CN104166823A - Intelligent medical data safety guarantee system - Google Patents
Intelligent medical data safety guarantee system Download PDFInfo
- Publication number
- CN104166823A CN104166823A CN201410466597.9A CN201410466597A CN104166823A CN 104166823 A CN104166823 A CN 104166823A CN 201410466597 A CN201410466597 A CN 201410466597A CN 104166823 A CN104166823 A CN 104166823A
- Authority
- CN
- China
- Prior art keywords
- unit
- data
- macrodata
- enciphering
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 5
- 230000008569 process Effects 0.000 claims abstract description 4
- 230000036541 health Effects 0.000 claims description 99
- 238000012545 processing Methods 0.000 claims description 46
- 230000006870 function Effects 0.000 claims description 14
- 238000004891 communication Methods 0.000 claims description 13
- 238000012360 testing method Methods 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 claims description 10
- HDDSHPAODJUKPD-UHFFFAOYSA-N fenbendazole Chemical compound C1=C2NC(NC(=O)OC)=NC2=CC=C1SC1=CC=CC=C1 HDDSHPAODJUKPD-UHFFFAOYSA-N 0.000 claims description 7
- 239000012634 fragment Substances 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 claims description 4
- 238000000605 extraction Methods 0.000 claims description 3
- 239000000835 fiber Substances 0.000 claims description 3
- 230000010365 information processing Effects 0.000 claims description 3
- 230000002452 interceptive effect Effects 0.000 claims description 3
- 238000012856 packing Methods 0.000 claims description 3
- 230000000153 supplemental effect Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 230000008901 benefit Effects 0.000 abstract description 3
- 241001269238 Data Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an intelligent medical data safety guarantee system which comprises all links of the whole medial process. The intelligent medical data safety guarantee system can effectively prevent data of the links from being leaked, provides a more effective medical service which is convenient and fast to implement for users, guarantees safety of relevant information of the users, and has wide market prospects and great advantages.
Description
Technical field
The present invention relates to medical field, relate in particular to a kind of wisdom medical data safe-guard system.
Background technology
Wisdom medical treatment, also referred to as portable medical, the International Medical health HIMSS of member organization provides and is defined as, mHealth, mobile healthy, by using, mobile communication technology---for example PDA, mobile phone and satellite communication provide medical services and information exactly, specific to mobile Internet field, with the medical treatment & health class App based on mobile terminal systems such as Android and iOS, are applied as master.The medical and health services of Ta Wei developing country provide a kind of effective ways, the in the situation that of medical treatment manpower shortage of resources, can solve the medical care problem of developing country by portable medical.
Development along with wisdom medical treatment, increasing platform, terminal and infosystem are built, the medical data accumulating is also more and more huger, in these medical datas, comprise a large amount of user privacy informations, if do not kept properly, these information are easy to stolen, distort and forge by inside and outside assailant; And existing processing mode is only to use key to carry out simple encryption to stored data, and the managerial confusion of key, cannot be from truly protecting the safety of medical data.
Summary of the invention
The object of the invention is to be achieved through the following technical solutions.
According to the embodiment of the present invention, propose a kind of wisdom medical data safe-guard system, described system comprises that data transmission ciphering unit, user identify access unit, electronic health record unit, electronic signature unit, the pre-ciphering unit of macrodata, macrodata storage unit and macrodata distributed storage ciphering unit;
Described data transmission ciphering unit for after gathering the supplemental characteristic relevant to user health, carried out the first encryption, and the image data of carrying out after the first encryption is sent to electronic health record unit before sending the data that gather;
Described user identifies access unit when user accesses electronic medical record system, carries out the authentication to user, and after by authentication, unlocking electronic case history system;
Described electronic health record unit is used for according to the image data receiving and doctor's diagnostic data generating digital health account;
Sign for the digital health archives that electronic health record unit is generated in described electronic signature unit, for guaranteeing the authenticity of data and preventing from being tampered;
The pre-ciphering unit of described macrodata is for encrypting being in advance about to be uploaded to the data of macrodata storage unit, and the described data that are about to be uploaded to macrodata storage unit comprise image data after the first encryption and through the digital health archives of electronic signature;
Described macrodata storage unit is for storing whole users' encrypted image data and the digital health archives through signing electronically, described macrodata storage unit is distributed storage, it comprises and is arranged at the high in the clouds macrodata administrative unit of administration of health department and the distributed memory that is arranged at each medical institutions, described distributed memory is all set to 1+n redundancy backup, adopts high speed fibre to connect between each distributed memory;
Described macrodata distributed storage ciphering unit is for carrying out superencipher to carrying out the macrodata of distributed storage.
According to the preferred embodiment of the present invention, described data transmission ciphering unit comprises: DB44 input port, FPGA enciphering/deciphering processing module, DB44 output port, random number generation module, Flash memory chip and testing circuit;
Described DB44 input port is connected with FPGA enciphering/deciphering processing module, and DB44 output port is connected with FPGA enciphering/deciphering processing module; DB44 input port receives the signal of higher level's link arrival and carries enough in FPGA enciphering/deciphering processing module, FPGA enciphering/deciphering processing module is extracted data message and is adopted block cipher to carry out enciphering/deciphering to data, then export by enciphering/deciphering data and arrive DB44 output port, flow into next processing unit of communication link; Random number generation module is connected with FPGA enciphering/deciphering processing module, and the desirable true random sequence that random number generation module produces is input to FPGA enciphering/deciphering processing module, as the initial encryption key of block encryption algorithm; Flash memory chip is connected with FPGA enciphering/deciphering processing module, and the algorithm routine that whole enciphering/deciphering module electrifying startup stage F PGA enciphering/deciphering processing module reads the inner pre-stored of Flash memory chip is configured; Testing circuit is connected with FPGA enciphering/deciphering processing module, and on-line testing and calibration function are provided;
Described DB44 input port completes the physical layer interface function with communication link upper level; Described DB44 output port completes the physical layer interface function with communication link next stage;
Described FPGA enciphering/deciphering processing module is core information processing unit, and it consists of monolithic fpga chip, completes input message extraction, enciphering/deciphering processing and message sending function; Described FPGA enciphering/deciphering processing module is carried out enciphering/deciphering to information and is adopted symmetric block ciphers technology, and mode of operation is selected output feedback mode;
Described random number generation module provides initial key owing to producing desirable true random number and being input to FPGA enciphering/deciphering processing module for cryptographic algorithm;
Described Flash memory chip is mainly used in preserving the configurator that powers on, it be have can in-system programming function and capacity meet the nonvolatile memory of configurator size requirement.
According to the preferred embodiment of the present invention, described user identifies access unit and carries out the authentication to user, and described user identifies access unit and comprises card reader and authentication unit, and the process that described user identifies access unit execution authentication specifically comprises:
B1, described card reader send the inquiry instruction with the first pseudo-random number to user RFID label;
B2, described RFID label receive after inquiry instruction, from RFID label chip internal programmable ROM (read-only memory), read the first key, the first key and the first pseudo-random number are carried out to Hash operation, the second data and unique identifier after encrypting are carried out to mask by the first random number, then the first data that mask is obtained send card reader to;
B3, card reader correctly recognize after the first data after above-mentioned mask, send the first data to authentication unit together with the first pseudo-random number;
B4, authentication unit judge in the steps below to the first data and the first pseudo-random number:
B41, remove the mask in the first data, obtain the second data and unique identifier after Hash operation;
B42, according to unique identifier, from the storage information of authentication unit, obtain the first corresponding key;
B43, the first key is carried out to Hash operation with the first pseudo-random number according to algorithm identical in step B2, obtain the 3rd data;
B44, the 3rd data and the second data are compared, if equated, think that label is legal, otherwise think that label is pseudo-label, stop communication;
If B5 label is legal RFID label, authentication unit takes out from macrodata storage unit, and the second key and unique identifier C are carried out to Hash operation, obtains the 4th data, and sends to card reader;
B6, card reader send the 4th data to RFID label;
B7, RFID label receive after the 4th data, from RFID label chip internal programmable ROM (read-only memory), read the second key, then according to the identical algorithm of step B5, the second key and unique identifier are carried out to Hash operation, obtain the 5th data; Compare the 4th data and the 5th data, if equated,, by authentication, interactive authentication completes again; Otherwise, authentification failure, RFID label does not respond other instructions of this card reader;
B8, after completing authentication, card reader and label both sides upgrade the first key in an identical manner, the second key.
According to the preferred embodiment of the present invention, the concrete implementation in described electronic signature unit comprises:
A1, electronic health record unit generate after newly-built digital health archives, to electronic signature unit, send the signature request of appending that comprises signer identity and subscriber identity information;
A2, electronic signature unit extract signer identity, the subscriber identity information appending in signature request;
A3, electronic signature unit complete authentication according to the following steps:
A31, electronic signature unit send random message to electronic health record unit;
A32, electronic health record unit signer feed back to electronic signature unit with private key after to this message encryption;
The PKI of A33, electronic signature cell call signer is to decrypt messages, and whether comparison is consistent with random message, carries out in this way steps A 4, otherwise execution step A11;
A4, electronic signature unit, by authentication, connect with macrodata storage unit, by signer identity, the subscriber identity information extracting, macrodata storage unit are carried out to query manipulation, and return to Query Result to electronic health record unit; If Query Result is empty, execution step A5, otherwise execution step A6;
A5, electronic health record unit directly, to sending to electronic signature unit after newly-built digital health archives signature, then perform step A9;
A6, electronic signature unit extract corresponding original digital health archives from macrodata storage unit, preserve, and send a to electronic health record unit after removal document signature information;
A7, electronic health record unit are appended to newly-built digital health archives after original digital health archives of reception, form and upgrade digital health archives, after upgrading digital health archives signature, send to electronic signature unit;
A8, electronic signature unit will compare with original digital health archives corresponding part in the renewal digital health archives after signature, as found to be tampered, and execution step A11, otherwise execution step A9;
After the PKI of A9, electronic signature cell call signer is decrypted the digital health archives signature from electronic health record unit, contrast with the corresponding data of corresponding digital health archives, if comparing result, unanimously by signature verification, performs step A10, otherwise execution step A11;
A10, the digital health archives by signature authentication are deposited in macrodata storage unit, as exist original digital health archives to delete;
A11, feedback result message are to electronic health record unit.
According to the preferred embodiment of the present invention, the pre-ciphering unit of described macrodata is for carrying out pre-encryption and specifically comprise being about to be uploaded to the data of macrodata storage unit:
C1, read file destination;
C2, whole file is carried out to the digital summary computing in Secure Hash Algorithm-256, obtain source document hashed value;
C3, file is decomposed into file end is divided and document body part;
C4, (2
63, 2
64-1] in set, obtain at random a number X ';
C5, by file end divide, source document hashed value and random number X ' packing obtain core data;
C6, use RSA PKI are encrypted core data, form encrypt file bag;
C7, document body is partly divided into the data block of 32 byte-sized, if last data block is less than 32 bytes, last data block is carried out to cover and make it equal 32 bytes, the data block total number obtaining is designated as m;
C8, according to formula X
n+1=μ X
n(1-X
n) carry out recursive operation, until generate X
k+m, n is natural number, and k is 4, the end decimal number of random number X ', and μ is recurrence parameter, initial value X
0for primary key, X
0computing formula be X
0=(X '-2
63)/2
63; The initial value of C9, setting variable i is 1;
C10, by X
k+ias the input of Secure Hash Algorithm-256, the CHAR of output 32 bytes, as the AES dynamic key of i data block, then enters step C11;
C11, utilize AES dynamic key to be encrypted corresponding data block, then enter step C12;
The size of C12, judgement i and m, if i<m increases 1 by i, then jumps to step C10; If i=m, enters step C13;
C13, m data block by encrypt file bag and after encrypting are packaged into digital envelope, and digital envelope is sent to macrodata distributed storage ciphering unit.
According to the preferred embodiment of the present invention, described macrodata distributed storage ciphering unit carries out superencipher to the macrodata of execution distributed storage and specifically comprises:
D1, macrodata distributed storage ciphering unit are received the write request of the pre-ciphering unit of macrodata, the reference position O of include file name, write request and write request length L;
D2, to make T be the higher value in the length of (O+L) and source document, check whether the existing storage space of source document is more than or equal to T, if, existing storage space is used for storing data to be written, otherwise, macrodata storage unit reads keeper's configuration information or Uses Defaults, and determines file distribution formula backup number R, minute block size B, fragment size S and encryption algorithm type; Macrodata storage unit, according to storer total volume, is chosen the storer of R least-loaded as new storage space, and by existing storage space, for storing the front portion of data to be written, new storage space is for storing the remaining data of the data that write; The relevant data that write request is needed comprise piecemeal size B, fragment size S, and encryption algorithm type returns to the pre-ciphering unit of macrodata in the mode of safety;
D3, the pre-ciphering unit of macrodata calculate the piece O/B at write request reference position place, calculate write request reference position P1 and end position P2 in data block;
D4, judge that reference position P1 and end position P2, whether at the edge of section, if so, proceed to step D5, otherwise reference position P1 or end position P2, in the centre of certain section, read this section of original information, and deciphering, step D5 entered;
D5, data to be written in this piece are carried out to sectional encryption, and be written to a plurality of backup of memory;
D6 is if carry out for the first time this step, and write request end position and reference position be not in same, calculates reference position P1 and the end position P2 of write request in second piece, then forwards step D4 to; Otherwise, forward step D7 to;
D7, macrodata distributed storage ciphering unit send write request to the pre-ciphering unit of macrodata and complete feedback information.
Wisdom medical data safe-guard system of the present invention, all links in whole medical procedures have been contained, can effectively prevent the leakage of data in each link, when more convenient and effective medical services are provided to user, ensure the safety of user related information, there is wide market outlook and beneficial effect.
Accompanying drawing explanation
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, by identical reference symbol, represent identical parts.In the accompanying drawings:
Accompanying drawing 1 shows according to the structured flowchart of the wisdom medical data safe-guard system of embodiment of the present invention;
Accompanying drawing 2 shows the data transmission ciphering unit structured flowchart according to embodiment of the present invention.
Embodiment
Illustrative embodiments of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown illustrative embodiments of the present disclosure in accompanying drawing, yet should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiments are provided, and can by the scope of the present disclosure complete convey to those skilled in the art.
According to the embodiment of the present invention, a kind of wisdom medical data safe-guard system is proposed, as shown in Figure 1, described system comprises that data transmission ciphering unit, user identify access unit, electronic health record unit, electronic signature unit, the pre-ciphering unit of macrodata, macrodata storage unit and macrodata distributed storage ciphering unit;
Described data transmission ciphering unit for after gathering the supplemental characteristic relevant to user health, carried out the first encryption, and the image data of carrying out after the first encryption is sent to electronic health record unit before sending the data that gather;
Described user identifies access unit when user accesses electronic medical record system, carries out the authentication to user, and after by authentication, unlocking electronic case history system;
Described electronic health record unit is used for according to the image data receiving and doctor's diagnostic data generating digital health account;
Sign for the digital health archives that electronic health record unit is generated in described electronic signature unit, for guaranteeing the authenticity of data and preventing from being tampered;
The pre-ciphering unit of described macrodata is for encrypting being in advance about to be uploaded to the data of macrodata storage unit, and the described data that are about to be uploaded to macrodata storage unit comprise image data after the first encryption and through the digital health archives of electronic signature;
Described macrodata storage unit is for storing whole users' encrypted image data and the digital health archives through signing electronically, described macrodata storage unit is distributed storage, it comprises and is arranged at the high in the clouds macrodata administrative unit of administration of health department and the distributed memory that is arranged at each medical institutions, described distributed memory is all set to 1+n redundancy backup, adopts high speed fibre to connect between each distributed memory;
Described macrodata distributed storage ciphering unit carries out superencipher for carrying out the macrodata of distributed storage.
According to the preferred embodiment of the present invention, as shown in Figure 2, described data transmission ciphering unit comprises: DB44 input port, FPGA enciphering/deciphering processing module, DB44 output port, random number generation module, Flash memory chip and testing circuit;
Described DB44 input port is connected with FPGA enciphering/deciphering processing module, and DB44 output port is connected with FPGA enciphering/deciphering processing module; DB44 input port receives the signal of higher level's link arrival and carries enough in FPGA enciphering/deciphering processing module, FPGA enciphering/deciphering processing module is extracted data message and is adopted block cipher to carry out enciphering/deciphering to data, then export by enciphering/deciphering data and arrive DB44 output port, flow into next processing unit of communication link; Random number generation module is connected with FPGA enciphering/deciphering processing module, and the desirable true random sequence that random number generation module produces is input to FPGA enciphering/deciphering processing module, as the initial encryption key of block encryption algorithm; Flash memory chip is connected with FPGA enciphering/deciphering processing module, and the algorithm routine that whole enciphering/deciphering module electrifying startup stage F PGA enciphering/deciphering processing module reads the inner pre-stored of Flash memory chip is configured; Testing circuit is connected with FPGA enciphering/deciphering processing module, and on-line testing and calibration function are provided;
Described DB44 input port completes the physical layer interface function with communication link upper level;
Described FPGA enciphering/deciphering processing module is core information processing unit, and it consists of monolithic fpga chip, completes input message extraction, enciphering/deciphering processing and message sending function; Described FPGA enciphering/deciphering processing module is carried out enciphering/deciphering to information and is adopted symmetric block ciphers technology, and mode of operation is selected output feedback mode;
Described DB44 output port completes the physical layer interface function with communication link next stage;
Described random number generation module provides initial key owing to producing desirable true random number and being input to FPGA enciphering/deciphering processing module for cryptographic algorithm;
Described Flash memory chip is mainly used in preserving the configurator that powers on, it be have can in-system programming function and capacity meet the nonvolatile memory of configurator size requirement;
Described testing circuit is realized the test of transmitting encrypted data and calibration.
According to the preferred embodiment of the present invention, described user identifies access unit and carries out the authentication to user, and described user identifies access unit and comprises card reader and authentication unit, and the process that described user identifies access unit execution authentication specifically comprises:
B1, described card reader send the inquiry instruction with the first pseudo-random number to user RFID label;
B2, described RFID label receive after inquiry instruction, from RFID label chip internal programmable ROM (read-only memory), read the first key, the first key and the first pseudo-random number are carried out to Hash operation, the second data and unique identifier after encrypting are carried out to mask by the first random number, then the first data that mask is obtained send card reader to;
B3, card reader correctly recognize after the first data after above-mentioned mask, send the first data to authentication unit together with the first pseudo-random number;
B4, authentication unit judge in the steps below to the first data and the first pseudo-random number:
B41, remove the mask in the first data, obtain the second data and unique identifier after Hash operation;
B42, according to unique identifier, from the storage information of authentication unit, obtain the first corresponding key;
B43, the first key is carried out to Hash operation with the first pseudo-random number according to algorithm identical in step B2, obtain the 3rd data;
B44, the 3rd data and the second data are compared, if equated, think that label is legal, otherwise think that label is pseudo-label, stop communication;
If B5 label is legal RFID label, authentication unit takes out from macrodata storage unit, and the second key and unique identifier C are carried out to Hash operation, obtains the 4th data, and sends to card reader;
B6, card reader send the 4th data to RFID label;
B7, RFID label receive after the 4th data, from RFID label chip internal programmable ROM (read-only memory), read the second key, then according to the identical algorithm of step B5, the second key and unique identifier are carried out to Hash operation, obtain the 5th data; Compare the 4th data and the 5th data, if equated,, by authentication, interactive authentication completes again; Otherwise, authentification failure, RFID label does not respond other instructions of this card reader;
B8, after completing authentication, card reader and label both sides upgrade the first key in an identical manner, the second key.
According to the preferred embodiment of the present invention, the concrete implementation in described electronic signature unit comprises:
A1, electronic health record unit generate after newly-built digital health archives, to electronic signature unit, send the signature request of appending that comprises signer identity and subscriber identity information;
A2, electronic signature unit extract signer identity, the subscriber identity information appending in signature request;
A3, electronic signature unit complete authentication according to the following steps:
A31, electronic signature unit send random message to electronic health record unit;
A32, electronic health record unit signer feed back to electronic signature unit with private key after to this message encryption;
The PKI of A33, electronic signature cell call signer is to decrypt messages, and whether comparison is consistent with random message, carries out in this way steps A 4, otherwise execution step A11;
A4, electronic signature unit, by authentication, connect with macrodata storage unit, by signer identity, the subscriber identity information extracting, macrodata storage unit are carried out to query manipulation, and return to Query Result to electronic health record unit; If Query Result is empty, execution step A5, otherwise execution step A6;
A5, electronic health record unit directly, to sending to electronic signature unit after newly-built digital health archives signature, then perform step A9;
A6, electronic signature unit extract corresponding original digital health archives from macrodata storage unit, preserve, and send a to electronic health record unit after removal document signature information;
A7, electronic health record unit are appended to newly-built digital health archives after original digital health archives of reception, form and upgrade digital health archives, after upgrading digital health archives signature, send to electronic signature unit;
A8, electronic signature unit will compare with original digital health archives corresponding part in the renewal digital health archives after signature, as found to be tampered, and execution step A11, otherwise execution step A9;
After the PKI of A9, electronic signature cell call signer is decrypted the digital health archives signature from electronic health record unit, contrast with the corresponding data of corresponding digital health archives, if comparing result, unanimously by signature verification, performs step A10, otherwise execution step A11;
A10, the digital health archives by signature authentication are deposited in macrodata storage unit, as exist original digital health archives to delete;
A11, feedback result message are to electronic health record unit.
According to the preferred embodiment of the present invention, the pre-ciphering unit of described macrodata is for carrying out pre-encryption and specifically comprise being about to be uploaded to the data of macrodata storage unit:
C1, read file destination;
C2, whole file is carried out to the digital summary computing in Secure Hash Algorithm-256, obtain source document hashed value;
C3, file is decomposed into file end is divided and document body part;
C4, (2
63, 2
64-1] in set, obtain at random a number X ';
C5, by file end divide, source document hashed value and random number X ' packing obtain core data;
C6, use RSA PKI are encrypted core data, form encrypt file bag;
C7, document body is partly divided into the data block of 32 byte-sized, if last data block is less than 32 bytes, last data block is carried out to cover and make it equal 32 bytes, the data block total number obtaining is designated as m;
C8, according to formula X
n+1=μ X
n(1-X
n) carry out recursive operation, until generate X
k+m, n is natural number, and k is 4, the end decimal number of random number X ', and μ is recurrence parameter, initial value X
0for primary key, X
0computing formula be X
0=(X '-2
63)/2
63; The initial value of C9, setting variable i is 1;
C10, by X
k+ias the input of Secure Hash Algorithm-256, the CHAR of output 32 bytes, as the AES dynamic key of i data block, then enters step C11;
C11, utilize AES dynamic key to be encrypted corresponding data block, then enter step C12;
The size of C12, judgement i and m, if i<m increases 1 by i, then jumps to step C10; If i=m, enters step C13;
C13, m data block by encrypt file bag and after encrypting are packaged into digital envelope, and digital envelope is sent to macrodata distributed storage ciphering unit.
According to the preferred embodiment of the present invention, described macrodata distributed storage ciphering unit carries out superencipher to the macrodata of execution distributed storage and specifically comprises:
D1, macrodata distributed storage ciphering unit are received the write request of the pre-ciphering unit of macrodata, the reference position O of include file name, write request and write request length L;
D2, to make T be the higher value in the length of (O+L) and source document, check whether the existing storage space of source document is more than or equal to T, if, existing storage space is used for storing data to be written, otherwise, macrodata storage unit reads keeper's configuration information or Uses Defaults, and determines file distribution formula backup number R, minute block size B, fragment size S and encryption algorithm type; Macrodata storage unit, according to storer total volume, is chosen the storer of R least-loaded as new storage space, and by existing storage space, for storing the front portion of data to be written, new storage space is for storing the remaining data of the data that write; The relevant data that write request is needed comprise piecemeal size B, fragment size S, and encryption algorithm type returns to the pre-ciphering unit of macrodata in the mode of safety;
D3, the pre-ciphering unit of macrodata calculate the piece O/B at write request reference position place, calculate write request reference position P1 and end position P2 in data block;
D4, judge that reference position P1 and end position P2, whether at the edge of section, if so, proceed to step D5, otherwise reference position P1 or end position P2, in the centre of certain section, read this section of original information, and deciphering, step D5 entered;
D5, data to be written in this piece are carried out to sectional encryption, and be written to a plurality of backup of memory;
D6 is if carry out for the first time this step, and write request end position and reference position be not in same, calculates reference position P1 and the end position P2 of write request in second piece, then forwards step D4 to; Otherwise, forward step D7 to;
D7, macrodata distributed storage ciphering unit send write request to the pre-ciphering unit of macrodata and complete feedback information.
The above; be only the present invention's embodiment preferably, but protection scope of the present invention is not limited to this, is anyly familiar with in technical scope that those skilled in the art disclose in the present invention; the variation that can expect easily or replacement, within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion by the described protection domain with claim.
Claims (6)
1. a wisdom medical data safe-guard system, described system comprises that data transmission ciphering unit, user identify access unit, electronic health record unit, electronic signature unit, the pre-ciphering unit of macrodata, macrodata storage unit and macrodata distributed storage ciphering unit;
Described data transmission ciphering unit for after gathering the supplemental characteristic relevant to user health, carried out the first encryption, and the image data of carrying out after the first encryption is sent to electronic health record unit before sending the data that gather;
Described user identifies access unit when user accesses electronic medical record system, carries out the authentication to user, and after by authentication, unlocking electronic case history system;
Described electronic health record unit is used for according to the image data receiving and doctor's diagnostic data generating digital health account;
Sign for the digital health archives that electronic health record unit is generated in described electronic signature unit, for guaranteeing the authenticity of data and preventing from being tampered;
The pre-ciphering unit of described macrodata is for encrypting being in advance about to be uploaded to the data of macrodata storage unit, and the described data that are about to be uploaded to macrodata storage unit comprise image data after the first encryption and through the digital health archives of electronic signature;
Described macrodata storage unit is for storing whole users' encrypted image data and the digital health archives through signing electronically, described macrodata storage unit is distributed storage, it comprises and is arranged at the high in the clouds macrodata administrative unit of administration of health department and the distributed memory that is arranged at each medical institutions, described distributed memory is all set to 1+n redundancy backup, adopts high speed fibre to connect between each distributed memory;
Described macrodata distributed storage ciphering unit is for carrying out superencipher to carrying out the macrodata of distributed storage.
2. a system as claimed in claim 1, described data transmission ciphering unit comprises: DB44 input port, FPGA enciphering/deciphering processing module, DB44 output port, random number generation module, Flash memory chip and testing circuit;
Described DB44 input port is connected with FPGA enciphering/deciphering processing module, and DB44 output port is connected with FPGA enciphering/deciphering processing module; DB44 input port receives the signal of higher level's link arrival and carries enough in FPGA enciphering/deciphering processing module, FPGA enciphering/deciphering processing module is extracted data message and is adopted block cipher to carry out enciphering/deciphering to data, then export by enciphering/deciphering data and arrive DB44 output port, flow into next processing unit of communication link; Random number generation module is connected with FPGA enciphering/deciphering processing module, and the desirable true random sequence that random number generation module produces is input to FPGA enciphering/deciphering processing module, as the initial encryption key of block encryption algorithm; Flash memory chip is connected with FPGA enciphering/deciphering processing module, and the algorithm routine that whole enciphering/deciphering module electrifying startup stage F PGA enciphering/deciphering processing module reads the inner pre-stored of Flash memory chip is configured; Testing circuit is connected with FPGA enciphering/deciphering processing module, and on-line testing and calibration function are provided;
Described DB44 input port completes the physical layer interface function with communication link upper level; Described DB44 output port completes the physical layer interface function with communication link next stage;
Described FPGA enciphering/deciphering processing module is core information processing unit, and it consists of monolithic fpga chip, completes input message extraction, enciphering/deciphering processing and message sending function; Described FPGA enciphering/deciphering processing module is carried out enciphering/deciphering to information and is adopted symmetric block ciphers technology, and mode of operation is selected output feedback mode;
Described random number generation module provides initial key owing to producing desirable true random number and being input to FPGA enciphering/deciphering processing module for cryptographic algorithm;
Described Flash memory chip is for preserving the configurator that powers on.
3. a system as claimed in claim 2, described user identifies access unit and carries out the authentication to user, and described user identifies access unit and comprises card reader and authentication unit, and described user identifies access unit and carries out the process of authentication and specifically comprise:
B1, described card reader send the inquiry instruction with the first pseudo-random number to user RFID label;
B2, described RFID label receive after inquiry instruction, from RFID label chip internal programmable ROM (read-only memory), read the first key, the first key and the first pseudo-random number are carried out to Hash operation, the second data and unique identifier after encrypting are carried out to mask by the first random number, then the first data that mask is obtained send card reader to;
B3, card reader correctly recognize after the first data after above-mentioned mask, send the first data to authentication unit together with the first pseudo-random number;
B4, authentication unit judge in the steps below to the first data and the first pseudo-random number:
B41, remove the mask in the first data, obtain the second data and unique identifier after Hash operation;
B42, according to unique identifier, from the storage information of authentication unit, obtain the first corresponding key;
B43, the first key is carried out to Hash operation with the first pseudo-random number according to algorithm identical in step B2, obtain the 3rd data;
B44, the 3rd data and the second data are compared, if equated, think that label is legal, otherwise think that label is pseudo-label, stop communication;
If B5 label is legal RFID label, authentication unit takes out from macrodata storage unit, and the second key and unique identifier C are carried out to Hash operation, obtains the 4th data, and sends to card reader;
B6, card reader send the 4th data to RFID label;
B7, RFID label receive after the 4th data, from RFID label chip internal programmable ROM (read-only memory), read the second key, then according to the identical algorithm of step B5, the second key and unique identifier are carried out to Hash operation, obtain the 5th data; Compare the 4th data and the 5th data, if equated,, by authentication, interactive authentication completes again; Otherwise, authentification failure, RFID label does not respond other instructions of this card reader;
B8, after completing authentication, card reader and label both sides upgrade the first key in an identical manner, the second key.
4. a system as claimed in claim 3, the concrete implementation in described electronic signature unit comprises:
A1, electronic health record unit generate after newly-built digital health archives, to electronic signature unit, send the signature request of appending that comprises signer identity and subscriber identity information;
A2, electronic signature unit extract signer identity, the subscriber identity information appending in signature request;
A3, electronic signature unit complete authentication according to the following steps:
A31, electronic signature unit send random message to electronic health record unit;
A32, electronic health record unit signer feed back to electronic signature unit with private key after to this message encryption;
The PKI of A33, electronic signature cell call signer is to decrypt messages, and whether comparison is consistent with random message, carries out in this way steps A 4, otherwise execution step A11;
A4, electronic signature unit, by authentication, connect with macrodata storage unit, by signer identity, the subscriber identity information extracting, macrodata storage unit are carried out to query manipulation, and return to Query Result to electronic health record unit; If Query Result is empty, execution step A5, otherwise execution step A6;
A5, electronic health record unit directly, to sending to electronic signature unit after newly-built digital health archives signature, then perform step A9;
A6, electronic signature unit extract corresponding original digital health archives from macrodata storage unit, preserve, and send a to electronic health record unit after removal document signature information;
A7, electronic health record unit are appended to newly-built digital health archives after original digital health archives of reception, form and upgrade digital health archives, after upgrading digital health archives signature, send to electronic signature unit;
A8, electronic signature unit will compare with original digital health archives corresponding part in the renewal digital health archives after signature, as found to be tampered, and execution step A11, otherwise execution step A9;
After the PKI of A9, electronic signature cell call signer is decrypted the digital health archives signature from electronic health record unit, contrast with the corresponding data of corresponding digital health archives, if comparing result, unanimously by signature verification, performs step A10, otherwise execution step A11;
A10, the digital health archives by signature authentication are deposited in macrodata storage unit, as exist original digital health archives to delete;
A11, feedback result message are to electronic health record unit.
5. a system as claimed in claim 4, the pre-ciphering unit of described macrodata is for carrying out pre-encryption and specifically comprise being about to be uploaded to the data of macrodata storage unit:
C1, read file destination;
C2, whole file is carried out to the digital summary computing in Secure Hash Algorithm-256, obtain source document hashed value;
C3, file is decomposed into file end is divided and document body part;
C4, (2
63, 2
64-1] in set, obtain at random a number X ';
C5, by file end divide, source document hashed value and random number X ' packing obtain core data;
C6, use RSA PKI are encrypted core data, form encrypt file bag;
C7, document body is partly divided into the data block of 32 byte-sized, if last data block is less than 32 bytes, last data block is carried out to cover and make it equal 32 bytes, the data block total number obtaining is designated as m;
C8, according to formula X
n+1=μ X
n(1-X
n) carry out recursive operation, until generate X
k+m, n is natural number, and k is 4, the end decimal number of random number X ', and μ is recurrence parameter, initial value X
0for primary key, X
0computing formula be X
0=(X '-2
63)/2
63; The initial value of C9, setting variable i is 1;
C10, by X
k+ias the input of Secure Hash Algorithm-256, the CHAR of output 32 bytes, as the AES dynamic key of i data block, then enters step C11;
C11, utilize AES dynamic key to be encrypted corresponding data block, then enter step C12;
The size of C12, judgement i and m, if i<m increases 1 by i, then jumps to step C10; If i=m, enters step C13;
C13, m data block by encrypt file bag and after encrypting are packaged into digital envelope, and digital envelope is sent to macrodata distributed storage ciphering unit.
6. a system as claimed in claim 5, described macrodata distributed storage ciphering unit carries out superencipher and specifically comprises carrying out the macrodata of distributed storage:
D1, macrodata distributed storage ciphering unit are received the write request of the pre-ciphering unit of macrodata, the reference position O of include file name, write request and write request length L;
D2, to make T be the higher value in the length of (O+L) and source document, check whether the existing storage space of source document is more than or equal to T, if, existing storage space is used for storing data to be written, otherwise, macrodata storage unit reads keeper's configuration information or Uses Defaults, and determines file distribution formula backup number R, minute block size B, fragment size S and encryption algorithm type; Macrodata storage unit, according to storer total volume, is chosen the storer of R least-loaded as new storage space, and by existing storage space, for storing the front portion of data to be written, new storage space is for storing the remaining data of the data that write; The relevant data that write request is needed comprise piecemeal size B, fragment size S, and encryption algorithm type returns to the pre-ciphering unit of macrodata in the mode of safety;
D3, the pre-ciphering unit of macrodata calculate the piece O/B at write request reference position place, calculate write request reference position P1 and end position P2 in data block;
D4, judge that reference position P1 and end position P2, whether at the edge of section, if so, proceed to step D5, otherwise reference position P1 or end position P2, in the centre of certain section, read this section of original information, and deciphering, step D5 entered;
D5, data to be written in this piece are carried out to sectional encryption, and be written to a plurality of backup of memory;
D6 is if carry out for the first time this step, and write request end position and reference position be not in same, calculates reference position P1 and the end position P2 of write request in second piece, then forwards step D4 to; Otherwise, forward step D7 to;
D7, macrodata distributed storage ciphering unit send write request to the pre-ciphering unit of macrodata and complete feedback information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410466597.9A CN104166823A (en) | 2014-09-12 | 2014-09-12 | Intelligent medical data safety guarantee system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410466597.9A CN104166823A (en) | 2014-09-12 | 2014-09-12 | Intelligent medical data safety guarantee system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104166823A true CN104166823A (en) | 2014-11-26 |
Family
ID=51910631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410466597.9A Pending CN104166823A (en) | 2014-09-12 | 2014-09-12 | Intelligent medical data safety guarantee system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104166823A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105871857A (en) * | 2016-04-13 | 2016-08-17 | 北京怡和嘉业医疗科技有限公司 | Authentication method, authentication device, authentication system and treatment equipment |
CN106789061A (en) * | 2016-11-18 | 2017-05-31 | 中车株洲电力机车有限公司 | The floating engineering detecting car data transmission method of magnetic, device and the floating engineering detecting car of magnetic |
CN107026859A (en) * | 2017-03-31 | 2017-08-08 | 西安电子科技大学 | A kind of safe transmission method of privacy cloud medical data |
CN107038341A (en) * | 2017-04-10 | 2017-08-11 | 武汉康慧然信息技术咨询有限公司 | Family health care data managing method and system |
CN108777685A (en) * | 2018-06-05 | 2018-11-09 | 北京京东金融科技控股有限公司 | Method and apparatus for handling information |
CN110010215A (en) * | 2019-04-03 | 2019-07-12 | 嘉里(北京)健康科技有限公司 | A kind of health file management system |
CN110321721A (en) * | 2019-07-02 | 2019-10-11 | 石家庄铁道大学 | Electronic health record access control method based on block chain |
CN110650150A (en) * | 2019-10-10 | 2020-01-03 | 上海久誉软件系统有限公司 | Computer wireless propagation neural network method based on 5G network |
CN113794560A (en) * | 2021-11-05 | 2021-12-14 | 深邦智能科技(青岛)有限公司 | Super instrument data transmission encryption method and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1932835A (en) * | 2006-09-30 | 2007-03-21 | 华中科技大学 | Safety identification method in radio frequency distinguishing system |
CN101808095A (en) * | 2010-03-22 | 2010-08-18 | 华中科技大学 | Encryption copy organization method under distributed storage environment |
CN101958789A (en) * | 2010-09-17 | 2011-01-26 | 北京航空航天大学 | High-speed data encryption/decryption module in communication link |
CN102457508A (en) * | 2010-11-02 | 2012-05-16 | 江苏大学 | Digital signature method of electronic medical record based on XML (Extensive Makeup Language) |
JP2013242745A (en) * | 2012-05-22 | 2013-12-05 | Astrostage Inc | Diagnosis data integrated management system and disease diagnosis cooperation system in cooperation with diagnosis data integrated management system |
CN103678935A (en) * | 2013-12-25 | 2014-03-26 | 柳州市欧博科技有限公司 | Cloud-service-platform-based digital medical diagnosis and treatment integration system for community medical treatment and health |
CN103973936A (en) * | 2014-02-19 | 2014-08-06 | 浙江大学 | Methods for quickly encrypting and decrypting medical images in high-intensity manner |
-
2014
- 2014-09-12 CN CN201410466597.9A patent/CN104166823A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1932835A (en) * | 2006-09-30 | 2007-03-21 | 华中科技大学 | Safety identification method in radio frequency distinguishing system |
CN101808095A (en) * | 2010-03-22 | 2010-08-18 | 华中科技大学 | Encryption copy organization method under distributed storage environment |
CN101958789A (en) * | 2010-09-17 | 2011-01-26 | 北京航空航天大学 | High-speed data encryption/decryption module in communication link |
CN102457508A (en) * | 2010-11-02 | 2012-05-16 | 江苏大学 | Digital signature method of electronic medical record based on XML (Extensive Makeup Language) |
JP2013242745A (en) * | 2012-05-22 | 2013-12-05 | Astrostage Inc | Diagnosis data integrated management system and disease diagnosis cooperation system in cooperation with diagnosis data integrated management system |
CN103678935A (en) * | 2013-12-25 | 2014-03-26 | 柳州市欧博科技有限公司 | Cloud-service-platform-based digital medical diagnosis and treatment integration system for community medical treatment and health |
CN103973936A (en) * | 2014-02-19 | 2014-08-06 | 浙江大学 | Methods for quickly encrypting and decrypting medical images in high-intensity manner |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105871857A (en) * | 2016-04-13 | 2016-08-17 | 北京怡和嘉业医疗科技有限公司 | Authentication method, authentication device, authentication system and treatment equipment |
CN105871857B (en) * | 2016-04-13 | 2019-09-27 | 北京怡和嘉业医疗科技股份有限公司 | Authentication method, device, system and therapeutic equipment |
CN106789061A (en) * | 2016-11-18 | 2017-05-31 | 中车株洲电力机车有限公司 | The floating engineering detecting car data transmission method of magnetic, device and the floating engineering detecting car of magnetic |
CN107026859A (en) * | 2017-03-31 | 2017-08-08 | 西安电子科技大学 | A kind of safe transmission method of privacy cloud medical data |
CN107038341B (en) * | 2017-04-10 | 2019-07-12 | 杭州银江医联网技术股份有限公司 | Family health care data managing method and system |
CN107038341A (en) * | 2017-04-10 | 2017-08-11 | 武汉康慧然信息技术咨询有限公司 | Family health care data managing method and system |
CN108777685A (en) * | 2018-06-05 | 2018-11-09 | 北京京东金融科技控股有限公司 | Method and apparatus for handling information |
CN108777685B (en) * | 2018-06-05 | 2020-06-23 | 京东数字科技控股有限公司 | Method and apparatus for processing information |
CN110010215A (en) * | 2019-04-03 | 2019-07-12 | 嘉里(北京)健康科技有限公司 | A kind of health file management system |
CN110010215B (en) * | 2019-04-03 | 2021-03-30 | 嘉里(北京)健康科技有限公司 | Health record management system |
CN110321721A (en) * | 2019-07-02 | 2019-10-11 | 石家庄铁道大学 | Electronic health record access control method based on block chain |
CN110321721B (en) * | 2019-07-02 | 2021-03-30 | 石家庄铁道大学 | Block chain-based electronic medical record access control method |
CN110650150A (en) * | 2019-10-10 | 2020-01-03 | 上海久誉软件系统有限公司 | Computer wireless propagation neural network method based on 5G network |
CN113794560A (en) * | 2021-11-05 | 2021-12-14 | 深邦智能科技(青岛)有限公司 | Super instrument data transmission encryption method and system |
CN113794560B (en) * | 2021-11-05 | 2024-05-10 | 深邦智能科技集团(青岛)有限公司 | Data transmission encryption method and system for ultrasonic treatment instrument |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104166823A (en) | Intelligent medical data safety guarantee system | |
CN104200177A (en) | Mobile medical sensitive data encryption method | |
US12051064B2 (en) | Transaction messaging | |
CN101720071B (en) | Short message two-stage encryption transmission and secure storage method based on safety SIM card | |
CN110100422B (en) | Data writing method and device based on block chain intelligent contract and storage medium | |
CN105306194B (en) | For encrypted file and/or the multiple encryption method and system of communications protocol | |
Barker et al. | Sp 800-90a. recommendation for random number generation using deterministic random bit generators | |
CN105162760A (en) | Random draw-off method, apparatus and system | |
CN101218609B (en) | Portable data carrier featuring secure data processing | |
KR20220144810A (en) | Secret partitioning and metadata storage | |
CN102693385A (en) | Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof | |
CN106059760B (en) | A kind of cryptographic system from user terminal crypto module calling system private key | |
CN113420049B (en) | Data circulation method, device, electronic equipment and storage medium | |
CN107294710A (en) | A kind of key migration method and device of vTPM2.0 | |
CN115048664A (en) | Data security storage method, device, equipment and medium based on solid state disk | |
CN108768975A (en) | Support the data integrity verification method of key updating and third party's secret protection | |
WO2022046330A1 (en) | Data management and encryption in a distributed computing system | |
CN109302286A (en) | A kind of generation method of Fido device keys index | |
CN109299944A (en) | Data ciphering method, system and terminal in a kind of process of exchange | |
CN107222453A (en) | A kind of document transmission method and device | |
CN110995440B (en) | Work history confirming method, device, equipment and storage medium | |
CN103902921A (en) | File encryption method and system | |
CN115242540B (en) | Data processing method and system | |
Divyashree et al. | Blockchain-Based Access-Control System for Unused Medicine and Organ Donation Using Enhanced Hybrid Cryptography | |
WO2023212838A1 (en) | Fast signature generation and verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20141126 |