CN110473599A - Information processing method and device, electronic equipment and storage medium - Google Patents
Information processing method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN110473599A CN110473599A CN201810438594.2A CN201810438594A CN110473599A CN 110473599 A CN110473599 A CN 110473599A CN 201810438594 A CN201810438594 A CN 201810438594A CN 110473599 A CN110473599 A CN 110473599A
- Authority
- CN
- China
- Prior art keywords
- information
- private network
- access
- network
- processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H80/00—ICT specially adapted for facilitating communication between medical practitioners or patients, e.g. for collaborative diagnosis, therapy or health monitoring
Landscapes
- Health & Medical Sciences (AREA)
- Engineering & Computer Science (AREA)
- Medical Informatics (AREA)
- Epidemiology (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Biomedical Technology (AREA)
- Pathology (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The embodiment of the invention discloses a kind of information processing method and devices, electronic equipment and storage medium.The information processing method includes: the first information for obtaining the first private network, wherein the first private network described in the first private network is the second information for being stored with target user;Based on the first information, first private network is accessed;Receive the third information that first private network provides, wherein the third information is second information security treated information.
Description
Technical field
The present invention relates to information technology field more particularly to a kind of information processing methods and device, electronic equipment and storage
Medium.
Background technique
The problem of weighing apparatus is unevenly distributed due to medical resource, so that outstanding medical resource is distributed in one, tier 2 cities, but
It is that the medical resource of three or four line cities or vast rural area is just serious deficient relatively.With the development of network technology, can pass through
Network carries out distance medical diagnosis, but during tele-medicine, is related to a large amount of private datas of patient.If these are counted
According to passing through on terminal device used in network transmission to doctor, the private data that may cause patient is largely revealed
Safety issue.
Summary of the invention
An embodiment of the present invention is intended to provide information processing method and device, transmission device, storage medium and program products.
The technical scheme of the present invention is realized as follows:
In a first aspect, the embodiment of the present invention provides a kind of information processing method, comprising:
Obtain the first information of the first private network, wherein the first private network described in the first private network is to be stored with
The second information of target user;
Based on the first information, first private network is accessed;
Receive the third information that first private network provides, wherein the third information is second information peace
Information that treated entirely.
Optionally, described to be based on the first information, access first private network, comprising:
Based on the first information, the first xegregating unit of first private network is accessed;Wherein, second letter
Breath is stored in the first storage equipment of first private network, and first xegregating unit has been isolated described first
Store equipment and public network;
The third information for receiving first private network and providing, comprising:
Receive the third information that first xegregating unit provides.
Optionally, the first information for obtaining the first private network, comprising:
Second private network obtains the first information of the first private network.
Optionally, described to be based on the first information, access first private network, comprising:
Second xegregating unit of second private network is based on the first information, accesses first private network
The first xegregating unit;Wherein, second information is stored in the first storage equipment of first private network, and
The first storage equipment and public network has been isolated in first xegregating unit;
The third information for receiving first private network and providing, comprising:
Second xegregating unit receives the third information that first xegregating unit provides.
Optionally, the third information for receiving first xegregating unit and providing, comprising:
It receives that first xegregating unit provides and the third that second information security is handled is believed
Breath.
Optionally, the third information for receiving first private network and providing, including at least one of:
Receive the third information of deleting that treated of at least partly confidential information in second information;
The third information after receiving at least partly confidential information desensitization process in second information;
The third information after receiving at least partly confidential information encryption in second information;
Receive at least partly confidential information scrambling treated the third information in second information.
Optionally, the visualization processing includes: two-dimensional visualization processing and/or three-dimensional visualization processing.
Optionally, the third information is that second information security is handled and data volume reduction treated information;
And/or
The third information is the information after the processing of raw video information security and visualization processing.
Optionally, the first information for obtaining the first private network, further includes:
Receive the diagnosis request of the first private network transmission;
Based on the first information described in the diagnosis request.
Optionally, the diagnosis request carries the first code information of the target user;
It is described to be based on the first information, access first private network, comprising:
Based on the first information and the first code information, first private network is accessed.
Optionally, the diagnosis request for receiving the first private network and sending, comprising:
Receive diagnosis request that is that broadcast or multicast is sent and carrying medical demand information;
The first information for obtaining the first private network, further includes:
When determining to be capable of providing the medical services for meeting the medical demand information, the first privately owned net is obtained
The first information of network.
Optionally, the first information for obtaining the first private network, further includes:
Obtain the access address and the first authentication information of first private network;
It is described to be based on the first information, access first private network, comprising:
Using the access address, first private network is requested access to;
The access authentication of first private network is carried out using first authentication information;
The third information for receiving first private network and providing, comprising:
Receive the third information that first private network provides after access authentication passes through.
Second aspect, present invention implementation provide a kind of information processing method, comprising:
Receive the access request that the first information based on the first private network is sent;
The second information of target user the third information that safe handling obtains is carried out based on the access request to be sent to
Access end.
Optionally, the access request that the first information of the reception based on the first private network is sent, comprising:
Receive the access request that the second private network is sent based on the first information of the first private network;
It is described that the second information of target user is carried out by the third information hair that safe handling obtains based on the access request
Give access end, comprising:
The second information of target user the third information that safe handling obtains is carried out based on the access request to be sent to
Second private network.
Optionally, the method also includes:
The first authentication information carried using the access request, access authentication;
It is described that the second information of target user is carried out by the third information hair that safe handling obtains based on the access request
Give access end, comprising:
If the access authentication passes through, the third letter is sent to second private network based on the access request
Breath.
Optionally, the method also includes:
Safety filtering is carried out to the access request;
It is described that the second information of target user is carried out by the third information hair that safe handling obtains based on the access request
Give access end, comprising:
If after the access request passes through the safety filtering, being carried out based on the access request to the target user
Information processing obtains the third information.
Optionally, the access request that the receiving terminal apparatus is sent, comprising:
First xegregating unit receives the access request that the xegregating unit of second private network is sent;
It is described that the second information of target user is carried out by the third information hair that safe handling obtains based on the access request
Give access end, comprising:
First storage equipment query of first xegregating unit based on the access request to first private network
Second information;
Safe handling is carried out to second information and obtains the third information;
It is sent to the first xegregating unit described in second private network and the third information is sent to second private
There is the second xegregating unit of network.
It is optionally, described that the third information is obtained to second information progress safe handling, comprising:
To the third information of deleting that treated of at least partly confidential information in second information;To described
The third information after at least partly confidential information desensitization process in two information;To at least portion in second information
The third information after code insurance confidential information encryption;At least partly confidential information scrambling processing to second information
The third information afterwards.
Optionally, the second information of target user is carried out that safe handling obtains based on the access request the
Three information are sent to access end, including at least one of:
Obtain after safe handling and data volume reduction processing the is carried out to second information based on the access request
Three information are sent to the access end;
It is obtained after the progress safe handling of the second information and visualization processing based on the access request by target user
Third information is sent to the access end.
Optionally, the data volume reduction processing, including at least one of:
The information for meeting condition of similarity is subjected to compression processing;
The valid data and invalid data in second information are distinguished, the invalid data is removed;The valid data
For the data for including information content;The invalid data includes at least the data without information content.
Optionally, the visualization processing, comprising:
According to visualization condition, visualisation parameters are determined;
Based on the visualisation parameters, visualization processing is carried out to second information and obtains visual information.
Optionally, described according to visualization condition, determine visualisation parameters, including at least one of:
According to clear condition is visualized, the visualisation parameters are determined;
According to visualization time conditions, the visualisation parameters are determined.
Optionally, the visualisation parameters include at least one of: visualization sampling parameter;Visualization Model parameter;
Visualize time parameter.
Optionally, the visualization processing includes: two-dimensional visualization processing and/or three-dimensional visualization processing.
Optionally, the method also includes:
The first storage equipment that first xegregating unit of the first private network receives first private network sends upper
It submits a report asking for and asks;Wherein, described that request is reported to include at least: first code information corresponding with target user;
First xegregating unit is based on described report and requests to send diagnosis request, wherein the diagnosis request is including at least institute
State the first code information of target user.
Optionally, described to report request further include: medical timing information and/or medical demand information.
The third aspect, the embodiment of the present invention provide a kind of information processing unit characterized by comprising
First obtains module, for obtaining the first information of the first private network, wherein the described in the first private network
One private network is the second information for being stored with target user;
Access modules access first private network for being based on the first information;
First receiving module, the third information provided for receiving first private network, wherein the third letter
Breath is second information security treated information.
Optionally, described first module is obtained, is specifically used for being based on the first information, accesses the first privately owned net
First xegregating unit of network;Wherein, second information is stored in the first storage equipment of first private network,
And the first storage equipment and public network has been isolated in first xegregating unit;
First receiving module, the third information provided specifically for receiving first xegregating unit.
Optionally, described first module is obtained, the first letter of the first private network is obtained specifically for the second private network
Breath.
Optionally, the access modules are based on described the specifically for the second xegregating unit of second private network
One information accesses the first xegregating unit of first private network;
First receiving module receives what first xegregating unit provided specifically for second xegregating unit
Third information.
Optionally, first receiving module is that first xegregating unit provides and to described the specifically for receiving
The third information that two information securities are handled.
Optionally, first receiving module is specifically used for executing at least one of:
Receive the third information of deleting that treated of at least partly confidential information in second information;
The third information after receiving at least partly confidential information desensitization process in second information;
The third information after receiving at least partly confidential information encryption in second information;
Receive at least partly confidential information scrambling treated the third information in second information.
Optionally, the third information is that second information security is handled and data volume reduction treated information;
And/or
The third information is the information after the processing of raw video information security and visualization processing.
Optionally, optionally, the visualization processing includes: two-dimensional visualization processing and/or three-dimensional visualization processing.
Optionally, described first module, the specific diagnosis request for receiving the first private network and sending are obtained;Based on described
Diagnose the first information described in request.
Optionally, the diagnosis request carries the first code information of the target user;
The access modules are specifically used for being based on the first information and the first code information, access described first
Private network.
Optionally, described first module is obtained, specifically for receiving that the first private network broadcast or multicast is sent and taking
Diagnosis request with medical demand information;And works as and determine to be capable of providing the medical treatment for meeting the medical demand information
When service, the first information of first private network is obtained.
Optionally, described first module is obtained, specifically for obtaining the access address and first of first private network
Authentication information;
The access modules are specifically used for utilizing the access address, request access to first private network;It utilizes
First authentication information carries out the access authentication of first private network;
First receiving module provides after access authentication passes through specifically for reception first private network
The third information.
Fourth aspect, the embodiment of the present invention provide a kind of information processing unit, comprising:
Second receiving module, the access request sent for receiving the first information based on the first private network;
Second sending module is obtained for the second information of target user to be carried out safe handling based on the access request
To third information be sent to access end.
Optionally, second receiving module, specifically for receiving the second private network the based on the first private network
The access request that one information is sent;
Second sending module, specifically for being pacified the second information of target user based on the access request
Obtained third information is handled entirely is sent to second private network.
Optionally, described device further include:
First authentication module, the first authentication information for being carried using the access request, access authentication;
Second sending module, it is private to described second based on the access request if passing through for the access authentication
There is network to send the third information.
Optionally, described device further include:
Filtering module, for carrying out safety filtering to the access request;
Second sending module, if being specifically used for the access request by being based on the visit after the safety filtering
Ask that request carries out information processing to the target user and obtains the third information.
Optionally, second receiving module, specifically for the first xegregating unit receive second private network every
The access request sent from equipment;
Second sending module includes:
Submodule is inquired, for first xegregating unit based on the access request to first private network
Second information described in first storage equipment query;
Submodule is handled, obtains the third information for carrying out safe handling to second information;
Sending submodule, for being sent to the first xegregating unit described in second private network for the third information
It is sent to the second xegregating unit of second private network.
Optionally, the processing submodule, specifically for deleting at least partly confidential information in second information
The third information that treated;The third is obtained at least partly confidential information desensitization process in second information
Information;The third information is obtained at least partly confidential information encryption in second information;To second letter
The third information that breath scrambling is handled.
Optionally, second sending module, specifically for being pacified based on the access request to second information
The third information obtained after full processing and data volume reduction processing is sent to the access end;Based on the access request by mesh
The third information that the second information of mark user obtain after safe handling and visualization processing is sent to the access end.
Optionally, the data volume reduction processing, including at least one of:
The information for meeting condition of similarity is subjected to compression processing;
The valid data and invalid data in second information are distinguished, the invalid data is removed.
Optionally, the visualization processing, comprising:
According to visualization condition, visualisation parameters are determined;Based on the visualisation parameters, second information is carried out
Visualization processing obtains visual information.
Optionally, described according to visualization condition, determine visualisation parameters, including at least one of:
According to clear condition is visualized, the visualisation parameters are determined;
According to visualization time conditions, the visualisation parameters are determined.
Optionally, the visualisation parameters include at least one of: visualization sampling parameter;Visualization Model parameter;
Visualize time parameter.
Optionally, the visualization processing includes: two-dimensional visualization processing and/or three-dimensional visualization processing.
Optionally, described device further include:
Reporting module, what the first xegregating unit for the first private network received first private network first deposits
What storage equipment was sent reports request;Wherein, described that request is reported to include at least: first code information corresponding with target user;
Request module is stored, described report is based on for the first xegregating unit and requests to send diagnosis request, wherein is described
Diagnosis request includes at least the first code information of the target user.
Optionally, described to report request further include: medical timing information and/or medical demand information.The third information
It is second information security for third information described in second information security processing and three-dimensional visualization treated information
Processing and three-dimensional visualization treated information
5th aspect, this kind of electronic equipment characterized by comprising
Transceiver, for receiving and sending messages;
Memory, for storing information;
Processor is connect with the transceiver and memory respectively, for the calculating by executing the memory storage
Machine program, controls the information storage of the information transmit-receive and the memory of the transceiver, and realizes aforementioned one or more skills
The information processing method that art scheme provides.
6th aspect, the embodiment of the present invention provide a kind of computer storage medium, and the computer storage medium is stored with
Executable instruction;
After the computer executable instructions are performed, the letter that aforementioned one or more technical solutions provide can be realized
Cease processing method.
7th aspect, the embodiment of the present invention provide a kind of program product, and described program product, which includes that computer is executable, to be referred to
It enables;After the computer executable instructions are performed, the information processing that aforementioned one or more technical solutions provide can be realized
Method.
In technical solution provided in an embodiment of the present invention, in a first aspect, if the second private network needs to access some mesh
When marking the information of object, it is privately owned that the second original information of target user will not be transmitted directly to second by the first private network
Network, transmission is the third information obtained by the second information of safe handling, avoids the second original information directly in public affairs
The security risk that transmission causes the directly exposure of the second information to generate in common network network, improves information security.Second aspect, the
The first information that two private networks need to obtain the first private network for storing the target object could be accessed based on the first information
First private network causes to deposit in this way, the first information for avoiding the first private network discloses in the entire network for a long time
The first information for containing the first private network of target user's information arbitrarily exposes caused safety issue.The third aspect, this
Information in inventive embodiments is stored in multiple private networks, is the distributed storage of information, relative to centralization
On the one hand storage takes full advantage of distributed resource, reduce the carrying cost of centralised storage investment;It on the other hand can also be with
The information centralization for reducing centralised storage reveals caused safety issue, improves information security air bag.Four directions
Face, due between the first private network and terminal device interaction be the third information obtained by processing, without in order to ensure
Safety establishes the dedicated tunnel etc. between the first private network and terminal device, simplifies transmission, reduces transmission and is disappeared
The Internet resources of consumption reduce the cost of transmission;
Detailed description of the invention
Figure 1A is the flow diagram of the first information processing method provided in an embodiment of the present invention;
Figure 1B is the flow diagram of second of information processing method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of Telemedicine System provided in an embodiment of the present invention;
Fig. 3 is the structural schematic diagram of the first private network provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of second of private network provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of the third private network provided in an embodiment of the present invention;
Fig. 6 A is the flow diagram of the third information processing method provided in an embodiment of the present invention;
Fig. 6 B is the flow diagram of the 4th kind of information processing method provided in an embodiment of the present invention
Fig. 7 is the flow diagram of the 5th kind of information processing method provided in an embodiment of the present invention;
Fig. 8 is the structural schematic diagram of the first information processing unit provided in an embodiment of the present invention;
Fig. 9 is the structural schematic diagram of second of information processing unit provided in an embodiment of the present invention;
Figure 10 is the structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
Technical solution of the present invention is further described in detail with reference to the accompanying drawings and specific embodiments of the specification.
As shown in Figure 1A, the present embodiment provides a kind of information processing methods, comprising:
Step S110: the first information of the first private network is obtained, wherein the first privately owned net described in the first private network
Network is the second information for being stored with target user;
Step S120: being based on the first information, accesses first private network;
Step S130: the third information that first private network provides is received, wherein the third information is described
Second information security treated information.
In some implementations, this method is applied to access end, which can be a private network, or one
A access terminal for being directly connected to public network.For example, doctor is set using families such as mobile phone, tablet computer or PCs
The standby first information that first private network is directly accessed by public network.For example, access terminal is directly assisted by network
The access address for discussing various first private networks such as (Internet Protocol, IP) address, domain name, directly passes through public network
Network accesses first private network, for example, the first xegregating unit of the first private network of access, which can
Include: the front end processor of the first private network, but is not limited to front end processor.
In further embodiments, doctor can may access the first privately owned net by the private network of hospital to the greatest extent
Network, for example, as shown in Figure 1B, the step S110 may include step S111;The step S111 can include: the second privately owned net
Network obtains the first information of the first private network, wherein the first private network described in the first private network is to be stored with target use
Second information at family;
Step S120: being based on the first information, accesses first private network;
Step S130: the third information that first private network provides is received, wherein the third information is described
Second information security treated information.
Information processing method provided in this embodiment can be for applied to the method in terminal device, which can be
The equipment that the doctor of diagnosis is held is participated in, which can be fixed terminal, be also possible to mobile terminal.
The target private network can be various types of private networks, and the private network is one and is relatively isolated
Network is established to have and be isolated, for example, being provided with xegregating unit or isolation usually between public network (for example, internet)
Interface, it is necessary to which the network can be just accessed by the isolation.
In the present embodiment, a private network can be the internal network or multiple geographic distances of a hospital
The internal network of similar multiple hospitals.Fig. 2 is a kind of medical system provided in an embodiment of the present invention, comprising:
The multiple private networks connected by public network, can be used for the information of distributed storage user.
First private network may include one or more equipment in embodiments of the present invention, the first privately owned net
Network may include following several structures:
The first:
As shown in figure 3, the private network is at least can include:
Xegregating unit, the xegregating unit is for being isolated the privately owned net inside of target and public network.Public network herein can
For networks such as network protocol (Internet Protocol, IP) networks.The xegregating unit can include: first kind interface, connection
The internal unit of first private network;Second class interface, connect with public network;In this example, the xegregating unit will also
For the information processing to the second information;In this example, the xegregating unit may include front end processor;
Equipment is stored, the storage equipment can be the equipment of storage second information.In this way, all enter first
The information needs that information in private network requires to enter by the xegregating unit, and store equipment are sent out and also need
Pass through xegregating unit.
In some embodiments, the private network further includes terminal device, which can connect in privately owned net
It inside network, is connect respectively with xegregating unit and storage equipment, is displayed for information needed for doctor carries out remote diagnosis,
Tele-medicine is carried out for doctor.
Second:
As shown in figure 4, the private network can include:
Xegregating unit, the xegregating unit is for being isolated the privately owned net inside of target and public network.Public network herein can
For networks such as network protocol (Internet Protocol, IP) networks.The xegregating unit can include: first kind interface, connection
The internal unit of first private network;Second class interface, connect with public network;Herein, the xegregating unit can equally wrap
It includes: front end processor;
Equipment is stored, second information is stored;
Processing equipment is connect with the storage equipment and the xegregating unit respectively, for carrying out to second information
Information processing, directly will treated that second information is transferred to the xegregating unit, in this way, xegregating unit is just completely not
The second highly sensitive information can be touched, so as to avoid the medium acquisition institute of caching of illegal account from the xegregating unit
State the second information.
Likewise, in some embodiments, the private network further includes terminal device, which be can connect
It inside private network, is connect respectively with xegregating unit and storage equipment, is displayed for doctor and carries out needed for remote diagnosis
Information, for doctor carry out tele-medicine.
The third:
As shown in figure 5, the private networks such as described first private network can include:
Trust domain is stored with second information in the trust domain;After second information is handled in the trust domain,
It is transferred to non-trusted domain;
Non-trusted domain, is connected to public network, and the third information is transferred to public network.
The first private network may include one or more equipment in the present embodiment, and trust domain and non-trusted domain can portions
Administration on different devices, can also be deployed in the same equipment.
Optionally, the trust domain, for storing the second information;Non-trusted domain only stores and receives and dispatches for third information.
In the information processing system provided in the present embodiment can include: multiple private networks, these private networks can be with
The second information of distributed storage avoids the storage pressure of centralised storage greatly and concentrates the problem of revealing.
Second private network can inquire access institute with local search or to other electronic equipments in step s 110
The first information of the first private network is stated, which can access for the second private network must needed for the first private network
Information is wanted, for example, the first information can include: the network protocol of first private network (Internet Protocol,
IP) the various marks such as address, domain-name information, tunnel label, virtual local area network tags.
Second information can include: identity information, physiological data, diagnostic message of local hospital of target user etc.
One of information is a variety of;The physiological data can be the physical condition of the characterization target user of various equipment acquisition
And/or the information of psychologic status, for example, the image informations such as electrocardiogram, nuclear magnetic resonance figures, may also include that the blood pressure data of detection
Equal text datas.Optionally, the visualization processing can include: can be to physiological data, after diagnostic message carries out semantic analysis
Privacy-sensitive information is filtered out, and is visually melted into the text presentation form that can not be replicated, can be drawn in this way to avoid bootlegging
The information leakage problem of hair.
Received third information is data after safe handling in the step S130 in the present embodiment, is passed through
Data after safe handling reduce safety issue caused by the second information is directly transmitted in the public network.
Before safe handling, second information may include the confidential information of target user;The confidential information can
It include: privacy information, sensitive information, but the third information obtained after safe handling may not include the confidential information,
It either only include: the information carried out to confidential information after encrypting and/or scrambling;So as to avoid the guarantor of target user
Confidential information is directly exposed to the problem of public network, improves the secrecy such as privacy information and/or the sensitive information of target user letter
The safety of breath.
The privacy information can are as follows: target user is unwilling to be exposed to other people personal information, for example, identity information.
The sensitive information can are as follows: the relevant various information of the right of privacy that target user enjoys in accordance with the law, for example, described quick
Sense information may also include that can by the sensitive information by piecing together or simple conversion process obtains the privacy and believes
The information of breath.
In the present embodiment, second information can include: the raw information of the target user, which can
It include: each image information shot when target user is medical, such as CT scan (Computed
Tomography, CT) image, nuclear magnetic resonance image, auscultation information, the description information of local doctor's offer etc..In short, described
Second information is distinguished according to information type, may include: image information, text information, even one of audio-frequency information or more
Kind.
Optionally, second private network includes: the second xegregating unit and the second storage equipment;Second storage equipment
For storing the various information of user;The second storage equipment and public network has been isolated in second xegregating unit;It is described
First private network includes: the first xegregating unit and the first storage equipment;Wherein, second information is stored in described first
Store equipment;The first storage equipment and public network has been isolated in first xegregating unit.The second xegregating unit herein
It can be xegregating unit shown in Fig. 3 to Fig. 4, the second storage equipment and the first storage equipment with the first xegregating unit
The storage equipment for being Fig. 3 into Fig. 4.The xegregating unit can be various types of front end processors.
The step S120 can include: the access ends such as the second xegregating unit of second private network or access terminal
Based on the first information, the first xegregating unit of first private network is accessed;
The step S130 can include: second xegregating unit receives the third letter that first xegregating unit provides
Breath is alternatively, access terminal receives the third information that the first xegregating unit provides
In the present embodiment, the second private network or access terminal substantially only have accessed the first xegregating unit, and non-straight
Receiving ask in the first private network first storage equipment, in this way, reduce include confidential information the second information it is directly sudden and violent
The problem of revealing to public network, reducing information leakage improves the safety of the second information.
In some embodiments, the step S130 can include: receive that first xegregating unit provides and to described
The third information that second information security is handled.
Private network allows the xegregating unit of another private network to read target user's in embodiments of the present invention
Third information, rather than be that the equipment that any one is located in public network can read third information, to improve again
The information security of target user.
Optionally, the step S130 may include at least one of:
Receive the third information of deleting that treated of at least partly confidential information in second information;
The third information after receiving at least partly confidential information desensitization process in second information;
The third information after receiving at least partly confidential information encryption in second information;
Receive at least partly confidential information scrambling treated the third information in second information.
The desensitization process includes: at least becoming to the confidential information in the second information according to default desensitization rule
Shape processing, in this way, by the third information obtained after desensitization process, if being not based on desensitization rule carries out solution deformation process,
The second original information can not be then obtained, so that reducing the second information is directly exposed to the information peace transmitted in public network
Full property problem.
In some embodiments, the desensitization process may include fuzzy replacement processing.The fuzzy replacement processing can wrap
It includes: the confidential information for being related to diagnosis in the second information being subjected to fuzzy replacement, on the one hand ensures not influence to diagnose, another party
Face avoids the direct leakage of precise information.For example, the professional accurate description of the accurate date of birth of target user, user;This
A little information will affect the diagnosis of doctor to a certain extent.It, can be by the accurate date of birth when carrying out the fuzzy replacement
Replace with the date of birth section where the date of birth;For example, target user A is born on October 20th, 1978, can replace
Are as follows: date of birth section is 1975 to 1980 years, is so achieved that fuzzy replacement.Another kind is the replacement to pursue an occupation.Example
Such as, a variety of occupations can be classified as class, accurate job description is replaced with fuzzy according to occupation and condition-inference correlation
Occupation type description.In this way, also can achieve the risk for reducing confidential information and being leaked by the fuzzy replacement of information, mention
Rise safety.
In further embodiments, the desensitization process may also include that equivalent replacement is handled.For example, in confidential information also
It may include the history information of target user (patient);It can also will be suffered from history information by equivalent replacement in the present embodiment
Person once disease replace with the pathology code name for being only capable of being identified by doctor;Or directly replace with medical history code name.Doctor can be with
The disease once suffered from is obtained by the inquiry of medical history code name, in this way, the third information after equivalent replacement is in public network
Middle inquiry, the user of non-medical or the illegal user that can not understand the corresponding history information of medical history code are can not to obtain
The script meaning of the information is obtained, to also achieve the purpose that the safety for promoting the second information.
The encryption can include: second information is encrypted using encryption key, obtains encrypted
Three information;For example, encrypting second information using asymmetric cryptographic key obtains the third information.
The confidential information delete processing include: delete the confidential informations such as privacy information and/or sensitive information or with diagnosis
Incoherent information;It is deleted by information and on the one hand avoids confidential information (the i.e. described privacy information and/or sensitive information)
On the other hand exposure reduces unnecessary data transmission, when being related to a large amount of pictorial informations for many primary diagnosis, pass through
Transmission delay can be greatly shortened by reducing data volume.
The scrambling processing can include: carry out information scrambling using scrambled code, the information after scrambling equally may include being promoted
The safety of information transmission, avoids information from being directly exposed in public network.
The third information that the step S130 is received in some embodiments can be to handle obtained letter by following
Breath:
Second information is carried out to delete processing removal nonessential information;The nonessential information can are as follows: condition-inference is unrelated
Information, removing obtained necessary information after nonessential information is the necessarily letter that will necessarily be used during condition-inference
Breath;For example, at least being deleted and the incoherent confidential information of diagnosis by deleting processing;
Desensitization process is carried out to the second information for delete processing;For example, at least believing the secrecy in the second information
Breath carries out desensitization process, can also carry out desensitization process to remaining all second information;
The second information after desensitization process is encrypted and/or scrambling is handled.
By deleting processing removal nonessential information, nonessential information can be removed, reduces the transmission of information content, simultaneously
The part confidential information unrelated with condition-inference can be removed by deleting processing, so that being equivalent to realizes safety for the first time
Processing.
Again by desensitization process, second of safe handling is carried out to confidential information relevant to condition-inference, realizes second
Secondary security improvement.
Finally by the mode of scrambling or encryption, realizes the third time safe handling to the data after desensitization, promoted again
The safety that confidential information relevant to diagnosis is transmitted in common transmission network.
Optionally, the step S130 can include:
Safe handling is carried out to second information and visualization processing obtains visual information, for example, by textual form
Diagnostic message removal confidential information after text information is converted to after visualization processing, the text reduced in transmission process is multiple
System, to promote the safety of information again.
In further embodiments, described that second information progress safe handling and visualization processing are obtained visually
Change information, it may include:
Herein, the raw video information is one kind of second information;For example, the raw video information can be
Dicom image information;By the jpg image information that can form jpg format after the visualization processing.By dicom image
Information converts jpg image information, on the one hand can reduce data volume, on the other hand can carry out data desensitization and isolation processing.
The visual information that raw video information progress visualization processing is obtained in the present embodiment, it may include following
At least one:
Processing is formatted to the raw video information, for example, the raw video information of the first format is converted
For the visual information of the second format, the first format is different from the second format, and the second format is suitable for privately owned in general second
It is shown on network;In further embodiments, by the first format to the conversion of the second format, do not reducing needed for diagnosis
Information content in the case where, can make visual information data volume be less than the raw video information data volume, such as
This, can also reduce the data volume that the first private network is sent to the second private network, reduce the dedicated of bandwidth;
The corresponding image information of multiple raw video information is subjected to Visual calculation processing etc., generates stereo-picture letter
Breath;Convenient to be watched on the second private network by rotating image viewing visual angle, such doctor does not have to switch image again
In the case of be just able to observe that the image of different perspectives, be built into after stereo image information, it is possible to reduce different original images
Between redundancy, can equally reduce and need the data volume transmitted;
By multiple raw video information architecture videos, construct video can according to the picture dependencies between two frame of front and back,
Data volume can equally be reduced.
Visualization processing can also be carried out to the raw video information in second information in some embodiments, it will
Two-dimensional image information is converted to three-dimensional image information and carries out visualization processing.
In short, the visualization processing includes: in embodiments of the present invention
Non-image information is subjected to visualization processing, is converted to image information;
And/or
Image information is subjected to visualization processing, is converted to the image information of different-format;
And/or
The image information of low-dimensional is carried out to high-dimensional visualization processing, is converted to high-dimensional image information, for example,
Two-dimensional image is converted into 3-D image.
Optionally, the visualization processing includes: two-dimensional visualization processing and/or three-dimensional visualization processing.
Two-dimensional visualization processing,
Optionally, the step S130 can include:
The third information is that second information security is handled and data volume reduction treated information.
I.e. described second information can be to have carried out the data after safe handling and data volume compression processing respectively.
The safe handling can include: at least confidential information above-mentioned deletes processing, at the desensitization of at least confidential information
One or more of reason, encryption, scrambling processing.
Data volume reduction processing in the present embodiment can be the processing again after safe handling, be also possible to
Data volume compression processing before safe handling.
The data volume compression processing can include:
The information for meeting condition of similarity carries out compression processing.Because meeting two or more letters of condition of similarity
Breath can greatly reduce data volume in the case where losing effective information by compression, to reduce the number for needing to transmit
According to amount, transmission delay is reduced.Especially for medical treatment, it is understood that there may be a large amount of pathological image information, pathological image herein can
For CT image information, nuclear magnetic resonance image information etc., pass through picture compression technology etc., it is possible to reduce the amount of redundancy of information, thus
Reduce data volume.In the present embodiment in order to realize maximum compression, it can be classified with advanced row information, condition of similarity will be met
Information be attributed to same class;Then the compression of classifying type is carried out, to the information of same type to reduce volume of transmitted data.Example
Such as, for nuclear magnetic resonance image, the different Brain slices images of the same target object may be had taken;The brain of close positions
Portion's sectioning image have significant portion be it is identical, can be by the classification of condition of similarity, so that similar multiple Brain slices images
An image collection is formed, image collection is compressed, so to obtain maximum compressibility, so that reduced overall be avoided to lead
The unconspicuous problem of data volume compression effectiveness of cause.
It is worth noting that, the information for meeting condition of similarity herein carries out compression processing, it may include: after safe handling
The compression processing for meeting condition of similarity of information, for example, judging difference after dicom image information is converted to jpg image
Whether jpg image meets condition of similarity, so that the one or more jpg image for meeting condition of similarity is subjected to compression processing, with
Reduce transmitted data amount.
There are many modes for judging whether to meet condition of similarity, several optional ways presented below:
By information matches, the information for selecting similarity greater than preset threshold is determined as meeting condition of similarity;
Meet the data model of condition of similarity by that can screen and carry out the judgement for meeting condition of similarity.
The data model can include: neural network model, vector machine model, Two Binomial Tree Model, regression model etc..Institute
State the disaggregated model that data model there can be after training judgement using sample data.In this way, applying these data moulds
When type, can directly using data to be judged as the input of data model, data model after processing, can automatically into
Row information meets the judgement of condition of similarity.
For example, classifying using data model to pathological image a large amount of in the second information, point of pathological image is obtained
Class label;Then the pathological image with same category label is belonged in the same image collection, to different image sets
Conjunction carries out compression of images respectively, to realize the reduction of data volume.
In some embodiments, the data volume compression processing may also include that
The valid data and invalid data in second information are distinguished, the invalid data is removed;The valid data
It include the data of information content;The invalid data includes at least the data without information content.
The valid data are the data for including information content, and invalid data includes at least the data without information content, typical
, the valid data can be the graph data for having pathology figure in pathological image;The invalid data can include: pathology figure
White space as in.
In some embodiments, the valid data can be the data that include medical information amount in medical information, described
Invalid data can be the data other than valid data described in medical information.The medical information amount is to provide diagnosis and treatment foundation
Information content.The medical information can are as follows: the diagnosis and treatment data etc. that the data of Medical Devices acquisition, local hospital provide, it may include:
Other data other than the personally identifiable information of the target object.
In some embodiments, the two ways of compression processing and invalid data can be combined,
Firstly, distinguishing the valid data and invalid data in second information, the invalid data is removed;It is described to have
Imitating data is the data for including information content;The invalid data includes at least the data without information content;
Secondly, the classification for meet condition of similarity to the second information after progress invalid data deletion is handled;
Finally, carrying out compression processing to the second information for sorting out processing, the data volume of the second information is deleted to realize
Processing.
Step 1: being based on image Segmentation Technology, pathological image is subjected to pre-segmentation, obtains the tissue in pathological image
Region, and then tissue regions are divided equally into the small figure of fixed size, such as 256*256 pixel size;Tissue regions herein
It can be one kind of valid data above-mentioned, the inorganization region in pathological image can be considered the invalid data;
Step 2: passing sequentially through the data model that we train above for the small figure of magnanimity that division obtains, obtain
Classification results, for example, two classification results (benign or malignant) or probability graph (benign or malignant probability);
Step 3: finally corresponding to the position of the small figure of magnanimity and their prediction results in original image, former disease can be obtained
The position for managing focal area in image, to realize the detection and segmentation of focal area in full slice pathological image;
Optionally, classify step 4: being based on condition of similarity to the small figure of segmentation, be then based on the result of classification into
Row compression.
In some embodiments, the method also includes:
The model parameter of data model based on transfer learning adjusts, for example, network parameter in compression neural network model
It is less, it in order to realize more accurate classification, needs to be finely adjusted network parameter, allow to effectively to pathological image
In the small figure of magnanimity that marks off classify.Herein, be primarily based on the training data obtained by the first step, train one it is complete
Whole deep neural network model (i.e. tutor's network).Optionally, tutor's network model can be all kinds of general, faces herein
To the network model of classification problem.Knowledge possessed in tutor's network and generalization ability are moved subsequently, based on transfer learning
It moves on in the neural network model of compression.Particularly, the class probability generated by complete depth neural network model is as soft
Target is further trained compression network, to realize the adjustment of network parameter, further increases compression network to disease
The precision that reason image is classified.
The network parameter can include: the input layer of neural network, the number of plies of hidden layer and output layer, different layers include
One or more of parameters such as number of nodes, the corresponding weight of node.
In some embodiments, after the third information is second information security processing and three-dimensional visualization processing
Information.
Likewise, the safe handling of the raw video information in the present embodiment and three-dimensional visualization processing may not have
Have it is fixed execute sequence, safe handling can be first carried out, execute three-dimensional visualization processing again, can also first carry out three-dimensional can
It is handled depending on change, then executes safe handling.
In some embodiments, the third information may be used also are as follows: three-dimensional after completing the three-dimensional visualization processing
Visual image carries out image rendering, acquisition clarity and the stronger equal better three-dimensional visualization image of bandwagon effects of stereovision.
Optionally, the step S110 can include:
Receive the diagnosis request of the first private network transmission;
Based on the first information described in the diagnosis request.
For example, directly carrying the first information in the diagnosis request in some embodiments;Therefore can include: from
The first information is extracted in the diagnosis request;In order to ensure information security, the first letter in diagnosis request is carried
Breath can be encryption information;For example, the first information, using private key encryption, the second private network is receiving diagnosis request
Later, the first information is obtained using diagnosis request described in public key decryptions.
In further embodiments, the diagnosis request carries the reference information of the first private network;In step S110
Middle the first letter for inquiring first private network in the local data base of the second private network according to the reference information
Breath.
In other embodiments, the diagnosis request carries the reference information of the first private network, and second is privately owned
After network extracts reference information, the first information is inquired into certain database.
In short, the first information described in the present embodiment may be based on the diagnosis request determination.
In further embodiments, the first information of first private network can also be to be obtained by other means
It takes.For example, the first private network wishes that the doctor of the second private network place hospital carries out remote diagnosis, the first privately owned net
The doctor of network can individually inform the first information of the second private network by way of phone or mail.Therefore the second privately owned net
Network is also possible to be from the received first information of man-machine interactive interface.
In some embodiments, the step S120 can include:
Utilize the first private network described in first code message reference corresponding with the target user.First privately owned net
It, can be based on the first code information carried in the second private network access request, in the first private after network receives access request
There is the second information of network internal searched targets user, to send the third information to the first private network.
Herein, first code information and it is indirect be target user personal information, for example, ID card No. or shield
According to personal information such as numbers, but a generation information.For example, the first code information can be identity-based card number and/
Or passport number carries out obtained Hash sequence information such as Hash processing etc..Certainly, the first code information can also be it
The first code information that his mode generates.
Optionally, the first code information includes at least one of: the object identification code of the target user, diagnosis
Code, medical treatment account.
First code information herein can be the inquiry foundation of the inquiry first information, and the first code information can
For the information for directly or indirectly referring to the target user.
The object identification code may be based on the code of target user's distribution, and the unused code of different users, which can
For the code of Telemedicine System distribution.
The diagnostic code may be based on this medical code generated, for example, according to the hospital of medical local hospital
Number and the diagnostic code of the sequence number generation in the hospital admission;
The medical treatment account may be used also are as follows: the general account that can be seen a doctor in Different hospital for different user distribution.
It is referred to above by the true identity information of generation information substitution target user, at least reduces identity letter
The disclosure risk for ceasing itself improves the information security of target user.
The first code information carrying is received by the second private network institute in diagnosis request, can also
It is transferred to the second private network by other means with the equipment of the first private network, for example, mail or individually transmission
's.
The diagnosis request for receiving the first private network and sending, comprising: receive that broadcast or multicast is sent and carry
The diagnosis request of medical demand information;The step S110 further include: meet the medical need when determining to be capable of providing
When asking the medical services of information, the first information of first private network is obtained.
Diagnosis request in the present embodiment is that broadcast transmission or multicast are sent.If diagnosis request is to carry broadcast address
It sends, then the diagnosis can be received by the private network that xegregating unit or non-trusted domain are connected to public network and asked
It asks.Diagnosis request in further embodiments is that multicast is sent, for example, the first private network is selected and several meets spy
Second private network of provisioning request is requested to these private network multicast diagnosis.It is diagnosed in short, being sent using broadcast or multicast
Request will have multiple private networks that can receive diagnosis request, receive the first Private Network after diagnosis request
Network can request remote diagnosis, can so provide the remote diagnosis for meeting target user's demand as soon as possible.
The medical demand information can be used for the information of the medical doctor of selection of proposition for target, for example, target user can
To clearly indicate expert consultation or professor's consultation of doctors, indicate the Hospital Grade (three-level for needing medical hospital, needs medical
First-class, three-level the second grade) etc. information, the time limit of practising medicine that can also indicate doctor, the learning experiences of doctor and paper publishing number, doctor
Raw success rate of operation etc. shows one of demand information of the medical demand at heart of target user and disease treatment demand or more
Kind.
Second private network may record the relevant information of different doctors, in this way, the second private network receives described examine
After disconnected request, the hospital and/or doctor for meeting target user's demand according to the medical demand information selection are remotely cured
It treats, to meet the long-range demand of target user, it is ensured that tele-medicine effect promotes the demand of target user.Therefore in this implementation
In example, only when can satisfy the medical demand information, first private network is accessed.
In some embodiments, the method also includes:
Receive the diagnosis revocation request of the first private network broadcast or multicast transmission;Diagnosis revocation request can occur with
Under at least one of several situations:
Detect the instruction that target user's indication diagnosis is recalled;
The diagnostic response for meeting the second private network of medical demand has been received, which can are as follows: participation is examined
The diagnosis that the second disconnected private network is specially replied is replied;Alternatively, being acquired for the third information of target user, then can recognize
To need to diagnose recalling for request.
Optionally, the step S110 may include at least one of:
Access address herein can include: domain name addresses, IP address, virtual local area network tags or tunnel label etc., it can
The address of the first private network is accessed, concretely may have access to the first private network xegregating unit or non-trusted domain
Address;
Obtain the access address and the first authentication information of first private network;Described first is private in the present embodiment
There is network that can also provide the first authentication information to the second private network, it is which may be dynamically generated or preparatory
The authentication information of access first private network of setting.
The first authentication information can be the second private network according to the authentication rules of medical remote system in some embodiments
Voluntarily determining information.
Optionally, the first authentication information of the acquisition can include:
Second private network is based on predetermined information according to authentication rules and generates first authentication information;For example, described
Two private networks are according to the access address of second xegregating unit (for example, IP address, media access control (Media
Access Control, MAC), domain name addresses, Local Area Network tag etc. wherein one or more) carry out the default places such as Hash processing
Reason, the first obtained processing result can be first authentication information.Second xegregating unit of the second private network carries should
First authentication information sends access request to the first private network;First xegregating unit of the first private network receives the visit
After asking request, the access address of the second xegregating unit is extracted from access request, the authentication rules is based on, to described
First access address carries out the default processing such as Hash processing, obtains second processing result;It compares at the first processing result and second
Reason is as a result, as two processing results are consistent, it is believed that the access authentication of the second private network passes through.
In further embodiments, first private network can also be from the carrying in the access request described
First authorization message is extracted in one authorization message field, it is reverse to solve according to the reverse process rule of the authentication rules
First authorization message is analysed, so that the prime information (for example, access address) before restoring positive processing rule process is if access
The address carried in address and access request is consistent, then is regarded as that the authentication is passed.
The authentication rules can be the rule being stored in advance in each private network, be also possible to private network negotiation
Determining rule.
In the present embodiment, the first authentication information is that access address and authentication rules based on the second private network generate
, without introducing other more information, without there are other information exchanges in authentication process, simplicity is realized to have
The characteristics of.
The step S120 can include: utilize the access address, request access to first private network;Using institute
State the access authentication that the first authentication information carries out first private network;The step S130 can include: receive described first
The third information that private network provides after access authentication passes through.
Second private network is based on access address and sends access request, and is accessed based on first authentication information
Authentication.First private network only can just will be considered that the second private network is that safe access is set after access authentication passes through
It is standby, it can just allow the first private network access xegregating unit and/or non-trusted domain.
Optionally, first authentication information includes at least one of:
The access information of first private network dynamic setting, the access information include access account and access password;Institute
It states access information to dynamically distribute and be recorded in the first private network, the access information of dynamic allocation is also set up
There is effective time limit, cancels automatically if being more than effective time limit, be no longer able to the access authentication by the first private network;
The authorization message of the target user;
Participate in the identity information of the doctor of diagnosis;
The facility information of second xegregating unit of the second private network.
Doctor with telemedicine capability may need into the second private network the money for applying participating in tele-medicine
Lattice, and record oneself progress tele-medicine and used the information such as equipment and/or account.Therefore the equipment of the second private network
Information can include: IP address used in the second private network, international mobile subscriber identity (International
Mobile Subscriber Identity, IMSI), cell-phone number or the account of binding etc..
The identity information of the doctor can include: the operation number of doctor, the information of place hospital and department, doctor
Identity document information etc..
After if the first private network indicates that the second private network indicates the instruction for participating in diagnosing by other means, meeting
The facility information of second xegregating unit and/or the identity information of doctor etc. are informed into the first private network, the first private network meeting
The facility information and/or the identity information of doctor are stored, in this way, when the second private network accesses first private network,
Can access to the access request of the second private network authentication.For example, the first xegregating unit of first private network
Or non-trusted domain can correspond to storage first code information and first authentication information, receive and first code information pair
When the access request answered, it will generate and be accessed authentication using first authentication information.
In further embodiments, patient is also an option that the doctor of remote visiting, if patient selects doctor, Huan Zheke
Authorization message, the authorization message can be provided to the doctor can include: the authorizations letter such as authorization sequence for indicating to generate based on patient
Breath.
The authorization message is storable in the first private network, patient can by the communication equipments such as mobile phone from other way
Diameter is transferred to doctor, so that doctor obtains the authorization message of target user.
In short, the first authorization message can be privately owned to participate in the second private network access first of diagnosis in the present embodiment
The various forms of authentication informations of network can promote the data stored in the first private network by access authentication again
Safety.
Optionally, the step S130 can include:
Using the first code information and medical timing information, the third letter is received from first private network
Breath.
The medical timing information can include: the temporal information of target user's request remote diagnosis;Target user is in local
Hospital acquires the acquisition time information of various information etc. of remote visiting, and the user shown requests distance medical diagnosis
Temporal information or order information.For example, a user has carried out the information collection of multiple remote diagnosis, information collection in hospital A
Order can be the medical timing information one kind, the specific time of information collection be also possible to the medical timing information
One kind.
The first code information can may also be combined with medical timing information in some embodiments, accurately to look into
Look for the third information of target user.For example, the not homogeneous that a first code information is used in the same target user is medical,
But the target user may carry out the medical of not homogeneous in different hospitals, therefore in the present embodiment in order to accurately search,
It can be combined with medical timing information, accurately to search the third information.
In some embodiments, the first code information can be the medical flowing water of hospital where the first private network
Sequence number;The generation of the flowing water sequence number all has no to be associated with confidential informations such as the identity informations of target user, so can be most
The confidential information of the protection target user of limits.
As shown in Figure 6A, the present embodiment provides a kind of information processing methods, comprising:
Step S210: the access request that the first information based on the first private network is sent is received;
Step S220: the second information of target user is carried out by the third that safe handling obtains based on the access request
Information is sent to access end.
Optionally, as shown in Figure 6B, information processing method described in the present embodiment is concretely:
Receive the access request that the second private network is sent based on the first information of the first private network;
The second information of target user the third information that safe handling obtains is carried out based on the access request to be sent to
Second private network.
The access end can be the access terminal for being directly connected to public network in the present embodiment, be also possible to another
A private network (i.e. described second private network).
Information processing method provided in this embodiment can be the method applied to the first private network, specifically can such as apply
The method in xegregating unit and/or non-trusted domain in the first private network.
It receives the second private network or accesses the visit that the access ends such as terminal are sent based on the first information of the first private network
Ask request.
It can will good treated that third information is sent to the second private network after receiving access request.Herein
The associated description of second information and third information may refer to previous embodiment, just be not repeated herein.
Optionally, the method also includes: using the access request carry the first authentication information, access mirror
Power;The step S220 can include: if the access authentication passes through, be based on the access request to second private network
Send the third information.
The access request to second private network is needed to authenticate in the present embodiment, only the authentication is passed
In the case where, just allow the access of second private network and the first private network is allowed to provide to the second private network
Third information, to ensure the information security of target user.
Optionally, the method also includes:
Safety filtering is carried out to the access request;
It is described that the second information of target user is carried out by the third information hair that safe handling obtains based on the access request
Give access end, comprising:
If after the access request passes through the safety filtering, being carried out based on the access request to the target user
Information processing obtains the third information.
In the present embodiment before allowing the second private network to access the first private network, the first private network needs
Carry out safety filtering;For example, carrying out safety filtering by firewall.When second private network accesses the first private network, it can send out
Access request is sent, IP address, the uniform resource address (Uniform of the second private network are carried in the access request
Resource Locator, URL), the 4th information such as medical account of the second private network operation.
It in some embodiments can be by being provided with the matching of the white list of secured account numbers, if the access request provides
The 4th information be located in white list, then allow this access, otherwise filter the access request or by next step verifying determine
Whether its access is allowed.
In further embodiments, the first xegregating unit of the first private network or non-trusted domain are not provided only with white name
It is single, it is additionally provided with blacklist;If the 4th information is located in the blacklist for forbidding access, firmly refuse this access, even if should
Under access address and all correct situation of the first authentication information that access request provides, its access is not allowed yet, to ensure safety
Property.
In further embodiments, if the 4th information had both been not in white list or had been not in blacklist,
It needs by further verifying process, whether the access request for verifying second private network needs to be filtered.For example, one
Account used in a newly-increased doctor for participating in tele-medicine, in the existing blacklist of the first private network, white list not
On the books, then the first private network, which needs to send other common platforms such as database for the 4th information, verifies its legitimacy,
Only after its legitimacy is by verifying, allow this access, and institute is added to after being verified certain number
It states in white list.
Be filtered above by blacklist, white list be only safety filtering a kind of mode.
In some embodiments, the method also includes:
Judge that the access request disposably requests access to the number of related target user, if disposably requesting access to
Target user number be more than predetermined number, it is believed that a possibility that there is information thefts, filter the access request or
Subsequent authentication is needed to determine whether its access.
In short, the safety filtering in the present embodiment can include:
In conjunction with the number for the target user that the visitation frequency of the second private network, access are related to;Access the user institute being related to
One or more of 5th information such as medical department, carries out the safety filtering, to avoid information leakage, promotes information
Safety.
Optionally, the step S210 can include: the first xegregating unit receives the second isolation of second private network
The access request that equipment is sent;The step S220 can include: first xegregating unit is based on the access request described in
Second information described in first storage equipment query of the first private network;Safe handling is carried out to second information and obtains institute
State third information;It is described to be sent to the first xegregating unit described in second private network third information is sent to institute
State the second xegregating unit of the second private network.
In the present embodiment, the xegregating unit can based on access request inquiry storage equipment, and by xegregating unit or
Reason equipment etc. carries out safe handling to the second information and obtains the third information, after xegregating unit will carry out safe handling
Third information is sent to the second private network.
Optionally, the step S220 can include:
To the third information of deleting that treated of at least partly confidential information in second information;To described
The third information after at least partly confidential information desensitization process in two information;To at least portion in second information
The third information after code insurance confidential information encryption;At least partly confidential information scrambling processing to second information
The third information afterwards.
In some embodiments, the step S220 can include:
At least partly confidential information third information of deleting that treated is received in second information, at least to delete
Except the nonessential information in confidential information, the first safe handling to the second information is realized;
The third information is obtained to the second information desensitization process after deleting, at least in necessary information
Confidential information carries out deformation process, for example, realizing second of safe place of the second information by fuzzy substitution or equivalent substitute
Reason;
Encryption is carried out to the second information after desensitization and/or scrambling handles to obtain third information, at least avoids the second information
It is directly exposed in public network and transmits, realize the third time safe handling of the second information.
In some embodiments, the step S220 can include: second information is carried out based on the access request
The third information obtained after safe handling and data volume reduction processing is sent to the access end.
The data volume compression processing in the present embodiment may refer to previous embodiment, just be not repeated herein.
For example, the data volume reduction processing, including at least one of:
The information for meeting condition of similarity is subjected to compression processing;
The valid data and invalid data in second information are distinguished, the invalid data is removed;The valid data
For the data for including information content;The invalid data includes at least the data without information content.
By data volume compression processing, the data volume for needing to transmit can be greatly reduced, reduces bandwidth, promotes transmission
Efficiency.
For example, can use the judgement of the progress condition of similarity of Similarity matching, it also can use data model and divided
Class, the data model can be neural network model etc..
In some embodiments, the valid data or invalid data in the second information can be also distinguished, are gone by data separation
Except invalid data, the removal of unnecessary data is reduced again.
In some embodiments, the invalid data and confidential information delete the unnecessary data deleted in processing
Processing is deleted to be considered as, in order to simplify processing, invalid data collection confidential information herein deletes the unnecessary data in processing
It deletes, realization can be handled by one or many identical delete, and do not have to carry out in two times.
In some embodiments, the step S220 can include: believed based on the access request by the second of target user
The third information that breath obtain after safe handling and visualization processing is sent to the access end.
In the present embodiment, the raw video information in the second information can be subjected to three-dimensional visualization processing, obtains three-dimensional
Stereo-picture, meet the 3-D image of doctor checks demand.
Optionally, the visualization processing includes: two-dimensional visualization processing and/or three-dimensional visualization processing.
Optionally, the visualization processing, comprising:
According to visualization condition, visualisation parameters are determined;
Based on the visualisation parameters, visualization processing is carried out to second information and obtains visual information.
Visualisation parameters can be determined according to visualization condition in the present embodiment, visualization condition difference is equivalent to can
Requirement depending on changing is different, needs effect of visualization to be achieved different, then the visualisation parameters that may be used at this time are different.
It is described according to visualization condition, determine visualisation parameters, including at least one of:
According to clear condition is visualized, the visualisation parameters are determined;
According to visualization time conditions, the visualisation parameters are determined.
The clear condition of visualization can at least define the minimum clear of the visual image of visualization processing formation
Degree;
The visualization time conditions can at least define the maximum allowable duration of visualization processing.
Therefore in the present embodiment when being visualized, need to determine visual parameter according to visualization condition, this
The parameter at place, it may include: one or more of visualization sampling parameter, Visualization Model parameter and visualization time parameter
It is a.
The visualization sampling parameter can include:
Sample frequency;
Sampling number;
Sample mode.
For example, may include at least one of for the demanding visualization condition of clarity:
The case where for original clarity lower than the clarity that visualization condition requires, then sample mode can use upper
Sampling;Increase data point number by up-sampling;
The case where being higher than the clarity that visualization condition requires for original clarity, then sample mode can be down-sampling;
Down-sampling herein again can be referred to as down-sampled.Sample mode is down-sampling, then reduces data point number by down-sampling,
But the clarity formed after the sample frequency of down-sampling, it cannot be below the clarity of visualization requirements.
Sample frequency can directly be determined according to the clarity that visualization condition requires.The clarity can pass through
Image resolution ratio quantifies to embody.
Sampling number be worth be sampled point number, and sample frequency can be the sampling number in unit area.
The Visualization Model parameter can include:
The model identification of different Visualization Models;Time needed for different Visualization Models carries out visualization processing is not
The effect of visualization that calculation amount that is same, being related to is different, obtains is different;
In this way, the condition that can be required according to visualization condition, selects matched Visualization Model.
Visualization Model parameter herein may also include that the model intrinsic parameter in Visualization Model in addition to model identification
Value, for example, neural network interior joint number, weight of node etc..
The visualisation parameters may also include that visualization time parameter;
The visualization time parameter can include: visualize the calculating time span of permission;In this way, being visualized again
It, can be according to Visualization Model etc. of visualization the consumed duration of time parameter in the calculating time span of permission when processing.
In some embodiments, the method also includes:
The visualization condition is determined, for example, according to current network conditions, current data volume to be transmitted and user
Instruction, determine the visualization condition.If current network conditions are poor, for example, transmission bandwidth is small, can reduction appropriate can
Clarity depending on changing image equally appropriate can reduce the clear of visual image for example, current data volume to be transmitted is big
Clear degree can suitably promote the clarity of visual image for another example needing more accurate diagnosis and treatment.
The instruction of the user can include: the second private network and/or the received user's instruction of the first private network, it should
User's instruction can input the visualization condition by modes such as dialog boxes.For example, doctor thinks currently not have to especially
The image of high clarity can realize Precise Diagnosis, in order to accelerate to transmit, can want in reduction visualization condition appropriate
The clarity asked.
For example, under the premise of guaranteeing medical image visual image effect as far as possible, can according to the demand of aspect of performance from
The suitable visualisation parameters of the calculating of adaptation simultaneously complete corresponding visualization tasks.Such as: in the three-dimensional visible of medical image
Change in calculating process, needs to carry out discrete sampling and calculating to medical image data, wherein the height to data sampling frequency is straight
Connecing influences picture quality and required calculating time, when needing relatively good picture quality, needs to increase sample rate progress
It calculates, three-dimensional visualization is longer the time required to calculating at this time;And when needing to meet the limitation of limited calculating time, Ke Yixuan
The limitation for reducing the certain picture quality of sample rate sacrifice to ensure to calculate the time is selected, smooth interactive experience requirement is met.Again
Such as in the case where more extreme, in order to guarantee to complete three-dimensional visualization calculating task within the limited time, it can adopt
Optimize computing cost with the illumination model of relative simplicity, reduces Visual calculation time overhead.
Compression of images is carried out for the result images that three-dimensional visualization comes out, to save the bandwidth demand of network transmission, In
It, can be according to the demand of aspect of performance, adaptive change compression algorithm strategy and pressure in the case where not causing heavy compression distortion
Contracting ratio and other relevant compression parameters, in the hope of reaching the double optimization of compression image size and compression time.Citing comes
It says, when carrying out compression of images, the more conventional compression algorithm for having JPEG or JPEG2000 etc..General compression algorithm has
Comparing crucial parameter setting is compression ratio, such as 60%, indicates 40% file size compression of images to original image,
The time of network transmission can be greatly reduced in this way;But compressed image loses genuine problem, the higher mistake of compression ratio at this time
It is very more serious, while the time that compression ratio more high pressure compression algorithm itself executes is also longer, systematic entirety energy and different at this time
It is fixed optimal.Therefore, how suitable compression algorithm is chosen according to practical application scene, suitable compression ratio realizes globality
The optimization of energy is then most important.The dynamic compression algorithm that changes (can choose different compressions for certain limiting cases to calculate
Method), dynamically change compression ratio, or be directed to the preset compression kernel function of certain specific type image selections, it is whole to realize
The optimization of body performance and effect.In specific implementation, we compression algorithm performance parameter can be stored in advance, such as
The image of 512*512 size, using 2000 compression algorithm of JPEG, using different compression ratios, finally obtained result images
The time overhead of size and compression algorithm is how many, and image fault degree is how many so that it is convenient to which subsequent basis is specific
Situation dynamic adjusts and selects.
In view of the use and network environment of various complexity, the calculating analytic ability and network transmission of the second private network
Bandwidth performance can equally play vital influence to final user experience.The method can also record in real time simultaneously
The case where calculating the second private network parsing load and transmission network, for example the time overhead that equipment is parsed and shown is interrupted,
Actual transmission bandwidth, the key message of network delay situation etc., and the information is sent back into server end to carry out next mould
The processing of block.For example: the data volume for the image message that record is issued from the first private network every time and sending time,
It can parse message acquisition picture material at the second private network and carry out the second private network and show, to each subdivided step
The message for recording the corresponding time is returned to server end again by the second private network after recording the time.Believed based on these several times
Breath can calculate the second private network parsing particular size image message and show the time of image, the network transmission image
Time used (real network transmission bandwidth can be evaluated whether with this) of message etc..By a certain amount of Continuous plus and adopt
Sample can be close to assessment real network delay situation in real time.
Performance requirement and medicine after the network-related data of calculating, according to tele-medicine smoothness interactive experience
The requirement of image visual image quality dynamically calculates optimal three-dimensional visualization rendering parameter and compression of images parameter, and
It is applied in the middle of medical image data visualization and image Compression next time.For example, when encountering network
Condition is deteriorated suddenly, when being delayed serious, can by reduce sample frequency ensure meet diagnosis clarity in the case where,
Reduction propagation delay time as far as possible.
Picture quality is mainly by two aspects: first is that the rendering parameter of three-dimensional visualization, second is that the compression of compression of images is calculated
Method and compression ratio parameter.Therefore when network delay becomes serious suddenly, visualization is reduced based on the adaptive realization of the module
Sample frequency simplifies illumination model parameter, promotes image compression rate, uses compression kernel function etc. one or several faster instead and arranges
Apply to reduce the time overhead of Visual calculation and compression of images, on the other hand when compression of images it is smaller after, also indirectly may be used
To reduce the time of network transmission and parsing and the time overhead that shows of image of message;And after network environment improves, it should
Module dynamically can gradually restore original parameter and configuration again, realize relatively good picture quality and display effect.Finally, intelligence
Being adjustable may be implemented under the second different private network performances and network environment conditions, can accomplish smooth always and scheme
As the long-range three-dimensional diagosis of quality optimization and diagnosis experience.
Optionally, step S220 can include: the xegregating unit provides after carrying out information deletion to raw video information
Visual information.
Raw video information visuallization processing herein, it may include: image format conversion, the conversion of file type, number
According at least one of amount compression.Visual information after visualization processing is can be in various the second general privately owned nets
It is watched on network, for example, can include directly benefit on terminal device in the second private network by mobile phone or tablet computer etc.
It is identified with general image software, and does not have to the special-purpose software of installation medical field to identify.On the other hand, visual to turn
The maintenance for needing to participate in the information of diagnosis and treatment is necessary to ensure that during changing, it is ensured that medical accuracy.
Optionally, the method also includes:
The first storage equipment that first xegregating unit of the first private network receives first private network sends upper
It submits a report asking for and asks;Wherein, described that request is reported to include at least: first code information corresponding with target user;
First xegregating unit is based on described report and requests to send diagnosis request, wherein the diagnosis request is including at least institute
State the first code information of target user.
What the xegregating unit can receive that storage equipment sends in the present embodiment reports request, reports request at this
In carry the first code information, in this way, database can receive correspond to it is described report the storage of request to request, and
The various information such as the corresponding access address for storing the first code information and the xegregating unit are seen, follow-up data library is facilitated
The first information is provided for the second private network.
In some embodiments, described to report request further include: medical timing information and/or medical demand information.Such as
This, can equally carry the medical timing information in diagnosis request and/or medical demand information be sent to public network or
Specific second private network.
The medical timing information can be used for being provided commonly for the second private network inquiry institute with the first code information
The third information of target user is stated, for example, the second private network carries the medical timing information in access request, in this way,
First private network is known that needs return to sub second waited for going to a doctor of which secondary film making of target user to the second private network
Information and/or third information.
The medical demand information can be used for the information of the medical doctor of selection of proposition for target, for example, target user can
To clearly indicate expert consultation or professor's consultation of doctors, indicate the Hospital Grade (three-level for needing medical hospital, needs medical
First-class, three-level the second grade) etc. information, the time limit of practising medicine that can also indicate doctor, the learning experiences of doctor and paper publishing number, doctor
Raw success rate of operation etc. shows one of demand information of the medical demand at heart of target user and disease treatment demand or more
Kind.
The relevant information for having Different hospital, different doctors may be recorded in each private network, in this way, database receives institute
After stating storage request, the hospital of target user's demand is met according to the medical demand information selection and/or doctor carries out far
Journey medical treatment, to meet the long-range demand of target user, it is ensured that tele-medicine effect promotes the demand of target user.
As shown in fig. 7, the embodiment of the present invention provides a kind of information processing method includes:
The raw information of step S1: private network A storage equipment storage target user simultaneously obtains first code information,
The raw information can include: identity information, physiological data, diagnosis and treatment data of local hospital doctor etc.;The raw information and
The first code information can be the composition of aforementioned second information;For example, according to the of predetermined data-structure storage target user
Two information;
Step S2: safe handling is carried out to the raw information, generates and stores security information;
Step S3: being generated based on first code information and diagnoses request to broadcast or multicast;Diagnosis request includes at least
First code information and/or the first information;
Step S4: private network B sends access request to private network A based on diagnosis request, which can carry
The first code information;
Step S5: the information for carrying out the target user of safe handling is obtained from the xegregating unit of private network A.
As shown in figure 8, the present embodiment provides a kind of information processing units, comprising:
First obtains module 110, the first information of the first private network is obtained for the second private network, wherein first
First private network described in private network is the second information for being stored with target user;
Access modules 120 access first private network for being based on the first information;
First receiving module 130, the third information provided for receiving first private network, wherein the third
Information is second information security treated information.
The first acquisition module 110, access modules 120 and the first receiving module 130 can be program module, processed
Device can be realized remote diagnosis after executing.
Optionally, the access modules 120 are based on institute specifically for the second xegregating unit of second private network
The first information is stated, the first xegregating unit of first private network is accessed;;First receiving module 130, is specifically used for
Second xegregating unit receives the third information that first xegregating unit provides.
Optionally, first receiving module 130 is that first xegregating unit provides and to institute specifically for receiving
State the third information that the second information security is handled.
Optionally, first receiving module 130 is specifically used for executing at least one of: receiving second information
In at least partly confidential information third information of deleting that treated;Receive at least confidential information in second information
The third information that desensitization process obtains;It is described after receiving at least confidential information encryption in second information
Third information;Receive in second information at least confidential information scrambling treated the third information.
Optionally, the third information is that second information security is handled and data volume reduction treated information;
And/or the third information is that second information security is handled and three-dimensional visualization treated information.
In some embodiments, described first module 110 is obtained, the specific diagnosis for receiving the transmission of the first private network is asked
It asks;Based on the first information described in the diagnosis request.
In further embodiments, described first module 110 is obtained, the diagnosis request carries the target user
First code information;The access modules 120 are specifically used for being based on the first information and the first code information, visit
Ask first private network.
In also some embodiments, described first obtains module 110, be specifically used for receiving the broadcast of the first private network or
Diagnosis request that is that multicast is sent and carrying medical demand information;And meet described go to a doctor when determining to be capable of providing
When the medical services of demand information, the first information of first private network is obtained;The access modules 120, are specifically used for
Using the access address, first private network is requested access to using first authentication information and carries out first private
There is the access authentication of network;First receiving module 130 is specifically used for receiving first private network in access authentication
The third information of rear offer is provided.
As shown in figure 9, the present embodiment provides a kind of information processing units, comprising:
Second receiving module 210, for receiving first information transmission of second private network based on the first private network
Access request;Second sending module 220, for the second information of target user to be carried out safe place based on the access request
It manages obtained third information and is sent to access end.
Optionally, described device further include: the first authentication module, the first mirror for being carried using the access request
Information is weighed, access authentication;Second sending module 220 is based on the access if passing through for the access authentication
It requests to send the third information to second private network.
In addition, described device further include: filtering module, for carrying out safety filtering to the access request;
Second sending module 220, if being specifically used for the access request by being based on institute after the safety filtering
It states access request and the third information is obtained to target user progress information processing.
Further, second receiving module 210 is specifically used for the first xegregating unit and receives the second privately owned net
The access request that the xegregating unit of network is sent;
Second sending module 220 includes: inquiry submodule, is based on the access for first xegregating unit
The first of first private network is requested to store the second information described in equipment query;Submodule is handled, for described the
Two information carry out safe handling and obtain the third information;Sending submodule, for being sent to described in second private network
The third information is sent to the second xegregating unit of second private network by the first xegregating unit.
Optionally, the processing submodule, specifically for deleting at least partly confidential information in second information
The third information that treated;The third is obtained at least partly confidential information desensitization process in second information
Information;The third information is obtained at least partly confidential information encryption in second information;To second letter
The third information that breath scrambling is handled.
In addition, second sending module 220, is specifically used for carrying out second information based on the access request
The third information obtained after safe handling and data volume reduction processing is sent to the access end;It will based on the access request
The third information that the second information of target user obtain after safe handling and visualization processing is sent to the access end.
Further, data volume reduction processing, including at least one of: will meet the information of condition of similarity into
Row compression processing;The valid data and invalid data in second information are distinguished, the invalid data is removed.
In further embodiments, the visualization processing, comprising: according to visualization condition, determine visualization ginseng
Number;Based on the visualisation parameters, visualization processing is carried out to second information and obtains visual information.
Optionally, described according to visualization condition, determine visualisation parameters, including at least one of: according to visualization
Clear condition determines the visualisation parameters;According to visualization time conditions, the visualisation parameters are determined.
Further, the visualisation parameters include at least one of: visualization sampling parameter;Visualization Model ginseng
Number;Visualize time parameter.
In addition, described device further include: reporting module, for the first private network the first xegregating unit receive described in
What the first storage equipment of the first private network was sent reports request;Wherein, described that request is reported to include at least: to be used with target
The corresponding first code information in family;Request module is stored, described report is based on for the first xegregating unit and transmission diagnosis is requested to be asked
It asks, wherein the diagnosis request includes at least the first code information of the target user.
It is described to report request further include: medical timing information and/or medical demand information.
Above-described embodiment is combined to provide a specific example above:
Example 1:
This example provides a kind of information processing method
Being related to the raw video information of patient privacy, form is stored in the private services device of each basic hospital in a distributed manner
In (corresponding to the storage equipment in aforementioned private network), and (isolation corresponding to aforementioned private network is set by front end processor
It is standby) mode access public network and insulation blocking;
The front end processor of each hospital is connected by public network.
The private network that doctor passes through the hospital where its own when needing tele-medicine first is got where patient
The information such as the access address of private network, patient's shadow is being accessed by public network based on obtaining the information such as access address
The front end processor of hospital, is completed the service of tele-medicine by front end processor as where checking, and front end processor is when being serviced, no
Raw video information is directly transmitted, but according to the various diagnosis interactive operations of doctor, Visual calculation is carried out to data, it will
By network transmission to doctor terminal, doctor completes finally result picture after visualization according to the result of visualization picture
Tele-medicine.
By the above distributed solution, first it is possible to prevente effectively from the transmission of patient's raw video information and patient
The problem of leakage of private information, secondly by the public data base administration that limited information stores, doctor can be by accessing not
Front end processor with hospital carrys out the same patient of paired observation in the medical image of different times Different hospital visually as a result, real
Now meet the data interconnection intercommunication and precisely diagnosis of practical diagnostic requirements.
By the data isolation and data Visual calculation ability of front end processor, in addition a variety of encryption measures, it can be ensured that
The Information Security problem of patient privacy information and original medical image information, while each doctor can be flexibly realized very much again
Data interconnection intercommunication between institute, doctor can also easily freely provide remote image diagnosis clothes under various network conditions
Business.Meanwhile technical solution provided in an embodiment of the present invention allows different doctors and hospital to hold the remote collaborative consultation of doctors read and carried out,
Also the privately owned net stored from the information of target user can flexibly be accessed under the premise of ensuring raw video information security
Network realizes long-range Cooperative consultation.
As shown in Figure 10, a kind of electronic equipment is present embodiments provided, comprising:
Memory;
Processor is connect with the memory, for by executing, the computer being located on the memory is executable to be referred to
It enables, it is one or more in the second private network, database, the first private network to can be realized aforementioned one or more application
The information processing method that technical solution provides, for example, one or more of information processing method shown in Fig. 1, Fig. 6 and Fig. 7.
The memory can be various types of memories, can be random access memory, read-only memory, flash memory etc..It is described to deposit
Reservoir can be used for information storage, for example, storage computer executable instructions etc..The computer executable instructions can be various
Program instruction, for example, objective program instruction and/or source program instruction etc..
The processor can be various types of processors, for example, central processing unit, microprocessor, Digital Signal Processing
Device, programmable array, digital signal processor, specific integrated circuit or image processor etc..
The processor can be connect by bus with the memory.The bus can be IC bus etc..
In some embodiments, the electronic equipment may also include that communication interface, the communication interface can include: network connects
Mouthful, for example, lan interfaces, dual-mode antenna etc..The communication interface is equally connected to the processor, and can be used in information
Transmitting-receiving.
In some embodiments, the electronic equipment further includes man-machine interactive interface, for example, the man-machine interactive interface
It may include various input-output equipment, for example, keyboard, touch screen etc..
The electronic equipment can be the equipment of aforementioned second private network, can be used for the second private network and obtain first
The first information of private network, wherein the first private network described in the first private network is the second letter for being stored with target user
Breath;Based on the first information, first private network is accessed;The third information that first private network provides is received,
Wherein, the third information is second information security treated information processing method.
The electronic equipment can be the equipment of the first private network above-mentioned, can be used for receiving the second private network base
In the access request that the first information of the first private network is sent;Based on the access request by the second information of target user
It carries out the third information that safe handling obtains and is sent to access end information processing method.
The present embodiment provides a kind of computer storage medium, it is executable that the computer storage medium is stored with computer
Instruction;After the computer executable instructions are performed, terminal device, database can be applied to, one in the first private network
The information processing method that a or multiple technical solutions provide, for example, Figure 1A, Fig. 1 B, Fig. 4, Fig. 6 A, information shown in Fig. 6 B and Fig. 7
One or more of processing method.
The computer storage medium can be include the various recording mediums with writing function, for example, CD, floppy disk, hard
The various storage mediums such as disk, tape, CD, USB flash disk or mobile hard disk.The optional computer storage medium can be non-moment
Storage medium, the computer storage medium can be read out by the processor, so that the calculating in the computer storage system of being stored in
After machine executable instruction is obtained and executed by the reason device of place first, the information that any one aforementioned technical solution provides can be realized
Processing method, for example, executing the information processing side in the information processing method or application server being applied in terminal device
Method.
The present embodiment also provides a kind of computer program product, and the computer program product includes that computer is executable
Instruction;After the computer executable instructions are performed, it can be realized at the information that aforementioned one or more technical solutions provide
Reason method, for example, one or more of information processing method shown in Figure 1A, Figure 1B, Fig. 4, Fig. 6 A, Fig. 6 B and Fig. 7.
The computer program including being tangibly embodied in computer storage medium, computer program include to be used for
The program code of method shown in execution flow chart, program code may include corresponding execution method provided in an embodiment of the present invention
The corresponding instruction of step.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through
Other modes are realized.Apparatus embodiments described above are merely indicative, for example, the division of the unit, only
For a kind of logical function partition, there may be another division manner in actual implementation, such as: multiple units or components can combine,
Or it is desirably integrated into another system, or some features can be ignored or not executed.In addition, shown or discussed each composition
Partially mutual coupling or direct-coupling or communication connection can be through some interfaces, equipment or unit it is indirect
Coupling or communication connection, can be electrical, mechanical or other forms.
Above-mentioned unit as illustrated by the separation member, which can be or may not be, to be physically separated, aobvious as unit
The component shown can be or may not be physical unit, it can and it is in one place, it may be distributed over multiple networks
On unit;Some or all of units can be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in various embodiments of the present invention can be fully integrated into a processing module, it can also
To be each unit individually as a unit, can also be integrated in one unit with two or more units;It is above-mentioned
Integrated unit both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can lead to
The relevant hardware of program instruction is crossed to complete, program above-mentioned can be stored in a computer readable storage medium, the journey
Sequence when being executed, executes step including the steps of the foregoing method embodiments;And storage medium above-mentioned include: movable storage device, only
Read memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk
Or the various media that can store program code such as CD.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, appoints
What those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, answer
It is included within the scope of the present invention.Therefore, protection scope of the present invention should be with the scope of protection of the claims
It is quasi-.
Claims (10)
1. a kind of information processing method characterized by comprising
Obtain the first information of the first private network, wherein the first private network described in the first private network is to be stored with target
The second information of user;
Based on the first information, first private network is accessed;
Receive the third information that first private network provides, wherein the third information is at second information security
Information after reason.
2. the method according to claim 1, wherein
It is described to be based on the first information, access first private network, comprising:
Based on the first information, the first xegregating unit of first private network is accessed;Wherein, second information is to deposit
It stores up in the first storage equipment of first private network, and the first storage equipment has been isolated in first xegregating unit
And public network;
The third information for receiving first private network and providing, comprising:
Receive the third information that first xegregating unit provides.
3. according to the method described in claim 2, it is characterized in that,
It is described to be based on the first information, access first private network, comprising:
Second xegregating unit of the second private network is based on the first information, accesses the first isolation of first private network
Equipment;Wherein, second information is stored in the first storage equipment of first private network, and first isolation
The equipment blocking first storage equipment and public network;
The third information for receiving first private network and providing, comprising:
Second xegregating unit receives the third information that first xegregating unit provides.
4. according to the method in claim 2 or 3, which is characterized in that
The third information for receiving first xegregating unit and providing, comprising:
Receive the third information that is that first xegregating unit provides and handling second information security.
5. method according to any one of claims 1 to 4, which is characterized in that
The third information for receiving first private network and providing, including at least one of:
Receive the third information of deleting that treated of at least partly confidential information in second information;
The third information after receiving at least partly confidential information desensitization process in second information;
The third information after receiving at least partly confidential information encryption in second information;
Receive at least partly confidential information scrambling treated the third information in second information;
And/or
The third information is that second information security is handled and data volume reduction treated information;
And/or
The third information is the information after second information security processing and visualization processing.
6. a kind of information processing method, comprising:
Receive the access request that the first information based on the first private network is sent;
The second information of target user is subjected to the third information that safe handling obtains based on the access request and is sent to access
End.
7. a kind of information processing unit characterized by comprising
First obtains module, for obtaining the first information of the first private network, wherein first is privately owned described in the first private network
Network is the second information for being stored with target user;
Access modules access first private network for being based on the first information;
First receiving module, the third information provided for receiving first private network, wherein the third information is institute
State the second information security treated information.
8. a kind of information processing unit, comprising:
Second receiving module, the access request sent for receiving the first information based on the first private network;
Second sending module, for the second information of target user to be carried out that safe handling obtains based on the access request
Three information are sent to access end.
9. a kind of electronic equipment characterized by comprising
Transceiver, for receiving and sending messages;
Memory, for storing information;
Processor is connect with the transceiver and memory respectively, for the computer journey by executing the memory storage
Any one of sequence, control the information storage of the information transmit-receive and the memory of the transceiver, and realize claim 1 to 5 or 6
The method of offer.
10. a kind of computer storage medium, the computer storage medium is stored with executable instruction;
After the computer executable instructions are performed, the method that any one of claim 1 to 5 or 6 provide can be realized.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810438594.2A CN110473599B (en) | 2018-05-09 | 2018-05-09 | Information processing method and device, electronic device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810438594.2A CN110473599B (en) | 2018-05-09 | 2018-05-09 | Information processing method and device, electronic device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110473599A true CN110473599A (en) | 2019-11-19 |
CN110473599B CN110473599B (en) | 2022-11-29 |
Family
ID=68503513
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810438594.2A Active CN110473599B (en) | 2018-05-09 | 2018-05-09 | Information processing method and device, electronic device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110473599B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111477309A (en) * | 2020-03-02 | 2020-07-31 | 深圳市新产业眼科新技术有限公司 | Private cloud access method based on big data analysis, public cloud and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1447577A (en) * | 2002-03-25 | 2003-10-08 | 阿尔卡特公司 | Method of providing services for distance special terminal and relative equipment |
US20040193905A1 (en) * | 1999-08-31 | 2004-09-30 | Yuval Lirov | System and method for providing secure transmission, search, and storage of data |
CN1589436A (en) * | 2001-11-20 | 2005-03-02 | 森维公司 | Access and control system for network-enabled devices |
CN102655516A (en) * | 2011-03-03 | 2012-09-05 | 中国移动通信集团江苏有限公司 | Generic access network-based tele-medicine method and system |
CN204650524U (en) * | 2015-05-13 | 2015-09-16 | 中科汉华医学科技(北京)有限公司 | A kind of Table top type consultation system |
CN106031121A (en) * | 2014-05-29 | 2016-10-12 | 华为技术有限公司 | Media content sharing method and apparatus |
-
2018
- 2018-05-09 CN CN201810438594.2A patent/CN110473599B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040193905A1 (en) * | 1999-08-31 | 2004-09-30 | Yuval Lirov | System and method for providing secure transmission, search, and storage of data |
CN1589436A (en) * | 2001-11-20 | 2005-03-02 | 森维公司 | Access and control system for network-enabled devices |
CN1447577A (en) * | 2002-03-25 | 2003-10-08 | 阿尔卡特公司 | Method of providing services for distance special terminal and relative equipment |
CN102655516A (en) * | 2011-03-03 | 2012-09-05 | 中国移动通信集团江苏有限公司 | Generic access network-based tele-medicine method and system |
CN106031121A (en) * | 2014-05-29 | 2016-10-12 | 华为技术有限公司 | Media content sharing method and apparatus |
CN204650524U (en) * | 2015-05-13 | 2015-09-16 | 中科汉华医学科技(北京)有限公司 | A kind of Table top type consultation system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111477309A (en) * | 2020-03-02 | 2020-07-31 | 深圳市新产业眼科新技术有限公司 | Private cloud access method based on big data analysis, public cloud and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110473599B (en) | 2022-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111753006B (en) | A prediction system and method based on federated learning | |
CN112231756B (en) | FL-EM-GMM medical user privacy protection method and system | |
Balasamy et al. | Improving the security of medical image through neuro-fuzzy based ROI selection for reliable transmission | |
Jain et al. | Securing E‐Healthcare Images Using an Efficient Image Encryption Model | |
CN106777905A (en) | The method that many image center service systems of tele-medicine and its terminal obtain data | |
CN110473622A (en) | Information processing method and device, electronic equipment and storage medium | |
EP1084465B1 (en) | Method for secured access to data in a network | |
CN109830270A (en) | Medical information management system, method, computer equipment and readable storage medium storing program for executing | |
Calder et al. | Self priming from distinctive and caricatured faces | |
CN106339597A (en) | Intelligent medical remote monitor system based on cloud computing | |
CN107004048A (en) | Record access and management | |
CN110473599A (en) | Information processing method and device, electronic equipment and storage medium | |
CN117936039B (en) | High-speed transmission method of medical image data | |
CN108737428A (en) | Method and apparatus are determined based on the skin disease of image recognition | |
JP2005278991A (en) | Remote image interpretation service system | |
CN113592688A (en) | Diagnosis and treatment information processing method and device based on block chain and electronic equipment | |
Malone | Photographic analyses using skin detail of the hand: a methodology and evaluation | |
CN118195030A (en) | Robust federated learning method, system and storage medium based on Euclidean distance | |
CN113793699B (en) | Lung tumor delineation method based on 5G cloud radiotherapy private network | |
CN117116496A (en) | Federated medical big data governance system | |
CN109166609A (en) | Nursing data sharing method based on Internet of Things | |
CN109659026A (en) | Disease kind analysis method and device, storage medium, the computer equipment of artificial intelligence | |
CN114694816A (en) | Processing method, device, device and storage medium for resource sharing | |
CN108833404A (en) | A kind of financial lease trade management system based on cloud platform | |
KR102595947B1 (en) | Medical device software sharing device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |