1.Regulation Considerations of Medical Devices with Wireless Technology.
Xiaoling WANG ; Shuai NIU ; Zhizhen ZHONG
Chinese Journal of Medical Instrumentation 2020;44(3):258-262
Wireless technology has been widely used in medical devices and has brought convenience to medical care. However, wireless medical devices face risks such as data security and radio frequency interference. This study highlights safety and effectiveness evaluation of wireless medical devices, and discusses technical characteristics and regulation requirements, providing references for industry development and regulation.
Computer Security
;
Wireless Technology
2.How to construct a safe storage environment for hospital informations.
Chinese Journal of Medical Instrumentation 2007;31(1):56-59
This article outlines the methods of building a safe environment for the hospital information system, and protecting data in three levels. Firstly it is recommended to build a highly efficient and redundant hot spare system for program applications and the database, secondly to make a copy of log file from the current database to the emergent server used for the whole hospital is suggested,finally another emergent server should be provided for the outpatient department. And thus, once there are some problems with the whole network, it would undertake the urgent services of the hospital as an outpatient network.
Computer Communication Networks
;
Computer Security
;
Computer Systems
;
Hospital Information Systems
3.Information safety test of digital medical device.
Chinese Journal of Medical Instrumentation 2014;38(4):282-286
According to the background of the age of big data, the medical devices are informatized, we analyze the safety and efficiency for the information and data of digital medical devices or medical systems, also discussed some test methods. Lack of a suitable standard system of digital medical devices is a big problem both for domain standard and international standard. GB25000.51 is too ambiguous and free for testing, also not very operational. So this paper suggested some test advices and some prospective method. These test methods are helpful for finding the problem and performing the standards. What's more, these methods are famous in the world and used widely in the 3C region but just start in the medical region, which can promote the development of the medical devices.
Computer Security
;
standards
;
Equipment and Supplies
;
standards
4.Nation-Wide Registry of Vascular Diseases
Shin HWANG ; Suk Koo KIM ; Tae Won KWON ; Byung Uk CHOI ; Yong Pil CHO ; Ho Sung KIM ; Geun Eun KIM
Journal of the Korean Society for Vascular Surgery 1997;13(1):8-14
Incidence of vascular diseases in Korea has been increasing and their researches are undertaken actively. However, experience of single institute about various vascular diseases is to be limited, a nationwide vascular registry is needed for sharing common protocols and experiences. We devolped a customized vascular registry program calling VasBase for nation-wide sharing and analysis. The characteristics of VasBase are as follows; clinician-oriented intuitive software, complete adherence to vascular protocols based on practical experiences, error-free input by presetting numeric codes, data protection, multi-user tasking, integration of graphic data, open source, easy modification of protocol and one-step export to statistical analysis software. We propose this VasBase as a nation-wide vascular registry program.
Computer Security
;
Incidence
;
Korea
;
Vascular Diseases
5.Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment.
Jae Dong LEE ; Tae Sik YOON ; Seung Hyun CHUNG ; Hyo Soung CHA
Healthcare Informatics Research 2015;21(4):271-282
OBJECTIVES: Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. METHODS: This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. RESULTS: The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. CONCLUSIONS: The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.
Computer Security
;
Confidentiality
;
Humans
;
Internet*
;
Medical Staff
;
Pliability
;
Telemedicine
6.A practicable model of a secure electronic medical record system.
Yuan-zhong ZHU ; Le-Haiz ZHONG
Chinese Journal of Medical Instrumentation 2006;30(5):379-382
In this article, a new application model has been given for digital signing technology used in the Electronic Medical Record system, which uses digital signature to implement authentication mechanism and doctor signing, and uses a notarial digital signature server to implement the third party's digital signature for notarial mechanism. It can prevent the others from modifying the doctor's record and prevent the doctor himself from modifying the record as well. Case history database preserves signed data to ensure the authenticity and validity, in law, of the Electronic Medical Record.
Computer Security
;
Medical Records Systems, Computerized
;
Programming Languages
;
Software
7.IHE ITI-ATNA profile-based solution for the security of regional healthcare information sharing.
Chinese Journal of Medical Instrumentation 2008;32(5):332-336
In designing and implementing regional healthcare information sharing systems, the security problem is a very important issue. According to the Audit Trail and Node Authentication (ATNA) Profile of Integrating the Healthcare Enterprise (IHE) and the practical experiences in several hospitals in Shanghai, a Proxy/Server based security solution for the integration of regional healthcare information sharing systems is proposed, which can solve the cross-platform security problems of integration, providing some security measures such as Central User Authentication, Audit Trail and Node Authentication.
Computer Security
;
Information Dissemination
;
Medical Informatics
;
instrumentation
;
methods
8.How to establish the hospital information system security policies.
Chinese Journal of Medical Instrumentation 2008;32(2):124-130
It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.
Computer Security
;
Hospital Information Systems
;
organization & administration
;
Policy
9.The design and implementation of DICOM Server Mediate Layer.
Jian-jiang YE ; Jin-yan ZHANG ; Chen-hui ZHAO
Chinese Journal of Medical Instrumentation 2002;26(4):271-274
A DICOM Server Mediate Layer is introduced in this paper. It communicates with modalities according to DICOM3.0 standard on the one hand, provides a simple way to interface with other application on the other hand, this mades the implementation of DICOM service much easier for other applications.
Computer Communication Networks
;
instrumentation
;
Computer Security
;
Computer Systems
;
Computers
;
Equipment Design
;
Radiology Information Systems
;
Software
10.The safety situation of the digital hospital and its countermeasures.
Min WANG ; Yi GE ; Hou-bing DENG ; Xiang-jun LI
Chinese Journal of Medical Instrumentation 2006;30(3):213-214
This article introduces briefly the content of the disaster backup technology which should be attached same great importance to, as the construction and application of a information system.
Automatic Data Processing
;
instrumentation
;
Computer Security
;
Hospital Information Systems
;
organization & administration
;
Humans
;
Risk Adjustment
;
methods
;
Security Measures
;
Software