Secure authentication of electronic prescriptions

一种电子处方、全部的技术,应用在应用密码术领域,能够解决黑客攻击、医生或者患者隐私侵害、第三方破坏等问题

Inactive Publication Date: 2013-06-26
KONINK PHILIPS ELECTRONICS NV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this assumption is not always realistic, as there is always the possibility that a third party may be compromised or hacked, which could result in a breach of the privacy of the doctor or patient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure authentication of electronic prescriptions
  • Secure authentication of electronic prescriptions
  • Secure authentication of electronic prescriptions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] figure 1 is a flowchart illustrating an embodiment of a method for generating transaction pseudonyms according to the present invention. First, a participant such as a pseudonym user registers at a first privacy management official (for example, a doctor manager (DM)), so that the participant's identity can be uniquely defined and determined by the first pseudonym (S10), and then the participant registers at Registration at a second privacy management officer (for example, an insurance company) to uniquely determine the participant's identity (S20) by mapping the registration key shared between the second privacy management officer and the participant to the first pseudonym; and A transaction pseudonym for the participant is generated based on the first pseudonym, the registration key, and the transaction number linked to the transaction (S30).

[0025] In step S10 of the process according to the method of the invention, a first pseudonym is generated based on the publ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system for authenticating electronic prescriptions, the system comprising an acquisition unit for acquiring an electronic prescription for authentication, the electronic prescription comprising a transaction number, a first pseudonym, and a signature of a first participant using a transaction pseudonym, the first pseudonym indicating the first participant's registration at a first privacy officer; a generation unit for generating the transaction pseudonym based on the first pseudonym, the transaction number and a registration key corresponding to the first pseudonym and being shared between the first participant and a second privacy officer; and a validation unit for verifying the first participant's registration at the second privacy officer and the authenticity of the signature based on the registration key and the transaction pseudonym. As the transaction pseudonym depends on registrations at two privacy officers and a transaction number for a real-time prescription, the participant's privacy can be well protected from each privacy officer.

Description

technical field [0001] The present invention relates to applied cryptography and in particular to a method of generating transaction pseudonyms for secure authentication. [0002] The invention also relates to a method and system for security authentication of electronic prescriptions. [0003] Furthermore, the present invention relates to a computer program for implementing said security authentication method on a computer. Background technique [0004] An electronic prescription system (E-prescription system) is an alternative to the traditional paper-based process of transferring medical prescriptions from the clinic to the pharmacy. As one of the most important issues in electronic prescription systems, security authentication for processing electronic prescriptions has attracted extensive attention and interest from researchers and industries. [0005] A prior art document entitled "Anonymous E-prescriptions" (ACM Workshop Privacy in the Electronic Society (WPES02), 2...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/34G06F19/00H04L9/32G06F21/62
CPCH04L2209/88G06F19/3456H04L9/3247G06F21/6254H04L2209/56H04L2209/42G16H20/10
Inventor 王常杰马缚龙
Owner KONINK PHILIPS ELECTRONICS NV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products