You are on page 1of 9

(様式)

専攻分野及び研究計画
Field of Study and Research Plan

Name (in alphabet)


(氏名(アルファベット)) WEMENOU , DAIRA
(Surname) (Given name) (Middle name)
Nationality
(国 籍) Beninese

≪Guide for Creating a Field of Study and Research Plan Sheet/作成要領≫


(1) As this sheet is one of the most important references for selection and university placement, outline your field of study and
specify your research theme and plan in line with the following items 1 and 2. If plagiarism or fraud is discovered after
selection, the selection will be cancelled retroactively.
本様式は選考及び大学配置の重要な参考となるので、下記の項目1及び2に沿って専攻分野の概要及び研究計画の詳細を具体
的に記入すること。なお、採用後に不正、盗用等が判明した場合は遡って採用を取り消す。
(2) This sheet must be typewritten or written in block letters. If possible, please write in Japanese.
記入はタイプ又は楷書によるものとする。相当の日本語能力を有する者は日本語により記入すること。
(3) This sheet must be created within two pages. Additional materials may be attached if necessary. Both a single-side and dual-side
printing will be acceptable.
本様式は2ページ以内で作成すること。ただし必要な場合は別紙を付してもよい。印刷は片面印刷、両面印刷のどちら
も可。

1. Past and present field of study(これまでの専攻分野)

My past and present field of study are the same, and it’s Computer Science, especially Computer Networking
security

2. Research theme and plan in Japan(渡日後の研究テーマ及び研究計画)


Describe articulately the research theme and plan you wish to carry out in Japan. Specify particularly the ultimate goal(s) of your research
in
Japan.(日本において希望する研究テーマ及び研究計画を明確に記入すること。特に研究の最終目標を具体的に記入すること
。)
(1) Research theme(研究テーマ)

Use of IT for the verification of medical prescriptions and for the control of counterfeit drugs

(2) Research plan(研究計画)

Please refer to the attached document to find more details on my research plan

~1~
CONTENTS
INTRODUCTION ........................................................................................................................................ 3
CURRENT SITUATION.............................................................................................................................. 3
Diagram N* 1: Description of the current system in place ....................................................................... 4
OBJECTIVES OF THE RESEARCH .......................................................................................................... 4
Diagram N* 2: Description of the system after the implementation of our research.............................. 5
EXPECTED RESULTS AND BENEFITS................................................................................................... 5
Diagram N* 3: illustration of the result after the implementation of our research................................. 6
What are the challenges that can arise during the implementation of such a project? .............................. 6
1. Securing the database ........................................................................................................................ 6
2. QR Code Technology Implementation and Code Security ............................................................... 6
3. System Strengthening and Monitoring ............................................................................................. 7
4. Encryption ..................................................................................................................................... 7
CONCLUSION ............................................................................................................................................. 8

~2~
INTRODUCTION

According to its constitution, the World Health Organization (WHO) aims to achieve the highest
possible level of health to all the people of the world. Health is defined by the WHO as "a state of
complete physical, mental and social well-being and not merely the absence of disease or infirmity".
But to achieve these health objectives, now considered a global public good, it depends not only
on medical responsibilities, but also on certain new factors. Among these factors, we can include the fight
against counterfeit medicines and the monitoring of access to medicines.
Monitoring access to medicines and verifying the authenticity of medicines are ways that can help
WHO and all health actors in their missions to ensure the well-being of all people in the world.
Through this research, we would like to explore and study the possibility of putting in place a
system that would allow patients to have access to non-counterfeit medicines and to reassure health
professionals that patients have access to medicines that have been prescribed to them

CURRENT SITUATION

Every year, according to the World Health Organization (WHO), the use of fake medicines
causes the death of more than 100,000 people. According to the same source, one out of every 10 drugs in
the world is counterfeit, an average that can reach seven out of 10 in some African countries.
Our country, Benin, is a major trafficking area for counterfeit drugs: nearly one third of these
products distributed in sub-Saharan Africa transit through the port of Cotonou, according to the same
source. The turnover generated by this counterfeiting is estimated at a minimum of 10 to 15% of the
global pharmaceutical market, or $100 to $150 billion, or even $200 billion, according to a study by the
World Economic Forum.
When hospital pharmacies are out of stock (for short or long term), patients or their relatives
prefer to buy the drugs elsewhere, often in unregulated markets. Another cause of this counterfeiting and
the most important one is the economic problem that forces some people to use fake or expired drugs
because they are cheaper than at the pharmacy.
All these elements mentioned above demonstrate the importance of the implementation of a
system that based on new technologies could help the authorities of the sector in the fight against
counterfeiting. This will not only preserve the health of the population of several countries like Benin but
also help the WHO in the fight against counterfeiting and reuse of expired medicines.

~3~
Diagram N* 1: Description of the current system in place

Explanation of the diagram:

The diagram above describes the current system in place. It illustrates the case of a sick patient
who went to a clinic for a consultation with his doctor who prescribed him some medicines on a
prescription that he gives him. The patient brings this prescription to the pharmacist outside the clinic and
he is served without any control of the origin and authenticity of the prescription. The medicine that was
served to him also has no indication of its quality.

OBJECTIVES OF THE RESEARCH

The idea we want to explore to fight again or reduce counterfeit drugs is to implement a new
technology-based approach to dispensing and verification systems for medical prescriptions in hospitals
and pharmacies. This new approach will allow the government to have a centralized database that will not
only help pharmacists determine the exact source of medical prescriptions but also reassure patients that
the drugs are reliable.
This will be accomplished through:
 Establishing a national centralized database of health workers.
 Setting up a unique automatic QR code generation system for health workers and pharmacies.
 Setting up a loan system through mobile networks to help those who do not have the economic
means to pay for clinical care to pay via mobile and electronic wallets (e.g. MTN Money, Orange
Money, Moov Money).

~4~
Diagram N* 2: Description of the system after the implementation of our research

Explanation of the diagram N*2:


The diagram above describes the system after the implementation of our research. It illustrates the
case of a sick patient who went to a clinic for a consultation with his doctor who prescribed him some
medicines on an encrypted prescription with a QR code that he gives him. The patient brings this
encrypted prescription to the pharmacy assistant and is served after scanning the QR code to know the
type of medicine prescribed and the origin and authenticity of the prescription. The medication that was
finally served has a QR code stuck on the back of the package. Anyone who scans this QR code will see
all the information that will lead him to ensure the quality of this medication.

EXPECTED RESULTS AND BENEFITS

The implementation of our system will lead to the following benefits


 Reduction of mortality and abuse due to the use of counterfeit drugs (monitoring access to all
types of drugs will force the population to use competent specialists and legal services to obtain
medical prescriptions).
 Availability of a database that allows to know with precision the authority issuing the prescription
and the date of issue.
 Prevent some patients from obtaining unverified prescriptions themselves for medications that
they don't really need and that may have adverse effects on their health.

~5~
 The establishment of a loan system from mobile communications networks to help the population
(especially those in difficult economic situations) to benefit from a minimum of clinical care via
mobile loans or payment.
 Allow patients to be reassured that they have purchased medicines that respect the conditions of
manufacture and conservation.
Diagram N* 3: illustration of the result after the implementation of our research

What are the challenges that can arise during the implementation of such a project?

The implementation of such a solution cannot be done without difficulties and


challenges. We have therefore listed below some of these challenges and proposed steps to
explore them during our research.
1. Securing the database
Securing the health worker database will involve multiple controls, including system
hardening, access, DBMS configuration, and security monitoring. These various security
controls will be used to manage the contours of the security protocols.
2. QR Code Technology Implementation and Code Security

The QR codes that will be generated automatically when printing the prescriptions will provide
information on the authenticity of the prescriptions, its date of issue and any information that can help
uniquely identify the patient and the prescription.
The QR codes will be created on stickers and stuck behind the drugs as soon as they arrive in the
pharmacies to provide all the necessary information regarding the authenticity of the drug.

~6~
According to a publication of france24 on (QR codes and health passport), QR codes are however
the "ideal means of attack for cybercriminals", warns experts in cyber security such as Mr Roman Zaikin,
of the specialized firm Check-point. Because "a malicious QR code is undetectable to the naked eye".
Once scanned, it is already too late, warns Mr. Zaikin. It is therefore necessary to ensure the
security of the personal data of the healthcare workers who have to scan these codes.
A hacker could then exfiltrate the data from the mobile device as soon as the QR code is scanned.
In a few figures, the study shows the extent of the risk linked to the unsecured use of QR codes.
Almost three quarters (71%) of respondents cannot distinguish between a legitimate and a malicious QR
code, while 67% can distinguish between a legitimate and a malicious URL. While most respondents
(67%) know that QR codes can open a URL.

3. System Strengthening and Monitoring

It is critical that the entire system is patched consistently and hardened using known security
configuration rules, and monitored for access, especially against insider threats.

4. Encryption

Prescription reading security can include secure encryption key management, encryption system
protection, secure off-site encryption backup management, and access restriction protocols. All of this is
to prevent any user with a QR code reader from reading the medical data.

What about Japan in this area

The QR Code (for "Quick Response Code" in English) was born in Japan in 1994. Its inventor,
Masahiro Hara, made it public in 1999; Denso-Wave publishes the QR code under a free license; this
contributed to the diffusion of the code in Japan. Later, it really took off with the advent of smartphones.

In the late 2000s, it became one of the most popular two-dimensional codes in the world, and
computer applications for reading QR codes were often already installed by manufacturers in cell phones.
In Japan, this practice was already widespread in 2003.

In Japan, several studies and researches using QR codes for the improvement of existing systems
or the creation of new systems are underway or have already been published. For example, we have this
project of a Japanese start-up which wonders how to identify and bring back home a disoriented elderly
person, found lost in the street, without identity papers on him? To solve this problem, a company has
created small stickers, measuring less than a centimeter, which can be stuck on a fingernail or a toe. Each
sticker has a "QR code".

~7~
Other studies have allowed us to learn that in Japan, thousands of QR codes are also printed all
over the place, on the sidewalks, in the underground shopping malls and in the subway corridors of the
posh district of Ginza in Tokyo, to guide the passers-by, within the framework of an experiment which
also implements electronic labels. This kind of initiative is multiplying everywhere in the shopping
districts and tourist sites of Japanese cities.

The above elements show that Japan is not only the country that created the QR code but also a
great user of this system to reinforce the controls and improve existing systems. Our research also
allowed us to discover that several projects on this same theme are still ongoing in Japan.

CONCLUSION

The new information technologies represent today an asset that can help the WHO in its
objectives of preserving human lives.
Our research has shown that Japan is a country where health is a national priority and where
every effort is made to keep its population healthy.
If we are given the opportunity through the MEXT fellowship from the Japanese government, our
wish is to go and learn from Japanese researchers, engineers and professors already experienced in this
field.

~8~
~9~

You might also like