Method for Building Cloud-Based Medical Image Database for Protection of Patient Information and Reading Medical Image Therefrom

ABSTRACT

Provided is a method of building a cloud-based medical image database for protecting patient information and reading medical image therefrom, the method including: acquiring a medical image of a patient by using a medical apparatus; separating medical information data and patient information data from the medical image; encrypting the patient information data by using a block chain technique; separately transmitting the encrypted patient information data and the medical information data to the cloud-based medical image database, and storing the same in the cloud-based medical image database; decrypting the encrypted patient information data stored in the cloud-based medical image database by using a block chain technique; and performing diagnosis and consulting by reading the medical information data and the patient information data of the medical image according to a big data processing algorithm. Therefore, the method may protect patient&#39;s personal information and determine the cause and progress of a disease.

TECHNICAL FIELD

The present disclosure relates to a method of building a cloud-basedmedical image database for protecting patient information and reading amedical image therefrom, and more particularly, to a method of buildinga cloud-based medical image database for protecting patient informationand reading a medical image therefrom, which may protect patient'spersonal information and determine the cause and progress of a diseaseby extracting patient information data inserted into the medical imagewhen storing, in the cloud-based medical image database, the medicalimage acquired for diagnosing or treating a patient, encrypting thepatient information data by using a block chain encryption technique totransmit and store the same, and decrypting the patient information databy using a block chain decryption technique.

BACKGROUND ART

Nowadays, medical organizations build medical information systems andcomputerize all processes and records including reception, examinations,prescriptions, treatment, hospitalization, hospital departures,inspection results, etc. for patients by using digital technology.Specifically, a picture archiving and communications system (PACS),which is a medical image processing system, transmitting an imagecaptured by X-ray, CT, or MRI, and a hospital information system (HIS),which is a hospital information system integrating all of these, belongto a medical information system.

However, although the building of medical information systems is anadvantage in public health improvement, it involves much risk in termsof personal information protection.

This is because medical information including patient information datanot only includes specialized information having a public interestrelated to the physical body of an individual patient, but alsoinformation needing special protection among personal information. Sincethis digital patient information data is easy to duplicate, in the casewhere personal information leaks out or inaccurate information isproduced, there is a possibility that people's personal privacy may beinfringed upon. Therefore, there is a need for effective technologywhich may protect personal information such as patient information dataand prevent infringement of people's privacy.

As technology of the related art for improving the above technology, amethod of sharing medical information and a system for sharing medicalinformation are known from U.S. Patent Publication No. 2002/0035485.

U.S. Patent Publication No. 2002/0035485, which is a known technology,is technology providing a method of sharing medical information, themethod including: registering unique physical feature information of apatient, for example, fingerprints, a voice, an iris of an eye, and aneye fundus image together with medical information of the patient in adatabase connected to a server, the server being a medical dataproviding source; allowing a terminal requesting medical data to requesta server, the server being a medical data information source, totransmit medical information of a patient through a communicationnetwork; transmitting physical feature information read from a patient;comparing the physical feature information transmitted from the terminalwith physical feature information stored in the database; and when thephysical feature information from the terminal and the physical featureinformation stored in the database coincide with each other according toa result of the comparison, transmitting the medical information of thepatient stored in the database from the server to the terminal throughthe communication network.

However, in the case of receiving required patient information data, theknown technology provides not only treatment progress data of a patientbut also pure personal information such as a name, gender, address,phone number, resident registration number, insurance number, birthday,etc. of an individual patient. In this case, although a medical serviceis not a service for identifying an individual patient, patient'spersonal information is exposed.

Also, as another technology of a related art for resolving the aboveproblem, a medical information system and a method for providing medicalinformation, for protecting personal information and supporting medicalstudies, are known from Korean Publication No. 10-2005-0032690.

The medical information providing system of the known technologyaccording to the other related art discriminates a patient's personalidentification information from non-personal identification information,and provides the patient's medical information through a communicationnetwork. The medical information providing system includes: a personalidentification information database stored in a patient terminal held bya patient and storing the patient's personal identification data; anon-personal identification information database stored in the patientterminal and storing the patient's non-personal identificationinformation; a treatment code generator issuing a treatment code fortreatment of the patient at a hospital; a treatment information databasestoring the patient's treatment data at the hospital; a studyinformation database storing data studied by using the treatment codeand the treatment data together with the patient's non-personalidentification information; and a treatment code list database stored inthe patient terminal and the hospital and storing the issued treatmentcode. The medical information providing system may prevent the patient'spersonal information from leaking out by allowing non-personalidentification information separated from the patient's personalidentification information to be provided together with the treatmentcode when the patient's medical information is used for medical studies.

However, the known technology according to the other related artprotects patient's personal information by simply separating patientinformation data, and separately managing the non-personalidentification information separated from the patient's personalidentification information, and the treatment code, when using thepatient information data for a medical purpose. Therefore, the knowntechnology according to the other related art is different fromtechnology which allows patient information data acquired through amedical apparatus not to be duplicated, and also guaranteesirreversibility such that personal information is not modulated.

As technology for preventing duplication and modulation, block chainencryption technology recently applied to bitcoin, which is an on-linevirtual currency, is widely used. There is also a need for technologywhich may maintain security of patient information data, block hacking,and transparently record data through the block chain encryptiontechnology.

DESCRIPTION OF EMBODIMENTS Technical Problem

The present disclosure aims to protect patient's personal information byextracting patient information data inserted into a medical image,encrypting the patient's personal information by using a block chainencryption technique to transmit and store the same, and decrypting thepatients personal information by using a block chain decryptiontechnique.

Solution to Problem

According to an aspect of the present disclosure, a method of buildingcloud-based medical image database for protecting patient informationand reading medical image therefrom, includes: acquiring a patient'smedical image by using a medical apparatus; separating medicalinformation data and patient information data from the medical image;encrypting the patient information data by using a block chaintechnique; separately transmitting the encrypted patient informationdata and the medical information data to a cloud-based medical imagedatabase, and storing the same in the cloud-based medical imagedatabase; decrypting the encrypted patient information data stored inthe cloud-based medical image database by using the block chaintechnique; and performing diagnosis and consulting by reading themedical information data and the patient information data of the medicalimage according to a big data processing algorithm.

Advantageous Effects of Disclosure

Therefore, according to a method of building a cloud-based medical imagedatabase for protecting patient information, patient information dataacquired by a medical apparatus cannot be duplicated, andirreversibility is guaranteed such that personal information cannot bemodulated.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a flowchart of a method of building a cloud-based medicalimage database for protecting patient information and reading a medicalimage therefrom, according to an embodiment.

FIG. 2 is a view of an example of a flow of a patient information datablock made as a chain configuration by a block chain technique,according to an embodiment.

FIG. 3 is a view of an example of an inner structure, verification, andelectronic signature of a patient information data block, according toan embodiment.

MODE OF DISCLOSURE

Terms and words used for the present specification and claims should notbe limited to general or dictionary meanings, and should be construed asmeanings and concepts matching a technical spirit of the presentdisclosure based on a principle that the inventor may properly defineconcepts of terms to explain his or her disclosure in a best method.

Therefore, since embodiments described in the present specification anda configuration illustrated in the drawings are only most preferredembodiments and do not represent all technical spirits of the presentdisclosure, it should be understood that various equivalents andmodifications which may replace the embodiments may exist at the time offiling of the present application.

Hereinafter, a preferred embodiment of the present disclosure isdescribed in detail with reference to the accompanying drawings.

FIG. 1 is a flowchart of a method of building a cloud-based medicalimage database for protecting patient information and reading a medicalimage therefrom according to an embodiment.

As illustrated, a method of building a cloud-based medical imagedatabase for protecting patient information and reading a medical imagetherefrom, includes: acquiring a patient's medical image by using amedical apparatus (S110); separating medical information data andpatient information data from the medical image (S120); encrypting thepatient information data by using a block chain technique (S130);separately transmitting the encrypted patient information data andmedical information data to a cloud-based medical image database andstoring the same (S140); requesting the encrypted patient informationdata stored in the cloud-based medical image database, and decryptingthe same by using the block chain technique (S150); and performingdiagnosis and consulting by reading the medical image including themedical information data and the patient information data according to abig data processing algorithm (S160).

The method is described below in detail.

In operation S110 of acquiring a medical image of a patient by using amedical apparatus, the medical apparatus collectively denotes medicalapparatuses such as medical cameras, medical scanners, X-rays,computerized tomography (CT), magnetic resonance imaging (MRI),ultrasonic capturing apparatuses, and microscopes for clinicalinspection which may acquire a medical image of a patient through amedical apparatus.

Also, the medical image acquired by the medical apparatus includes animage in which pure medical information data is combined with patientinformation data.

In this case, the patient information data of the medical image includesnot only a name, address, and resident registration number of thepatient, and unique personal information of the patient inserted to themedical image, but also at least one of bio-feature information requiredfor identifying the patient. Also, the medical image may further includeat least one of a reading history, a generation history, a treatmentrecord, an access record of the medical image, and location informationof an area where the medical image has been generated. The patientinformation data of the medical image may be automatically inserted whenthe medical image is generated, or may be arbitrarily added and insertedwhen the medical image is generated.

After that, operation S120 is performed, operation S120 separatingmedical information data including only pure medical information, andthe patient information data from the medical image, and storing thesame.

The medical image is generally stored as a digital data file, and puremedical information data may be discriminated and separated from patientinformation data, and stored by using a file processing technique fordigital data of the medical image.

However, in the case where the medical image is film data, forseparation of the pure medical information data from the patientinformation data, the patient information data is separated and acquiredby using text conversion technology which utilizes an OCR algorithm anda pattern recognition algorithm.

Operation S130 encrypts only the patient information data of the medicalimage data stored in operation S120 by using the block chain encryptingtechnique.

The above-mentioned block chain is a term used for a bitcoin, which is akind of virtual currencies recently appearing, and the bitcoin denotestechnology preventing double payment by using a P2P network. Also, theblock chain is also called a ‘public transaction book’. This literallymeans managing with a transaction book open to the public.

The present disclosure uses the term ‘block chain’ in the sense that amedical personnel stores and manages patient information data in amedical image acquired from the medical apparatus like the concept of apublic transaction book of the block chain.

FIG. 2 is a view of an example of a flow of a patient information datablock made as a chain configuration by a block chain technique accordingto an embodiment.

As illustrated, it may be considered that the patient information datainserted into each medical image is made as a block based on patientinformation data generated from an initial medical image.

No. 1 of the illustration denotes genesis block data of the patientinformation data generated from the initial medical image, and patientinformation data thereon cannot be made without the No. 1 data.Therefore, each patient information data includes information ofprevious patient information data and such data gather to form aninformation chain of patient information data. This may be referred toas a patient information data chain for a medical image.

No. 2 to No. 9 of the illustration are interpreted by a hash algorithmcorresponding to the block chain decryption, and denote blocks of newlyupdated patient information data, and patient information data blockswhich are parts of an actual patient information data chain. Therefore,the relevant patient information data becomes informationsecurity-verified by a relevant network.

Also, patient information data blocks of No. 10 to No. 14 are patientinformation data blocks which have failed in security verificationcorresponding to the block chain decryption and thus failed to become apart of the patient information data chain, that is, patient informationdata blocks which cannot be shared and acknowledged in a network.Therefore, the patient information data may be discarded or cannot bestored and recorded, or cannot be used.

A chain including the No. 1, which is initially created patientinformation data, and the patient information data, which have won thesecurity verification, is denoted by a ‘main chain’, and patientinformation data, which is not classified to the main chain, is denotedby ‘orphan/stale/invalid block’. Therefore, only data details includedin main chain patient information data are acknowledged as valid.

FIG. 3 is a view of an example of an inner structure, verification, andelectronic signature of a patient information data block according to anembodiment.

As illustrated, it is known that the patient information data ishash-encrypted inside the patient information data block, and suchencrypted patient information data are connected through a public keyand an electronic signature for each medical personnel. Therefore, whenprevious patient information data is absent, next patient informationdata cannot be produced. Therefore, respective data are all connectedand verify validity of the other data. When data is considered toinclude discordance details based on existing patient information datadetails, relevant data is processed as being erroneous.

In other words, the patient information data is defined as a sequence ofdigital signatures, and respective encryption key owners add a nextowner's public key to previous transaction details, and then make adigital signature which encrypts the same with their secret key, andturn over the patient information data.

Therefore, it means that each medical personnel may view the patientinformation data through verification of a public key and a signatureinside the patient information data block in the patient informationdata chain.

Also, applying the block chain encryption of the patient informationdata means that a hash algorithm is applied to each element of thepatient information data, and the each element of the patientinformation data is made as a block and processed as a chain through apublic key and an electronic signature.

The hash algorithm for the patient information data according to anembodiment uses one of one-direction hash algorithms which receive amessage having an arbitrary length and change the message to an outputvalue of a fixed length through a hash algorithm function. For example,for the hash algorithm, one of message digest 4 (MD4), MD5, secure hashalgorithm (SHA)-1, SHA-256, and SHA-512 is used.

After that, operation S140 separately transmits the encrypted patientinformation data and the medical information data to a cloud-basedmedical image database and stores the same. In this case, thecloud-based medical image database is a storage which is distributed asa peer-to-peer on a network and is accessible by a specific individualor a medical personnel.

Operation S150 decrypts the encrypted patient information data blockstored in the cloud-based medical image database by using the blockchain technique. This means downloading the encrypted patientinformation data block stored in the patient information data blockchain to decrypt the encrypted patient information data, and processingthe same through the block chain decrypting technique by using apersonal key and an electronic signature of the medical personnel asillustrated in FIG. 3.

Operation S160 acquires the medical image from the cloud-based medicalimage database based on the decrypted patient information data, readsmedical image data and the patient information data, and performs adiagnosis and consulting by a medical personnel.

In this case, the medical image may be read and diagnosis and consultingmay be performed according to a big data processing algorithm based onthe medical image and the patient information data.

Therefore, the present disclosure provides a method of building acloud-based medical image database for protecting patient informationand reading a medical image therefrom, which may protect a patient'spersonal information and determine the cause and progress of a disease,by extracting patient information data inserted to a medical image,encrypting the patient information data by using the block chainencrypting technique to transmit and store the same, and decrypting thepatient information data by using the block chain decrypting technique.

While the present disclosure has been particularly shown and describedwith reference to embodiments thereof, the present disclosure is notlimited thereto and it will be understood by those of ordinary skill inthe art that various changes in form and details may be made thereinwithout departing from the spirit and scope of the following claims.

1. A method of budding a cloud-based database, using a server, forprotecting patient information and reading a medical image therefrom,the method comprising: acquiring a first medical image of a patient byusing a medical apparatus corresponding to a first medical personnel;and generating a first block of a main chain by adding a public key of asecond medical personnel assigned to receive and access the firstmedical image on a first patient information data generated from thefirst medical image.
 2. The method of claim 1, wherein the medical imageis an image in which the medical information data is combined with thepatient information data, the medical information data being acquired byone of a medical camera, a medical scanner, an X-ray, computerizedtomography (CT), magnetic resonance imaging (MRI), an ultrasoniccapturing apparatus, and a microscope for clinical inspection.
 3. Themethod of claim 1, wherein the patient information data of the medicalimage comprises at least one of personal information of the patient orbio-feature information for identifying the patient both being insertedinto the medical image, and further comprises at least one of a readinghistory, a generation history, a treatment record, an access record ofthe medical image, and location information of an area where the medicalimage was generated.
 4. The method of claim 1, wherein when the medicalimage is film data, to separate the medical information data and thepatient information data, the patient information data is acquired byusing text conversion technology which utilizes an OCR algorithm and apattern recognition algorithm.
 5. The method of claim 1, wherein thegenerating further comprises: separating a first medical informationdata and the first patient information data from the first medicalimage.
 6. The method of claim 1, wherein generating further comprises:applying a hash algorithm to the first patient information data; andadding the public key of the second medical personnel on the hashedfirst patient information data and encrypting through a digitalsignature using a private key of the first medical personnel.
 7. Themethod of claim 6, wherein generating a first block of main chain byencrypting through a digital signature using a private key of the firstmedical personnel.
 8. The method of claim 1, wherein further comprisesacquiring a second medical image of the patient using a medical devicecorresponding to the second medical personnel; separating a secondmedical information data and a second patient information data from thesecond medical image; applying a hash algorithm to the second patientinformation data; generating a second block by adding a public key of athird medical personnel on the hashed second patient information dataand encrypting through a digital signature using a private key of thesecond medical personnel;
 9. The method of claim 8, wherein furthercomprises verifying the second block by decrypting the second blockencrypted through the digital signature using the public key of thesecond medical personnel applied to the first block.
 10. The method ofclaim 9, wherein the verifying further comprises: if the decryption issuccessful, determining the second block as a valid block, connectingthe second block to the main chain, transmitting and storing the mainchain to which the second block is connected and the second medicalinformation data to the cloud-based database, and if the decryptionfails, determining the second block as an invalid block and discardingthe second patient information data.
 11. The method of claim 10, whereinthe verifying further comprises: downloading a block of the main chainfrom the cloud-based database; decrypting the downloaded block using aprivate key of medical personnel used for encryption of the downloadedblock; and identifying the medical information data and the patientinformation data of the medical image corresponding to the decryptedblock of the main chain.
 12. The method of claim 11, wherein thecloud-based database is a storage which is distributed peer-to-peer on anetwork and is accessible by a medical personnel.