1.Expert consensus on ethical requirements for artificial intelligence (AI) processing medical data.
Cong LI ; Xiao-Yan ZHANG ; Yun-Hong WU ; Xiao-Lei YANG ; Hua-Rong YU ; Hong-Bo JIN ; Ying-Bo LI ; Zhao-Hui ZHU ; Rui LIU ; Na LIU ; Yi XIE ; Lin-Li LYU ; Xin-Hong ZHU ; Hong TANG ; Hong-Fang LI ; Hong-Li LI ; Xiang-Jun ZENG ; Zai-Xing CHEN ; Xiao-Fang FAN ; Yan WANG ; Zhi-Juan WU ; Zun-Qiu WU ; Ya-Qun GUAN ; Ming-Ming XUE ; Bin LUO ; Ai-Mei WANG ; Xin-Wang YANG ; Ying YING ; Xiu-Hong YANG ; Xin-Zhong HUANG ; Ming-Fei LANG ; Shi-Min CHEN ; Huan-Huan ZHANG ; Zhong ZHANG ; Wu HUANG ; Guo-Biao XU ; Jia-Qi LIU ; Tao SONG ; Jing XIAO ; Yun-Long XIA ; You-Fei GUAN ; Liang ZHU
Acta Physiologica Sinica 2024;76(6):937-942
As artificial intelligence technology rapidly advances, its deployment within the medical sector presents substantial ethical challenges. Consequently, it becomes crucial to create a standardized, transparent, and secure framework for processing medical data. This includes setting the ethical boundaries for medical artificial intelligence and safeguarding both patient rights and data integrity. This consensus governs every facet of medical data handling through artificial intelligence, encompassing data gathering, processing, storage, transmission, utilization, and sharing. Its purpose is to ensure the management of medical data adheres to ethical standards and legal requirements, while safeguarding patient privacy and data security. Concurrently, the principles of compliance with the law, patient privacy respect, patient interest protection, and safety and reliability are underscored. Key issues such as informed consent, data usage, intellectual property protection, conflict of interest, and benefit sharing are examined in depth. The enactment of this expert consensus is intended to foster the profound integration and sustainable advancement of artificial intelligence within the medical domain, while simultaneously ensuring that artificial intelligence adheres strictly to the relevant ethical norms and legal frameworks during the processing of medical data.
Artificial Intelligence/legislation & jurisprudence*
;
Humans
;
Consensus
;
Computer Security/standards*
;
Confidentiality/ethics*
;
Informed Consent/ethics*
2.Relative security of health care big data protection.
Journal of Zhejiang University. Medical sciences 2018;47(6):563-576
With China's implementing big data strategy, health care becomes one of the key areas in which the national big data strategy is highly promoted. However, as the health care big data industry grows rapidly, the security risk is increasingly prominent and the internet plus medical care makes the protection of health care big data more complicated. By analyzing the current situation of health care big data security protection, the article proposes the viewpoint of relative security and suggests the strategies and key issues of health care big data protection. From the aspects of legal supervision, talents cultivation, publicity and education, and key data protection, it is necessary to build the prevention and control system for health care big data security, so that the security risk can be reduced and the data utility can be maximized.
Big Data
;
China
;
Computer Security
;
standards
;
Health Care Sector
;
standards
;
Internet
3.Information safety test of digital medical device.
Chinese Journal of Medical Instrumentation 2014;38(4):282-286
According to the background of the age of big data, the medical devices are informatized, we analyze the safety and efficiency for the information and data of digital medical devices or medical systems, also discussed some test methods. Lack of a suitable standard system of digital medical devices is a big problem both for domain standard and international standard. GB25000.51 is too ambiguous and free for testing, also not very operational. So this paper suggested some test advices and some prospective method. These test methods are helpful for finding the problem and performing the standards. What's more, these methods are famous in the world and used widely in the 3C region but just start in the medical region, which can promote the development of the medical devices.
Computer Security
;
standards
;
Equipment and Supplies
;
standards
4.Research and implementation of the TLS network transport security technology based on DICOM standard.
Xiaoqi LU ; Lei WANG ; Jianfeng ZHAO
Journal of Biomedical Engineering 2012;29(1):23-28
With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.
Computer Security
;
standards
;
Diagnostic Imaging
;
Hospital Information Systems
;
Information Storage and Retrieval
;
methods
;
standards
;
Radiology Information Systems
;
standards
;
Remote Consultation
;
methods
;
standards
5.A medical image authentication method based on restorable watermarking.
Jian GONG ; Xiao-Yan ZHONG ; Qian-Jin FENG
Journal of Southern Medical University 2008;28(6):959-962
In this paper, a restorable watermarking algorithm is proposed for medical image content authentication. Important DWT coefficients are chosen to be coded with the SPIHT algorithm for generating watermarking. The improved security watermark scrambled by Arnold transformation was then embedded into the lower bits of the image data. Finally, the chain structure was used to detect the watermarking and identify the altered positions. The altered data in an image was restored by SPIHT decoding. The experimental results demonstrated that the watermarked image not only possessed good perceptual transparence but also allowed location and restoration of the tampered content.
Algorithms
;
Biomedical Engineering
;
Computer Security
;
Diagnostic Imaging
;
standards
;
statistics & numerical data
;
Image Interpretation, Computer-Assisted
;
methods
;
Medical Records Systems, Computerized
;
organization & administration
;
standards
6.Research on the security of medical image information and its related processing technologies.
Chinese Journal of Medical Instrumentation 2006;30(2):94-96
This paper introduces the regulations and standards of medical information security in the applications, the challenges and the processing technologies in regard to the security of medical image information.
Computer Security
;
Hospital Information Systems
;
organization & administration
;
Information Storage and Retrieval
;
methods
;
Management Information Systems
;
Radiology Information Systems
;
organization & administration
;
standards
;
Safety Management
7.Study on network architecture of a tele-medical information sharing platform.
Lin PAN ; Lun YU ; Jin-xiong CHEN
Chinese Journal of Medical Instrumentation 2006;30(4):293-295
In the article,a plan of network construction which satisfies the demand of applications for a telemedical information sharing platform is proposed. We choice network access plans in view of user actual situation, through the analysis of the service demand and many kinds of network access technologies. Hospital servers that locate in LAN link sharing platform with node servers, should separate from the broadband network of sharing platform in order to ensure the security of the internal hospital network and the administration management. We use the VPN technology to realize the safe transmission of information in the platform network. Preliminary experiments have proved the plan is practicable.
Computer Communication Networks
;
Computer Security
;
standards
;
Hospital Information Systems
;
Humans
;
Information Storage and Retrieval
;
methods
;
Internet
;
Radiology Information Systems
;
Telemedicine
;
methods
;
standards
;
User-Computer Interface
8.Research on testing the robustness of DICOM-e-mail secure teleradiology systems.
O Li-ji CAO ; Jun ZHAO ; Tian-ge ZHUANG
Chinese Journal of Medical Instrumentation 2006;30(4):280-252
DICOM-e-mail is a secure teleradiology protocol released by German Radiology Society and has already been applied clinically. To improve the robustness of the system, the protocol has been upgraded by adding some mechanisms such as system feedback. Moreover, a test method is also implemented by sending erroneous mails to application software that supports DICOM-e-mail. Through the tests for two different DICOM-e-mail teleradiology application, the validity of the new protocol is proved and at the same time some bugs are found. The implementation of the latest protocol and the general error tests can help to make the whole teleradiology system a better robustness. The implementation of DICOM-e-mail protocol in our country is also discussed in this paper.
Computer Communication Networks
;
standards
;
Computer Security
;
standards
;
Electronic Mail
;
standards
;
Humans
;
Internet
;
Radiology Information Systems
;
standards
;
Software
;
Teleradiology
Result Analysis
Print
Save
E-mail