{ ZD Medical Optical Coherence Tomography }

  • AI + OCT How can artificial intelligence help ophthalmologists diagnose faster and more accurately?

    The combination of artificial intelligence (AI) and optical coherence tomography (OCT) is revolutionizing the diagnostic model of ophthalmic diseases. The core of this integration lies in combining the powerful data analysis capabilities of AI with the high-resolution biological tissue structure imaging of OCT, thereby providing doctors with insights that exceed the limits of human vision. Specifically, AI has provided revolutionary assistance in the following aspects

    I. Core Support: Faster, More Accurate, and Smarter
    1.Ultra-high-speed quantitative analysis and screening
    What to do: AI algorithms can automatically complete the analysis of the entire OCT three-dimensional volume scan within seconds, accurately segment each layer of the retina structure (such as the nerve fiber layer, photoreceptor cell layer, etc.), and measure its thickness and volume.
    Traditional pain points: Manual measurement by doctors is time-consuming and labor-intensive, and it is difficult to quantify the entire retina so precisely.
    The changes brought about: It provides objective and repeatable quantitative data for glaucoma (focusing on the optic disc and nerve fiber layer) and macular diseases (focusing on the thickness changes of each layer), greatly shortening the initial assessment time.


    2. Anomaly detection and lesion identification
    What to do: The AI model, trained on a vast amount of labeled data, can automatically identify and label various lesions in OCT images like an experienced expert, such as
    Diabetic macular edema: Detection of fluid accumulation within the retina (cystoid edema).
    Age-related macular degeneration: Identification of vitreous warts, subretinal fluid, choroidal neovascularization, etc.
    Retinal vein occlusion: Macular edema and hemorrhage are found.
    Macular holes, epiretinal membranes, etc.
    The changes brought about: AI can act as the "first reader", quickly marking suspicious lesion areas, preventing the missed diagnosis of tiny lesions due to visual fatigue or lack of experience, and is particularly suitable for large-scale community screening.


    3. Disease classification and severity grading
    What to do: AI can not only detect lesions but also automatically classify and stage diseases. For instance, to determine whether AMD is dry or wet, to grade the risk of visual field defects in glaucoma, or to assess the severity of diabetic retinopathy.
    The changes brought about: It provides doctors with standardized diagnostic references to assist in making treatment decisions and priorities (for example, which patients with wet AMD need urgent anti-VEGF treatment).


    4. Predict disease progression and treatment response
    What to do: This is the most cutting-edge application of AI. By analyzing the longitudinal OCT sequence images, the AI model can learn the patterns of disease development and predict the risk of future disease deterioration. At the same time, it can also predict the possible response of patients to specific treatments, such as anti-VEGF injections.
    The changes brought about: achieving a leap from "diagnosing the present" to "predicting the future", making personalized medicine and preventive intervention possible.

    Ii. Specific Manifestations in the Clinical Workflow
    In screening scenarios: AI-OCT systems can be deployed in communities or physical examination centers. OCT scans are operated by technicians, and AI generates reports in real time, quickly screening out high-risk patients for referral to specialists, greatly improving the efficiency and coverage of screening.
    1.In the outpatient setting:
    Before the examination: The patient has completed the OCT scan.
    2. During the examination: AI real-time analysis generates a preliminary report with color annotations, quantitative data, and suspicious findings before the doctor's consultation.
    3. Doctor's Diagnosis: Doctors do not need to analyze from scratch from a vast amount of raw data. Instead, they directly review the AI's findings and, based on their own clinical experience, confirm, correct and make a final diagnosis. This is equivalent to having an "indefatigable assistant" complete all the basic measurements and initial screening work.
    4. Follow-up Comparison: AI can automatically and precisely match and compare this scan with the patient's historical scans, highlighting the areas that have changed (improved or deteriorated), making the follow-up assessment clear at a glance.

    Iii. Core Values for Ophthalmologists
    1. Liberate productivity: Free doctors from heavy repetitive labor (measurement, comparison), allowing them to focus on decision-making, doctor-patient communication, and treatment plan formulation that require high-level clinical thinking.

    2. Enhance diagnostic capabilities: As the "second pair of eyes", it provides objective and quantitative decision support, reduces diagnostic differences among individuals, and improves the consistency and accuracy of overall diagnosis.

    3. Dealing with the data deluge: Modern OCT scans generate an enormous amount of data, and AI is an indispensable tool for processing and analyzing these big data.

    4. Empowering grassroots and non-experts: Assist grassroots hospitals or general practitioners in initially identifying complex eye diseases, promote hierarchical medical treatment, and enable more patients to receive correct referral advice in a timely manner.


    Also welcome to contact us, we are ZD Medical Inc.
    Tel : +86-187 9586 9515
    Email : sales@zd-med.com
    Whatsapp/Mobile : +86-187 9586 9515

  • How Optical Coherence Tomography Constructs a “Data Vault” Compliant with Cybersecurity Protection Standards

    The first step: Demarcate the boundaries of the “safe” and the environment (regional boundary security)
    OCT devices

    should not be directly exposed to public networks. First, it is necessary to plan the security domain.

    1. Network partition isolation

      Medical equipment dedicated network: OCT devices, PACS servers, image storage servers, etc. are classified into an independent VLAN and logically isolated from the office network and the Internet.

      Firewall policy: Deploy firewalls at the network boundary and strictly follow the “principle of least privilege”. Only specific and necessary ports and IP addresses are allowed for communication (for example, port 104 of the DICOM protocol, a specific port of the hospital information system). Any illegal external access is prohibited.
    2. Physical Access Control

      The computer room where OCT equipment and core servers are placed should implement strict physical access control and video surveillance management to prevent unauthorized physical contact.

      Step 2: Build a sturdy box for the "safe" (secure computing environment)
      This is the core layer that protects the data itself.
      OCT Equipment and Terminal Security:
      Strengthen the operating system: Enhance the security of the operating system of the industrial control computer or computer built into the OCT device, as well as that of the diagnostic workstation.
      Anti-virus software: Install hospital-specific anti-virus software and update the virus database regularly.
      Identity authentication: It is mandatory to log in to the system with a unique personal username and a strong password. For the third-level information security protection, two-factor authentication should be mandatory.
    3. Data storage encryption (lock of the safe) :

      Static data encryption: All OCT image data must be encrypted when stored on the disk. Available options:

      Transparent database encryption: Encrypting sensitive fields in the database.

      Storage layer encryption: Encrypt the entire disk or volume using the built-in encryption function of the storage device or operating system-level encryption.

      File-level encryption: Encrypting a single DICOM file.

      Key management: Encryption keys must be uniformly managed by a professional key management system, stored separately from encrypted data, and rotated regularly. This is the key point of the requirements for the equal protection.
    4. Application Security

      Ensure that the PACS software and OCT device software themselves have no known high-risk vulnerabilities, and conduct regular security assessments.

      Step 3: Ensure "safety during transportation" (communication network security)
      When data is transmitted between OCT devices, PACS servers and diagnostic workstations, it is necessary to prevent eavesdropping and tampering.
    5. Transmission encryption

      Enforce the use of encryption protocols such as DICOM over TLS or DICOM over HTTPS to replace the traditional plaintext DICOM protocol. This ensures that data is encrypted when transmitted over the network, similar to HTTPS protecting web page communication.

      For scenarios such as remote consultation that require cross-internet transmission, a VPN encrypted tunnel must be established.

      Step 4: Establish a monitoring and management center for the "safe deposit box" (Safety Management center)
      This is the brain and nerve center of the "safe", responsible for monitoring, auditing and emergency response.
    6. Log audit (recording who opened the box) :

      Collect all logs related to OCT data centrally, including: user login/logout logs, logs of OCT image creation, modification, deletion, access, printing, export and other operations. These logs must be retained for no less than six months.

      The information security protection level requires that the content of logs cannot be tampered with, so it is necessary to deploy a professional log auditing system.
    7. Database Audit

      For operations that directly access the database, a database auditing system is deployed to record all access behaviors to OCT data tables, especially high-risk operations.
    8. Operation and Maintenance Management and Security Audit

      Video the operations of system administrators and record instructions to achieve traceability.

      Regularly conduct security risk assessments and vulnerability scans.
    9. Data Backup and Recovery (Spare key for the safe) :

      Formulate a complete data backup strategy and regularly back up OCT image data and related patient information.

      Regularly conduct disaster recovery drills to ensure that business and data can be quickly restored in the event of data loss, system downtime or ransomware attacks. Backup data also needs to be encrypted for protection.



      Also welcome to contact us, we are ZD Medical Inc.
      Tel : +86-187 9586 9515
      Email : sales@zd-med.com
      Whatsapp/Mobile : +86-187 9586 9515