[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hakim et al., 2021 - Google Patents

Blockchain for Secure Medical Records Storage and Medical Service Framework using SHA 256–Verifiable Key

Hakim et al., 2021

View PDF
Document ID
9499615346759897282
Author
Hakim P
Vaze V
Publication year
Publication venue
Int J Intell Eng Syst

External Links

Snippet

Electronic Health Record (EHR) is widely adopted by various providers for health care systems such as hospitals, medical practitioners, doctors, etc. and the medical technology involves collecting health information related to diseases, medication, medical images, etc …
Continue reading at inass.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/34Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
    • G06F19/3456Computer-assisted prescription or delivery of medication, e.g. prescription filling or compliance checking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/34Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
    • G06F19/3418Telemedicine, e.g. remote diagnosis, remote control of instruments or remote monitoring of patient carried devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work
    • G06Q50/24Patient record management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Chenthara et al. Security and privacy-preserving challenges of e-health solutions in cloud computing
Ying et al. A lightweight policy preserving EHR sharing scheme in the cloud
Iqbal et al. Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
US9698974B2 (en) Method for creating asymmetrical cryptographic key pairs
Das et al. A lightweight and anonymous mutual authentication scheme for medical big data in distributed smart healthcare systems
Miriam et al. Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology.
Ali et al. Verifiable online/offline multi-keyword search for cloud-assisted industrial internet of things
John et al. Provably secure data sharing approach for personal health records in cloud storage using session password, data access key, and circular interpolation
Hahn et al. Efficient Attribute‐Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks
Hamed et al. Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption.
Arpitha et al. Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
Barman et al. A blockchain‐based approach to secure electronic health records using fuzzy commitment scheme
Wenhua et al. A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications
Liang et al. Towards blockchain empowered trusted and accountable data sharing and collaboration in mobile healthcare applications
Lee et al. Blockchain-enabled key aggregate searchable encryption scheme for personal health record sharing with multi-delegation
Indushree et al. A novel Blockchain-based authentication scheme for telecare medical information system
Shetty et al. Blockchain-based decentralized accountability and self-sovereignty in healthcare systems
KR102605087B1 (en) System and method for sharing patient's medical data in medical cloud environment
KR20230075483A (en) Physical copy protection function
Pawar et al. CovidBChain: Framework for access‐control, authentication, and integrity of Covid‐19 data
Hakim et al. Blockchain for Secure Medical Records Storage and Medical Service Framework using SHA 256–Verifiable Key
Diwan et al. Blockchain assisted encryption scheme for intellectual share estimation using medical research data
Nie et al. Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT
Xu et al. A decentralized pseudonym scheme for cloud-based eHealth systems
Sassi et al. Security and privacy protection in the e-health system: Remote monitoring of covid-19 patients as a use case