Skip to main content

A Study on Transparent Access to Medical Information by Implementing Automatic Authentication in Emergency Situations

  • Conference paper
  • First Online:
Human Interaction and Emerging Technologies (IHIET 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1018))

  • 3487 Accesses

Abstract

In this paper, we designed and implemented an automatic authentication for accessing medical information and IoTs based biometric information through user-owned mobile terminals. The medical information server determines whether patient’s healthcare situation is a normal status or an emergency status by using IoTs based biometric information, according to a given disease-specific emergency status condition defined by hospital policies. As soon as the emergency status for a patient is determined, the medical staff (user) receives an emergency notification message service notification with an emergency code from the medical information server. The authentication procedures of user and user’s mobile terminal is automatically performed by sending to the authentication server with a text message composed only of the user password including the defaulted ID, emergency code and mobile terminal’s current location. Finally, if a patient is in a normal state after a successful first-aid with the authentication confirmation of the medical staff, the authorized access of the authorized medical staff also returns to a normal state.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kim, S.K., Hwang, H.J.: Security requirements of personal health service. J. Inst. Korean Electr. Electron. Eng. 19(4), 548–556 (2015)

    Google Scholar 

  2. Park, J.H.: Technology and market trends of health care wearable device. Mag. IEEE 45(3), 48–56 (2018)

    Google Scholar 

  3. Ham, G.-S., Seo, O.-J., Jung, H., Joo, S.-C.: Implementation of dynamic situation authentication system for accessing medical information. J. KISS 19(12), 31–40 (2018)

    Google Scholar 

  4. Woo, S., Li, Z., Mirkovic, J.: Good automatic authentication question generation. In: Proceedings of the 9th INLG Conference, Edinburgh, UK, pp. 203–206, 5–8 September (2016)

    Google Scholar 

  5. Abdelkader, G., Naima, H.S., Adda, A.P.: Secure authentication approach based new mobility management schemes for mobile communication. J. Inf. Process Syst. 13(1), 152–173 (2017)

    Google Scholar 

  6. Aslam, M.U., Derhab, A., Saleem, K., Abbas, H.: A survey of authentication schemes in telecare medicine information systems. J. Med. Syst. 41, 14 (2017). https://doi.org/10.1007/s10916-016-0658-3

  7. Joo, S.-C.: Automatic Authentication method Based on Dynamic Context for Transparent Access for Medical Information, Patent application in R.O.K.(10-2018-0029551), 14 March 2018

    Google Scholar 

Download references

Acknowledgement

This work was supported by Basic Science Research Program through the Ministry of Education of R.O.K and National Research Foundation in 2019 (NRF-2017-R1D1A1B03029210).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Su-Chong Joo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Joo, SC., Ham, GS. (2020). A Study on Transparent Access to Medical Information by Implementing Automatic Authentication in Emergency Situations. In: Ahram, T., Taiar, R., Colson, S., Choplin, A. (eds) Human Interaction and Emerging Technologies. IHIET 2019. Advances in Intelligent Systems and Computing, vol 1018. Springer, Cham. https://doi.org/10.1007/978-3-030-25629-6_86

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-25629-6_86

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-25628-9

  • Online ISBN: 978-3-030-25629-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics