Nothing Special   »   [go: up one dir, main page]

CN115801843A - Medical service platform and method based on cloud technology - Google Patents

Medical service platform and method based on cloud technology Download PDF

Info

Publication number
CN115801843A
CN115801843A CN202310045289.8A CN202310045289A CN115801843A CN 115801843 A CN115801843 A CN 115801843A CN 202310045289 A CN202310045289 A CN 202310045289A CN 115801843 A CN115801843 A CN 115801843A
Authority
CN
China
Prior art keywords
calculating
port
access
service
collection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310045289.8A
Other languages
Chinese (zh)
Other versions
CN115801843B (en
Inventor
秦伏秋
张意龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Yite Medical Co ltd
Original Assignee
Hunan Yite Medical Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Yite Medical Co ltd filed Critical Hunan Yite Medical Co ltd
Priority to CN202310045289.8A priority Critical patent/CN115801843B/en
Publication of CN115801843A publication Critical patent/CN115801843A/en
Application granted granted Critical
Publication of CN115801843B publication Critical patent/CN115801843B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Storage Device Security (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The application discloses a medical service platform and a method based on cloud technology, wherein the medical service platform comprises an access module, a service module and a service module, wherein the access module is used for accessing a port of the medical service platform; the reverse proxy module comprises a virtual server cluster system, an error request filtering system and an automatic server monitoring system; the gateway module is used for performing identity authentication on the accessed port and limiting the flow of the service; the service module comprises a monitoring center, a treatment center, a micro-service center and a service center; and the storage module comprises an open-source lightweight distributed file system FastDFS, a MySQL database and a single-thread Redis cache cluster. The cloud technology-based medical service platform and the cloud technology-based medical service method can effectively share medical information and resources, patients and doctors can efficiently utilize the platform to conduct bidirectional communication, and long-term effective and reliable protection and safe access of medical data are achieved.

Description

Medical service platform and method based on cloud technology
Technical Field
The application belongs to the technical field of cloud, and particularly relates to a medical service platform and a method based on cloud technology.
Background
Today with increasing medical needs, many hospital resources are isolated and cannot be shared, and many medical services form an island and cannot be comprehensively utilized.
Medical services in various places at present need to be collected uniformly to use large-scale storage equipment and data to integrate medical resources, so that the data can be transmitted at high speed and the medical services can be carried out in a cloud technology mode, the purpose of sharing the medical resources is met, roles of all participants based on the cloud technology can be redefined only by integrating patients, doctors and hospitals, and in addition, the medical resources can be protected more powerfully and shared effectively by adding the cloud technology in the aspects of access and data encryption and decryption.
Disclosure of Invention
In order to overcome the defects of the prior art, the medical service platform and the method based on the cloud technology are provided, medical information and resources are effectively shared based on the cloud technology, a patient and a doctor can efficiently utilize the platform to perform bidirectional communication to form a mutual relation, long-term effective and reliable protection and safe access of medical data are realized, powerful protection is provided for sharing of medical resources, and convenient safe access and data encryption can be realized.
In order to achieve the purpose, the following technical scheme is adopted in the application:
a cloud technology-based medical services platform, comprising:
an access module for accessing ports of the medical services platform, including a patient port and a physician port;
the reverse proxy module comprises a virtual server cluster system, an error request filtering system and an automatic server monitoring system, wherein the virtual server cluster system is used for forming a virtual server by clustering servers by adopting IP load balancing and content-based request distribution, the error request filtering system is used for filtering error requests of the ports, and the automatic server monitoring system monitors the state of the servers to remove failed servers;
the gateway module is used for performing identity authentication on the accessed port and limiting the flow of services, and comprises a service gateway, wherein the service gateway is used for providing authentication services;
the service module comprises a monitoring center, a treatment center, a micro-service center and a service center; the monitoring center comprises a fusing protection system, a link tracking system and a log analysis system; the treatment center comprises a registration system, a load balancing system and a uniform configuration system; the micro-service center comprises a personnel management system, a patient management system, a diagnosis management system and a financial management system; the service center comprises a user information system, a doctor information system, a background system, a message system and a hospital information system; and
and the storage module comprises an open-source lightweight distributed file system FastDFS, a MySQL database and a single-thread Redis cache cluster.
Further, the authentication service includes:
calculating the credible loss amount M of the doctor port;
and based on the credible loss amount M being larger than a preset amount, rejecting the access of the doctor port.
Further, the calculating the amount of trusted loss of the doctor port comprises:
receiving an access request of the doctor port, wherein the access request comprises { a, b and c }, a is an access subject, b is a target resource which the access subject requests to access, and c is a resource set which is related to the attribute of the access subject and is used for accessing;
calculating a collection of the attribute set of the a and the attribute set of the b;
if the collection set is not an empty set, the credible loss amount M is M =0;
if the collection is an empty collection, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in c and b to form a similarity collection S, and calculating behavior content risk Y through the similarity collection S, wherein the credible loss M is M = X Y.
Further, the calculating of the behavioral content risk Y through the similarity set S includes:
Figure SMS_1
further, the method also comprises the following steps:
an encryption module, configured to encrypt and decrypt data d, where the encryption and decryption include:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, wherein
Figure SMS_2
And m and p are prime numbers to each other;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U mod l, and E (w t mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
In addition, a cloud technology-based medical service method is also provided, which is applied to the cloud technology-based medical service platform, and comprises the following steps:
accessing the healthcare platform through ports, the ports including a patient port and a physician port;
forming a virtual server by the server cluster by adopting IP load balancing and content-based request distribution;
filtering the error request of the port;
monitoring the state of the server to remove the failed server;
performing identity authentication on the accessed port, performing flow limitation on services, and providing authentication services;
isolating the port which is refused to access, and performing fusing protection on the system;
positioning the fault and eliminating the fault by adopting a link tracking system;
forming graph visualization analysis by adopting a log analysis system;
adopting a registration system to call the necessary IP address and port for each system of the micro-service center;
a load balancing system is adopted for load balancing; and
and modifying the configuration of each system of the micro service center in different environments by adopting a uniform configuration system.
Further, the authentication service includes:
calculating the credible loss M of the doctor port;
and based on the credible loss amount M being larger than a preset amount, rejecting the access of the doctor port.
Further, the calculating the amount of trusted loss of the doctor port comprises:
receiving an access request of the doctor port, wherein the access request comprises { a, b and c }, a is an access subject, b is a target resource which the access subject requests to access, and c is a resource set which is related to the attribute of the access subject and is used for accessing;
calculating a collection of the attribute set of the a and the attribute set of the b;
if the collection set is not an empty set, the credible loss amount M is M =0;
if the collection is an empty collection, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in c and b to form a similarity collection S, and calculating behavior content risk Y through the similarity collection S, wherein the credible loss M is M = X Y.
Further, the calculating of the behavioral content risk Y through the similarity set S includes:
Figure SMS_3
further, still include:
encrypting and decrypting data d, said encrypting and decrypting comprising:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, wherein
Figure SMS_4
And m and p are prime numbers to each other;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting a number u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U + mod l, and E (w + t + mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
Drawings
FIG. 1 is a schematic structural diagram of a platform of the present application;
FIG. 2 is a schematic diagram of an access module of the present application;
FIG. 3 is a schematic diagram of a reverse proxy module of the present application;
FIG. 4 is a schematic diagram of a gateway module of the present application;
FIG. 5 is a schematic diagram of a service module of the present application;
fig. 6 is a schematic diagram of a memory module of the present application.
Detailed Description
In the description of the present application, it is to be understood that the terms etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, which are merely for convenience in describing the present application and simplifying the description, but do not indicate or imply that the system or element referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be construed as limiting the present application.
Medical services are more and more emphasized, the demand is more and more increased, but resources of the medical services sometimes cannot be comprehensively unified, each medical service organization sometimes forms an isolated island, and cannot be effectively connected and form a unified platform to provide services for patients and doctors.
In some embodiments, as shown in fig. 1, the present application provides a cloud technology-based healthcare platform 1, comprising:
as shown in fig. 2, an access module 11 for accessing ports of the medical services platform, including a patient port 111 and a doctor port 112;
as shown in fig. 3, the reverse proxy module 12 includes a virtual server cluster system 121, an error request filtering system 122 and an automatic server monitoring system 123, where the virtual server cluster system 121 is configured to configure a cluster of servers into a virtual server by using IP load balancing and content request distribution, the error request filtering system 122 is configured to filter error requests of the ports, and the automatic server monitoring system 123 monitors states of the servers to remove a failed server;
the IP load balancing is adopted, namely, the processing load of each server is balanced by utilizing the load calculation of the servers, so that each server is not overloaded to cause congestion and damage; the virtual server can be realized according to the distribution of requests for processing contents, and the construction of the virtual server is carried out according to different request contents, so that the requests of the same or similar contents can be processed in one or more servers in a centralized way.
As shown in fig. 4, the gateway module 13 is configured to authenticate the identity of the accessed port and throttle the service, and includes a service gateway 131, where the service gateway 131 is configured to provide an authentication service;
as shown in fig. 5, the service module 14 includes a monitoring center 141, an administration center 142, a micro service center 143, and a service center 144; the monitoring center comprises a fuse protection system 1411, a link tracking system 1412 and a log analysis system 1413; the governance center 142 comprises a registration system 1421, a load balancing system 1422 and a unified configuration system 1423; the microservice center 143 includes a personnel management system 1431, a patient management system 1432, a diagnosis management system 1433, and a financial management system 1434; the business center 144 includes a user information system 1441, a doctor information system 1442, a backend system 1443, a messaging system 1444, and a hospital information system 1445; and
as shown in fig. 6, the storage module 15 includes an open-source lightweight distributed file system FastDFS151, a MySQL database 152, and a single-threaded Redis cache cluster 153.
In some embodiments, the authentication services provided by the service gateway 131 are:
receiving an access request of the doctor port 112, wherein the access request comprises { a, b, c }, where a is an access subject, b is a target resource requested to be accessed by the access subject, and c is a set of resources for access related to attributes of the access subject; the access subject and the target resource requested to be accessed by the access subject both have attribute sets, the attribute sets can be labeled by management personnel with corresponding attribute identifications, the access subject and the related resource can be classified and retrieved in attribute aspect through the labeled corresponding attribute identifications, and related calculation can be carried out;
calculating a collection of the attribute set of the a and the attribute set of the b;
if the collection set is not an empty set, the credible loss M is M =0, which means that the attributes in the two sets are in one-to-one correspondence;
if the collection set is an empty set, the attributes in the two sets are not in one-to-one correspondence, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in the c and the b to form a similarity set S, and calculating behavior content risk Y through the similarity set S, wherein the credible loss M is M = X Y;
wherein the attribute correlation matrix J =
Figure SMS_5
Wherein
Figure SMS_6
Representing the similarity between the attributes of the access subject and the attributes of the target resources, wherein the attributes of the subject may include a department to which the subject belongs, a disease category to which the subject is responsible, and the attributes of the target resources may include a disease category to which certain patient data belongs, a disease duration, and the like; phase (C)
Figure SMS_7
Is calculated by the formula
Figure SMS_8
= (collection of identification of attributes of access subject and identification of attributes of target resource)/(union of identification of attributes of access subject and identification of attributes of target resource),
Figure SMS_9
=1. The similarity calculation of each resource in c and b to form the similarity set S can also use the above calculation formula to calculate.
Further, behavioral attribute risk
Figure SMS_10
Further, the calculating of the behavioral content risk Y through the similarity set S includes:
Figure SMS_11
and based on the credibility loss quantity M being larger than a preset quantity, refusing the access of the doctor port.
When the confidence loss amount M is less than or equal to a preset amount, then access to the doctor port may be allowed.
In some embodiments, the healthcare platform further comprises:
an encryption module 16, configured to encrypt and decrypt data d, where the encryption and decryption include:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, wherein
Figure SMS_12
And m and p are mutually prime;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U + mod l, and E (w + t + mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
The double-key verification mode is carried out through the two keys, so that the encryption of the data can be safer, if reverse decryption is required, the two keys are required to be owned at the same time, the security of the data is improved, the decryption of the data is more difficult, and hackers or other persons who maliciously want to use the data cannot easily decrypt the data.
The application also provides a medical service method based on the cloud technology, which is applied to the medical service platform based on the cloud technology and comprises the following steps:
accessing the healthcare platform through ports, the ports including a patient port and a physician port;
forming a virtual server by the server cluster by IP load balancing and content-based request distribution;
filtering the error request of the port;
monitoring the state of the server to remove the failed server;
performing identity authentication on the accessed port, performing flow limitation on services, and providing authentication services;
isolating the port which is refused to access, and performing fusing protection on the system;
positioning the fault and eliminating the fault by adopting a link tracking system;
forming graph visualization analysis by adopting a log analysis system;
adopting a registration system to call the necessary IP address and port for each system of the micro service center;
a load balancing system is adopted for load balancing; and
and modifying the configuration of each system of the micro service center in different environments by adopting a uniform configuration system.
In some embodiments, the authentication service includes:
receiving an access request of the doctor port 112, wherein the access request comprises { a, b, c }, where a is an access subject, b is a target resource requested to be accessed by the access subject, and c is a set of resources for access related to attributes of the access subject; the access subject and the target resource requested to be accessed by the access subject both have attribute sets, the attribute sets can be labeled by management personnel with corresponding attribute identifications, the access subject and the related resource can be classified and retrieved in attribute aspect through the labeled corresponding attribute identifications, and related calculation can be carried out;
calculating a collection of the attribute set of the a and the attribute set of the b;
if the collection set is not an empty set, the credible loss M is M =0, which means that the attributes in the two sets are in one-to-one correspondence;
if the collection set is an empty set, the attributes in the two sets are not in one-to-one correspondence, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in the c and the b to form a similarity set S, and calculating behavior content risk Y through the similarity set S, wherein the credible loss M is M = X Y;
wherein, the attribute correlation matrix J =
Figure SMS_13
Wherein
Figure SMS_14
Representing the similarity between the attributes of the access subject and the attributes of the target resources, wherein the attributes of the subject may include the department to which the subject belongs, the kind of disease to which the subject is responsible, and the attributes of the target resources may include the kind of disease to which the patient data belongs, the suffering time, and the like; similarity of characters
Figure SMS_15
Is calculated by the formula
Figure SMS_16
= (collection of identification of attributes of access subject and identification of attributes of target resource)/(union of identification of attributes of access subject and identification of attributes of target resource),
Figure SMS_17
and =1. The similarity calculation of each resource in c and b to form the similarity set S can also use the above calculation formula to calculate.
Further, behavioral attribute risk
Figure SMS_18
Further, the calculating the content of behavior risk Y through the similarity set S includes:
Figure SMS_19
and based on the credible loss amount M being larger than a preset amount, rejecting the access of the doctor port.
When the confidence loss amount M is less than or equal to a preset amount, then access to the doctor port may be allowed.
In some embodiments, the healthcare platform further comprises:
encrypting and decrypting data d, said encrypting and decrypting comprising:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, wherein
Figure SMS_20
And m and p are mutually prime;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U + mod l, and E (w + t + mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
The double-key verification mode is carried out through the two keys, so that the encryption of the data can be safer, if reverse decryption is required, the two keys are required to be owned at the same time, the security of the data is improved, the decryption of the data is more difficult, and hackers or other persons who maliciously want to use the data cannot easily decrypt the data.
While certain embodiments and generally associated methods have been described, modifications and variations of these embodiments will be apparent to those skilled in the art. Accordingly, the above description of example embodiments does not define or constrain this disclosure. Other changes, substitutions, and alterations are also possible without departing from the spirit of the following claims.

Claims (10)

1. A medical service platform based on cloud technology, comprising:
an access module for accessing ports of the medical services platform, including a patient port and a physician port;
the reverse proxy module comprises a virtual server cluster system, an error request filtering system and an automatic server monitoring system, wherein the virtual server cluster system is used for forming a virtual server by clustering servers by adopting IP load balancing and content-based request distribution, the error request filtering system is used for filtering error requests of the ports, and the automatic server monitoring system monitors the state of the servers to remove failed servers;
the gateway module is used for performing identity authentication on the accessed port and limiting the flow of services, and comprises a service gateway, wherein the service gateway is used for providing authentication services;
the service module comprises a monitoring center, a treatment center, a micro-service center and a service center; the monitoring center comprises a fusing protection system, a link tracking system and a log analysis system; the treatment center comprises a registration system, a load balancing system and a unified configuration system; the micro-service center comprises a personnel management system, a patient management system, a diagnosis management system and a financial management system; the service center comprises a user information system, a doctor information system, a background system, a message system and a hospital information system; and
and the storage module comprises an open-source lightweight distributed file system FastDFS, a MySQL database and a single-thread Redis cache cluster.
2. The cloud-based healthcare platform of claim 1, wherein the authentication service comprises:
calculating the credible loss M of the doctor port;
and based on the credible loss amount M being larger than a preset amount, rejecting the access of the doctor port.
3. The cloud-based healthcare platform of claim 2, wherein the calculating the amount of trustworthiness of the doctor port comprises:
receiving an access request of the doctor port, wherein the access request comprises { a, b and c }, a is an access subject, b is a target resource which the access subject requests to access, and c is a resource set which is related to the attribute of the access subject and is used for accessing;
calculating a collection of the attribute set of a and the attribute set of b;
if the collection set is not an empty set, the credible loss amount M is M =0;
if the collection is an empty collection, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in c and b to form a similarity collection S, and calculating behavior content risk Y through the similarity collection S, wherein the credible loss M is M = X Y.
4. The cloud-based healthcare platform of claim 3, wherein the computing of behavioral content risk Y through the similarity set S comprises:
Figure QLYQS_1
5. the cloud-based healthcare platform of any one of claims 1-4, further comprising:
an encryption module, configured to encrypt and decrypt data d, where the encryption and decryption include:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, wherein
Figure QLYQS_2
And m and p are prime numbers to each other;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U + mod l, and E (w + t + mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
6. A cloud technology-based medical service method applied to the cloud technology-based medical service platform according to any one of claims 1 to 5, comprising:
accessing the healthcare platform through ports, the ports including a patient port and a physician port;
forming a virtual server by the server cluster by adopting IP load balancing and content-based request distribution;
filtering the error request of the port;
monitoring the state of the server to remove the failed server;
performing identity authentication on the accessed port, performing flow limitation on services, and providing authentication services;
isolating the port which is refused to access, and performing fusing protection on the system;
positioning the fault and eliminating the fault by adopting a link tracking system;
forming graph visualization analysis by adopting a log analysis system;
adopting a registration system to call the necessary IP address and port for each system of the micro-service center;
a load balancing system is adopted for load balancing; and
and modifying the configuration of each system of the micro service center in different environments by adopting a uniform configuration system.
7. The cloud technology-based medical service method according to claim 6, wherein the authentication service includes:
calculating the credible loss M of the doctor port;
and based on the credible loss amount M being larger than a preset amount, rejecting the access of the doctor port.
8. The cloud technology-based medical service method of claim 7, wherein the calculating the amount of the credible loss of the doctor port comprises:
receiving an access request of the doctor port, wherein the access request comprises { a, b and c }, a is an access subject, b is a target resource which the access subject requests to access, and c is a resource set which is related to the attribute of the access subject and is used for accessing;
calculating a collection of the attribute set of the a and the attribute set of the b;
if the collection set is not an empty set, the credible loss amount M is M =0;
if the collection is an empty collection, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in c and b to form a similarity collection S, and calculating behavior content risk Y through the similarity collection S, wherein the credible loss M is M = X Y.
9. The cloud-based medical service method according to claim 7, wherein the calculating of the content of behavior risk Y through the similarity set S comprises:
Figure QLYQS_3
10. the cloud technology-based medical service method according to any one of claims 6 to 9, further comprising:
encrypting and decrypting data d, said encrypting and decrypting comprising:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, wherein
Figure QLYQS_4
And m and p are prime numbers to each other;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting a number u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U mod l, and E (w t mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
CN202310045289.8A 2023-01-30 2023-01-30 Medical service platform and method based on cloud technology Active CN115801843B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310045289.8A CN115801843B (en) 2023-01-30 2023-01-30 Medical service platform and method based on cloud technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310045289.8A CN115801843B (en) 2023-01-30 2023-01-30 Medical service platform and method based on cloud technology

Publications (2)

Publication Number Publication Date
CN115801843A true CN115801843A (en) 2023-03-14
CN115801843B CN115801843B (en) 2023-05-05

Family

ID=85429179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310045289.8A Active CN115801843B (en) 2023-01-30 2023-01-30 Medical service platform and method based on cloud technology

Country Status (1)

Country Link
CN (1) CN115801843B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101969475A (en) * 2010-11-15 2011-02-09 张军 Business data controllable distribution and fusion application system based on cloud computing
US20120143624A1 (en) * 2010-12-05 2012-06-07 Prasanna Kumar Jena m-ERP system
CN103312727A (en) * 2012-03-06 2013-09-18 创业软件股份有限公司 Method for cloud computing deployment in the field of cooperative services of regional medical care
CN103533068A (en) * 2013-10-22 2014-01-22 黎亮 Independent and balanced task distribution cluster system based on IP
CN204946108U (en) * 2015-09-06 2016-01-06 宁夏义盟达电子科技有限公司 A kind of software work person and software requirement person information sharing platform
CN106503453A (en) * 2016-11-02 2017-03-15 河南智业科技发展有限公司 Medical management system based on cloud service
CN107959663A (en) * 2016-10-17 2018-04-24 孙建松 One kind utilizes the encrypted internet diagnosis and therapy system of patient identification information and method
US20180114595A1 (en) * 2002-10-29 2018-04-26 David E. Stern Method and system for automated medical records processing with patient tracking
CN109979606A (en) * 2019-01-07 2019-07-05 北京云度互联科技有限公司 A method of micro services medical imaging cloud and cloud film are constructed based on containerization
CN110912897A (en) * 2019-11-27 2020-03-24 郑州轻工业大学 Book resource access control method based on ciphertext attribute authentication and threshold function
CN111107094A (en) * 2019-12-25 2020-05-05 青岛大学 Lightweight ground-oriented medical Internet of things big data sharing system
US20200342966A1 (en) * 2002-10-29 2020-10-29 David E. Stern Method and system for automated medical records processing with telemedicine
CN112349368A (en) * 2020-09-29 2021-02-09 福建西岸康健管理有限公司 Electronic health record authorization sharing and management system based on medical block chain
AU2021102846A4 (en) * 2021-05-26 2021-07-15 Bhadane, Jaywant Ramdas DR An iot based healthcare management information system
CN114466015A (en) * 2022-01-25 2022-05-10 柏域信息科技(上海)有限公司 Data storage system and method based on multi-cloud architecture
CN115208611A (en) * 2022-04-22 2022-10-18 中国工商银行股份有限公司 Identity authentication method, identity authentication device, computer equipment, storage medium and program product
CN115242518A (en) * 2022-07-25 2022-10-25 深圳万海思数字医疗有限公司 Medical health data protection system and method under mixed cloud environment

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200342966A1 (en) * 2002-10-29 2020-10-29 David E. Stern Method and system for automated medical records processing with telemedicine
US20180114595A1 (en) * 2002-10-29 2018-04-26 David E. Stern Method and system for automated medical records processing with patient tracking
CN101969475A (en) * 2010-11-15 2011-02-09 张军 Business data controllable distribution and fusion application system based on cloud computing
US20120143624A1 (en) * 2010-12-05 2012-06-07 Prasanna Kumar Jena m-ERP system
CN103312727A (en) * 2012-03-06 2013-09-18 创业软件股份有限公司 Method for cloud computing deployment in the field of cooperative services of regional medical care
CN103533068A (en) * 2013-10-22 2014-01-22 黎亮 Independent and balanced task distribution cluster system based on IP
CN204946108U (en) * 2015-09-06 2016-01-06 宁夏义盟达电子科技有限公司 A kind of software work person and software requirement person information sharing platform
CN107959663A (en) * 2016-10-17 2018-04-24 孙建松 One kind utilizes the encrypted internet diagnosis and therapy system of patient identification information and method
CN106503453A (en) * 2016-11-02 2017-03-15 河南智业科技发展有限公司 Medical management system based on cloud service
CN109979606A (en) * 2019-01-07 2019-07-05 北京云度互联科技有限公司 A method of micro services medical imaging cloud and cloud film are constructed based on containerization
CN110912897A (en) * 2019-11-27 2020-03-24 郑州轻工业大学 Book resource access control method based on ciphertext attribute authentication and threshold function
CN111107094A (en) * 2019-12-25 2020-05-05 青岛大学 Lightweight ground-oriented medical Internet of things big data sharing system
CN112349368A (en) * 2020-09-29 2021-02-09 福建西岸康健管理有限公司 Electronic health record authorization sharing and management system based on medical block chain
AU2021102846A4 (en) * 2021-05-26 2021-07-15 Bhadane, Jaywant Ramdas DR An iot based healthcare management information system
CN114466015A (en) * 2022-01-25 2022-05-10 柏域信息科技(上海)有限公司 Data storage system and method based on multi-cloud architecture
CN115208611A (en) * 2022-04-22 2022-10-18 中国工商银行股份有限公司 Identity authentication method, identity authentication device, computer equipment, storage medium and program product
CN115242518A (en) * 2022-07-25 2022-10-25 深圳万海思数字医疗有限公司 Medical health data protection system and method under mixed cloud environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
胡俐;龚放;赵耀;苏海燕;: "云计算助推现代医疗服务质量的提升" *

Also Published As

Publication number Publication date
CN115801843B (en) 2023-05-05

Similar Documents

Publication Publication Date Title
US20230010452A1 (en) Zero-Knowledge Environment Based Networking Engine
Fabian et al. Collaborative and secure sharing of healthcare data in multi-clouds
Azbeg et al. Access control and privacy-preserving blockchain-based system for diseases management
Zala et al. PRMS: design and development of patients’ E-healthcare records management system for privacy preservation in third party cloud platforms
Hemalatha Monitoring and securing the healthcare data harnessing IOT and blockchain technology
Abbas et al. E-health cloud: privacy concerns and mitigation strategies
CN115803735A (en) Database access control service in a network
Shuaib et al. Effect of quantum computing on blockchain-based electronic health record systems
Satar et al. Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
WO2016077219A1 (en) System and method for securely storing and sharing information
Alanazi Analysis of privacy and security challenges in e-health clouds
Babu et al. An effective block-chain based authentication technique for cloud based IoT
Thamrin et al. Hierarchical cloud-based consortium blockchains for healthcare data storage
Sarode et al. Secure data sharing in medical cyber-physical system—a review
US20240152641A1 (en) Secure collaborative laboratory data analytics system
CN115801843A (en) Medical service platform and method based on cloud technology
Begum et al. A privacy-preserving framework for personally controlled electronic health record (PCEHR) system
Choi et al. Secure healthcare data management and sharing platform based on hyperledger fabric
US11647020B2 (en) Satellite service for machine authentication in hybrid environments
Jain et al. A Granular Access-Based Blockchain System to Prevent Fraudulent Activities in Medical Health Records
Taechoyotin et al. Health link: scalable health information exchange platform in Thailand
Bhardwaj et al. Review and analysis of security model in healthcare system
Almalki et al. Healthcare Security based on Blockchain
Kiran Dash et al. An approach to securely store electronic health record (EHR) using blockchain with proxy re-encryption and behavioral analysis
Aruna et al. Security Framework for Electronic Health Record in the Cloud Based on Public key Encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant