• Title/Summary/Keyword: Health Smart Card system

Search Result 4, Processing Time 0.022 seconds

Influencing Factors for Adoption of Smart Cards in Hospitals (종합병원 전자건강카드 도입에 영향을 미치는 요인)

  • Ahn, Lee-Su;Yoon, Seok-Jun;Ahn, Hyeong-Sik;Hong, Seok-Won
    • Quality Improvement in Health Care
    • /
    • v.12 no.2
    • /
    • pp.113-123
    • /
    • 2006
  • Objective : This research is focused on understanding the current status of the Health Smart Card already in use in other advanced countries. This research will analyze the current status of the medical institutions Health Smart Card system adoption process and its effects, and provide a basis for future policy decisions for the effective adoption and diffusion of a Health Smart Card system, in the medical field, through the completed research and analysis. Method : This research surveys the domestic, and foreign, status of Health Smart Card usage. The research also presents up-to-date methodology for the evaluation of the effects of medical and health care technology. The research also conducts a survey of the domestic medical institutions that have implemented a Health Smart Card system, and then analyzes the results of the survey. Additionally, the research carried out a survey and analysis of medical institutions with no Health Smart Card system implemented, and considered the factors affecting the diffusion of Health Smart Card systems in considering an effective policy for the introduction and diffusion of such a system. Research Results : Through the study of the methodology of medical and health care information technology in advanced countries, the methodology for assessing Health Smart Card technology has been established, and focuses on 6 aspects. The study on the status of foreign implementation has shown a model for the Health Smart Card system. A survey was conducted on the current status of medical institutions with an implemented Health Smart Card system, and the survey results have been analyzed. Also, factors influencing the adoption of Health Smart Card systems have been analyzed through the survey on those medical institutions that have not implemented a Health Smart Card system. Conclusion : The government must provide institutional measures for sharing medical records by constructing an IT infrastructure at the national level to enable the adoption and diffusion of a Health Smart Card system. Such a network will make connections between medical institutions possible, thus making the diffusion of the Health Smart Card system nationwide. For the successful adoption and diffusion of a Health Smart Card system, a model system development, under a medical record sharing system, should be conducted. Additionally, a regional unit based model should be developed for the model project, as is done in advanced countries, along with the application of such results.

  • PDF

Cryptanalysis and Improvement of RSA-based Authentication Scheme for Telecare Medical Information Systems

  • Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.93-103
    • /
    • 2020
  • The telecare medical information system (TMIS) supports convenient and rapid health-care services. A secure and efficient authentication and key agreement scheme for TMIS provides safeguarding electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Giri et al. proposed an RSA-based remote user authentication scheme using smart cards for TMIS and claimed that their scheme could resist various malicious attacks. In this paper, we point out that their scheme is still vulnerable to lost smart card attacks and replay attacks and propose an improved scheme to prevent the shortcomings. As compared with the previous authentication schemes for TMIS, the proposed scheme is more secure and practical.

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS

  • Liu, Xiaoxue;Li, Yanping;Qu, Juan;Ding, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.924-944
    • /
    • 2017
  • Telecare Medical Information System (TMIS) helps the patients to gain the health monitoring information at home and access medical services over the mobile Internet. In 2015, Das et al proposed a secure and robust user AKA scheme for hierarchical multi-medical server environment in TMIS, referred to as DAKA protocol, and claimed that their protocol is against all possible attacks. In this paper, we first analyze and show DAKA protocol is vulnerable to internal attacks, impersonation attacks and stolen smart card attack. Furthermore, DAKA protocol also cannot provide confidentiality. We then propose a lightweight pseudonym AKA protocol for multi-medical server architecture in TMIS (short for PAKA). Our PAKA protocol not only keeps good security features declared by DAKA protocol, but also truly provides patient's anonymity by using pseudonym to protect sensitive information from illegal interception. Besides, our PAKA protocol can realize authentication and key agreement with energy-saving, extremely low computation cost, communication cost and fewer storage resources in smart card, medical servers and physical servers. What's more, the PAKA protocol is proved secure against known possible attacks by using Burrows-Abadi-Needham (BAN) logic. As a result, these features make PAKA protocol is very suitable for computation-limited mobile device.