Umfassende Service-Einschränkungen im Bereich Ausleihe ab 17. März!

Treffer: Secure Online Medicine Delivery System.

Title:
Secure Online Medicine Delivery System.
Source:
Review of Computer Engineering Studies; Sep2020, Vol. 7 Issue 3, p74-78, 5p
Database:
Complementary Index

Weitere Informationen

The objective of this study to design and implement a secured home delivery of medicine to the specific customer. It also provides the time and effort exerted by the staff and ensures the accuracy of the patient's internal medical disbursement as well as the control of the disbursed quantities. Currently, the systems used in the telecare medicine information system for delivery purposes include the storage of information of the users in the remote server and involve various methods for authentication purposes at the client end. However, these systems are susceptible to uniqueness theft, guessing passwords, services denial, and implementation and insider attacks. This can be achieved by securing demographic information like name, date of birth, or the age of a person and also includes biometric ids given by the clients to the administrator. Furthermore, this paper provides a step by step Advanced Encryption techniques (AES) to enhance the security features by another layer. The data acquired from the user is processed through these encryption techniques and then finally stored in a Relational Database which is formed by using My SQL PHP admin. The Database stores all information related to the patient, admin, and medicine inventory. The overall idea is to create a smart and secure online based medicine delivery system that will find its application in the field of e-commerce vendors such as Practo, 1mg, Netmeds, etc. It shall not be possible to locate the client's consignment (medicine orders) based on the virtual IDs alone, rather a biometric verification will be carried out at the client's (patient's) end to confirm the authenticity from the client. [ABSTRACT FROM AUTHOR]

Copyright of Review of Computer Engineering Studies is the property of International Information & Engineering Technology Association (IIETA) and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)