Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Double mapping method for on-chain representation and off-chain security edge storage of medical image

A medical imaging and imaging technology, which is applied in encryption devices with shift registers/memory, security communication devices, computer security devices, etc., can solve the problem of information sharing and image storage and transmission systems in hospitals that are difficult to implement The storage platform is not uniform enough, and the expansion work is difficult, etc.

Pending Publication Date: 2022-04-19
CHONGQING UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes the image storage and transmission systems of most hospitals need to be expanded once in a few years. However, the expansion work is not only a huge investment, but also difficult to expand each time, and the performance is getting lower and lower.
[0005] (3) Since the image storage and transmission system storage platform of each hospital is not uniform enough, and the storage interface is also chaotic, it is difficult to realize the sharing of image storage and transmission system information between hospitals
In order to realize the area sharing of the image storage and transmission system, data sharing must be carried out from the medical digital imaging and communication interface, which will lead to a large number of changes in the application of the image storage and transmission system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double mapping method for on-chain representation and off-chain security edge storage of medical image
  • Double mapping method for on-chain representation and off-chain security edge storage of medical image
  • Double mapping method for on-chain representation and off-chain security edge storage of medical image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the embodiments of the present invention more clear, the following will be combined with the accompanying drawings in the embodiments of the present invention, the technical solutions in the embodiments of the present invention are clearly and completely described, obviously, the described embodiments are only part of the embodiments of the present invention, not all embodiments. Based on embodiments in the present invention, all other embodiments obtained by those of ordinary skill in the art without making creative work, are within the scope of protection of the present invention.

[0032] The specification and claims of the present invention and the terms "first", "second" and the like in the above drawings are used to distinguish similar objects, rather than to describe a particular order or sequencing. It should be understood that the data used in this manner are interchangeable in appropriate cases, so ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a medical image on-chain representation and under-chain secure edge storage method based on a block chain technology, a trusted computing technology and a compressed sensing encryption and decryption image technology. Generating a first hash chain and a second hash chain according to the initial key by using an image encryption method based on hash chain compressed sensing; and obtaining a measurement matrix and an encryption matrix according to the first hash chain and the second hash chain, obtaining a measurement result matrix through the original image and the measurement matrix, and obtaining an encryption image matrix through the measurement result matrix and the encryption matrix. And hashing the measurement matrix again to obtain a hash value of the measurement matrix, and storing the medical image related information, the hash value of the measurement matrix and the node signature into the block chain. And storing the encrypted image matrix in a node local space. In the whole process, existence proof, namely on-chain representation of the medical image, of the medical image is achieved, the image is safely stored in a node local space, namely under-chain safe edge storage is achieved, and bidirectional mapping of the medical image and the under-chain safe edge storage is achieved through uniquely-identified medical data information and the hash value of an image measurement matrix.

Description

Technical field [0001] The present invention relates to medical image information encryption and secure storage, sharing technology, in particular to an on-chain representation of medical images and off-chain secure edge storage methods. Background [0002] Due to the impact of network, security and stability reasons, hospitals generally establish image storage and transmission systems to archive, store and communicate hospital image data. However, with the continuous improvement of the accuracy of digital diagnostic equipment and the increasing number of patients, there are obviously many problems and deficiencies in the use of traditional image storage and transmission systems. [0003] (1) The operating systems, databases and storage devices used by major image storage and transmission system software manufacturers are not the same, which makes each set of image storage and transmission systems not only completely heterogeneous in software and hardware, but also lack interope...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64H04L9/06H04L9/08H04L9/40G06F21/60G06F16/27
CPCG06F21/64H04L9/0643H04L9/0863G06F16/27G06F21/602H04L63/045
Inventor 陈自刚颜逸武豪陈龙
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products