WO2020140666A1 - 数据管理方法、装置、计算机设备和存储介质 - Google Patents

数据管理方法、装置、计算机设备和存储介质 Download PDF

Info

Publication number
WO2020140666A1
WO2020140666A1 PCT/CN2019/122483 CN2019122483W WO2020140666A1 WO 2020140666 A1 WO2020140666 A1 WO 2020140666A1 CN 2019122483 W CN2019122483 W CN 2019122483W WO 2020140666 A1 WO2020140666 A1 WO 2020140666A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
management
user
node
terminal
Prior art date
Application number
PCT/CN2019/122483
Other languages
English (en)
French (fr)
Inventor
刘恩科
王梦寒
高建欣
张宝
赵达悦
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020140666A1 publication Critical patent/WO2020140666A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • This application relates to a data management method, device, computer equipment, and storage medium.
  • each medical institution stores and processes medical data such as the medical records of each patient through an independent internal information system.
  • medical data such as the medical records of each patient through an independent internal information system.
  • patients usually visit different medical institutions at different times, but the medical record information exists in different medical institutions, and patients cannot grasp and view their own medical data, and often repeat inspections and tests between different medical institutions , Wasting time and money.
  • a data management method, device, computer device, and storage medium are provided.
  • a data management method including:
  • the user management system is connected to multiple user terminals respectively;
  • a data management device includes:
  • the request receiving module is used to receive the personal data viewing request forwarded by the user management system, and the user management system is respectively connected to multiple user terminals;
  • Node determination module used to determine the blockchain node to be accessed according to the blockchain node access parameters corresponding to the user management system
  • Information extraction module used to extract the personal identification information of the user carried in the personal data viewing request
  • the data search module is used to search the target data matching the user's personal identity information in the incoming data of the blockchain node to be accessed;
  • the data feedback module is used to feed back target data.
  • a computer device includes a memory and one or more processors.
  • the memory stores computer-readable instructions.
  • the one or more processors perform the following steps:
  • the user management system is connected to multiple user terminals respectively;
  • One or more non-volatile computer-readable storage media storing computer-readable instructions.
  • the computer-readable instructions When executed by one or more processors, the one or more processors perform the following steps:
  • the user management system is connected to multiple user terminals respectively;
  • FIG. 1 is an application scenario diagram of a data management method according to one or more embodiments.
  • FIG. 2 is an application scenario diagram of a data management method according to one or more embodiments.
  • FIG. 3 is a schematic flowchart of a data management method according to one or more embodiments.
  • FIG. 4 is a schematic flowchart of a data management method according to one or more embodiments.
  • FIG. 5 is a schematic flowchart of a data management method according to one or more embodiments.
  • FIG. 6 is a schematic flowchart of a data management method according to one or more embodiments.
  • FIG. 7 is a schematic flowchart of a data management method according to one or more embodiments.
  • FIG. 8 is a schematic flowchart of sub-steps of step S190 in FIG. 7 according to one or more embodiments.
  • FIG. 9 is a block diagram of a data management device according to one or more embodiments.
  • Figure 10 is a block diagram of a computer device in accordance with one or more embodiments.
  • the data management method provided by this application can be applied to the application environment shown in FIG. 1.
  • the user terminal 112 communicates with the user management system 114 through the network, and the user management system 114 communicates with the blockchain node 122 in the blockchain system 120 through the network.
  • the blockchain system also includes other blockchain nodes.
  • the blockchain system 120 receives the personal data viewing request sent by the user terminal 112 through the user management system 114, according to the blockchain node access parameters corresponding to the user management system 114, Determine the blockchain node 122 to be accessed, extract the personal identification information of the user carried in the personal data viewing request, find the target data matching the personal identification information of the user in the incoming data of the blockchain node 122 to be accessed, and feed back the target data.
  • the user terminal 112 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
  • the blockchain system 120 may be implemented by a cluster composed of multiple distributed blockchain nodes 122.
  • the blockchain system 120 is used to manage users' medical data.
  • the nodes of the blockchain system 120 include three types of supervision nodes 122, management nodes 124, and transaction nodes 126.
  • the supervision nodes 122 and the management node 124 store the in-chain data of the blockchain system 120, and the user management system 114 can directly view the full amount of data stored in the supervision node 122 according to its configured supervision node access parameters, and the user terminal 112 can pass the user management system 114 View the personal data stored in the supervision node 122.
  • the management node access parameters configured by the management node 124 with the permission of the user terminal 112, a physician or pharmacist can view the user personal data stored in the management node 124 through the data management terminal 116 with the user authorization key and upload the user's personal data to Management node 124.
  • the transaction node 126 does not store in-chain data, but some of the community service center terminal or the clinic terminal 118 can access the transaction node 126 according to the authorization key, and the transaction node 126 can obtain personal data from the supervision node 122 or the management node 124.
  • a data management method is provided, which is applied to the blockchain system in FIG. 1 and FIG. 2, and the data managed in the blockchain system is the user’s medical treatment.
  • the data is explained as an example, including the following steps:
  • step S200 a personal data viewing request forwarded by the user management system is received, and the user management system is respectively connected to multiple user terminals.
  • the user terminal refers to the terminal where the data owner in the blockchain system is located, for example, the medical data of the patient is stored in the blockchain system, then the terminal where the patient is located is the user terminal.
  • the user management system is an intermediate device that manages the account password of the user terminal and enables the user terminal to establish a connection with the blockchain node through the user management system.
  • the user terminal logs in the user management system with the account password to send
  • the user management system generates a personal data viewing request containing the access parameters of the blockchain node corresponding to the user management system based on the personal data viewing message and the logged-in user information, and sends the personal data viewing request to the blockchain system.
  • Step S300 Determine the blockchain node to be accessed according to the blockchain node access parameters corresponding to the user management system.
  • the blockchain node to be accessed is determined according to the blockchain node access parameters corresponding to the user management system.
  • Blockchain node access parameters are parameters used to determine the access rights of blockchain nodes.
  • blockchain nodes are divided into three categories: supervision nodes, management nodes and transaction nodes.
  • the blockchain node access parameter corresponding to the user management system can be configured as the supervision node access parameter
  • the blockchain node to be accessed is the supervision node of the blockchain system.
  • the supervision node is configured with a super key and stored with Full amount of data, you can view all in-chain data.
  • Step S400 Extract personal data to view the user's personal identity information carried in the request.
  • the personal data viewing request is a specific user's data viewing request.
  • a personal data viewing request is generated according to the personal data viewing message, and the user's personal identification information is added to the personal data viewing request to obtain the user's personal data .
  • the blockchain system parses the personal data viewing request to extract the user's personal identification information carried in the personal data viewing request, so as to find the corresponding personal data through the user's personal identification information.
  • Step S500 Find target data that matches the user's personal identity information in the incoming data of the blockchain node to be accessed.
  • the node to be accessed is the supervisory node in the blockchain system.
  • the supervisory node stores the full amount of data, which can find all users' in-chain data. Data management security to ensure that the user's in-chain data cannot be obtained by others.
  • the in-chain data in the blockchain nodes carry the data owner information. According to the user's personal information, find the data owner information and the user's individual in the in-chain data The data matching the identity information is used as the target data, which can ensure that the data viewed by the user is only his own relevant data, which improves the security of data management.
  • step S600 the target data is fed back.
  • the target data can be directly sent to the user terminal through the blockchain system, or the target data can be fed back to the user management system and forwarded to the user terminal through the user management system.
  • the above data management method forwards the personal data viewing request sent by the user terminal through the user management system, determines the blockchain node to be accessed according to the blockchain node access parameters corresponding to the user management system, and extracts the personal identity of the user carried in the personal data viewing request Information, find the target data that matches the user's personal identity information in the incoming data of the blockchain node to be accessed, and feed back the target data.
  • step S200 before receiving the personal data viewing request forwarded by the user management system, further includes step S100.
  • Step S100 Configure block node access parameters corresponding to each terminal according to the preset data management authority of each terminal.
  • Data management authority refers to the authority to write, view and acquire the in-chain data of the blockchain.
  • Terminals include user terminals that need to view personal data, data management terminals such as hospital pharmacies that need to view and write data, People’s Republic of China
  • the terminal of the user management system that needs to obtain data for overall supervision such as the National Health and Health Commission (referred to as the Health and Health Commission for short)
  • the user terminal belongs to the user of the user management system and is used to manage the preset data management authority of the system For data supervision, you can obtain and view all the inbound data of the corresponding blockchain nodes.
  • the configured blockchain node access parameters are the supervision node access parameters.
  • the data management authority of the medical institution to which the doctor or pharmacist belongs is data viewing And write, in order to ensure the privacy of user information, only under the premise of user authorization can the user's historical medical data be obtained, and the blockchain node access parameters of the medical institution are configured as the management node access parameters, and the management node can pass the user Authorize to view the user's in-chain data or upload user's case data from the storage data of the management node.
  • the access parameters of blockchain nodes of some community service center terminals, health rooms and other terminals can be configured as transaction node access parameters.
  • Transaction nodes do not have data storage functions, but can be managed from management nodes or supervision nodes through user authorization. View the user's in-chain data in the stored data or upload the user's case data to the management node or supervision node.
  • the blockchain node includes a supervision node and a management node.
  • configuring the blockchain node access parameters corresponding to each terminal according to the preset data management authority of each terminal includes steps S120 to S130.
  • Step S120 according to the preset data management authority of the user management system, the block node access parameter corresponding to the user management system is configured as the supervision node access parameter, and the supervision node access parameter is used to connect the user management system and the user management system. Multiple user terminals view the in-chain data of the supervision node.
  • Step S130 according to the preset data management authority of the data management terminal, configure the blockchain node access parameter corresponding to the data management terminal as the management node access parameter.
  • the management node access parameter is used to enable the data management terminal to control the In-chain data management.
  • the user terminal can access the supervision node of the blockchain system through the user management system, which not only simplifies the structure of the blockchain, reduces the number of blockchain nodes to be configured, but also realizes The unified management of users will supervise the data with the user management system. Users view personal data through the user management system, which avoids the management burden of many keys caused by individually configuring the corresponding terminals of the user terminal, and reduces the difficulty of managing personal data while ensuring the security of user data.
  • management node access parameters for the terminals of hospitals and other medical institutions medical institutions can view the user's historical medical data after obtaining user authorization through the terminal where they are located, and write encrypted user data into the blockchain. Users can master the ownership of their own medical data.
  • step S130 after configuring the blockchain node access parameters corresponding to each terminal according to the preset data management authority of each terminal, further includes steps S620 to S640.
  • Step S620 Receive the full-volume data viewing request sent by the user management system, and find the in-chain data in the supervision node that meets the required data type according to the type of demand data carried in the full-volume data viewing request.
  • Step S640 Perform data desensitization processing on the in-chain data conforming to the required data type, and send the in-chain data after the data desensitization processing to the user management system.
  • the supervision node stores the full amount of data, and the user management system can process it as an intermediate manager, send personal data viewing messages according to the users it manages, so that the supervision node finds the corresponding personal data and sends it to the terminal; it can also be used as a terminal to obtain directly from the supervision node Relevant data, at this time, the user management system sends a full data viewing request to the supervision node.
  • the type of demand data carried in the full data viewing request may include data related to a certain medical and health system reform measures, statistical data related to a certain type of disease, and a class of drugs Relevant statistical data, etc.
  • the supervision node finds the data that meets the demand data type and sends the data to the user management system after data desensitization processing, which is convenient for data supervision.
  • the desensitization data can be used to establish a population information database, an electronic medical record database, a health archive database, etc., and can also be related to the implementation of the medical and health system reform. Data screening, statistical monitoring of the implementation of the medical and health system reform in major medical institutions.
  • step S130 after configuring the blockchain node access parameters corresponding to each terminal according to the preset data management authority of each terminal, further includes steps S140 to S170.
  • Step S140 Receive the personal data management request sent by the data management terminal, and access the in-chain data of the management node according to the management node access parameter corresponding to the data management terminal.
  • Step S150 Acquire data owner information contained in the personal data viewing request.
  • Step S160 Find the user terminal corresponding to the data owner, and send authorization verification information to the user terminal.
  • Step S170 Receive verification data corresponding to the authorization verification information, and configure the data management terminal's in-chain data management authority for the management node according to the personal data management request.
  • the data management terminal can generally be a hospital-owned terminal, a community service center terminal, a health room-owned terminal, a pharmacy-owned terminal, etc.
  • Visitors such as physicians or pharmacists, according to their medical institutions, send the medical history of the specified patient to the management node of the blockchain
  • the management node sends authorization verification information to the user terminal corresponding to the patient according to the management node access parameters carried by the access request and the patient's data owner information.
  • the authorization verification information can be sent by mail or SMS
  • the verification code is sent to the user terminal corresponding to the patient.
  • the visitor can input the verification code received by the patient through the data management terminal and send the verification code to the management node for verification.
  • the management node configures the visitor's in-chain data management authority for the patient.
  • the in-chain data management authority includes data viewing authority and data upload authority.
  • step S170 after receiving verification data corresponding to the authorization verification information, and according to the personal data management request, after configuring the data management terminal's in-chain data management authority for the management node, steps S180 to S190 are further included.
  • Step S180 When the personal data management request is a personal data upload request, receive the personal data containing the data owner information uploaded by the data management terminal, and join the personal data into the chain.
  • Step S190 when the personal data management request is a personal data viewing request, search for the in-chain data containing the data owner information in the management node, and send the found in-chain data to the data management terminal.
  • the personal data management request includes a personal data viewing request and a personal data upload request, which are used to view the historical medical data of the specified patient, and upload the newly added medical data such as the patient's clinical diagnosis or prescription data to the management node.
  • the issuers of personal data management requests include pharmacists and pharmacists. Physicians need to diagnose the patient's condition based on the patient's historical medical data and the patient's clinical diagnosis process, and upload the consultation data to the corresponding management node.
  • New case data Including texts of medical records recorded in text form, medical imaging data and other images or video materials generated during the examination, and drug lists or prescriptions given after diagnosis.
  • the consultation data includes patient information, drug list or prescription information, course records, various inspection and inspection results.
  • the pharmacist needs to confirm the prescription drugs that need to be sold to the patient based on the drug list or prescription information given by the physician who views the medical data, and upload the drug purchase data to the corresponding management node.
  • the drug purchase data includes prescription usage records and drug purchase records.
  • the data management terminal to which the physician and the pharmacist belong is separated, the access right of the visitor is determined according to the identity information of the corresponding terminal of the visitor, and the medical data corresponding to the access right is sent to the corresponding terminal, if the visitor is a pharmacist , Only display the drug purchase list and prescription information to the terminal where the pharmacist is located, which helps to achieve the separation of medicine.
  • step S190 when the personal data management request is a personal data upload request, the personal data containing the data owner information uploaded by the data management terminal is received, and the personal data is added to the chain Steps S192 to S196 are included.
  • Step S192 when the personal data management request is a personal data upload request, it receives personal data that has been hashed and encrypted, and the personal data is the personal data uploaded by the data management terminal and containing the data owner information.
  • Step S194 Assign the private key corresponding to the personal data to the data management terminal and the user management system.
  • Step S196 Store personal data to the management node, and distribute the public key corresponding to the private key to the management node.
  • Hash encryption refers to the process of encrypting personal data to be uploaded through a hash algorithm.
  • the private key corresponding to personal data can be distributed to the data management terminal and the user terminal corresponding to the data owner.
  • Personal data is stored in the management node, and the public key corresponding to the private key is assigned to the management node, so that the visitor of the data management terminal can view the uploaded data based on the private key.
  • users due to the data broadcast between blockchain nodes, users also You can view your own data through the user management terminal to which you belong, and you can effectively manage the data.
  • steps in the flowcharts of FIGS. 2-8 are displayed in order according to the arrows, the steps are not necessarily executed in the order indicated by the arrows. Unless clearly stated in this article, the execution of these steps is not strictly limited in order, and these steps can be executed in other orders. Moreover, at least some of the steps in FIGS. 2-8 may include multiple sub-steps or multiple stages. These sub-steps or stages are not necessarily executed at the same time, but may be executed at different times. These sub-steps or stages The execution order of is not necessarily sequential, but may be executed in turn or alternately with at least a part of other steps or sub-steps or stages of other steps.
  • a data management device including:
  • the request receiving module 200 is used to receive the personal data viewing request forwarded by the user management system, and the user management system is respectively connected to multiple user terminals.
  • the node determination module 300 is used to determine the blockchain node to be accessed according to the blockchain node access parameter corresponding to the user management system.
  • the information extraction module 400 is used to extract the personal identity information of the user carried in the personal data viewing request.
  • the data search module 500 is used to search for target data that matches the user's personal identity information in the incoming data of the blockchain node to be accessed.
  • the data feedback module 600 is used to feed back target data.
  • the data management device further includes a parameter configuration module, configured to configure the blockchain node access parameters corresponding to each terminal according to the preset data management authority of each terminal.
  • the blockchain node includes a supervision node and a management node; the parameter configuration module is also used to configure the access parameters of the blockchain node corresponding to the user management system according to the preset data management authority of the user management system as Supervision node access parameters.
  • Supervision node access parameters are used to enable the user management system and multiple user terminals connected to the user management system to view the in-chain data of the supervision node, and correspond to the data management terminal according to the preset data management authority of the data management terminal.
  • the blockchain node access parameters are configured as the management node access parameters, and the management node access parameters are used to enable the data management terminal to manage the ingress chain data of the management node through the key.
  • the data management device further includes a user management system access processing module, which is used to receive the full data viewing request sent by the user management system, and find the data in accordance with the demand data carried in the full data viewing request according to the type of demand data carried in the full data viewing request.
  • a user management system access processing module which is used to receive the full data viewing request sent by the user management system, and find the data in accordance with the demand data carried in the full data viewing request according to the type of demand data carried in the full data viewing request.
  • Type of in-chain data perform data desensitization on the in-chain data that meets the required data type, and send the in-chain data after data desensitization to the user management system.
  • the data management device further includes a data management terminal access processing module for receiving a personal data management request sent by the data management terminal, and accessing the in-chain data of the management node according to the management node access parameters corresponding to the data management terminal , Obtain the data owner information contained in the personal data viewing request, find the user terminal corresponding to the data owner, and send authorization verification information to the user terminal, receive the verification data corresponding to the authorization verification information, and configure data management according to the personal data management request
  • the terminal has the right to manage the in-chain data of the management node.
  • the data management terminal access processing module is also used to receive personal data containing data owner information uploaded by the data management terminal when the personal data management request is a personal data upload request, and enter the personal data into When the personal data management request is a personal data viewing request, it searches for the in-chain data containing the data owner information in the management node, and sends the found in-chain data to the data management terminal.
  • the data management terminal access processing module is also used to receive personal data that has been hashed and encrypted when the personal data management request is a personal data upload request.
  • the personal data is data contained in the data uploaded by the data management terminal
  • For the personal data of the owner information assign the private key corresponding to the personal data to the data management terminal and the user management system, store the personal data to the management node, and distribute the public key corresponding to the private key to the management node.
  • the above data management device forwards the personal data viewing request sent by the user terminal through the user management system, determines the blockchain node to be accessed according to the blockchain node access parameters corresponding to the user management system, and extracts the personal identity of the user carried in the personal data viewing request Information, find the target data that matches the user's personal identity information in the incoming data of the blockchain node to be accessed, and feed back the target data.
  • Manage many user terminals through the user management system so that the user terminals establish a connection relationship with the blockchain nodes through the user management system, simplify the blockchain structure, and determine the pending according to the blockchain node access parameters corresponding to the user management system Access the blockchain nodes to obtain the target data in the blockchain nodes to be accessed, avoiding the need for many users to configure the corresponding blockchain nodes separately, which leads to the problem of excessively large number of nodes and significantly reduces the blockchain system
  • the number of blockchain nodes to be configured improves the operating efficiency of the blockchain and improves data management performance.
  • Each module in the above data management device may be implemented in whole or in part by software, hardware, and a combination thereof.
  • the above modules may be embedded in the hardware form or independent of the processor in the computer device, or may be stored in the memory in the computer device in the form of software so that the processor can call and execute the operations corresponding to the above modules.
  • a computer device is provided.
  • the computer device may be a terminal, and an internal structure diagram thereof may be as shown in FIG.
  • the computer equipment includes a processor, a memory, a network interface, a display screen, and an input device connected through a system bus.
  • the processor of the computer device is used to provide computing and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system and computer-readable instructions.
  • the internal memory provides an environment for the operation of the operating system and computer-readable instructions in the non-volatile storage medium.
  • the network interface of the computer device is used to communicate with external terminals through a network connection.
  • the computer readable instructions are executed by the processor to implement a data management method.
  • the display screen of the computer device may be a liquid crystal display screen or an electronic ink display screen
  • the input device of the computer device may be a touch layer covered on the display screen, or may be a button, a trackball or a touchpad provided on the computer device housing , Can also be an external keyboard, touchpad or mouse.
  • FIG. 10 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer equipment to which the solution of the present application is applied.
  • the specific computer equipment may Include more or less components than shown in the figure, or combine certain components, or have a different arrangement of components.
  • a computer device which includes a memory and one or more processors.
  • the memory stores computer-readable instructions.
  • the one or more processors are provided. Perform the following steps:
  • the user management system is connected to multiple user terminals respectively;
  • the processor also implements the following steps when executing computer-readable instructions:
  • each terminal configure the blockchain node access parameters corresponding to each terminal.
  • the processor also implements the following steps when executing computer-readable instructions:
  • the block node access parameter corresponding to the user management system is configured as the supervision node access parameter, and the supervision node access parameter is used to enable the user management system and multiple users connected to the user management system
  • the terminal checks the in-chain data of the supervision node
  • the blockchain node access parameter corresponding to the data management terminal is configured as the management node access parameter, and the management node access parameter is used to enable the data management terminal to access the data of the management node through the key To manage.
  • the processor also implements the following steps when executing computer-readable instructions:
  • the processor also implements the following steps when executing computer-readable instructions:
  • the processor also implements the following steps when executing computer-readable instructions:
  • the personal data management request is a personal data upload request
  • receive the personal data containing the data owner information uploaded by the data management terminal and enter the personal data into the chain;
  • the personal data management request When the personal data management request is a personal data viewing request, it searches for the in-chain data containing the data owner information in the management node, and sends the found in-chain data to the data management terminal.
  • the processor also implements the following steps when executing computer-readable instructions:
  • the personal data management request is a personal data upload request
  • receive personal data that has been hashed and encrypted and the personal data is the personal data uploaded by the data management terminal that contains the information of the data owner
  • one or more non-volatile computer-readable storage media storing computer-readable instructions, when the computer-readable instructions are executed by one or more processors, cause the one or more processors to execute The following steps:
  • the user management system is connected to multiple user terminals respectively;
  • each terminal configure the blockchain node access parameters corresponding to each terminal.
  • the block node access parameter corresponding to the user management system is configured as the supervision node access parameter, and the supervision node access parameter is used to enable the user management system and multiple users connected to the user management system
  • the terminal checks the in-chain data of the supervision node
  • the blockchain node access parameter corresponding to the data management terminal is configured as the management node access parameter, and the management node access parameter is used to enable the data management terminal to access the data of the management node through the key To manage.
  • the personal data management request is a personal data upload request
  • receive the personal data containing the data owner information uploaded by the data management terminal and enter the personal data into the chain;
  • the in-chain data containing the data owner information in the management node is searched, and the found in-chain data is sent to the data management terminal.
  • the personal data management request is a personal data upload request
  • receive personal data that has been hashed and encrypted and the personal data is the personal data uploaded by the data management terminal that contains the information of the data owner
  • Non-volatile memory may include read-only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory can include random access memory (RAM) or external cache memory.
  • RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.
  • SRAM static RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDRSDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM synchronous chain (Synchlink) DRAM
  • SLDRAM synchronous chain (Synchlink) DRAM
  • Rambus direct RAM
  • DRAM direct memory bus dynamic RAM
  • RDRAM memory bus dynamic RAM

Abstract

一种数据管理方法,所述方法包括:接收用户管理系统(114)转发的个人数据查看请求,所述用户管理系统(114)分别与多个用户终端(112)连接(S200);根据用户管理系统(114)对应的区块链节点访问参数,确定待访问区块链节点(S300);提取个人数据查看请求携带的用户个人身份信息(S400);查找待访问区块链节点的入链数据中与用户个人身份信息匹配的目标数据(S500);反馈所述目标数据(S600)。

Description

数据管理方法、装置、计算机设备和存储介质
相关申请的交叉引用
本申请要求于2019年01月04日提交中国专利局,申请号为2019100068948,申请名称为“数据管理方法、装置、计算机设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及一种数据管理方法、装置、计算机设备和存储介质。
背景技术
在医疗行业中,各医疗机构通过独立的内部信息系统存储和处理每个患者的诊疗记录等医疗数据。现实情况下,患者通常会在不同时期在不同医疗机构就诊,但是病历信息存在各个不同的医疗机构中,患者无法掌握和查看自己的医疗数据,并且在不同医疗机构间经常要做重复检查、化验,浪费时间和金钱。
随着通信技术的发展,存储在各个医疗机构的医疗数据在理论上可以实现共享,从而可以满足患者的看病需求,解决了信息孤岛问题。但同时,发明人意识到,由于众多用户之间的复杂连接关系,会对数据管理性能造成一定影响。
发明内容
根据本申请公开的各种实施例,提供一种数据管理方法、装置、计算机设备和存储介质。
一种数据管理方法,方法包括:
接收用户管理系统转发的个人数据查看请求,用户管理系统分别与多个用户终端连接;
根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点;
提取个人数据查看请求携带的用户个人身份信息;
查找待访问区块链节点的入链数据中与用户个人身份信息匹配的目标数据;及
反馈目标数据。
一种数据管理装置,装置包括:
请求接收模块,用于接收用户管理系统转发的个人数据查看请求,用户管理系统分别与多个用户终端连接;
节点确定模块,用于根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点;
信息提取模块,用于提取个人数据查看请求携带的用户个人身份信息;
数据查找模块,用于查找待访问区块链节点的入链数据中与用户个人身份信息匹配的目标数据;及
数据反馈模块,用于反馈目标数据。
一种计算机设备,包括存储器和一个或多个处理器,存储器中储存有计算机可读指令,计算机可读指令被处理器执行时,使得一个或多个处理器执行以下步骤:
接收用户管理系统转发的个人数据查看请求,用户管理系统分别与多个用户终端连接;
根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点;
提取个人数据查看请求携带的用户个人身份信息;
查找待访问区块链节点的入链数据中与用户个人身份信息匹配的目标数据;及
反馈目标数据。
一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:
接收用户管理系统转发的个人数据查看请求,用户管理系统分别与多个用户终端连接;
根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点;
提取个人数据查看请求携带的用户个人身份信息;
查找待访问区块链节点的入链数据中与用户个人身份信息匹配的目标数据;及
反馈目标数据。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和优点将从说明书、附图以及权利要求书变得明显。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1为根据一个或多个实施例中数据管理方法的应用场景图。
图2为根据一个或多个实施例中数据管理方法的应用场景图。
图3为根据一个或多个实施例中数据管理方法的流程示意图。
图4为根据一个或多个实施例中数据管理方法的流程示意图。
图5为根据一个或多个实施例中数据管理方法的流程示意图。
图6为根据一个或多个实施例中数据管理方法的流程示意图。
图7为根据一个或多个实施例中数据管理方法的流程示意图。
图8为根据一个或多个实施例中图7中步骤S190的子步骤的流程示意图。
图9为根据一个或多个实施例中数据管理装置的框图。
图10为根据一个或多个实施例中计算机设备的框图。
具体实施方式
为了使本申请的技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请提供的数据管理方法,可以应用于如图1所示的应用环境中。用户终端112通过网络与用户管理系统114通信,用户管理系统114通过网络与区块链系统120中的区块链节点122进行通信。区块链系统还包括其他的区块链节点,当区块链系统120接收到用户终端112通过用户管理系统114发送的个人数据查看请求,根据用户管理系统114对应的区块链节点访问参数,确定待访问区块链节点122,提取个人数据查看请求携带的用户个人身份信息,查找待访问区块链节点122的入链数据中用户个人身份信息匹配的目标数据,并反馈目标数据。用户终端112可以但不限于是各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备,区块链系统120可以用多个分布式的区块链节点122组成的集群来实现。
在其中一个实施例中,如图2所示,区块链系统120用于管理用户的医疗数据,区块链系统120的节点包括监管节点122、管理节点124和交易节点126三类,监管节点122和管理节点124存储有区块链系统120的入链数据,用户管理系统114根据其配置的监管节点访问参数,可以直接查看监管节点122中存储的全量数据,用户终端112可以通过用户管理系统114查看监管节点122中存储的个人数据。管理节点124根据其配置的管理节点访问参数,在用户终端112授权允许下,医师或药师可通过数据管理终端116凭借用户授权密钥查看管理节点124存储的用户个人数据并上传用户的个人数据至管理节点124。交易节点126不存储入链数据,但可以部分社区服务中心终端或卫生室终端118的可以根据授权密钥访问交易节点126,交易节点126可从监管节点122或管理节点124获取个人数据。
在其中一个实施例中,如图3所示,提供了一种数据管理方法,以该方法应用于图1和图2中的区块链系统,区块链系统中管理的数据为用户的医疗数据为例进行说明,包括以下步骤:
步骤S200,接收用户管理系统转发的个人数据查看请求,用户管理系统分别与多个用户终端连接。
用户终端是指区块链系统中的数据所有者所在的终端,例如区块链系统中存储有患者的医疗数据,则该患者所在的终端为用户终端。用户管理系统是对用户终端的账号密码等进行管理,使用户终端通过用户管理系统与区块链节点建立连接的中间设备,当用户需要查看个人数据,在用户终端通过账号密码登录用户管理系统发送个人数据查看消息,用户 管理系统根据个人数据查看消息与登录用户信息,生成包含用户管理系统对应的区块链节点访问参数的个人数据查看请求,并将个人数据查看请求发送至区块链系统。
步骤S300,根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点。
当区块链系统接收到个人数据查看请求,根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点。区块链节点访问参数是用于确定区块链节点访问权限的参数。根据数据管理权限,区块链节点分为监管节点、管理节点和交易节点三类。在实施例中,可以通过配置用户管理系统对应的区块链节点访问参数为监管节点访问参数,待访问区块链节点为区块链系统的监管节点,监管节点配置有超级秘钥,存储有全量数据,可查看所有入链数据。
步骤S400,提取个人数据查看请求携带的用户个人身份信息。
个人数据查看请求是针对特定用户的数据的查看请求,在用户管理系统根据分人数据查看消息生成个人数据查看请求,将用户的个人身份信息添加至个人数据查看请求,以便获取该用户的个人数据。区块链系统通过对个人数据查看请求进行解析,提取个人数据查看请求携带的用户个人身份信息,以便通过用户个人身份信息查找对应的个人数据。
步骤S500,查找待访问区块链节点的入链数据中与用户个人身份信息匹配的目标数据。
当用户管理系统的区块链节点访问参数为监管节点访问参数时,待访问节点为区块链系统中的监管节点,监管节点存储有全量数据,能查找到所有用户的入链数据,为提高数据管理安全性,确保用户的入链数据无法被他人获取,区块链节点中的入链数据都携带有数据所有者信息,根据用户个人信息,查找入链数据中数据所有者信息与用户个人身份信息匹配的数据作为目标数据,可确保用户查看到的数据仅为自己的相关数据,提高了数据管理的安全性。
步骤S600,反馈目标数据。
将查找到的与用户身份信息匹配的目标数据发送至用户终端,使用户可以了解到自己在不同时间不同地点产生的入链数据,将用户的个人数据的所有权交还给用户。在实施例中,可以通过区块链系统直接将目标数据发送至用户终端,也可以将目标数据反馈至用户管理系统,通过用户管理系统转发至用户终端。
上述数据管理方法,通过用户管理系统转发用户终端发送的个人数据查看请求,根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点,提取个人数据查看请求携带的用户个人身份信息,查找待访问区块链节点的入链数据中用户个人身份信息匹配的目标数据,反馈目标数据。通过用户管理系统对众多的用户终端进行管理,使用户终端通过用户管理系统与区块链节点建立连接关系,简化了区块链结构,根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点,获取到查找待访问区块链节点中的目标数据,避免了众多的用户需分别配置对应的区块链节点,导致节点数目过于庞大的问题,显著减少了区块链系统需配置的区块链节点数目,提高了区块链的运行效率,提升了数据 管理性能。
在其中一个实施例中,如图4所示,步骤S200,接收用户管理系统转发的个人数据查看请求之前,还包括步骤S100。
步骤S100,根据各终端的预设数据管理权限,配置各终端对应的区块链节点访问参数。
数据管理权限是指对区块链的入链数据的写入、查看以及获取等权限,终端包括需要查看个人数据的用户终端,医院药店等需要查看和写入数据的数据管理终端,中华人民共和国国家卫生健康委员会(简称卫健委)等需要获取数据进行统筹监管的用户管理系统所在终端等,在实施例中,用户终端隶属于用户管理系统的用户,用于管理系统的预设数据管理权限为数据监管,可以获取和查看对应区块链节点的所有入链数据,配置的区块链节点访问参数为监管节点访问参数。医生或药师等需要根据用户的历史医疗数据进行诊断或提供药品,并将用户的诊断结果和药品购买数据上传至区块链,因此,医生或药师所属的医疗机构的数据管理权限为数据的查看和写入,为确保用户信息的隐私性,只有在用户授权的前提下,才能获得用户的历史医疗数据,将医疗机构的区块链节点访问参数配置为管理节点访问参数,管理节点可以通过用户授权从管理节点的存储数据中查看用户的入链数据或上传用户的病例数据。还可以根据实际需求,将部分社区服务中心终端、卫生室等终端的区块链节点访问参数配置为交易节点访问参数,交易节点不具有数据存储功能,但可以通过用户授权从管理节点或监管节点的存储数据中查看用户的入链数据或上传用户的病例数据至管理节点或监管节点。
在其中一个实施例中,区块链节点包括监管节点和管理节点。如图5所示,步骤S100,根据各终端的预设数据管理权限,配置各终端对应的区块链节点访问参数包括步骤S120至步骤S130。
步骤S120,根据用户管理系统的预设数据管理权限,将用户管理系统对应的区块链节点访问参数配置为监管节点访问参数,监管节点访问参数用于使用户管理系统以及与用户管理系统连接的多个用户终端查看监管节点的入链数据。
步骤S130,根据数据管理终端的预设数据管理权限,将数据管理终端对应的区块链节点访问参数配置为管理节点访问参数,管理节点访问参数用于使数据管理终端通过密钥对管理节点的入链数据进行管理。
通过给用户管理系统配置监管节点访问参数,使用户终端通过用户管理系统访问区块链系统的监管节点,既简化了区块链的结构,减少了需配置的区块链节点数目,又实现了对用户的统一管理,便与用户管理系统进行数据监管。用户通过用户管理系统查看个人数据,避免了将用户终端单独配置对应的节点带来的众多密钥的管理负担,在确保用户数据安全性的同时,降低了用户对个人数据的管理难度。通过给医院等医疗机构终端配置管理节点访问参数,使医疗机构通过所在终端在得到用户授权后,可以查看用户的历史医疗数据,并将加密处理后的用户数据写入区块链中。用户可以掌握本人医疗数据的所有权,只有在需要的时候,授权给相关的医疗机构查看其个人医疗数据,同时通过入链数据的存储 和查看,用户在不同医疗机构也无需重复检查、化验,在确保病历隐私的同时,提高了就医的效率和质量。
在其中一个实施例中,如图6所示,步骤S130,根据各终端的预设数据管理权限,配置各终端对应的区块链节点访问参数之后,还包括步骤S620至S640。
步骤S620,接收用户管理系统发送的全量数据查看请求,根据全量数据查看请求携带的需求数据类型,查找监管节点中符合需求数据类型的入链数据。
步骤S640,对符合需求数据类型的入链数据进行数据脱敏处理,并将数据脱敏处理后的入链数据发送至用户管理系统。
监管节点存储有全量数据,用户管理系统处理可以作为中间管理者,根据其管理的用户发送个人数据查看消息,使监管节点查找对应的个人数据发送给终端;还可以作为终端,直接向监管节点获取相关数据,此时,用户管理系统向监管节点发送全量数据查看请求,全量数据查看请求携带的需求数据类型可以包括某项医药卫生体制改革措施相关数据,某类疾病相关的统计数据,某类药品相关的统计数据等,监管节点根据需求数据类型,查找符合需求数据类型的数据并进行数据脱敏处理后发送给用户管理系统,便于进行数据的监管。在实施例中,通过卫健委等用户管理系统获取到脱敏数据后,可以利用脱敏数据建立人口信息库、电子病历库、健康档案库等,还可以通过对医药卫生体制改革执行中相关数据的筛选,对各大医疗机构的医药卫生体制改革实施情况进行统计监测。
在其中一个实施例中,如图7所示,步骤S130,根据各终端的预设数据管理权限,配置各终端对应的区块链节点访问参数之后,还包括步骤S140至步骤S170。
步骤S140,接收数据管理终端发送的个人数据管理请求,根据数据管理终端对应的管理节点访问参数,访问管理节点的入链数据。
步骤S150,获取个人数据查看请求中包含的数据所有者信息。
步骤S160,查找数据所有者对应的用户终端,并向用户终端发送授权验证信息。
步骤S170,接收授权验证信息对应的验证数据,根据个人数据管理请求,配置数据管理终端对管理节点的入链数据管理权限。
数据管理终端一般可以为医院所属终端、社区服务中心终端、卫生室所属终端、药店所属终端等,医师或药师等访问者,根据所属医疗机构,向区块链的管理节点发送对指定患者历史医疗数据的个人数据管理请求,管理节点根据访问请求携带的管理节点访问参数和患者的数据所有者信息,向患者对应的用户终端发送授权验证信息,授权验证信息可以是通过邮件或短信的方式,发送验证码至患者对应的用户终端,访问者可以通过数据管理终端输入患者收到的验证码,并发送该验证码至管理节点进行验证。接收患者对授权验证信息的验证数据如验证码等时,管理节点配置访问者对患者的入链数据管理权限,入链数据管理权限包括数据查看权限和数据上传权限。
在其中一个实施例中,步骤S170,接收授权验证信息对应的验证数据,根据个人数据管理请求,配置数据管理终端对管理节点的入链数据管理权限之后,还包括步骤S180至 步骤S190。
步骤S180,当个人数据管理请求为个人数据上传请求时,接收数据管理终端上传的包含有数据所有者信息的个人数据,并将个人数据入链。
步骤S190,当个人数据管理请求为个人数据查看请求时,查找管理节点中包含数据所有者信息的入链数据,并将查找到的入链数据发送至数据管理终端。
个人数据管理请求包括个人数据查看请求和个人数据上传请求,分别用于查看指定患者的历史医疗数据,以及将患者的临床诊断情况或处方数据等新增医疗数据上传至管理节点。个人数据管理请求的发出者包括以使和药师,医师需要根据患者的历史医疗数据,结合患者的临床诊断过程,对患者的病情进行诊断,并上传就诊数据至对应管理节点,新增的病例数据包括文字形式记录的病历文本,检查时产生的医学影像资料等图像或视频资料,以及诊断后给出的药品清单或处方等。就诊数据包括患者信息、药品清单或处方信息、病程记录、各项检验和检查结果。药师需要根据查看医疗数据中医师给出的药品清单或处方信息,确认需要向患者出售的处方药,并将购药数据上传至对应管理节点,购药数据包括处方使用记录和购药记录。在实施例中,将医师和药师所属的数据管理终端分开,根据访问者对应终端的身份信息,确定该访问者的访问权限,发送该访问权限对应的医疗数据至对应终端,如访问者是药师,则仅显示购药清单和处方信息至药师所在的终端,有助于实现医药分离。
在其中一个实施例中,如图8所示,步骤S190,当个人数据管理请求为个人数据上传请求时,接收数据管理终端上传的包含有数据所有者信息的个人数据,并将个人数据入链包括步骤S192至步骤S196。
步骤S192,当个人数据管理请求为个人数据上传请求时,接收经过哈希加密处理的个人数据,个人数据为数据管理终端上传的包含有数据所有者信息的个人数据。
步骤S194,分配个人数据对应的私钥至数据管理终端和用户管理系统。
步骤S196,将个人数据存储至管理节点,并分配私钥对应的公钥至管理节点。
哈希加密是指通过哈希算法,对待上传的个人数据进行加密处理的过程,通过进行哈希加密处理,可以分配个人数据对应的私钥至数据管理终端和数据所有者对应的用户终端,将个人数据存储至管理节点,并分配私钥对应的公钥至管理节点,以使数据管理终端的访问者可以根据私钥查看上传的数据,同时由于区块链节点之间的数据广播,用户也可以通过其所属的用户管理终端查看到本人的数据,实现了数据的有效管理。
应该理解的是,虽然图2-8的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图2-8中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地 执行。
在其中一个实施例中,如图9所示,提供了一种数据管理装置,包括:
请求接收模块200,用于接收用户管理系统转发的个人数据查看请求,用户管理系统分别与多个用户终端连接。
节点确定模块300,用于根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点。
信息提取模块400,用于提取个人数据查看请求携带的用户个人身份信息。
数据查找模块500,用于查找待访问区块链节点的入链数据中与用户个人身份信息匹配的目标数据。
数据反馈模块600,用于反馈目标数据。
在其中一个实施例中,数据管理装置还包括参数配置模块,用于根据各终端的预设数据管理权限,配置各终端对应的区块链节点访问参数。
在其中一个实施例中,区块链节点包括监管节点和管理节点;参数配置模块,还用于根据用户管理系统的预设数据管理权限,将用户管理系统对应的区块链节点访问参数配置为监管节点访问参数,监管节点访问参数用于使用户管理系统以及与用户管理系统连接的多个用户终端查看监管节点的入链数据,根据数据管理终端的预设数据管理权限,将数据管理终端对应的区块链节点访问参数配置为管理节点访问参数,管理节点访问参数用于使数据管理终端通过密钥对管理节点的入链数据进行管理。
在其中一个实施例中,数据管理装置还包括用户管理系统访问处理模块,用于接收用户管理系统发送的全量数据查看请求,根据全量数据查看请求携带的需求数据类型,查找监管节点中符合需求数据类型的入链数据,对符合需求数据类型的入链数据进行数据脱敏处理,并将数据脱敏处理后的入链数据发送至用户管理系统。
在其中一个实施例中,数据管理装置还包括数据管理终端访问处理模块,用于接收数据管理终端发送的个人数据管理请求,根据数据管理终端对应的管理节点访问参数,访问管理节点的入链数据,获取个人数据查看请求中包含的数据所有者信息,查找数据所有者对应的用户终端,并向用户终端发送授权验证信息,接收授权验证信息对应的验证数据,根据个人数据管理请求,配置数据管理终端对管理节点的入链数据管理权限。
在其中一个实施例中,数据管理终端访问处理模块,还用于当个人数据管理请求为个人数据上传请求时,接收数据管理终端上传的包含有数据所有者信息的个人数据,并将个人数据入链,当个人数据管理请求为个人数据查看请求时,查找管理节点中包含数据所有者信息的入链数据,并将查找到的入链数据发送至数据管理终端。
在其中一个实施例中,数据管理终端访问处理模块,还用于当个人数据管理请求为个人数据上传请求时,接收经过哈希加密处理的个人数据,个人数据为数据管理终端上传的包含有数据所有者信息的个人数据,分配个人数据对应的私钥至数据管理终端和用户管理 系统,将个人数据存储至管理节点,并分配私钥对应的公钥至管理节点。
上述数据管理装置,通过用户管理系统转发用户终端发送的个人数据查看请求,根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点,提取个人数据查看请求携带的用户个人身份信息,查找待访问区块链节点的入链数据中用户个人身份信息匹配的目标数据,反馈目标数据。通过用户管理系统对众多的用户终端进行管理,使用户终端通过用户管理系统与区块链节点建立连接关系,简化了区块链结构,根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点,获取到查找待访问区块链节点中的目标数据,避免了众多的用户需分别配置对应的区块链节点,导致节点数目过于庞大的问题,显著减少了区块链系统需配置的区块链节点数目,提高了区块链的运行效率,提升了数据管理性能。
关于数据管理装置的具体限定可以参见上文中对于数据管理方法的限定,在此不再赘述。上述数据管理装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在其中一个实施例中,提供了一种计算机设备,该计算机设备可以是终端,其内部结构图可以如图10所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口、显示屏和输入装置。该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统和计算机可读指令。该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机可读指令被处理器执行时以实现一种数据管理方法。该计算机设备的显示屏可以是液晶显示屏或者电子墨水显示屏,该计算机设备的输入装置可以是显示屏上覆盖的触摸层,也可以是计算机设备外壳上设置的按键、轨迹球或触控板,还可以是外接的键盘、触控板或鼠标等。
本领域技术人员可以理解,图10中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
在其中一个实施例中,提供了一种计算机设备,包括存储器和一个或多个处理器,存储器中储存有计算机可读指令,计算机可读指令被处理器执行时,使得一个或多个处理器执行以下步骤:
接收用户管理系统转发的个人数据查看请求,用户管理系统分别与多个用户终端连接;
根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点;
提取个人数据查看请求携带的用户个人身份信息;
查找待访问区块链节点的入链数据中与用户个人身份信息匹配的目标数据;
反馈目标数据。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:
根据各终端的预设数据管理权限,配置各终端对应的区块链节点访问参数。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:
根据用户管理系统的预设数据管理权限,将用户管理系统对应的区块链节点访问参数配置为监管节点访问参数,监管节点访问参数用于使用户管理系统以及与用户管理系统连接的多个用户终端查看监管节点的入链数据;
根据数据管理终端的预设数据管理权限,将数据管理终端对应的区块链节点访问参数配置为管理节点访问参数,管理节点访问参数用于使数据管理终端通过密钥对管理节点的入链数据进行管理。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:
接收用户管理系统发送的全量数据查看请求,根据全量数据查看请求携带的需求数据类型,查找监管节点中符合需求数据类型的入链数据;
对符合需求数据类型的入链数据进行数据脱敏处理,并将数据脱敏处理后的入链数据发送至用户管理系统。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:
接收数据管理终端发送的个人数据管理请求,根据数据管理终端对应的管理节点访问参数,访问管理节点的入链数据;
获取个人数据查看请求中包含的数据所有者信息;
查找数据所有者对应的用户终端,并向用户终端发送授权验证信息;
接收授权验证信息对应的验证数据,根据个人数据管理请求,配置数据管理终端对管理节点的入链数据管理权限。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:
当个人数据管理请求为个人数据上传请求时,接收数据管理终端上传的包含有数据所有者信息的个人数据,并将个人数据入链;
当个人数据管理请求为个人数据查看请求时,查找管理节点中包含数据所有者信息的入链数据,并将查找到的入链数据发送至数据管理终端。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:
当个人数据管理请求为个人数据上传请求时,接收经过哈希加密处理的个人数据,个人数据为数据管理终端上传的包含有数据所有者信息的个人数据;
分配个人数据对应的私钥至数据管理终端和用户管理系统;
将个人数据存储至管理节点,并分配私钥对应的公钥至管理节点。
在其中一个实施例中,一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:
接收用户管理系统转发的个人数据查看请求,用户管理系统分别与多个用户终端连接;
根据用户管理系统对应的区块链节点访问参数,确定待访问区块链节点;
提取个人数据查看请求携带的用户个人身份信息;
查找待访问区块链节点的入链数据中与用户个人身份信息匹配的目标数据;
反馈目标数据。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:
根据各终端的预设数据管理权限,配置各终端对应的区块链节点访问参数。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:
根据用户管理系统的预设数据管理权限,将用户管理系统对应的区块链节点访问参数配置为监管节点访问参数,监管节点访问参数用于使用户管理系统以及与用户管理系统连接的多个用户终端查看监管节点的入链数据;
根据数据管理终端的预设数据管理权限,将数据管理终端对应的区块链节点访问参数配置为管理节点访问参数,管理节点访问参数用于使数据管理终端通过密钥对管理节点的入链数据进行管理。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:
接收用户管理系统发送的全量数据查看请求,根据全量数据查看请求携带的需求数据类型,查找监管节点中符合需求数据类型的入链数据;
对符合需求数据类型的入链数据进行数据脱敏处理,并将数据脱敏处理后的入链数据发送至用户管理系统。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:
接收数据管理终端发送的个人数据管理请求,根据数据管理终端对应的管理节点访问参数,访问管理节点的入链数据;
获取个人数据查看请求中包含的数据所有者信息;
查找数据所有者对应的用户终端,并向用户终端发送授权验证信息;
接收授权验证信息对应的验证数据,根据个人数据管理请求,配置数据管理终端对管理节点的入链数据管理权限。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:
当个人数据管理请求为个人数据上传请求时,接收数据管理终端上传的包含有数据所有者信息的个人数据,并将个人数据入链;
当个人数据管理请求为个人数据查看请求,查找管理节点中包含数据所有者信息的入链数据,并将查找到的入链数据发送至数据管理终端。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:
当个人数据管理请求为个人数据上传请求时,接收经过哈希加密处理的个人数据,个人数据为数据管理终端上传的包含有数据所有者信息的个人数据;
分配个人数据对应的私钥至数据管理终端和用户管理系统;
将个人数据存储至管理节点,并分配私钥对应的公钥至管理节点。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对申请专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种数据管理方法,所述方法包括:
    接收用户管理系统转发的个人数据查看请求,所述用户管理系统分别与多个用户终端连接;
    根据所述用户管理系统对应的区块链节点访问参数,确定待访问区块链节点;
    提取所述个人数据查看请求携带的用户个人身份信息;
    查找所述待访问区块链节点的入链数据中与所述用户个人身份信息匹配的目标数据;及
    反馈所述目标数据。
  2. 根据权利要求1所述的方法,其特征在于,所述接收用户管理系统转发的个人数据查看请求之前,还包括:
    根据各终端的预设数据管理权限,配置所述各终端对应的区块链节点访问参数。
  3. 根据权利要求2所述的方法,其特征在于,区块链节点包括监管节点和管理节点;所述根据各终端的预设数据管理权限,配置所述各终端对应的区块链节点访问参数包括:
    根据用户管理系统的预设数据管理权限,将所述用户管理系统对应的区块链节点访问参数配置为监管节点访问参数,所述监管节点访问参数用于使所述用户管理系统以及与所述用户管理系统连接的所述多个用户终端查看所述监管节点的入链数据;及
    根据数据管理终端的预设数据管理权限,将所述数据管理终端对应的区块链节点访问参数配置为管理节点访问参数,所述管理节点访问参数用于使所述数据管理终端通过密钥对所述管理节点的入链数据进行管理。
  4. 根据权利要求3所述的方法,其特征在于,所述根据各终端的预设数据管理权限,配置所述各终端对应的区块链节点访问参数之后,还包括:
    接收所述用户管理系统发送的全量数据查看请求,根据所述全量数据查看请求携带的需求数据类型,查找所述监管节点中符合所述需求数据类型的入链数据;及
    对符合所述需求数据类型的入链数据进行数据脱敏处理,并将数据脱敏处理后的入链数据发送至所述用户管理系统。
  5. 根据权利要求3所述的方法,其特征在于,所述根据各终端的预设数据管理权限,配置所述各终端对应的区块链节点访问参数之后,还包括:
    接收所述数据管理终端发送的个人数据管理请求,根据所述数据管理终端对应的管理节点访问参数,访问所述管理节点的入链数据;
    获取所述个人数据查看请求中包含的数据所有者信息;
    查找所述数据所有者对应的用户终端,并向所述用户终端发送授权验证信息;及
    接收所述授权验证信息对应的验证数据,根据所述个人数据管理请求,配置所述数据管理终端对所述管理节点的入链数据管理权限。
  6. 根据权利要求5所述的方法,其特征在于,所述接收所述授权验证信息对应的验 证数据,根据所述个人数据管理请求,配置所述数据管理终端对所述管理节点的入链数据管理权限之后,还包括:
    当所述个人数据管理请求为个人数据上传请求时,接收所述数据管理终端上传的包含有数据所有者信息的个人数据,并将所述个人数据入链;及
    当所述个人数据管理请求为个人数据查看请求时,查找所述管理节点中包含所述数据所有者信息的入链数据,并将所述查找到的入链数据发送至所述数据管理终端。
  7. 根据权利要求6所述的方法,其特征在于,所述当所述个人数据管理请求为个人数据上传请求时,接收所述数据管理终端上传的包含有数据所有者信息的个人数据,并将所述个人数据入链包括:
    当所述个人数据管理请求为个人数据上传请求时,接收经过哈希加密处理的个人数据,所述个人数据为数据管理终端上传的包含有数据所有者信息的个人数据;
    分配所述个人数据对应的私钥至所述数据管理终端和所述用户管理系统;及
    将所述个人数据存储至所述管理节点,并分配所述私钥对应的公钥至所述管理节点。
  8. 一种数据管理装置,其特征在于,所述装置包括:
    请求接收模块,用于接收用户管理系统转发的个人数据查看请求,所述用户管理系统分别与多个用户终端连接;
    节点确定模块,用于根据所述用户管理系统对应的区块链节点访问参数,确定待访问区块链节点;
    信息提取模块,用于提取所述个人数据查看请求携带的用户个人身份信息;
    数据查找模块,用于查找所述待访问区块链节点的入链数据中与所述用户个人身份信息匹配的目标数据;及
    数据反馈模块,用于反馈所述目标数据。
  9. 根据权利要求8所述的方法,其特征在于,所述数据管理装置还包括:
    参数配置模块,用于根据各终端的预设数据管理权限,配置所述各终端对应的区块链节点访问参数。
  10. 根据权利要求9所述的方法,其特征在于,所述区块链节点包括监管节点和管理节点;所述参数配置模块还包括:
    监管节点参数配置单元,用于根据用户管理系统的预设数据管理权限,将所述用户管理系统对应的区块链节点访问参数配置为监管节点访问参数,所述监管节点访问参数用于使所述用户管理系统以及与所述用户管理系统连接的所述多个用户终端查看所述监管节点的入链数据;及
    管理节点参数配置单元,用于根据数据管理终端的预设数据管理权限,将所述数据管理终端对应的区块链节点访问参数配置为管理节点访问参数,所述管理节点访问参数用于使所述数据管理终端通过密钥对所述管理节点的入链数据进行管理。
  11. 根据权利要求10所述的方法,其特征在于,所述数据管理装置还包括用户管理 系统访问处理模块,用于接收所述用户管理系统发送的全量数据查看请求,根据所述全量数据查看请求携带的需求数据类型,查找所述监管节点中符合所述需求数据类型的入链数据,对符合所述需求数据类型的入链数据进行数据脱敏处理,并将数据脱敏处理后的入链数据发送至所述用户管理系统。
  12. 根据权利要求10所述的方法,其特征在于,所述数据管理装置还包括数据管理终端访问处理模块,所述数据管理终端访问处理模块,包括:
    管理请求接收单元,用于接收所述数据管理终端发送的个人数据管理请求,根据所述数据管理终端对应的管理节点访问参数,访问所述管理节点的入链数据;
    信息获取单元,用于获取所述个人数据查看请求中包含的数据所有者信息;
    验证信息发送单元,用于查找所述数据所有者对应的用户终端,并向所述用户终端发送授权验证信息;及
    管理权限配置单元,用于接收所述授权验证信息对应的验证数据,根据所述个人数据管理请求,配置所述数据管理终端对所述管理节点的入链数据管理权限。
  13. 根据权利要求12所述的方法,其特征在于,所述数据管理终端访问处理模块还包括:
    个人数据入链单元,用于当所述个人数据管理请求为个人数据上传请求时,接收所述数据管理终端上传的包含有数据所有者信息的个人数据,并将所述个人数据入链;及
    个人数据查看单元,用于当所述个人数据管理请求为个人数据查看请求时,查找所述管理节点中包含所述数据所有者信息的入链数据,并将所述查找到的入链数据发送至所述数据管理终端。
  14. 根据权利要求13所述的方法,其特征在于,所述个人数据入链单元,还包括:
    加密数据接收子单元,用于当所述个人数据管理请求为个人数据上传请求时,接收经过哈希加密处理的个人数据,所述个人数据为数据管理终端上传的包含有数据所有者信息的个人数据;
    私钥分配单元,用于分配所述个人数据对应的私钥至所述数据管理终端和所述用户管理系统;及
    公钥分配单元,用于将所述个人数据存储至所述管理节点,并分配所述私钥对应的公钥至所述管理节点。
  15. 一种计算机设备,包括存储器及一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    接收用户管理系统转发的个人数据查看请求,所述用户管理系统分别与多个用户终端连接;
    根据所述用户管理系统对应的区块链节点访问参数,确定待访问区块链节点;
    提取所述个人数据查看请求携带的用户个人身份信息;
    查找所述待访问区块链节点的入链数据中与所述用户个人身份信息匹配的目标数据;及
    反馈所述目标数据。
  16. 根据权利要求15所述的方法,其特征在于,所述处理器执行所述计算机可读指令时还执行以下步骤:
    根据各终端的预设数据管理权限,配置所述各终端对应的区块链节点访问参数。
  17. 根据权利要求16所述的计算机设备,其特征在于,区块链节点包括监管节点和管理节点;所述处理器执行所述计算机可读指令时还执行以下步骤:
    根据用户管理系统的预设数据管理权限,将所述用户管理系统对应的区块链节点访问参数配置为监管节点访问参数,所述监管节点访问参数用于使所述用户管理系统以及与所述用户管理系统连接的所述多个用户终端查看所述监管节点的入链数据;及
    根据数据管理终端的预设数据管理权限,将所述数据管理终端对应的区块链节点访问参数配置为管理节点访问参数,所述管理节点访问参数用于使所述数据管理终端通过密钥对所述管理节点的入链数据进行管理。
  18. 一个或多个存储有计算机可读指令的非易失性计算机可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    接收用户管理系统转发的个人数据查看请求,所述用户管理系统分别与多个用户终端连接;
    根据所述用户管理系统对应的区块链节点访问参数,确定待访问区块链节点;
    提取所述个人数据查看请求携带的用户个人身份信息;
    查找所述待访问区块链节点的入链数据中与所述用户个人身份信息匹配的目标数据;及
    反馈所述目标数据。
  19. 根据权利要求18所述的方法,其特征在于,所述处理器执行所述计算机可读指令时还执行以下步骤:
    根据各终端的预设数据管理权限,配置所述各终端对应的区块链节点访问参数。
  20. 根据权利要求19所述的计算机设备,其特征在于,区块链节点包括监管节点和管理节点;所述处理器执行所述计算机可读指令时还执行以下步骤:
    根据用户管理系统的预设数据管理权限,将所述用户管理系统对应的区块链节点访问参数配置为监管节点访问参数,所述监管节点访问参数用于使所述用户管理系统以及与所述用户管理系统连接的所述多个用户终端查看所述监管节点的入链数据;及
    根据数据管理终端的预设数据管理权限,将所述数据管理终端对应的区块链节点访问参数配置为管理节点访问参数,所述管理节点访问参数用于使所述数据管理终端通过密钥对所述管理节点的入链数据进行管理。
PCT/CN2019/122483 2019-01-04 2019-12-02 数据管理方法、装置、计算机设备和存储介质 WO2020140666A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910006894.8 2019-01-04
CN201910006894.8A CN109741802A (zh) 2019-01-04 2019-01-04 数据管理方法、装置、计算机设备和存储介质

Publications (1)

Publication Number Publication Date
WO2020140666A1 true WO2020140666A1 (zh) 2020-07-09

Family

ID=66363413

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/122483 WO2020140666A1 (zh) 2019-01-04 2019-12-02 数据管理方法、装置、计算机设备和存储介质

Country Status (2)

Country Link
CN (1) CN109741802A (zh)
WO (1) WO2020140666A1 (zh)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111859430A (zh) * 2020-07-23 2020-10-30 深圳市纳研科技有限公司 一种企业数据安全管理方法、系统及电子设备
CN112420155A (zh) * 2020-12-10 2021-02-26 商丘医学高等专科学校 一种护理药品购买方法及系统
CN112531891A (zh) * 2020-11-19 2021-03-19 辽宁东科电力有限公司 一种基于区块链的输电线路在线监测系统参数数据处理与定位方法
CN112995211A (zh) * 2021-04-21 2021-06-18 腾讯科技(深圳)有限公司 基于区块链网络的数据处理方法、装置、设备及存储介质
CN115086432A (zh) * 2022-06-10 2022-09-20 深圳云创数安科技有限公司 基于网关监督的数据处理方法、装置、设备及存储介质
CN116663983A (zh) * 2023-05-25 2023-08-29 杭州威灿科技有限公司 一种综合执法管理考评系统及方法

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815081A (zh) * 2018-12-14 2019-05-28 深圳壹账通智能科技有限公司 数据库性能的远程收集方法及收集装置
CN109741802A (zh) * 2019-01-04 2019-05-10 深圳壹账通智能科技有限公司 数据管理方法、装置、计算机设备和存储介质
SG11202002166PA (en) * 2019-05-21 2020-04-29 Alibaba Group Holding Ltd Methods and devices for storing and processing electronic medical record on blockchain
CN110232264A (zh) * 2019-06-12 2019-09-13 郑州西亚斯学院 一种计算机大数据处理装置
CN110599142A (zh) * 2019-09-16 2019-12-20 腾讯科技(深圳)有限公司 数据存储方法、装置、计算机设备和存储介质
CN111046266A (zh) * 2019-12-11 2020-04-21 北京阿尔山区块链联盟科技有限公司 数据管理方法、装置和服务器
CN111224971A (zh) * 2019-12-31 2020-06-02 陕西医链区块链集团有限公司 区块链数据加解密方法及加解密系统
CN112015828A (zh) * 2020-08-12 2020-12-01 上海九吾尊易信息科技有限公司 基于区块链的数据内容处理方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018112035A1 (en) * 2016-12-14 2018-06-21 Wal-Mart Stores, Inc. Obtaining a medical record stored on a blockchain from a wearable device
CN108460290A (zh) * 2017-12-27 2018-08-28 江苏省卫生统计信息中心 一种电子健康档案管理系统及方法
CN108959945A (zh) * 2018-07-06 2018-12-07 腾讯科技(深圳)有限公司 医疗数据共享方法、装置、计算机可读介质及电子设备
CN109741802A (zh) * 2019-01-04 2019-05-10 深圳壹账通智能科技有限公司 数据管理方法、装置、计算机设备和存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018112035A1 (en) * 2016-12-14 2018-06-21 Wal-Mart Stores, Inc. Obtaining a medical record stored on a blockchain from a wearable device
CN108460290A (zh) * 2017-12-27 2018-08-28 江苏省卫生统计信息中心 一种电子健康档案管理系统及方法
CN108959945A (zh) * 2018-07-06 2018-12-07 腾讯科技(深圳)有限公司 医疗数据共享方法、装置、计算机可读介质及电子设备
CN109741802A (zh) * 2019-01-04 2019-05-10 深圳壹账通智能科技有限公司 数据管理方法、装置、计算机设备和存储介质

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111859430A (zh) * 2020-07-23 2020-10-30 深圳市纳研科技有限公司 一种企业数据安全管理方法、系统及电子设备
CN111859430B (zh) * 2020-07-23 2024-04-16 深圳市纳研科技有限公司 一种企业数据安全管理方法、系统及电子设备
CN112531891A (zh) * 2020-11-19 2021-03-19 辽宁东科电力有限公司 一种基于区块链的输电线路在线监测系统参数数据处理与定位方法
CN112420155A (zh) * 2020-12-10 2021-02-26 商丘医学高等专科学校 一种护理药品购买方法及系统
CN112420155B (zh) * 2020-12-10 2023-11-17 商丘医学高等专科学校 一种护理药品购买方法及系统
CN112995211A (zh) * 2021-04-21 2021-06-18 腾讯科技(深圳)有限公司 基于区块链网络的数据处理方法、装置、设备及存储介质
CN115086432A (zh) * 2022-06-10 2022-09-20 深圳云创数安科技有限公司 基于网关监督的数据处理方法、装置、设备及存储介质
CN116663983A (zh) * 2023-05-25 2023-08-29 杭州威灿科技有限公司 一种综合执法管理考评系统及方法
CN116663983B (zh) * 2023-05-25 2023-12-01 杭州威灿科技有限公司 一种综合执法管理考评系统及方法

Also Published As

Publication number Publication date
CN109741802A (zh) 2019-05-10

Similar Documents

Publication Publication Date Title
WO2020140666A1 (zh) 数据管理方法、装置、计算机设备和存储介质
EP3236374B1 (en) Distributed healthcare records management
US20220198419A1 (en) System and method for managing payments for accessing patients' information
CN108595641B (zh) 一种处方信息存储方法、设备、系统及存储介质
CN110634544A (zh) 基于区块链的病历数据处理方法、装置、存储介质和设备
US8548824B1 (en) Systems and methods for notifying of duplicate product prescriptions
US20140039910A1 (en) Controlled Communications System for Physician-Hospital System Integration
KR102113806B1 (ko) 개인의료정보데이터 관리방법 및 시스템
CN109947854B (zh) 基于区块链的电子病历处理方法、装置、设备和介质
KR102279377B1 (ko) 블록체인을 이용한 개인 권한 기반의 의료 정보 제공 시스템
US20210005296A1 (en) System and method for determining best practices for third parties accessing a health care network
JP2008015818A (ja) 患者情報管理システム
CN111370118A (zh) 跨医疗机构的诊疗安全分析方法、装置和计算机设备
WO2021062310A1 (en) Utilizing a user's health data stored over a health care network for disease prevention
EP4034985A1 (en) System and method for providing access of a user's health information to third parties
US20160283662A1 (en) Systems, methods, apparatuses, and computer program products for providing an interactive, context-sensitive electronic health record interface
US20200118656A1 (en) Systems for validating healthcare transactions
WO2021191687A1 (en) Cloud-based medical record management system with patient control
US20230317224A1 (en) Patient specified health record on blockchain
US20180330286A1 (en) Method and system for managing diagnostic imaging orders
US20220343021A1 (en) Referential data grouping and tokenization for longitudinal use of de-identified data
KR102500968B1 (ko) 블록체인 기반의 헬스케어 데이터 제공 방법, 서비스 서버 및 시스템
US20230171232A1 (en) Method and system for asynchronous medical patient data communication between multiple parties
US20210005299A1 (en) System and method for improving treatment of a chronic disease of a patient
CN116610659A (zh) 肝癌专病数据库构建方法、数据库、电子设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19907225

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 26/10/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19907225

Country of ref document: EP

Kind code of ref document: A1