• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Implementation of An Automatic Authentication System Based on Patient’s Situations and Its Performance Evaluation


Gyu-Sung Ham, Su-Chong Joo, Journal of Internet Computing and Services, Vol. 21, No. 4, pp. 25-34, Aug. 2020
10.7472/jksii.2020.21.4.25, Full Text:
Keywords: Automatic Authentication System, Patient’s Situation, Authentication Service application, Medical Information System Emergency Decisions, Executability Verification

Abstract

In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient‘s situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff’s role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Gyu-Sung Ham and Su-Chong Joo (2020). Implementation of An Automatic Authentication System Based on Patient’s Situations and Its Performance Evaluation. Journal of Internet Computing and Services, 21(4), 25-34. DOI: 10.7472/jksii.2020.21.4.25.

[IEEE Style]
G. Ham and S. Joo, "Implementation of An Automatic Authentication System Based on Patient’s Situations and Its Performance Evaluation," Journal of Internet Computing and Services, vol. 21, no. 4, pp. 25-34, 2020. DOI: 10.7472/jksii.2020.21.4.25.

[ACM Style]
Gyu-Sung Ham and Su-Chong Joo. 2020. Implementation of An Automatic Authentication System Based on Patient’s Situations and Its Performance Evaluation. Journal of Internet Computing and Services, 21, 4, (2020), 25-34. DOI: 10.7472/jksii.2020.21.4.25.