• 제목/요약/키워드: Health Smart Card system

검색결과 4건 처리시간 0.022초

종합병원 전자건강카드 도입에 영향을 미치는 요인 (Influencing Factors for Adoption of Smart Cards in Hospitals)

  • 안이수;윤석준;안형식;홍석원
    • 한국의료질향상학회지
    • /
    • 제12권2호
    • /
    • pp.113-123
    • /
    • 2006
  • Objective : This research is focused on understanding the current status of the Health Smart Card already in use in other advanced countries. This research will analyze the current status of the medical institutions Health Smart Card system adoption process and its effects, and provide a basis for future policy decisions for the effective adoption and diffusion of a Health Smart Card system, in the medical field, through the completed research and analysis. Method : This research surveys the domestic, and foreign, status of Health Smart Card usage. The research also presents up-to-date methodology for the evaluation of the effects of medical and health care technology. The research also conducts a survey of the domestic medical institutions that have implemented a Health Smart Card system, and then analyzes the results of the survey. Additionally, the research carried out a survey and analysis of medical institutions with no Health Smart Card system implemented, and considered the factors affecting the diffusion of Health Smart Card systems in considering an effective policy for the introduction and diffusion of such a system. Research Results : Through the study of the methodology of medical and health care information technology in advanced countries, the methodology for assessing Health Smart Card technology has been established, and focuses on 6 aspects. The study on the status of foreign implementation has shown a model for the Health Smart Card system. A survey was conducted on the current status of medical institutions with an implemented Health Smart Card system, and the survey results have been analyzed. Also, factors influencing the adoption of Health Smart Card systems have been analyzed through the survey on those medical institutions that have not implemented a Health Smart Card system. Conclusion : The government must provide institutional measures for sharing medical records by constructing an IT infrastructure at the national level to enable the adoption and diffusion of a Health Smart Card system. Such a network will make connections between medical institutions possible, thus making the diffusion of the Health Smart Card system nationwide. For the successful adoption and diffusion of a Health Smart Card system, a model system development, under a medical record sharing system, should be conducted. Additionally, a regional unit based model should be developed for the model project, as is done in advanced countries, along with the application of such results.

  • PDF

Cryptanalysis and Improvement of RSA-based Authentication Scheme for Telecare Medical Information Systems

  • Kim, Keewon
    • 한국컴퓨터정보학회논문지
    • /
    • 제25권2호
    • /
    • pp.93-103
    • /
    • 2020
  • 원격 의료 정보 시스템(TMIS; Telecare Medical Information System)은 편리하고 빠른 헬스 케어(health-care) 서비스를 제공한다. 원격 의료 정보 시스템을 위한 안전하고 효율적인 인증 및 키 합의 기법은 전자 환자 기록(EPR; Electronic Patient Record)을 안전하게 보호하고, 헬스케어 종사자와 의료진이 신속하고 정확하게 임상 의사결정(clinical decision)을 할 수 있도록 도와준다. Giri 등은 원격 의료 정보 시스템을 위한 스마트 카드(smart card)를 이용한 RSA기반 원격 사용자 인증 기법을 제안하였으며, 제안한 기법이 다양한 악의적인 공격에 강인하다고 주장하였다. 본 논문에서는 그들의 기법이 여전히 스마트 카드 분실 공격(lost smart card attack)과 재전송 공격(replay attack)에 취약함을 보이고, 그러한 단점을 개선한 기법을 제안한다. 기존의 원격 의료 정보 시스템을 위한 인증 기법들과 안전성을 비교한 결과를 보면, 제안한 기법이 더욱 안전하고 실용적이다.

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 추계학술발표대회
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS

  • Liu, Xiaoxue;Li, Yanping;Qu, Juan;Ding, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.924-944
    • /
    • 2017
  • Telecare Medical Information System (TMIS) helps the patients to gain the health monitoring information at home and access medical services over the mobile Internet. In 2015, Das et al proposed a secure and robust user AKA scheme for hierarchical multi-medical server environment in TMIS, referred to as DAKA protocol, and claimed that their protocol is against all possible attacks. In this paper, we first analyze and show DAKA protocol is vulnerable to internal attacks, impersonation attacks and stolen smart card attack. Furthermore, DAKA protocol also cannot provide confidentiality. We then propose a lightweight pseudonym AKA protocol for multi-medical server architecture in TMIS (short for PAKA). Our PAKA protocol not only keeps good security features declared by DAKA protocol, but also truly provides patient's anonymity by using pseudonym to protect sensitive information from illegal interception. Besides, our PAKA protocol can realize authentication and key agreement with energy-saving, extremely low computation cost, communication cost and fewer storage resources in smart card, medical servers and physical servers. What's more, the PAKA protocol is proved secure against known possible attacks by using Burrows-Abadi-Needham (BAN) logic. As a result, these features make PAKA protocol is very suitable for computation-limited mobile device.