WO2020034101A1 - 体外诊断设备的软件登录方法、设备、服务器及存储介质 - Google Patents

体外诊断设备的软件登录方法、设备、服务器及存储介质 Download PDF

Info

Publication number
WO2020034101A1
WO2020034101A1 PCT/CN2018/100488 CN2018100488W WO2020034101A1 WO 2020034101 A1 WO2020034101 A1 WO 2020034101A1 CN 2018100488 W CN2018100488 W CN 2018100488W WO 2020034101 A1 WO2020034101 A1 WO 2020034101A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
authorization code
vitro diagnostic
diagnostic device
random
Prior art date
Application number
PCT/CN2018/100488
Other languages
English (en)
French (fr)
Inventor
肖利琼
Original Assignee
深圳迈瑞生物医疗电子股份有限公司
深圳迈瑞科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳迈瑞生物医疗电子股份有限公司, 深圳迈瑞科技有限公司 filed Critical 深圳迈瑞生物医疗电子股份有限公司
Priority to PCT/CN2018/100488 priority Critical patent/WO2020034101A1/zh
Priority to CN201880094950.1A priority patent/CN112335211B/zh
Publication of WO2020034101A1 publication Critical patent/WO2020034101A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A90/00Technologies having an indirect contribution to adaptation to climate change
    • Y02A90/10Information and communication technologies [ICT] supporting adaptation to climate change, e.g. for weather forecasting or climate simulation

Definitions

  • the present invention relates to the field of medical technology, and in particular, to a software login method, device, server, and storage medium of an in vitro diagnostic device.
  • the software of the in vitro diagnostic device is registered with a user name and password, and the user name and password are fixed.
  • the software of the in vitro diagnostic device is registered at the hospital, among doctors, between doctors and other colleagues.
  • the username and password are not kept secret from each other. Once the username and password are leaked, the accuracy of the measurement of the instrument sample and the closedness of compatible reagents will cause great security risks.
  • embodiments of the present invention are expected to provide a software login method, device, server, and storage medium for an in vitro diagnostic device, which can improve the security of the in vitro diagnostic device.
  • an embodiment of the present invention provides a software login method for an in vitro diagnostic device, including:
  • the random authorization code has a set timeliness and is calculated by the server based on the user identification;
  • the software of the in vitro diagnostic device is successfully logged in, and the corresponding operation authority is enabled according to the user ID.
  • the performing user identity verification corresponding to the user identity based on the random authorization code includes:
  • the user identity corresponding to the user identity is verified.
  • the analysis result further includes: an authorization level corresponding to the user identity
  • enabling the corresponding operation authority according to the user identity includes:
  • the method further includes:
  • the receiving a random authorization code for software login includes:
  • an embodiment of the present invention further provides a software login method for an in vitro diagnostic device, which is applied to a server, and the method includes:
  • the random authorization code is used by the in vitro diagnostic device to perform user identity verification corresponding to the user identifier based on the random authorization code, and when the verification is passed, the software of the in vitro diagnostic device is successfully logged in, and according to the The user ID enables the corresponding operation authority.
  • the calculating a time-based random authorization code based on the user identity includes:
  • the user identification, time information, and random number are encoded and calculated to obtain a random authorization code with timeliness.
  • the calculating a time-based random authorization code based on the user identity includes:
  • the authorization level corresponding to the user ID is used by the in vitro diagnostic device to enable an operation authority for a function corresponding to the authorization level.
  • the method further includes:
  • a random authorization code with timeliness is calculated by coding.
  • the method further includes:
  • the random authorization code is sent to a user terminal that sends the user identification.
  • an embodiment of the present invention further provides an in vitro diagnostic device, including:
  • a first receiving unit configured to receive a random authorization code for software login; the random authorization code has a set timeliness and is calculated by the server based on a user identifier;
  • a verification unit configured to perform user identity verification corresponding to the user identity based on the random authorization code
  • the login unit is configured to successfully log in to the software of the in vitro diagnostic device when authentication is passed, and enable corresponding operation authority according to the user ID.
  • the verification unit is further configured to parse the random authorization code to obtain a analysis result including the user identifier
  • the user identity corresponding to the user identity is verified.
  • the analysis result further includes: an authorization level corresponding to the user identity
  • the login unit is further configured to enable an operation authority of a function corresponding to the authorization level in the external diagnosis device.
  • the in vitro diagnostic equipment further includes:
  • a first collection unit configured to collect biometric information
  • a matching unit configured to match the collected biometric information with the stored biometric information corresponding to the user identifier
  • the first receiving unit is further configured to receive a random authorization code for software login input by a user
  • an embodiment of the present invention further provides a server, including:
  • a second receiving unit configured to receive a user identifier sent
  • a calculation unit configured to calculate a time-based random authorization code based on the user identification
  • the random authorization code is used by the in vitro diagnostic device to perform user identity verification corresponding to the user ID based on the random authorization code, and when the verification is passed, the software of the external diagnostic device is successfully logged in, and according to the The user ID enables the corresponding operation authority.
  • the calculation unit is further configured to encode and calculate the user identifier, time information, and a random number to obtain a random authorization code with timeliness.
  • the calculation unit is further configured to encode and calculate the user ID, an authorization level corresponding to the user ID, time information, and a random number to obtain a random authorization code with timeliness;
  • the authorization level corresponding to the user ID is used by the in vitro diagnostic device to enable an operation authority for a function corresponding to the authorization level.
  • the server further includes a second acquisition unit
  • the second collection unit is configured to collect biometric information
  • the calculation unit is further configured to encode and obtain a time-based random authorization code based on the collected biometric information and the user identifier.
  • the server further includes:
  • a sending unit configured to send the random authorization code to the in vitro diagnostic device
  • the random authorization code is sent to a user terminal that sends the user identification.
  • an embodiment of the present invention further provides an in vitro diagnostic device, including:
  • Memory for storing executable instructions
  • the processor is configured to implement a software login method of the in vitro diagnostic device described in the embodiment of the present invention when executing executable instructions stored in the memory.
  • an embodiment of the present invention further provides a server, including:
  • Memory for storing executable instructions
  • the processor is configured to implement a software login method of the in vitro diagnostic device described in the embodiment of the present invention when executing executable instructions stored in the memory.
  • an embodiment of the present invention further provides a storage medium that stores executable instructions.
  • the method is used to implement a software login method for the in vitro diagnostic device described in the embodiment of the present invention.
  • the software login method, device, server and storage medium applying the in vitro diagnostic equipment provided by the embodiments of the present invention have the following beneficial technical effects:
  • the user's identity verification is based on a random authorization code with timeliness, and the timeliness can be set based on actual needs, such as 2 minutes. After the user logs in with the random authorization code, it will expire in a short time, which is equivalent to One-time authorization code, which greatly enhances the software login security of in vitro diagnostic equipment;
  • the corresponding operation authority is opened according to the user ID, that is, different users have different operation authorities, and different users can use different functions of in vitro diagnostic equipment.
  • the function and use of diagnostic equipment are protected and restricted. Even if the user logs in to the software of the in vitro diagnostic equipment, he / she cannot use each function at will, which enhances the safety of the in vitro diagnostic equipment.
  • FIG. 1 is a schematic flowchart of a software login method for an in vitro diagnostic device according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a software login principle of an in vitro diagnostic device according to an embodiment of the present invention
  • FIG. 3 is a second flowchart of a software login method of an in vitro diagnostic device according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of a software login system of an in vitro diagnostic device according to an embodiment of the present invention.
  • FIG. 5A is a first schematic interface diagram of a software login client for external diagnostic equipment to perform registration according to an embodiment of the present invention
  • FIG. 5B is a second schematic diagram of an interface for software to log in to a client for registration of an external diagnostic device according to an embodiment of the present invention
  • FIG. 6 is a third flowchart of a software login method of an in vitro diagnostic device according to an embodiment of the present invention.
  • FIG. 7 is a fourth flowchart of a software login method of an in vitro diagnostic device according to an embodiment of the present invention.
  • FIG. 8 is a first schematic structural diagram of a composition of an in vitro diagnostic device according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a server according to an embodiment of the present invention.
  • FIG. 10 is a second schematic diagram of the composition and structure of an in vitro diagnostic device according to an embodiment of the present invention.
  • the terms “including”, “including” or any other variants thereof are intended to cover non-exclusive inclusion, so that a method or device including a series of elements includes not only the explicitly recorded Elements, but also other elements not explicitly listed, or elements inherent to the implementation of the method or device.
  • the element limited by the sentence "including a " does not exclude that there are other related elements (such as steps in the method or units in the device) in the method or device including the element.
  • the unit here can be part of the circuit, part of the processor, part of the program or software, etc.).
  • first ⁇ second involved in the embodiment of the present invention merely distinguishes similar objects, and does not represent a specific ordering of objects. It is understandable that “first ⁇ second” is permitted You can interchange specific order or order. It should be understood that the objects of the "first ⁇ second" distinction may be interchanged where appropriate, so that the embodiments of the invention described herein can be implemented in an order other than those illustrated or described herein.
  • FIG. 1 is a schematic flowchart of a software login method for an in vitro diagnostic device according to an embodiment of the present invention.
  • a software login method for an in vitro diagnostic device according to an embodiment of the present invention includes:
  • Step 101 the in vitro diagnostic device receives a random authorization code for software login; the random authorization code has a set timeliness and is calculated by the server based on the user identification.
  • the in-vitro diagnostic device may receive a random authorization code for software login by receiving a random authorization code for software login input by a user. That is, after the server obtains the random authorization code based on the user identification, the user obtains the random authorization code from the server. For example, the user receives the random authorization code sent by the server through the terminal, and then the user manually enters the external diagnostic equipment.
  • the IVD device does not need to communicate with the server, that is, the IVD device can work without a network connection, which enhances the device security.
  • the in-vitro diagnostic device may receive a random authorization code for software login by receiving a random authorization code for software login sent by a server. That is, the server has established a network connection with the IVD device. After the server obtains a random authorization code based on the user ID, it can directly send the generated random authorization code to the IVD device. In this way, the user does not need to manually enter a random authorization code, which improves In order to improve the efficiency of user authentication, the user experience is good.
  • the timeliness of the random authorization code can be set according to actual needs, to ensure that the user can complete the software login within a valid time, and can expire within a short time after completing the software login.
  • the effective length of the random authorization code can be set by referring to the time that the user has completed the software login one time. Taking into account the actual situation of the user login, the effective length of the random authorization code can be set to the time that the user completed the software login one time. An integer multiple (for example, 2 times). For example, if the time for a user to complete the software login is 1 minute through statistics, the effective length of the random authorization code can be set to 2 minutes.
  • the software of the external diagnosis device may be system software or application software of the external diagnosis device.
  • the server may calculate a random authorization code by:
  • the server encodes the user identification, time information, and random numbers to obtain a random authorization code with timeliness.
  • the user identifier may be information that uniquely identifies the user, such as a doctor's work number, a user's mobile phone number, a mailbox name, and the like.
  • a user may send his or her own user identification to the server through a terminal.
  • a client having software services corresponding to an in vitro diagnostic device installed on the terminal, and the user enters a user ID and a mobile phone number through the client.
  • the server side stores user information corresponding to the user ID, such as name and level; for another example, the user can follow the in vitro diagnosis through the terminal
  • the public number of the software service of the device Enter the user ID and mailbox through the public number page, submit it to the server, and complete the binding of the user ID and the mailbox on the server side to complete the user registration.
  • performing the encoding calculation may be a hash calculation and generate timeliness.
  • the random authorization code calculated by the server is obtained by the in vitro diagnostic equipment, the corresponding decoding method is used to perform the decoding calculation to obtain the user ID and encoding time for user identity verification. Due to the encoding calculation process of the random authorization code A random number is added to the random authorization code generated each time, which avoids the problem of password leakage and greatly enhances the security of in vitro diagnostic equipment.
  • the server may also calculate and obtain a random authorization code in the following manner:
  • the user ID, the authorization level corresponding to the user ID, time information, and a random number are coded to obtain a random authorization code with timeliness.
  • the authorization level corresponding to the user ID is used to enable the in-vitro diagnostic device to operate the function corresponding to the authorization level; for example, if the user's authorization level is Level 1, after the user successfully logs in, he can Use the basic functions (such as function ac) of the corresponding in vitro diagnostic equipment. If the user's authorization level is Level 2, the user can not only use the basic functions corresponding to the first level of in vitro diagnostic equipment, but also Use functions other than basic functions (such as function de).
  • the server may also calculate and obtain a random authorization code in the following manner:
  • the biometric information collection performed by the server may be facial feature collection, fingerprint information collection, etc.
  • a user performs facial feature collection and fingerprint information collection through a terminal and sends the fingerprint information collection to the server.
  • the biometric information is added in the process of calculating the random authorization code, so that each time the user obtains the random authorization code, it must be ensured that the user can obtain it. This prevents other users from using the user's mobile phone to obtain random authorization after the loss of the mobile phone. The situation of code appears, which greatly enhances the security.
  • Step 102 Perform user identity verification corresponding to the user identity based on the random authorization code.
  • the in-vitro diagnostic device may perform user identity verification corresponding to a user identity in the following manner:
  • the random authorization code is parsed to obtain the analysis result including the user ID; the parsed user ID is matched with the stored user ID; it is determined that the user identity corresponding to the user ID passes the verification when the matching is successful.
  • the analysis result further includes: an authorization level corresponding to the user ID. Accordingly, when the in vitro diagnostic device enables the corresponding operation authority according to the user ID, the function corresponding to the authorization level in the external diagnostic device is enabled. Operation permissions.
  • FIG. 2 is a schematic diagram of a software login principle of an in vitro diagnostic device according to an embodiment of the present invention. Referring to FIG. 2, the in vitro diagnostic device includes a functional module 1 to a functional module m, and each functional module can implement at least one corresponding function, such as the functional module 1 Functions 1.1 to 1.n can be implemented. The functions implemented by each module correspond to different authorization levels. For example, the functions implemented by function module 1 correspond to authorization level 1, and the functions implemented by function module 2 correspond to authorization level 2.
  • functions implemented by multiple function modules may correspond to one authorization level.
  • functions implemented by function modules 1 to 3 correspond to one authorization level.
  • the in-vitro diagnostic device after the in-vitro diagnostic device is verified based on the random authorization code, it can be further verified based on the user's biometric information.
  • the in-vitro diagnostic device collects biometric information; The feature information is matched with the stored biometric information of the corresponding user identification; based on the matching result, it is determined whether to log in the software of the in vitro diagnostic device.
  • the software of the in vitro diagnostic device may be allowed to log in, otherwise it is not allowed Log in to the software of the IVD device.
  • Step 103 If the verification succeeds, successfully log in to the software of the in vitro diagnostic device, and enable the corresponding operation authority according to the user ID.
  • FIG. 3 is a schematic flowchart of a software login method of an in vitro diagnostic device according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of a software login system of an in vitro diagnostic device according to an embodiment of the present invention.
  • Software registration methods for the provided in vitro diagnostic equipment include:
  • Step 201 The user logs in to the client for registration through the software of the in vitro diagnostic device.
  • FIG. 5A is a schematic diagram of an interface for software registration of a client of an external diagnostic device for registration according to an embodiment of the present invention.
  • the client can directly send a request instruction to obtain the random authorization code returned by the server.
  • the request instruction carries user identification information ( (Such as user ID, name, mobile phone number, email address, etc.), the server generates an authorization code based on the user identification information after receiving the request instruction.
  • Step 202 The user terminal receives a random authorization code sent by the server.
  • the server can perform random encoding based on the user identification, authorization level, encoding time, and random number to generate a random authorization code.
  • the user terminal may receive the random authorization code sent by the server through a short message, and may also receive through a message notification.
  • the embodiment of the present invention is not limited to the receiving mode.
  • Step 203 The user manually inputs the random authorization code received by the terminal on the in vitro diagnostic device.
  • Step 204 The in vitro diagnostic device performs user identity verification according to the input random authorization code, and determines whether the verification is passed. If the verification is passed, step 205 is performed; if the verification is not passed, step 206 is performed.
  • the in-vitro diagnostic equipment performs user authentication in the following manner:
  • the in vitro diagnostic device parses the random authorization code to obtain the user ID, authorization level, and encoding time information; matches the parsed user ID with the user ID stored by it; determines that the user identity corresponding to the user ID passes the verification when the match is successful, and matches When it fails, the user authentication of the corresponding user ID fails.
  • the parsed encoding time is used by the in vitro diagnostic device to calculate the validity time of the random authorization code.
  • the in vitro diagnostic device calculation starts from the encoding time and expires after two minutes, that is, That is to say, if the in vitro diagnostic equipment is parsed, even if the user ID matches successfully, the random authorization code has been invalidated by calculation, and the verification is judged to fail.
  • Step 205 Successfully log in the software of the in vitro diagnostic device, and enable the operation authority of the function corresponding to the authorization level in the in vitro diagnostic device.
  • Step 206 End this processing flow.
  • FIG. 6 is a schematic flowchart of a software login method for an in vitro diagnostic device according to an embodiment of the present invention.
  • a software login method for an in vitro diagnostic device according to an embodiment of the present invention includes:
  • Step 301 The terminal receives the work number input by the user and collects user fingerprint information.
  • the terminal may enter a user ID and collect fingerprint information through a page of a related client or a related public number of interest.
  • Step 302 The terminal sends the user ID and fingerprint information to the server.
  • the server stores user information corresponding to the user ID, such as the user name, the user's fingerprint information, the corresponding authorization level, and the corresponding mobile phone number.
  • Step 303 The server generates a random authorization code based on the user ID and fingerprint information.
  • the server can generate a random authorization code in the following way:
  • the authorization level corresponding to the user ID is searched, and the user ID, fingerprint information, encoding time, authorization level, and random number are hash-coded to generate a random authorization code.
  • Step 304 The server sends a random authorization code to the in vitro diagnostic device.
  • Step 305 The IVD device analyzes the random authorization code, and determines whether to log in to the software of the IVD device based on the analysis result.
  • the in vitro diagnostic equipment can obtain the user ID, fingerprint information, encoding time, and authorization level by analyzing the random authorization code; the obtained user ID and fingerprint information are respectively stored with the user ID and the corresponding The fingerprint information is matched.
  • the software of the external diagnostic equipment is allowed to log in, and the operation permission of the function corresponding to the authorization level in the external diagnostic equipment is enabled; if at least one of the user ID and fingerprint information matches In case of failure, it is not allowed to log in to the software of the IVD device.
  • FIG. 7 is a schematic flowchart of a software login method for an in vitro diagnostic device according to an embodiment of the present invention.
  • a software login method for an in vitro diagnostic device according to an embodiment of the present invention includes:
  • Step 401 The terminal sends the user ID to the server.
  • the terminal can enter the user ID through the page of the relevant client or the relevant public account concerned, and send it to the server.
  • Step 402 The server generates a random authorization code based on the user ID and returns it to the terminal.
  • the server stores user information corresponding to the user ID, such as the user name and the corresponding mobile phone number.
  • the server may send a random authorization code to the terminal corresponding to the mobile phone number by a short message.
  • the terminal where the user sends the user ID and the terminal where the mobile phone number stored on the server is the same terminal, or the terminal where the mobile phone number stored on the server is also placed next to the user in order to view the random authorization code sent by the server.
  • the server can generate a random authorization code in the following ways:
  • the server After the server obtains the user ID, it searches for the authorization level corresponding to the user ID, and performs hash encoding calculation on the user ID, encoding time, and random number to generate a random authorization code.
  • Step 403 The user manually inputs the random authorization code received by the terminal on the in vitro diagnostic device.
  • Step 404 The in vitro diagnostic device performs user identity verification according to the input random authorization code, and determines whether the verification is passed. If the verification is passed, step 405 is performed; if the verification is not passed, step 407 is performed.
  • the in-vitro diagnostic equipment performs user authentication in the following manner:
  • the in vitro diagnostic equipment parses the random authorization code to obtain the user ID, authorization level, and encoding time information; matches the parsed user ID with the user ID stored by it; determines the identity of the user corresponding to the user ID when the match is successful The authentication is passed. When the matching fails, the user authentication of the corresponding user ID fails.
  • the parsed encoding time is used by the in vitro diagnostic device to calculate the validity time of the random authorization code.
  • the in vitro diagnostic device calculation starts from the encoding time and expires after two minutes, that is, That is to say, if the in vitro diagnostic equipment is parsed, even if the user ID is successfully matched, the random authorization code has been invalidated by calculation, and the verification is judged to fail.
  • Step 405 The in-vitro diagnostic device collects the user's facial feature information, and matches the collected facial feature information with the stored information to determine whether the match is successful. If the match is successful, go to step 406; if the match fails, go to step 407.
  • Step 406 The software of the IVD device is successfully logged in, and the operation authority of the function corresponding to the authorization level of the user ID in the IVD device is enabled.
  • the in vitro diagnostic device stores an authorization level corresponding to the user's work ID. After the in vitro diagnostic device successfully matches the facial features of the user, the authorization level corresponding to the user's work ID can be turned on. Operational permissions for functions
  • Step 407 End this processing flow.
  • FIG. 8 is a schematic structural diagram of an in vitro diagnostic device according to an embodiment of the present invention.
  • an in vitro diagnostic device provided by an embodiment of the present invention includes:
  • the first receiving unit 81 is configured to receive a random authorization code for software login; the random authorization code has a set timeliness and is calculated by the server based on the user identifier;
  • a verification unit 82 configured to perform user identity verification corresponding to the user identity based on the random authorization code
  • the login unit 83 is configured to successfully log in the software of the in vitro diagnostic device when authentication is passed, and enable a corresponding operation authority according to the user ID.
  • the verification unit is further configured to parse the random authorization code to obtain a parsing result including the user identifier
  • the user identity corresponding to the user identity is verified.
  • the analysis result further includes: an authorization level corresponding to the user identity
  • the login unit is further configured to enable an operation authority of a function corresponding to the authorization level in the external diagnosis device.
  • the in vitro diagnostic device further includes:
  • a first collection unit configured to collect biometric information
  • a matching unit configured to match the collected biometric information with the stored biometric information corresponding to the user identifier
  • the first receiving unit is further configured to receive a random authorization code for software login input by a user
  • FIG. 9 is a schematic structural diagram of a server according to an embodiment of the present invention.
  • an in vitro diagnostic device provided by an embodiment of the present invention includes:
  • a second receiving unit 91 configured to receive a user identifier sent
  • a calculation unit 92 configured to calculate a time-based random authorization code based on the user identification
  • the random authorization code is used by the in vitro diagnostic device to perform user identity verification corresponding to the user identifier based on the random authorization code, and when the verification is passed, the software of the in vitro diagnostic device is successfully logged in, and according to the The user ID enables the corresponding operation authority.
  • the calculation unit is further configured to perform encoding calculation on the user identifier, time information, and a random number to obtain a random authorization code with timeliness.
  • the calculation unit is further configured to encode and calculate the user ID, an authorization level corresponding to the user ID, time information, and a random number to obtain a random authorization code with timeliness;
  • the authorization level corresponding to the user ID is used by the in vitro diagnostic device to enable an operation authority for a function corresponding to the authorization level.
  • the server further includes a second acquisition unit
  • the second collection unit is configured to collect biometric information
  • the calculation unit is further configured to encode and obtain a time-based random authorization code based on the collected biometric information, the user identifier, and a random number.
  • the server further includes:
  • a sending unit configured to send the random authorization code to the in vitro diagnostic device
  • the random authorization code is sent to a user terminal that sends the user identification.
  • the in vitro diagnostic device in the embodiment of the present invention may be provided by hardware, software, or a combination of software and hardware.
  • FIG. 10 is a schematic diagram of an optional component structure of the in vitro diagnostic device provided by the embodiment of the present invention. It can be understood that FIG. The exemplary structure is not the entire structure, and some or all of the structures shown in FIG. 10 may be implemented as needed.
  • the in vitro diagnostic device 10 provided by the embodiment of the present invention includes: at least one processor 11, a memory 12, a user interface 13, and at least one network interface 14.
  • the various components in the in vitro diagnostic device 10 are coupled together via a bus system 15. It can be understood that the bus system 15 is used to implement connection and communication between these components.
  • the bus system 15 includes a power bus, a control bus, and a status signal bus in addition to the data bus. However, for the sake of clarity, various buses are marked as the bus system 105 in FIG. 10.
  • the user interface 13 may include a display, a keyboard, a mouse, a trackball, a click wheel, keys, buttons, a touch panel, or a touch screen.
  • the memory 12 may be a volatile memory or a non-volatile memory, and may also include both volatile and non-volatile memories.
  • the memory 12 in the embodiment of the present invention is used to store various types of data to support the operation of the in vitro diagnostic device 10. Examples of these data include: any executable instructions for operating on the in vitro diagnostic device 10, such as the executable instruction 121, and a program that implements the software registration method of the in vitro diagnostic device of the embodiment of the present invention may be included in the executable instruction 121 .
  • the software login method of the in vitro diagnostic device disclosed in the embodiment of the present invention may be applied to the processor 11 or implemented by the processor 11.
  • the processor 11 may be an integrated circuit chip and has a signal processing capability. In the implementation process, each step of the software registration method of the in vitro diagnostic device may be completed by an integrated logic circuit of hardware in the processor 11 or an instruction in the form of software.
  • the aforementioned processor 11 may be a general-purpose processor, a digital signal processor (DSP, Digital Signal Processor), or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like.
  • the processor 11 may implement or execute various methods, steps, and logical block diagrams disclosed in the embodiments of the present invention.
  • a general-purpose processor may be a microprocessor or any conventional processor.
  • the steps of the method disclosed in combination with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a storage medium.
  • the storage medium is located in the memory 12.
  • the processor 11 reads the information in the memory 12 and completes the steps of the software login method of the in vitro diagnostic device provided by the embodiment of the present invention in combination with its hardware.
  • an embodiment of the present invention further provides a readable storage medium.
  • the storage medium may include: a mobile storage device, a random access memory (RAM, Random Access Memory), a read-only memory (ROM, Read-Only Memory), Various media such as magnetic disks or optical disks that can store program codes.
  • the readable storage medium stores executable instructions;
  • the executable instructions are used to implement the software login method of the above-mentioned in vitro diagnostic device when executed by a processor.
  • All or part of the steps of the embodiment may be completed by a program instructing related hardware.
  • the foregoing program may be stored in a computer-readable storage medium. When the program is executed, the steps including the foregoing method embodiments are performed; and the foregoing
  • the storage medium includes: various types of media that can store program codes, such as a mobile storage device, a random access memory, a read-only memory, a magnetic disk, or an optical disc.
  • the above-mentioned integrated unit of the present invention is implemented in the form of a software functional module and sold or used as an independent product, it may also be stored in a computer-readable storage medium.
  • the computer software product is stored in a storage medium and includes several instructions for enabling A computer device (which may be a personal computer, a server, or a network device) executes all or part of the methods described in the embodiments of the present invention.
  • the foregoing storage media include: various types of media that can store program codes, such as a mobile storage device, a RAM, a ROM, a magnetic disk, or an optical disc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Stored Programmes (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

一种体外诊断设备的软件登录方法、体外诊断设备、服务器及存储介质,其中,方法包括:获取用户标识信息;接收用于软件登录的随机授权码;所述随机授权码具有设定的时效性,且为服务器基于用户标识计算得到(101);基于所述随机授权码,进行对应所述用户标识的用户身份验证(102);如果验证通过,则成功登录所述体外诊断设备的软件,并根据所述用户标识开启相应操作权限(103)。

Description

体外诊断设备的软件登录方法、设备、服务器及存储介质 技术领域
本发明涉及医疗技术领域,尤其涉及一种体外诊断设备的软件登录方法、设备、服务器及存储介质。
背景技术
相关技术中,体外诊断设备的软件采用用户名及密码的方式进行登录,而用户名与密码是固定的,在医院,医生之间、医生与其他同事之间,进行体外诊断设备的软件登录的用户名及密码相互之间并不保密,而用户名与密码一旦泄漏后,对仪器样本测量的准确性、兼容试剂的封闭性等均会造成很大的安全隐患。
发明内容
有鉴于此,本发明实施例期望提供一种体外诊断设备的软件登录方法、设备、服务器及存储介质,能够提高体外诊断设备的安全性。
第一方面,本发明实施例提供了一种体外诊断设备的软件登录方法,包括:
接收用于软件登录的随机授权码;所述随机授权码具有设定的时效性,且为服务器基于用户标识计算得到;
基于所述随机授权码,进行对应所述用户标识的用户身份验证;
如果验证通过,则成功登录所述体外诊断设备的软件,并根据所述用户标识开启相应操作权限。
上述方案中,所述基于所述随机授权码,进行对应所述用户标识的用户身份验证,包括:
对所述随机授权码进行解析,得到包括所述用户标识的解析结果;
将解析得到的所述用户标识与存储的用户标识进行匹配;
确定匹配成功时对应所述用户标识的用户身份验证通过。
上述方案中,所述解析结果还包括:与所述用户标识对应的授权级别;
相应的,所述根据所述用户标识开启相应操作权限,包括:
开启所述外诊断设备中与所述授权级别相对应的功能的操作权限。
上述方案中,所述方法还包括:
进行生物特征信息采集;
将采集得到的生物特征信息与存储的对应所述用户标识的生物特征信息进行匹配;
基于匹配结果判断是否允许登录所述体外诊断设备的软件。
上述方案中,所述接收用于软件登录的随机授权码,包括:
接收用户输入的用于软件登录的随机授权码;
或者,接收所述服务器发送的用于软件登录的随机授权码。
第二方面,本发明实施例还提供了一种体外诊断设备的软件登录方法,应用于服务器,所述方法包括:
接收发送的用户标识;
基于所述用户标识,计算具有时效性的随机授权码;
所述随机授权码,用于供体外诊断设备基于所述随机授权码,进行对应所述用户标识的用户身份验证,并在验证通过时,成功登录所述体外诊断设备的软件,以及根据所述用户标识开启相应操作权限。
上述方案中,所述基于所述用户标识,计算具有时效性的随机授权码,包括:
对所述用户标识、时间信息及随机数进行编码计算,得到具有时效性的随机授权码。
上述方案中,所述基于所述用户标识,计算具有时效性的随机授权码,包括:
对所述用户标识、与所述用户标识对应的授权级别、时间信息及随机数进行编码计算,得到具有时效性的随机授权码;
所述与所述用户标识对应的授权级别,用于所述体外诊断设备开启针对与所述授权级别相对应的功能的操作权限。
上述方案中,所述方法还包括:
进行生物特征信息采集;
基于采集得到的生物特征信息及所述用户标识,编码计算得到具有时效性的随机授权码。
上述方案中,所述方法还包括:
发送所述随机授权码给所述体外诊断设备;
或者,发送所述随机授权码给发送所述用户标识的用户终端。
第三方面,本发明实施例还提供了一种体外诊断设备,包括:
第一接收单元,配置为接收用于软件登录的随机授权码;所述随机授权码具有设定的时效性,且为服务器基于用户标识计算得到;
验证单元,配置为基于所述随机授权码,进行对应所述用户标识的用户身份验证;
登录单元,配置为在验证通过时,成功登录所述体外诊断设备的软件,并根据所述用户标识开启相应操作权限。
上述方案中,所述验证单元,还配置为对所述随机授权码进行解析,得到包括所述用户标识的解析结果;
将解析得到的所述用户标识与存储的用户标识进行匹配;
确定匹配成功时对应所述用户标识的用户身份验证通过。
上述方案中,所述解析结果还包括:与所述用户标识对应的授权级别;
相应的,所述登录单元,还配置为开启所述外诊断设备中与所述授权级别相对应的功能的操作权限。
上述方案中,所述体外诊断设备还包括:
第一采集单元,配置为进行生物特征信息采集;
匹配单元,配置为将采集得到的生物特征信息与存储的对应所述用户标识的生物特征信息进行匹配;
以及,基于匹配结果判断是否允许登录所述体外诊断设备的软件。
上述方案中,所述第一接收单元,还配置为接收用户输入的用于软件登录的随机授权码;
或者,接收所述服务器发送的用于软件登录的随机授权码。
第四方面,本发明实施例还提供了一种服务器,包括:
第二接收单元,配置为接收发送的用户标识;
计算单元,配置为基于所述用户标识,计算具有时效性的随机授权码;
所述随机授权码,用于供体外诊断设备基于所述随机授权码,进行对应所述用户标识的用户身份验证,并在验证通过时,成功登录所述体外诊断设备的软件,以及根据所述用户标识开启相应操作权限。
上述方案中,所述计算单元,还配置为对所述用户标识、时间信息及随机数进行编码计算,得到具有时效性的随机授权码。
上述方案中,所述计算单元,还配置为对所述用户标识、与所述用户标识对应的授权级别、时间信息及随机数进行编码计算,得到具有时效性的随机授权码;
所述与所述用户标识对应的授权级别,用于所述体外诊断设备开启针对与所述授权级别相对应的功能的操作权限。
上述方案中,所述服务器还包括第二采集单元;
所述第二采集单元,配置为进行生物特征信息采集;
相应的,所述计算单元,还配置为基于采集得到的生物特征信息及所述用户标识,编码计算得到具有时效性的随机授权码。
上述方案中,所述服务器还包括:
发送单元,配置为发送所述随机授权码给所述体外诊断设备;
或者,发送所述随机授权码给发送所述用户标识的用户终端。
第五方面,本发明实施例还提供了一种体外诊断设备,包括:
存储器,用于存储可执行指令;
处理器,用于执行所述存储器中存储的可执行指令时,实现本发明实施例中所述的体外诊断设备的软件登录方法。
第六方面,本发明实施例还提供了一种服务器,包括:
存储器,用于存储可执行指令;
处理器,用于执行所述存储器中存储的可执行指令时,实现本发明实施例中所述的体外诊断设备的软件登录方法。
第七方面,本发明实施例还提供了一种存储介质,存储有可执行指令,所述可执行指令被执行时,用于实现本发明实施例中所述的体外诊断设备的软件登录方法。
应用本发明实施例提供的体外诊断设备的软件登录方法、设备、服务器及存储介质具备以下有益技术效果:
1)对用户的身份验证基于具有时效性的随机授权码,且该时效性可基于实际需要进行设定,如2分钟,使得用户在使用随机授权码登录后,短时间内便失效,相当于一次性授权码,极大的增强了体外诊断设备的软件登录安全性;
2)对用户的身份验证通过后,根据用户标识开启相应的操作权限,也就是说,不同的用户具备不同的操作权限,不同的用户所能使用的体外诊断设备的功能不同,如此,在体外诊断设备的功能使用上进行了保护及限制,即便用户登录了体外诊断设备的软件,也不可随意使用其各个功能,增强了体外诊断设备的安全性。
附图说明
图1为本发明实施例提供的体外诊断设备的软件登录方法的流程示意 图一;
图2为本发明实施例提供的体外诊断设备的软件登录原理示意图;
图3为本发明实施例提供的体外诊断设备的软件登录方法的流程示意图二;
图4为本发明实施例提供的体外诊断设备的软件登录的系统示意图;
图5A为本发明实施例提供的外诊断设备的软件登录客户端进行注册的界面示意图一;
图5B为本发明实施例提供的外诊断设备的软件登录客户端进行注册的界面示意图二;
图6为本发明实施例提供的体外诊断设备的软件登录方法的流程示意图三;
图7为本发明实施例提供的体外诊断设备的软件登录方法的流程示意图四;
图8为本发明实施例提供的体外诊断设备的组成结构示意图一;
图9为本发明实施例提供的服务器的组成结构示意图;
图10为本发明实施例提供的体外诊断设备的组成结构示意图二。
具体实施方式
以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所提供的实施例仅仅用以解释本发明,并不用于限定本发明。另外,以下所提供的实施例是用于实施本发明的部分实施例,而非提供实施本发明的全部实施例,在不冲突的情况下,本发明实施例记载的技术方案可以任意组合的方式实施。
需要说明的是,在本发明实施例中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的方法或者装置不仅包括所明确记载的要素,而且还包括没有明确列出的其他要素, 或者是还包括为实施方法或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的方法或者装置中还存在另外的相关要素(例如方法中的步骤或者装置中的单元,这里的单元可以是部分电路、部分处理器、部分程序或软件等等)。
需要说明的是,本发明实施例所涉及的术语“第一\第二”仅仅是区别类似的对象,不代表针对对象的特定排序,可以理解地,“第一\第二”在允许的情况下可以互换特定的顺序或先后次序。应该理解“第一\第二”区分的对象在适当情况下可以互换,以使这里描述的本发明的实施例能够以除了在这里图示或描述的那些以外的顺序实施。
接下来对本发明实施例提供的体外诊断设备的软件登录方法进行说明。
图1为本发明实施例提供的体外诊断设备的软件登录方法的流程示意图,参见图1,本发明实施例提供的体外诊断设备的软件登录方法包括:
步骤101:体外诊断设备接收用于软件登录的随机授权码;所述随机授权码具有设定的时效性,且为服务器基于用户标识计算得到。
在一实施例中,体外诊断设备可通过如下方式接收用于软件登录的随机授权码:接收用户输入的用于软件登录的随机授权码。也即,当服务器基于用户标识计算得到随机授权码后,用户从服务器处获取随机授权码,如用户通过终端接收服务器发送的随机授权码,然后,用户手动输入至体外诊断设备,如此,可使得体外诊断设备无需与服务器通信,即体外诊断设备可在不进行网络连接的情况下工作,增强了设备安全性。
在一实施例中,体外诊断设备可通过如下方式接收用于软件登录的随机授权码:接收服务器发送的用于软件登录的随机授权码。也即,服务器与体外诊断设备建立了网络连接,当服务器基于用户标识计算得到随机授权码后,可直接将生成的随机授权码发送给体外诊断设备,如此,用户无需手动输入随机授权码,提高了用户身份验证的效率,用户体验好。
在一实施例中,随机授权码的时效性可以依据实际需要进行设定,以 保证用户既可在有效时间内完成软件登录,又可在完成软件登录后的短时间内失效,在实际实施时,随机授权码的有效时长可参照统计得到的用户单次完成软件登录的时间进行设定,考虑到用户登录的实际情况,可设定随机授权码的有效时长为用户单次完成软件登录的时间的整数倍(如2倍),例如,通过统计得到用户单次完成软件登录的时间为1分钟,则可设定随机授权码的有效时长为2分钟。
这里,在实际应用中,外诊断设备的软件可以是外诊断设备的系统软件或应用软件。
对服务器基于用户标识计算得到随机授权码的过程进行说明。
在一实施例中,服务器可通过如下方式计算得到随机授权码:
服务器对用户标识、时间信息及随机数进行编码计算,得到具有时效性的随机授权码。
这里,用户标识可以为唯一标识用户身份的信息,如医生的工号、用户手机号、邮箱名等等。
在实际实施时,用户可通过终端将自身的用户标识发送给服务器,具体地,例如,终端上安装有对应体外诊断设备的软件服务的客户端,用户通过客户端输入用户工号、手机号,提交给服务器,在服务器侧完成用户标识与手机号的绑定,以完成用户注册,服务器侧存储了对应该用户标识的用户信息,如姓名、级别等;再如,用户可通过终端关注体外诊断设备的软件服务的公众号,通过公众号页面输入用户工号、邮箱,提交给服务器,在服务器侧完成用户标识与邮箱的绑定,以完成用户注册。
用户注册完成,服务器获取到用户标识后,对用户标识、时间信息(如编码计算时间)及随机数进行编码计算,在一实施例中,进行编码计算可以为进行哈希计算,生成具有时效性的随机授权码;当体外诊断设备获得服务器计算生成的随机授权码后,采用相应的解码方式进行解码计算,得到用户标识及编码时间,以进行用户身份验证;由于在随机授权码的编码 计算过程中加入了随机数,使得每次生成的随机授权码均不相同,避免了密码泄露问题,极大的增强了体外诊断设备的安全性。
在一实施例中,服务器还可通过如下方式计算得到随机授权码:
对用户标识、与用户标识对应的授权级别、时间信息及随机数进行编码计算,得到具有时效性的随机授权码。
这里与用户标识对应的授权级别,用于体外诊断设备开启针对与授权级别相对应的功能的操作权限;例如,若用户的授权级别为一级(Level 1),则该用户成功登录后,可使用相应的体外诊断设备的基础功能(如功能a-c),若用户的授权级别为二级(Level 2),则该用户成功登录后,不仅可使用对应体外诊断设备一级的基础功能,还可使用除基础功能外的其它功能(如功能d-e)。如此,由于随机授权码中加入了用户的授权级别信息,使得用户即便登录了体外诊断设备的软件,也不能随意使用其各个功能,避免了软件功能的使用混乱,增强了软件的安全性。
在一实施例中,服务器还可通过如下方式计算得到随机授权码:
进行生物特征信息采集;基于采集得到的生物特征信息及用户标识,编码计算得到具有时效性的随机授权码。
这里,在实际实施时,服务器进行的生物特征信息采集,可以是面部特征采集、指纹信息采集等,如,用户通过终端进行面部特征采集、指纹信息采集后发送给服务器。由于在计算随机授权码的过程中加入了生物特征信息,使得用户在每次进行随机授权码的获取时,必须保证是用户本人方可获得,避免了手机丢失后其他用户使用用户手机获取随机授权码的情况出现,极大的增强了安全性。
步骤102:基于所述随机授权码,进行对应用户标识的用户身份验证。
这里,在一实施例中,体外诊断设备可通过如下方式进行对应用户标识的用户身份验证:
对随机授权码进行解析,得到包括用户标识的解析结果;将解析得到 的用户标识与存储的用户标识进行匹配;确定匹配成功时对应用户标识的用户身份验证通过。
在一实施例中,解析结果中还包括:与用户标识对应的授权级别,相应的,当体外诊断设备根据用户标识开启相应操作权限时,即开启外诊断设备中与授权级别相对应的功能的操作权限。图2为本发明实施例提供的体外诊断设备的软件登录原理示意图,参见图2,体外诊断设备包括功能模块1至功能模块m,每个功能模块可实现相应的至少一个功能,如功能模块1可实现功能1.1至1.n,每个模块所实现的功能对应不同的授权级别,如,功能模块1所实现的功能对应授权级别1,功能模块2所实现的功能对应授权级别2,当然,在实际实施时,亦可是多个功能模块实现的功能对应一个授权级别,例如,功能模块1至3所实现的功能对应一个授权级别,当用户基于随机授权码成功登录体外诊断设备的软件后,可使用相应的授权级别的体外诊断设备的功能。
在一实施例中,当体外诊断设备基于随机授权码进行验证通过后,还可进一步基于用户的生物特征信息进行二次验证,相应的,体外诊断设备进行生物特征信息采集;将采集得到的生物特征信息与存储的对应用户标识的生物特征信息进行匹配;基于匹配结果判断是否允许登录所述体外诊断设备的软件,当生物特征信息匹配成功后则可允许登录体外诊断设备的软件,否则不允许登录体外诊断设备的软件。
步骤103:如果验证通过,则成功登录体外诊断设备的软件,并根据用户标识开启相应操作权限。
图3为本发明实施例提供的体外诊断设备的软件登录方法的流程示意图,图4为本发明实施例提供的体外诊断设备的软件登录的系统示意图,结合图3、图4,本发明实施例提供的体外诊断设备的软件登录方法包括:
步骤201:用户通过体外诊断设备的软件登录客户端进行注册。
这里,在实际应用中用户通过客户端发送用户工号、姓名、手机号、或邮箱给服务器,服务器侧进行用户工号、手机号、或邮箱的绑定后完成注册。图5A为本发明实施例提供的外诊断设备的软件登录客户端进行注册的界面示意图,参见图5A,若用户未注册过,则输入工号后点击注册,页面跳转到图5B,用户输入手机号后进行注册。需要说明的是,用户在首次进行软件登录时需要注册,在注册成功并登录该客户端后,可直接通过该客户端发送请求指令获取服务器返回的随机授权码,该请求指令携带用户标识信息(如用户工号、姓名、手机号、邮箱等),服务器收到请求指令后根据用户标识信息生成授权码。
步骤202:用户终端接收服务器发送的随机授权码。
在实际应用中,服务器可基于用户标识、授权级别、编码时间、随机数进行编码计算生成随机授权码。
在实际应用中,用户终端可通过短消息的方式接收服务器发送的随机授权码,还可通过消息通知的方式接收,本发明实施例中并不限定接收方式。
步骤203:用户在体外诊断设备上手动输入终端接收到的随机授权码。
步骤204:体外诊断设备根据输入的随机授权码进行用户身份验证,并判断验证是否通过,如果通过执行步骤205;如果验证不通过,执行步骤206。
这里,在实际实施时,体外诊断设备通过如下方式进行用户身份验证:
体外诊断设备对随机授权码进行解析,得到用户标识、授权级别及编码时间信息;将解析得到的用户标识与自身存储的用户标识进行匹配;确定匹配成功时对应用户标识的用户身份验证通过,匹配失败时,对应用户标识的用户身份验证不通过。这里,解析得到的编码时间用于体外诊断设备计算随机授权码的有效时间,例如,随机授权码的有效时长为2分钟,则体外诊断设备计算从编码时间开始,满两分钟后失效,也就是说,若体 外诊断设备解析后,即便用户标识匹配成功,通过计算随机授权码已失效,亦判定验证不通过。
步骤205:成功登录体外诊断设备的软件,并开启体外诊断设备中与授权级别相对应的功能的操作权限。
步骤206:结束本次处理流程。
图6为本发明实施例提供的体外诊断设备的软件登录方法的流程示意图,参见图6,本发明实施例提供的体外诊断设备的软件登录方法包括:
步骤301:终端接收用户输入的工号并采集用户指纹信息。
这里,在实际应用中,终端可通过相关客户端或关注的相关公众号的页面输入用户工号并进行指纹信息采集。
步骤302:终端发送用户工号及指纹信息给服务器。
服务器侧存储了与用户工号对应的用户信息,如用户姓名、用户的指纹信息、对应的授权级别、对应的手机号等。
步骤303:服务器基于用户工号及指纹信息生成随机授权码。
这里,服务器可通过如下方式生成随机授权码:
服务器获取用户工号后,查找对应用户工号的授权级别,并对用户工号、指纹信息、编码时间、授权级别及随机数进行哈希编码计算,生成随机授权码。
步骤304:服务器发送随机授权码给体外诊断设备。
步骤305:体外诊断设备解析随机授权码,并基于解析结果判断是否允许登录体外诊断设备的软件。
这里,在实际实施时,体外诊断设备解析随机授权码可得到用户工号、指纹信息、编码时间及授权级别;将得到的用户工号、指纹信息,分别与自身存储的用户工号及相应的指纹信息进行匹配,确定二者均匹配成功时,允许登录体外诊断设备的软件,并开启外诊断设备中与授权级别相对应的 功能的操作权限;若用户工号、指纹信息其中至少之一匹配失败时,则不允许登录体外诊断设备的软件。
图7为本发明实施例提供的体外诊断设备的软件登录方法的流程示意图,参见图7,本发明实施例提供的体外诊断设备的软件登录方法包括:
步骤401:终端发送用户工号给服务器。
在实际应用中,终端可通过相关客户端或关注的相关公众号的页面输入用户工号,并发送给服务器。
步骤402:服务器基于用户工号生成随机授权码,并返回给终端。
服务器侧存储了与用户工号对应的用户信息,如用户姓名、对应的手机号等。在实际应用中,服务器可通过短消息的方式发送随机授权码给对应手机号的终端。在实际应用中,用户发送用户工号的终端与服务器处所存储的手机号的终端为同一终端,或者,服务器处所存储的手机号的终端亦放置于用户身边,以便查看服务器发送的随机授权码。
在实际实施时,服务器可通过如下方式生成随机授权码:
服务器获取用户工号后,查找对应用户工号的授权级别,并对用户工号、编码时间及随机数进行哈希编码计算,生成随机授权码。
步骤403:用户在体外诊断设备上手动输入终端接收到的随机授权码。
步骤404:体外诊断设备根据输入的随机授权码进行用户身份验证,并判断验证是否通过,如果通过执行步骤405;如果验证不通过,执行步骤407。
这里,在实际实施时,体外诊断设备通过如下方式进行用户身份验证:
体外诊断设备对随机授权码进行解析,得到用户工号、授权级别及编码时间信息;将解析得到的用户工号与自身存储的用户工号进行匹配;确定匹配成功时对应用户工号的用户身份验证通过,匹配失败时,对应用户工号的用户身份验证不通过。这里,解析得到的编码时间用于体外诊断设 备计算随机授权码的有效时间,例如,随机授权码的有效时长为2分钟,则体外诊断设备计算从编码时间开始,满两分钟后失效,也就是说,若体外诊断设备解析后,即便用户工号匹配成功,通过计算随机授权码已失效,亦判定验证不通过。
步骤405:体外诊断设备采集用户面部特征信息,并将采集的面部特征信息与自身存储的进行匹配,判断匹配是否成功,如果匹配成功,执行步骤406;如果匹配失败,执行步骤407。
步骤406:成功登录体外诊断设备的软件,并开启体外诊断设备中与用户工号的授权级别相对应的功能的操作权限。
这里,在一实施例中,体外诊断设备存储了与用户工号相对应的授权级别,当体外诊断设备对用户的面部特征的匹配成功后,便可开启与用户工号的授权级别相对应的功能的操作权限
步骤407:结束本次处理流程。
图8为本发明实施例提供的体外诊断设备的组成结构示意图,参见图8,本发明实施例提供的体外诊断设备包括:
第一接收单元81,配置为接收用于软件登录的随机授权码;所述随机授权码具有设定的时效性,且为服务器基于用户标识计算得到;
验证单元82,配置为基于所述随机授权码,进行对应所述用户标识的用户身份验证;
登录单元83,配置为在验证通过时,成功登录所述体外诊断设备的软件,并根据所述用户标识开启相应操作权限。
在一实施例中,所述验证单元,还配置为对所述随机授权码进行解析,得到包括所述用户标识的解析结果;
将解析得到的所述用户标识与存储的用户标识进行匹配;
确定匹配成功时对应所述用户标识的用户身份验证通过。
在一实施例中,所述解析结果还包括:与所述用户标识对应的授权级别;
相应的,所述登录单元,还配置为开启所述外诊断设备中与所述授权级别相对应的功能的操作权限。
在一实施例中,所述体外诊断设备还包括:
第一采集单元,配置为进行生物特征信息采集;
匹配单元,配置为将采集得到的生物特征信息与存储的对应所述用户标识的生物特征信息进行匹配;
以及,基于匹配结果判断是否允许登录所述体外诊断设备的软件。
在一实施例中,所述第一接收单元,还配置为接收用户输入的用于软件登录的随机授权码;
或者,接收所述服务器发送的用于软件登录的随机授权码。
图9为本发明实施例提供的服务器的组成结构示意图,参见图9,本发明实施例提供的体外诊断设备包括:
第二接收单元91,配置为接收发送的用户标识;
计算单元92,配置为基于所述用户标识,计算具有时效性的随机授权码;
所述随机授权码,用于供体外诊断设备基于所述随机授权码,进行对应所述用户标识的用户身份验证,并在验证通过时,成功登录所述体外诊断设备的软件,以及根据所述用户标识开启相应操作权限。
在一实施例中,所述计算单元,还配置为对所述用户标识、时间信息及随机数进行编码计算,得到具有时效性的随机授权码。
在一实施例中,所述计算单元,还配置为对所述用户标识、与所述用户标识对应的授权级别、时间信息及随机数进行编码计算,得到具有时效性的随机授权码;
所述与所述用户标识对应的授权级别,用于所述体外诊断设备开启针对与所述授权级别相对应的功能的操作权限。
在一实施例中,所述服务器还包括第二采集单元;
所述第二采集单元,配置为进行生物特征信息采集;
相应的,所述计算单元,还配置为基于采集得到的生物特征信息、所述用户标识及随机数,编码计算得到具有时效性的随机授权码。
在一实施例中,所述服务器还包括:
发送单元,配置为发送所述随机授权码给所述体外诊断设备;
或者,发送所述随机授权码给发送所述用户标识的用户终端。
需要说明的是本发明实施例中的体外诊断设备可以提供为硬件、软件或者软硬件结合的方式来实现。
下面说明体外诊断设备的软件硬件结合的实施,参见图10,图10为本发明实施例提供的体外诊断设备的一个可选的组成结构示意图,可以理解,图10仅仅示出了体外诊断设备的示例性结构而非全部结构,根据需要可以实施图10示出的部分结构或全部结构。
本发明实施例提供的体外诊断设备10包括:至少一个处理器11、存储器12、用户接口13和至少一个网络接口14。体外诊断设备10中的各个组件通过总线系统15耦合在一起。可以理解,总线系统15用于实现这些组件之间的连接通信。总线系统15除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图10中将各种总线都标为总线系统105。
其中,用户接口13可以包括显示器、键盘、鼠标、轨迹球、点击轮、按键、按钮、触感板或者触摸屏等。
可以理解,存储器12可以是易失性存储器或非易失性存储器,也可包括易失性和非易失性存储器两者。
本发明实施例中的存储器12用于存储各种类型的数据以支持体外诊断设备10的操作。这些数据的示例包括:用于在体外诊断设备10上操作的任何可执行指令,如可执行指令121,实现本发明实施例的体外诊断设备的软件登录方法的程序可以包含在可执行指令121中。
本发明实施例揭示的体外诊断设备的软件登录方法可以应用于处理器11中,或者由处理器11实现。处理器11可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,体外诊断设备的软件登录方法的各步骤可以通过处理器11中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器11可以是通用处理器、数字信号处理器(DSP,Digital Signal Processor),或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。处理器11可以实现或者执行本发明实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本发明实施例所公开的方法的步骤,可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于存储介质中,该存储介质位于存储器12,处理器11读取存储器12中的信息,结合其硬件完成本发明实施例提供的体外诊断设备的软件登录方法的步骤。
相应的,本发明实施例还提供了一种可读存储介质,存储介质可以包括:移动存储设备、随机存取存储器(RAM,Random Access Memory)、只读存储器(ROM,Read-Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。所述可读存储介质存储有可执行指令;
所述可执行指令,用于被处理器执行时实现上述体外诊断设备的软件登录方法。
实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储设备、随机 存取存储器、只读存储器、磁碟或者光盘等各种可以存储程序代码的介质。
或者,本发明上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本发明各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、RAM、ROM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。

Claims (24)

  1. 一种体外诊断设备的软件登录方法,应用于体外诊断设备,包括:
    接收用于软件登录的随机授权码;所述随机授权码具有设定的时效性,且为服务器基于用户标识计算得到;
    基于所述随机授权码,进行对应所述用户标识的用户身份验证;
    如果验证通过,则成功登录所述体外诊断设备的软件,并根据所述用户标识开启相应操作权限。
  2. 如权利要求1所述的方法,其中,所述基于所述随机授权码,进行对应所述用户标识的用户身份验证,包括:
    对所述随机授权码进行解析,得到包括所述用户标识的解析结果;
    将解析得到的所述用户标识与存储的用户标识进行匹配;
    确定匹配成功时对应所述用户标识的用户身份验证通过。
  3. 如权利要求2所述的方法,其中,所述解析结果还包括:与所述用户标识对应的授权级别;
    相应的,所述根据所述用户标识开启相应操作权限,包括:
    开启所述外诊断设备中与所述授权级别相对应的功能的操作权限。
  4. 如权利要求1所述的方法,其中,所述方法还包括:
    进行生物特征信息采集;
    将采集得到的生物特征信息与存储的对应所述用户标识的生物特征信息进行匹配;
    基于匹配结果判断是否允许登录所述体外诊断设备的软件。
  5. 如权利要求1所述的方法,其中,所述接收用于软件登录的随机授权码,包括:
    接收用户输入的用于软件登录的随机授权码;
    或者,接收所述服务器发送的用于软件登录的随机授权码。
  6. 一种体外诊断设备的软件登录方法,应用于服务器,所述方法包括:
    接收发送的用户标识;
    基于所述用户标识,计算具有时效性的随机授权码;
    所述随机授权码,用于供体外诊断设备基于所述随机授权码,进行对应所述用户标识的用户身份验证,并在验证通过时,成功登录所述体外诊断设备的软件,以及根据所述用户标识开启相应操作权限。
  7. 如权利要求6所述的方法,其中,所述基于所述用户标识,计算具有时效性的随机授权码,包括:
    对所述用户标识、时间信息及随机数进行编码计算,得到具有时效性的随机授权码。
  8. 如权利要求6所述的方法,其中,所述基于所述用户标识,计算具有时效性的随机授权码,包括:
    对所述用户标识、与所述用户标识对应的授权级别、时间信息及随机数进行编码计算,得到具有时效性的随机授权码;
    所述与所述用户标识对应的授权级别,用于所述体外诊断设备开启针对与所述授权级别相对应的功能的操作权限。
  9. 如权利要求6所述的方法,其中,所述方法还包括:
    进行生物特征信息采集;
    基于采集得到的生物特征信息、所述用户标识及随机数,编码计算得到具有时效性的随机授权码。
  10. 如权利要求6所述的方法,其中,所述方法还包括:
    发送所述随机授权码给所述体外诊断设备;
    或者,发送所述随机授权码给发送所述用户标识的用户终端。
  11. 一种体外诊断设备,包括:
    第一接收单元,配置为接收用于软件登录的随机授权码;所述随机授权码具有设定的时效性,且为服务器基于用户标识计算得到;
    验证单元,配置为基于所述随机授权码,进行对应所述用户标识的用户身份验证;
    登录单元,配置为在验证通过时,成功登录所述体外诊断设备的软件,并根据所述用户标识开启相应操作权限。
  12. 如权利要求11所述的体外诊断设备,其中,
    所述验证单元,还配置为对所述随机授权码进行解析,得到包括所述用户标识的解析结果;
    将解析得到的所述用户标识与存储的用户标识进行匹配;
    确定匹配成功时对应所述用户标识的用户身份验证通过。
  13. 如权利要求12所述的体外诊断设备,其中,所述解析结果还包括:与所述用户标识对应的授权级别;
    相应的,所述登录单元,还配置为开启所述外诊断设备中与所述授权级别相对应的功能的操作权限。
  14. 如权利要求11所述的体外诊断设备,其中,所述体外诊断设备还包括:
    第一采集单元,配置为进行生物特征信息采集;
    匹配单元,配置为将采集得到的生物特征信息与存储的对应所述用户标识的生物特征信息进行匹配;
    以及,基于匹配结果判断是否允许登录所述体外诊断设备的软件。
  15. 如权利要求11所述的体外诊断设备,其中,
    所述第一接收单元,还配置为接收用户输入的用于软件登录的随机授权码;
    或者,接收所述服务器发送的用于软件登录的随机授权码。
  16. 一种服务器,包括:
    第二接收单元,配置为接收发送的用户标识;
    计算单元,配置为基于所述用户标识,计算具有时效性的随机授权码;
    所述随机授权码,用于供体外诊断设备基于所述随机授权码,进行对应所述用户标识的用户身份验证,并在验证通过时,成功登录所述体外诊断设备的软件,以及根据所述用户标识开启相应操作权限。
  17. 如权利要求16所述的服务器,其中,
    所述计算单元,还配置为对所述用户标识、时间信息及随机数进行编码计算,得到具有时效性的随机授权码。
  18. 如权利要求16所述的服务器,其中,
    所述计算单元,还配置为对所述用户标识、与所述用户标识对应的授权级别、时间信息及随机数进行编码计算,得到具有时效性的随机授权码;
    所述与所述用户标识对应的授权级别,用于所述体外诊断设备开启针对与所述授权级别相对应的功能的操作权限。
  19. 如权利要求16所述的服务器,其中,所述服务器还包括第二采集单元;
    所述第二采集单元,配置为进行生物特征信息采集;
    相应的,所述计算单元,还配置为基于采集得到的生物特征信息、所述用户标识及随机数,编码计算得到具有时效性的随机授权码。
  20. 如权利要求16所述的服务器,其中,所述服务器还包括:
    发送单元,配置为发送所述随机授权码给所述体外诊断设备;
    或者,发送所述随机授权码给发送所述用户标识的用户终端。
  21. 一种体外诊断设备,包括:
    存储器,用于存储可执行指令;
    处理器,用于执行所述存储器中存储的可执行指令时,实现如权利要求1至5任一项所述的体外诊断设备的软件登录方法。
  22. 一种服务器,包括:
    存储器,用于存储可执行指令;
    处理器,用于执行所述存储器中存储的可执行指令时,实现如权利要 求6至10任一项所述的体外诊断设备的软件登录方法。
  23. 一种存储介质,存储有可执行指令,所述可执行指令被执行时,用于实现权利要求1至5任一项所述的体外诊断设备的软件登录方法。
  24. 一种存储介质,存储有可执行指令,所述可执行指令被执行时,用于实现权利要求6至10任一项所述的体外诊断设备的软件登录方法。
PCT/CN2018/100488 2018-08-14 2018-08-14 体外诊断设备的软件登录方法、设备、服务器及存储介质 WO2020034101A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/100488 WO2020034101A1 (zh) 2018-08-14 2018-08-14 体外诊断设备的软件登录方法、设备、服务器及存储介质
CN201880094950.1A CN112335211B (zh) 2018-08-14 2018-08-14 体外诊断设备的软件登录方法、设备、服务器及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/100488 WO2020034101A1 (zh) 2018-08-14 2018-08-14 体外诊断设备的软件登录方法、设备、服务器及存储介质

Publications (1)

Publication Number Publication Date
WO2020034101A1 true WO2020034101A1 (zh) 2020-02-20

Family

ID=69524954

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/100488 WO2020034101A1 (zh) 2018-08-14 2018-08-14 体外诊断设备的软件登录方法、设备、服务器及存储介质

Country Status (2)

Country Link
CN (1) CN112335211B (zh)
WO (1) WO2020034101A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364307A (zh) * 2020-09-30 2021-02-12 深圳市为汉科技有限公司 软件授权方法及相关设备
CN114866274A (zh) * 2022-03-18 2022-08-05 中国建设银行股份有限公司 基于代理服务的授权认证方法、装置及设备
CN115208934A (zh) * 2022-07-14 2022-10-18 潍柴动力股份有限公司 挖掘机安全操作的控制方法以及其控制装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102263784A (zh) * 2011-06-16 2011-11-30 中兴通讯股份有限公司 单点登录方法及系统
CN102316452A (zh) * 2011-07-18 2012-01-11 辽宁国兴科技有限公司 一种基于云端利用nfc通信技术的双重鉴权登录系统
US8739260B1 (en) * 2011-02-10 2014-05-27 Secsign Technologies Inc. Systems and methods for authentication via mobile communication device
CN106357672A (zh) * 2016-10-18 2017-01-25 深圳市金立通信设备有限公司 一种登录方法和终端
CN108134791A (zh) * 2017-12-22 2018-06-08 郑州云海信息技术有限公司 一种数据中心综合管理系统登录验证方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6134659A (en) * 1998-01-07 2000-10-17 Sprong; Katherine A. Controlled usage software
CN104104672B (zh) * 2014-06-30 2017-11-10 重庆智韬信息技术中心 基于身份认证建立动态授权码的方法
CN105827573B (zh) * 2015-01-07 2019-03-05 中国移动通信集团山东有限公司 物联网设备强认证的系统、方法及相关装置
WO2017024188A1 (en) * 2015-08-05 2017-02-09 Alibaba Group Holding Limited Method and apparatus for service authentication cross-reference to related applications
CN106027543A (zh) * 2016-06-23 2016-10-12 北京孔方同鑫科技有限公司 一种基于权值计算的身份识别方法及装置
US20180091490A1 (en) * 2016-09-23 2018-03-29 Apple Inc. Authentication framework for a client of a remote database

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8739260B1 (en) * 2011-02-10 2014-05-27 Secsign Technologies Inc. Systems and methods for authentication via mobile communication device
CN102263784A (zh) * 2011-06-16 2011-11-30 中兴通讯股份有限公司 单点登录方法及系统
CN102316452A (zh) * 2011-07-18 2012-01-11 辽宁国兴科技有限公司 一种基于云端利用nfc通信技术的双重鉴权登录系统
CN106357672A (zh) * 2016-10-18 2017-01-25 深圳市金立通信设备有限公司 一种登录方法和终端
CN108134791A (zh) * 2017-12-22 2018-06-08 郑州云海信息技术有限公司 一种数据中心综合管理系统登录验证方法

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364307A (zh) * 2020-09-30 2021-02-12 深圳市为汉科技有限公司 软件授权方法及相关设备
CN112364307B (zh) * 2020-09-30 2024-03-12 深圳市为汉科技有限公司 软件授权方法及相关设备
CN114866274A (zh) * 2022-03-18 2022-08-05 中国建设银行股份有限公司 基于代理服务的授权认证方法、装置及设备
CN114866274B (zh) * 2022-03-18 2024-04-26 中国建设银行股份有限公司 基于代理服务的授权认证方法、装置及设备
CN115208934A (zh) * 2022-07-14 2022-10-18 潍柴动力股份有限公司 挖掘机安全操作的控制方法以及其控制装置

Also Published As

Publication number Publication date
CN112335211B (zh) 2022-12-27
CN112335211A (zh) 2021-02-05

Similar Documents

Publication Publication Date Title
CA2975843C (en) Apparatus, system, and methods for a blockchain identity translator
CN110768968B (zh) 基于可验证声明的授权方法、装置、设备及系统
US9767265B2 (en) Authentication with parental control functionality
US11924247B1 (en) Access control policy simulation and testing
US20130318359A1 (en) Systems and methods for verifying uniqueness in anonymous authentication
US20080065895A1 (en) Method and System for Implementing Authentication on Information Security
US8613059B2 (en) Methods, systems and computer program products for secure access to information
CN110263507B (zh) 应用程序的被动安全
WO2020034101A1 (zh) 体外诊断设备的软件登录方法、设备、服务器及存储介质
EP2875606A1 (en) Method and system of login authentication
KR20090041365A (ko) 인증 시스템과 함께 생물학적 샘플링 장치를 사용하는 방법, 이러한 방법을 수행하기 위한 컴퓨터 실행가능 명령어를 구비하는 컴퓨터 판독가능 매체 및 인증 시스템에액세스하는 컴퓨터 시스템
JP2001034538A (ja) データ処理方法
US10225152B1 (en) Access control policy evaluation and remediation
US20150066766A1 (en) Secure Generation of a User Account in a Service Server
US11146544B2 (en) Emulation of federative authentication
KR101545897B1 (ko) 주기적인 스마트카드 인증을 통한 서버 접근 통제 시스템
Campos et al. Leveraging identity management interoperability in ehealth
CN113395162A (zh) 在电子投票系统中对投票进行计数的系统和方法
EP3757922A1 (en) Electronic payment system and method and program using biometric authentication
Khatoon et al. Integrating OAuth and aadhaar with e-health care system
KR20030014946A (ko) 다수의 생체정보 인증 프로그램에 대한 통합 인증 방법
KR20140043628A (ko) 보안 로그인 처리 방법
US11863980B1 (en) Authentication and authorization for access to soft and hard assets
KR20140042222A (ko) 휴대 단말기를 이용한 본인 인증 방법
WO2022255151A1 (ja) データ管理システム、データ管理方法、及び非一時的記録媒体

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18930016

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 24/06/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18930016

Country of ref document: EP

Kind code of ref document: A1