CN115801843A - Medical service platform and method based on cloud technology - Google Patents
Medical service platform and method based on cloud technology Download PDFInfo
- Publication number
- CN115801843A CN115801843A CN202310045289.8A CN202310045289A CN115801843A CN 115801843 A CN115801843 A CN 115801843A CN 202310045289 A CN202310045289 A CN 202310045289A CN 115801843 A CN115801843 A CN 115801843A
- Authority
- CN
- China
- Prior art keywords
- calculating
- port
- access
- service
- collection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Storage Device Security (AREA)
- Medical Treatment And Welfare Office Work (AREA)
Abstract
The application discloses a medical service platform and a method based on cloud technology, wherein the medical service platform comprises an access module, a service module and a service module, wherein the access module is used for accessing a port of the medical service platform; the reverse proxy module comprises a virtual server cluster system, an error request filtering system and an automatic server monitoring system; the gateway module is used for performing identity authentication on the accessed port and limiting the flow of the service; the service module comprises a monitoring center, a treatment center, a micro-service center and a service center; and the storage module comprises an open-source lightweight distributed file system FastDFS, a MySQL database and a single-thread Redis cache cluster. The cloud technology-based medical service platform and the cloud technology-based medical service method can effectively share medical information and resources, patients and doctors can efficiently utilize the platform to conduct bidirectional communication, and long-term effective and reliable protection and safe access of medical data are achieved.
Description
Technical Field
The application belongs to the technical field of cloud, and particularly relates to a medical service platform and a method based on cloud technology.
Background
Today with increasing medical needs, many hospital resources are isolated and cannot be shared, and many medical services form an island and cannot be comprehensively utilized.
Medical services in various places at present need to be collected uniformly to use large-scale storage equipment and data to integrate medical resources, so that the data can be transmitted at high speed and the medical services can be carried out in a cloud technology mode, the purpose of sharing the medical resources is met, roles of all participants based on the cloud technology can be redefined only by integrating patients, doctors and hospitals, and in addition, the medical resources can be protected more powerfully and shared effectively by adding the cloud technology in the aspects of access and data encryption and decryption.
Disclosure of Invention
In order to overcome the defects of the prior art, the medical service platform and the method based on the cloud technology are provided, medical information and resources are effectively shared based on the cloud technology, a patient and a doctor can efficiently utilize the platform to perform bidirectional communication to form a mutual relation, long-term effective and reliable protection and safe access of medical data are realized, powerful protection is provided for sharing of medical resources, and convenient safe access and data encryption can be realized.
In order to achieve the purpose, the following technical scheme is adopted in the application:
a cloud technology-based medical services platform, comprising:
an access module for accessing ports of the medical services platform, including a patient port and a physician port;
the reverse proxy module comprises a virtual server cluster system, an error request filtering system and an automatic server monitoring system, wherein the virtual server cluster system is used for forming a virtual server by clustering servers by adopting IP load balancing and content-based request distribution, the error request filtering system is used for filtering error requests of the ports, and the automatic server monitoring system monitors the state of the servers to remove failed servers;
the gateway module is used for performing identity authentication on the accessed port and limiting the flow of services, and comprises a service gateway, wherein the service gateway is used for providing authentication services;
the service module comprises a monitoring center, a treatment center, a micro-service center and a service center; the monitoring center comprises a fusing protection system, a link tracking system and a log analysis system; the treatment center comprises a registration system, a load balancing system and a uniform configuration system; the micro-service center comprises a personnel management system, a patient management system, a diagnosis management system and a financial management system; the service center comprises a user information system, a doctor information system, a background system, a message system and a hospital information system; and
and the storage module comprises an open-source lightweight distributed file system FastDFS, a MySQL database and a single-thread Redis cache cluster.
Further, the authentication service includes:
calculating the credible loss amount M of the doctor port;
and based on the credible loss amount M being larger than a preset amount, rejecting the access of the doctor port.
Further, the calculating the amount of trusted loss of the doctor port comprises:
receiving an access request of the doctor port, wherein the access request comprises { a, b and c }, a is an access subject, b is a target resource which the access subject requests to access, and c is a resource set which is related to the attribute of the access subject and is used for accessing;
calculating a collection of the attribute set of the a and the attribute set of the b;
if the collection set is not an empty set, the credible loss amount M is M =0;
if the collection is an empty collection, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in c and b to form a similarity collection S, and calculating behavior content risk Y through the similarity collection S, wherein the credible loss M is M = X Y.
Further, the calculating of the behavioral content risk Y through the similarity set S includes:
further, the method also comprises the following steps:
an encryption module, configured to encrypt and decrypt data d, where the encryption and decryption include:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, whereinAnd m and p are prime numbers to each other;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U mod l, and E (w t mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
In addition, a cloud technology-based medical service method is also provided, which is applied to the cloud technology-based medical service platform, and comprises the following steps:
accessing the healthcare platform through ports, the ports including a patient port and a physician port;
forming a virtual server by the server cluster by adopting IP load balancing and content-based request distribution;
filtering the error request of the port;
monitoring the state of the server to remove the failed server;
performing identity authentication on the accessed port, performing flow limitation on services, and providing authentication services;
isolating the port which is refused to access, and performing fusing protection on the system;
positioning the fault and eliminating the fault by adopting a link tracking system;
forming graph visualization analysis by adopting a log analysis system;
adopting a registration system to call the necessary IP address and port for each system of the micro-service center;
a load balancing system is adopted for load balancing; and
and modifying the configuration of each system of the micro service center in different environments by adopting a uniform configuration system.
Further, the authentication service includes:
calculating the credible loss M of the doctor port;
and based on the credible loss amount M being larger than a preset amount, rejecting the access of the doctor port.
Further, the calculating the amount of trusted loss of the doctor port comprises:
receiving an access request of the doctor port, wherein the access request comprises { a, b and c }, a is an access subject, b is a target resource which the access subject requests to access, and c is a resource set which is related to the attribute of the access subject and is used for accessing;
calculating a collection of the attribute set of the a and the attribute set of the b;
if the collection set is not an empty set, the credible loss amount M is M =0;
if the collection is an empty collection, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in c and b to form a similarity collection S, and calculating behavior content risk Y through the similarity collection S, wherein the credible loss M is M = X Y.
Further, the calculating of the behavioral content risk Y through the similarity set S includes:
further, still include:
encrypting and decrypting data d, said encrypting and decrypting comprising:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, whereinAnd m and p are prime numbers to each other;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting a number u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U + mod l, and E (w + t + mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
Drawings
FIG. 1 is a schematic structural diagram of a platform of the present application;
FIG. 2 is a schematic diagram of an access module of the present application;
FIG. 3 is a schematic diagram of a reverse proxy module of the present application;
FIG. 4 is a schematic diagram of a gateway module of the present application;
FIG. 5 is a schematic diagram of a service module of the present application;
fig. 6 is a schematic diagram of a memory module of the present application.
Detailed Description
In the description of the present application, it is to be understood that the terms etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, which are merely for convenience in describing the present application and simplifying the description, but do not indicate or imply that the system or element referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be construed as limiting the present application.
Medical services are more and more emphasized, the demand is more and more increased, but resources of the medical services sometimes cannot be comprehensively unified, each medical service organization sometimes forms an isolated island, and cannot be effectively connected and form a unified platform to provide services for patients and doctors.
In some embodiments, as shown in fig. 1, the present application provides a cloud technology-based healthcare platform 1, comprising:
as shown in fig. 2, an access module 11 for accessing ports of the medical services platform, including a patient port 111 and a doctor port 112;
as shown in fig. 3, the reverse proxy module 12 includes a virtual server cluster system 121, an error request filtering system 122 and an automatic server monitoring system 123, where the virtual server cluster system 121 is configured to configure a cluster of servers into a virtual server by using IP load balancing and content request distribution, the error request filtering system 122 is configured to filter error requests of the ports, and the automatic server monitoring system 123 monitors states of the servers to remove a failed server;
the IP load balancing is adopted, namely, the processing load of each server is balanced by utilizing the load calculation of the servers, so that each server is not overloaded to cause congestion and damage; the virtual server can be realized according to the distribution of requests for processing contents, and the construction of the virtual server is carried out according to different request contents, so that the requests of the same or similar contents can be processed in one or more servers in a centralized way.
As shown in fig. 4, the gateway module 13 is configured to authenticate the identity of the accessed port and throttle the service, and includes a service gateway 131, where the service gateway 131 is configured to provide an authentication service;
as shown in fig. 5, the service module 14 includes a monitoring center 141, an administration center 142, a micro service center 143, and a service center 144; the monitoring center comprises a fuse protection system 1411, a link tracking system 1412 and a log analysis system 1413; the governance center 142 comprises a registration system 1421, a load balancing system 1422 and a unified configuration system 1423; the microservice center 143 includes a personnel management system 1431, a patient management system 1432, a diagnosis management system 1433, and a financial management system 1434; the business center 144 includes a user information system 1441, a doctor information system 1442, a backend system 1443, a messaging system 1444, and a hospital information system 1445; and
as shown in fig. 6, the storage module 15 includes an open-source lightweight distributed file system FastDFS151, a MySQL database 152, and a single-threaded Redis cache cluster 153.
In some embodiments, the authentication services provided by the service gateway 131 are:
receiving an access request of the doctor port 112, wherein the access request comprises { a, b, c }, where a is an access subject, b is a target resource requested to be accessed by the access subject, and c is a set of resources for access related to attributes of the access subject; the access subject and the target resource requested to be accessed by the access subject both have attribute sets, the attribute sets can be labeled by management personnel with corresponding attribute identifications, the access subject and the related resource can be classified and retrieved in attribute aspect through the labeled corresponding attribute identifications, and related calculation can be carried out;
calculating a collection of the attribute set of the a and the attribute set of the b;
if the collection set is not an empty set, the credible loss M is M =0, which means that the attributes in the two sets are in one-to-one correspondence;
if the collection set is an empty set, the attributes in the two sets are not in one-to-one correspondence, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in the c and the b to form a similarity set S, and calculating behavior content risk Y through the similarity set S, wherein the credible loss M is M = X Y;
wherein the attribute correlation matrix J =WhereinRepresenting the similarity between the attributes of the access subject and the attributes of the target resources, wherein the attributes of the subject may include a department to which the subject belongs, a disease category to which the subject is responsible, and the attributes of the target resources may include a disease category to which certain patient data belongs, a disease duration, and the like; phase (C)Is calculated by the formula= (collection of identification of attributes of access subject and identification of attributes of target resource)/(union of identification of attributes of access subject and identification of attributes of target resource),=1. The similarity calculation of each resource in c and b to form the similarity set S can also use the above calculation formula to calculate.
Further, the calculating of the behavioral content risk Y through the similarity set S includes:
and based on the credibility loss quantity M being larger than a preset quantity, refusing the access of the doctor port.
When the confidence loss amount M is less than or equal to a preset amount, then access to the doctor port may be allowed.
In some embodiments, the healthcare platform further comprises:
an encryption module 16, configured to encrypt and decrypt data d, where the encryption and decryption include:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, whereinAnd m and p are mutually prime;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U + mod l, and E (w + t + mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
The double-key verification mode is carried out through the two keys, so that the encryption of the data can be safer, if reverse decryption is required, the two keys are required to be owned at the same time, the security of the data is improved, the decryption of the data is more difficult, and hackers or other persons who maliciously want to use the data cannot easily decrypt the data.
The application also provides a medical service method based on the cloud technology, which is applied to the medical service platform based on the cloud technology and comprises the following steps:
accessing the healthcare platform through ports, the ports including a patient port and a physician port;
forming a virtual server by the server cluster by IP load balancing and content-based request distribution;
filtering the error request of the port;
monitoring the state of the server to remove the failed server;
performing identity authentication on the accessed port, performing flow limitation on services, and providing authentication services;
isolating the port which is refused to access, and performing fusing protection on the system;
positioning the fault and eliminating the fault by adopting a link tracking system;
forming graph visualization analysis by adopting a log analysis system;
adopting a registration system to call the necessary IP address and port for each system of the micro service center;
a load balancing system is adopted for load balancing; and
and modifying the configuration of each system of the micro service center in different environments by adopting a uniform configuration system.
In some embodiments, the authentication service includes:
receiving an access request of the doctor port 112, wherein the access request comprises { a, b, c }, where a is an access subject, b is a target resource requested to be accessed by the access subject, and c is a set of resources for access related to attributes of the access subject; the access subject and the target resource requested to be accessed by the access subject both have attribute sets, the attribute sets can be labeled by management personnel with corresponding attribute identifications, the access subject and the related resource can be classified and retrieved in attribute aspect through the labeled corresponding attribute identifications, and related calculation can be carried out;
calculating a collection of the attribute set of the a and the attribute set of the b;
if the collection set is not an empty set, the credible loss M is M =0, which means that the attributes in the two sets are in one-to-one correspondence;
if the collection set is an empty set, the attributes in the two sets are not in one-to-one correspondence, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in the c and the b to form a similarity set S, and calculating behavior content risk Y through the similarity set S, wherein the credible loss M is M = X Y;
wherein, the attribute correlation matrix J =WhereinRepresenting the similarity between the attributes of the access subject and the attributes of the target resources, wherein the attributes of the subject may include the department to which the subject belongs, the kind of disease to which the subject is responsible, and the attributes of the target resources may include the kind of disease to which the patient data belongs, the suffering time, and the like; similarity of charactersIs calculated by the formula= (collection of identification of attributes of access subject and identification of attributes of target resource)/(union of identification of attributes of access subject and identification of attributes of target resource),and =1. The similarity calculation of each resource in c and b to form the similarity set S can also use the above calculation formula to calculate.
Further, the calculating the content of behavior risk Y through the similarity set S includes:
and based on the credible loss amount M being larger than a preset amount, rejecting the access of the doctor port.
When the confidence loss amount M is less than or equal to a preset amount, then access to the doctor port may be allowed.
In some embodiments, the healthcare platform further comprises:
encrypting and decrypting data d, said encrypting and decrypting comprising:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, whereinAnd m and p are mutually prime;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U + mod l, and E (w + t + mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
The double-key verification mode is carried out through the two keys, so that the encryption of the data can be safer, if reverse decryption is required, the two keys are required to be owned at the same time, the security of the data is improved, the decryption of the data is more difficult, and hackers or other persons who maliciously want to use the data cannot easily decrypt the data.
While certain embodiments and generally associated methods have been described, modifications and variations of these embodiments will be apparent to those skilled in the art. Accordingly, the above description of example embodiments does not define or constrain this disclosure. Other changes, substitutions, and alterations are also possible without departing from the spirit of the following claims.
Claims (10)
1. A medical service platform based on cloud technology, comprising:
an access module for accessing ports of the medical services platform, including a patient port and a physician port;
the reverse proxy module comprises a virtual server cluster system, an error request filtering system and an automatic server monitoring system, wherein the virtual server cluster system is used for forming a virtual server by clustering servers by adopting IP load balancing and content-based request distribution, the error request filtering system is used for filtering error requests of the ports, and the automatic server monitoring system monitors the state of the servers to remove failed servers;
the gateway module is used for performing identity authentication on the accessed port and limiting the flow of services, and comprises a service gateway, wherein the service gateway is used for providing authentication services;
the service module comprises a monitoring center, a treatment center, a micro-service center and a service center; the monitoring center comprises a fusing protection system, a link tracking system and a log analysis system; the treatment center comprises a registration system, a load balancing system and a unified configuration system; the micro-service center comprises a personnel management system, a patient management system, a diagnosis management system and a financial management system; the service center comprises a user information system, a doctor information system, a background system, a message system and a hospital information system; and
and the storage module comprises an open-source lightweight distributed file system FastDFS, a MySQL database and a single-thread Redis cache cluster.
2. The cloud-based healthcare platform of claim 1, wherein the authentication service comprises:
calculating the credible loss M of the doctor port;
and based on the credible loss amount M being larger than a preset amount, rejecting the access of the doctor port.
3. The cloud-based healthcare platform of claim 2, wherein the calculating the amount of trustworthiness of the doctor port comprises:
receiving an access request of the doctor port, wherein the access request comprises { a, b and c }, a is an access subject, b is a target resource which the access subject requests to access, and c is a resource set which is related to the attribute of the access subject and is used for accessing;
calculating a collection of the attribute set of a and the attribute set of b;
if the collection set is not an empty set, the credible loss amount M is M =0;
if the collection is an empty collection, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in c and b to form a similarity collection S, and calculating behavior content risk Y through the similarity collection S, wherein the credible loss M is M = X Y.
5. the cloud-based healthcare platform of any one of claims 1-4, further comprising:
an encryption module, configured to encrypt and decrypt data d, where the encryption and decryption include:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, whereinAnd m and p are prime numbers to each other;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U + mod l, and E (w + t + mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
6. A cloud technology-based medical service method applied to the cloud technology-based medical service platform according to any one of claims 1 to 5, comprising:
accessing the healthcare platform through ports, the ports including a patient port and a physician port;
forming a virtual server by the server cluster by adopting IP load balancing and content-based request distribution;
filtering the error request of the port;
monitoring the state of the server to remove the failed server;
performing identity authentication on the accessed port, performing flow limitation on services, and providing authentication services;
isolating the port which is refused to access, and performing fusing protection on the system;
positioning the fault and eliminating the fault by adopting a link tracking system;
forming graph visualization analysis by adopting a log analysis system;
adopting a registration system to call the necessary IP address and port for each system of the micro-service center;
a load balancing system is adopted for load balancing; and
and modifying the configuration of each system of the micro service center in different environments by adopting a uniform configuration system.
7. The cloud technology-based medical service method according to claim 6, wherein the authentication service includes:
calculating the credible loss M of the doctor port;
and based on the credible loss amount M being larger than a preset amount, rejecting the access of the doctor port.
8. The cloud technology-based medical service method of claim 7, wherein the calculating the amount of the credible loss of the doctor port comprises:
receiving an access request of the doctor port, wherein the access request comprises { a, b and c }, a is an access subject, b is a target resource which the access subject requests to access, and c is a resource set which is related to the attribute of the access subject and is used for accessing;
calculating a collection of the attribute set of the a and the attribute set of the b;
if the collection set is not an empty set, the credible loss amount M is M =0;
if the collection is an empty collection, calculating behavior attribute risk X through an attribute correlation matrix, calculating the similarity between each resource in c and b to form a similarity collection S, and calculating behavior content risk Y through the similarity collection S, wherein the credible loss M is M = X Y.
10. the cloud technology-based medical service method according to any one of claims 6 to 9, further comprising:
encrypting and decrypting data d, said encrypting and decrypting comprising:
randomly selecting three different prime numbers i, j and k, so that the combination (i, j, k) =1;
calculating the common modulus l = i j k of i, j and k, and selecting an integer m, whereinAnd m and p are prime numbers to each other;
the encrypted data d is ciphertext w, where w = mod (d) m ,l);
Randomly selecting a number u;
calculating a parameter r corresponding to u, wherein r = (E (w × t × mod l) 2 ) U mod l, and E (w t mod l) 2 )= w*t*modl 2 -1/l,t=w*d*(i-1)*(j-1)*(k-1);
Form the keys (l, u), (t, r).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310045289.8A CN115801843B (en) | 2023-01-30 | 2023-01-30 | Medical service platform and method based on cloud technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310045289.8A CN115801843B (en) | 2023-01-30 | 2023-01-30 | Medical service platform and method based on cloud technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115801843A true CN115801843A (en) | 2023-03-14 |
CN115801843B CN115801843B (en) | 2023-05-05 |
Family
ID=85429179
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310045289.8A Active CN115801843B (en) | 2023-01-30 | 2023-01-30 | Medical service platform and method based on cloud technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115801843B (en) |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101969475A (en) * | 2010-11-15 | 2011-02-09 | 张军 | Business data controllable distribution and fusion application system based on cloud computing |
US20120143624A1 (en) * | 2010-12-05 | 2012-06-07 | Prasanna Kumar Jena | m-ERP system |
CN103312727A (en) * | 2012-03-06 | 2013-09-18 | 创业软件股份有限公司 | Method for cloud computing deployment in the field of cooperative services of regional medical care |
CN103533068A (en) * | 2013-10-22 | 2014-01-22 | 黎亮 | Independent and balanced task distribution cluster system based on IP |
CN204946108U (en) * | 2015-09-06 | 2016-01-06 | 宁夏义盟达电子科技有限公司 | A kind of software work person and software requirement person information sharing platform |
CN106503453A (en) * | 2016-11-02 | 2017-03-15 | 河南智业科技发展有限公司 | Medical management system based on cloud service |
CN107959663A (en) * | 2016-10-17 | 2018-04-24 | 孙建松 | One kind utilizes the encrypted internet diagnosis and therapy system of patient identification information and method |
US20180114595A1 (en) * | 2002-10-29 | 2018-04-26 | David E. Stern | Method and system for automated medical records processing with patient tracking |
CN109979606A (en) * | 2019-01-07 | 2019-07-05 | 北京云度互联科技有限公司 | A method of micro services medical imaging cloud and cloud film are constructed based on containerization |
CN110912897A (en) * | 2019-11-27 | 2020-03-24 | 郑州轻工业大学 | Book resource access control method based on ciphertext attribute authentication and threshold function |
CN111107094A (en) * | 2019-12-25 | 2020-05-05 | 青岛大学 | Lightweight ground-oriented medical Internet of things big data sharing system |
US20200342966A1 (en) * | 2002-10-29 | 2020-10-29 | David E. Stern | Method and system for automated medical records processing with telemedicine |
CN112349368A (en) * | 2020-09-29 | 2021-02-09 | 福建西岸康健管理有限公司 | Electronic health record authorization sharing and management system based on medical block chain |
AU2021102846A4 (en) * | 2021-05-26 | 2021-07-15 | Bhadane, Jaywant Ramdas DR | An iot based healthcare management information system |
CN114466015A (en) * | 2022-01-25 | 2022-05-10 | 柏域信息科技(上海)有限公司 | Data storage system and method based on multi-cloud architecture |
CN115208611A (en) * | 2022-04-22 | 2022-10-18 | 中国工商银行股份有限公司 | Identity authentication method, identity authentication device, computer equipment, storage medium and program product |
CN115242518A (en) * | 2022-07-25 | 2022-10-25 | 深圳万海思数字医疗有限公司 | Medical health data protection system and method under mixed cloud environment |
-
2023
- 2023-01-30 CN CN202310045289.8A patent/CN115801843B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200342966A1 (en) * | 2002-10-29 | 2020-10-29 | David E. Stern | Method and system for automated medical records processing with telemedicine |
US20180114595A1 (en) * | 2002-10-29 | 2018-04-26 | David E. Stern | Method and system for automated medical records processing with patient tracking |
CN101969475A (en) * | 2010-11-15 | 2011-02-09 | 张军 | Business data controllable distribution and fusion application system based on cloud computing |
US20120143624A1 (en) * | 2010-12-05 | 2012-06-07 | Prasanna Kumar Jena | m-ERP system |
CN103312727A (en) * | 2012-03-06 | 2013-09-18 | 创业软件股份有限公司 | Method for cloud computing deployment in the field of cooperative services of regional medical care |
CN103533068A (en) * | 2013-10-22 | 2014-01-22 | 黎亮 | Independent and balanced task distribution cluster system based on IP |
CN204946108U (en) * | 2015-09-06 | 2016-01-06 | 宁夏义盟达电子科技有限公司 | A kind of software work person and software requirement person information sharing platform |
CN107959663A (en) * | 2016-10-17 | 2018-04-24 | 孙建松 | One kind utilizes the encrypted internet diagnosis and therapy system of patient identification information and method |
CN106503453A (en) * | 2016-11-02 | 2017-03-15 | 河南智业科技发展有限公司 | Medical management system based on cloud service |
CN109979606A (en) * | 2019-01-07 | 2019-07-05 | 北京云度互联科技有限公司 | A method of micro services medical imaging cloud and cloud film are constructed based on containerization |
CN110912897A (en) * | 2019-11-27 | 2020-03-24 | 郑州轻工业大学 | Book resource access control method based on ciphertext attribute authentication and threshold function |
CN111107094A (en) * | 2019-12-25 | 2020-05-05 | 青岛大学 | Lightweight ground-oriented medical Internet of things big data sharing system |
CN112349368A (en) * | 2020-09-29 | 2021-02-09 | 福建西岸康健管理有限公司 | Electronic health record authorization sharing and management system based on medical block chain |
AU2021102846A4 (en) * | 2021-05-26 | 2021-07-15 | Bhadane, Jaywant Ramdas DR | An iot based healthcare management information system |
CN114466015A (en) * | 2022-01-25 | 2022-05-10 | 柏域信息科技(上海)有限公司 | Data storage system and method based on multi-cloud architecture |
CN115208611A (en) * | 2022-04-22 | 2022-10-18 | 中国工商银行股份有限公司 | Identity authentication method, identity authentication device, computer equipment, storage medium and program product |
CN115242518A (en) * | 2022-07-25 | 2022-10-25 | 深圳万海思数字医疗有限公司 | Medical health data protection system and method under mixed cloud environment |
Non-Patent Citations (1)
Title |
---|
胡俐;龚放;赵耀;苏海燕;: "云计算助推现代医疗服务质量的提升" * |
Also Published As
Publication number | Publication date |
---|---|
CN115801843B (en) | 2023-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230010452A1 (en) | Zero-Knowledge Environment Based Networking Engine | |
Fabian et al. | Collaborative and secure sharing of healthcare data in multi-clouds | |
Azbeg et al. | Access control and privacy-preserving blockchain-based system for diseases management | |
Zala et al. | PRMS: design and development of patients’ E-healthcare records management system for privacy preservation in third party cloud platforms | |
Hemalatha | Monitoring and securing the healthcare data harnessing IOT and blockchain technology | |
Abbas et al. | E-health cloud: privacy concerns and mitigation strategies | |
CN115803735A (en) | Database access control service in a network | |
Shuaib et al. | Effect of quantum computing on blockchain-based electronic health record systems | |
Satar et al. | Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme | |
WO2016077219A1 (en) | System and method for securely storing and sharing information | |
Alanazi | Analysis of privacy and security challenges in e-health clouds | |
Babu et al. | An effective block-chain based authentication technique for cloud based IoT | |
Thamrin et al. | Hierarchical cloud-based consortium blockchains for healthcare data storage | |
Sarode et al. | Secure data sharing in medical cyber-physical system—a review | |
US20240152641A1 (en) | Secure collaborative laboratory data analytics system | |
CN115801843A (en) | Medical service platform and method based on cloud technology | |
Begum et al. | A privacy-preserving framework for personally controlled electronic health record (PCEHR) system | |
Choi et al. | Secure healthcare data management and sharing platform based on hyperledger fabric | |
US11647020B2 (en) | Satellite service for machine authentication in hybrid environments | |
Jain et al. | A Granular Access-Based Blockchain System to Prevent Fraudulent Activities in Medical Health Records | |
Taechoyotin et al. | Health link: scalable health information exchange platform in Thailand | |
Bhardwaj et al. | Review and analysis of security model in healthcare system | |
Almalki et al. | Healthcare Security based on Blockchain | |
Kiran Dash et al. | An approach to securely store electronic health record (EHR) using blockchain with proxy re-encryption and behavioral analysis | |
Aruna et al. | Security Framework for Electronic Health Record in the Cloud Based on Public key Encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |