Electronic medical record signature method and device
An electronic medical record and electronic signature technology, which is applied to secure communication devices, electrical components, user identity/authority verification, etc. sexual effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0062] Method embodiment one:
[0063] See figure 1 This figure is a flowchart of Embodiment 1 of an electronic medical record signature method provided by the present invention.
[0064] The electronic medical record signature method provided in this embodiment is applied to a client, and the method includes the following steps:
[0065] Step S101: In response to the loading electronic signature request, obtain the user name and biometric information of the user.
[0066] In practical applications, when the user finishes editing the electronic medical record, he needs to click the electronic signature loading button in the electronic medical record to load the electronic signature. After receiving the electronic signature loading request sent by the user, the client obtains the user's username and biometric information. The user needs to log in to the electronic medical record system before opening the electronic medical record. If the user uses a user name to log in, the user name ...
Example Embodiment
[0087] Method embodiment two
[0088] See figure 2 This figure is a flowchart of Embodiment 2 of an electronic medical record signature method provided by the present invention.
[0089] The electronic medical record signature method provided in this embodiment is applied to a server, and the method includes the following steps:
[0090] Step S201: Receive an encrypted file sent by the client, where the file includes the user name and the first biometric information.
[0091] In this embodiment, the biological characteristics refer to unique physiological characteristics that everyone has, such as fingerprints, palm prints, face, voice, iris, retina, and so on. The use of the biological characteristics for authentication is not only convenient, the user does not need to memorize the password like the prior art one, nor does it need to carry the USB shield like the prior art two, and it is safe and reliable, not easy to be stolen, let alone Will be lost. In various biometric informa...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap