• Title/Summary/Keyword: 의료기기 보안

Search Result 73, Processing Time 0.02 seconds

A study on the Applicability of Software International Standards for SaMD's Cybersecurity Regulation (SaMD의 사이버보안 규제에 대한 소프트웨어 국제표준의 적용 가능성에 대한 연구)

  • Lee Young Kim;Youngjoo Chung;Gyu Ha Ryu;Baek Hwan Cho
    • Journal of Information Technology Services
    • /
    • v.22 no.4
    • /
    • pp.21-35
    • /
    • 2023
  • Software as Medical Devices (SaMD) is a growing category of medical devices that are composed of software to perform one or more medical purposes. SaMD is less likely to cause physical harm compared to conventional medical devices, particularly medical electrical equipments, and may be more vulnerable to privacy issues. This difference was acknowledged and resulted in introducing new regulation guidance specifically for cybersecurity of SaMD. It guides stakeholders of SaMD what to consider in what context in terms of cybersecurity. This study examines the current guidance of how cybersecurity is considered for SaMD by analyzing current medical device standards, then suggest which concept or details beyond current medical device standards may be applicable through analysis of international standards documents published for software in general.

Security issues and requirements for cloud-based u-Healthcare System (클라우드기반 u-헬스케어 시스템을 위한 보안 이슈 및 요구사항 분석)

  • Lee, Young Sil;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.299-302
    • /
    • 2014
  • Due to the convergence between digital devices and the development of wireless communication technology, bit-signal sensor miniaturization, building an Electronic Medical Record (EMR) which is a digital version of a paper chart that contains all of a patient's medical history and the information of Electronic Health Record (EHR), Ubiquitous healthcare (u-Healthcare) that can monitor their health status and provide personal healthcare service anytime and anywhere. Also, the appearance of cloud computing technology is one of the factors that accelerate the development of u-healthcare service. However, if the individual information to be used maliciously during the u-healthcare service utilization, leads to serious problems directly related to the individual's life because if it goes beyond the level of simple health screening and treatment, it may not provide accurate and reliable healthcare services. For this reason, we analyzed a variety of security issues related to u-healthcare service in cloud computing environment and described about directions of secure health information sharing system construction. In addition, we suggest the future developmental direction for th activation of u-healthcare industry.

  • PDF

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

A Study on the Factors Affecting User Behavior of Internet Medical Apps (인터넷 의료 애플리케이션 사용 행위에 영향을 미치는 요소에 관한 연구)

  • Han, Xiao;Lee, Hong;Kim, Hyeong-woo
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.81-90
    • /
    • 2020
  • Due to the recent economic development and the improvement of income level in China, the desire for quality medical services is increasing compared to the past. As an alternative to satisfy these needs, various applications using smart phones and the like are being developed. The new corona that occurred in December 2019 began to show great interest in non-face-to-face telemedicine services using smart phones due to the worldwide spread of the coronavirus. Therefore, in this study, a total of 200 people were surveyed on the top three mobile medical applications in China, and the data of 120 people who actually used medical applications were analyzed based on Venkatesh's UTAUT2 theory. A study was conducted on the intent to use and the factors affecting the in-law behavior. First, it has become clear that the interactive characteristics, expectations for effort, price value, interest in privacy, habits, and promotional conditions have a positive impact on the user's use. Second, it was investigated that the user's intention to use influences the behavior of use, and among the intentions of use, it was found that the mobilization characteristic expectation, hedonistic motivation, price value, habits, and promotion conditions affect the use behavior. Third, a study result was derived that the controlling variables such as gender, age, school age, and annual income do not affect the user's intention to use mobile medical applications as a controlling variable. Finally, due to the nature of mobile devices that use the Internet, various security vulnerabilities exist, and this can cause great damage or personal and social impact. Therefore, for the development of mobile medical services in China, it is necessary to re-establish a research model through comprehensive and in-depth considerations to supplement these problems in the future.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

IT KOREA 미래전략의 성공적 추진을 위한 R&D 발전방향

  • Kim, Heung-Nam
    • Information and Communications Magazine
    • /
    • v.27 no.1
    • /
    • pp.21-27
    • /
    • 2009
  • IT KOREA 미래전략 '5대 핵심과제'의 전략분야별 주요 이슈와 현재 R&D현장에서 추진 중이거나 추진 예정으로 있는 연구개발 방향과 유망기술에 대해 간략히 살펴보고자 한다. IT융합 부문은 IT와 상호 Win-Win 가능한 자동차 조선 의료 등 비(非)IT산업의 IT융합을 촉진하고, 시스템반도체 스마트SOC Green IT 등을 고도화한다는 전략을 토대로 4개 전략분야에서 23개의 유망기술을 발굴 제시하였다. SW 부문은 IT 분야 중 가장 취약한 것으로 평가되고 있는 SW산업을 하드웨어 인프라 등과 연계하여 세계시장 진출이 가능한 수준으로 동반성장 시킨다는 전략을 기반으로 R&D 연관성이 높은 2개 전략분야에서 11개의 유망기술을 발굴 제시하였다. 주력 IT기기 부문은 반도체 디스플레이 휴대폰 등 이미 세계 시장에서 독자적 위치를 차지하고 있는 하드웨어산업의 글로벌 주도권을 더욱 확고히 한다는 전략에 따라 5개 전략분야에서 유망기술 10개를 발굴 제시하였다. 방송통신 부문은 WiBro DMB 등 세계적 수준의 방송통신기술을 바탕으로 4G 3DTV 등 차세대 방송통신기술의 핵심원천기술을 개발하고, 국제표준을 확보한다는 전략을 기반으로 4개 전략분야에서 유망기술 8개를 발굴 제시하였다. 인터넷 부문은 UBcN 미래인터넷 정보보안 등을 대상으로 하고 있으며, 특히 미래인터넷의 경우, 초기 개발단계부터 핵심원천기술 확보를 목표로 시스코 구글 등과 같은 세계적인 기업들을 배출할 수 있는 여건을 조성한다는 전략에 따라 4개 전략분야에서 유망기술 8개를 발굴 제시하였다.

A Design and Development of Secure-Coding Check System Based on E-Government Standard Framework for Convergence E-Government Service (융복합 전자정부 서비스를 위한 전자정부 표준프레임워크 기반 시큐어코딩 점검 시스템 설계 및 개발)

  • Kim, Hyungjoo;Kang, Jungho;Kim, Kyounghun;Lee, Jaeseung;Jun, Moonseog
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.201-208
    • /
    • 2015
  • Recently computer, smart phone, medical devices, etc has become used in a variety of environments as the application fields of IT products have become diversification. Attack case of abuse of software security vulnerabilities is on the increase as the application fields of software have become diversification. Accordingly, secure coding program is of a varied but history management, updating, API module to be vulnerable to attack. Thus, this paper proposed a materialization of CMS linked system to enable check the vulnerability of the source code to content unit for secure software development, configuration management system that interwork on the transmission module. Implemented an efficient coding system secure way that departmentalized by the function of the program and by analyzing and applying secure coding standards.

Performance Comparison of Machine Learning Algorithms for Network Traffic Security in Medical Equipment (의료기기 네트워크 트래픽 보안 관련 머신러닝 알고리즘 성능 비교)

  • Seung Hyoung Ko;Joon Ho Park;Da Woon Wang;Eun Seok Kang;Hyun Wook Han
    • Journal of Information Technology Services
    • /
    • v.22 no.5
    • /
    • pp.99-108
    • /
    • 2023
  • As the computerization of hospitals becomes more advanced, security issues regarding data generated from various medical devices within hospitals are gradually increasing. For example, because hospital data contains a variety of personal information, attempts to attack it have been continuously made. In order to safely protect data from external attacks, each hospital has formed an internal team to continuously monitor whether the computer network is safely protected. However, there are limits to how humans can monitor attacks that occur on networks within hospitals in real time. Recently, artificial intelligence models have shown excellent performance in detecting outliers. In this paper, an experiment was conducted to verify how well an artificial intelligence model classifies normal and abnormal data in network traffic data generated from medical devices. There are several models used for outlier detection, but among them, Random Forest and Tabnet were used. Tabnet is a deep learning algorithm related to receive and classify structured data. Two algorithms were trained using open traffic network data, and the classification accuracy of the model was measured using test data. As a result, the random forest algorithm showed a classification accuracy of 93%, and Tapnet showed a classification accuracy of 99%. Therefore, it is expected that most outliers that may occur in a hospital network can be detected using an excellent algorithm such as Tabnet.

Development of Standard Process for Private Information Protection of Medical Imaging Issuance (개인정보 보호를 위한 의료영상 발급 표준 업무절차 개발연구)

  • Park, Bum-Jin;Yoo, Beong-Gyu;Lee, Jong-Seok;Jeong, Jae-Ho;Son, Gi-Gyeong;Kang, Hee-Doo
    • Journal of radiological science and technology
    • /
    • v.32 no.3
    • /
    • pp.335-341
    • /
    • 2009
  • Purpose : The medical imaging issuance is changed from conventional film method to Digital Compact Disk solution because of development on IT technology. However other medical record department's are undergoing identification check through and through whereas medical imaging department cannot afford to do that. So, we examine present applicant's recognition of private intelligence safeguard, and medical imaging issuance condition by CD & DVD medium toward various medical facility and then perform comparative analysis associated with domestic and foreign law & recommendation, lastly suggest standard for medical imaging issuance and process relate with internal environment. Materials and methods : First, we surveyed issuance process & required documents when situation of medical image issuance in the metropolitan medical facility by wire telephone between 2008.6.1$\sim$2008.7.1. in accordance with the medical law Article 21$\sim$clause 2, suggested standard through applicant's required documents occasionally - (1) in the event of oneself $\rightarrow$ verifying identification, (2) in the event of family $\rightarrow$ verifying applicant identification & family relations document (health insurance card, attested copy, and so on), (3) third person or representative $\rightarrow$ verifying applicant identification & letter of attorney & certificate of one's seal impression. Second, also checked required documents of applicant in accordance with upper standard when situation of medical image issuance in Kyung-hee university medical center during 3 month 2008.5.1$\sim$2008.7.31. Third, developed a work process by triangular position of issuance procedure for situation when verifying required documents & management of unpreparedness. Result : Look all over the our manufactured output in the hospital - satisfy the all conditions $\rightarrow$ 4 place(12%), possibly request everyone $\rightarrow$ 4 place(12%), and apply in the clinic section $\rightarrow$ 9 place(27%) that does not medical imaging issuance office, so we don't know about required documents condition. and look into whether meet or not the applicant's required documents on upper 3month survey - satisfy the all conditions $\rightarrow$ 629 case(49%), prepare a one part $\rightarrow$ 416 case(33%), insufficiency of all document $\rightarrow$ 226case(18%). On the authority of upper research result, we are establishing the service model mapping for objective reception when image export situation through triangular position of issuance procedure and reduce of friction with patient and promote the patient convenience. Conclusion : The PACS is classified under medical machinery that mean indicates about higher importance of medical information therefore medical information administrator's who already received professional education & mind, are performer about issuance process only and also have to provide under ID checking process exhaustively.

  • PDF

A Study on the Microstructure Properties of $SnO_2$ Gas Sensors Fabricated by Sol-Gel Method (졸-겔법으로 제작된 $SnO_2$ 가스센서의 미세구조 특성에 관한 연구)

  • Jang, K.U.;Kim, M.H.;Lee, W.J.;Lee, H.S.;Kim, T.W.;Chung, D.H.;Ahn, J.H.;Lee, S.I.;Kim, S.K.
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2005.05b
    • /
    • pp.102-105
    • /
    • 2005
  • 가스센서는 응용 분야와 기능 및 종류가 다양하고 최첨단 분야로서 학문적으로는 물리, 화학, 전기, 전자 및 기계 등의 배경을 필요로 하며 산업적으로는 공업 전 분야와 농림, 축산, 사무기기에서 뿐만 아니라 공해 방진용(자동차 연소제어 및 배출가스 제어, 대기오염 감시등), 민생용(조리, 환기, 공조 등), 교통 보안용(음주운전측정 및 음주운전 방지장치 등), 방재용(가스 누설 탐지기, 불완전 연소 방지, 산소 결핍, 화재 등), 의료용(호기, 마취가스의 분석 등) 매우 광범위하며 점점 더 확대되어 가고 있다. 본 연구에서는 검출 가스 종류에 따라 졸-겔법으로 감응막을 최적 설계하고, 최적으로 설계된 감응막을 디핑법으로 코팅처리한 후 최적으로 열처리하여 센서를 제작하였다. 또한, 자체 제작한 가스검출 시스템에 제작된 센서를 장착하여 센서의 가스 검출 특성을 측정하고, 측정 데이터를 이용하여 휴대용 가스 검출 시스템을 설계 제작하였다.

  • PDF