Identity authentication system and method of electronic medical record system

An electronic medical record and identity authentication technology, applied in the field of medical information, can solve the problems of not strictly protecting privacy rights, intrusion of electronic medical record system, low feasibility, etc. The effect of electronic medical record data

Inactive Publication Date: 2013-05-22
JIANGSU PROVINCE HOSPITAL +1
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] With the improvement of the application degree of electronic medical records, its security problems are becoming more and more prominent, and the security of electronic medical records will be threatened by many aspects, mainly including: 1) Leakage of medical workers, unauthorized access, intrusion of unauthorized persons, etc. Managers, medical staff and patients have brought worries. Managers are worried that the electronic medical record system will be maliciously invaded or attacked, resulting in data loss or modification; The content may be easily tampered with; 3) In addition to worrying that the medical information may be modified, patients are also worried about the leakage of health information and the lack of strict protection of privacy. These may become obstacles to the further development of electronic medical records. To eliminate these hidden dangers, In addition to strengthening the confidentiality awareness of medical staff and patients, it is very necessary to adopt strict identity authentication technology for the electronic medical record system
[0005] Currently commonly used identity authentication technologies include: 1) Identity authentication methods based on memory information, that is, user name and password authentication methods, which are less secure and passwords are easy to be cracked, intercepted or leaked; Authentication strengthening mechanism, that is, adding other authentication strengthening mechanisms based on physical media on the basis of inputting personal identification codes, can greatly improve the security of the system; 3) Authentication methods based on biometrics, such as fingerprints, iris, face Features, etc. The authentication method based on biometrics is based on the unique, reliable and stable biometrics of the human body, but this technology requires high equipment and high cost to achieve accurate and effective identification; 4) Electronic signature technology, the commonly used USB key method at present, the USB key is a pluggable hardware device based on the USB interface, with a built-in smart card chip, which stores the private key and digital certificate of the medical staff, because the medical staff, in addition to the office, It is also necessary to check patients in different places such as wards and outpatient clinics, and to consult in other departments. It is not feasible to carry and plug in and out the USB key at any time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]The user (medical staff) puts the NFC mobile phone on the NFC reader of the electronic medical record system terminal, the NFC reader reads the identity information and electronic signature information (private key, etc.) in the mobile phone NFC, and the NFC reader sends the information to the client Application program; the client application program feeds back a series of feature codes (the time used for the feature codes, etc., to ensure that they are different each time, so that hackers cannot use them even if they are intercepted) to the NFC mobile phone through the NFC reader; the NFC mobile phone requires the user to enter a password, and the success , enter the next step; the NFC mobile phone encrypts the feature code with its own key and sends it to the client application through the NFC reader; the client application sends the identity information and the encrypted feature code to the identity authentication server; the identity authentication server The server ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication system and a method of an electronic medical record system. Identity information and electronic signature information (private key) of users are stored in a negative feedback circuit (NFC) of an intelligent mobile phone. The users are capable of reading the identity information which is stored in the NFC of the intelligent mobile phone from a terminal of the electronic medical record system, entering into the electronic medical record system, and obtaining the relevant work authorization (a resident doctor, an attending physician, a botanic physician, a nurse and a regulator), carrying out work like writing advices of the doctors, writing down medical records, recording the disease progress, executing and checking the advices of the doctors, examining and verifying the medical records and the like. After finishing recording, users can carry out an electronic signature by utilizing the private key in the NFC of the mobile phone. Due to the fact that the phones can be portable, if the users go away, the phones are taken away; the system can automatically log off the system. Logging and signing of the electronic medical records are safe and simple, and the method is worthy of popularizing.

Description

technical field [0001] The invention relates to the field of medical information, in particular to an identity authentication system and method of an electronic medical record system. Background technique [0002] With the development of computer network technology, hospital information construction has entered a new stage. In 1991, the American Institute of Medicine published a special report on computer-based patient records (CPR), which comprehensively discussed the development of CPR and summarized the experience in realizing the computerization of paper-based medical records in the past 40 years; in 1992, the United States began to implement Build an information superhighway and establish an electronic medical record popularization promotion organization to vigorously promote the popularization of the application of electronic medical records; in addition to the United States, Canada, the United Kingdom, the Netherlands, Japan and other countries are also vigorously buil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q50/24H04L9/32H04L9/30G16H10/60
Inventor 王忠民王雪梅王传明
Owner JIANGSU PROVINCE HOSPITAL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products