the check code calculation method designed for a single source in a clever way to make it It can be applied to the -V. Mouth ^ file that can continuously increase the content. The principle of this method is to use the check code of the same layer file in the composite file as the check code L. One% ... is a temporary record, and then calculate the check code of the temporary record as the check code of the ^ ^ layer file. During the implementation, as shown in the first figure, a compound file with a layer structure (1 ο 〇) will be included, each member included in the 2005 2005746 file (1 0 1) and (1 0 1 1) The data integrity and correctness check code is linked to a temporary record, and then a check code operation is performed to obtain a check code (103) that is sufficient to represent the entire composite document, so that the entire document can be made. Obtain proper data integrity and correctness protection. In addition, because the check code of each layer of files is linked in a fixed order to generate temporary storage records, when the order between the files at the same layer is changed, or the internally damaged files in it are deleted without technical rights, the link is generated. The temporary record will be changed, and the check code obtained by the temporary record will also be changed, and it is possible to check the behavior of changing the order of the file or the partial deletion. Please refer to the first formula in (104) shown in the first figure. The above description can be expressed as follows: CCd = CCFCCCF (Mo) I lCCF (Mi) | | CCF (M2) | | · · · I lCCF (Mn) II · · ·); where: CCD represents the inspection of the entire composite document Code (10) (Checki called

Code of a C⑽pound D〇cument ) ; CCF 表示檢查碼函式 (CheckingC〇deFunctl〇n) (1〇5);Mn 表示第 n 份成員文 件(MemberD〇CUment );η代表成員文件的編號(107),、是 -個由壹開始循序遞增的正整數;而 學虎%代表數 因此,一個有效率且能提供整份複合式文件足 完整性及正確性保護方法, 王的 件進行單向赫序函數運算,子母成貝文 碼’接著將每一成員文件(1〇"、do"=“查 暫存記錄,以此暫存記錄代表整份複合^結為一 記錄進行一次單向赫序函數的運算,最後再:: 二對此暫存 錄之單向赫序函數值進行金鑰密碼學運::的:存記 坆侍该禝合式文 16 200535746 件的檢查值。 上述執行方法的理由, 高於單向赫序函數 為金鍮密瑪學的運算負荷遠 可不斷增長,若採用八一文件(1〇1)、(i011)的數量 荷,因此,在成㈣學技術,將會有很大的運算負 用運异效率較高且負荷較 丁斤上抓 族人4七从 転的早向赫序函數,而在計算整份 禝合式文件(1 00)之檢查碼 卞才正伤 所以採用金鍮密碼學方法,“…有較南程度的保護’ 。。〇)的完整性…性,也;:7禮實保護複合式文件 也了提升檢查碼運算時的效率。 度較= 卜::然對每-成員文件⑴”、(ion)採用保護程 日1二ϋ早°赫序函數值做為檢查值,最後並不會減損本發 斤k方法的完整性及正確性保護能力,這是因為每一成員 =件(1 〇 1 )、( 1011)的檢查碼亦會受到複合式文件(1 〇 〇)之 檢,碼的保護’任-成員文件(1。1 )、( 1011)的内容或檢查 碼叉到未經授權的變更,都可由複合式文件的檢查碼檢驗得 知。此方法可表示如下: CCn - KC( H( H(M〇) I I H(Mi) | | H(M2) | | · . · | | H(Mn) 其中: CCd表示整份複合式文件的檢查碼(丨〇8 ) ( CheckingCode of a C⑽pound D〇cument); CCF represents the Checking Code Function (Checking Function) (105); Mn represents the nth member file (MemberD0CUment); η represents the number of the member file (107) , Is a positive integer that starts to increase progressively from one to one; and learns the% representative number of tigers. Therefore, an efficient and able to provide the entire composite file with full integrity and correctness protection methods, the king's piece performs a unidirectional hierarchic sequence. Function operation, the mother and son into Bevin code ', and then each member file (1〇 ", do " = "check the temporary record, so that the temporary record represents the entire compound ^ into a record for one-way The operation of the ordinal function, and finally: 2: Perform the key cryptographic operation of the one-way Hertzian function value of this temporary record: :: The memorizer records the check value of the compound formula 16 200535746. The above execution method The reason is that the higher than one-way Hertzian function is that the computational load of Jinmao Mimas can increase continuously. If the quantity load of Bayi file (101) and (i011) is used, therefore, the technology of Chengyi will be There are a lot of negative operations. Compared with the Ding Jinsong, the family member VII from the early to the Hexian order function, and only when the check code of the entire composite file (1 00) is calculated, so the use of the Golden Cryptography method, "... has a higher degree of protection '... 0) integrity ..., also ;: 7 Ethical protection of composite files also improves the efficiency of checksum calculations. Degree comparison = bu :: Then, for each-member file ⑴ ", (ion), the value of the protection order date is used as the check value, and the integrity of the method of the present method will not be degraded. The ability to protect the correctness is because the check code of each member (1001) and (1011) will also be checked by the composite file (100). The protection of the code is' Ren-member file (1. 1), the contents of (1011) or the check code fork to unauthorized changes can be obtained by checking the check code of the composite file. This method can be expressed as follows: CCn-KC (H (H (M〇) IIH ( Mi) | | H (M2) | | ·. · | | H (Mn) Where: CCd represents the check code (丨 〇8) (Checking

Code 〇f a Compound Document ) ; KC表示使用金鍮密碼學 之檢查碼函式(Cryptographic Function ) ; H表示單向赫 序函數(One-way Hashfunction ); Μη表示第η份成員文 件(nth Member Document ) ; η代表成員文件的編號(1 〇 7 ), 是一個由壹開始循序遞增的正整數;而“ I I ,,符號則代表 數學運算中的連結。 由於使用金鑰密碼學函式進行檢查碼運算時,實務上會 17 200535746 搭配單向赫序函數使運算具有效率,因此,本表示式實際上 與前述的原始表示式相同。 由前段敘述可以發現,本發明所提之方法以每一成員文 件(1 0 1 )、( 1 0 11 )的單向赫序函數值之連結值,取代所有成 員文件(101)、(1011)之原始内容作為複合式文件的内容, 再對此一連結值進行單向赫序函數的運算,以求得之單向赫 序函數值當作足以代表複合式文件的單向赫序函數值,這麼 做的理由是因為單向赫序函數值在資訊安全領域具有足以Code 〇fa Compound Document); KC means Cryptographic Function using Cryptography; H means One-way Hashfunction; Μη means nth Member Document η represents the number of the member file (107), which is a positive integer that is sequentially increased from one; and "II", the symbol represents the link in the mathematical operation. Because the check code operation is performed using the key cryptography function At the time, in practice, 17 200535746 with one-way Hertzian function makes the operation efficient, so this expression is actually the same as the original expression described above. As can be found from the previous paragraph description, the method proposed by the present invention uses each member file The concatenated values of the one-way Hertzian function values of (1 0 1) and (1 0 11) replace the original contents of all member files (101) and (1011) as the contents of the compound file, and then perform this link value The operation of the one-way Hertzian function, in order to obtain the value of the one-way Hertzian function is sufficient to represent the value of the one-way Hertzian function of the composite file. The reason for this is Function values have enough in the field of information security

代表原始訊息之能力,而一份複合式文件是由其所含括之所 有成員文件(101)及(1011)組成,全部成員文件(1〇1)及 (1 0 1 1 )的内容正是該複合式文件的内容。 在先則運异中,已取得每一成員文件(1〇1)、(1〇11) 之單向赫序函數值,這些函數值均可代表用於產生該函數值 之原始訊息,因此,將每一單向赫序函數值連結為一數位訊 息,則该數位訊息亦將具有代表所有成員文件(丨〇丨)及 (1 0 1 1 )連結後之訊息的效力 代表整份複合式文件的功能; ’也就是說,這個訊息具有可 此外’一個單向赫序函數值通Represents the ability of the original message, and a composite document is composed of all the member documents (101) and (1011) it contains. The content of all the member documents (101) and (1 0 1 1) is exactly The contents of the composite file. In the previous rule, the one-way Hertzian function values of each member file (101) and (1011) have been obtained. These function values can represent the original information used to generate the function value. Therefore, Link each unidirectional Hersequence function value into a digital message, then the digital message will also have the effect of representing all member documents (丨 〇 丨) and (1 0 1 1) linked messages to represent the entire composite document Function; 'That is, this message has an additional'

常僅為-百多個位元的大小,遠小於產生其之原始訊息,在 f結為數位訊息後,亦將遠小於原始訊息之連結值,所以在 單向赫序函數值的計算上,將更具效率。 為了使本發明所提之方法可讓個別的成員文件 (1 〇 1 )、( 1 ο 11)具有保護其本身之完整性及正確性的功能, 在貝% %可以如此執行··先對每一份成員文件(101 )、( 101 ο 進行單向赫序函數運算,再對每一份成員文件(丨0丨)、(丨0丨i) 的單向赫序函數值使用金鍮密碼法求取每一成員文件的檢 查碼,將前一步驟獲得的每一成員文件(1 0 1 )、(丨〇丨丨)之單 向赫序函數值連結為—暫存記錄,並對此暫存記錄進行單向 18 200535746 單向赫序函數值運算, 可達成有效保護成員文 0)的目標,因此,一個 )及複合式文件(1 〇 〇 ) 赫序函數運算,再以金鍮密碼法對此 獲得複合式文件(1 0 0 )的檢查碼,即 件(101)及(1011)及複合式文件(1〇 有效地保護成員文件(1 〇 1 )及(1 〇 i i 的方法,可如此表示: CC Μη - KC( H(Mn));、 • I I H(Mn) CCd= KC( H( H(M〇) I I Η(Μι) I I H(M2) 其中: Μη表示第n份成員文件(nth Member “⑶㈣肘) (1 〇 7 ) n代表成員文件的編號,是一個由壹開始循序遞增的 正整數;ccMn則是第n份成員文件的檢查碼(丨〇6) (Checki叫 Code of nth Member D〇cument ); Kc表示使用金鍮密碼學 之檢查碼函式(Cryptographic Functi〇n ) ; H表示單向赫 序函數(One-way Hash functlon ) ; CCd表示整份複合式文 件的檢查碼(Checking Code of a Compound Document ); 而‘‘ II ”符號則代表數學運算中的連結。 由於使用金鑰密碼學函式進行檢查碼運算時,實務上會 搭配單向赫序函數使運算具有效率,因此,本表示式實際上 亦為前述原始表示式的延伸。 由上式可以看出,每一成員文件(101)、之真正 的檢查碼是由使用金鑰的檢查碼函式計算而得,但如前所 述,格配單向赫序函數可以使整體之運算效率更佳,因此在 計算複合式文件(1 〇 〇)之檢查碼時,使用成員文件(丨〇丨)、 U 0 1 1 )的單向赫序函數值取代真正的檢查碼。由於此單向 赫序函數值為計算真正的檢查碼之前置步驟,且同樣具備檢 驗文件之完整性及正確性的功能,因此稱其為暫時性檢查 19 200535746 碼,另外,只要不是真正作為該文件之檢查碼,但具備檢查 碼之知'性與功能 足以代表原始況息而能檢驗訊息之完 整性及正確性的數值,都可將其稱為暫時性檢查碼。因此, 暫時性檢查碼可如前述,是一個計算檢查碼之前置步置所產 生的數值,也可以是檢查碼的衍生值,例如,檢查碼與該訊 息之序號的連結值。如此實施的理由,亦在於單向赫序函數 值與金鑰密碼學所產生之檢查碼有著相同的特性,均具有足 以代表原始訊息的能力。因此,可修改上式之表示為·· CCd ^ CCFCTCCmo | | TCCmi I I TCCm2 ||···|| TCCMn II···); 其中: CCd表示整份複合式文件的檢查碼(i 〇 8 ) ( Checking Code of a Compound Document ) ; CCF 表示檢查碼函式 (Checking Code Function ) (105) ; Mn表示第 n 份成員文 件(nth Member Document ) ; n代表成員文件的編號(1〇7), 疋一個由壹開始循序遞增的正整數;TCCMn則是第η份成員文 件的暫時性檢查碼⑴9) ( Cheeklng㈤e Qf恤Me —It is usually only a size of more than a hundred bits, which is much smaller than the original message that generated it. After f is a digital message, it will be much smaller than the link value of the original message. Therefore, in the calculation of the one-way Hertzian function value, Will be more efficient. In order to make the method mentioned in the present invention allow individual member files (1001), (1ο 11) to have the function of protecting their integrity and correctness, it can be performed in %%. One member file (101), (101 ο) perform one-way Hertzian function operation, and then use the Golden Cryptography method for the one-way Hertzian function value of each member file (丨 0 丨), (丨 0 丨 i) Obtain the check code of each member file, and link the one-way Hertzian function values of each member file (1 0 1) and (丨 〇 丨 丨) obtained in the previous step as-temporary storage records, and temporarily Store the record and perform one-way 18 200535746 one-way Hertzian function value operation, which can achieve the goal of effectively protecting member text 0). Therefore, one) and composite file (100) Hertzian function operation, and then use the golden key cryptography method. In this regard, the check code of the composite file (100) is obtained, that is, the methods of (101) and (1011) and the composite file (10) effectively protect the member files (101) and (100). Expressed like this: CC Μη-KC (H (Mn)) ;, • IIH (Mn) CCd = KC (H (H (M〇) II Μ (Μι ) IIH (M2) Where: Μη stands for the nth Member File (nth Member “⑶㈣ ″) (1 07) n stands for the number of the Member File, which is a positive integer that increments sequentially from one; ccMn is the nth copy Check code of member file (丨 〇6) (Checki is called Code of nth Member D〇cument); Kc represents the use of Cryptographic Functiocn; H represents one-way Hertzian function (One -way Hash functlon); CCd represents the Checking Code of a Compound Document; and the "II" symbol represents the link in mathematical operations. Because the check code is performed using a key cryptography function In the calculation, it is practically matched with a one-way Hertzian function to make the operation efficient. Therefore, this expression is actually an extension of the aforementioned original expression. As can be seen from the above expression, each member file (101), the true The check code of is calculated by using the check code function of the key, but as mentioned earlier, the lattice with one-way Hertzian function can make the overall operation efficiency better, so in the calculation of the composite file (100) Inspection Code, use the unidirectional Hertz function value of the member file (丨 〇 丨), U 0 1 1) to replace the real check code. Because this unidirectional Hertz function value is a step before calculating the real check code, and It also has the function of checking the integrity and correctness of the file, so it is called a temporary check 19 200535746 code. In addition, as long as it is not the check code of the file, but the knowledge and function of the check code are sufficient to represent the original condition A value that can verify the integrity and correctness of a message can be called a temporary check code. Therefore, the temporary check code may be a value generated by stepping before calculating the check code as described above, or may be a derived value of the check code, for example, a link value between the check code and the serial number of the message. The reason for this is that the value of the one-way Hertzian function has the same characteristics as the check code generated by key cryptography, and both have the ability to represent the original message. Therefore, the above formula can be modified as: CCd ^ CCFCTCCmo | | TCCmi II TCCm2 || ··· || TCCMn II ···); where: CCd represents the check code of the entire compound file (i 〇8) (Checking Code of a Compound Document); CCF stands for Checking Code Function (105); Mn stands for nth Member Document; n stands for member document number (107), 疋A positive integer that increases from one to one; TCCMn is the temporary check code for the nth member file (9) (Cheeklng㈤e Qfshirt Me —

Document ) ’而丨丨#號則代表數學運算中的連結。如. 此’便與第-圖中描述暫時性檢查碼之第二個敘述式相同。 另外,每一份成員文件(101)、(1〇11)可能也會具有一 個唯一的序號,這個序號 侔/、-人I U T以疋依知文件產生時間或是該文 功处i ° t H欠序而產生’通常具有識別文件之 力%,而稱其為識別碼(ide 、 之檢查瑪時,便可利用 :。產生複合式文件 數值、保護封條值或簽章值連;件,碼與其單向赫序函 員文件(1⑴及⑴U)之?二,:生-個足以代表全部成 運算,即可獲得複合式文件二:_行檢查碼 連結值’也同樣具有檢竣文件之::’其中’可述的識別碼 又件之元整性及正確性的功能,是 20 200535746 ^暫時性檢查碼之另一例,而前述說明之表示式亦如第一圖 (1 0 4 )中的第二個敘述式。 總結暫時性檢查碼之應用,其將每一份成員文件 (1 〇 1 )、( 1 0 1 1 )之實際儲存的檢查碼、求得檢查碼之前置步 驟的產出值、或前述兩者與文件識別碼的連結值,當作複合 式文件(1 0 0 )檢查碼的運算來源;而在資訊安全的領域中, 上述各項數值均具有足以代表原始訊息的性質,因此,以這 些數值所產生之暫存記錄計算而得的單向赫序函數值,可代 表全部成員文件(101)、(1011)—一即整份複合式文件 (1 〇 〇)的内谷,亚再次進行產生檢查碼的運算,獲得足以代 表:份複合式文件的檢查碼,使各成員 可獲得完善的完整性及正確性 11} 件之檢查碼的運算更具效率 "生保4且使產生整份複合式文 :納上述的檢查碼運算,可概分 一文件的檢查碼’其二為計算一份複,’、為计异早 碼;二者均為特定的數學運算式,該^件(100)的檢查 單向赫序函數、對稱式密瑪法、或非能代表著—個 I可依需求採取最適當的作法。 ’冉式饴碼法的運算, 4.本發明所設計 式電子病歷記錄架構 本發明亦同時提出創新 構,用於將病患在同—醫療機;式電 病歷樓案’這個架構是本專 〜就醫記錄整合為同一 時所體會出來的,其作法==與電子病歷發展計晝 勺母—病歷記錄聚合為—敕 凡迻電子病歷所應 合式的雷;习凡王的檔案, 子病歷C錄可被視為至少具/、 口此,一份複 /、有〜個層級的複合式 21 200535746 、己錄,此二層級分別為第一廣級的醫事文件, 級的病人層;屬於笛^ 西肀乂仟層以及弟二層 級之病人層記錄的::層級之醫事文件層記錄是屬於第二層 本身内容透過檢查碼::錄’第—層級記錄的檢查碼是由其 碼則由第一層記纾::计异獲得’而第二層級記錄的檢查 查碼依前文所述的方法計算而得。 在此所况明的複人 丁 資料完整性及正確性=先前介紹的複合式文件之 由於電子病歷-詞ΓΓ: 到的複合式文件相同,僅 而付,因此,為了符人 m^ 子病歷架構時,將= 在談到本發明所設計之電 件改稱為成員記錄。;? %為複合式記錄’而成員文 酉事文件層的每一彳合9p、4·、# 印絲,Η姓山 伤5己錄^述者一份診療相關之醫拿 D么,疋構成整份病歷檔案的基本元件,此弋钎可έ_ 機構内部的電子病屛&件此5己錄可經由醫療 其他醫療機構提二透過病歷資料交換機制由 容產生的檢二:: 個識別碼以及由記錄内 統用於識別:之唯T:gcode) ’其中’識別碼即為系 件唯一序號,而檢查碼將作為檢驗該份醫事文 件層C錄之完整性與正確性的依據。 西爭文 病人層所描述的記錄為一複合式記錄,此記錄 同-醫療機構接受診療而產生的 件 組:,亦具有識別碼,因此,-份病人層記二:;Γ 病患的完整帝4i Μ 丨八衣者一位 由… 用於保護該記錄的檢查碼,庠 圯錄内的全部内容作為計算來源而產生, 一 為檢驗該份病人層記錄之完整性與正確性的依據:…4 理二再醫療機構曰常營運時對病歷記錄的管 事記錄的區隔;:2#療歷程做為記载相關醫 隔輮旱,亦即母次產生的診療相關記錄會經由醫 22 200535746 師撰寫或審閱後歸在同一診療歷程中,再以醫師 =的依據,該簽章值還具有區隔醫療責往的功能。在: 汁電子病歷記錄架構時亦應將此管理需求納入,使+ 、禾 能真正符合醫療機構的營運架構,獲得更完善敕=病歷 確性保護功能。 』凡王性及正 因此’可使用前述的複合式電子病歷記錄架 延伸該架構,如第二圖所示;將一位病患的整份兩:二楚、 為至少具有三個層級的複合式記錄,此三個:::視 屏妨沾毅吉七a g ㈢、及y刀別為第一 曰、、及的酉事文件層,如(201)及(2011);第二馬々 層::则及咖);及第三層級的病人;,:(=療 屬於第一層級之醫事文件層記錄可從屬於第二 ^ 層記錄,或可直接從屬於第三層級的病人層記錄’、’ :診療 級之=療層言己錄則從屬於第三層、級之病人層^表,。弟—層 第一層級記錄之檢查碼(201)及(2011) 示’由其本身内容透過檢查碼函數計算獲得,而、圖 錄:檢查碼(204)及(2〇41),是由從屬於其的第 之檢查碼(201)及(20⑴,透過本發明所設 :、.’、 得’第三層級記錄的檢查碼则,則由從屬而 錄之檢查碼(204)及(2〇41),或再加上第;:二己 碼⑵υ及⑵⑴,作為本發明所設計之方輪 二彳又侍。其中,醫事文件層的定義與前段相同。 /療層所榀述的記錄,由同一診療歷程中所產生的每一 人:文件層記錄所紅成,為一份複合式記錄,記錄中亦:: 从庵:識別碼以及用於保護該記錄的檢查碼,此檢查碼:以 錄之全部内容進行計算而求得,將作為檢驗該二 样彔之完整性與正確性的依據。其中,從屬於診療層記 的醫事文件層記錄可能是一份診斷記錄、數位化的X二片 23 200535746 資料、 層掃描 病 一醫療 納入病 記錄所 錄的醫 網路系 人層記 記錄的 生,並 上 制;不 於同一 術。 或經由醫療造影技術產生的醫療影像資料’如電腦斷 (ct)、核磁共振(MRI)等技術所產生的影像記錄。 人層所描述的-份記錄仍為複合式記錄,由病患在同 機構接受診療而產生的每一份診療層記錄,以及必須 歷檔案而無法歸屬於某一診療層記錄之醫事文件層 組成’亦具有-識別碼。其中,&法歸屬於診療岸; 事文件層記錄可能是病患的基本資料,也可能是:由 統,自其他醫療機構交換而得的摘要資訊等。—份病 ^代表著-位病患的完整電子病歷記錄,用於保護= 檢查碼’也應由記錄内的全部内容作為計算來源而: 作為檢驗整份病人層記錄之完整性與正確性的依據。 述各層級記錄所使用的檢查碼技術並未受到任何限 同層級的記錄可採用不同的檢查碼運算技術,甚至屬 層級的不同記錄,亦可使用不相同的檢查碼運算技 5·將保護方法應用於複合式電子病歷 承刚所述,可將本發明設計的複合式電子病歷記錄竿 f ’與複合式文件之資料完整性及正確性保護方法結合,使 ^子病歷的貢料完整性及正確性保護更為完善。 根據前述關於複合式文件資料完整性及正確性保 =檢查碼產生方式,可以衍生多種電子病歷:查 生二:=貫施方式之一敍述如後。對每次醫療行為產 .西事文件層記錄以醫師金鑰進行簽章運算,簽章 該記錄的檢查值’而簽章值運算之前置步驟所產生的單向赫 24 200535746 序函數值,則依序連結為一暫存 代表值,接著以醫療機構之秘密金鑰對:::整份病歷槽案的 運算,以獲得的保護封條值 ;:$行保護封條的 統,即可達成對病歷播案的保^目楷案的檢查值存於系 其中,以每一單向赫序函數值 病歷檔的全部資訊,是使用單 @數位訊息代表 有足以代表原始訊息之特性,加上值在密碼學領域具 組成之性質’所設計出的表示方法二二己錄疋由成員記錄 性’與實務應用所需的效率性。付口岔碼學理論的正確 複人弋文件之次2改!'後的二層複合式電子病歷記錄架構與 ;:式文件…完整性及正確性保護方法結合,則可如下 請參閱第三圖。由醫塞古> & …入“ 文件廣記錄(300)及( 300 1 )所组 成之矽療層記錄,將透過檢查碼數, 錄的檢查碼,在此,檢查碼運算可包;以代表該記 屬於同-診療層的每―醫事文件二括二7广亦即’將 暫存記錄侧,再以其進行單向赫序函數的運算連二:足 = 的訊息摘要’並以私密金謝進行 二=求付數位簽章’作為診療層記錄檢查碼(3〇3),儲 2 1病歷資料庫中’做為檢驗及保護診療層記錄之完整 摘要之表示式如下·· ^代表㈣層記錄的訊息 hash(診療層記錄)=hash( γ ),其中,⑹匕㈠是〆 查碼計算的單向赫序函數,而γ代表所有從屬 H乡療層記錄之醫事文件層記錄之數位簽章的連結值,例 25 200535746 如,Slgnature(第1份醫事文件層記錄)M Slgnature(第2 份醫事文件層記錄)II .·· II Signature(最後—份醫事 =件層記錄),在此,符號“丨丨”❹數學運算中的連結之 思,圖中標η代表該診療層記錄中的第n份醫事文件層記 錄的編號;此例中同時具有表示該記錄為最後-份成員二錄 之意。 ' ,、$第图明參閱第四圖。在病人層記錄中所儲存的内 合為位病患在同一醫療機構就診的完整病歷資料,按照 本毛月所提之木構,是以直屬於該病人層記錄的醫事文件層 記錄(40 0 ),及診療層記錄(4〇1)及(4〇⑴所組成,因此,: 計算病人層記錄之檢查碼時,需將從屬的每一醫事文件層言田己 錄之保,又封條值’連結每一診療層記錄之簽章值成一暫存記 錄(403),再以其進行單向# _ ^ 丁早向赫序函數的運算,獲得足以代表 该份病人層記錄的訊自搞並 、, 心摘要’亚以秘密金鑰對其進行運算求 得保護封條,作為病人層印俾 層。己錄的檢查碼(404 ),儲存於電子 病歷資料庫中,做為檢驗乃仅 欢鈿及保墁該位病患之電子病歷完整性 及正確性的依據。其中,上 φ ΑΑ主-』 这足以代表病人層記錄之訊息摘 要的表示式亦可表示如下: hash(病人層記錄)二hashr c、 nash( S ),其中,S代表所有從 屬於該病人層記錄之醫事文件; .y τ Λ 9 5己錄(圖中以病患基本資料 為例)的識別碼及檢查碼,盥体 ..y r Λ A ^ 0療層記錄(圖中以門/急診病 歷為例)的識別碼及檢杳砰 • 一馬的連結值,例如,S = signature(第1份醫事文件層記 · 蛉瘩 Μ ~ 你、II · . $ ) I I signature(第 1 份 0療層§己錄)I I s 1 gnature(篦9八 II · 分珍療層記錄)| | · · · 丨丨signature(袁後一份診療層記錄) 或者,也可以使用在第五圖中 从汰& k r古 , 所展現的方法。將屬於同 一衫療層的母一%事文件層記絲 〜之識別碼(圖中以識別碼ri 26 200535746 -表示)連結其檢查碼(此處亦使用數位簽 一暫存記錄(5 0 3 ),並以此暫存記錄進行單向再連、、、。成 鑰對其運算求得數位簽章,作 玉以私狁金 ⑽小儲存於電子病歷資料庫中,做 記錄之完整性及正確性的依據。其中,==診療層 記錄的訊息摘要之表示式如下·· 代表#療層Document) 'and 丨 丨 # represent links in mathematical operations. For example, this' is the same as the second narrative of the temporary check code in the figure. In addition, each member file (101), (1011) may also have a unique serial number. This serial number 侔 /, -person IUT is based on the time when the file was generated or the position of the document i ° t H Generated by a lack of order, usually has the power% to identify the document, and it is called the identification code (ide, when checking the mark, you can use :. Generate a composite document value, protection seal value or seal value connection; piece, code Rather than the one-way Hexian sequence letter files (1⑴ and ⑴U)? Two :: Generate a composite file that is sufficient to represent all the complete operations, and you can get a compound file 2: The _line check code link value 'also has the check file: : "Where" the function of the integrality and correctness of the identifiable identification code is another example of the 2005 200535746 ^ temporary check code, and the expression of the foregoing description is also shown in the first figure (104) The second narrative formula is summarized. The application of the temporary check code is summarized. The actual check code stored in each member file (1001), (1 0 1 1), and the steps before the check code are obtained. The output value, or the link between the above two and the document identifier, is treated as a compound The source of the operation of the document (100) check code; in the field of information security, the above-mentioned values are sufficient to represent the nature of the original message, so the one-way calculation based on the temporary records generated by these values The value of the ordinal function can represent all the member files (101) and (1011) —one is the inner valley of the entire compound file (100), and Asia performs the operation of generating the check code again to obtain enough representation: The check code of the file enables members to obtain complete integrity and correctness. 11} The check code operation of the file is more efficient " Shengbao 4 " and the entire composite text is generated: the check code operation described above can be summarized. The check code of a file is 'the second is to calculate a complex,' and the early code is calculated; both are specific mathematical expressions. The (100) check one-way Hertzian function, symmetric dense Marfa, or inability, can represent an I can take the most appropriate method according to the needs. 'Ran-style code method operation, 4. The electronic medical record structure designed by the present invention. The invention also proposes an innovative structure for the disease Suffering in the same-medical ; The structure of the electronic medical record case 'This structure is realized by the same time as the integration of medical records into medical records. The method is == and the electronic medical record development plan. — The medical record records are aggregated into — 敕 Fan mobile electronic medical records should be combined. The records of King Xi Fan's files, the child medical record C record can be regarded as having at least /, mouth, a complex /, there are ~ levels of compound 21 200535746, Ji Lu, the two levels are the first Level medical documents, level patient layer; records belonging to the second level and the second level patient level :: level level medical file level records belong to the second level itself through the check code :: record '第-The check code of the level record is obtained by the code recorded by the first layer: "Differentiation", and the check code of the second level record is calculated according to the method described above. The completeness and correctness of the data of Fu Ren Ding as stated here = due to the electronic medical record of the compound file previously introduced-the word ΓΓ: The compound file to is the same, and only paid, so in order to match the person's medical records In the construction, the electronic device designed in the present invention is referred to as a member record. ;? % Is a composite record, and each member of the member's affairs file layer is 9p, 4 ·, # 印 丝, Η 山 山 伤 5 己 recorded ^ The author of a diagnosis and treatment-related doctors take D, which constitutes a whole The basic components of a medical record file, which can be used to read the electronic medical records within the institution. The 5 records can be submitted by other medical institutions through the medical record data exchange mechanism. Used by the record system to identify: only T: gcode) 'where' the identification code is the unique serial number of the system, and the check code will be used as a basis for checking the integrity and correctness of the C record of the medical document layer. The record described by the patient stratum of Xi Zhengwen is a composite record. This record is the same as the one generated by the medical institution during the diagnosis and treatment: it also has an identification code. Therefore,-two patient strata: 2: Γ The completeness of the patient Emperor 4i Μ 丨 The eight-wearer is a check code used to protect the record. The entire contents of the record are used as the source of calculation. The first is to verify the integrity and correctness of the patient-level record: … 4 The division of the medical records of Li Er Re Medical Institution during the normal operation of the medical records;: 2 # The treatment history is used to record the related medical separation and drought, that is, the medical treatment related records generated by the mother and child will pass the medical 22 200535746 After being written or reviewed by the teacher, they are included in the same diagnosis and treatment process, and then based on the doctor =, the signature value also has the function of separating medical responsibilities. In: The electronic medical record structure should also include this management requirement, so that + and Wo can truly conform to the operating structure of medical institutions, and obtain a more perfect 敕 = medical record accuracy protection function. 『Wang Xing and Zheng 'therefore can use the aforementioned composite electronic medical record record holder to extend the architecture, as shown in the second picture; two copies of a patient: two Chu, a compound with at least three levels Recording these three ::: The video screen may be attached to the Yiji Qi ag ㈢, and y knives are the first and the 酉 酉 event file layers, such as (201) and (2011); the second horse 々 layer: : 则 和 咖啡); and patients at the third level;,: (= medical records at the medical level of the first level can be subordinate to the second level of records, or can be directly subordinate to the third level of patients 'records', ': The diagnosis and treatment level = the treatment level statement has been subordinated to the third level and the level of the patient level ^ table. The check codes (201) and (2011) of the first level of the brother-level level are shown through its own content The check code function is obtained by calculation, and the catalogue: check codes (204) and (2041) are made up of the check codes (201) and (20) subordinate to them, which are set by the present invention: If the check code of the third-level record is obtained, the check codes (204) and (2041) recorded by the subordinates are added, or the number ":" is already included. And, as the second round of the second round designed by the present invention, the definition of the medical file layer is the same as in the previous paragraph. The records described in the treatment layer are produced by everyone in the same diagnosis and treatment process: the records in the file layer The red record is a composite record, also in the record :: From the identification code and the check code used to protect the record, this check code: calculated from the entire content of the record, will be used as a test of the The basis of the completeness and correctness of the second sample. Among them, the medical document layer record subordinate to the diagnosis and treatment layer record may be a diagnosis record, a digital X-two film 23 200535746 data, layer scan disease-medical inclusion disease record office The recorded medical network department records the records of the students, and the system is not the same operation. Or the medical image data generated by the medical imaging technology 'such as computer generated (CT), magnetic resonance (MRI) and other technologies Image records. The records described by the human level are still composite records, each of the medical level records generated by patients receiving treatment in the same institution, and the records must be recorded and cannot be attributed to a certain level. The medical document layer composition of the diagnosis and treatment layer record also has an-identification code. Among them, the & method belongs to the diagnosis and treatment bank; the event file layer record may be the basic information of the patient, or it may be: exchanged from other medical institutions. Obtained summary information, etc.-A copy of ^ represents a complete electronic medical record of a patient, used for protection = check code 'should also be based on the entire content of the record as a calculation source: as a check of the entire patient level record The basis of completeness and correctness. The check code technology used in the records of each level is not subject to any restrictions. Records of the same level can use different check code calculation techniques, even different records belonging to the level, and different checks can be used. Code operation technique 5 · Applying the protection method to the composite electronic medical record Cheng Gang, the composite electronic medical record record rod f 'designed by the present invention can be combined with the data integrity and correctness protection method of the composite file to make ^ The completeness and correctness protection of the child medical records are more complete. According to the foregoing about the integrity and correctness of the compound document data = check code generation method, a variety of electronic medical records can be derived: Checker 2: = One of the implementation methods is described later. For each medical act, the Western Record file-level record is signed with the physician's key, and the check value of the record is signed, and the signed value is calculated as the one-way signature generated by the previous step 24 200535746. Then sequentially connect to a temporary representative value, and then use the secret key pair of the medical institution ::: the entire medical record slot to obtain the value of the protection seal; The check value of the case record of the medical record broadcast is stored in the system. All the information of the medical record file with each one-way Hertz function value is a single @digit message representing the characteristics that are sufficient to represent the original message, plus the value It has a compositional nature in the field of cryptography 'designed representation method 22, recorded by members' and efficiency required for practical applications. The correctness of Fuchacha's code theory 'The following two-layer composite electronic medical record record structure is combined with;:-style files ... integrity and correctness protection methods, then you can refer to the third figure as follows. The silicon therapy layer records consisting of medical records > &… into file records (300) and (300 1) will pass the check code number, the check code recorded, and here, the check code operation can be included; To represent that each of the medical documents belonging to the same-diagnosis and treatment layer is composed of two medical records, that is, 'the temporary record side will be stored, and then the one-way Hertzian function operation will be performed. Two: foot = the message summary' and the Private thank you for the second step = Ask for a digital signature 'as the check code of the diagnosis and treatment layer records (303), stored in the 21 medical record database' as a complete summary of inspection and protection of the diagnosis and treatment layer expressions are as follows ... ^ The message hash (diagnostic layer record) = hash (γ), which represents the record of the ㈣ layer, where ⑹ ㈠ is a one-way Hertz function calculated by the search code, and γ represents the medical file layer record of all subordinate H home treatment layer records Link value of the digital signature, for example 25 200535746 For example, Slgnature (the first medical document layer record) M Slgnature (the second medical document layer record) II... II Signature (final-one medical affairs = piece of record) Here, the symbol "丨 丨" ❹thinking about connections in mathematical operations, η represents the number of the nth medical file layer record in the diagnosis and treatment layer record; in this example, it also means that the record is the last-member two record. ',, $ The figure shows the fourth picture. In the patient The complete medical records of the patients who are treated in the same medical institution are stored in the layer records. According to the wooden structure mentioned in this month, they are medical records layer records (40 0) that belong directly to the patient layer records. And the diagnosis and treatment layer records (4〇1) and (4〇⑴), so: When calculating the check code of the patient layer record, it is necessary to protect each of the medical documents from the subordinates, and seal the value 'link each The signature value of a diagnosis layer record becomes a temporary record (403), which is then used to perform a one-way # _ ^ Ding Zaoxiang order function operation to obtain information that is sufficient to represent the patient layer record. Abstract 'Asia uses a secret key to calculate it to obtain a protective seal, which is used as the patient's seal. The recorded check code (404) is stored in the electronic medical record database. For inspection, it is only for protection and security. The completeness and correctness of the patient's electronic medical record Basis. Among them, the expression φ ΑΑ 主-”which is sufficient to represent the message summary of the patient layer record can also be expressed as follows: hash (patient layer record) two hashr c, nash (S), where S represents all subordinate to the Medical documents recorded on the patient level; .y τ Λ 9 5 Recorded (identified by the patient's basic data as an example) identification code and check code, toilet ..yr Λ A ^ 0 treatment level recorded / Emergency medical records as an example) identification code and check the connection value of Yima, for example, S = signature (the first medical document layer · 蛉 瘩 Μ ~ you, II ·. $) II signature (第 1 Copies of the 0 treatment layer § recorded) II s 1 gnature (篦 98 八 II · divided treatment layer records) | | · · · 丨 丨 signature (a medical treatment layer record after the Yuan) Or, it can also be used in the fifth picture From Kung & kr ancient, the method shown. The identification code (identified by the identification code ri 26 200535746-shown in the figure) of the mother-percent document layer that belongs to the same shirt treatment layer is linked to its check code (the digital record is also used here to sign a temporary record (5 0 3 ), And use this temporary storage record to reconnect one-way ,,,, and so on to obtain a digital signature on its operation. It is stored in the electronic medical record database as a private gold medal. The completeness of the record and The basis for correctness. Among them, the expression summary of the message summary recorded in the diagnosis and treatment layer is as follows:

hash(診療層記錄)=hash( γ ),其 屬於該診療層記錄之醫事文件層記錄的識別碼,及 章的連/值^如’Y:第1份醫事文件層記錄的識別碼^ :一(弟!份醫事文件層記錄)丨丨第 • 取後一份醫事文件層記錄的識別碼丨丨hash (diagnosis and treatment layer record) = hash (γ), which belongs to the identification code of the medical file layer record of the diagnosis and treatment layer record, and the link / value of the chapter ^ such as' Y: the identification code of the first medical file layer record ^: First (brother! A copy of the medical file record) 丨 丨 Section • The identification code of the next record of the medical file 丨 丨

signature(最後—份醫事文件層記 I 診療層記錄中的第n份醫事文件:二广代表该 又仵層。己錄的編唬:此例中同時 具有表不该記錄為最後一份成員記錄之意。 為請參閱第六圖。在病人層記錄中所儲存的内容 構就診的完整病歷資料,按照本發 (6 疋乂屬於该病人層記錄的醫事文件層記錄 \杉療層記錄(601)和(6〇1 υ所組成,因此,當計算 ::層。己錄之檢查碼如標號(604) ’需將從屬的每-醫事文 之識別碼連結其簽章值及每一診療層記錄之識別 碼^其簽章值後,連結成—暫存記錄⑽3),再以此暫存 向赫序函數的運算,獲得以代表該份病人層記 儲广摘要’亚以秘密金输對其進行運算求得保護封條, ^ 病歷資料庫中’做為檢驗及保護該位病患的電子 丙』之凡整性及正確性的依據( 604 )。其中,上述足以代表 27 200535746 病人層記錄之訊息摘要的表示式亦可表示如下: h a s h (病人層^ σ己錄)=h a s h ( S ),其中,S代表所有從 屬方、”亥病^層§己錄之病患資料記錄及診療層記錄的識別碼 及/、數位双早的連結值,例如,第1份醫事文件層記錄的識 別碼」丨Slgnature(第1份醫事文件層記錄)| |第1份診 療二己錄的識別碼丨丨(第1份診療層記錄)丨i第 /療層屺錄的識別碼I丨signature(第2份診療層記錄 11 ••丨丨最後一份診療層記錄的識別碼| | signature(最 後一份診療層記錄)。signature (Last-the first medical document layer record I The nth medical document in the diagnosis and treatment layer record: Erguang represents the second layer. Edited record: In this example, there is also a record indicating that the record should be the last member record In order to refer to the sixth figure, the content stored in the patient layer record constitutes the complete medical records of the visit. According to this post (6 的 The medical file layer record of the patient layer record \ fir therapy layer record (601 ) And (6〇1 υ), therefore, when calculating the :: layer. The recorded check code, such as the label (604), needs to be linked to its signature value and each diagnosis and treatment layer. The identification code of the record ^ its signature value is linked into-temporary storage record 3), and then the temporary storage operation to the Hertzian function is obtained to represent the patient's record of the Guangxi Abstract 'Asia-Secret Gold Lost Pair It performs calculations to obtain protection seals. ^ The medical record database is used as the basis for the integrity and correctness of the electronic C test for this patient (604). Among them, the above is sufficient to represent 27 200535746 patient-level records. The expression of the message summary can also be expressed as follows hash (patient level ^ σ self-recorded) = hash (S), where S represents all the subordinate parties, the identification code of the patient data record and the diagnosis and treatment record recorded in the "Hei disease ^ layer §" and / or the digital double-early Link value, for example, the identification code of the first medical file layer record "丨 Slgnature (the first medical file layer record) | | The first diagnostic and treatment record record number 丨 丨 (the first medical record layer record) 丨i The identification code of the first / treatment layer record I 丨 signature (the second diagnosis layer record 11 •• 丨 丨 the identification code of the last diagnosis layer record | | signature (the last diagnosis layer record).

另外’須加以說明的是,由第三圖及第四圖所 整電子病歷檢查碼運算的說明,Η使用成員記錄檢: 碼產生複合式電子病歷記錄檢查碼的方法。由第五 六圖所組成的檢查碼運算說明,則是使用成員記錄之暫 檢查碼,產生複合式電子病歷記錄檢查碼的一個例子,;、 使用相似的概念類推出其他可行的檢查碼運作方法。、 6 ·病歷圮錄之操作的完整性及正確性維護處理流程 —如第七圖所示,用於說明創造一位病患之初始 的貝她概程。此程序於病患初次就診時被啟始,貞責理 心掛唬業務的醫護人員會操作系統完成整個流程,在(㈧ 的二驟,糸統將建立一份用於儲存病患基本資料的醫事文件 層。己錄,此一記錄將直屬於該病患的病人層記錄。 在(710)的步驟,醫事人員將病患提供的個人基本資訊 輸不、、先,元成此一流耘所需的外部資訊之輸入,作為前一 步騍產生之醫事文件層記錄的内容。接著,在標號()的 y ^由fe護人員下達储存此記錄的命令,便正式開啟整個 28 200535746 產生記錄識別碼及真確性檢查 真確性維護必經之流程 碼。 在(7 3 0 )的步驟,系統自動參昭 内之病歷記錄的識別碼,為此次新增之^存於資料庫 效的循序號碼,作為該病M㈣ ^4δ案建立一個有 是任何有序且唯—的號碼,通常.最=作㈡㈣碼可以 病歷號碼。 的作法是採用病患的 在( 740 )的步驟,系統將依照 姦座招曰丨丨^ , Γ, 席械構所製訂之識別碼 規則,為此诸事文件層記錄建立一 电的、法麻口着ζ【、由α , 個有序號碼,並將病 心的病歷唬碼連結前述有序號碼 墦別满·今、十、+駿古 卞為该面事文件層記錄的 識別碼,刖述之醫事文件層記錄的 一的牯枓,ra +么 斤號馬並不品要具備唯 都可以重:用儲存的每—位病患之病歷記錄間, 都可以重覆使用這些號碼,這是因 丁 的病歷號碼成為識別碼後別二 唬碼連結病患 統所需的唯一性。 識別瑪便可為該記錄提供系 在(750)的步驟,系統自動以唯—的秘 進行保護封條運算,由於目前 〇餘對该§己錄 件層記錄存在,因此對直一 ’’彔内僅有此-醫事文 於已對整份病歷記錄進行真確性的維護。在寻 两一步驟獲得的㈣封條將附加 (755 )的步“, 該記錄的真確性檢查碼。西事文件層記錄中,作為 製- ^ =護^=存\於Μ的理由(75G),系統可直接複 建立及儲存—份斬 在(77〇)的步驟,完成整個 :~新的電子病歷記錄的工作。 總' 結前文,在對醫言 i 鑰對記錄進行保護封條 二己錄使用醫療機構的系統金 運π,而不以醫護人員私鑰對記錄進 29 200535746 -行簽章運的理由如前一章中所述… 案的職務非由固定人員負責,而I 疋口為建立新病歷檔 鑰,若確實有簽章需求,ϋ 用某—醫護人員之私 式進行。 …知使用固定之職務金輪的方 屬於西事文件層記錄的有序號碼, 則’自動為該醫事文件層記錄建立 -系統依照循序原 其與病歷號碼所組成的識別碼 二文件層記錄序號, 之關連外,還可確保任— δβ別纪錄及建立記錄間 1圮錄在整體檔案 另外,在( 770)的步驟中,〃 ' 性。 應使用將病患之全部醫事岸曰己錄的檢查碼,原本 記錄’並對該記錄進行摘要值運算值^為暫存 取得,但由於創造新病歷檔案時,初始的::瘦封條的方式 有病人基本資料一項,而與醫 、西文件層記錄僅 因此,以直接複f - <八& > ^ ^ 5己錄之檢查碼相同, 文吸衣伤的方式說明。 河文中’對醫事文件層記錄使用 記錄進行保護封停運嘗, ,、歲構的不統金鑰對 章運的理由,是因為建新 明對屺錄進行簽 責,而無法使用某一醫讀人昌 口疋人貝負 或可改採使用固定之科菸人 、有戏早舄求, 疋乏職務金鑰的方式進行。 而屬於醫事文件層記錄的有 θ ^ 則,為該醫事文件岸 〜μ疋乐統依照循序原 T入1干層,己錄建立的醫 病歷號妈所組成的,^ 、%序號,,、與 連外,還可確保任一己錄在敕〜 逯立圮錄間之關 (760 )的步驟中,、忘人厣々技 庄另外,在 病層錄的檢查碼,原本庫使用將在 患之全部醫事文侏层々棘认▲ 令應便用將病 牛層δ己錄的矾息摘要連結並管 再求得保護封條值的方法,雜… # Λ息摘要 ' ^又件病人層記錄的檢杳石g,仞士 於創造新病歷時,初 # 杈查碼,但由 始的西事文件層記錄僅有病人基本資料 30 200535746 -一項,而與醫事文件層記錄之檢查碼相同,因此,以直接複 製一份的方式說明。 增加病歷内容是電子病歷系統中隶常被使用的功能,這 也意味著它是最可能破壞真確性的行為,必須保證這項操作 能確實維護病歷檔案原先已具有的真確性。 在本發明的方法中,醫師進行增加病歷内容的操作時, 僅需新增一份醫事文件層記錄,將病歷内容記載於記錄中, 並決定該記錄是否需要歸屬於某一診療層記錄,同時由系統 ,建立該記錄的識別碼記載於記錄中,再由醫師對該醫事文件 層記錄進行簽章並儲存於系統,即完成一次看診的活動。 其中,建立識別碼的方法,將依照醫師對該記錄是否歸 屬於某一診療層而有所不同;當醫師決定該醫事文件層記錄 應歸屬於特定診療層時,其識別碼應為病患的病歷號碼連結 4寸疋"乡療層的有序號碼,再連結新增加之醫事文件層記錄的 有序就碼’若醫師決定該醫事文件層記錄不需歸屬任一診療 曰則其識別碼為病患的病歷號碼連結新增之醫事文件層記 錄的有岸缺m 0 、b ’、、、P可。文件層記錄不需歸屬任一診療層,則其 別碼为^g ,、、'病心的病歷號碼連結醫事文件層記錄的有序號碼 方法中由診療醫師啟始並完成’以下介紹各種可行實施 師需為某1^例’請參閱第八圖。在(80G)的步驟,當醫 生-份醫事I:增加一次診斷内容時,僅需使用系統指令產 (81°)的步驟,醫層師=新並用於?,該次診斷之内容。在 診療應記載的内容,這4b内::::層記錄撰寫該次 事文件層文侏 奋即為整份病患病歷中的一份醫 ,至於該文件是否合從屈於f 上入由 則由醫師於診療完成後自行決定:“…移療層記錄’ 31 200535746 在(8 2 0 )的步驟,由於醫師已士 可選擇將該記錄存檔。在 "病歷記錄的撰寫,便 程,便由醫師決定是否將此一駿的步驟,由於已完成診療過 層記錄中。在(830 )的步鲈士酉事文件層記錄歸入某-診療 記錄歸屬於診療層記錄, 、疋將该诸事文件層 歸入本次的診療層記錄。 的V知,則系統將該記錄 杜184¾J的步驟,系去 療層記錄之序號,再連結將病患的病歷號碼連結該診 號碼,建立醫事文件層於5亥醫事文件層記錄的有序 系統即以醫師私餘對該記二的唯二序號。在(_)的步驟, 記錄的真確性檢杳碼。2^ 算章值作為該 及錯存病歷記錄的—動作後進入(870 )步驟’完成整個增加 若在(830 )時,醫師選擇不將 療層,則在(850 )步驟中,4 Μ ώ _文件層兄錄歸入診 ' 乐統自動為与"# β + 4 序號碼,並以歷號碼連結 I錢病建立—個有 的識別碼。在( 860 )的步驟,系 牛層冗錄 行簽章運算,以簽章值 ’:、 西币私鑰對該記錄進 乍為5亥s己錄的直禮性於杏 入(870)步驟,完成整個增 厂 一馬。表後進 A g ㈢加及儲存病歷記錄的動作。 h師需取回一位病患的病歷檔案時,可 將元整病歷檔案所包含纟 “、、病歷唬碼 錄取回,也可依”7:二 記錄及醫事文件層記 * 4將特定的病歷資料取回。因*本干 回某一診療層的内容時,虽而 療層記錄的有序號碼,並將所有1二乂’广:歷#…及診 號的醫事文…纤取口所有具相同病歷號碼及診療層序 内容的目=醫=即可達成取回特定診療層記錄之 曰的右m師需芩考與某一醫事文件厣印綠曰 的病歷資料,也^ f 0 a 、彔具有關連 案中的特定資地由該記錄之識別碼獲取病歷檐 32 200535746 ’以下,請參閲第九圖所示。在本發明 中,當醫師需杳詢$ s $ 、 個實施$ 讲h _ —。旬病患的某些病歷記錄,則在(n 例 ,系、、先可經由讀取痛率Θ )的步 錄,亚在(90 5 )的步驟,斟兮产 叮百相付的記 右檢驗結果不正確, —馬進仃檢驗, 選入I y 5 〇)的步驟,亩垃 理者並重新檢驗备 i知系續总 杈鲂糸統中其他相關予、、先官 確’則進入(91〇)的步驟,由九右“結果正 些相關限制條件。 0療酉甲決疋是否將附力“ 若醫師決定不附加限制條件 使用相同病歷號碼作為主要 :(920 )的步顿,將 及醫事文件層記錄,全數 進入(925)的牛驟數列出右醫師欲附加限制條件, 或科別,將相Λ按照醫師所指示的限制條件,卜 記錄。 # °己錄列出,供診療醫師選擇欲檢閱曰期 巧病歷 事文件芦1 )的步驟’系統接著對符合醫師需東 文件層§己錄進行檢驗,若士果未的每—醫 ^ 由糸統通知管理者並重新於珍;t+ 人(95〇 ) 錄,找出哪些記 新仏驗其他相關的病 則進入(94(n 杈核的更改;若檢驗結果τ , )的步驟,讓系統進一 +縣基一< 正確, 步驟,由J 驗結果若不正確,亦需進入(:進 由糸統必須通知管理去 (9 5 〇 )的 錄,找出哪β 者並重新檢驗其他相關& 的 找出哪些記錄遭到未經 關的病歷記 則進入㈠…#步驟% Γ 若檢驗結果正確 檢閱,在ζ 97fn ,、不所^擇的病歷記錄内容 仕(970 )的步驟,由殷 么供醫細 便進入(98(n沾止 w巾砥擇欲檢閱的病歷$ 币 v 980 )的步驟,顯+々々人 5己錄後, g] XL ”、、、’、付5的病歷記錄内容 U K,本發明可提供嫛細古4 1谷。 記錄的能力,# "有效率地查閱任一部份 % ^,亚且具有依特定兩 1知之病歷 寸疋而求獍取病歷記錄的彈性。此 200535746 如第十圖所示,係一流殆同 二 ▽加、. .圖’說明醫師補充病歷内容不 足部份的處理流程。在一般的 ’ 1 5己錄撰寫過程中,需對病 歷内容進行增補動作的情況幾手 ^ ^ , 戏十不胃發生,但仍需設計〆完 吾的機制以預防性地達成所有 ._ 令了此遇到的完整性及正確性 保護問題,例如,讓診療嫛倉 ^ 表7 ^ W師在病患的X光片檔案中加入註 亚且,應僅有診療醫師具備啟始此程序之權限。 在(1_)的步驟,首先由診㈣師輸人病患的病歷號瑪 ^ 0005)^^ , :,將所有以此病歷號碼作為主要識別碼的病歷記錄列出。 (0 1 0 )的步驟’西師便選出欲補充内容之醫事文件層記 錄,對其進行資料補充的動作,然而,首Μ對病歷記錄進 仃真確性檢查碼的驗證,在步驟(1G15)中,系統為雄認該記 錄之真確性疋否受到保護,以重新計算該醫事文件層記錄之 Λ息摘要,亚以比對重新計算的訊息摘要是否符合存於記錄 中之Λ心摘要的方式,檢驗該記錄之真確性是否受到維護。 在(1 0 2 0 )的步驟,若檢驗結果不正確,則進入(1 〇 2 $ )的 =驟,由系統主動通知管理者所存病歷記錄之真確性遭到破 壞,並重新檢驗其他相關的病歷記錄,找出哪些記錄受到未 、二授權的更改。在(1 〇 2 0 )的步驟,若檢驗結果正確,則進入 )勺V 由糸統建立一份新的醫事文件層記錄,該記 錄用方;儲存欲補充之病歷資料。在(1 〇 3 5)的步驟,醫師使用 丽一步驟產生之醫事文件層記錄,撰寫需加以補充或註記的 内谷在70成補充資訊之撰寫後,即進入(1 0 4 0 )的步驟,由 "币下達儲存该記錄的指令,將系統操作權歸還補充病歷内 谷的私序’接著完成後續的流程。 34 200535746 •在(1關的步驟,“將原欲補充資訊之f事文件層記 錄的訊息摘要複製一份,附加到儲存補充資訊的醫事文:層 記錄中,如此施行可為用於俾左 曰 1储存補充貢訊的新增病歷記錄, 與原始欲補充資訊的病歷記錄 ^ ;乏間建立關連,由於新增之補 充資訊的病歷記錄是原欲補充資訊的病歷記錄之附屬記 錄’而且此一補充資訊的病厨 炳I 5己錄不能取代原始病歷記錄; 原始病歷記錄必須未遭受到任何更改。 在0050)的步驟’“應依照原欲補充資訊之醫事文件 ,層補的有序號碼’循序建立此用於存放補充記錄 Γ層記錄的有序號碼,因此,該儲存補充資訊的醫事文件層 。己錄之識別碼,即依原欲補充資訊 序產4 y- / -, n r r Λ ΛΑ ^ 、 /止δ己錄之識別碼,循 卜在(」〇55)的步驟,便可對儲存補充資訊之醫事文件 运圯錄的内容進行訊息摘要的運算 之殷塞々A Μ巧拉从 以已附加原欲補充資訊 入西事文件^制訊息摘要的完整記錄作為運算時的輸 在(1〇6。)的步驟,再以醫師私餘對前 摘要進行簽章運算,以維# 又亍〇 Λ心 驟,將计管而…” 確性。在(1 0 65 )的步 :“而付的醫師簽章附加在該記錄之後,以此一簽章 值做為該記錄的真確性檢查碼。 β在(urn)的步驟,判斷該記錄是否屬 疋,則進入U 075 )的步驟,使用醫師的欠立 右 增加儲存補充資訊之醫事文件層㈣^入早私鑰,重新計算 簽章值…古” 錄的診療層記錄之醫師 記錄的識別瑪與訊息摘要連結為一份-文件層 _殷重 曰存纟己錄,或者僅將每 w 錄的訊息摘要連結為暫存記錄,再對此記錄 35 200535746 -進行單向赫序函數運算,並以診療醫 u 要進行簽章運算。再於(1 080 )的步驟,=私输對訊息摘 存於系統儲存處的原始簽章值,即— &侍的簽章值取代 接著需再對病人層記錄進行真確性:護::層記錄之更新。 在( 1 085 )的步驟,由於先前已更新 此需重新計算病人層記錄的保護封條人層記錄’因 該病人層記錄之每—醫事文件 ^ ^亦為將屬於 摘要,並循序連結每-診療層記錄之碼連結其訊息 為一份暫存記錄,或者,僅將每—…凡息摘要,成 要,循序連結每—診療 ^文件層記錄的訊息摘 對此記錄進行單向赫= 為-暫存記錄,再 對訊息摘要進行保護封條運算,即療機構的秘密金鍮 人層記錄的真確性檢查碼。 侍保濩封條作為該病 在(1 0 9 0 )的步驟,取代存於 的儲存工作。 取正個補充病歷記錄之資訊 若在(1G70)的步驟,判斷該記錄不屬 — 錄,則直接進入(1 〇85)的步驟,重 / /、 0 ;'、曰 之醫事文件層記錄的病人層記錄3=力,存補充資訊 所述。在( 1 0 9 0 )的步驟,以前一步驟 ” 2异方式如則 存於系統儲存處的原始保護封停;;:的保諼封條’取代 完成整個補充病歷記錄之資二聰)的步雜, 充資:::ΐΠν口一份新醫事文件層記錄以儲存補 的方法外’运可使用在原始記錄中附加補充資訊的方 36 200535746 .式達成,附加時可以直接在欲補充的广厂 矾增加到原始記錄中已預留的資料; 錄内’將補充資 在建立電子病歷系統時即為 '存欄位内’因此’必須 的儲存欄位’使儲存設備中增加許'型的病歷記錄預留額外 便會造成系統額外的負荷。 *夕不必存在的空值攔位, 另外,還可以利用將補充 式達成,亦即,將原始設計中並非附加人至該病歷記錄中的方 —醫事文件層,視為一份複谩口式文件的最底層級 I級記錄的架構,而具有增加成;;::,變成可新增第四層 屬於第四層級的成員記錄,將補充:;能,便可建立-份 充病歷内容不足之部份的功能。"存入該文件,達成補 在計算新增之第四層級 錄已產生,新增的補充資訊之記錄:::時’由於其上層記 錄,為將此-新增加的記錄納入玲療#不可以更動原始記 二級記錄之内容連結其上層記錄的訊將該第四 雜“己錄的訊息摘要,並以診療醫: 计异_個屬於 h又得的簽章值作為此_記錄的檢查/早私續進行運算,以 若該需補充資訊的記錄屬— 新診療層記錄之檢查碼 :、0療層記錄’則接著更 四層級記錄之訊息摘要,血該二疋將先前計算獲得的第 訊息摘要連結成-暫存 ;曰§己錄内所有成員文件的 數運算,以醫師的簽章私餘靜=存記錄進行單向赫序函 新的數位發章值’以此簽章值取代原存於t:…到-即完成診療層記錄之檢查碼的更新。 系統之簽章值’ 37 200535746 接著再更新病人 診療層記錄之訊息c檢查碼;將屬於該病人的每— 赫序函數運算,—暫存記錄,並對其進行 函數進行保護封條^療機構的秘密金”獲得的單向赫序 的保護封條,即:M產生的保護封條取代原存於 充資訊的記錚I ^迻個補充資訊的操作。當麸,:、、、 杳碼的更卒 屬於―病人層,則直接進行病:广需補 發明提出之病歷醫療機構亦可依照需求,‘ 級,以符合使用或管=所具有的層級數擴增為更多層 雖然補充病歷+ -彈性功能,以使;=容並非常態事件’但仍需提供此 的需求,農中,=師可在符合規定的情況下完成補充“ 須對補充資气進:須二合的規定即為不可變更原#記錄並i 則,亦不允二:7^參照現行電子病歷系統的實施ί 須 L子铋之病歷貢料進行任何修改行為,、 谁/…子取權限上進行控管,以不提供任何對已存4而 广丁修改之功能的方式達成;本發明所設計的方法,=歷 币具有補充相關資訊的彈性,讓醫師具有可針對需進“:共% 的部份增加說明文字的功能,且亦未提供刪改原始病:呪明 之任-部份内容的功能。 歷, 因此’醫師若需補充病歷資料,只能在新增的醫 中拮 爭文件 τ具入更新的資料,並需將原欲補充的醫事文件層記 自插Φ L '求之訊 Μ调要納入本次的簽章運算,對其更動内容的行為負責,一 ^原始資料並未遭到修改;另外,此一補充的功能,應卷 终在最新產生的病歷資料中進行,這是由於讓醫師具有修 改過去病歷的能力是不合理的設計,因此可在系統中 " 曰力ϋ限 38 200535746 制條件’防止此類狀況的發生 虽然’ k•樣的機制仍無法防止立 _ ^ ^ T w地補充不正當的資 说,但畜Μ發生時,原始病歷資料的貝 補後的資訊及醫師簽章仍可由病歷胃:早轉增 釐清責任。 ”中取停,而旎正確地 西繫機稱的糸統管理者在一般的 對病歷系統中全部的病歷記錄 “ ’通常會需要針In addition, it must be explained that the description of the calculation of the electronic medical record check code as shown in the third and fourth figures, and the method of generating a composite electronic medical record check code using the member record check code. The description of the check code operation composed of the 56th figure is an example of using the temporary check code of the member record to generate a composite electronic medical record check code; and using other similar concepts to introduce other feasible check code operation methods . 6. The process of maintaining the completeness and correctness of the operation of the medical record record—as shown in the seventh figure, it is used to explain the initial Beta process of creating a patient. This procedure is started when the patient first visits. The medical staff responsible for the care-giving business will operate the system to complete the whole process. In the second step, the system will establish a Medical document layer. Recorded, this record will directly belong to the patient layer record of the patient. At step (710), the medical staff will not enter the personal basic information provided by the patient. The input of the required external information is used as the content of the medical document layer record generated in the previous step. Then, at the y ^ of the symbol (), the order for storing this record is issued by the nursing staff, and the entire 28 200535746 is generated to generate the record identification code. And the process code that must be followed for authenticity maintenance. At step (7 30), the system automatically refers to the identification code of the medical record in Zhaozhao, which is the new serial number that is stored in the database. As the case of the disease M㈣ ^ 4δ, a number with any order and uniqueness is usually established. Usually, the maximum number can be used as the medical record number. The method is to use the patient's step (740), and the system will follow Said 丨 丨 ^, Γ, the identification code rules formulated by Xi Jigou. For this purpose, a layer of electrical, numeral and zeta [, α, an orderly number, and an orderly number of the patient's medical records were established for the file layer records. The bluff code is connected to the aforementioned sequential number. Do not be full. This, ten, + Jun Gu 卞 is the identification code recorded on the document level of the interview, and one of the records recorded on the medical document level is described. If you have a bad product, you can have it all: you can use these numbers repeatedly in each patient's medical record stored. This is because Ding ’s medical record number becomes an identification code and you do n’t need to connect it to the patient system. The uniqueness of the identification is required. The step of (750) is provided for the record, and the system automatically performs the protection seal operation based on the secret. Since more than 0 records of this § have been recorded, the There is only this one in the 彔-the medical affairs document has already maintained the authenticity of the entire medical record. The seal obtained in the two-step search will be appended with the step (755), the authenticity check code of the record. In the records of western affairs, as the system-^ = 护 ^ = 存 \ 于 M 的From (75G), the system can directly re-create and store-the steps cut in (77〇), complete the whole: ~ new electronic medical record records. In conclusion, the record is protected by the medical key i key. The seal II has recorded the use of the medical institution's system for transporting money, rather than using the private key of the medical staff to enter the record. 29 200535746-The reason for signing the seal is as described in the previous chapter ... The position of the case is not the responsibility of the fixed personnel, and I Ichiguchi is to establish a new medical record key. If there is a need for a signature, I will use a private type of medical staff.… I know that the party who uses a fixed job golden wheel belongs to the order number recorded in the western affairs file layer, then ' Automatically establish records for the medical file layer-the system follows the identification number composed of the medical record number and the second file layer record serial number in sequence, which can also ensure that any-δβ individual records and the establishment of the record room 1 recorded in the overall file In addition, in the step (770), 〃 'sex. The check code that records all the medical records of the patient should be used. The original record 'and the summary value calculation value of the record ^ is obtained temporarily. However, when creating a new medical record file, the initial :: thin seal method There is one item of basic patient information, and the records of the medical and western files are only for this reason, and it is explained by f-< & & > ^ ^ 5 The recorded check code is the same, and the method is described in the following. He Wenzhong 'protects the use of medical records at the file level to protect the use of records, and the reason why the unstructured key of the year-old structure of Zhang Yun is against Zhang Yun is because Jian Xinming signed the record, and cannot use a medical record. Renchangkou can be carried out in a manner that can be changed to use a fixed smoker, have early drama, and lack a job key. The medical records that belong to the medical file layer have θ ^, which is composed of the medical records of the medical records created by the recorded medical records of the medical records of the medical records of the medical records ~ μ 疋 music system in accordance with the original order, ^,% ,,,, In addition, you can also ensure that any one that has been recorded in the step (760) of 敕 ~ 逯 立 间, 忘 人 厣 々 技 庄 In addition, the check code recorded in the disease layer will be used in the original database. Recognition of the juvenile stratum in medical affairs ▲ Ling Ying should use the method of linking the δ digest recorded in the diseased cow stratum δ and record the protection seal value. Miscellaneous ... # Λ 息 Abstract '^ Another patient level record inspection杳 石 g, when the scholar created a new medical history, the first # check the code, but the original western file layer records only the patient's basic data 30 200535746-one item, and the same check code as the medical file layer record, so , Described as a direct copy. Increasing the content of medical records is a commonly used function in electronic medical record systems, which also means that it is the most likely behavior that undermines authenticity. It must be ensured that this operation can truly maintain the authenticity of the medical records. In the method of the present invention, when the physician performs the operation of adding the medical record content, only a new medical file layer record needs to be added, the medical record content is recorded in the record, and whether the record needs to belong to a certain medical record, and at the same time, The identification code of the record created by the system is recorded in the record, and then the physician signs the medical document layer record and stores it in the system, which completes a visit. Among them, the method of establishing the identification code will vary according to whether the record belongs to a certain diagnosis and treatment layer; when the physician decides that the medical file layer record should belong to a specific diagnosis and treatment layer, the identification code should be the patient's The medical record number is linked to the order number of the 4-inch 疋 " rural treatment layer, and then to the orderly code of the newly added medical file layer record. If the doctor decides that the medical file layer record does not need to belong to any medical treatment, its identification code There is a missing m 0, b ′,, and P may be added to the medical file layer record for the patient's medical record number link. The file-level records do not need to belong to any of the diagnosis and treatment layers, and their other codes are ^ g ,,,, 'The order number of the sick patient's medical record number linked to the medical file layer order is started and completed by the clinician' The following introduces various possibilities The implementer must refer to an example. Please refer to Figure 8. In the step (80G), when the doctor-copy medical affairs I: add a diagnosis content, only the step of system instruction production (81 °) is needed, the medical division = new and used for?, The content of the diagnosis. In the content that should be recorded in the diagnosis and treatment, within this 4b :::: layer record, write this event file, and the layer text is a doctor in the entire patient's medical history. As to whether the file conforms to f Then the physician decides after the diagnosis and treatment is completed: "... Transfer layer records' 31 200535746 Step (8 2 0), because the physician can choose to archive the record. In the writing of the medical record, the routine, It is up to the physician to decide whether to take this step, because the diagnosis and treatment has been completed in the record. The step record in (830) is classified into a certain record-the diagnosis and treatment record belongs to the diagnosis and treatment record. The file layer of all things is included in the record of the diagnosis and treatment layer. If the V is known, the system will follow the steps of 184¾J to the serial number of the treatment layer record, and then link the patient's medical record number to the diagnosis number to establish the medical affairs. The orderly system recorded in the file layer at the medical file layer of the 5th Haiyi Medical Center is the unique serial number of the recorder 2 in the physician's private space. At step (_), the recorded authenticity check code. 2 ^ The value of the chapter is used as the sum Misstored medical records-enter (870) step after action ' The whole increase is if the doctor chooses not to treat the treatment layer at (830), then in the step (850), the 4M _ file layer brother records are admitted to the doctor 'Le Tong is automatically assigned with "# β + 4 sequence number And establish a unique identification code by linking the I number with the calendar number. In step (860), the signature calculation is performed by the cattle record, and the record value is entered into the record using the private value of the currency: The straightforwardness of the record for the 5th Hais is in the step of apricot entry (870), which completes the whole increase of one plant. After the table, the operation of adding A g to add and storing the medical record is required. The teacher needs to retrieve a patient's medical record file. At that time, you can retrieve the medical records contained in the Yuanzheng medical record file, and you can also retrieve the specific medical record data according to "7: 2 records and medical file layer records. When the contents of the diagnosis and treatment layer, the order number recorded by the treatment layer, and all the medical records of the 12: '# :: = 医 = You can get back the records of a specific diagnosis and treatment department. The right teacher needs to take a test and a medical document to print the medical record of Lu Yue. Also, ^ f 0 a, you have the specific information in the related case to obtain the medical record eaves from the identification code of the record 32 200535746 'Below, please refer to the ninth figure. In the present invention, when the physician needs to consult $ s $, implementation $ speak h _ —. Some patients' medical records of Xuan patients are recorded in the steps of (n cases, department, and firstly by reading the pain rate Θ), and in the step of (90 5) The result of the right test is incorrect. —Ma Jinzheng ’s test, selected in the step of I y 5 0), the manager and re-inspect the system to continue the system. Other related Yu, and Xianguan indeed 'then enter the step of (91), from the nine right "results are some related restrictions. 0 Healing Acupuncture Decided whether to attach the force "If the doctor decides to use the same medical record number as the main without additional restrictions: Budden (920), will be recorded with the medical file layer, all listed in the number of cattle in (925) The right doctor wants to attach restrictions, or subjects, and records the phase Λ according to the restrictions indicated by the doctor. # ° Records are listed for the clinician to choose the steps to review the date and time medical history file (1). The system then verifies the records that meet the doctor's requirements. The records of the doctor's records have been verified. If the doctors are not satisfied, the doctors will be notified to the administrator and re-yuzhen; t + person (95) records to find out which records are new. For other related diseases, enter the step of (94 (n branch nuclear change; if the test result τ,)), let the system enter + + county-based &correct; steps, if the J test result is not correct, you also need to enter (: The system must notify the management (9 5 0) of the record, find out which β and re-examine other related & find out which records have been unregistered medical records then enter ㈠ ... # 步 % Γ If The inspection results are correctly reviewed. At ζ 97fn, The selected medical record (970) steps are carefully entered by Yin Mo for medical treatment (98 (n), select the medical records to be reviewed for $ Coins v 980), and +5 After recording, g] XL ”,,,,,, and 5 of the medical record content UK, the present invention can provide a detailed description of the ancient valley of 41. The ability to record, # " Efficiently check any part% ^, It also has the flexibility to obtain medical records according to the specific medical records of the two known medical records. This 200535746 is shown in the tenth figure, which is the same as the second one. Plus,... Process flow. In the general writing process of '1 5 Jilu, it is necessary to add supplementary actions to the contents of the medical record ^ ^, the drama is not happening, but it is still necessary to design the mechanism to complete all of the preventive. _ The integrity and correctness protection problems encountered here, for example, let the diagnosis and treatment 嫛 warehouse ^ Table 7 ^ Teacher W added Zhuya in the patient's X-ray film file, and only the physician should have The authority of the procedure. In step (1_), the patient's medical record number is first entered by the clinician. ^ 0005) ^^,: List all the medical records with the medical record number as the main identification code. (0 1 0) Step 'The West Teacher selects the medical file layer records to be supplemented and supplements the data. However, the first step is to verify the authenticity check code of the medical record. In step (1G15), the system confirms whether the record is authentic or not, so as to recalculate the Λ of the medical file layer record. The information digest is used to check whether the recalculated message digest matches the Λ heart abstract stored in the record and to check whether the authenticity of the record is maintained. In the step (1 0 2 0), if the test result is incorrect, enter the step of (1 0 2 $), and the system actively informs the manager that the authenticity of the medical record is damaged, and re-examine other related Medical records to find out which records have been altered without authorization. In the step (1020), if the test result is correct, then enter) spoon V to establish a new medical file layer record, the record user; store the medical history data to be supplemented. In step (105), the physician uses the medical document layer record generated by Liyi step to write the inner valley that needs to be supplemented or annotated. After writing 70% of the supplementary information, he enters the step (1 0 4 0). "The coin issued an instruction to store the record, and returned the system operation right to supplement the private order in the medical record ', and then completed the subsequent process. 34 200535746 • In step (1), "Copy the message summary of the original document to be supplemented with the information of the document layer, and attach it to the medical article storing the supplementary information: layer record. "1" stores the newly added medical records of supplementary tribute, which is related to the original medical records of the information to be added ^; the lack of relationship is established, because the added medical records of the supplementary information are supplementary records of the medical records of the original information to be supplemented "and this A supplementary information of the medical chef Bing I 5 can not replace the original medical record; the original medical record must not have been subjected to any changes. At 0050) step '"should be in accordance with the original medical documents to be supplemented with an orderly number 'Sequentially establish this order number for storing the supplementary record Γ layer records, so the medical file layer storing supplementary information. The recorded identification code, that is, the sequence of 4 y- /-, nrr Λ ΛΑ ^, / stop δ recorded recorded code according to the original supplementary information, can be added to the storage by following the steps in ("〇55). The content of the medical document operation information of the information to perform the calculation of the message digestion. A M Qola pulls the complete record of the message digest with the original information to be added to the Western Affairs document as the input during the calculation (1〇 6.) step, and then perform the signature calculation on the previous abstract with the doctor's private space, and dimension # and 亍 〇Λ heart step, will be counted and ... "The accuracy. In the step (1 0 65):" and pay The physician's signature is appended to the record, and the value of the signature is used as the authenticity check code of the record. β In the step (urn), to determine whether the record is 疋, enter the step of U 075), use the physician's default to increase the medical file layer that stores supplementary information 入 ^ enter the early private key, and recalculate the signature value ... The identification of the doctor's record in the diagnosis and treatment layer record of the ancient ”record is linked to a message summary-file layer _ Yin Zhongyue Cun Jiji, or only the message summary of each w record is linked to a temporary record, and then this Record 35 200535746-Perform a one-way Hertzian function operation, and perform a signature calculation with the clinician u. Then in the step (1 080), = the original signature value of the message extracted from the system storage by private input, that is, — The & seal value replaces the authenticity of the patient-level record and then the update of the patient-level record is required. At step (1 085), the protection seal of the patient-level record needs to be recalculated because it has been previously updated. Personnel records' because each patient-level medical record of the patient-level record ^ ^ will also be a summary and sequentially link the code of each-diagnosis-level record to its message as a temporary record, or, only each ... Information summary Each—diagnosis and treatment ^ The information recorded in the file layer is one-way. This record is temporarily stored, and then the message digest is protected by a seal operation, that is, the authenticity check code of the secret institution's record of the treatment institution. The security seal is used as the step of the disease in (1 0 0 9) instead of the stored work. If the information of the supplementary medical record is taken in the step of (1G70), it is judged that the record does not belong to the record, then directly enter Step (1 085), repeat // //, 0; ', the patient layer record of the medical file layer record 3 = force, store supplementary information as described. In the step (1 0 0 9), the previous step " 2 The original protection is stored in the system storage in a different way; the security seal ': replaces the complete supplementary medical record of Er Cong), and replenishes: ::: a new medical document You can use the method of adding supplementary information to the original record in addition to the method of storing supplementary records. You can use the method to add supplementary information to the original record. Within 'will be supplemented by funds under construction When the electronic medical record system is established, it is 'inside the storage field', so 'required storage field' will add extra 'type' medical records to the storage device, which will cause additional system load. * Even if there is no need for a null value stop, in addition, it can also be achieved by using the supplementary formula, that is, the original design that does not add people to the medical record—the medical document layer, is regarded as a complex oral formula. The structure of the lowest-level I-level record of the file has an added value; ::, becomes a fourth-level member record that can be added to the fourth-level level, and will add :; Yes, you can create-a lack of sufficient medical records Part of the function. " Save this file to achieve the addition of a new fourth-level record in the calculation. A record of the additional supplementary information ::: 'is due to its upper-level record. In order to incorporate this-the newly added record into Ling He # The content of the secondary record of the original record must not be changed to link the information of the upper record with the summary of the fourth miscellaneous "recorded message. Check / continuously perform calculations early, if the record that needs additional information belongs to—the check code of the new diagnosis and treatment layer record: 0, the treatment layer record, then the message summary of the four-level record, and the blood will be obtained from the previous calculation. The summary of the first message is linked into-temporary storage; said § number calculation of all member files in the record, using the physician's signature private rest = save the record to perform a one-way Hexu letter to issue a new digital seal value 'to sign The value replaces the check code that was stored in t:… to-that is to complete the update of the check code of the diagnosis and treatment layer record. The system's signature value '37 200535746 Then updates the message c check code of the patient and diagnosis layer record; Ordinal function operations, — temporary storage records, And it performs the function of protecting the seal ^ the secret money of the treatment institution "to obtain the one-way hi-sequence protective seal, that is, the protective seal generated by M replaces the original information stored in the record I ^ move an additional information operation. When the bran,: ,,, and 杳 code belongs to the “patient level”, the disease is directly proceeded: the medical records provided by the widely needed supplementary invention can also be based on the needs of the 'level to meet the level of use or management = The number is expanded to more layers. Although supplementing the medical record +-elastic function so that; = content and non-normal events', but still need to provide this demand, farmers, = teachers can complete the supplement in accordance with the regulations "must be supplemented Into the gas: the requirement of the two combination is that the original record can not be changed and it is not allowed: 7 ^ Refer to the implementation of the current electronic medical record system. / ... control over sub-authorization authority, to achieve in a way that does not provide any function to modify the existing 4; Cantonese coins have the flexibility to supplement relevant information, allowing physicians to target The part that requires ": total%" adds the function of descriptive text, and it does not provide the function of deleting the original disease: Ren Mingzhi-part of the content. Therefore, if the physician needs to supplement the medical record information, he can only update the updated information in the newly added medical documents, and he needs to record the medical documents to be supplemented. Φ L To be included in this signature calculation, and responsible for their changes, the original data has not been modified; in addition, this supplementary function should be performed in the latest medical record data. This is because It is an unreasonable design to give doctors the ability to modify the medical records of the past, so it can be used in the system to "restrict the limits 38 200535746 conditions" to prevent such situations, although the "k • like mechanism still cannot prevent the establishment of _ ^ ^ In order to supplement the erroneous information, when the occurrence of the animal, the information after the supplementation of the original medical record data and the physician's signature can still be obtained from the medical record stomach: early conversion to clarify the responsibility. ", And the correct system manager of the Western System said in the general records of all the medical records in the medical record system

可能是經常性的操作,而最直接二::檢:,這類檢驗很 备一於广庶 > 处 ’執仃方式是對系統内 母伤病歷圮錄進行檢驗。由於本發日月 ‘ -^ ^ ^ ^ ^ 〜明所设計的方法使一份 ^止田木八有二層級架構,而能合於醫療機;^ Λ蘇俨安Μ 管理與操作,所以在 =機構對病歷播案的 =母:移療層記錄及該病患之病人層記錄,行的 抓可以第十一圖所示。 的於:(1_的步驟,由系統管理者下達檢驗所有病歷記錄 系統即按其所參照之病歷號碼依序對每一病患的電 病歷進行檢驗,即依病歷號碼將特^病患的全部病歷記錄 糸統中取回,一一進行檢驗。在(111 〇)的步驟,首先對已 ^ 位病患的病歷檔案内之每一醫事文件層記錄進 仃叙查碼的檢驗運算,檢驗的方法是對每一醫事文件層記錄 P新计异其訊息摘要,接著由系統取回對其進行簽章運算之 事事人員的公開金鑰,並以此公開金鑰還原系統所存之該醫 文件層記錄的簽章值,將獲得的訊息摘要與預先重新計算 白勺自 λ * 心_要值進行比對,斷判兩者是否相同。 ^ 右兩個訊息摘要相同,則重覆(π 1 0)步驟至該病患全部 事文件層圮錄的檢驗完成;當發現兩者不相同時,則進入 39 200535746 -⑴40)的步驟,由系統主動通知管理者進行後續的 理。 在(1 1 1 0)的步驟完成,並判斷該病歷檔案内每一較事 件層記錄之真確性均未遭到破壞,則執行⑴2G)的^,進 -步=病歷檔案内的每-診療層記錄進行檢驗,檢驗的方法 亦同前述’使㈣療醫師的公開切對其所負責的診療声進 打檢驗,若檢驗正確無誤,貝重覆⑴20)的步驟至完成該病 患全部之診療層記錄的檢驗。當發現檢驗結果不正確時 、⑴40 )的步驟’由系統通知管理者進行相關的處理。 在(U20)的步驟完成,且判斷該病歷 記錄之直破性的去、翁私丨分, V療層 人層㈣H 便進人(U3G)的步驟,進行病 "W —碼的檢驗運算,檢驗的方法是重新計算該病 人層記錄的訊息摘要,接 穷全岭其所具有之唯一的秘 ;封:值、’將1金餘還原系統所存之該病人層記錄的保 進行m的訊息摘要與預先重新計算的訊息摘要值 進仃比對,斷判兩者是否相同。 由系息摘要不相同時,則進入⑴4。)的步驟, 同,則緊接著/理者進行後續的相關處理;當判斷兩者相 檢驗工作,並重:下:位病患之病歷號碼進行相同流程程的 個檢驗工作。後至完成全部病歷記錄的檢驗,即可完成整 由於一位病φ Μ 事文侔展+ 〜的完整病歷檔案是以屬於該病患的全部 進行檢驗即可^士、、且成,原則上只要對每一醫事文件層記錄 無法確保各記病歷檔案的真確性維護,不過,這麼做仍 診療層記錄進Γ門原應具有的次序關連未遭破壞,因此,對 ”、~ ^ 還把具有維遵该診療層内每一從屬記 40 200535746 •錄間的次序,及其所具有的管理意涵〜〜由診療醫師負責蚊 個診療歷程一一的功能;而對病人層記錄進行檢驗,則具^ 維護整個病歷檔案完整及每一從屬記錄間之次序的功处/、 另外,在前幾節提出之病歷記錄的各項操作方法7, 說明須為各醫事文件層記錄建立識別碼,阳+ y 已 」芍因此,一個更有致 率的檢驗方法,可應用於將識別碼當作於本 〃田印伝查碼之一部份的告 施方式中。 m 田於診縻!仏鄉心檢笪碼,是由其從屬之每一醫事文 層記錄的識別碼連結訊息摘要,成—暫存記錄再計*而厂 而病人層記錄之檢查碼,則由其從屬之每一醫事文件岸于钵 的識別碼連結訊息摘要、每-診療層記錄之識別碼連:訊自 摘要’再相互依序連結成暫存記錄後計算而得,因此二 病:播案之真確性時,可以先行比對系 : 文件間之識別碼,由識別碼之檢^ Η ^ ^ β 冉對母一面事文件層記錄進行直湓 性杈驗,即可完成整個檢驗工作。 退仃真確 兩述内谷含括本發明 — 者可就已說明之内容進…高:/、肢貫施方法,而熟知此藝 故本發明之實施方法:、田知改’產生不同表示及應用, 所提創新方法之機器 彳了用方…見本發明 明之延伸。 电細系統、設備及物件均應視為本發 7 ·執行效率 在觔述複合式電子 熾別碼將醫事文件層 病歷記錄架構的說明中,已提出使用 記錄歸入診療層或病人層的應用方 41 200535746 法。本節即在說明,一個可行的 勺4別碼組成方法,及其與相 對應之記錄檢查碼的儲存方或 _ ^ 乃式。凊參閱附件一所示。 附件中A部份是用於說明右二 ^ / 在二層級複合式電子病歷架構 下,存於糸統之一份醫事文件爲七μ ^ 件層δ己錄所記載的識別碼,以及 該記錄之檢查碼的示意。1 Φ, /、 識別碼可由病人層記錄之唯 一序號(例如,病人的病歷號石民、 土 ^ $ m 琥碼)’連結診療層記錄之有序號 碼,再連結一屬於醫事文件屛 、, 甲又仟層的有序號碼組成。 承前段’請參考附件中B邱/八 . ^ ^ ^ β邛伤,此表用於展示一個使用 兩層級複合式電子病歷架構之系 μ 糸統,建立一份醫事文#声記 錄之識別碼的可行實施規則 曰 m , ^ r Λ . ^ 的酉事文件層記錄之識別 , 亲的唯-序號連結該記錄的有序號碼组 成,即可滿足識別該記錄的功能。 3有序唬碼..且 附件中C部份用於說明一 架椹由 ^ ^ a 一層、、及複5式電子病歷記錄 提供儲在介Η用^^ ^、松查碼的储存架構,系統須 W U碎存空;間用於記錄轮- ^ , δίι息,而診療層記錄的識別碼則It may be a frequent operation, and the most direct two: inspection: This kind of inspection is very convenient. It is performed by examining the records of the mother's injury and medical records in the system. Because the method of this issue of Sun and Moon '-^ ^ ^ ^ ^ ~~ Ming has designed a copy of ^ Zhitian Muha to have a two-level structure and can be combined with medical machines; ^ Λ 苏 俨 安 M management and operation, so in = The organization's medical record = mother: the records of the transfer layer and the patient layer of the patient, as shown in Figure 11 below. In the step of (1_), the system manager issues a test to check all the medical records. The electronic medical records of each patient are checked in order according to the referenced medical record number, that is, the special patient's All the medical record records are retrieved and checked one by one. In the step (111 〇), each medical file layer record in the ^ patient's medical record file is firstly entered into a check code to check the operation. The method is to record a new summary of each message in the medical file layer, and then the system retrieves the public key of the person who performed the signature calculation, and uses this public key to restore the medical record stored in the system. The signature value recorded in the file layer is compared with the obtained message digest and the λ * heart_required value in advance to determine whether they are the same. ^ The two right message digests are the same, then repeat (π 1 0) Steps to complete the examination of the patient's all-level documentary records; when the two are found to be different, enter the step of 39 200535746 -⑴40), and the system actively informs the administrator for subsequent processing. The steps in (1 1 1 0) are completed, and it is judged that the authenticity of each event level record in the medical record file has not been destroyed, then ⑴2G) ^ is performed, and the step-by-step = each diagnosis and treatment in the medical record file The inspection method is the same as that of the above-mentioned 'Make the medical doctor openly check the sound of the diagnosis and treatment for which he is responsible. If the test is correct, repeat steps 20) to complete the diagnosis and treatment of the patient. Inspection of layer records. When the inspection result is found to be incorrect, step 40 ') is notified to the manager by the system for related processing. The steps in (U20) are completed, and it is judged that the medical record is straightforward, and the Weng private points, the V treatment layer and the human layer ㈣H will enter the person (U3G), and the disease " W-code inspection operation is performed. The test method is to recalculate the message summary of the patient layer record, and then to access the unique secrets it possesses; seal: value, 'restore 1 gold balance to restore the information of the patient layer record stored in the system. The digest is compared with the pre-calculated message digest value to determine whether they are the same. If the digests are not the same, proceed to ⑴4. ) The steps are the same, then follow-up processing is performed immediately by the manager; when it is judged that the two are related to the inspection work, the emphasis is on the following: the patient's medical record number is subjected to the same inspection process. After the inspection of all medical records is completed, you can complete the entire medical record file due to a disease φ Μ 事 侔 展 + ~ to complete the examination of all the patients that belong to the patient, in principle, and in principle, in principle, As long as the records of each medical file layer cannot ensure the true maintenance of each medical record file, however, in this way, the order of the diagnosis and treatment layer records into the gate should not be broken, so, "", ~ ^ We follow each subordinate record in the diagnosis and treatment layer 40 200535746 • The sequence of the recording room and its management implications ~~ The clinician is responsible for the functions of the individual mosquito diagnosis and treatment process; and the examination of the patient layer records, then The function to maintain the integrity of the entire medical record file and the order between each subordinate record /, In addition, the various operating methods 7 of the medical record records proposed in the previous sections, explain that an identification code must be established for each medical file layer record. + y has been used ". Therefore, a more accurate test method can be applied to the identification method as a part of the verification code of this Putian seal. m Tian Yu Clinic! The xiangxiang heart check code is a summary of the identification code linked to each medical record of the subordinates that it subordinates. It becomes a temporary record and then counts *. The check code of the factory and patient records is determined by each subordinate of the subordinate. The medical document's identification number is linked to the digest of the message, and the identification number of each record in the diagnosis and treatment layer is linked: calculated from the abstract 'and then sequentially linked to each other to form a temporary record. Therefore, the two diseases: the truth of the case , Can be compared in advance: the identification code between the files, by the identification code inspection ^ Η ^ ^ β Ran to the parent side of the file layer records of the direct inspection, you can complete the entire inspection work. The retreat really contains two aspects of the present invention-those who can explain the content already described ... high: /, the method of applying the body, and the method of implementation of the present invention is well known, so Tian Zhikai's different expressions and The application, the innovative method of the machine, the application ... see the extension of the invention. The electronic detailed system, equipment and objects should be regarded as the present invention. 7. Execution efficiency In the description of the composite electronic identification code to explain the medical record layer medical record record structure, the application of the use of records into the diagnosis or treatment layer has been proposed. Fang 41 200535746 Law. In this section, we explain a feasible method for forming the four different codes, and the corresponding storage method or _ ^ formula of the record check code.凊 Refer to Annex I. Part A in the annex is used to explain the identification code recorded in the second right of a medical document in the system of seven μ ^ under the two-level composite electronic medical record structure and the record. Of the check code. 1 Φ, /, The identification number can be a unique serial number recorded on the patient level (for example, the patient's medical record number Shi Min, Tu ^ $ m 码 code) 'linked to the order number of the diagnosis and treatment level record, and then linked to a medical document 屛 ,, The first and second layers consist of ordered numbers.承 前段 'Please refer to B Qiu / Ba in the attachment. ^ ^ ^ Β 邛 Injury, this table is used to show a system using a two-level composite electronic medical record structure, to establish a medical affairs # identification number of the sound record A feasible implementation rule of m, ^ r Λ. ^ Is the identification of the record of the affair file, and the pro-only serial number is connected with the sequence number of the record to meet the function of identifying the record. 3 Ordered bluff codes. And part C of the annex is used to explain a storage structure of ^ ^ a first layer, and a compound type 5 electronic medical record. The system must be broken into storage space; it is used to record information-^, δίι, and the identification code recorded in the diagnosis and treatment layer is

可由病人層記錄之唯一庠轳,、查从^ 丁曰]兩別碼貝J 所組成。 序,ϋ連、纟α一屬於診療層的有序號碼 附件中D部份則說明在 構中,一份症人届』 Η及次一層、'及屯子病歷記錄架 〜年 己錄之識別碼與檢查碼的儲存架構。病人 層把錄的識別碼可以是病人的唯一序號。 卞構病人 ,叙α附件中,儲存檢查碼的欄位’均存放-個數值“I 该數值串列可以使 個數值串列, 進制或十六進制表: 法,也可以使用八進制、十 示。 、不法,而各表中的檢查碼是以十進制表 於系t實:i如1統設計者可選擇不將各層記錄之識w 能,但,在二v研究仍可提供足夠的真確性保護功 〃、丨病歷檔案中是否有記錄遭到刪除時,其運算 42 200535746 ♦效,將不如採用同時儲存識別碼之實施方法。這是由於,雖 然系統在檢驗戶斤存記、 & 己錄之真確性時,不論是以任何方法運 作’都需對所有記錄重新進行檢查: 法的系統,只需Γί::;全刪除,使辑記錄識別碼^ 找出哪-份記錄受到破壞。 彳卩了迅速 —系’充未使用儲存記錄識別碼的,^ ^ ^ 結各成員記錄,再一— 大呻曾、—人斗…垃 就'义須重新連 該複合式記錄受到破:…錄的檢查碼,才能發現 以找出潛在的錯誤:此亚二進厂步執行成員記錄的檢驗, 案。 、 褚存。己錄識別碼是較佳的實施方 承上所4 ’在存取病患病歷 碼(病人層的唯—庠嗜、 伙’、、、忒病患之病歷唬 上-些限制條侔 將整份病歷檔案取回’或再額外加 等, 的,例如,就診科別、診療醫師、就診曰時… 另外,在列^ 歷記錄取回,提供診療醫師進行判斷。 該數值串Λ 存檢查碼的攔位,均存放-個數值串列, /双值串列可以使—一 進制或十六進制表^ ^、不〉,也可以使用八進制、十 制表不法,而圖中的檢查碼是以十進制表示。 於系ί實如!統設計者可選擇不將各層記錄之識別碼存 完整性及正確性伴i本發明仍可提供所欲達成之病歷内容的 確性遭到破壞* *找“錄之兀整性及正 方法,a a ^ 、運异政率’將不如同時儲存識別碼之實施 然;认、 、*不統檢驗記錄之完整性及正確性時,雖 、个响以任何古、 算,但各任一、’運作,都需對所有記錄重新進行檢查碼運 成員圮錄受到破壞,甚至是被完全刪除,使用 43 200535746 .儲存記錄識別碼之方法的系統,只 間的次序,即可迅速找出削後§己錄之識別碼 i n:錄識別碼的方法,就必須重新連結各未 到破壞,並再進一步進行成才::現该複合式記錄受 古吳。W屮 ' ' 彔才双,^,以找出、、既y-人人 °、 ’儲存記錄識別碼是較佳的實施方案。 $錯 呈有提:李:發明所提出的複合式電子病歷記錄運作機㈤ ,、为致回系統運作效率处 j %作機:制, 時最為明顯 、此,夕率的好壞在檔案進行變更 具有較佳的運個例子來說明本發明所提之文件架ί 干即為更:弟十一圖及第十三圖,目中被額外加上卜己的 不即為更動到的資斜 '1加上钛圮的圖 病歷檔案中最產έ r現在診療醫師必須在就診病患之 錄)内存入一 嶋)診病歷記錄(即-份診療層記 記錄中新增一個儲存;害那麼他僅需在該份診療層 的數位資料存入誃 、西事文件層記錄,並將χ光片 (1301))進行才“、',再對新增之Χ光片(第十二圖中 所得之檢查瑪:二:運算⑽摘要搭配數位簽章),並將 錄之醫事文件層二統,存設備中’再將從屬於該診療層記 圖表示之)為—暫二之4別碼與訊息摘要連結(以( 1 302 )的 此暫存記錄重新子^錄(第十二圖中標號(13〇3)),並以 (1305)),再利田° ^ β乡療層記錄的訊息摘要(第十二圖中 十二圖中(13〇 士數位簽章法的密碼學方法加以運算(第 整性及正魏。’即可保護更動後的單—診療層記錄之完 ?上1又,由於診療層記錄已修改,接著便須立即更新病 44 200535746 人層記錄内所存之最I叫,么、 "門(心)診病歷記錄(第十三圖中 (1 4 0 1 ))的檢查碼(在此兔 > 匕為保瘦封條)’然後將病人層内每一 醫事文件層記錄或診瘃馬七& 1 療層S錄的識別碼與訊息摘要(該記錄 的暫時性檢查碼)連辞(1 / n Q — 乂(1402)的圖表示之),獲得一暫存 記錄(第十三圖令、,士r狄 )’亚汁异該暫存記錄的訊息摘(第 十三圖中( 1 405 ) )做A处主产 、 又马足以代表病人層記錄之訊息摘要,之 後以如對稱式岔碼法的贫版與士 卜〆 无的雄碼學方法運算(第十三圖中標號 ( 1 406 )) (1407)) 即可更新整個病人層記錄的檢查碼(第十三圖中 如此便可達到整份病歷的完整性及正確性保護。 由前段敘述可知,本發明所提之文件架構在補充病歷記 錄的内容時,只需進行少量的完整性及正確性保護運算;當 然,讓醫護人員對已存在之病歷進行變更並不合理,但為提 供醫護人員具有補充病歷資料使其更為詳盡的功能,本發明 仍提出一個實施方法,讓具權限者對欲補充說明之已存:的 昝事圯錄進行操作,並且不破壞病歷記錄的完整性及正確 性,但仍必須由系統設限,使此一操作僅限於針;最新:生 之病歷進行。 補充的方法是先新增用於撰寫補充内容的醫事文件層 5己錄,待计异該記錄之檢查碼時,將記錄之 > 合運結原始欲 補充貝Sfi之記錄的訊息摘要,作為檢查碼運算函數的輸入 值,以產生的檢查碼當作新增的用於補充病歷資 檢查碼。接著將以一實例詳述之。 、V α π ' 呈有病患之病歷記錄具有—百次的診辦記錄,亦即 -一 療層記錄’亚假設母個診療層記鲦中包含 内谷、檢驗報告及χ光片三部份,若最 y丨、 ^ 177誇療層記錄内 45 200535746 的x光片需被加註.在本發明所提之 僅需新增一份用於撰寫補/丙歷储存架構中, 錄,儲存X光片所需的加 :丙土貝邛的醫事文件層記 亢月所而的加注内容並建立該醫 檢查碼、更新代表該診療層記錄的檢查碼 :輯的 備中的診療層記錄之檢查碼、更新病人層記錄=先= =錄的檢查碼’以及更新系統儲存設備中的病 檢查碼。 π八盾记錄之 假設以SHA —1赫序函數做為訊息摘 =要將僅佔劃…,而識別碼佔Π":」:個 母伤西事5己錄將以原始大小進行自 ^仃。Κ心獨要運异亚各自得到 blts長度的二進位值,所以,該份診療層文件僅需以 (160H00)x4 bi ts(連結後的識別碼及訊息摘要,大小為丄而㈣ bits,如第十二圖中(1 303 ))的資料量去計算訊息摘要,而 其他不需加註的診療層記錄僅需以(16〇 + 1〇〇)χ3 bitS (連結 後的識別碼及訊息摘要,大小為78〇 M ts )的資料量去計算 訊息摘要;相同地,在病人層記錄的檢查碼運作中,亦僅需 以(160 + l〇〇)xl〇〇 bits (連結後的識別碼及訊息摘要,大小 為3. 2 KB,如第十三圖中( 1 403 ))的資料量去計算病歷檔的 訊息摘要。 另外,由上述說明可以發現,本發明所提出之文件架構 在錯誤檢驗上亦具有非常高的效率;由於系統儲存設備中, 均存有醫事文件層記錄、診療層記錄及病人層記錄之識別碼 及檢查碼,因此,當資料有缺失或錯誤,即可立即由所存的 識別碼及檢查碼比對出異常的部份,而不需再經由額外的流 程或計算來檢驗,相對地也減少了系統負荷,提升整體效 46 200535746 =能。接著,將探討一般用以產生 之文件架構中的運作方式,並詳:;:::法於本發明所提 碼運作方法。 敘述本發明所採用的檢查 8 ·建議採行的檢查碼技術 本發明提出的複合式電子 層級的文件保護措施,將文件的:記錄架構中,設計一個多 別以存於醫事文件層、診療層或=部内容依其所屬層級,分 因此將產生三個分屬不同層級 人層的:查碼加以保護, 完整性及正確性的保護依據。 表不同意義的檢查碼做為 在醫事文件層記錄中,存放著一 括醫師撰寫的診療記錄、合 早一醫事記錄的資料,包 查報告,由於每—份醫事;錄均員製作的檢驗、檢 分’因此,為保護個別醫事 具有身份鏗別功能的檢查碼技術對 ,需以 法均可達到此一功::對…碼法及保護良好的對稱式密碼 然而’在現行的醫療制度下,醫療用數位憑證 二::錄基礎環境業已成型,所有的醫師、醫護人員及“ 句具有代表職務或個人身份並且具備數位簽章運算能力= :位憑證--醫師卡、醫護人員卡及健保1C卡,若再花費 :外的成本用來建置並管理對稱式金餘環境,絕非正確考 里,因此,用於保護個別醫事記錄之完整性及正確性的檢杳 馬,將以sfl息摘要搭配數位簽章的方式運作,如第十四圖 示D ^ 47 200535746 在診療層記錄中,儲存著-次診療歷程中的門(” · 病歷或住院讓戶則事記錄的内容(15〇〇),戶斤以:在: 護了個別醫事記錄後,還必須保護 ’、 又心二。匕鰥之間的關聯,亦 即保護完整的單一診療歷程之病歷 灼i σ己錄,因此,本發明將足 以代表個別%事έ己錄之訊息摘要及,| . 蛋及硪別碼,按其於記錄内部 的配置順序連結(以(1 5 〇 1)的圖表干 η,ΠΟΛ ^ 7 ΰ表不之),成一份暫存記錄 02) ’再對其進行訊息摘要的運算(15q3) ’求得足以代表 整個診療歷程之病歷記錄的訊息摘要(15〇4),並再次進 要的密碼學保護。 在考量了醫師診察時的流 碼學保護技術,仍應為數位簽 察活動需將各種診療相關的醫 師已將所有的參考資訊詳細閱 以此時仍然以訊息摘要搭配醫 歷程的保護,亦如第十四圖。 私後,診療層記錄所使用的密 章(1 5 0 7 ),這是由於完整的診 事5己錄納入’因此,為表示醫 讀並對整個診察流程負責,所 師的數位簽章,達成整個診療 接著,上述足以代表單一診療歷程病歷記錄之診療層圮 錄的訊息摘要,會與已存在病人層記錄中的醫事文件層f曰己錄 之訊息摘要與識別碼’以及診療層記錄之訊息摘要與識別碼 連結(以(16〇1)的圖表示之),為一暫存記錄(16〇2),並以其 作為計算病人層記錄之訊息摘要的運算來源,求得足以代表 病人層内所存醫事文件層記錄及診療層記錄之整體一一亦 即-位病患的完整病歷――的訊息摘要;而病歷的保管者庫 是醫療機構’在考量醫院處理流程及病歷保護需求後,可以 發現,對於一份完整病歷的保護方法,可能有以下兩種作 法:第一種是以唯一的對稱式金鑰對病歷記錄進行保護封條 48 200535746 * 運t,第二種是以非對稱式金 — 病歷記錄進行簽章運算。 在第—種狀況下,醫療機構可以 ^ 鑰的管理系統,僅需由内部的病歷管f需額外建立對稱式金 秘密金餘,並以該秘密金錄對病^、统保t 一份唯—的 ( 1 60 7 ) ’再附加於電子病歷記錄之疒仃加密獲得保護封條如 檔案之完整性及正確性,如第=人層内,即可確保整份 弟十五圖所示。 而在第二種狀況下,由於目前的 公開金鑰環境,醫療機構將 、%楗已建置專屬的 :需求使用該金输對病歷記錄進金餘,因此,可 換資訊所使用之金鑰分離,亦可另於:運鼻’若欲與用於交 中心註冊另_份專用於簽章的金_ =切環境中的憑證 歷管理系統。 、應用於醫療機構的病 下表將上逑檢查碼技術依 別列出。 增級§己錄的保護需求分 醫事文件層記 錄的檢查碼 互護標 iL二--一 Ί一"^的祆查碼姑術 個別的醫事記錄 -- ^-——__l 由前述說明及# + AA t — 一 一一· 志π 表中的貧訊可以發現,本專利所诂m —馬技術可概分為二類,苴一 ^ 斤使用的檢 文中的訊息摘要,·苴一、 以孟銘什异產生,如前段 ,、—、以金鑰計算產生,如Jl # + 封條及數位簽章。一w 上表中的保護 碼PD 瓜來巩,使用非以金鑰計算產斗沾认士 馬即可達成所需 6 屋生的核查 π正性及正確性保護且計算迅速,然而, 49 200535746 由ή讀產生之檢查碼料算方法乡m、任何人均 可取得與使用,致無法達成權責區分的功能: 屬醫療責任需使用今絲^ a々& 士 ^ r ^ 生之檢查碼,則是為了担古ιν人 f 乂孟^產 率。 為了牷回以金鑰產生之檢查碼的運算效 總結上述說明,太士义 在本發明中,醫事文件層所儲存的單一 西事s錄之檢查石馬,杲 丰 透過數位簽章運曾::“事文件層記錄之訊息摘要 -纹件请師或醫護人員的簽章 丨所儲存之一次診瘆屛妒士 αα π 逐风 β療層 ^ 、止壬中々所有醫事文件層記錄的整體& 查碼,則需以每_ H塞古从抵^ i 才欢 為一暫存記纾後i 錄之識別碼與訊息摘要連結 數位】章運該暫存記錄計算出的訊息摘要透過 早逆^求件的醫師簽章達成。 但在病人層的運作中, 僅由•療機構保管病片㈣“醫師或醫護人員負責, 員記錄之識別碼與訊息摘要連Ύ屬於病人層的成 訊息摘要運算計嘗出足…。為一暫存5己錄並以其透過 利用醫療機構足唯 ^ ^ ^ ,t ^ V; ^^ ^ ^ ^^ 錄的保鳟· ^ L 運ΤΓ 達到整伤病歷記 算效率及安:性到使用檢查碼技術的優點,也可兼顧運 療層i:以=r提之架構中’為保障病歷播内每-診 整性及正確性,採用了 […、胃事文件層記錄之整體完 訊息摘要的方式、’°識別碼與訊息摘要再計算整體 確性保,^" ,$層及診療層進行整體的完整性及正 。又如此,即可大幅縮減病歷記錄求得訊息摘要時的 50 200535746 運异負何。 因此,當使用此複合式記錄之資料完整性及正確性保護 方法搭配複合式電子病歷記錄架構,除可提供電子病歷記錄 更佳的保護,並能確實達成醫療行為之權責區分的功能。 【圖式簡單說明】 第一圖本發明之檢查碼計算方法。 第二圖本發明之三層複合式電子病歷記錄架構。 第三圖係說明本發明用於計算足以代表診療層記錄之檢查 碼的一個實施方式。 第四圖係說明本發明用於計算足以代表病人層記錄之檢查 碼的一個實施方式。 第五圖係說明本發明用於計算足以代表診療層記錄之檢查 碼的一個實施方式。 第六圖係說明本發明用於計算足以代表病人層記錄之檢查 碼的一個貫施方式。 φ 第七圖係說明本發明建立一份新病歷檔案的可行實施方案 流程圖。 第八圖係說明本發明建立一份醫事文件層記錄的可行實施 方案流程圖。 第九圖係說明本發明取回/檢閱病歷檔案内容的可行實施方 案流程圖。 第十圖係說明本發明補充一份病歷記錄之資訊的可行實施 方案流程圖。 第十一圖係說明本發明之醫療機構定期檢驗全部電子病歷 51 200535746 記錄時的可行實施方案流程圖。 第十二圖係說明本發明補充病歷記錄内容時對診療層記錄 的更動。 第十三圖係說明本發明補充病歷記錄内容時對病人層記錄 的更動。 第十四圖係說明本發明足以代表診療層記錄之檢查碼的推 薦計算方式。 第十五圖係說明本發明足以代表病人層記錄之檢查碼的推 •薦計算方式。 附件一係本發明記錄識別碼的儲存架構示意圖。 【主要元件符號說明】 (1 0 0 ) —份複合式文件 (1 0 1 )( 1 0 11 )複合式文件的一份成員文件 (10 2)複合式文件的識別碼 (1 0 3 )複合式文件的檢查碼 (1 0 4 )檢查碼運算方法的二個表示式 Φ ( 1 0 5 )代表計算複合式文件之檢查碼的函數 (1 0 6 )代表第η份成員文件的檢查碼 (107 )代表成員文件編號,11 = 1,2,3,··· (1 0 8 )代表整份複合式文件的檢查碼 (1 0 9 )代表第η份成員文件的暫時性檢查碼 ( 2 0 0 )病人層記錄 (2 0 1 )( 2 0 1 1 ) —份醫事文件層記錄 (20 2 )( 2 02 1 )診療層記錄 ( 20 3 )( 2 0 3 1 )診療層記錄的識別碼 200535746 U〇4)(204l)診療層記錄 ( 20 5 )病人層§己錄的識別 ( 20 6 )病人層記錄的撿 ( 30 0 ) ( 300 1 )診療層〜馬 記錄 (3 0 1 )將每一醫事9。、彔中的一份醫事文件層 (302 )連結產生的暫二=記錄之簽章連結 (303 )診療層記錄的檢 ( 304 )代表時間軸,^ 了碼。 (400 )病人層記錄中:不成員記錄的循序性 ( 40 1 ) ( 40 1 1 )病人層\〜份醫事文件層記錄 (402 )連結每一醫事"。己錄中的一份診療層記錄 檢查碼 (4 0 3 )連結產生的辦件層§己錄及診療層記錄# 曰存記錄 ( 404 )病人層記錄的檢查碼 (405 )代表時間軸,標厂:。 i錄 么士 、、、〇 (50 0 )( 500 1 )診療層τ成員記錄的循序性 (50 2 )將每一醫事文H錄中的一份醫事文件層· (503 )連結產生的智㈢圮錄之識別碼與簽章連 J飞谇記錄 ( 504 )診療層記錄的檢查碼 ( 505 )代表時間軸,標 (6 0 0 )病人層記錄中成貝s己錄的循序性 ( 6 0 1 ) ( 6 0 1 1 )病人層,己:份醫事文件層記錄 ( 60 2 )將每一醫事文曰^展彔/的一份診療層記錄 別瑪與檢 查碼連結 S。己錄及診療層記錄之驾 (6〇3)連結產生的暫存記錄 (604 )病人層記錄的檢查螞 (6 0 5 )代表時間轴,標〜… (70 0 )建立一份醫事成員記錄的循序性 _又件層記錄 , 53 200535746 ( 7 1 0 )填入病患基尽貧料 (7 2 0 )儲存醫事文件層記錄 ( 73 0 )建立病歷號碼 記錄的識別 行保護封條 歷檔案的檢 (74 0 )病歷號碼連結一個有序號碼作為該 碼 (75 0 )以系統金鑰對該醫事文件層記錄進 運算 (755 )以保護封條值作為該記錄的檢查碼 (7 6 0 )複製一份上述的保護封條值作為病, # 查碼(770)成功建立及儲存新病歷檔案 (80 0 )建立醫事文件層記錄 (8 1 0 )撰寫診斷結果 ( 8 2 0 )儲存醫事文件層記錄 ( 8 3 0 )是否歸屬於某一診療層記錄? (840 )選擇診療層記錄 (8 4 5 ) ( 8 5 0 )建立序號 (86 0 )醫師對記錄簽章 φ ( 870 )成功儲存 ( 9 0 0 )讀取病歷號碼 ( 9 0 5 )病歷檔案之檢查碼是否正確? (9 1 0 )是否附加限制條件? ? 其他相關的 (92 0 )取得全部病歷記錄 ( 925 )取得符合需求的病歷記錄 (93 0 )醫事文件層記錄之檢查碼是否正確 ( 940 )診療層記錄之檢查碼是否正確? (9 5 0 )通知系統管理者並重新檢驗系統中 病歷記錄 54 200535746 - (9 6 0 )顯示病歷記錄 (9 7 0 )選擇欲檢閱的病歷記錄 ( 98 0 )顯示所選擇的病歷記錄内容 (1 0 0 0 )輸入病歷號碼 (1 0 0 5 )依病歷號碼將病歷記錄列出 (1 0 1 0 )醫師選擇欲加上補充資訊的醫事文件層記錄 (1 0 1 5 )檢驗該醫事文件層記錄之完整性及正確性 (1 0 20 )檢查碼正確? (1 0 2 5 )通知系統管理者並重新檢驗系統中其他相關 鲁的病歷記錄 (1 0 3 0 )建立一份用於儲存補充資訊的醫事文件層記 錄 (1 0 35 )撰寫補充資訊 (1 0 4 0 )儲存醫事文件層記錄 (1 045 )系統將上述欲補充資訊之醫事文件層記錄的 訊息摘要附加到本撰寫補充資訊的醫事文件層記錄 中 Φ ( 1 0 5 0 )依欲補充資訊之醫事文件層記錄的序號循序 建立本記錄的序號 (1 0 5 5 )計算撰寫補充資訊的醫事文件層記錄之訊息 摘要(1 0 6 0 )使用醫師私鑰對儲存補充資訊之醫事文 件層記錄的訊息摘要進行簽章運算 (1 0 6 5 )簽章值附加於記錄之後作為檢查碼 (1 0 70 ) 是否存於診療層? (1 0 75 )重新計算診療層記錄的簽章值 (1 0 8 0 )取代原存於系統之簽章值 (1 0 8 5 )重新計算病人層記錄的保護封條值 200535746 (1 0 9 0 )取代原存於系統之 (1 0 9 5 )成功儲存 (1 1 0 0 )系統依病歷號碼將 取出進行檢驗 保護封條值 一位病患的全部病歷記錄It can be composed of the only record recorded by the patient layer, and the check from Ding Yue]. In order, Qianlian, 纟 α are part of the ordering number attached to the diagnosis and treatment layer. Part D in the annex indicates that in the structure, a patient's session "" and the next layer, "and" Tunzi's medical record record rack ~ the year's recorded ID " And checksum storage architecture. The identification code recorded on the patient level can be the patient's unique serial number. To construct the patient, in the alpha attachment, the fields that store the check code are all stored-a value "I. The value series can be a series of values, in hexadecimal or hexadecimal form: method, or octal, Ten indications. Illegal, and the check code in each table is based on the decimal system. The designer can choose not to record the knowledge of each layer. However, in the second v research, it can still provide enough The function of authenticity protection, if any records in the medical records are deleted, the calculation is effective. It will be better to use the implementation method of storing the identification code at the same time. This is because although the system checks the household records, & When the authenticity of the record is recorded, no matter how it is operated, all records need to be re-examined: the system of the law, only Γί :: ;; delete all, make the record identification code ^ find out which record is subject to Destroyed quickly — it's' filling the unused storage record identification code, ^ ^ ^ conclude each member's record, and then-Dasao Zeng,-human fighting ... "Ji Jiu" must reconnect the composite record to be broken : ... check the code to find Finding potential errors: This sub-second factory conducts inspections of member records. Case, Chu Cun. Recorded identification code is a better implementation. 4 'Accessing the patient's medical record code (patient-level Only the patient's medical records are addicted to some restrictions, such as taking the entire medical record file back or adding additional, etc., for example, the attending department, the treating physician, the visiting date … In addition, the history records in column ^ are retrieved and provided to the clinician for judgment. The value string Λ is stored in the check code, and is stored in a number string. / Double-valued string can be-one or sixteen ^ ^, No>, can also use octal, ten tabulation, and the check code in the figure is expressed in decimal. The system is as true as possible! The system designer can choose not to keep the identification code of each layer of records intact Sexuality and correctness. The present invention can still provide the desired accuracy of the medical record content is destroyed. * * Find "the integrity and correct method of recording, aa ^, the rate of foreign affairs' will not be as good as storing the identification code at the same time. Enforcement; when the recognition of the completeness and correctness of records is not uniformly checked Although the answer is no matter how old or bad, each one of the 'operations' needs to re-check all records. Shipping records of members are destroyed or even completely deleted, using 43 200535746. Method of storing record identification codes System, just in the order, you can quickly find out the method of recording the § self-recorded identification code in: record the identification code, you must re-connect each unfinished, and then further success :: now the composite record Accepted by ancient Wu. W 屮 '' 彔 才 双, ^, to find out, both y-ren °°, 'storage record identification code is a better implementation. The composite electronic medical record operation mechanism is used to make the operating efficiency of the system return. The mechanism is the most obvious. Therefore, the quality of the rate is better when the file is changed. There is a better example to illustrate the invention. The file rack mentioned is more dry: the eleventh and the thirteenth pictures of the younger brother are added to the title, which is not the changed asset'1, and the picture of the titanium case. (The birth doctor must now be in the patient's record) Enter a medical record) (ie, a new storage is added to the records of the diagnosis and treatment layer; so he only needs to store the digital data of the diagnosis and treatment layer into the record of the medical and western affairs layer and save the x-ray film ( 1301)) Perform the "," and then add the new X-ray film (checked in the twelfth picture: Mathematics: Abstraction with digital signature and digital signature), and store the recorded medical documents in two layers. The 'in the device' will be indicated by the map belonging to the diagnosis and treatment layer) as follows: the 4th code of the temporary 2nd is linked with the message summary (the temporary record with (1 302) is re-recorded (labeled in the twelfth figure ( 13〇3)), and (1305)), and then Litian ° ^ β rural medical records of the message summary (the twelfth figure in the twelfth figure (1330 digital signature method of cryptography method to calculate ( The first integrity and Zheng Wei. 'The protection of the changed single-diagnosis layer records can be protected. The first one is because the diagnosis layer records have been modified, and then the disease 44 200535746 person layer records must be updated immediately. Heart) check code of the medical record (13th figure (1 4 0 1)) (here the rabbit > thin seal) and then record every medical file in the patient layer & 1 The identification code of the treatment layer S record and the message summary (the temporary check code of the record) are ligated (represented by 1 / n Q — 乂 (1402)) to obtain a temporary record (Figure 13 Ling, Shir Di) 'Yi Juyi's message digest of the temporary record (Figure 13 (1 405)) is the summary of the message of the main birth at the A site, which is enough to represent the patient level record. The poor version of the formula fork code method and Shi Buzheng's male code method operation (label (1 406)) (1407) in the thirteenth figure can update the check code of the entire patient layer record (thirteenth figure In this way, the integrity and correctness protection of the entire medical record can be achieved. As can be seen from the foregoing description, the document structure proposed by the present invention When supplementing the contents of medical records, only a small amount of integrity and correctness protection calculations are required; of course, it is not reasonable for medical staff to make changes to existing medical records, but to provide medical staff with supplementary medical records to make them more detailed The present invention still proposes an implementation method for the authorized person to operate the existing record of supplementary information to be explained, without destroying the integrity and correctness of the medical record, but it must still be set by the system. The latest method is to give birth to the medical records. The supplementary method is to first add a new medical document layer 5 for writing supplementary content. When the check code of the record is different, the record will be recorded. ≫ The combined message summary of the original Sfi record to be added to the Sfi is used as the input value of the check code operation function, and the generated check code is used as a new check code for supplementing the medical record. Then it will be described in detail with an example. , V α π 'presents the patient's medical record with-a hundred times of consultation and office records, that is,-one treatment level record' hypothesis that the internal diagnosis and inspection are included in the records of the diagnosis and treatment levels of the mother. The report and the X-ray film, if the most y, ^ 177 quarantine treatment layer records 45 200535746 x-ray film need to be annotated. In the present invention only need to add a new one for writing supplement / C In the calendar storage structure, record and store the required X-rays: add the content of the annotations to the medical file layer of the protozoate and establish the medical check-up code, and update the check-up code that represents the diagnosis and treatment layer: Edit the check code of the diagnosis and treatment layer record in the preparation, update the patient layer record = first = = recorded check code 'and update the disease check code in the system storage device. The assumption of the π eight shield record is made by the SHA-1 Hertz function. Digest for the message = To occupy only the plan ..., and the identification code to account for "":": A mother's injury to the West is recorded in its original size. KK Xinduo wants to get a binary value of the blts length for each of the different sub-groups, so the diagnosis layer file only needs to be (160H00) x4 bi ts (the linked identification code and message summary, the size is 丄 and ㈣ bits, such as (1 303)) in the twelfth figure to calculate the message summary, and other medical records that do not need to be annotated need only use (160 + 100) x3 bitS (the linked identifier and message summary). , The size is 78〇M ts) to calculate the message digest; similarly, in the operation of the check code recorded on the patient level, only (160 + 100) x 100 bits (the linked identification code) And the message summary, with a size of 3.2 KB, as shown in the thirteenth figure (1 403)) to calculate the message summary of the medical record file. In addition, from the above description, it can be found that the file structure proposed by the present invention also has very high efficiency in error checking. Because the system storage equipment, the identification codes of medical file layer records, diagnosis and treatment layer records, and patient layer records are stored. And check code, so when the data is missing or wrong, the abnormal part can be immediately compared with the stored identification code and check code, without the need to check through additional processes or calculations, which is relatively reduced. System load, improve overall efficiency 46 200535746 = energy. Next, the operation mode in the document structure generally used for generating will be discussed, and the details are as follows:; ::: Method based on the code operation method of the present invention. Describe the inspection adopted by the present invention8. Suggested check code technology The composite electronic-level document protection measures proposed by the present invention will design a document: record structure to design a separate file to be stored in the medical document layer and the diagnosis and treatment layer The content of OR = is divided into three levels according to its own level. Therefore, the code is protected by code checking, and the basis of integrity and correctness is protected. The check codes with different meanings are stored in the medical document layer records, including the medical records written by the doctors, and the medical records of the early morning medical records, including the inspection report, because each medical record; For this reason, in order to protect individual medical personnel with the identity identification function of the check code technology pair, it is necessary to achieve this by law :: pair code method and well-protected symmetric password. However, under the current medical system, Digital Voucher for Medical Use 2: The basic environment has been formed. All doctors, medical staff and "sentences have representative positions or personal identities and have the ability to digitally sign and sign. =: Vouchers-physician card, medical staff card and health insurance 1C If the card is to be spent again: the external cost is used to build and manage a symmetrical surplus environment, which is definitely not the correct test. Therefore, the inspection team used to protect the integrity and correctness of individual medical records will use sfl information. The abstract works with digital signatures, as shown in the fourteenth diagram D ^ 47 200535746 In the records of the diagnosis and treatment layer, the gates in the course of the diagnosis and treatment are stored ("· Medical records or hospital admissions The contents of the event record (150,000), the householder said: After: individual medical records are protected, they must also be protected, and the heart 2. The relationship between daggers, that is, the medical records that protect a complete single diagnosis and treatment process i σ has been recorded. Therefore, the present invention will be sufficient to represent the individual message summary and the || egg and 硪 code, which are connected in the order in which they are arranged inside the record (with a chart of (1 5 〇1)). Gan η, ΠΟΛ ^ 7 (not expressing it), a temporary record 02) 'then calculate the message digest (15q3)' find a message summary (15〇4) that is sufficient to represent the entire medical history of the diagnosis and treatment process And again to the required cryptographic protection. After taking into account the technology of stream coding protection during the doctor's consultation, it should still be a digital signing activity. All relevant doctors have read all the reference information in detail to still use the message summary to protect the medical process at this time. Fourteenth figure. Privately, the seal (15 0 7) used by the diagnosis and treatment layer records, because the complete consultation 5 has been included. Therefore, in order to indicate medical reading and take responsibility for the entire consultation process, the digital signature of the division, Reaching the entire diagnosis and treatment. Then, the above-mentioned message summary of the diagnosis and treatment layer record which is sufficient to represent the medical record of a single diagnosis and treatment will be combined with the medical record layer of the existing patient layer record. The message summary is linked to the identification code (represented by the figure of (1601)), which is a temporary record (1602), and it is used as the calculation source for calculating the message summary of the patient layer record, which is sufficient to represent the patient The medical records at the medical level and the records at the diagnosis and treatment level are all one-to-one, the patient's complete medical records—a message summary; and the custodian of the medical records is the medical institution 'after considering the hospital's processing process and medical record protection needs It can be found that there may be two methods for the protection of a complete medical record: the first method is to protect the medical record with a unique symmetrical key 48 200535746 * Run t. The second method is to use asymmetric gold-medical records for signature calculation. In the first case, the medical institution can use the key management system. Only the internal medical record management f needs to establish an additional symmetric golden secret balance, and use the secret financial record to treat the illness ^ and protect the t —'S (1 60 7) 'It is attached to the electronic medical record and encrypted to obtain a protective seal, such as the integrity and correctness of the file, as shown in the figure below. In the second situation, due to the current public key environment, medical institutions have built exclusive: they need to use the money to add money to their medical records, so they can exchange the keys used for information. Separation can also be in addition to: Yunbi 'if you want to register another _ copy of the gold dedicated to the signature _ = used in the transaction center to register the voucher calendar management system in the environment. 3. Diseases applied to medical institutions The following table lists the check code technology on the list. Enhancement § The recorded protection requirements are divided into the medical code records of the medical code and the mutual protection standard iL II-one-to-one " ^ 's check code and individual medical records-^ -----__ l # + AA t — one-to-one · The poor information in the table can be found that the 诂 m-horse technology used in this patent can be roughly divided into two categories. It is generated by Meng Ming, such as in the previous paragraph, ,,, and calculated by key, such as Jl # + seal and digital signature. A w The protection code PD in the table above, using a key other than the key to calculate the production bucket and identifying the horse can achieve the required 6 housekeeping verification of π positive and correct protection and calculation is fast, however, 49 200535746 The method of calculating the check code generated by the price reading can be obtained and used by anyone, which can not achieve the function of separation of powers and responsibilities: It is a medical responsibility to use a check code produced by Jin silk ^ a々 & ^ ^ r ^ It is for the ancient people to yield. In order to summarize the above-mentioned description of the calculation effect of the check code generated by the key, in the present invention, Tai Shiyi, in the present invention, the inspection stone horse of a single Western affairs record stored in the medical document layer. : "Summary of the information at the event file level-the signature of the doctor or the medical staff on the piece of document. 丨 The stored one consultation 瘆 屛 jealous person αα π the wind β treatment layer ^, Zhi Renzhong々 the entire record of all medical file layers & Check the code, you need to use every _ H Segu to arrive ^ i Caihuan as a temporary record of the identification number of the record i and the message summary link digits] Zhang Yun the message summary calculated by the temporary record through early reversal ^ The doctor's signature of the requested document was reached. However, in the operation of the patient layer, only the medical institution keeps the disease film ㈣ "the physician or the medical staff is responsible for the identification number and the message summary of the staff record, and the message summary belongs to the patient layer. Computational tasting ... For the temporary storage of 5 records and use of medical institutions to adequately record ^ ^ ^, t ^ V; ^^ ^ ^ ^^ recorded trout · ^ L transport ΤΓ to achieve the efficiency and security of the whole injury medical records To the advantages of using the check code technology, you can also take into account the operation and treatment layer i: In the structure mentioned by = r, to ensure the integrity and correctness of the diagnosis in the medical record, the use of [... After completing the message digest method, the '° identifier and the message digest are recalculated to ensure the overall accuracy. ^ &Quot; The $ layer and the diagnosis and treatment layer perform overall integrity and correctness. In this way, you can significantly reduce the 50 200535746 misfortunes when obtaining the message summary from the medical record. Therefore, when using this composite record's data integrity and correctness protection method combined with the composite electronic medical record structure, in addition to providing better protection of the electronic medical record, it can also achieve the function of separating the power and responsibility of medical behaviors. [Schematic description] The first figure is a check code calculation method of the present invention. The second figure is a three-layer composite electronic medical record recording structure of the present invention. The third diagram illustrates one embodiment of the present invention for calculating a check code sufficient to represent a record of a medical treatment layer. The fourth diagram illustrates one embodiment of the present invention for calculating an examination code sufficient to represent a patient level record. The fifth diagram illustrates one embodiment of the present invention for calculating a check code that is sufficient to represent the records of the clinic. The sixth diagram illustrates one embodiment of the present invention for calculating an examination code sufficient to represent a patient level record. φ The seventh diagram is a flowchart illustrating a feasible implementation scheme of the present invention for establishing a new medical record file. The eighth diagram is a flowchart illustrating a feasible implementation scheme of the present invention for establishing a medical document layer record. The ninth figure is a flowchart illustrating a feasible implementation scheme for retrieving / reviewing the contents of the medical records of the present invention. The tenth figure is a flowchart illustrating a feasible implementation scheme of the present invention to supplement the information of a medical record. The eleventh figure is a flowchart illustrating a feasible implementation scheme when the medical institution of the present invention periodically checks all electronic medical records. The twelfth figure illustrates changes to the diagnosis and treatment layer records when the present invention supplements the contents of the medical records. The thirteenth figure illustrates the changes made to the patient level when the present invention supplements the contents of the medical record. The fourteenth figure illustrates the recommended calculation method of the present invention which is sufficient to represent the check code recorded by the diagnosis and treatment layer. The fifteenth figure illustrates the method of calculating the referral code of the present invention which is sufficient to represent the patient layer record. Attachment 1 is a schematic diagram of the storage structure of the record identification code of the present invention. [Description of Symbols of Main Components] (1 0 0) — a composite document (1 0 1) (1 0 11) a member document of the composite document (10 2) composite document identification code (1 0 3) compound The check code (1 0 4) of the formula file is the two expressions of the check code calculation method Φ (1 0 5) represents the function (1 0 6) that calculates the check code of the compound file, which represents the check code of the nth member file ( 107) represents the member file number, 11 = 1, 2, 3, ... (1 0 8) represents the check code of the entire composite file (1 0 9) represents the temporary check code of the nth member file (2 0 0) Patient level record (2 0 1) (2 0 1 1) — a medical file level record (20 2) (2 02 1) diagnosis level record (20 3) (2 0 3 1) identification of the diagnosis level record Code 200535746 U〇4) (204l) Clinic layer records (205) Patient layer § Recorded identification (20 6) Patient layer records picking (30 0) (300 1) Clinic layer ~ horse records (3 0 1) Will every medical affairs 9. The second temporary result from the link of a medical document layer (302) in the middle and the middle = the signature link (303) of the record. The inspection (304) of the diagnosis and treatment layer record represents the time axis. (400) Patient-level records: the sequentiality of non-member records (40 1) (40 1 1) Patient-level medical records layer records (402) Link each medical affairs ". A record of the diagnosis and treatment layer records in the recorded record (4 0 3) is linked to the service layer § have recorded and the diagnosis and treatment layer records # 存 Storing records (404) The examination code of the patient layer records (405) represents the time axis, the standard plant:. i record Mo Shi ,,, 0 (50 0) (500 1) the sequentiality of the τ member records of the diagnosis and treatment layer (50 2) a medical document layer (503) linked from each medical record H record The identification code of the record and the seal and the J Fei record (504). The check code (505) of the diagnosis and treatment layer records represents the time axis, and the sequence of the records in the patient layer records (6 0 0) (6 0 1) (6 0 1 1) Patient level, has: a copy of medical affairs document level records (60 2) A medical treatment level record of each medical affairs document is displayed and the examination code is linked to S. Temporary record (604) generated by linking recorded and diagnosis layer records (604). Examination of patient layer records (6 0 5) represents the timeline, and marks ~ ... (70 0) establish a medical member record. Sequentiality_Another layer record, 53 200535746 (7 1 0) Fill in the patient's base material (7 2 0) Store the medical file layer record (73 0) Create the identification line of the medical record number record to protect the seal calendar file Check (74 0) the medical record number linked with an ordered number as the code (75 0) and use the system key to perform the operation on the medical file layer record (755). Use the protection seal value as the check code of the record (7 6 0). A copy of the above-mentioned protection seal value is used as the disease, # 查 码 (770) successfully created and stored a new medical record file (80 0), established a medical file layer record (8 1 0), wrote a diagnosis result (8 2 0), and stored a medical file layer record (8 3 0) Is it attributable to a certain medical record? (840) Select the diagnosis and treatment layer records (8 4 5) (8 50 0) Establish the serial number (86 0) The physician has successfully saved the record signature φ (870) and saved (9 0 0) reads the medical record number (9 0 5) medical record file Is the check code correct? (9 1 0) Are there any restrictions? ? Other related (92 0) Obtain all medical records (925) Obtain the required medical records (93 0) Is the check code of the medical file layer record correct (940) Is the check code of the medical layer record correct? (9 5 0) Notify the system administrator and re-examine the medical record in the system 54 200535746-(9 6 0) Display the medical record (9 7 0) Select the medical record to be reviewed (98 0) Display the selected medical record content ( 1 0 0 0) Enter the medical record number (1 0 0 5) List the medical record according to the medical record number (1 0 1 0) The doctor selects the medical file layer record (1 0 1 5) to add supplementary information to check the medical file The integrity and correctness of the layer record (1 0 20) check code is correct? (1 0 2 5) Notify the system administrator and re-examine other relevant medical records in the system (1 0 3 0) Create a medical file layer record for storing supplementary information (1 0 35) Write supplementary information (1 0 4 0) Store the medical file layer record (1 045) The system appends the message summary of the medical file layer record to be supplemented to the medical file layer record of the supplementary information Φ (1 0 5 0) supplementary information as desired The serial number of the medical file layer record is established in sequence (1 0 55). The message summary of the medical file layer record for writing supplementary information is calculated (1 0 0). The private file of the physician is used to record the medical file layer record for storing supplementary information The message digest is used for signature calculation (1 0 6 5). The signature value is added to the record as a check code (1 0 70). Is it stored in the diagnosis and treatment layer? (1 0 75) Recalculate the seal value of the diagnosis layer record (1 0 8 0) instead of the seal value originally stored in the system (1 0 8 5) Recalculate the protection seal value of the patient layer record 200535746 (1 0 9 0 ) Instead of the original stored in the system (1 0 95) successfully stored (1 1 0 0) the system will take out all the medical records of a patient according to the medical record number for inspection and protection seal value

(1110)醫事文件層記錄 (11 2 0 )診療層記錄之檢 (11 3 0 )病歷檔案之檢查 (11 4 0 )通知系統管理者 (1 3 0 0 ) —份診療層記錄内 (1 3 0 1 )被更動的成員記錄 之檢查碼是否正確 查碼是否正確? 馬是否正確? 進行後續處理 的所有成員記錄 ?(1110) Medical file layer records (11 2 0) Inspection of medical records (11 3 0) Inspection of medical records (11 4 0) Notify the system administrator (1 3 0 0) — a copy of the records of the medical layer (1 3 0 1) Is the check code of the changed member record correct? Is the horse right? All member records for subsequent processing

( 1 3 02 )表示“連結”功能的圖示 (13〇3)各成員記錄的識別石馬及訊息摘要的連έ士值 ( 1 3 04 )-種檢查碼演算函數—單向赫序函數 (1 3 05 )足以代表該診療層記錄的訊息摘要 (1 3 06 ) —種檢查碼演算函數——數位簽章法 (1 3 07 )代表獲得的檢查碼(數位簽章)彳 (1 4 0 0 ) —份病人層記錄内的所有成員記錄 (1 4 0 1 )被更動的成員記錄 (1 4 02 ) ( 1 4 03 ) (1 4 04 ) (1 4 05 ) (1406) 表示“連結”功能的圖示 各成員記錄的識別碼及訊息摘要的連結值 一種檢查碼演算函數——單向赫序函數 足以代表該病人層記錄的訊息摘要 一種密碼學演算法 (1 4 0 7 )代表獲得的檢查碼(保護封條) (1 5 0 0 ) —份診療層記錄内的所有成員記錄 (1 5 0 1 )表示“連結”功能的圖示 (1 5 0 2 )各成員記錄的識別碼及訊息摘要的連結值 56 200535746 • ( 1 5 0 3 )—種單向赫序函數 (1 5 04 )足以代表該診療層記錄的訊息摘要 (1 5 0 5 )非對稱式密碼法的數位簽章函數 (1 5 0 6 )簽章函數所使用的醫師的簽章私鑰 (1 5 0 7 )代表獲得的數位簽章 (1600)-份 (1601 )表示 一份病人層記錄内的所有成員記錄 表不 連結”功能的圖示 °成貝記錄的識別碼及訊息摘要的連結值(1 3 02) A graphic showing the “link” function (13〇3) The joint value of the identification of the stone horse and the message summary of each member record (1 3 04)-a check code calculation function-a one-way Hertzian function (1 3 05) enough to represent the message summary of the diagnosis and treatment layer records (1 3 06) — a kind of check code calculation function — digital signature method (1 3 07) represents the obtained check code (digital signature) 彳 (1 4 0 0) — all member records (1 4 0 1) in the patient level records are changed (1 4 02) (1 4 03) (1 4 04) (1 4 05) (1406) means “link "The function of the ID of each member record and the connection value of the message digest a check code calculation function-a one-way Hertzian function is sufficient to represent the message digest of the patient layer record a cryptographic algorithm (1 4 0 7) represents Obtained check code (protection seal) (1 500) — all member records (1 50 1) in the medical record (1 50 1) The icon (1 50 2) of each member record And the value of the message digest 56 200535746 • (1 5 0 3) —A one-way Hertzian function (1 5 04) is sufficient to represent the diagnosis and treatment The message digest (1 5 0 5) of the digital signature function (1 5 0 6) of the asymmetric cryptography method (1 5 0 7) represents the obtained digital signature ( 1600) -copy (1601) shows the icon of the function of “unlinking” all member records in a patient-level record.

保麵:封條 (1 6 02 )各 (1603) (1 6 0 4 )足以 (1605) - 瑪法所使用的醫療機構之秘密金瑜 (1606) 對 (1607) ^ 57Face protection: Seals (1 6 02) each (1603) (1 6 0 4) is enough (1605)-the secret of the medical institution used by Marfa Jin Yu (1606) vs. (1607) ^ 57

Claims (1)

200535746 .十、申請專利範圍: 1、—種用於保護數位文件之資料完整性 法,包含: 隹1 將多份數位文件組合為一份複合式文件; :被組合的數位文件建構為上述複合式 貝文件; 員文=算屬於上述循序成員文件之每-成員文利 貝文件檢查碼; &gt; 2算-個屬於該複合式文件的複合式文件檢查碼 儲上述每一成員文件提供個別的持久性記憶體空 储存成貝文件檢查碼; 檢查Ϊ供一個持久性記憶體空間以儲存上述的複合式 杳碼^’這曰裡談到的所有成員文件檢查碼及複合式文 可用於提供驗證資訊以更有效率蚰彳I # Μ + 權的資料變£。 I政羊地债測亚找出未 ► i &gt;申0月專利乾圍第1項所述之用於保護數位文 括:70 “生及正確性的方法,其中’未經授權的資料變 括未經許可而刪除某一成員文件。 —3、如申請專利範圍第i項所述之用於保護數位文 二:完整性及正確性的方法,其中,未經授權的資料變 栝未經許可而增加新的成員文件。 如申請專利範圍第1項所述之用於保護數位文 二完整性及正確性的方法,其中’未經授權的資料變 未經許可而修改某一成員文件的内容。 5如申明專利範圍第1項所述之用於保護數位文 k的方 序成 的成 間以 文件 件檢 經授 件之 更包 件之 更包 件之 更包 件之 58 200535746 •資料完整性及正確性的方法,其中,未經授權的資料變更包 括未經許可而更動成員文件間的次序。 6、如申請專利範圍第1項所述之用於保護數位文件之 資料完整性及正確性的方法,其中,包含: 增加一份新成員文件於該複合式文件中; 計算屬於上述新成員文件的成員文件檢查碼; 提供持久性記憶體空間用於存放上述的新成員文件檢 查碼; 更新所說的複合式文件檢查碼。 • 7、如申請專利範圍第1項所述之用於保護數位文件之 資料完整性及正確性的方法,其中,計算一份成員文件的成 員文件檢查碼,包含下列步驟: 選擇一個單向赫序函數用於計算該份成員文件的數位 指紋值; 使用公開金鑰密碼系統中的簽章私鑰加密上述數位指 紋值以產生數位簽章; 使用上述加密所得的數位簽章作為該成員文件的成員 0 文件檢查碼。 8、如申請專利範圍第1項所述之用於保護數位文件之 資料完整性及正確性的方法,其中,計算所說的複合式文件 檢查碼,包含下列步驟: 為每一份成員文件個別計算一個暫時性檢查碼; 將計算所得的所有成員文件的暫時性檢查碼聚集為一 個暫存記錄; 使用上述暫存記錄來計算該複合式文件檢查碼。 9、如申請專利範圍第8項所述之用於保護數位文件之 資料完整性及正確性的方法,其中,計算一份成員文件的暫 200535746 時性檢查碼,包括使用前述的成員文件檢查碼當作該成員文 件的暫時性檢查碼。 10、 如申請專利範圍第8項所述之用於保護數位文件之 資料完整性及正確性的方法,一份成員文件的暫時性檢查碼 可以是該文件的數位指紋值。 11、 如申請專利範圍第8項所述之用於保護數位文件之 資料完整性及正確性的方法,一份成員文件的暫時性檢查碼 可以是由該文件的數位指紋值加上其序號所組成的一組數 值。 1 2、如申請專利範圍第8項所述之用於保護數位文件之 資料完整性及正確性的方法,一份成員文件的暫時性檢 可以是該文件的數位簽章值。 … 1 3、如申請專利範圍第8項所述之用於保護數位文件之 資料完整性及正確性的方法,一份成員文件的暫時性檢查碼 可以是由該文件的數位簽章值加上其序號所組成的—二數 值。 1 4、如申請專利範圍第8項所述之用於保護數位文件 資料完整性及正確性的方法,—份成員文件的暫時性檢 可以是該文件的保護封條值。 一… 15、如申請專利範圍第8項所述之用於保護數位文 資料完整性及正確性t、、先, 7/V ^ ^ ± 貝 隹注的方法,伤成貝文件的暫時性檢查瑪 可以是由該文件的保護封條值加上其序號所組成的—:數 值。. 、 1 6、如中請專利範圍第8項所述之用於保護數位文 資料完整性及正確性的方法’其中’將所有成員文件的斬日士 性檢查碼聚集為—暫存記錄,包括:將所有成員文件心二 性檢查碼之資料位元聚集為一組位元字串,該位元字 : 60 200535746 照各成員文件於該複合式文 1 7、如申請專利範圍第 資料完整性及正確性的方 員文件檢查碼,包括下列步 選擇一個單向赫序函數 值; 件中被安排的次序來連結產生。 1項所述之用於保護數位文件之 ,其中,計算一份成員文件的成 驟: 用於計异成員文件的數位指紋 使用 查碼。 上述的數位指紋值作為 該成員文件的成員 文件檢 項所述之用於保護數位文件之 其中,計算一份成員文件的成 於汁异成員文件的數位指紋 1 8、如申請專利範圍第1 資料完整性及正確性的方法, 員文件檢查碼,包含下列步驟 選擇一個單向赫序函數用 使用對稱式密石馬μ 1 值以產生保護封條/……”㈣加密上述數位指紋 碼。使用上述的保護封條作為該成員文件的成員文件檢查 1 9、如申請專利範圍第 及正確性的保護方法,、所述之電子病歷資料完整性 複合式文件檢查碼,包含下:使用所說的暫存記錄來計算該 、 匕3下列步驟: 選擇一個單向赫序函倉〜 值; 用於計算暫存記錄的數位指紋 使用公開金鑰密碼系統中 數位指紋值以產生數位簽章· 僉早私鑰加密暫存記錄的 使用所產生的數位簽章作、、 件檢查碼。 〜μ後5式文件的複合式文 2〇、如申請專利範圍第8 、斤Α之用於保護數位文件之 61 200535746 貢料完整性及正確性的方法,其中 計算該複合式文件檢查碼,包含;列…暫存記錄來 值;選擇一個單向赫序函數用於計算暫存記錄的數位指紋 使用上述的數位指紋值作為該 件檢查碼。 彳千的複合式文 2 1、如申請專利範圍第8項所, 資料完整性及正確性的方法,其中,;二縵數位文件之 计异该稷合式文件檢查碼,進一 曰仔记錄來 啦摇一 /ΓΊ卩。 步包含下列步驟·· k擇個早向赫序函數用於計 值; 冲异暫存記錄的數位指紋 使用對稱式密碼系統中 &amp; 值以產生保護封條; ,’'抢盃鑰加密上述數位指紋 .使用上述的保護封條作為該 檢查碼。 、乂彳干的k合式文件 22、一種儲存電子病歷的方法,農 的電子醫療照護記錄組合成且 焫心就醫過程衍生 一個較高層級的多層級竿構之、、〃個弟一層級以及至少另 7曰、及木構之稷合式文人 2 3、如申請專利範圍第2 2項所、* 〇 法,其中,該複合式文件之隹人^ &quot;&quot;之儲存電子病歷的方 二層級的架構中,一份第:〇 、木構可以是二層級;在此 乐一層級文件是於々仪 療及相關資訊的個別電子醫療 “己錄-位病患之醫 是指集合同一位病患之全部的笛叹―5己錄,一份第二層級文件 式文件。 、 層級文件所組成的複合 、24、如申請專利範圍第23項所 法,其中,包含: ’之儲存電子病歷的方 為每一份第一層級文件# 文件Κ固文件識別碼; 62 200535746 為每一位病患指定一個病患 層級文件可以利用一位病患的^別碼1此,每-將一份第一層級文件的文件辱作為其識別碼; 當一份第一層級文件是某〜4馬加入忒文件牛 護記錄,將此病患識別碼加入該…—病患的一份電子 提供記憶體空間以儲存一份層級文件中; 識別碼的第一層級文件。 77 附加文件識別碼 份第二200535746. 10. Scope of patent application: 1. A data integrity method for protecting digital documents, including: 隹 1 combining multiple digital documents into a composite document;: combining the combined digital documents into the above-mentioned compound Documents = member files = check code for each-member Wen Libei file belonging to the above-mentioned sequential member file; &gt; 2 calculation-a compound file check code belonging to the compound file to store each member file above to provide individual Persistent memory is stored as a file check code; Check for a persistent memory space to store the above composite code ^ 'All member file check codes and composite files mentioned here can be used to provide verification Information is changed with more efficient data. I political sheep land debt test Asia to find out ► i &gt; applied for the protection of digital texts described in the first paragraph of the patent Qianwei: 70 "Methods of health and correctness, where 'unauthorized data changes Including the deletion of a member file without permission. —3. The method for protecting digital texts as described in item i of the scope of patent application 2: Integrity and correctness, in which unauthorized data becomes unauthorized. Adding new member documents with permission. As described in item 1 of the scope of patent application for the protection of the integrity and correctness of digital documents, where 'unauthorized data has been modified without permission, Contents: 5 As stated in the first patent scope, the method used to protect the digital sequence k is protected by the document, the more inclusive, the more inclusive, and the more inclusive 58 200535746 • Data integrity And correctness methods, where unauthorized data changes include unauthorized changes to the order among member files. 6. The integrity and correctness of data used to protect digital files as described in item 1 of the scope of patent applications. Fang Method, which includes: adding a new member file to the composite file; calculating the member file check code belonging to the new member file; providing persistent memory space for storing the new member file check code; updating the file Said composite document check code. • 7. The method for protecting the integrity and correctness of data of digital documents as described in item 1 of the scope of patent application, wherein a member file check code of a member file is calculated, including The following steps: Select a one-way Hertzian function to calculate the digital fingerprint value of the member file; use the signature private key in the public key cryptosystem to encrypt the digital fingerprint value to generate a digital signature; use the encryption obtained above The digital signature serves as the member 0 file check code of the member file. 8. The method for protecting the integrity and correctness of the data of the digital file as described in item 1 of the scope of patent application, wherein the composite file is calculated Check code, including the following steps: Calculate a temporary check code for each member file individually; The temporary check codes of all the member files obtained are aggregated into a temporary record; the above-mentioned temporary records are used to calculate the composite file check code. 9. Information for protecting digital files as described in item 8 of the scope of patent applications A method for completeness and correctness, in which a temporary 200535746 temporal check code for a member file is calculated, including using the aforementioned member file check code as a temporary check code for the member file. For the method for protecting the integrity and correctness of the data of a digital document as described in item 1, the temporary check code of a member document may be the digital fingerprint value of the document. 11. As described in item 8 of the scope of patent application In the method of protecting the integrity and correctness of the data of a digital file, the temporary check code of a member file can be a set of values composed of the digital fingerprint value of the file and its serial number. 1 2. According to the method for protecting the integrity and correctness of data of digital documents as described in item 8 of the scope of patent application, the temporary inspection of a member document may be the digital signature value of the document. … 1 3. According to the method for protecting the integrity and correctness of data of digital documents as described in item 8 of the scope of patent application, the temporary check code of a member document may be the digital signature value of the document plus the Its serial number is composed of two values. 14. The method for protecting the integrity and correctness of data of digital documents as described in item 8 of the scope of patent application, the temporary inspection of a member document may be the value of the protection seal of the document. I ... 15. The method used to protect the integrity and correctness of digital data as described in item 8 of the scope of patent application t, first, 7 / V ^ ^ ± Note Note, temporary inspection of damaged documents Ma can be made up of the value of the protection seal of the document plus its serial number: a value. . 16. The method for protecting the integrity and correctness of digital data as described in Item 8 of the Chinese Patent Application 'where' is to aggregate the censorship check codes of all member files into-temporary storage records, Including: Aggregating the data bits of the cardinal sex check code of all member documents into a set of bit strings: 60 200535746 According to each member document in the composite text 17 7. If the information in the patent application scope is complete The check code of the party member file for correctness and correctness includes the following steps to select a one-way Hertzian function value; the order arranged in the file is used to generate the link. The item described in item 1 for protecting digital files, wherein the step of calculating a member file is as follows: The digital fingerprint for distinguishing member files is used to check the code. The above-mentioned digital fingerprint value is used for the protection of the digital file as described in the member file check item of the member file. Calculate the digital fingerprint of a member file that is derived from a different member file. The method of completeness and correctness, the file check code, includes the following steps: Select a one-way Hertzian function to use a symmetric dense Shima μ 1 value to generate a protective seal / ... "㈣ Encrypt the above digital fingerprint code. Use the above The protection seal is used as the member file check of the member file. 19. If the scope of patent application and the correctness of the protection method, the composite document check code of the electronic medical record data integrity, including the following: using the temporary storage Records to calculate the following steps: Select a one-way Hieroglyphic function to the value; Use the digital fingerprint value in the public key cryptosystem to calculate the digital fingerprint of the temporary record to generate a digital signature. 佥 Early private key Digital signatures and inspection codes generated by the use of encrypted temporary records. ~ Μ compound files of the following 5 files, 20 Patent application scope No. 8: Method for protecting the integrity and correctness of digital documents 61, 200535746, in which the composite document check code is calculated, including: columns ... temporary records to value; choose a one-way The ordinal function is used to calculate the digital fingerprint of the temporary record. The above digital fingerprint value is used as the check code for this piece of work. 彳 Thousands of compound texts 2 1. As described in item 8 of the scope of patent application, the method of data integrity and correctness Among them ,; the calculation of the two digital files differs from the combined file check code, and the next step is to record the next one / ΓΊ 卩. The steps include the following steps: k Choose an early Hertzian function for evaluation; The digital fingerprint of the different temporary storage records uses the &amp; value in the symmetric cryptosystem to generate a protective seal; `` Catch the key to encrypt the digital fingerprint. Use the above protective seal as the check code.。 Dry k-combination File 22. A method of storing electronic medical records. The electronic medical care records of farmers are combined and the care process is derived from a higher-level, multi-level structure. Individual brother level and at least the other 7th, and the combination of wooden structure literati 2 3, such as the patent application scope No. 22, * 〇 method, in which the composite document of the person ^ &quot; &quot; storage In the two-level structure of the electronic medical record, a copy of the first: 0, the wooden structure can be a two-level; here the first-level document is an individual electronic medical treatment in Puyi therapy and related information. It refers to the collection of all the flutes of the same patient-5 Jilu, a second-level document. , 24, as described in the 23rd Patent Application, which includes: 'The party that stores electronic medical records is each first-level file # file K solid file identification code; 62 200535746 is Each patient designates a patient-level file can use a patient's ^ 1 code. Therefore, each-treats a file of a first-level file as its identification code; when a first-level file is a certain ~ 4 horses added to the file of cattle protection records, and added this patient identification code to the ...-an electronically provided memory space of the patient to store a level file; the first level file of the identification code. 77 Attached Document ID Second 训甲晴專利範圍第22項 法,置Φ,兮、卜Α τ疋之儲存電子 *具中,该複合式文件集合之 电卞 層級的架構中,一 、冓可以是三層級 及相關資… 件是指記錄-位病 ““甙的個別電子醫療照護記錄 集合多份屬於同一位病电且凰 77 —g .6,.. 位病心且屬於—個診療歷程或 歷私的苐一層文件 狂A . 又仟所,·且成的複合式文件;—份 疋集合屬於同一位病患之全部的第—層級文件:: 文件所組成的複合式文件。 jThe 22nd method of Xun Jiaqing's patent scope is placed in the storage electronics of Φ, Xi, and Α τ 疋. In the structure of the electric file hierarchy of the composite file collection, the first and second files can be three layers and related information ... The file refers to the individual electronic medical care records of the record-position "" glycosides. The collection of multiple copies belongs to the same patient and the 77-g .6 ,..狂 A. It's a compound file;-a set of first-level files that all belong to the same patient: a compound file composed of files. j 26、如申請專利範圍第25項所述之 法,其中,包含: 兩仔甩子病 為每一份第一層級文件指定一個文件識別碼; 為每一份第二層級文件指定一個診療識別碼; 為每一位病患指定一個識別碼,因此,每—份第 文件可以利用一位病患的識別碼作為其識別碼; 將一份第一層級文件的文件識別碼加入該文件中 當一份第一層級文件是某一位病患的一份電子 護§己錄,將此病患識別碼加入該第一層級文件中· 醫療照 及病患 歷的方 在此三 之醫療 文件是 個診療 級文件 二層級 歷的方 當一份第一層級文件為一份第二層級文件的 員’則將該第二層級文件的診療識別碼加入該第〜居 中; S 二層級 , &amp;療照 i成成 &amp;文件 63 200535746 提供記憶體空間以儲存1已附加文件識別碼、診. 別碼及病患識別碼的第一層級文件。 發識 法 27、 如申請專利範圍第24項所述之铸存電子 其中,包含·· 万 依照文件識別碼取回—份第一層級文件; 依照病患識別碼取回該病患全部的第—層級文件. 根據病患的識別碼及限制條件取回屬於該病患且人 該限制條件的卜層級文件,此處所謂的限制資料可以是: 院期間、門診時間或看診科別等。 、 28、 如申請專利範圍第26項所述之 法,其中,包含: 〈錯存電子病歷的方 依照文件識別碼取回一份第一層級文件· 依照診療識別碼取回歸屬於@ 一 , 部的第一層級文件,· 層、級文件之全 依照病患識別瑪取回該病患全部的第_層級文件. 根據病患識別碼及限制條件取 θ ’ 限制條件Μ -層級,文件,此處所於相患且符合該 期間、Η料間或看診^的限㈣件可以是住院 包含2:9、—種保護電子病歷之資料完整性及正確性的方法, 將多份與一位病患有關之電子 份複合式電子病歷; 蜃…、錄組合為一 將被組合的電子醫療照護記錄建構為± if ;^人* + 病歷的循序成員記錄; 遷構為上切合式電子 。個別計算屬於上述循序成員記錄之每 貝記錄檢查碼; 战貝圯錄的成 使用上述計算所得的全部成員記錄檢查碼,計算一個屬 64 200535746 於上述複合式電子病歷的複合式記錄檢查碼; 為上述每一成員記錄提供個別的持久性記憶體空間以 儲存成員記錄檢查碼; ,、 持久性冗憶體空間以儲存上述的複合式記錄 檢查碼; 、言裡a到的所有成員記錄檢查碼及複合式記錄檢 查碼可用於提供给&amp; /、&quot;姐貢訊以更有效率地偵測並找出未經授 權的資料變更。 30、 如申請專利範圍第29項所述之保護 料完整性及正禮性的方法,其中,包含: 此之貝 曰加知新成員記錄於該複合式電子病歷中; 言:算屬於上述新成員記錄的成員記錄檢查碼; 提供持久性記情妙处Μ 查碼丨 ^間詩存放上述的新以記錄檢 更新上述複合式記錄檢查碼。 31、 如申請專利範圍第29項所 料完整性及正確性的方+ ., 保墁電子病歷之貧 …,可以::法,其中’成員記錄檢查瑪的-部份 次王卩可以根據以下步驟計算而得,包括·· 選擇-個單向赫序函數用於 . 值; 乂貝纪錄的數位指紋 使用上述的數位指紋值作 杳碼,&lt; 者|帛 、。己錄的成員記錄檢 為該成員記錄的成員記錄檢查石馬。、‘。成貝記錄之識別碼作 32、如申請專利範圍第29項所述 料完整性及正確性的方法,1中,^ 獲電子病歷之資 4全邱,矸α拍缺” ’、 成貝兄錄檢查碼的一部份 次王4可以根據以下步驟計算而得,包括·· 選擇一個單向赫序函數用於曾二 w 貝冗錄的數位指紋 200535746 值 值的秘密金“密上 使用上述的保護封 碼,&lt; 者#用t ^ $成員記錄&amp; I 次者使用上述的保護封。f的成員記 成員記锃的成g b Μ,, ' 4、°口成員記錳十Μ、_ 述數位指紋 錄檢查 成員記錄的成員記錄檢查石馬 料?3、如申請專利範圍第29項所过之&lt; 枓元整性及正確性的方 厅述之保護電子病 或全部’可以根據以 :貝:錄檢查碼的 選擇-個單向赫 十:而许’包括: W纾函數用於計算成員 貝5己錄的數位指紋 使用非對稱式密喝系統 紋值以產生數位簽章; *鱼鑰加密上述數位指 碼使用上述的數位簽章作為該成員記釺的点… 碼,或者使用上述的數 、/己錄的成…檢查 成員記錄的成員記錄檢查^ 貝5己錄之識別碼作為該 3 4如申凊專利範圍第if + 料完整性及正確性的方本 員所述之保護電子病歷之資 查碼,包含下列步驟,,其中,計算所說的複合式記錄檢 將所有成員記錄的檢查碼聚集為―個暫存記錄;使用上返暫存記錄來計算該複合式記錄檢查碼。 ;35、如申請專利範圍第29頊所述之保護電子病歷之資 Γ斗心整性及正確性的方法,其中,將所有成員記錄的檢查碼 I市為一暫存記錄,包括:將所有成員記錄的檢查碼之資料 仇7L聚集為一組位元字串,該位元字串是依照各成員記錄於 4设合式電子病歷中被安排的次序來連結產生。 錄之識別碼作為該 值; 6626. The method as described in item 25 of the scope of patent application, which comprises: two children's disease designating a file identification code for each first-level document; specifying a diagnosis identification code for each second-level document ; Specify an identification code for each patient, therefore, every one document can use the identification code of a patient as its identification code; add a file identification code of the first-level document to the file as a A first-level document is an electronic nursing record of a patient, and the patient identification code is added to the first-level document. The medical photo and patient history are the three medical documents. If the first-level document is a member of the second-level document, then the diagnosis and treatment identification code of the second-level document is added to the first to the middle; S second-level, &amp; 医 照 i Chengcheng &amp; Document 63 200535746 Provides memory space to store 1st level documents with attached Document ID, Diagnostic ID and Patient ID. Identification Law 27. The foundry electronics as described in item 24 of the scope of patent application, which includes: · Retrieving according to the document identification code-a first-level document; Retrieving all the patient's first —Hierarchical documents. Retrieve the hierarchical documents that belong to the patient and the restriction conditions according to the patient's identification code and restrictions. The so-called restriction data can be: hospital period, outpatient time or visiting department. 28. The method as described in item 26 of the scope of patent application, which includes: <The party who misstored the electronic medical record retrieves a first-level document according to the file identification code. • The return according to the diagnosis identification code belongs to @ 一 , 部The first level files of the · All the level and level files are retrieved according to the patient's identification. All the first level files of the patient are retrieved. According to the patient identification number and restrictions, θ 'Constraints M-level, files, this The premises may be in hospital and meet the limit of the period, material room or visit ^. The hospitalization can include 2: 9, a method to protect the integrity and correctness of the electronic medical record data. A composite electronic medical record related to the disease; 蜃 ..., record combination is a combined electronic medical care record constructed as ± if; ^ person * + sequential member record of the medical record; restructured as a top-cut electronic. Calculate the check code for each record that belongs to the above sequential member records individually; use the check records for all member records obtained from the above calculation to calculate a composite record check code that belongs to the above-mentioned composite electronic medical record of 64 200535746; Each of the above member records provides a separate persistent memory space to store the member record check code; and, a persistent redundant memory space to store the composite record check code described above; and all member record check codes to The composite record check code can be used to provide & /, &quot; sister Gongxun to more efficiently detect and find unauthorized data changes. 30. The method for protecting the integrity and courtesy of a material as described in item 29 of the scope of the patent application, which includes: The new member of the Jiazhi Jiazhi is recorded in the composite electronic medical record; Member record check code for member records; Provide persistent memory and beauty code M check code ^ ^ Poetry stores the above new record check code to update the composite record check code. 31. As for the completeness and correctness as expected in item 29 of the scope of patent application +., To protect the poor electronic medical records ..., you can :: law, where 'member records check Ma-part of the sub-king can be based on the following Calculated from the steps, including: selecting a one-way Hertzian function for. Value; the digital fingerprint of the 乂 shell record uses the above digital fingerprint value as the 杳 code, &lt; or | 帛,. Recorded member record check Checks the member record for this member record. , ‘. Chengbei record identification code is 32, as described in item 29 of the scope of patent application for completeness and correctness of the method, 1 in ^ obtained electronic medical records 4 Quan Qiu, 矸 α shot missing "", Chengbei brother A part of the second check 4 of the check code can be calculated according to the following steps, including ... Selecting a one-way Hertzian function for the digital fingerprint 200535746 of the digital fingerprint that was redundantly recorded Protection code, &lt; 者 # 用 t ^ $ member record &amp; I use the above protection seal. The member record of f is g BM, and the number of members is 10, and the digital fingerprint is checked. The member record is checked by the member record. 3. If the protection of electronic diseases or all of the "the integrity and correctness of the Fang Yuanzheng" described in item 29 of the scope of the application for patent can be based on: the choice of the check code-a one-way check: Xu's function includes: The W function is used to calculate the digital fingerprint of the member 5 recorded using the asymmetrical drink system texture value to generate a digital signature; * The above-mentioned digital signature is encrypted by the fish key using the digital signature described above. The point of the member record ... code, or use the above number, / recorded to check the member record of the member record check ^ 5 The recorded code of the record is used as the 3 4 as claimed in the patent scope if + material integrity And the correctness of the code for protecting the electronic medical records described by the member, including the following steps, in which the calculation of the composite record check gathers the check codes of all member records into a temporary record; use it Return the temporary record to calculate the composite record check code. 35. The method for protecting the integrity and correctness of electronic medical records as described in the scope of application patent No. 29 顼, wherein the check code I of all member records is a temporary record, including: The data of the check codes of the member records are collected as a set of bit strings, and the bit strings are connected and generated according to the order in which each member record is arranged in the 4 set electronic medical record. The recorded identification code is used as the value; 66
TW94124845A 2005-07-22 2005-07-22 A method for protecting information integrity TW200535746A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW94124845A TW200535746A (en) 2005-07-22 2005-07-22 A method for protecting information integrity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW94124845A TW200535746A (en) 2005-07-22 2005-07-22 A method for protecting information integrity

Publications (2)

Publication Number Publication Date
TW200535746A true TW200535746A (en) 2005-11-01
TWI297873B TWI297873B (en) 2008-06-11

Family

ID=45069229

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94124845A TW200535746A (en) 2005-07-22 2005-07-22 A method for protecting information integrity

Country Status (1)

Country Link
TW (1) TW200535746A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8380937B2 (en) 2005-11-28 2013-02-19 International Business Machines Corporation System for preventing unauthorized acquisition of information and method thereof
TWI407326B (en) * 2009-09-11 2013-09-01 Condel Internat Technologies Inc Systems and methods for locally generating license and activating drm agent, and related storage devices
TWI514310B (en) * 2014-06-27 2015-12-21 Secureinside Com Co Ltd Method for generating electronic transcript and withdrawing verification of electronic transcript, and method for generating verification code of electronic transcript
TWI805438B (en) * 2022-07-08 2023-06-11 中華電信股份有限公司 Management system and management method for access authorization of electronic document
TWI807041B (en) * 2018-06-05 2023-07-01 日商電子技巧股份有限公司 Message processing device, message processing method, message processing program, and message processing system
TWI809639B (en) * 2021-12-30 2023-07-21 高雄榮民總醫院 System for data packaging

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI778361B (en) * 2020-05-18 2022-09-21 天逸財金科技服務股份有限公司 Distributed digital signature processing method and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8380937B2 (en) 2005-11-28 2013-02-19 International Business Machines Corporation System for preventing unauthorized acquisition of information and method thereof
TWI405094B (en) * 2005-11-28 2013-08-11 Ibm System for preventing unauthorized acquisition of information, and method thereof
US8881298B2 (en) 2005-11-28 2014-11-04 International Business Machines Corporation System for preventing unauthorized acquisition of information and method thereof
TWI407326B (en) * 2009-09-11 2013-09-01 Condel Internat Technologies Inc Systems and methods for locally generating license and activating drm agent, and related storage devices
TWI514310B (en) * 2014-06-27 2015-12-21 Secureinside Com Co Ltd Method for generating electronic transcript and withdrawing verification of electronic transcript, and method for generating verification code of electronic transcript
TWI807041B (en) * 2018-06-05 2023-07-01 日商電子技巧股份有限公司 Message processing device, message processing method, message processing program, and message processing system
TWI809639B (en) * 2021-12-30 2023-07-21 高雄榮民總醫院 System for data packaging
TWI805438B (en) * 2022-07-08 2023-06-11 中華電信股份有限公司 Management system and management method for access authorization of electronic document

Also Published As

Publication number Publication date
TWI297873B (en) 2008-06-11

Similar Documents

Publication Publication Date Title
Sittig et al. Legal, ethical, and financial dilemmas in electronic health record adoption and use
US10931437B2 (en) System and method for healthcare security and interoperability
CN108573737A (en) A kind of storage method of electronic health record, device, equipment and storage medium
Ouma et al. Health coverage and what Kenya can learn from the COVID-19 pandemic
TW200535746A (en) A method for protecting information integrity
Weber et al. Oncoshare: lessons learned from building an integrated multi-institutional database for comparative effectiveness research
Rosenthal et al. Clinical and professional ethics guidelines for the practice of thyroidology
Sajayan et al. Analysis of a national difficult airway database
Jain et al. Blockchain and machine learning in health care and management
De Lusignan et al. A comparison of English and French approaches to providing patients access to Summary Care Records: scope, consent, cost
CN113254967A (en) Standardization method of medical digital image cloud system
Mayo et al. Treatment data and technical process challenges for practical big data efforts in radiation oncology
US20100114781A1 (en) Personal record system with centralized data storage and distributed record generation and access
CA3043882A1 (en) Techniques for limiting risks in electronically communicating patient information
Poonguzhali et al. A framework for electronic health record using blockchain technology
Rae et al. System performance indicators for adolescent and young adult cancer care and control: a scoping review
Schechter et al. ACR–ASTRO Practice Parameter for Communication: Radiation Oncology
Grond et al. Oral corticosteroid use and the risk of developing avascular necrosis: A large retrospective review
Agrawal et al. Integrated electronic health record system in a tertiary care centre: a single centre implementation experience
Deborah et al. Blockchain: a possible alternative to achieving health information exchange (hie)
Singh et al. An interpretive study of stakeholders’ privacy issues in blockchain: a healthcare context
Alyami Toward patient-centered personal health records systems to promote evidence-based decision-making and information sharing
Saeed et al. ACR–ARS Practice Parameter for Communication: Radiation Oncology
Marshall et al. Improving pain management for children having dental extractions under general anaesthesia
Cohen Medical-Legal: Attorney's Perspective

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees