Digital health Product Forge 2020, Edinburgh
Cyber Security team work
Get the First Prize in Cyber Security Direction

A secure medical information device for use in public health care – saving time to save live.


  1. GP
  2. Care givers
  3. NHS Scotland


Helping paramedics quickly get access to secure medical records of patients.


Digital Health Service, Cyber Security


4 days

My role:

This project collaborated by 5 people from Technical, Medical and Design background. As a design student in this group work, I take the responsibility of problem defining, scenario setting and part of visualizing work.


In emergency situations where patients need to be treated in the hospital, how can the medical staff access the appropriate medical records of the patients so as to provide effective care plan for people while protecting the safety of the medical records? We found that in the current phase of emergency service, available data in hospitals only depended on KIS (Key Information System). This makes it difficult for hospital providers to pass services to patients in an emergency by history if the patient has not signed a KIS agreement from GP.

Scenario setting

At the same time, SIK is difficult for hospital service personnel to find information that is helpful in an emergency in a short time because it is not prepared for an emergency, and even because the coverage of information may affect the judgment of medical staff. We also found that there are health bracelets on the market, but they do not guarantee the safety of personal data.


  1. Secure and private wearable information accessories.
  2. Visually identified by health care professional.
  3. Update by GP.
  4. Scanned to show vital treatment plans.
  5. Personalized by the user.

Cyber security-device:

  1. Our security first line of defense is the requirement of proximity, typically<10cm.
  2. Lightweight Cryptology of NPC chip due to 40B to 4KB of memory (LEA).
  3. QR codes for ease of integration.
  4. Low data storage of individual device ID. and User ID.
Device prototyping


  1. Central cloud service application with remote generated login ID.
  2. End to end dynamic encryption (Curve 25519).
  3. AI behavior flag processes, for follow up by dedicated team.
  4. Data validation by user.