Secure Open Source Framework for building AI Health Products

A secure, compliant framework for ingesting, transforming and storing healthcare data in JSON formats, and unstructured text. Built as Open Source on MIT license.

Doctor Dok is prepared for supporting industry-leading security frameworks

MIT License

Built as Open Source Framework

Doctor Dok core is fully open source, allowing you to inspect, modify, and enhance the core functionality. Whether you're building secure EHR systems, developing AI-driven healthcare solutions, or conducting medical data experiments

Features

Everything you need for building AI Health Product

Integrated with AI models

Compatible with multiple AI models LLama3, ChatGPT 4 and other models supported by Ollama

Building blocks for Health Products

Central safe database of patients medical records based on MIT or Commercial License with support.

Sharing medical results

Unlocking Health labs with safe sharing of results with patients

Capture data from documents

Combining Tesseract OCR and Surya OCR which does not require sending documents to cloud

Helping hand for doctors

Assisting doctors with on demand summaries, creating post-visit notes and other documents

Medical records exchange

Allowing to safely communication between institutions and patients

Security

How Doctor Dok Keeps Your Data Safe

At the core of our security model is a Zero Trust approach, designed to ensure that your sensitive information is secure and accessible only by you. Here's a breakdown of how our security system works.

By combining advanced encryption techniques, client-side security, and a Zero Trust model, we ensure that your data is always protected, private, and under your control.

🆔

Unique Database Identification

Every user's data is linked to a unique identifier of users' choice - we called it Database Id and it could be: personal ID, social security number, any other random identifier. This identifier is never sent to our servers in its original form. Instead, it’s hashed using SHA-256, ensuring that even if intercepted, the information remains protected and untraceable.

🔐

User Key Encryption

Your personal encryption key, known as the User Key, is generated uniquely for you and never stored on our servers. This key is essential for unlocking your Master Key, which encrypts and decrypts your data. All encryption and decryption happen on your device, meaning that your sensitive information is always under your control and never exposed to external threats.

🔐🔐

Double-layer Encryption for Added Security

We implement a dual-layer encryption system using both a User Key and a Sharing Key. The Sharing Key is a temporary code you can generate for secure sharing of your data for a set duration—such as 30 minutes or a day—without revealing your main User Key. This system allows you to share access safely, without compromising your overall security.

💻

Client-side Encryption and Decryption

We prioritize your privacy by ensuring that all data encryption and decryption are handled on your device. Your data is encrypted before it leaves your device and is only decrypted when it returns. Our servers never receive your actual encryption keys—only securely hashed versions—making it impossible for anyone but you to decrypt your data.

🔑

Flexible Key Management

Our system is designed for easy management of your encryption keys. You can update or change your User Key or Sharing Key without needing to re-encrypt your entire database. This flexibility is possible because of our innovative key structure, which securely protects your Master Key while allowing you to manage access and security seamlessly.

🔒

Secure Login Process

When you log in, your credentials are securely hashed and verified by our servers. Upon successful login, the server provides an AES-encrypted Master Key, which is decrypted only on your device using your User Key or Sharing Key. This Master Key is then used for all data encryption and decryption, ensuring that your data remains encrypted and secure throughout your session.

🛡️

Complete Data Protection

Every action involving your data is secured with the highest levels of encryption. Even when accessing your data, our servers only receive hashed versions of your keys. These hashes are verified, but the actual keys remain on your device. This approach ensures that your data is inaccessible to unauthorized parties, including our servers, providing you with peace of mind that your information is always secure.

Use Cases

Here are all medical documents you can use with Doctor Dok

Medical Records

Extract key patient data points for comprehensive health timelines. Identify potential gaps in care or follow-up needs.

Clinical Findings

Capture and categorize clinician observations. Correlate subjective findings with objective data points.

Hematology Report

Standardize diverse hematology reporting formats. Flag unusual cell populations or counts for specialist review.

Pathology Report

Extract key findings from narrative reports. Organize biopsy results for easy review and comparison.

Serology Results

Standardize antibody test results across different assays. Monitor immune status changes over time.

Electrolyte Panel

Track electrolyte balance over multiple tests. Alert to rapid changes or consistent imbalances.

Renal Function Tests

Calculate and track kidney function metrics over time. Highlight trends that may indicate declining renal function

Radiology Report

Extract key findings from narrative radiology reports. Link report data with actual images for comprehensive review.

Microbiology Results

Organize culture results and antibiotic sensitivities. Track pathogen prevalence and antibiotic resistance patterns.

Blood Test Results

Convert unstructured lab reports into structured data. Flag abnormal values and suggest relevant follow-up tests

Biomarker Levels

Track biomarker fluctuations across time. Alert to significant changes that may indicate need for intervention.

Immunology Results

Quantify immune response markers. Track immunological changes in response to treatments or interventions.

Patient History

Compile chronological health events from various documents. Identify potential risk factors based on historical data.

CBC (Complete Blood Count)

Normalize CBC data across different lab formats. Visualize trends in blood cell populations over time.

Liver Function Tests (LFTs)

Monitor liver enzyme trends. Flag patterns indicative of potential liver stress or damage.

Metabolic Panel

Integrate various metabolic markers for a holistic view. Suggest lifestyle or dietary changes based on metabolic trends.

Urinalysis

Standardize urinalysis results from different lab formats. Track changes in urine composition over time.

Genetic Testing

Structure complex genetic data into interpretable formats. Identify potential genetic factors relevant to current health status.

Build safe Health Products integrated with AI

Build on top of central safe database of patients medical records based on MIT or Commercial License with support.