NTP network time server (network clock source) helps electronic signature authentication system

ntp network time server (network clock source) helps the electronic signature authentication system
ntp network time server (network clock source) helps the electronic signature authentication system

A large number of documents in the hospital information system require medical staff to sign and submit, and the signers need to bear corresponding legal responsibilities for the signed documents. How to judge the validity and legality of the identity of the signing subject and the authenticity of the signature are issues that must be considered by the electronic medical record system, and it is necessary to ensure that all data in signed medical documents cannot be modified so that records can be ensured during traceability and verification. unique and credible.

The problem of accurate medical operation time In order to accurately grasp the development of the patient's condition, electronic medical records are required to record the time of medical operation in detail and accurately. Since electronic data can be modified without trace on computer systems and carriers, when used as direct evidence, it is often not accepted due to its uncertainty and counter-evidence. Therefore, it is necessary to use a time stamp service provided by a legal and authoritative time agency to ensure the validity of the operation time. The 3W (when, who, what) characteristics of legal evidence are unique. The evidence that needs to be produced can determine when, who issued it, and what the content is. Uncertainty in any of these elements will lead to insufficient evidence. If it cannot be determined, then the evidence can be cited as counter-evidence, which will lead to a lack of evidence and difficulty in producing evidence.

In a broad sense, electronic authentication includes computer passwords, biometric handwriting recognition, fingerprint recognition, iris perspective recognition, facial pattern recognition and other technologies. At present, the use of authentication based on public key infrastructure (PKI) is the most mature and effective technology to solve the security risks of electronic medical records. Through the electronic certification provided by authoritative digital certificate issuance and management agencies recognized by the government, we will build a hospital electronic certification system to solve security issues such as identity authentication, authorization management, and responsibility determination, establish an effective legal protection mechanism, and strengthen the application security of hospital information systems. manage.
Electronic certification is an encryption technology with electronic certification certificates (also known as digital certificates) as the core technology. It is based on PKI technology and encrypts, decrypts, digitally signs and Digital verification ensures the confidentiality, integrity and non-repudiation of information transmitted online and ensures the security of system applications.

(1) Digital certificate

  1. The concept of digital certificate A digital certificate is a file that contains public key owner information and public key digitally signed by a certificate authority, identifying the identity information of a certain subject (individual, organization, server, etc.). Digital certificate owners use digital certificates to identify themselves online, and use certificates to perform information encryption, digital signatures (with electronic official seals) and other related operations.

  2. Principle of digital certificate Digital certificate adopts public key system, using a pair of matching keys (public key and private key) for encryption and decryption. Each user sets a private key (private key) known only to himself and uses it for decryption and signing; at the same time, he sets a public key (public key) and makes it public for encryption and signing. Verify signature. When sending a confidential document, the sender uses the recipient's public key to encrypt the data, and the recipient uses his or her private key to decrypt it. The encryption process is irreversible, that is, it can only be decrypted with the private key, thus ensuring the security of the information.

  3. The composition of a digital certificate. A digital certificate mainly contains the basic information of the certificate issuer, the basic information of the owner and the public key. The format of the certificate follows the ITUT X.509 international standard. It includes the version information of the certificate, the serial number of the certificate, the signature algorithm used by the certificate, the name of the issuing authority of the certificate, the validity period of the certificate, the name of the certificate owner, the public key of the certificate owner, and the signature of the certificate issuer.

  4. The functions of digital certificates ① Identity confirmation: The recipient can confirm the identity of the sender through the digital certificate; ② Confidentiality: The certificate encrypts the information, and the information cannot be stolen by others except the recipient; ③ Integrity: Use the certificate to verify the information Sign to ensure that the information is not tampered with during transmission; ④ Non-repudiation: The sender cannot deny the information it sends.

Guess you like

Origin blog.csdn.net/weixin_44990608/article/details/132336116