Disclosure of Invention
The present invention is directed to overcome the above-mentioned deficiencies in the prior art, and provides a medical scanning imaging system, a method for managing permissions, an electronic device, and a storage medium, which can improve the convenience of an authorized user logging in a system while avoiding the misoperation of an unauthorized user.
In order to achieve the purpose, the invention is realized by the following technical scheme: a medical scanning imaging system comprising a rights management subsystem, a console subsystem, a scanning subsystem and a user identification subsystem having a number of biosensors, the rights management subsystem being functionally connected to the console subsystem, the scanning subsystem and the user identification subsystem;
the user identification subsystem is configured to acquire biological information of an operating user of the console subsystem and/or the scanning subsystem;
and the authority management subsystem is configured to judge whether the operation user is an authorized user according to the biological information, and unlock the corresponding operation authority of the authorized user on the console subsystem and/or the scanning subsystem if the operation user is the authorized user.
Optionally, the biosensor comprises a camera device, a fingerprint sensing device, a palm print sensor and/or a voice print sensor;
the biological information includes information relating to a face, a pupil, a fingerprint, a palm print, and/or a voice print of the operation user.
Optionally, the right management subsystem includes a user-right database, and the user-right database stores second virtual biological information, authorized user information, right information, and corresponding relationship thereof;
the authority management subsystem is configured to judge whether the operation user is an authorized user or not according to the biological information, and comprises
And judging whether second virtual biological information corresponding to the biological information exists in the user-authority database or not according to the biological information, if so, the operating user is an authorized user, obtaining the authorized user information, obtaining the authority information of the authorized user according to the authorized user information, the authority information and the corresponding relation thereof, and unlocking the corresponding operating authority of the authorized user to the console subsystem and/or the scanning subsystem according to the authority information.
Optionally, the rights information includes user administrative rights, scanning rights, custom scanning protocol rights, image viewing rights, planning and executing a scanning or reconstruction scheme, and/or print film.
Optionally, the medical scanning imaging system further comprises system software, a number of first human-machine interaction controls corresponding to the console subsystem, and a number of second human-machine interaction controls corresponding to the scanning subsystem, for performing respective operations on the console subsystem and/or the scanning subsystem;
the unlocking the corresponding operation authority of the authorized user on the console subsystem comprises the following steps:
unlocking the corresponding operation authority of the system software, the first human-computer interaction control and/or the second human-computer interaction control.
Optionally, the authority management subsystem is further configured to determine whether a preset locking condition is met after unlocking the corresponding operation authority of the authorized user on the console subsystem and/or the scanning subsystem, and if yes, re-lock the console subsystem and/or the scanning subsystem.
Optionally, the preset locking condition includes:
for the system software, the authority management subsystem receives a locking instruction, the operation times of an unauthorized user are greater than a first threshold value or no authorized user operates the system software within a first preset time length of unlocking the system software;
and/or for the first human-computer interaction control, the authority management subsystem receives a locking instruction, the operation times of an unauthorized user are greater than a second threshold value or the first human-computer interaction control is not operated by the authorized user within a second preset time length for unlocking the first human-computer interaction control;
and/or for the second human-computer interaction control, the authority management subsystem receives a locking instruction, the operation times of unauthorized users are greater than a third threshold value, or no authorized user operates the second human-computer interaction control within a third preset time length for unlocking the second human-computer interaction control.
Optionally, before unlocking the corresponding operation authority of the authorized user on the console subsystem and/or the scanning subsystem, the authority management subsystem is further configured to determine a single user/multi-user mode of the medical scanning imaging system:
if the medical scanning imaging system runs in a single-user operation mode, judging whether the operating user and an authorized user currently logging in the system software are the same user, and if so, unlocking the corresponding operation authority of the operating user on the console subsystem and/or the scanning subsystem;
and if the medical scanning imaging system runs in a multi-user operation mode, unlocking the corresponding operation authority of the operation user on the console subsystem and/or the scanning subsystem.
Optionally, each of the first human-machine interaction controls and/or each of the second human-machine interaction controls has a unique human-machine interaction control identification code;
the authority management subsystem is further configured to save user information, operation time and the human-computer interaction control identification code of an authorized user when the authorized user operates the first human-computer interaction control and/or the second human-computer interaction control.
According to another aspect of the present invention, there is provided a method for managing rights, which is used in the medical scanning imaging system described in any one of the above aspects, the method including:
acquiring biological information of an operating user of the console subsystem or the scanning subsystem;
and judging whether the operating user is an authorized user or not according to the biological information, and if so, unlocking the corresponding operating authority of the authorized user to the console subsystem and/or the scanning subsystem.
Based on the same inventive concept, the present invention also provides an electronic device, which comprises a processor and a storage device, wherein the processor is adapted to implement instructions, the storage device is adapted to store a plurality of instructions, the instructions are adapted to be loaded by the processor, and any one of the steps of the rights management method described above is provided.
Based on the same inventive concept, the present invention also provides a computer-readable storage medium, on which computer-executable instructions are stored, and when the computer-executable instructions are executed, the steps of the rights management method described in any one of the above are implemented.
Compared with the prior art, the medical scanning imaging system provided by the invention has the following beneficial effects:
1. the medical scanning imaging system provided by the invention comprises a right management subsystem, a console subsystem, a scanning subsystem and a user identification subsystem with a plurality of biosensors, wherein the right management subsystem is functionally connected with the console subsystem, the scanning subsystem and the user identification subsystem; the user identification subsystem is configured to acquire biometric information of an operating user of the console subsystem or the scanning subsystem; and the authority management subsystem is configured to judge whether the operation user is an authorized user according to the biological information, and unlock the corresponding operation authority of the authorized user on the console subsystem and/or the scanning subsystem if the operation user is the authorized user. The medical scanning imaging system provided by the invention realizes the discrimination of authorized users and unauthorized users by carrying out biological identification on operation users: the operation of the console subsystem and/or the scanning subsystem of the medical scanning imaging system by the unauthorized user is ignored, and only the operation of the authorized user with the operation authority is responded. Compared with the mode that system software in the prior art needs to manually input an account number password, the medical scanning imaging system provided by the invention can automatically identify the real identity of an operating user, automatically unlock the corresponding authority, does not need to authorize the user to manually input the password, is simple, convenient and quick, greatly improves the system login efficiency, and can identify the real identity of an actual operator.
2. The medical scanning imaging system provided by the invention can identify the real identity of the operation user of the human-computer interaction component according to the biological information of the operation user, and avoids the risk of unexpected system occurrence caused by misoperation of an unauthorized user.
3. The medical scanning imaging system provided by the invention identifies the operating user according to the biological information, not only avoids the risk of leakage of account passwords, but also can track the actual operating user, and is beneficial to use supervision and information backtracking.
4. The rights management subsystem of the medical scanning imaging system provided by the invention is further configured to: and after unlocking the corresponding operation authority of the authorized user on the console subsystem and/or the scanning subsystem, judging whether a preset locking condition is met, and if so, re-locking the console subsystem and/or the scanning subsystem. The operation safety of the medical scanning imaging system is further improved; the medical scanning imaging system can be automatically locked within a certain preset time after the console subsystem and/or the scanning subsystem are unlocked, so that biological information does not need to be identified within a certain time range, the authentication process of the medical scanning imaging system is simplified, and the response efficiency is improved. The medical scanning imaging system after locking needs to perform the authentication process of whether the operation user is an authorized user again.
5. The medical scanning imaging system provided by the invention can provide different user modes for different application scenes, and each user mode adopts different processing modes, so that the management configurability and the operation convenience of authorized users of the medical scanning imaging system are further improved.
Since the right management method, the electronic device and the storage medium provided by the present invention have the same specific technical features as the medical scanning imaging system provided by the present invention, and belong to the same inventive concept, the right management method, the electronic device and the storage medium provided by the present invention at least have the same beneficial effects as the medical scanning imaging system provided by the present invention, and are not described herein again.
Detailed Description
To make the objects, advantages and features of the present invention clearer, a medical scanning imaging system, a rights management method, an electronic device and a storage medium according to the present invention will be described in further detail with reference to the accompanying drawings. It will be apparent that the methods described herein comprise a series of steps and that the order of such steps presented herein is not necessarily the only order in which such steps may be performed, and that some of the described steps may be omitted and/or some other steps not described herein may be added to the methods. Further, the described embodiments are only some embodiments of the invention, not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Before explaining the medical scanning imaging system, the rights management method, the electronic device and the storage medium provided by the present invention in detail, it should be especially noted that the medical scanning imaging system includes, but is not limited to, a CT system, a PET-CT system, an MR system, etc. For convenience of understanding and description, the following embodiments are described by taking a CT system as an example, and those skilled in the art will understand that this is not a limitation of the present invention, and the core idea of the present invention is similar to the principle of the CT system in MR, PET-CT, etc., and will not be described again.
< example one >
Referring to fig. 1, fig. 1 is a schematic structural diagram of a medical scanning imaging system (taking a CT system as an example) provided in this embodiment, and as can be seen from fig. 1, the medical scanning imaging system provided in this embodiment includes arights management subsystem 100, aconsole subsystem 200, ascanning subsystem 300, and a user identification subsystem having a plurality ofbiosensors 400, where therights management subsystem 100 is functionally connected to theconsole subsystem 200, thescanning subsystem 300, and the user identification subsystem. Preferably, theconsole subsystem 200 is located in a different space than thescanning subsystem 300, such as theconsole subsystem 200 is located in an operating room, thescanning subsystem 300 is located in a scanning room, and thebiosensor 400 is located in the operating room and/or the scanning room.
In particular, the user identification subsystem is configured to obtain biometric information of an operating user of theconsole subsystem 200 or thescanning subsystem 300. Therights management subsystem 100 is configured to: and judging whether the operation user is an authorized user or not according to the biological information, and unlocking the corresponding operation authority of the authorized user to theconsole subsystem 200 and/or thescanning subsystem 300 if the operation user is the authorized user. Preferably, in one preferred embodiment, if it is determined that the operating user is an unauthorized user, the current operation of the operating user is ignored.
The medical scanning imaging system provided by the invention is additionally provided with abiosensor 400 on the basis of the traditional medical scanning imaging system, and the biological acquisition function of thebiosensor 400 is combined with the management function of theauthority management subsystem 100. With the configuration, the medical scanning imaging system provided by the invention realizes discrimination between authorized users and unauthorized users by carrying out biological identification on operation users: the operation of theconsole subsystem 200 and/or the scanning subsystem of the medical scanning imaging system by the unauthorized user is ignored, and only the operation of the authorized user with the operation authority is responded. Compared with the mode that system software in an operation room needs to manually input an account number password in the prior art, the medical scanning imaging system can automatically identify the real identity of an operation user, automatically unlock the corresponding authority, does not need to authorize the user to manually input the password, is simple, convenient and quick, greatly improves the system login efficiency, and can identify the real identity of an actual operator; furthermore, for the scanning room with more people coming in and going out, the medical scanning imaging system provided by the invention can identify the real identity of the operation user of the human-computer interaction part, and avoids the risk of unexpected system occurrence caused by misoperation of an unauthorized user; furthermore, the medical scanning imaging system provided by the invention identifies the operating user according to the biological information, so that the risk of leakage of the account password is well avoided, the actual operating user can be tracked, and the use supervision and the information backtracking are facilitated.
Preferably, in one exemplary embodiment, thebiosensor 400 includes a camera device, a fingerprint sensor device, a palm print sensor and/or a voice print sensor; the biological information includes information relating to a face, a pupil, a fingerprint, a palm print, and/or a voice print of the operation user. It can be understood that the unique and non-reproducible characteristics of human biological features, such as face (human face), pupil, fingerprint, palm print and/or vocal print, inherently provide the necessary premise for identity authentication. The biometric technology is a relatively mature technology, which is a technology using the inherent biometric characteristics (biometrics) of the human body, and is a technology using the inherent physiological characteristics or behavior characteristics of the human body to identify the identity of an individual. In practical applications, the virtual biological information of the face and the pupil (face image) can be acquired by the camera device, the virtual biological information related to the fingerprint (fingerprint image) is acquired by the fingerprint sensor, the virtual biological information of the palm print is acquired by the palm print sensor, and/or the virtual biological information of the voice print is acquired by the voice print sensor. With the configuration, the medical scanning imaging system provided by the invention can ensure that the user is an authorized user with corresponding operation authority through the biological characteristics of the human body, and can manage the use information of the actual operation user.
For convenience of understanding and description, a camera is taken as the biosensor and a human face is taken as the biological information, which are obviously only exemplary of the preferred embodiments and not limiting of the invention.
Specifically, therights management subsystem 100 includes a user-rights database, in which second virtual biological information, authorized user information, rights information, and a corresponding relationship thereof are stored. Theauthority management subsystem 100 is configured to determine whether the operating user is an authorized user according to the biological information, and if so, unlock the corresponding operating authority of the authorized user on the console subsystem and/or the scanning subsystem, specifically including:
judging whether second virtual biological information corresponding to the biological information exists in the user-authority database according to the biological information:
if so, the operating user is an authorized user, the authorized user information is obtained, the authority information of the authorized user is obtained according to the authorized user information, the authority information and the corresponding relation of the authority information, and the corresponding operating authority of the authorized user on theconsole subsystem 200 and/or thescanning subsystem 300 is unlocked according to the authority information;
if not, the operation user is an unauthorized user, and the operation of the operation user is ignored.
In particular, if the operating user is an unauthorized user, the biometric information of the operating user obtained when the operating user actively accesses/operates theconsole subsystem 200 and/or thescanning subsystem 300 may be implemented by ignoring the current operation of the operating user. Further, for the biological information of the operating user obtained when the operating user does not actively access/operate theconsole subsystem 200 and/or the scanning subsystem 300: for example, when an unauthorized user such as a family member of a patient or a patient (who does not actively access/operate theconsole subsystem 200 and/or the scanning subsystem 300) enters a scanning room, the imaging device provided in the scanning room actively acquires biometric information of the unauthorized user such as the family member of the patient or the patient, and the authority of theconsole subsystem 200 and/or thescanning subsystem 300 is in a locked state for the family member of the patient or the patient. When an authorized user such as an operating user (e.g., a doctor with scanning authority) enters a scanning room, the authorization user's biometric information actively acquired by the imaging device provided in the scanning room is automatically unlocked by the authority of theconsole subsystem 200 and/or thescanning subsystem 300.
Preferably, in one exemplary embodiment, the user-right database of theright management subsystem 100 includes a first database, and the first database stores a plurality of second virtual biological information, and authorized user information corresponding to the second virtual biological information. Accordingly, the method of determining whether the second virtual biometric information corresponding to the biometric information exists in the user-right database is: extracting the characteristics of the biological information to obtain first virtual biological information, searching whether second virtual biological information matched with the first virtual biological information exists in the first database, and if so, determining that the operating user is an authorized user; otherwise, the operation user is an unauthorized user. According to the basic principle of face recognition: and comparing the human face features to be recognized with the obtained human face feature template, and judging the identity information of the human face according to the similarity degree. Preferably, in a preferred embodiment, the determining whether the user is an authorized user by the first virtual biological information and the first database is performed substantially as follows: and searching and matching the extracted feature data (first virtual biological information) of the face image with a feature template (second virtual biological information) stored in a first database, and outputting a matching result when the similarity between the extracted feature data (first virtual biological information) of the face image and the feature template (second virtual biological information) stored in the first database exceeds a threshold value, namely judging that the operating user is an authorized user and unlocking the corresponding operation authority of the authorized user on the console subsystem and/or the scanning subsystem. It is to be understood that the present invention is not limited to the matching method of the first virtual biological information and the second virtual biological information: whether the verification method by one-to-one comparison or the identification method by one-to-many matching comparison, or even a combination of both, is within the scope of the present invention.
Specifically, the first database stores a plurality of second virtual biological information and user information corresponding to the second virtual biological information, and includes: the first database stores at least the following list: a virtual biological information list configured to record a correspondence of a virtual biological information ID with second virtual biological information, the virtual biological information list defining a virtual biological information list supported by the medical scanning imaging system. A user-virtual biometric information list configured to record a correspondence of an authorized user ID of an authorized user with the virtual biometric information ID. Referring to fig. 2, fig. 2 is a schematic view of virtual biological information of a user in a first database according to an embodiment of the present invention, and as described above, a face recognition is taken as an example for exemplary explanation here, in this embodiment, the face information ID in fig. 2 is the virtual biological information ID, and the face information is the second virtual biological information. As one of the preferred embodiments, the biometric information in the biometric information list may record the name of the authorized user, and the biometric information in the dedicated biometric information database will be recorded and associated with the authorized user, such as storing the face picture information of the authorized user with the name of the authorized user. In the user-virtual biometric information list, the authorized user ID is a Primary Key (PK, Primary Key), and in the virtual biometric information list, the face information ID is a Primary Key, wherein, as will be understood by those skilled in the art, the Primary Key is one or more fields in the user-virtual biometric information list, and the value of the Primary Key is used for uniquely identifying a record in the table. In this instance, preferably, the user information list is a data table in the second database, and the association is established between the data table in the first database and the data table in the second database by the authorized user ID.
Preferably, in one exemplary embodiment, the user-right database of theright management subsystem 100 further includes a second database, and the second database stores a plurality of user information and right information corresponding to the user information. The unlocking the corresponding operation authority of the authorized user on the console subsystem and/or the scanning subsystem comprises:
acquiring authority information corresponding to the authorized user in the second database according to the user information of the authorized user; and unlocking the corresponding operation authority of the authorized user on the console subsystem and/or the scanning subsystem according to the authority information. Preferably, the rights information includes user administrative rights, scanning rights, custom scanning protocol rights, image viewing rights, planning and executing a scanning or reconstruction scheme, and/or print film. For example, in the operating room, an authorized user may operate the medical scanning imaging system through a keyboard, a mouse, etc. on a software interface, perform patient registration management, plan and execute a scanning or reconstruction scheme, browse images, print films, etc.; the scanning related operation needs to be completed only by the cooperation of the operation of a software interface and the operation of a control of the scanning control box. In the scanning room, the user can control the movement of the sickbed and the machine frame through the touch screen DDP, the control panel, the pedals and other components. It will be understood by those skilled in the art that the foregoing is only illustrative of the preferred embodiments and is not limiting of the invention.
Preferably, in an exemplary implementation manner, referring to fig. 3, fig. 3 is a schematic diagram illustrating user right information in a second database according to an embodiment of the present invention. The second database stores a plurality of user information and authority information corresponding to the user information, and the second database stores the following list: and the authority list is configured to record the corresponding relation between the operation authority ID and the authority information, and the authority list is used for defining the authority list supported by the medical scanning imaging system, and comprises but not limited to user management authority, scanning authority, customized scanning protocol authority, image browsing authority and/or the like. And the user group list is configured to record the corresponding relation between the user group ID and the user group information, and the user group list is used for defining the user group list supported by the medical scanning imaging system, such as an administrator group, a technician group and the like. The user information list is configured to record a corresponding relation between an authorized user ID of an authorized user and user information, the user information list is used for defining an authorized user list of the medical scanning imaging system, such as Zhang III, Liqu and the like, and the user information comprises the authorized user ID, an authorized user name, a user password and the like. And a user group-right list configured to record a correspondence relationship between the user group ID and an operation right ID authorized by the user group ID. The user group-right list is used for defining a right list for each user group, such as all rights are shared by the administrator group, only the scanning right and the image browsing right are shared by the technician group, and the like. In this case, a user group (e.g. administrator group) may have a plurality of operation permission IDs, and preferably, the user group permission IDs are used as primary keys, that is: the different user group permission IDs identify the corresponding relations of the different user group IDs and the operation permission IDs. A user-user group list configured to record correspondence between authorized user IDs and user group IDs to which the authorized user IDs belong, the user-user group list defining user groups to which each authorized user belongs (and enjoying the authority of the user group), such as a zhangsan affiliate administrator group, such as a lissajouaffiliate technician group, etc., it can be understood that the same authorized user may belong to multiple user groups, such as zhangsan affiliate administrator group and a physician group, preferably, using the user-user group IDs as primary keys, that is: different user-user group IDs identify different user group IDs and operating rights correspondences. With such configuration, the functions of the information lists in the first database and the second database of the medical scanning imaging system provided by the invention are focused, the columns of the tables are reasonably arranged, the coupling degree of the information lists is low, and the maintenance and the management are convenient. It will be understood by those skilled in the art that the first database and the second database and the respective data tables in the first database and the second database are only descriptions of the preferred embodiment, but not limitations, and in other embodiments, there may be only one database, or even more than two databases.
Specifically, the obtaining, in the second database, the right information corresponding to the authorized user according to the user information of the authorized user includes the following steps:
firstly, according to the second virtual biological information matched with the first virtual biological information, searching a corresponding virtual biological information ID in the virtual biological information list, as described above, in this embodiment, the face information ID is the virtual biological information ID; secondly, according to the virtual biological information ID, obtaining an authorized user ID of the operating user in the user-virtual biological information list; next, based on the authorized user ID, in the user-user group list
Searching the user group ID to which the user group ID belongs; then, according to the found user group ID, the user uses the user group ID
Acquiring an operation authority ID corresponding to the user group-authority list; finally, according to the obtained operation
And making an authority ID, and acquiring the authority information corresponding to the authorized user in the authority list.
Referring to fig. 4, fig. 4 is a schematic view of a biosensor of the medical scanning imaging system according to the present embodiment, and thebiosensor 400 of the present embodiment is described by taking a camera as an example.
Preferably, in one exemplary embodiment, the medical scanning imaging system further comprises system software, a number of first human-machine interaction controls corresponding to theconsole subsystem 200, and a number of second human-machine interaction controls corresponding to thescanning subsystem 300, for performing respective operations on theconsole subsystem 200 and/orscanning subsystem 300; the unlocking the corresponding operation authority of the authorized user on the console subsystem comprises the following steps: unlocking the corresponding operation authority of the system software, the first human-computer interaction control and/or the second human-computer interaction control.
Specifically, in one exemplary embodiment, the first human-machine interaction control comprises a control host, a keyboard, a mouse, a display and a control box of theconsole subsystem 200, and the biosensor is disposed above and/or in front of the control host, the keyboard, the mouse, the display and/or the control box; wherein, the control box is used for controlling the movement (entering the bed, getting out of the bed, adjusting up and down, etc.) of the sickbed. For example, if the operation user a is an authorized user and the operation user B is an unauthorized user, the right of the operation user a to operate the control box is unlocked, that is, the operation user a can control the movement of the hospital bed, and the right of the operation user B to operate the control box is locked, that is, the operation of the operation user B on the control box is ignored. It is clear that this is only a description of the preferred embodiment, and in other embodiments the camera may also be positioned above, in front of, etc. the seat of the operating user. Similarly, if the authorized user has the authority of operating the system software, the system software is automatically logged in; and if the authorized user has the authority of operating the first human-computer interaction control, responding the operation of the authorized user by the first human-computer interaction control.
In particular, the number and the arrangement positions of thebiosensors 400 are not limited in the present invention, and the biosensors can be reasonably arranged according to actual situations in specific implementation, and thus, the detailed description is omitted.
Further, in one exemplary embodiment, the second human-machine interaction control comprises a control button of a rack and/or an examination table of thescanning subsystem 300, and thebiosensor 400 is arranged above and/or in front of the rack and/or the examination table; unlocking the corresponding operation permission of the authorized user to thescanning subsystem 300 specifically includes unlocking the corresponding operation permission of the second human-computer interaction control if the authorized user has the permission to operate the second human-computer interaction control, that is, the second human-computer interaction control responds to the operation of the authorized user. In particular, the second human-machine interaction control is used for controlling the rack/examination bed. As described above, thebiosensor 400 is not limited to be disposed above and/or in front of the gantry and/or the couch. For example, in one embodiment, thescanning subsystem 300 includes an X-ray system, a collimator, a slip ring, a detector, a housing, a data display, a couch control button, a control panel, a couch, and a foot pedal, and preferably, the biosensor 400 (e.g., a fingerprint sensor) is disposed on the couch control button.
It should be noted that, the above is only the description of the preferred embodiment, and when the medical scanning imaging system provided by the present invention is applied, the operation permissions of the system software, the first human-computer interaction control and the second human-computer interaction control should be set reasonably according to actual situations. For example, an authorized user with scanning permission may unlock the first human-computer interaction control and the second human-computer interaction control synchronously when unlocking the system software; an authorized user with the unlocking second human-computer interaction control can only unlock the operation authority of the second human-computer interaction control but cannot unlock the system software and the first human-computer interaction control; and an authorized user having the human-computer interaction control can synchronously unlock the first human-computer interaction control and the second human-computer interaction control, but cannot unlock the system software, and so on.
Further, the present invention is not limited to the specific deployment of the system software, for example, in one embodiment, the system software is disposed on theconsole subsystem 200; in another embodiment, the system software resides on thescanning subsystem 300; in another embodiment, theconsole subsystem 200 and thescanning subsystem 300 may also have respective software subsystems, and for the same operating user, the respective software subsystems may have different operating permissions, and the specific embodiments may be flexibly changed from the foregoing disclosure to the other, and are not described herein again.
Preferably, in one exemplary embodiment, therights management subsystem 100 is further configured to: and when the medical scanning imaging system is started, locking the system software, the first human-computer interaction control and the second human-computer interaction control. And after the operation user is judged to be an authorized user, the authority management subsystem is further used for judging whether the authorized user has the scanning authority, and if so, unlocking the first human-computer interaction control and the second human-computer interaction control. With the configuration, the medical scanning imaging system provided by the invention can automatically log in system software of the medical scanning imaging system through face recognition by adding the camera on the basis of the traditional medical scanning imaging system and combining the face recognition of the camera and the authority management function of the medical scanning imaging system without manually inputting a user name and a password by a user, thereby simplifying the information processing flow of theauthority management subsystem 100 and improving the starting response efficiency of the medical scanning imaging system.
Preferably, in one exemplary embodiment, theauthority management subsystem 100 is further configured to determine whether a preset locking condition is met after unlocking the corresponding operation authority of the authorized user on theconsole subsystem 200 and/or thescanning subsystem 300, and if so, re-lock theconsole subsystem 200 and/or thescanning subsystem 300.
Preferably, in one exemplary embodiment, the preset locking condition includes: for the system software, theright management subsystem 100 receives a locking instruction, the number of times of unauthorized user operation is greater than a first threshold, or no authorized user operates the system software within a first preset time period for unlocking the system software. For the first human-computer interaction control, theauthority management subsystem 100 receives a locking instruction, the number of times of unauthorized user operation is greater than a second threshold, or no authorized user operates the first human-computer interaction control within a second preset time length for unlocking the first human-computer interaction control. For the second human-computer interaction control, theright management subsystem 100 receives a locking instruction, the number of times of unauthorized user operation is greater than a third threshold, or no authorized user operates the second human-computer interaction control within a third preset time period for unlocking the second human-computer interaction control.
It should be understood that the above description is only a description of the preferred embodiments, and not a limitation of the present invention, and in other embodiments, the preset locking duration of the first human-machine interaction control and the second human-machine interaction control may be the same. After theconsole subsystem 200 and/or thescanning subsystem 300 are unlocked so as to respond to the operation of an authorized user, theconsole subsystem 200 and/or thescanning subsystem 300 can be locked again in real time at any time according to a locking instruction, and the configuration further improves the operation safety of the medical scanning imaging system; the medical scanning imaging system can also be automatically locked for a certain preset time after theconsole subsystem 200 and/or thescanning subsystem 300 is unlocked, so that the identification of biological information is not required within a certain time range, the authentication process of the medical scanning imaging system is simplified, and the response efficiency is improved. The medical scanning imaging system after locking needs to perform the authentication process of whether the operation user is an authorized user again.
Preferably, in one exemplary embodiment, the first threshold, the second threshold and the third threshold may be the same, for example, 3 times, or the first threshold, the second threshold and the third threshold may be different, and similarly, the first preset time period, the second preset time period and the third preset time period may be the same or different. For example, the first threshold is 3 to 5 times, the second threshold is 5 to 7 times, the third threshold is 3 to 10 times, the first preset time period is 30 to 60 minutes, the second preset time period is 5 to 10 minutes, and/or the third preset time period is 5 to 10 minutes. The preset locking time of the first human-computer interaction control and/or the second human-computer interaction control is far shorter than the preset locking time of the system software, and the medical scanning imaging system provided by the invention fully considers different operating characteristics of the system software, the first human-computer interaction control and the second human-computer interaction control. Of course, a person skilled in the art may adjust the threshold and the preset duration according to actual situations, which is not described herein again.
Further, the present invention does not limit the specific operational behavior of the lock instruction. For example, in one embodiment, one of the system software, theconsole subsystem 200, and/or thescanning subsystem 300 is locked by performing a locking operation on the system software, the first human interaction control is locked by controlling a locking control of theconsole subsystem 200, and the second human interaction control is locked by controlling a locking control of thescanning subsystem 300. In another embodiment, an authorized user-defined locking/unlocking action with locking/unlocking authority can be captured by a biosensor to lock/unlock the system software, the first human-machine interaction control and/or the second human-machine interaction control. For example, when the camera device captures an "OK" gesture of an authorized user, the system software, the first human-computer interaction control and/or the second human-computer interaction control are/is unlocked; and when the camera device captures the 'X' gesture of an authorized user, locking the system software, the first human-computer interaction control and/or the second human-computer interaction control. In yet another embodiment, the system software, the first human-computer interaction control and/or the second human-computer interaction control may also be unlocked/locked by capturing preset words such as "unlock"/"lock" issued by an authorized user through a voiceprint sensor. It will be appreciated by persons skilled in the art that the foregoing is illustrative only and is not limiting of the invention, which is to be construed in accordance with the teachings herein.
Preferably, in one exemplary embodiment, before unlocking the corresponding operation authority of the authorized user on theconsole subsystem 200 and/or thescanning subsystem 300, the authority management subsystem is further configured to determine a single user/multi-user mode of the medical scanning imaging system:
if the medical scanning imaging system operates in a single-user operation mode, judging whether the operating user and an authorized user currently logging in the system software are the same user, and if so, unlocking the corresponding operation permission of the authorized user to theconsole subsystem 200 and/or thescanning subsystem 300; and if not, ignoring the operation of the operation user. And if the medical scanning imaging system runs in a multi-user operation mode, unlocking the corresponding operation authority of the authorized user on theconsole subsystem 200 and/or thescanning subsystem 300. For example, in one embodiment, in the single-user operation mode, if the authorized user a logs in the system software through the face recognition verification, the system human-machine interaction control (the first human-machine interaction control and/or the second human-machine interaction control) is unlocked, and only the authorized user a may unlock the system software, unless the user a exits or unlocks the single-user operation mode. In the multi-user operation mode, if the authorized user a logs in the system software through face recognition verification, the unlocking of the system human-computer interaction control can be unlocked by any authorized user with scanning authority, for example, under the condition that the authorized user a logs in the system software, the authorized user B with scanning authority can also operate the system human-computer interaction control. Further, in one preferred embodiment, in the multi-user mode, when the authorized user a logs in the system software first, and then the authorized user B also logs in the system software for operation, the authorized user a may receive a prompt related to the login and operation of the authorized user B; similarly, authorized user B, when logging into the system, may also receive a prompt that authorized user A has logged in before.
With the configuration, the medical scanning imaging system provided by the invention can provide different user modes for different application scenes, and each user mode adopts different processing modes, so that the configurability, the operation convenience and the operation safety of the authorized user management of the medical scanning imaging system are further improved.
Preferably, in one exemplary embodiment, each of the first human-machine interaction controls and/or each of the second human-machine interaction controls has a unique human-machine interaction control identification code; therights management subsystem 100 is further configured to save user information, operation time, and the human-machine interaction control identification code of an authorized user when the authorized user operates the first human-machine interaction control and/or the second human-machine interaction control. For example, assuming that the human-computer interaction control identification code corresponding to the keyboard of theconsole subsystem 200 is PIN _1, if the operating user D (authorized user) operates the keyboard at T1 and the operating user E (unauthorized user) operates the keyboard at T2 under the condition that the authorized user C logs in, the medical scanning imaging system provided by the present invention can store the information of the operating user D, the time T1 and the human-computer interaction control identification code of the keyboard as PIN _1, and can trace back the operation of the operating user D on the keyboard at T1 instead of the login user C by the login user. Further, the operation of the keyboard by the operating user E at T2 is ignored, thereby avoiding an erroneous situation in which the operations of the keyboard by both the operating user D and the operating user E are recorded as the operations of the keyboard by the operating user C. Of course, the record of the operation behavior of the authorized user is not a limitation of the present invention, and for example, in another exemplary embodiment, the medical scanning and imaging system records the operation of the operator regardless of the operation of the authorized user or the unauthorized user, that is, records each operation of "using" the system and supports the content of the examination. With the configuration, the medical scanning imaging system provided by the invention processes invalidation of operation of an unauthorized user by carrying out biological identification on an operation user between system scans and limiting response to only operation for authorization. The use information of the actual operation user is managed, the operation of the unauthorized user is recorded, and the supervision and the information backtracking are facilitated.
For ease of understanding, one practical application of the medical scanning imaging system provided by the present invention is specifically described below. Referring to fig. 5, fig. 5 is a schematic diagram of an unlocking process of a medical scanning imaging system in which human-computer interaction is based on face recognition. As can be seen from FIG. 5, when the medical scanning imaging system is powered on, both the system software and the system human-computer interaction control are locked. For convenience of description, the unlocking process of the system software is described first, and then the unlocking process of the system human-computer interaction control is described, it should be understood by those skilled in the art that this is merely for convenience of description, and does not explicitly show or suggest that the unlocking of the system software is prior to the unlocking process of the system human-computer interaction control, and the unlocking process of the system software and the unlocking process of the system human-computer interaction control are related to the operation sequence of the actual operation user and/or the configuration preset by the system, which is not limited by the present invention.
Unlocking process for system software: firstly, carrying out user face recognition on an operating user, and if the operating user is not in an authorized user list, locking the system software; if the operating user is in the authorized user list, automatically logging in the system by the authorized user corresponding to the face recognition; adjusting system interfaces and functions according to the operation authority of the authorized user; next, judging whether the system software is logged in overtime or not, and if yes, locking the system software; if not, the operating user can operate the system software.
And (3) unlocking a system human-computer interaction control: firstly, carrying out user face recognition on an operating user, and if the operating user is not in an authorized user list, locking a human-computer interaction control of the system; if the operation user is in the authorized user list, judging whether the operation user has a scanning authority, and if not, locking the system man-machine interaction control; if not, unlocking the system human-computer interaction control, and continuously judging whether the control is unlocked overtime, if so, locking the system human-computer interaction control; if not, the user can operate the human-computer interaction control.
Further, as can be seen from fig. 5, in the unlocking process of the system software, if the operating user is in the authorized user list, it may be further determined whether the authorized user has a scanning right, and if the authorized user has the scanning right, the steps after the system human-computer interaction control determines the authorized user may be executed, which is understood to be a preferred embodiment, that is: for an authorized user with scanning authority, when the authorized user unlocks system software, the process of unlocking the system human-computer interaction control is performed step by step. Obviously, this is not a limitation of the invention.
Further, referring to fig. 6, fig. 6 is a further application scenario of the medical scanning imaging system provided by the present invention. As can be seen from fig. 6: when the medical scanning imaging system is started, the system software and the system human-computer interaction control are locked. When an operating user accesses system software, face recognition (for example, a through hole, a fingerprint, a voiceprint, and the like) is performed on the operating user: if the identification result is an authorized user, the system software is successfully logged in, and the system interface and the function of the system software are adjusted according to the authority of the authorized user, so that the user identity authentication is completed; if the identification result is failure, judging whether the number of times of identification failure exceeds a threshold value, if so, locking the operation user (for example, the operation/login of the operation user is invalid within a preset time length range, and giving a prompt such as 'locking XX minutes'); if not, prompting that the user name and the password are wrong, and asking the operation user to log in correctly through the user name and the password and then carrying out face recognition again. With the configuration, the medical scanning imaging system provided by the invention can further effectively avoid the risk of operation authority leakage caused by user name and password leakage through biological identification.
< example two >
The present embodiment provides a rights management method, which is used for rights management of an operation right of a medical scanning imaging system as described in any one of the above paragraphs, referring to fig. 7, fig. 7 is a flowchart of the rights management method provided in the present embodiment, and as can be seen from fig. 7, the rights management method of the present embodiment includes the following steps:
s1: acquiring biological information of an operating user of the console subsystem or the scanning subsystem;
s2: and judging whether the operation user is an authorized user or not according to the biological information, and if so, executing step S3.
S3: unlocking the authorized user's respective operating rights to the console subsystem and/or the scanning subsystem.
According to the authority management method provided by the invention, the real identity of an operating user operating the medical scanning imaging system can be automatically identified according to the biological information, the corresponding authority can be automatically unlocked, the authorized user does not need to manually input a password, the method is simple, convenient and quick, the system login efficiency is greatly improved, and the real identity of an actual operator can be identified; furthermore, for the scanning room with more people coming in and going out, the authority management method provided by the invention can identify the real identity of the operation user of the human-computer interaction part, and avoids the unexpected risk of the medical scanning imaging system caused by the misoperation of an unauthorized user; furthermore, the authority management method provided by the invention identifies the identity of the operating user according to the biological information, so that the risk of leakage of the account password is well avoided, the actual operating user can be tracked, and the use supervision and the information backtracking are facilitated.
Preferably, in one exemplary embodiment, the method for managing rights further includes: when the medical scanning imaging system is started, locking system software of the console subsystem, a first human-computer interaction control of the console subsystem and a second human-computer interaction control of the scanning subsystem; and after the operation user is judged to be an authorized user, judging whether the authorized user has the scanning authority, and if so, unlocking the first human-computer interaction control and the second human-computer interaction control.
Preferably, in an exemplary embodiment, before step S3, the method further includes determining an operation mode of the medical scanning imaging system: if the medical scanning imaging system operates in a single-user operation mode, judging whether the operating user and an authorized user currently logging in the system software are the same user, if so, executing a step S3; if not, ignoring the operation of the operation user; if the medical scanning imaging system is operated in the multi-user operation mode, step S4 is executed.
Preferably, in one exemplary embodiment, after step S3, the method further includes the following steps:
s4: judging whether a preset locking condition is met, if so, locking the console subsystem and/or the scanning subsystem again; the preset locking condition comprises that for system software, the authority management subsystem receives a locking instruction or does not authorize a user to operate the system software within a first preset time length for unlocking the system software.
Further, for a first human-computer interaction control, the authority management subsystem receives a locking instruction or does not authorize a user to operate the first human-computer interaction control within a second preset duration of unlocking the first human-computer interaction control.
And for a second human-computer interaction control, the authority management subsystem receives a locking instruction or does not authorize a user to operate the second human-computer interaction control within a third preset time length for unlocking the second human-computer interaction control.
Therefore, the authority management method provided by the invention has clear flow, clear steps and easy implementation; furthermore, because the right management method provided by the invention belongs to the same inventive concept as the medical scanning imaging system provided by the invention, the right management method at least has the same beneficial effects, and the details are not repeated.
Yet another embodiment of the present invention provides an electronic device, which includes a processor and a storage device, wherein the processor is adapted to implement instructions, and the storage device is adapted to store a plurality of instructions, and the instructions are adapted to be loaded by the processor and to execute the steps of the rights management method according to any of the above embodiments. The specific steps have been described in detail above, and are not described herein again.
Because the electronic device provided by the invention and the authority management method provided by the invention belong to the same inventive concept, the electronic device at least has the same beneficial effects as the electronic device, and the description is omitted.
Yet another embodiment of the present invention provides a computer-readable storage medium, which stores computer-executable instructions, and when the computer-executable instructions are executed, the method for managing the authority according to any one of the above embodiments is implemented. The specific steps have been described in detail above, and are not described herein again.
Because the computer-readable storage medium provided by the invention belongs to the same inventive concept as the rights management method provided by the invention, the computer-readable storage medium at least has the same beneficial effects as the rights management method provided by the invention, and the description is omitted.
The preferred embodiments of the present invention have been described in detail with reference to the accompanying drawings, however, the present invention is not limited to the specific details of the above embodiments, and various simple modifications can be made to the technical solution of the present invention within the technical idea of the present invention, and these simple modifications are within the protective scope of the present invention.
It should be noted that the various features described in the above embodiments may be combined in any suitable manner without departing from the scope of the invention. The invention is not described in detail in order to avoid unnecessary repetition.
In addition, any combination of the various embodiments of the present invention is also possible, and the same should be considered as the disclosure of the present invention as long as it does not depart from the spirit of the present invention.
From the above description of embodiments, it should be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects that is presently preferred. With this understanding in mind, portions of the present solution that contribute to the prior art can be embodied in the form of a computer software product that is stored on a computer-readable storage medium, which includes but is not limited to disk storage, CD-ROM, optical storage, and the like.
The present invention is described in terms of flowcharts and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the present invention, unless otherwise expressly stated or limited, the first feature "on" or "under" the second feature may be directly contacting the first and second features or indirectly contacting the first and second features through an intermediate. Also, a first feature "on," "over," and "above" a second feature may be directly or diagonally above the second feature, or may simply indicate that the first feature is at a higher level than the second feature. A first feature being "under," "below," and "beneath" a second feature may be directly under or obliquely under the first feature, or may simply mean that the first feature is at a lesser elevation than the second feature.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention in any way, and the present invention includes, but is not limited to, the configurations listed in the above embodiments. Various modifications and alterations to the embodiments of the present invention will become apparent to those skilled in the art from the foregoing description of the embodiments. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.