Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Design Document
Backend API - Django Frontend - React Typescript Database - Postgres - RDS with read replica Hosting Backend - EKS with amazon ACM cert Hosting Frontend - EC2 - Nginx with Cloudflare origin cert and proxy Version control - Github Communication - Slack Ci/CD - Circle Ci
Care is deployed in production at different states in India. The production instance for Kerala/Ernakulam is deployed at
New Relic APM
Telemedicine (WIP)
Facility Management
Realtime Capacity Analysis
Patient Management
Sample Management
Patient Record Management
Inventory Management
Central Dashboard for GOV
Central Dashbaord for all facilities
Coronasafe Care is a free and open-source disaster management system that is used by the National Health Mission, the Government of India, and various state governments for reimaging digital war rooms. The solution that students got an opportunity to intern with has supported 3.34*Lac patient management and 1.29* Lac ambulance shiftings and is approved by the United Nations as a
Frontend: Backend API:
Frontend: Backend API:
Ci/CD:
Backend: Frontend:
Ambulance and Food Delivery Network ()
Number of beds avilable
Number of patients admitted
Nubmer of COVID postive patients
Number of people under observation
Number of cases reported today
Number of COVID postive reported today
Number of beds avilable
Number of patients admitted
Nubmer of COVID postive patients
Number of people under observation
Number of cases reported today
Number of COVID postive reported today
Capture daily triage details from each hospital
Build telemedicine.coronasafe.network inside care
This will allow all facilities in the care system to operate their own telemedicine unit seamlessly.
staff profile with limited data access should be able to log calls
doctor linked to the facility should be able to see the pending calls and associated patent record
The doctor should be able to add consultation
The doctor should be able to schedule a reminder for follow-up.
pending calls, upcoming followups and missed followups should be listed on an index page
The docotor should be able to add a prescription for the patient which can be shared with the patient via SMS.
The pharmacy unit of the facility should be able to mark the status of each prescription given to the patient.
Doctor could be a tele-caller for multiple facilities.
A facility admin should be able to assign calls to a doctor
Unique Patient Registration
Capture basic medical data
Capture consulation details
Capture daily rounds
Tables
Number of beds
Number of ICU beds
Number of Paitens
Number COVID positive Patients
Stock (Inventory along with count)
number of facilities
facility stats
totoal number of patients admited
total number of patients positive
Number of ICU beds free
show where the ICU beds are avilable
Number of people under observation
Number of beds
Number of ICU beds
Number of Paitens
Number COVID positive Patients
Stock (Inventory along with count)
Generate ICMR form the user data
Patient Consulation details Daily Rounds for each consultation Option to tranfer a medical records from one hospital to another.
PatientRegistration
The platform identifies every one as a user, Basic information that we should collect from everyone
User Type
Privilege
Super Admin
Admin for the entire platform
State Admin
Admin with state level data scope
District Admin
User with district level data scope
Facility Admin
User with facility level data scope
Doctor
User with limited data permissions
Patient
User with acess to his/her personal data
Staff
User with limited data permissions
Join table for facilty and inventory
Details of buildings a facility has
Common table for inventory
minimum_stock
will vary for each inventory item. It should be captured so that, we could trigger alerts
For the network security of the application we have enforced the following standards.
Web Application Firewall (WAF) Configured at Domain level to prevent access to coronasafe.network from countries like US, China, Hongkong, Pakistan , Russian Federation Etc
Open Web Application Security Project (OWASP) core rule set based WAF rules implemented to provide protection against common attack categories, including Structured Query Language (SQL) Injection and Cross-Site Scripting.
Customised WAF rules created to prevent common attacks and Bot Access
Autonomous system number (ASN) based lockdown in WAF against common threat matrix.
Sanity Check Based Block and Rate Limiting Enabled
Network level Port Blocking allowing only port 80 and 443 from internet in the entire network
IP blacklist and lockdown based on Threat Score ( Score Greater than 8 is blocked) based on IP reputation.
Customised Content Security policy (CSP) Header implemented to prevent common Clickjacking and other attacks .
HTTP Strict Transport Security (HSTS) preloaded domain wide to enforce Hypertext Transfer Protocol Secure (HTTPS) only traffic with a Max Age of 1 year
Origin to domain, domain to domain, and domain to User traffic encrypted via Transport Layer Security 1.2 (tls1.2) and above
Content Security Policy (CSP) and Certificate Transparency CT violations monitoring done to update threat matrix
The Domain Name System Security Extensions (DNSSEC) enabled to prevent domain takeovers .(DNSSEC protects against forged domain name system (DNS) answers. DNSSEC protected zones are cryptographically signed to ensure the DNS records received are identical to the DNS records published by the domain owner.)
Speed up of page load speed by the Implementation of Brotli Compression
HTTP/2 and HTTP/3(Quick User Datagram Protocol Internet Connections) enabled for faster network speeds
Automatic Branch based Continuous integration (CI) and continuous delivery (CD) to prevent unauthorised access.
New pods are created before old pods with old code is terminated.
Database backups (Snapshots) are created daily at scheduled intervals and stored with Key Management Service (KMS) keys securely inside Cloud Infrastructure without external Access.
All server nodes and Volumes and database Instances are Encrypted with KMS based Cryptographic Keys.
Database Connectivity allowed only using internal Private Network and allowed for the backend host only.
Virtual Private Network(VPN) + Jump Host( Bastion Host) Based Server Maintenance (Cluster Management Shell ) to enhance security.
Reverse Proxying all network traffic to mask origin IP to enhance security. Apart from the above rules, additional measures could be added to enforce maximum security of data
Care has been Security Audited & Assessed as per CERT-IN Guideline & OWASP Standard. The Site & Web Application is fit and safe for hosting under continuous monitoring and observation by Authorized Authorities. The Application/Site has fulfilled the criteria as per CERT-IN Security norms.
The full certification details can be found here:
Report: Password: hawk
Report:
Details to be Added
PATIENT_CREATED
20
Patient Created
PATIENT_UPDATED
30
Patient Updated
PATIENT_DELETED
40
Patient Deleted
PATIENT_CONSULTATION_CREATED
50
Consultation Created
PATIENT_CONSULTATION_UPDATED
60
Consultation Updated
PATIENT_CONSULTATION_DELETED
70
Consultation Deleted
INVESTIGATION_SESSION_CREATED
80
Investigation Created
INVESTIGATION_UPDATED
90
Investigation Updated
PATIENT_FILE_UPLOAD_CREATED
100
Patient File Uploaded
CONSULTATION_FILE_UPLOAD_CREATED
110
Consultation File Uploaded
PATIENT_CONSULTATION_UPDATE_CREATED
120
Daily Round Created
PATIENT_CONSULTATION_UPDATE_UPDATED
130
Daily Round Updated
PATIENT_CONSULTATION_ASSIGNMENT
140
Patient Doctor Assigned
SHIFTING_UPDATED
200
Shifting Request Updated