• Title/Summary/Keyword: 의료정보접근서비스

Search Result 146, Processing Time 0.025 seconds

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

Reproductive Health Education Needs of Adolescent Girls in Luwero district, Uganda (우간다 루웨로 지역 여성 청소년의 성생식보건 교육 수요)

  • Eun-mi Song;Young-Dae Kwon;Jin-Won Noh
    • Advanced Industrial SCIence
    • /
    • v.2 no.2
    • /
    • pp.31-41
    • /
    • 2023
  • The study aims to identify unmet needs, barriers, and constraints in reproductive health education for adolescent girls in Luwero, Uganda. The study included a survey of 55 young women (aged 14-26) in the region and interviews with 40 stakeholders, including teachers and healthcare workers. Results showed that the majority of respondents (87%) rely on schools for reproductive health information, preferring health institutions (58%) for reproductive health services. Over half of respondents encountered obstacles accessing relevant information due to limited resources and cultural barriers and emphasized the significance of schools and health institutions as essential health information sources. Schools and health institutions need to collaborate to enhance reproductive health education for young women's accessibility.

Patient Authentication Protocol for Synchronization between Implantable Medical Device (체내 삽입장치간 동기화를 위한 환자 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.49-56
    • /
    • 2013
  • Among U-healthcare services adapting the latest IT technique and medical technique, a body-injecting device technique providing medical service to a patient who has incurable disease. But the body-injecting device technique can be easily exposed during wireless section to the third person and it can be used illegally. This paper proposes certification protocol which certifies a patient and hospital staff using random number created by certification server and a patient with hospital staff by synchronization. Specially, the proposed protocol uses security information created by information registered in certification server previously by a patient and hospital staff so that in keeps from accessing of third person who didn't get approval. And it gives more stability.

Development of Community-based Digital Health Care (지역사회기반 디지털 헬스케어 발전방향)

  • Han, Jeong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1826-1831
    • /
    • 2022
  • Rapid Aging Society demands the transformation of medical paradigm of diagnosis and treatment towards prevention and management. This paper explores the norm and development of digital health care, focusing on Busan Metropolitan City. Digital health care which combines new ICT technology and medical technology is predictive, preventive, personalized and participatory; and suggests alternative to solve the problem of demographic changes and increasing social cost of medical welfare. Community Health Center in Busan is unique one based in the minimum community of collecting data from self-leading health management. Digital transformation using basic health data and social information can build preventive care system in the community. Easy access leads community center to test bed of developing new technology, as a living lab. In order to use the newly developed goods and service effectively, user-participatory test is nicessary. Finally community nurse and activists can specify health-welfare converged service through digital transformation empowerment training.

Strategies for Public Health Service Development in the Times of Local Autonomy (지방자치시대의 공공보건사업 발전 전략)

  • 박정한
    • Health Policy and Management
    • /
    • v.12 no.3
    • /
    • pp.1-22
    • /
    • 2002
  • Health is a fundamental human right and a sine qua non for happiness of people and for national development. Government has a responsibility for the provision of health services for their people. Recent changes of disease pattern, i.e. decrease of Infectious diseases and increase of chronic and degenerative diseases Including cancer and cardiovascular diseases, together with universal coverage of health insurance and improved living standard have prompted medical care utilization and skyrocketed the national health expenses. The goal of national health policy is improving the quality of life through the betterment of health level. To achieve this goal it is necessary to establish a healthcare system for lifetime, to improve the efficiency of healthcare delivery system, and to strengthen the public health services for disease prevention and health promotion. The current public health service programs are Inefficient due to an inconsistent policy for health service program, lack of health information system, irrational health program planning and evaluation, and Inadequate training of health workers. Local government has a legal responsibility for health service program planning and promoting the competence of health workers. Thus, municipal and provincial health departments should expand their roles and strengthen their function. The strategies for developing public health service programs at local level are ${\circled}1$ stipulating the goals of health policy, ${\circled}2$ promoting the ability for health program planning and evaluation, ${\circled}3$ establishing health information and surveillance system, ${\circled}4$ training of health workers, ${\circled}5$ establishing an institution for health information management and training of health workers, and ${\circled}61$ collaboration with local universities.

A Study on the Design of the Knowledge Management System for Medical Information Services in a Public Library (공공도서관 의학정보서비스를 위한 지식관리시스템 설계에 관한 연구)

  • 이란주
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.3
    • /
    • pp.63-86
    • /
    • 2001
  • Consumer health information is receiving more attention than ever before. This growing attention can be linked to the Internet and to people seeking more information on health topics. The purpose of this study is to suggest a design of the Knowledge management system for medical information services in a public library. As theoretical backgrounds, it discusses the issues regarding to the medical information services in a public library, knowledge management and knowledge management system. After that, 12 medical information sites are analyzed then the planning and the main menu of a medical information site for a public library are described. Finally, the model of the knowledge management system for a public library with 5 sub-systems are suggested: 1) knowledge creation system, 2) technology support system, 3) training system, 4) community service system, 5) knowledge sharing and network system. This system based on knowledge management will help provide the users high quality of medical information.

  • PDF

Design of Patient Authentication Model in u-healthcare Environment using Coalition ID (연합 ID를 이용한 u-헬스케어 환경의 환자 인증 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.305-310
    • /
    • 2013
  • To provide medical services to patients who have a terminal illness, recent hospital patients to monitor the state of the device attached to the body, the body insertion device is. U-Healthcare Environment and hospital officials indiscriminately exploited by the patient's vital information, however, could threaten the patient's life problems are appearing. In this paper, depending on the level of authority, hospital officials, Union of ID-based authentication model is proposed to use a patient's vital information. Union proposed model identify different authentication system is used in hospitals that exist in various forms in a number of ID information, health / medical information sharing between hospitals without exposure to unnecessary personal information, you can be assured of the anonymity. In particular, with easy access to patient information, hospital officials about the malicious act to protect patient information to access level for the rights granted by third parties to prevent easy access.

Leision Detection in Chest X-ray Images based on Coreset of Patch Feature (패치 특징 코어세트 기반의 흉부 X-Ray 영상에서의 병변 유무 감지)

  • Kim, Hyun-bin;Chun, Jun-Chul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.35-45
    • /
    • 2022
  • Even in recent years, treatment of first-aid patients is still often delayed due to a shortage of medical resources in marginalized areas. Research on automating the analysis of medical data to solve the problems of inaccessibility for medical services and shortage of medical personnel is ongoing. Computer vision-based medical inspection automation requires a lot of cost in data collection and labeling for training purposes. These problems stand out in the works of classifying lesion that are rare, or pathological features and pathogenesis that are difficult to clearly define visually. Anomaly detection is attracting as a method that can significantly reduce the cost of data collection by adopting an unsupervised learning strategy. In this paper, we propose methods for detecting abnormal images on chest X-RAY images as follows based on existing anomaly detection techniques. (1) Normalize the brightness range of medical images resampled as optimal resolution. (2) Some feature vectors with high representative power are selected in set of patch features extracted as intermediate-level from lesion-free images. (3) Measure the difference from the feature vectors of lesion-free data selected based on the nearest neighbor search algorithm. The proposed system can simultaneously perform anomaly classification and localization for each image. In this paper, the anomaly detection performance of the proposed system for chest X-RAY images of PA projection is measured and presented by detailed conditions. We demonstrate effect of anomaly detection for medical images by showing 0.705 classification AUROC for random subset extracted from the PadChest dataset. The proposed system can be usefully used to improve the clinical diagnosis workflow of medical institutions, and can effectively support early diagnosis in medically poor area.

Study on the Intrusion Tolerance System Applied in the Object Oriented Middleware Environment (객체지향 미들웨어 환경하에서 응용화된 침입감내시스템에 관한 연구)

  • Kim, Young-Soo;Choi, Heung-Sik
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.558-565
    • /
    • 2003
  • 오늘날 대부분의 컴퓨터 시스템에 대한 사이버 공격은 특정 어플리케이션이 제기능을 발휘하지 못하도록 하기 위한 의도로 행해진다. 이러한 사이버 공격을 방어하기 위한 현행 정보보호시스템은 어플리케이션으로의 접근을 보호하는 기능을 갖는 형태로 하드웨어, 네트워크, 운영체제 등의 인프라를 보호하기 위한 시스템이 대부분이다. 본 논문은 사이버 공격에도 불구하고 어플리케이션이 서비스를 지속할 수 있는 침입감내시스템을 제안하고 설계 구현하였다. 제안 시스템은 어플리케이션의 기능과 침입감내 기능을 분리하고 다양한 보안 메커니즘을 통합하고 있는 미들웨어 기반의 시스템이다. 일상 생활에 많은 영향을 미치는 중요한 서비스인 경우에는 시스템의 기능 중 서비스의 지속성이 가장 중요하다. 제안한 침입감내 시스템은 향후 침입감내기능이 필요한 국방, 의료, 금융 시스템과 같은 사회기반시스템의 구축에 많은 부분이 활용될 것으로 생각한다.

  • PDF

Study on the Camera Image Frame's Comparison for Authenticating Smart Phone Users (스마트폰 사용자 인증을 위한 카메라 영상 프레임 비교에 관한 연구)

  • Jang, Eun-Gyeom;Nam, Seok-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.155-164
    • /
    • 2011
  • APP based on the smart phone is being utilized to various scopes such as medical services in hospitals, financing services at banks and credit card companies, and ubiquitous technologies in companies and homes etc. In this service environment, exposures of smart phones cause loss of assets including leaks of official/private information by outsiders. Though secret keys, pattern recognition technologies, and single image authentication techniques are being applied as protective methods, but they have problems in that accesses are possible by utilizing static key values or images like pictures. Therefore, this study proposes a face authentication technology for protecting smart phones from these dangerous factors and problems. The proposed technology authenticates users by extracting key frames of user's facial images by real time, and also controls accesses to the smart phone. Authentication information is composed of multiple key frames, and the user' access is controlled by distinction algorism of similarity utilizing DC values of image's pixel and luminance.