WO2003067501A1 - Procede de realisation d'etudes destine a un systeme collaboratif en reseau - Google Patents
Procede de realisation d'etudes destine a un systeme collaboratif en reseau Download PDFInfo
- Publication number
- WO2003067501A1 WO2003067501A1 PCT/FR2003/000322 FR0300322W WO03067501A1 WO 2003067501 A1 WO2003067501 A1 WO 2003067501A1 FR 0300322 W FR0300322 W FR 0300322W WO 03067501 A1 WO03067501 A1 WO 03067501A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- entity
- data
- study
- investigator
- central site
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000012986 modification Methods 0.000 claims abstract description 16
- 230000004048 modification Effects 0.000 claims abstract description 16
- 238000012544 monitoring process Methods 0.000 claims abstract description 9
- 230000008569 process Effects 0.000 claims description 16
- 238000012550 audit Methods 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 claims description 10
- 238000013479 data entry Methods 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 7
- 238000002360 preparation method Methods 0.000 claims description 3
- 238000011160 research Methods 0.000 claims description 3
- 238000007792 addition Methods 0.000 claims description 2
- 238000012552 review Methods 0.000 claims description 2
- 238000007418 data mining Methods 0.000 claims 1
- 238000007726 management method Methods 0.000 description 15
- 238000005259 measurement Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 5
- 238000013461 design Methods 0.000 description 5
- 238000012360 testing method Methods 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 3
- 238000011835 investigation Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000004224 protection Effects 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 101100127285 Drosophila melanogaster unc-104 gene Proteins 0.000 description 1
- 101000900767 Homo sapiens Protein cornichon homolog 1 Proteins 0.000 description 1
- 102100022049 Protein cornichon homolog 1 Human genes 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000013497 data interchange Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 229940079593 drug Drugs 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004020 luminiscence type Methods 0.000 description 1
- 238000004377 microelectronic Methods 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 210000003462 vein Anatomy 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/20—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for electronic clinical trials or questionnaires
Definitions
- the invention relates to the electronic performance of studies, in particular clinical studies.
- An object of the invention is to provide a method for carrying out studies amending the disadvantages due to working in "on-line” mode, while ensuring reliability, performance and robustness during operation.
- a method of carrying out at least one study intended to be implemented by a collaborative system comprising, in a network, a central site, at least one Sponsor / Architect entity, at at least one Investigator entity able to be concerned by the study, at least one Monitor entity, the process comprising the steps of: a) preparation of the elements of the study by the Sponsor / Architect entity, b) decision to launch the study by the Sponsor / Architect entity, c) possible modification during the study by the Sponsor / Architect entity of one or more elements of the study, d) storage of the elements of the study by the central site comprising first storage means for this purpose, after transmission of said elements by the Sponsor / Architect entity to the central site, e) distribution of the appropriate elements of the study by the central site to the Investigator entity, f) seized by means ens of input of the Investigator entity of the study data and local storage of this data on means of memorizing the Investigator entity without the latter being connected to the rest of the collaborative system,
- the steps performed locally within an entity can take place without said entity being connected to the rest of the collaborative system, and in particular the Investigator entity.
- the input of study data is faster and more efficient, possible 24 hours a day, because it remains independent of the access conditions and the state of the network connecting it to other entities, and in particular the central site.
- the method has at least one of the following characteristics: the means of input and the means of memorizing the data of the study by the Investigator entity are arranged so as to be usable in a wide variety of hardware and software environments; the means for inputting and storing the data of the study by the Investigator entity are arranged so as to allow parallel use without interference from other methods than that dedicated to the study, and without interference between the means of the study and these other processes, as well as indifferent use in a single or multi-user mode and rigorous physical and / or software security;
- the data stored by the Investigator entity has been collected by autonomous input means connectable to the Investigator entity; - the data entered and stored at the level of the Investigator entity are only taken into account at the level of the central site accompanied by a valid digital certificate authenticating an electronic signature of an authorized authorized user of the Investigator entity and not repudiation by this user of said data;
- each of the data taken into account at the central site, authenticated by the electronic signature with which it is associated, is subject to an integrity verification step for the purposes of operation, audit and storage ;
- the storage by the central site of the data entered is arranged so as to preserve an unbreakable link between said data and the valid certificate, authenticating the signature associated with said data;
- the transmissions and distribution of data and / or study elements are carried out in an XML format, and the storage on the central site is carried out in a native XML format in the database, in particular the database being in native XML;
- the data entered and stored are capable of being enriched dynamically;
- the collaborative system comprising a data exploitation entity, the method comprises a stage of exploitation of all or part of the data stored by the central site by the data exploitation entity; during data entry by the Investigator entity, if a data entry is not transferable to the central site, it is memorized on removable storage means of the entity
- the process is arranged so as to be applied to clinical and epidemiological studies and research.
- Figure 1 is a schematic representation of the interaction between the different elements constituting a collaborative system according to
- Figure 2 is a schematic view of the constitution of the central site of Figure 1
- - Figure 3 is a schematic view of the arrangement of a device called "black box" of an Investigator entity of the figure
- FIG. 4 is a schematic representation of the interaction between the black box and a local network forming the Investigator entity of FIG. 1,
- Figures 5a, 5b and 6 are an example of the organization of a study implemented on the Investigator entity.
- This collaborative system includes four basic functional entities:
- a first entity called Sponsor / Architect allowing the configuration of a study as well as its piloting, from the creation of this study to its closure, -
- An entity called central site which is a server of suitable applications and databases to store data according to a predefined format, preferably native XML, (XML: extensible Markup Language according to the English term, or Extensible Markup Language),
- a Monitor entity able to monitor and audit the study remotely from a Monitor station, via a web client installed on the central site or on the Investigator entity,
- the main role of the Sponsor / Architect entity is to enable the design of a follow-up file intended for a campaign to measure a certain number of parameters which constitutes a study.
- the Architect, user of the Sponsor / Architect entity (the designer) can generate all the screens (viewable form of the electronic forms) necessary for this measurement campaign, implement all the parameters specific to a study, constitute and update a directory of system users and manage their privileges and thus generate the application allowing the management of these screens and the entry of data in these screens according to access privileges, as well as generating the corresponding database capable of save the input data.
- the design of the screens is carried out by recovering as many elements as possible already generated during old measurement campaigns or else from study libraries, screens or even libraries of components such as input fields.
- the resources of the Sponsor / Architect entity also allow the Architect (user of the Sponsor / Architect entity) to test the application thus generated under conditions of use identical to those of the entities Investigators and Monitor entity, described later.
- the design of a measurement campaign ranging from the design of the study to the configuration of the study through the control tests, is achievable in a few days (on the order of about five days).
- the entire follow-up file thus produced is stored for possible re-use of all or part when creating subsequent follow-up files.
- the design of a follow-up dossier for a measurement campaign consists of the following steps:
- the Sponsor / Architect entity When developing the structure of the file for a measurement campaign, the Sponsor / Architect entity is able to generate forms which will constitute said file by using or incorporating configuration elements, control elements of entry of information in the various data fields, scheduling elements, processing allowing monitoring and reporting, associated specialized applications, as well as information sets intended for the user of forms such as text, still or moving images, sound or even vector or non-vector drawings.
- a form preferably includes:
- the Sponsor / Architect entity can make possible modifications, during the campaign, in the structure of the measurement campaign file.
- Figure 4 shows an example of the structure of an Investigator entity.
- the Investigator entity includes an Investigator station which is connected on the one hand to the local network of an Investigator entity, also called an investigation center, and on the other hand to the Internet to be able to join or be reached by the other units of the collaborative system of the invention.
- the local network of the investigation center is here composed of four stations called user stations. However, the number of user stations is not limited in number.
- the investigation center can consist of a single user station directly connected to the Investigator station.
- the main functionality of the Investigator position is the collection of data through the application and all of the form screens developed during the creation of the monitoring file for the measurement campaign by the Architect. This data collection takes place when the Investigator workstation is not necessarily connected to one of the other constituent units of the collaborative system, in particular with the central site.
- the only compulsory connection that is made is a connection, preferably, limited in time with the central site so as to cross synchronize the data recorded and signed on the Investigator station in the database present in the central site. Communications with the central site are encrypted and secure using a set of private keys / public keys, the keys of each Investigator being different.
- the data entry can be carried out by different operators, the person in charge of the test campaign on the investigation center is the only one to validate and electronically sign the data entered using a signature certificate which is, of preferably, an X.509 type certificate.
- a signature certificate which is, of preferably, an X.509 type certificate.
- several campaign managers can be appointed but a data entry form can only be signed by a single manager for a given version of this form.
- the Investigator workstation is presented as illustrated in Figure 3, in the form of a device called a "black box".
- This "black box” includes a processor associated with active memory (RAM) as well as a storage memory which can be in the preferential form of a hard disk or of a memory card known as "flash" in itself.
- this black box has means of connection to the outside so as to be connected to the local network of an investigation center as well as to the other entities forming the collaborative system of the invention preferably through the Internet network intermediary.
- the box black includes a smart card reader capable of allowing the identification of the user (s) of the black box having a smart card readable by said reader.
- a smart card is necessary to open the application and allow user authentication by login and password.
- a second smart card, for signature purposes is necessary in order to allow each of the managers to sign the data on the forms.
- the smart card used for signing purposes may contain the elements necessary to open the applications contained in the black box and to authenticate users. It should be noted that the smart card allowing the opening of the black box applications can also contain parameters making it possible to configure the black box so as to integrate it within a network, in particular a network. room of the Investigator entity.
- the identity of patients can be stored on a smart card, thus making it possible to view the names of patients at the level of the local entity, but not to trace this identity to the level from the central site.
- the black box has a first layer, called the base, formed by an operating system.
- the operating system is a UNIX type system, more precisely the operating system can be the LINUX or Windows NT operating system.
- the black box also includes software means for controlling the smart card reader. including functions for reading and writing chip cards capable of being inserted into the chip.
- the black box also includes means for managing connections to the outside. These external connections can be RJ45 ports capable of connecting the black box with a local network or the Internet, serial ports, USB ports, as well as a modem.
- the means for managing the connection to the outside are capable of using most of the current communication protocols.
- the communication protocol preferentially used is TCP / IP (Tranmission Control Protocol / Internet Protocol which means Transmission Control Protocol / Internet Protocol).
- the black box also includes a software layer forming means for managing secure accesses.
- These secure access management means make it possible, in particular to check whether a user who comes to connect to the black box is an authorized user. If the latter is an authorized user, the access management means establish the permissions for using the applications registered on the one hand, the access rights for reading and writing on the database recorded locally from a share, as well as the authorizations to sign documents and the management of the security of data transmissions to the central site during the synchronization of data comprising encryption and sealing steps of this data before transmission and storage.
- the black box also contains security components such as a firewall, antivirus ...
- the black box also presents server-forming means such as a WEB server capable of allowing access to the applications forming the study to be carried out on the various stations of the local network and, on the other hand, allowing access to the Sponsor entities. / Architect and Monitor of the collaborative system of the invention.
- server means also include a so-called FTP server (File Transfer Protocol) which allows the transmission of data in the form of files during the synchronization of the data with the central site, and / or during the cable distribution. applications suitable for carrying out a study.
- FTP server File Transfer Protocol
- the black box includes the application (s) forming the study (s) in progress or to be carried out by the investigation center as well as the databases gathering all the measurements made during these studies.
- the black box does not include a screen or keyboard capable of achieving a traditional man / machine interface as we know it for a traditional workstation.
- the only possibility of communication with the black box is through the connection means to the outside. Therefore, data entry during a measurement campaign carried out on an investigation center is carried out on user stations specific to the investigation center which can be networked locally, network to which is connected the black box. This makes it possible to perfectly control the accesses that are made to the data and applications contained in the black box, and thus to ensure their security.
- the only human / machine interface presented by the black box consists of an on / off button allowing the powering of said black box, a luminescence diode of green color preferentially indicating that the functioning of the black box, once power up, is correct, and a smart card reader to verify the identity of the user (s).
- Such a black box structure has the following advantages: - Offline use of the application, that is to say that the black box for recording the data of a test campaign does not need to be connected to the other units constituting the collaborative system of the invention, -
- the study is set up in a "plug and play" way (plug in and use) without requiring local administration: thus the studies are set up remotely without resorting to the physical presence of any administrator at the investigation center. In the same vein, the study on the investigation center is also carried out without local administration.
- Another advantage of integrating the black box into the local network of an investigation center is to be able to interface the study applications with the patient database of the center. This synchronizes the common data between the patient database and that of the black box. On the other hand, this saves the Investigator from entering certain data twice: once for the needs of the study, a second time for the patient database. However, no confidential information, such as the names of the patients, is transmitted to the other entities of the collaborative system of the invention.
- the user workstations connected to the black box can be very heterogeneous: they can be PC type workstations (Personal Computer) operating under operating systems such as Microsoft Windows (registered trademark) or LINUX, UNIX stations, APPLE computers (registered trademarks), or even personal digital assistants (or PDA according to the acronym Personal Digital Assistant).
- PC type workstations Personal Computer
- operating systems such as Microsoft Windows (registered trademark) or LINUX
- UNIX stations such as UNIX stations
- APPLE computers registered trademarks
- PDA personal digital assistants
- the black box can be protected from any untimely physical intrusion not authorized.
- a third party tries to open the box of the black box, all the information recorded in the storage memory is irretrievably erased.
- means for physical destruction of the various elements making up the interior of the black box can in particular be a sensor for opening the box associated with means for physically erasing sensitive data from the black box.
- the latter is produced in the form of one or more micro-electronic cards directly inserted within the user station.
- the black box is included in a portable computer, of the PC type for example, or in an advanced PDA, of the "mobile tablet" type.
- the information entered with these autonomous means is transmitted directly to the central site via a network or possibly to another investigative position.
- the black box is delivered to the pre-installed and pre-configured investigation center.
- the software layers forming the operating system, the means for managing the smart card reader, the means for managing the connection to the outside, the means for managing secure access as well as the means forming the server are installed in the black box configured to be integrated into the local network of the investigation center.
- the user connects his workstation to the black box via the serial port or the USB port or the RJ45 port for network access.
- the user has access to the applications through the server means, and more particularly to the web server means using a standard browser known per se such as "Netscape Communicator” or "Internet Explorer” (which are registered trademarks).
- the user Before being able to launch the applications, the user must identify himself with the black box. To do this, preferably, he inserts his smart card into the smart card reader, thereby validating his access to the content of the black box using an identification and an access code associated with the smart card he uses. If all the security checks are correct, the user can run the applications associated with a study.
- Responsible mode differs from operator mode by the possibility of signing a form (in particular CRForm or Case Report Form according to the Anglo-Saxon term, or Case Report Form) in a non-repudiable manner.
- a form in particular CRForm or Case Report Form according to the Anglo-Saxon term, or Case Report Form
- the user arrives at a home page in the workspace. Going through this form is essential for any action because it serves to identify and authenticate with the user's black box.
- the user is invited to indicate his "login” and his password; it validates this screen using a button, for example.
- this login form contains the choice of interface language.
- the form is then transmitted securely to the black box.
- the password is encrypted in an injective key and this key is compared with that stored in a local database of the Investigator station.
- the user is faced with a menu composed according to his rights.
- the menu gives him access to the various modules of the application. From this point, as illustrated in Figure 6, the screen consists of two parts.
- the menu appears as a bar on the top of the screen.
- the display of the selected module is done in the main part of the screen, which is itself divided into 3 spaces: Under the menu, a part is dedicated to viewing navigation.
- a functional menu is located on the left and the workspace proper, on the right.
- a "Synchronization” module allows an authorized user of the Investigator entity to upload signed data to the central site locally and, from the latter to the Investigator entity, the loading and various updates of the applications and updated data on the central site and intended for the black box The user is notified of the task in progress. It should be noted that at the end of the various operations, a page can explain to the user whether it is necessary to restart the black box to take into account the various modifications. All of the exchanges are preferably carried out in a secure manner.
- a module allows specific and secure management of certain elements or particular data, in conjunction with all of the forms associated with it.
- some very specific data can be considered as highly confidential data requiring processing according to a particular process. This is particularly the case for the complete identity of patients, who, according to a setting made at the level of the Sponsor / Architect entity, we want to appear on the screens of user stations of the Investigator entity, but which should not be transmitted to the central site, and preferably not be stored in the Investigator entity. Under these conditions, this highly confidential data can be stored on the user's smart card, and the call to this specific process requires the presence of the user's smart card. If the card is not present in the reader, a page is displayed, asking it to insert it then dial your secret code associated with your card.
- this method makes it possible to add / delete / update highly confidential information, which is stored on the smart card.
- any other removable storage means can be used, such as a removable hard disk, CompactFlash type memory cards, etc.
- a patient is defined, in particular by:
- the screen consists of a list on the left containing the patients already defined.
- a line contains the UID, the name, the first name.
- Each patient name UID is a link to this patient's data edit sheet. When the user clicks on it, the data is displayed in a form on the right side of the screen. This screen allows you to view and modify patient data.
- the patient's UID is calculated based on the data entered by a hash.
- the UID serves as a key in the local patient database.
- the nominative patient data are stored on the smart card.
- Another module is dedicated to the management of operators of the Investigator entity. It is only accessible by the manager. It allows the latter to add / delete or freeze rights / update the list of operators having the right to connect to the black box.
- An operator is defined in particular by:
- the screen consists of a list on the left containing the operators already defined.
- a line contains the name, the first name, the login (which must be unique).
- Each name is a link to the data edition sheet for this operator.
- the Investigator clicks on one of these lines the data is displayed in a form on the right side of the screen. This screen allows you to view the data of an operator. This data can only be modified if the operator has never connected.
- the form For entering the password, the form presents two password type fields (without echo on the screen).
- the password When viewing operator data, the password is not displayed.
- the two Password fields are empty. If the manager changes the operator's data without filling in these fields, the password is not changed. This screen can be used by the manager to change the password of an operator who has forgotten it.
- the form data is transmitted securely.
- the login must be unique.
- the browser checks with a script (preferably in java language) that the two password fields have the same content.
- a "patient selection” module allows you to navigate the patient files. It presents the list of patients with the following information: - a CRForm status (icon)
- the object of this module is the selection of a patient.
- the screen is made up of a list of patients.
- Each patient ID is a hypertext link triggering the selection of this patient.
- This list is made up of planned visits and forms corresponding to events such as "adverse events", which have already been previously documented. The user can select one of these items.
- the screen is made up of the list of visits. Each visit name is a hypertext link triggering the selection of this visit. Under the list of adverse events, a button "New adverse event” allows you to add a new "adverse event”.
- a module presents a list of CRForms for the chosen patient and for the chosen visit. Each CRForm is preceded by its status icon. The user has the possibility of selecting one in order to view its components. The manager has the possibility of signing a CRForm as we will see below.
- the screen shows a list of CRForms on the left.
- Each CRForm (preceded by its status icon) is a hypertext link allowing the content of the form to be displayed on the right side of the screen.
- each CRForm is followed by a "Sign" button allowing him to sign the CRForm in a non-repudiable manner.
- the CRForm is displayed in its entirety in a form that allows make the ⁇ certifiable.
- the smart card is required for this operation and requires the entry of a pin code as well as the presentation of the contractual terms linked to the electronic signature.
- a dialog box allowing entry of the pin code is displayed and the document corresponding to the CRForm is displayed in a new window with a "sign" button at the bottom.
- a "Component selection” module presents him with a list of components associated with the selected CRForm. For each of these components, a status icon, a component name, a number of questions (also called “queries” in the context of clinical studies), the possible presence of one or more comments, and a status are displayed. verification of source data (if necessary).
- the user is faced with the various objects of the selected form. He can enter values or modify them. Preferably, this information is recorded progressively in the black box. If the object is the subject of questions, the user can enter a comments module to answer them; the user can also add a comment without prior question. For data with history, the user can view an audit concerning them.
- the screen is the same as previously described.
- the user is faced with a form made up of groups of objects (a component is a group of objects).
- An object is a (or group of) form element (s): text boxes, check boxes, lists (possibly multiple choice), drop - down lists, option buttons.
- the modification status of an object is associated with a displayed check box, for example to the left of the object name.
- a displayed check box for example to the left of the object name.
- the user modifies the data, he signals his modification to the black box by checking this box. It is neither validation nor signature: it is simply a state of modification. If the box of an object is checked and the user modifies the associated data, the box is automatically unchecked.
- An icon for a component entered, signed with a question sent by the Monitor entity An icon for a component entered, signed, validated and frozen by the monitor entity.
- the icon takes on the value of the icon: data entered, but not signed. In parallel, any modification, whatever the state of the component is mentioned in the history.
- the value of the state of the least advanced component is found at the level of the CRForm, at the level of the Visit (or under part), at the level of the patient, and of the Investigator center.
- the “least advanced” state relates to the action to be taken by the user.
- modules are also available, such as the management of contractual study documents, the management of patient forms, for example for clinical studies, the sharing of data with another remote Investigator entity, the management of indicator '' studies, calendar management for events to follow (for example, management of patient visits as part of clinical studies), ...
- the central site within the collaborative system forming the invention, is to centralize all the data resulting from a given study, all the studies already carried out, or in the process of being carried out or to be carried out as well as the or the applications associated with each of these studies and this in all their versions (if several versions exist for the same study).
- the central site is connected to the external network, preferably the Internet, through a first firewall.
- the role of firewalls is to protect the workstation (s) and / or networks to which it is connected, from any external intrusion authorized. Behind this first firewall, the central site comprises on the one hand a WEB server and on the other hand a directory server.
- the WEB server will allow access to the applications of an application server as well as to the data stored or archived on a data server by the central site.
- the directory server for its part, will group together all of the users of the collaborative system as well as their access rights and privileges in terms of applications and recorded data.
- the directory server is associated through a second firewall with a security server which manages all of the protections linked to each of the applications and data according to the users registered in the directory.
- the application server is directly linked to the data server and that the WEB server has access to the application server through a third firewall. All three firewalls provide maximum security to the central site, ensuring optimal integrity of all study applications and archived study data.
- the central site is capable of tele-distributing the applications associated with a given study to the various black boxes installed in the investigation centers concerned by the given study, according to the cable distribution information provided by the Sponsor / Architect .
- the central site manages the possible update of these applications.
- These distribution processes are fully automated and are triggered by the Sponsor / Architect unit of the collaborative system according to the invention.
- the central site allows the Monitor unit to monitor and / or audit all of the data for a specific study, through a specific web client.
- the last unit of the collaborative system according to the invention is the Monitor.
- This element consists of a standard workstation such as a personal computer (PC) or an Apple computer (iMac for example) or a workstation running UNIX, equipped with a WEB browser of standard type known per se (Netscape or Internet Explorer for example).
- the Monitor will be able to monitor and / or audit a given study either on the central site or directly on the black boxes installed in the investigation centers via either the WEB server of the central site or by the means forming the WEB server of the black box, both comprising a WEB client allowing such monitoring or such an audit.
- the authentication of the Monitor on the central site is preferably carried out according to the PKI process
- All communications and / or data transfers between the different elements forming the collaborative system according to the invention is carried out in an encrypted and secure manner.
- a preferred means of achieving this encryption and this security is the use of the SSL protocol (Secure Sockets Layers).
- SSL protocol Secure Sockets Layers
- the operation of such a protocol is carried out as follows: a) The client sends the server its SSL version number, its predispositions for encryption and other information necessary for communication. b) The server returns the same information to the client with its own certificate. If the client makes a request for a resource requiring client authentication, the server sends him a message to encrypt and requests his own client certificate. c) The client uses the information sent by the server to authenticate it.
- the client uses the data generated by the aforementioned agreement protocol to create the temporary session secret, encrypts the latter with the server's public key which was obtained by the server certificate and sends all of this information to server.
- the server has requested client authentication, the client signs with the private key the message sent by the server, it should be noted that this key is only known to the client and the server. Consequently, the client then sends the signed data, its certificate and the encrypted temporary secret to the server.
- the server tries to authenticate the client. When this is not possible, the assignment ends.
- the server uses its private key to decrypt the temporary secret and then generates the master secret.
- Both parties use the master secret to generate session keys, symmetric keys used to encrypt and decrypt the information exchanged during the SSL session and to check its integrity.
- the client sends a message to the server informing it that future sent messages will be encrypted with session keys. It then sends an encrypted separation message indicating that the client part of the agreement has ended.
- the server follows the same process to indicate that the server part of the agreement has ended, j)
- the SSL agreement is now complete and the SSL session can actually start.
- the client and the server use the session keys to encrypt and decrypt the data they send to each other and to validate their integrity. Note that each transaction uses a different session key.
- the SSL protocol used between the various elements of the collaborative system according to the invention uses encryption keys of 128 bits or more.
- the electronic signature of the various documents exchanged essentially between the Investigator entity and the central site follows, in a preferential manner, the recommendations of the European directive on the electronic signature of 1999, of French law. and the implementing decree for the electronic signature of 2000 and 2001, the "security and electronic signature standard" in the United States, the CNIL as well as the European Community directive on data protection.
- the electronic signature of the forms preferably comprises two elements: - the "electronic signature" proper (the process), and - “the proof” (the certificate)
- the interactive system described preferably uses a "public key security architecture" (PKI for Public Keys Infrastructure according to the Anglo-Saxon term).
- PKI Public Keys Infrastructure according to the Anglo-Saxon term.
- This architecture known per se, includes the following elements:
- a registration authority allowing the registration of the signatory, the period of validity, the revocation.
- the sponsor of the study for example the Pharmaceutical Industry, for clinical studies
- PKI compatible applications the technical means for generating cryptographic keys and implementing algorithms, as well as supporting the signer's private key are part of the PKI.
- the signed data with their proof are stored in two places: locally on the site of each Investigator entity (local storage) and on the central site
- SSCD Secure Signature Creation Device according to the English term
- the functional requirements are chosen according to the safety objectives for the product or the system concerned,
- EAL 4" level is preferably used to obtain good confidence in a product or system, without resorting to specific implementation techniques for security.
- the elements of the SSCD are preferably: 1) the Component of calculation of the signature
- the proof should relate at least to the following elements:
- Time / date - Signature policy which expresses the organizational policy and can be expressed by a Number. This Number refers to technical elements and organizational policy - Certificate of the public key (associated with the secret / private key of the signatory).
- the proof is logically inseparable from these elements.
- the proof is calculated in two successive operations: i. a hash: this operation produces an "Imprint" of the elements to which the proof relates, ii. Asymmetric encryption (using the signatory's secret key) of the fingerprint It is the combination of these two operations that produces the proof.
- This component does not, strictly speaking, belong to the SSDC. However, it is necessary to provide for it in the architecture in order to: check that a proof obtained is correct, at the end of the signing act, with a view to detecting as soon as possible an error leading to an act that is impossible to verify. to verify later, if necessary, the authenticity of a signing act (However, for this second point, the means of verification may be external to the platform described).
- the verification of a signature is carried out in three operations:
- the other technical elements linked to the signature within the collaborative system according to the invention are the smart card which must preferably be compatible with the recommended level of security (a priori EAL4) and the card reader which must also be preferably compatible with the targeted level of security (EAL 4).
- the entire collaborative system according to the invention is preferably built entirely in native XML: the data of the study applications, the structure of the databases of the Investigator entity and of the central site, data generated by the applications of the Sponsor / Architect entity.
- mapping (according to the term Anglo-Saxon devoted or mapping) necessary at any time of the stages relating to the process of preparation, implementation, distribution of the study, collection and storage / archiving data, thereby ensuring immediate interoperability, to keep flexibility in the collaborative system allowing immediate modifications (without intervention) on the data storage medium.
- this collaborative system can be used for studies in other fields than that illustrated in the pharmaceutical world and clinical studies, such as for example the insurance field or even in fields such as high industrial sites. SEVESO type risk (without these two examples being limiting).
- the identification and authentication of a user can be carried out or completed using means for measuring biological parameters of said user (biometrics) such as fingerprints, retinas, voices, etc.
- biometrics such as fingerprints, retinas, voices, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Primary Health Care (AREA)
- Operations Research (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Epidemiology (AREA)
- Economics (AREA)
- Marketing (AREA)
- Public Health (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP03718822A EP1474769A1 (fr) | 2002-02-06 | 2003-02-03 | Procede de realisation d etudes destine a un systeme collaboratif en reseau |
AU2003222868A AU2003222868A1 (en) | 2002-02-06 | 2003-02-03 | Method for conducting studies for a networked collaborative system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0201397A FR2835635B1 (fr) | 2002-02-06 | 2002-02-06 | Procede de realisation d'etudes destine a un systeme collaboratif en reseau |
FR02/01397 | 2002-02-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003067501A1 true WO2003067501A1 (fr) | 2003-08-14 |
Family
ID=27619929
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2003/000322 WO2003067501A1 (fr) | 2002-02-06 | 2003-02-03 | Procede de realisation d'etudes destine a un systeme collaboratif en reseau |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1474769A1 (fr) |
AU (1) | AU2003222868A1 (fr) |
FR (1) | FR2835635B1 (fr) |
WO (1) | WO2003067501A1 (fr) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998039720A1 (fr) * | 1997-03-03 | 1998-09-11 | University Of Florida | Procede et systeme de prescription et de distribution interactives de medicaments dans des etudes medicales |
WO1998049647A1 (fr) * | 1997-04-30 | 1998-11-05 | Medical Science Systems Inc. | Systeme integre d'information sur les maladies |
EP0936566A2 (fr) * | 1998-02-11 | 1999-08-18 | Siemens Aktiengesellschaft | Système de mise en oeuvre d'études medicales |
WO1999063473A2 (fr) * | 1998-06-05 | 1999-12-09 | Phase Forward Inc. | Systeme et procede de gestion de donnees d'essais cliniques |
WO2001093178A2 (fr) * | 2000-05-31 | 2001-12-06 | Fasttrack Systems, Inc. | Systeme et procede de gestion d'essais cliniques |
-
2002
- 2002-02-06 FR FR0201397A patent/FR2835635B1/fr not_active Expired - Fee Related
-
2003
- 2003-02-03 AU AU2003222868A patent/AU2003222868A1/en not_active Abandoned
- 2003-02-03 WO PCT/FR2003/000322 patent/WO2003067501A1/fr not_active Application Discontinuation
- 2003-02-03 EP EP03718822A patent/EP1474769A1/fr not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998039720A1 (fr) * | 1997-03-03 | 1998-09-11 | University Of Florida | Procede et systeme de prescription et de distribution interactives de medicaments dans des etudes medicales |
WO1998049647A1 (fr) * | 1997-04-30 | 1998-11-05 | Medical Science Systems Inc. | Systeme integre d'information sur les maladies |
EP0936566A2 (fr) * | 1998-02-11 | 1999-08-18 | Siemens Aktiengesellschaft | Système de mise en oeuvre d'études medicales |
WO1999063473A2 (fr) * | 1998-06-05 | 1999-12-09 | Phase Forward Inc. | Systeme et procede de gestion de donnees d'essais cliniques |
WO2001093178A2 (fr) * | 2000-05-31 | 2001-12-06 | Fasttrack Systems, Inc. | Systeme et procede de gestion d'essais cliniques |
Also Published As
Publication number | Publication date |
---|---|
EP1474769A1 (fr) | 2004-11-10 |
FR2835635A1 (fr) | 2003-08-08 |
FR2835635B1 (fr) | 2008-04-18 |
AU2003222868A1 (en) | 2003-09-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7328276B2 (en) | Computer oriented record administration system | |
US10467468B2 (en) | System and method for identity proofing and knowledge based authentication | |
US10009332B2 (en) | Method and apparatus for remote identity proofing service issuing trusted identities | |
EP2932431B1 (fr) | Procede d'acces securise a des donnees medicales confidentielles, et support de stockage pour ledit procede | |
CN107111710B (zh) | 用于基于安全和可靠标识的计算的方法和布置装置 | |
CN108055352A (zh) | 用于密钥链同步的系统和方法 | |
EP1834268A2 (fr) | Serveur, procede et reseau d'intermediation pour la consultation et le referencement d'informations medicales | |
ITRM20090267A1 (it) | Metodo di controllo per la gestione e la diffusione controllata di informazioni riservate digitali contenute in supporti elettronici portatili. | |
US12093974B2 (en) | Review engine with blockchain-based verification | |
CA2736360A1 (fr) | Procede d'acces a des donnees nominatives, tel qu'un dossier medical personnalise, a partir d'un agent local de generation | |
JP2001325372A (ja) | ヘルスケアデータ共有システム,ヘルスケアデータ共有方法およびヘルスケアデータ共有プログラム | |
WO2013034310A2 (fr) | Procede d'acces et de partage d'un dossier medical | |
WO2015155479A1 (fr) | Procedes, plateforme et systeme de collecte et de gestion de donnees vitales de patients pour etablissements de sante | |
EP3812945A1 (fr) | Système ouvert et sécurisé de traitement de demande de signature électronique et procédé associe | |
US11545007B2 (en) | Method, system, and device for selecting a winner of a raffle based on content from raffle tickets | |
KR101148678B1 (ko) | 홈페이지와 문서 전달용 엠프린터를 이용한 전자 처방전 전달 방법 및 그 시스템 | |
EP1474769A1 (fr) | Procede de realisation d etudes destine a un systeme collaboratif en reseau | |
EP1843288A1 (fr) | Sécurisation de transactions électroniques sur un réseau ouvert | |
WO2005111906A2 (fr) | Systeme de generation automatique d'un message d'informations medicales | |
EP4079018A1 (fr) | Procede et systeme de gestion d'echange de donnees dans le cadre d'un examen medical | |
Das et al. | Unleashing the Potentials of Blockchain Technology for Healthcare Industries | |
FR2995431A1 (fr) | Procede d'acces et de partage d'un dossier medical | |
WO2018091806A1 (fr) | Procédé et système pour le recueil du consentement éclairé d'un patient | |
EP3190530A1 (fr) | Carte médicale duale de gestion administrative et de dossier médical et procédés associés | |
WO2022184726A1 (fr) | Procédé pour permettre à des utilisateurs de déployer des contrats intelligents dans une chaîne de blocs au moyen d'une plateforme de déploiement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2003718822 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2003718822 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |