mi2b2
Space shortcuts
Space Tools
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 39 Next »

Overview

Configuring Download Settings and Download Studies

There are two entry points in the UI to initiate a download. The first is in the Request Management UI (Tab 3), the second is in the Cache Management UI (Tab 5).

Each of these entry points require users to configure download settings before download can proceed. Users must set up

  1. A download location (where the downloaded studies will be stored).
  2. Encryption options

Encrypted studies have obfuscated versions of file names for the studies, series, and images (as opposed to the unencrypted version that uses the study/series/images ID from DICOM headers ). In addition, an image cannot be viewed (in mi2b2 client or any other DICOM image viewer) without a correct key. The aim of encryption is to add an additional layer of protection on the imaging data.

This document describes the interface by which users can configure these settings. For details about the encryption algorithm, strength, and the process of encrypting downloaded images, please refer the technical note on Encryption.

Video

Requires Flash Player


(video length: 2:07)

This video shows the steps in configuring download settings. Learn how to

  1. Find and change the default download location.
  2. Download without encryption.
  3. Set up encryption using an existing key file.
  4. Set up encryption by generating a new key file.
  5. Set up encryption by creating a key using a password.
  6. Access the dialog to set encryption options.

Download Settings Persistence

Regardless through which entry point users elect to configure the download settings, the settings is global to the mi2b2 client. That is, if the settings are set in Request Management UI, the same values will be in effect in Cache Management UI and vice versa. These values do not carry forward from session to session, however. When the client exits, all the settings are lost. The next time the client is launched, default values will be used.

From Request Management

UI Layout

To configure download settings, users would use the UI elements in 4 (configuring download location) and 5 (configuring encryption options). Once the configuration is complete, the "Download Selected Studies" button (7) will become enabled, allowing users to proceed downloading.

When "Encrypt Downloaded Images" is selected, and "Enter Key..." is pressed in 5, the Key Configuration Dialog will pop up allowing users to select a key (see below) for encryption.

Key Configuration Dialog

Users can select one of

1. (Load key from a file) Users can use a previously generated key file to encrypt subsequent downloads. To browse for a file, use "Browse...". If no such file exists and users want to generate a key, select "Generate Key file...". Once a key file is generated, users will be prompted to save it. Once it is saved, it will be automatically loaded into the mi2b2 client. The same key file can be shared by multiple users to ensure every user on the same project can read these images once downloaded.
2. (Enter a key to generate a key) Users can also enter a key-phrase to generate a key. These keys are generated from a key phrase at least 8 characters long entered directly from the user and concatenated with the user's ID. These keys are meant for single-person use only. Sharing a key phrase with another user will not allow them to generate the same key (because the key generation also takes in user ID).
3. (Use no encryption) Users can also opt not to use encryption. This is not a default choice as users need to consider carefully whether using "No Encryption" is appropriate.

Instructions for each selection are shown in 4, and any warnings are shown in 6. When everything is in order, users can choose "OK" to confirm, or "Cancel" (5).

This Key Configuration Dialog can also be launched any time from the quick link near the top right corner of the mi2b2 client interface:

From Cache Management

UI Layout

To configure download settings, users would use the link in 3 ("configure download"). The link will launch a dialog that allows users to choose a download location and encryption options. If the configuration is not complete (e.g. encryption is chosen, but no encryption key is given) and when user selects "Download Selected Studies", the same configuration dialog will pop up and prompt users to complete the configuration.

When the "Configure Download" download is selected, download configuration dialog will pop up allowing users to select a download location and a key (see below) for encryption.

Download Configuration Dialog

The dialog is identical to the key dialog found in the Request Management UI (Tab 3), with the exception that there are widgets to select a download location 1.. Whether users "OK" or "Cancel" this dialog, the download location will be set to the most current value.

Users can select one of

2. (Load a key from a file) Users can use a previously generated key file to encrypt subsequent downloads. To browse for a file, use "Browse...". If no such file exists and users want to generate a key, select "Generate Key file...". Once a key file is generated, users will be prompted to save it. Once it is saved, it will be automatically loaded into the mi2b2 client. The same key file can be shared by multiple users to ensure every user on the same project can read these images once downloaded.
3. (Enter a key to generate a key) Users can also enter a key-phrase to generate a key. These keys are generated from a key phrase at least 8 characters long entered directly from the user and concatenated with the user's ID. These keys are meant for single-person use only. Sharing a key phrase with another user will not allow them to generate the same key (because the key generation also takes in user ID).
4. (Use no encryption) Users can also opt not to use encryption. This is not a default choice as users need to consider carefully whether using "No Encryption" is appropriate.

Instructions for each selection are shown in 5, and any warnings are shown in 7. When everything is in order, users can choose "OK" to confirm, or "Cancel" (6)

Executing Download

After the download settings are properly configured, users can execute download by using "Download Selected Studies" in either the Request Management UI or the Cache Management UI. Users can then view these studies in the Image View UI (Tab 4). See Viewing and Managing Studies for more details.


  • No labels