Electronic medical record access control method based on block chain

An electronic medical record and access control technology, applied in electronic digital data processing, instruments, digital data protection, etc., can solve the problem that it is difficult to ensure that patients can accurately remember the quantitative value of historical symptoms, affect doctors' understanding of patients' historical symptoms, and mix non-professional medicine. Words and other issues to achieve the effect of supporting medical research and precision medicine, eliminating data silos, and preventing tampering

Active Publication Date: 2019-10-11
西康软件有限责任公司
View PDF6 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This approach has two disadvantages: (1) it is difficult to ensure that the patient can accurately remember the quantitative values ​​of historical diseases, such as blood pressure history records, etc.
(2) Patients often include non-professional medical words when describing symptoms, which will affect doctors' understanding of patients' historical symptoms
However, private information has different sensitivity levels. In the process of data utilization, the use of data is often limited by the requirements of privacy information protection, which greatly reduces the utilization rate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic medical record access control method based on block chain
  • Electronic medical record access control method based on block chain
  • Electronic medical record access control method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0106] Example 1: Cary, a dermatologist, proposes to access the inspection data of patient Bob's bronchitis (respiratory medicine) for the purpose of treatment. First of all, Cary needs to perform identity authentication. For the established access control strategy, doctor Cary's identity authentication cannot pass, and he does not have the corresponding authority to view the medical data of patients who are not in the department. In this way, the user's identity and authority are restricted through access control to achieve the purpose of data protection.

example 2

[0107] Example 2: Cardiovascular physician Mark proposes to access the medical data of patient Mary's cardiovascular disease. The purpose of the visit is for disease research, and the intended purpose of the medical data of patient Mary's cardiovascular disease is treatment. Doctor Mark has passed the corresponding identity authentication, and his visit purpose is inconsistent with the intended purpose, so there is no need to calculate the information entropy Es of this visit request. This visit request is rejected and the medical data cannot be viewed. In this way, the risk of accessing data is reduced, and the patient's request is given priority; if doctor Mark believes that this disease research is effective in preventing disease and is beneficial to the patient's health, doctor Mark can apply again, specifying the purpose of the visit , and calculate Es and compare it with Et, and send the result together with the public key to the EMR administrator. After receiving the req...

example 3

[0108] Example 3: The clinician Jack proposes to visit the patient Tom's gastrointestinal health for further treatment. First of all, the role of doctor Jack is the clinical attending doctor, who has passed the corresponding identity authentication, and the purpose of the visit is consistent with the intended purpose, and compares Es and Et. If Es

[0109] Security Analysis:

[0110] 1) File storage security: The c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electronic medical record access control method based on a block chain, and relates to the technical field of medical data sharing methods. The method comprises the following steps: firstly, formulating a dynamic access control strategy to carry out authority distribution on an electronic medical record visitor, and writing the access control strategy into an intelligentcontract to complete identity authentication on a data visitor; storing medical data of a patient in blocks, adopting decentralized network deployment, using an information entropy theory for carrying out quantitative processing on information, and setting conditions for accessing the medical data according to the requirements of the patient. According to the method, the medical privacy information protection of the user in the service process can be realized, the patient can autonomously manage own medical data, and the privacy protection method under medical data sharing is favorably realized.

Description

technical field [0001] The present invention relates to the technical field of medical data sharing methods, in particular to a blockchain-based access control method for electronic medical records. Background technique [0002] With the rapid development and wide application of computer and information technology, the informatization of medical institutions has been brought about. The wide use of electronic medical records (Electronic Medical Records, EMR) has brought great convenience to the medical field. For a patient Said that a disease may be accompanied by multiple characteristics during the examination process. When a doctor diagnoses a disease, the usual practice is to ask the patient some historical symptoms, physical conditions, etc. Such an approach has two disadvantages: (1) it is difficult to ensure that the patient can accurately remember the quantitative value of the historical disease, such as blood pressure history records. (2) When patients describe sympt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G16H10/60
CPCG06F21/602G06F21/604G06F21/6227G06F21/6245G06F2221/2141G16H10/60
Inventor 郑丽娟崔梦赵永斌高栋吴朋刚管翠阁马国磊
Owner 西康软件有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products