Secure Open Source Framework for building AI Health Products
A secure, compliant framework for ingesting, transforming and storing healthcare data in JSON formats, and unstructured text. Built as Open Source on MIT license.
Doctor Dok is prepared for supporting industry-leading security frameworks
Built as Open Source Framework
Doctor Dok core is fully open source, allowing you to inspect, modify, and enhance the core functionality. Whether you're building secure EHR systems, developing AI-driven healthcare solutions, or conducting medical data experiments
Everything you need for building AI Health Product
Integrated with AI models
Compatible with multiple AI models LLama3, ChatGPT 4 and other models supported by Ollama
Building blocks for Health Products
Central safe database of patients medical records based on MIT or Commercial License with support.
Sharing medical results
Unlocking Health labs with safe sharing of results with patients
Capture data from documents
Combining Tesseract OCR and Surya OCR which does not require sending documents to cloud
Helping hand for doctors
Assisting doctors with on demand summaries, creating post-visit notes and other documents
Medical records exchange
Allowing to safely communication between institutions and patients
How Doctor Dok Keeps Your Data Safe
At the core of our security model is a Zero Trust approach, designed to ensure that your sensitive information is secure and accessible only by you. Here's a breakdown of how our security system works.
By combining advanced encryption techniques, client-side security, and a Zero Trust model, we ensure that your data is always protected, private, and under your control.
Unique Database Identification
Every user's data is linked to a unique identifier of users' choice - we called it Database Id and it could be: personal ID, social security number, any other random identifier. This identifier is never sent to our servers in its original form. Instead, it’s hashed using SHA-256, ensuring that even if intercepted, the information remains protected and untraceable.
User Key Encryption
Your personal encryption key, known as the User Key, is generated uniquely for you and never stored on our servers. This key is essential for unlocking your Master Key, which encrypts and decrypts your data. All encryption and decryption happen on your device, meaning that your sensitive information is always under your control and never exposed to external threats.
Double-layer Encryption for Added Security
We implement a dual-layer encryption system using both a User Key and a Sharing Key. The Sharing Key is a temporary code you can generate for secure sharing of your data for a set duration—such as 30 minutes or a day—without revealing your main User Key. This system allows you to share access safely, without compromising your overall security.
Client-side Encryption and Decryption
We prioritize your privacy by ensuring that all data encryption and decryption are handled on your device. Your data is encrypted before it leaves your device and is only decrypted when it returns. Our servers never receive your actual encryption keys—only securely hashed versions—making it impossible for anyone but you to decrypt your data.
Flexible Key Management
Our system is designed for easy management of your encryption keys. You can update or change your User Key or Sharing Key without needing to re-encrypt your entire database. This flexibility is possible because of our innovative key structure, which securely protects your Master Key while allowing you to manage access and security seamlessly.
Secure Login Process
When you log in, your credentials are securely hashed and verified by our servers. Upon successful login, the server provides an AES-encrypted Master Key, which is decrypted only on your device using your User Key or Sharing Key. This Master Key is then used for all data encryption and decryption, ensuring that your data remains encrypted and secure throughout your session.
Complete Data Protection
Every action involving your data is secured with the highest levels of encryption. Even when accessing your data, our servers only receive hashed versions of your keys. These hashes are verified, but the actual keys remain on your device. This approach ensures that your data is inaccessible to unauthorized parties, including our servers, providing you with peace of mind that your information is always secure.
Use Cases
Here are all medical documents you can use with Doctor Dok
Extract key patient data points for comprehensive health timelines. Identify potential gaps in care or follow-up needs.
Capture and categorize clinician observations. Correlate subjective findings with objective data points.
Standardize diverse hematology reporting formats. Flag unusual cell populations or counts for specialist review.
Extract key findings from narrative reports. Organize biopsy results for easy review and comparison.
Standardize antibody test results across different assays. Monitor immune status changes over time.
Track electrolyte balance over multiple tests. Alert to rapid changes or consistent imbalances.
Calculate and track kidney function metrics over time. Highlight trends that may indicate declining renal function
Extract key findings from narrative radiology reports. Link report data with actual images for comprehensive review.
Organize culture results and antibiotic sensitivities. Track pathogen prevalence and antibiotic resistance patterns.
Convert unstructured lab reports into structured data. Flag abnormal values and suggest relevant follow-up tests
Track biomarker fluctuations across time. Alert to significant changes that may indicate need for intervention.
Quantify immune response markers. Track immunological changes in response to treatments or interventions.
Compile chronological health events from various documents. Identify potential risk factors based on historical data.
Normalize CBC data across different lab formats. Visualize trends in blood cell populations over time.
Monitor liver enzyme trends. Flag patterns indicative of potential liver stress or damage.
Integrate various metabolic markers for a holistic view. Suggest lifestyle or dietary changes based on metabolic trends.
Standardize urinalysis results from different lab formats. Track changes in urine composition over time.
Structure complex genetic data into interpretable formats. Identify potential genetic factors relevant to current health status.
Build safe Health Products integrated with AI
Build on top of central safe database of patients medical records based on MIT or Commercial License with support.