Magnetic Resonance
Operator Manual
Version syngo MR 2006T
0.0
medical
Manufacturers note: 0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
2005 Siemens AG
All rights reserved 0.0
Siemens AG
Wittelsbacherplatz 2
80333 Mnchen
Germany 0.0
0.0
Contact Information:
Siemens AG, Medical Solutions
Magnetic Resonance
Henkestrae 127
91052 Erlangen
Germany 0.0
AG 09.05 0.0
0.0
syngo MR Summary of contents
Basics A
Security Package B
Patient Browser D
Patient Registration E
Examination F
Viewing G
3D Evaluation H
Neuro 3D K
Postprocessing Images L
Vessel View M
Composing N
Filming O
References P
Index
0.0
iv Operator Manual
syngo MR Table of contents
A Basics
A.1 General Information
B Security Package
B.1 Introduction
D Patient Browser
D.1 Introduction
0.0
syngo MR 2006T v
Table of contents syngo MR
D.8 Reporting
E Patient Registration
E.1 Introduction
F Examination
F.1 Introduction to the MR Examination
0.0
vi Operator Manual
syngo MR Table of contents
G Viewing
G.1 Introduction
G.5 2D Evaluation
H 3D Evaluation
H.1 Introduction
H.3 Working in 3D
0.0
H.9 3D Editor
H.10 Fusion
H.14 3D Configuration
0.0
K Neuro 3D
K.1 Introduction
L Postprocessing Images
L.1 Dynamic Analysis
M Vessel View
M.1 Introduction
0.0
syngo MR 2006T ix
Table of contents syngo MR
N Composing
N.1 Introduction
N.4 Evaluations
O Filming
O.1 Introduction
P References
P.1 Scan Parameters
Index
0.0
x Operator Manual
syngo MR Special Information 0.0
0.0
N OT E
The magnetic resonance tomographs of the Magnetom
family are not devices with measuring functions. 0.0
0.0
syngo MR 2006T xi
Revision Info syngo MR
In comparison to the previous version new coils are used for the
MAGNETOMS Symphony and Trio. The corresponding coil
abbreviations are listed in Chapter Text Annotations in Medical
Images.
Page P.28 0.0
0.0
0.0
0.0
The slice positions are positive in the Feet, Anterior, and Left
directions as seen from the magnet isocenter. 0.0
0.0
The slice positions are positive in the Left, Posterior, and Head
directions as seen from the magnet isocenter. 0.0
0.0
syngo MR 2006T xv
Revision Info syngo MR
0.0
syngo MR +LPH
If the slice position ascends, the slices move toward the positive
coordinates:
0.0
Numaris 3 and The transverse slice moves in the (F) direction of the feet.
Numaris 3.5 0.0 The coronal slice moves in the anterior (A) direction.
The sagittal slice moves in the left (L) direction.
syngo MR 0.0 The transverse slice moves in the (H) direction of the head.
The coronal slice moves in the posterior (P) direction.
The sagittal slice moves in the left (L) direction.
0.0
NOTE
Beginning with software version MRease VA12A, the
image text changes for the slice position. Instead of the sign
"+" or "-", directional abbreviations such as L, P or H, or R,
A or F are shown. 0.0
0.0
0.0
0.0
syngo MR 2006T A1
Contents Basics
0.0
A2 Operator Manual
CHAPTER
A.1 General Information A.1
A.1
Operating system A.1 The program syngo MR uses the operating system Windows
XP. A.1
A.1
C AU T I O N
Source of danger: Impermissible or faulty manipulations or
changes of the hardware or software can cause the system
to malfunction. A.1
0.0
Security in syngo MR A.1 Security in syngo MR" provides the whole functionality neces-
sary for the protection of patient data. A.1
Log on A.1 After you have switched on the computer and before you start
working you must log on as a user.
Page B.35, Logging on and off A.1
A.1
NOTE
When a user logs off, unsaved data are lost
irretrievably. A.1
Program start A.1 After log on the applications start automatically. A.1
0.0
Rebooting of main and During startup of your system the main console and the satellite
satellite consoles A.1 consoles are also automatically started up. If you reboot the
main console manually, make sure to reboot the satellite con-
soles as well.
A.1
System administration A.1 You find more information on security and system administra-
tion in Part B, Security Package.
A.1
Audit trail A.1 In a secure system, all actions on data are logged.
Page B.271, Audit trail and log files
A.1
Names and designations All names and data of patients and institutions that are used in
used A.1 this operator manual are entirely fictional. A.1
0.0
A.1
WA R N I N G
Indicates potential dangers that could cause injury or death
in extreme cases. A.1
C AU T I O N
Indicates potential (direct) dangers that could cause minor
injury or damage to the system. A.1
A.1
N OT E
Notes regarding optimum use of the system and other
useful information. A.1
0.0
0.0
A.1
C AU T I O N
Source of danger: Impermissible or faulty manipulations/
changes of the software or connection of the system to a
network A.1
A.1
C AU T I O N
Source of danger: Reduced system performance due to
overload of the network environment. A.1
0.0
0.0
Suitable topology A.1 A good and secure network architecture is able to reject most
attacks from viruses, worms etc. The network architects and IT
administrators of a hospital use a suitable topology with the best
protection of the medical devices connected. A.1
0.0
You are first given a short overview of the user interface of the
program. After that, an explanation is given of how to operate
the computer using the mouse and keyboard. A.2
0.0
After start up, the user interface of the program will appear on
your screen, with the Exam task card in the foreground.
The user interface is subdivided into the following areas: A.2
0.0
You can start actions of the program with the mouse buttons.
With the left button you select objects and start applications and
actions, with the right button you open popup menus and with
the center button you change the window values of images. A.2
With the mouse you can: A.2
0.0
A.2
A.2 If you have lost sight of the mouse pointer, simply move the
mouse.
Depending on the application which is currently active and the
action you want to perform the appearance of the mouse
pointer can change.
A.2
0.0
A.2
Double-click A.2
A.2
Dragging A.2
Press the mouse button and move the mouse while holding the
button down. With this action you can draw graphics, for exam-
ple (left mouse button), or set window levels (center mouse but-
ton). A.2
0.0
Drag & drop A.2 Click an object with the left mouse button, move it while holding
the mouse button down and release the mouse button again. A.2
A.2
Calling up the With the key combination Shift + F10 and a single click of the
popup menu A.2 right mouse button you can call up a pop menu for the selected
object or active area of the screen (except Viewing).
Page A.25, Using the mouse A.2
0.0
You use the keyboard to enter text and numbers. You can also
call up certain functions and start programs using key combina-
tions and the keys of the numeric keypad.
A.2
0.0
A.2
Entering text and The keys on the typewriter keyboard are normally used to enter
numbers A.2 text and numbers as well as commands.
A.2
Deleting characters A.2 Pressing the Backspace deletes the character in front of the
cursor; pressing the Del key deletes the character following the
cursor. If a text is marked you can use either of these keys to
delete it.
A.2
Moving the cursor A.2 With the cursor keys you can move the text cursor
within a text entry field. With the keys Home and End you move
the cursor to the first and last position within the text.
A.2
Calling up help A.2 Press the F1 key to call up the Online Help supplied with the
program.
A.2
Calling up task cards A.2 Press the function keys F6 to F8, to call up the individual task
cards.
Page A.237, Task cards A.2
0.0
Setting the keyboard The user interface of the Exam task card is divided into sepa-
focus A.2 rate areas, e.g. image area or program control. If you want to
operate the program quickly via the keyboard you can activate
the input and operation tools of the interface separately, one
after the other. By doing this, you are placing a focus on a spe-
cific object on the user interface to enable input via keyboard.A.2
For this purpose, press the Tab key on your keyboard to jump
forwards.
Or A.2
Press the Tab key until you reach the object that you want to
operate via the keyboard.
The object which currently has the keyboard focus is marked.A.2
Buttons are marked with a broken line border.
A.2
Entries in the program card are marked with a broken line bor-
der.
A.2
Entries in the program card are marked with a broken line bor-
der and have a blue background. A.2
0.0
Paging through If the keyboard focus is on a card stack, you can also move indi-
card stacks A.2 vidual cards to the foreground via keyboard commands. A.2
Jumping within objects A.2 You can move the keyboard focus using the tab key within
objects, e.g. program control or parameter cards. A.2
0.0
Starting applications and The symbol keypad of your system looks different from the
functions A.2 numeric keypad on a standard PC keyboard. These keys have
been assigned special functions on your system. The symbols
on each key help you to easily identify the respective functions.A.2
If your system is not equipped with the original Siemens key-
board, you can call up these functions and programs using
the corresponding keys on your standard numeric keypad.
0.0
0.0
Mark (Num. 3)
0.0
Using shortcuts A.2 With the key combinations Ctrl or Alt or Windows plus another
key you can give commands to your computer very quickly. A.2
You can execute all functions by pressing the Alt key together
with the key of the letter underlined in the menu item or on the
button. In this way, you can operate the program without using
the mouse.
Here is a table of the most important key combinations: A.2
A.2
A.2
Ctrl + Tab Switch active task card / page through stack of cards
Ctrl + Shift + Switch active task card backwards / page through stack of
Tab cards backwards
Ctrl + C Copy
Ctrl + I Import data
Ctrl + P Expose film task
Ctrl + S Save (only 3D taskcard)
Ctrl + X Cut (only Filming taskcard)
Ctrl + V Paste
Ctrl + W Save window values
0.0
A.2
0.0
A.2
0.0
Selecting several objects A.2 You select an object with the mouse and then press the Ctrl or
the Shift key. A.2
With the Ctrl key you can select other individual objects. A.2
With the Shift key you can select entire blocks of objects. A.2
Deselecting objects A.2 You can deselect selected objects by selecting another object
or by clicking the background with the mouse. A.2
0.0
Drag & drop A.2 This means picking up an object, dragging it and dropping it
again. A.2
Click an object with the left mouse button, e.g. a series, and
hold the mouse button down.
Press the Ctrl key if you want to copy the object.
Drag the object to another location with the mouse (into an-
other task card or window).
Release the mouse button.
The object will be moved or copied to the new location.
Page A.25, Using the mouse A.2
0.0
Cut/copy & paste A.2 Another way of moving objects is via the cut & paste or copy
& paste functions. A.2
Call up Edit > Copy or use the shortcut Ctrl + C if you want
to copy the object.
0.0
Double-clicking A.2 If you double-click on an object with the left mouse button, the
standard function of the associated function menu, which also
depends on the object type, is executed. You can transfer a
selected object to another application with a double click.
A.2
Menus A.2 You can also use the entries of the dropdown menus to pass
objects from one application to another. A.2
Select the object(s) you want to pass onto another task card.
Call up the relevant menu item.
Page A.241, Using menus
0.0
You can change the display of an image using the mouse: A.2
Move the mouse pointer onto the image, press the center or
left mouse button and hold it pressed. If you now move the
mouse you change the way the image is displayed.
The mouse cursor changes shape for zooming (left cursor) and
panning (right cursor). A.2
0.0
If you click a text entry field with the mouse, the mouse pointer
becomes a text cursor (vertical bar). A.2
Selecting text A.2 You can mark text by moving the cursor across the text while
holding the left mouse button down. The text is displayed high-
lighted. A.2
Selecting words A.2 Double-click with the left mouse button while the cursor is
inside a word. The word is marked.
Deleting text A.2 Use the mouse to select text. Press the Del or the Back-
space key. The selected text is deleted.
0.0
Windows A.2
A.2
0.0
(1)
(2) (6)
(3)
(4)
(5) (7)
(8)
(9)
0.0
A.2
Changing the type of In the top right-hand corner of the title bar you will find three but-
window A.2 tons with which you can change the size and position of win-
dows. A.2
With these buttons you can change the active window as fol-
lows:
A.2
A.2 Click on the left-hand button with the left mouse button to
minimize the window.
A.2 Click the center button to toggle between full screen and win-
dow size. If you click the on button again you switch back to
the previous size.
A.2 Click on the right button to close the window and therefore
the application as well.
Or A.2
0.0
Resizing the window A.2 Move the mouse pointer onto the border of the window and its
appearance changes. Depending on where you place the
mouse pointer it can take on one of the following shapes: A.2
0.0
Changing the position of You can move the window to any position on the screen as long
the window A.2 as it is not maximized or minimized. A.2
Click the title bar and drag the window to the new position
holding the mouse button down.
0.0
Moving the content of the On the scroll bars you will find the arrow buttons and a scroll box
window A.2 with which you can move the content of the window. Depending
on whether the window is too short or too narrow to display its
content the scroll bar will appear on the right or below the win-
dow. A.2
Click an arrow button (1) with the left mouse button. The
screen content is shifted a small distance in the direction of
the arrow.
Click the scroll box (2) and drag it with the mouse. The
screen content is moved continuously in the corresponding
direction.
Click on any point on the scroll bar with the mouse. The
screen content is moved toward this point by a distance
which is proportional to the distance of this point from the
scroll box.
0.0
0.0
In a dialog box you will find entry fields, selection lists, radio but-
tons or checkboxes to select options and buttons with which you
can accept or reject inputs. A.2
0.0
NOTE
A large window might be hiding smaller dialog or message
boxes.
In that case, move the large window until the small window
becomes visible. A.2
Example:
The Patient Browser box is open. The system starts
burning a CD in multi-session mode. The dialog box
Enter label is hidden by the Patient Browser.
0.0
You can select options by clicking on them with the left mouse
button. Only one option can be selected at a time.
A.2
A.2
Click the arrow to the right of the selection list using the left
mouse button to open the selection menu.
Move the mouse pointer down the list.
The entries are highlighted one after the other. A.2
0.0
Click into the entry field with the mouse pointer. Then enter
the text at the text cursor.
Click one of the arrows with the left mouse button to increase
the set value (up) or decrease it (down), or enter a value in
the entry field.
0.0
Slider A.2 With the slider you can set a value range. A.2
Buttons for executing By clicking on a button you start an action. A dialog box con-
commands A.2 tains several buttons, for instance: A.2
A.2 All the settings in the window become valid and the window
is closed. In some dialog boxes OK triggers an action, for
example, filming.
0.0
Buttons for calling up You can start many functions in the program both via the menus
functions A.2 or via the icon buttons. A.2
Dimmed fields and There are a number of functions which you can only execute if
buttons A.2 you have selected an image, for example, or loaded data into
the task card. Buttons and input fields are dimmed (shown gray
or shaded), if you cannot execute the function assigned to
them. A.2
The icon is active, for example, you can now draw a ROI on an
image.
If you place the mouse cursor over an icon, a short text about
this function is displayed. The tool tip disappears again after a
few seconds.
0.0
Tab cards are arranged in stacks so that you can place them in
the foreground easily by clicking on a tab. When you activate a
tab card it is placed in the foreground. You can only start a func-
tion from an active tab card.
A.2
The active tab card has a different background color than the
inactive tab cards. A.2
The settings and data that you have entered on the tab card
which was previously active are not changed when it moves into
the background. When you call up this tab card again you will
find all the data and settings unchanged. A.2
Task cards
Subtask cards
0.0
Calling up using the tabs A.2 Click on the tab (1) on the right-hand side of the screen to
activate a task card.
0.0
Calling up using the You can also switch to each task card using the function keys.A.2
function keys
Press the F5 key to switch to the Examination task card.
A.2
Switching to another You can switch to another task card. You simply select the
task card A.2 appropriate tab. A.2
0.0
Too many applications Your system can only handle a certain number of open task
active A.2 cards. If the permitted number is exceeded, the Too Many
Applications Active dialog box will be displayed. In this case,
please close one of the running applications. A.2
0.0
On task cards you will find smaller cards, called subtask cards.A.2
They are used for the following purposes: A.2
0.0
The menu bar changes with the task card that is currently active
or the window that is currently open. This way only the functions
are accessible which are relevant for the respective application.A.2
A.2
Patient Browser The menu bar of the Patient Browser window contains the fol-
menu bar A.2 lowing menu items: A.2
Viewing menu bar A.2 The menu bar of the Viewing task card contains the following
menu items: A.2
Filming menu bar A.2 The menu bar of the Filming task card contains the following
menu items: A.2
0.0
3D menu bar A.2 The menu bar of the 3D task card contains the following entries:A.2
A.2
Optional applications A.2 If there are any optional applications integrated in your system
or licensed for your system you call them up via the additional
menu entry Applications. A.2
0.0
Selecting a menu A.2 Click on a menu item in the menu bar with the left mouse but-
ton.
The dropdown menu is opened. The menu item is highlighted.A.2
Move the mouse pointer down the menu bar and each drop-
down menu opens and closes in turn.
Only the dropdown menu on which the mouse pointer is placed
remains open.
A.2
Closing the menu A.2 If you do not want to select a function, click the menu title
again or click on the background outside the dropdown
menu.
0.0
Options A.2
0.0
Submenu A.2 Some lines in the dropdown menu have a small arrow on the
right-hand side. If you move down to one of these arrows with
the mouse pointer a submenu is displayed. A.2
0.0
Calling up popup menus A.2 First select an object with the left mouse button.
Call up the popup menu by pressing the right mouse button
or with Shift + F10.
The menu belonging to the current object type is displayed.
A.2
0.0
The status bar at the bottom edge of the window shows you
messages and instructions and contains the storage capacity
icons. A.2
Action history A.2 Actions executed by the program are automatically logged
together with information about whether each step was suc-
cessfully terminated or whether an error occurred. You can
query a list of the last entries in the history at any time. A.2
Click on the task bar with the left mouse button to list the last
commands and program actions.
You can determine the number of entries in the log in the His-
tory Size dialog box that you call up by clicking the status bar
with the right mouse button.
0.0
By the storage capacity icon you can see how much space has
already been taken up in the local database. If the filled capacity
rises above a configurable limit (default 95%), the icon changes
color from green to red. A.2
0.0
By the blinking storage capacity icon in the status bar you can
see that the virtual memory is already filled. A.2
A.2
C AU T I O N
Source of danger: Insufficient memory or disk space may
lead to an instable or blocking system. A.2
0.0
With the Image Text Editor you can define which text ele-
ments are to be displayed in the images.
Page A.37, Configuring image text
0.0
0.0
A.2
NOTE
Note the following changes to image text if you are using the
former Numaris software version to process images
acquired with syngo MR: A.2
A.2
NOTE
The image text for the slice position has changed in
software versions MRease VA12A and higher. The
designations for direction L, P or H, and R, A or F are now
displayed instead of the signs "+" and "-". A.2
0.0
For example, you can define which buttons the toolbar of the
Patient Browser window contains.
A.3
0.0
0.0
A.3
0.0
0.0
0.0
Setting the language A.3 Select the language you require on the Regional Options
subtask card and confirm with OK.
The application is restarted with the new language. A.3
NOTE
A restart of the system is necessary to apply the change of
the language. A.3
A.3
Other regional settings A.3 You can make further settings on the other subtask cards. A.3
0.0
With the Image Text Editor you can define which text elements
will be displayed in the images. A.3
0.0
Image type A.3 You can define individual settings for each modality. A.3
0.0
Number of texts A.3 You can change the default text mode. A.3
NOTE
If you select the setting No Text,
no orientation marks or scale will be displayed either! A.3
0.0
Text selection A.3 If you have selected the Customized Text option, you can put
together any text selection. A.3
A.3
0.0
Emphasizing image If the Customized texts option is activated, you can emphasize
texts A.3 selected image texts. This can make sense if some texts would
be displayed too small in certain layouts (layout of 20 or 35
images). A.3
NOTE
If orientation labels are deselected the patient name will not
be displayed. A.3
0.0
A.3
A.3 Click on the OK button to save all your settings and exit the
configuration window.
A.3 Click on the Apply button to save your settings but leave the
window open.
0.0
0.0
The system contains a dialog box which shows you when your
system must be inspected again. A.4
0.0
As long as the display is in the green range, you can close the
window again with OK. If the bar moves into the red range, you
can only close this window again after maintenance has been
performed. A.4
In that case, move the window to one side, finish off the exam-
ination, and contact Siemens Service.
For further information, please contact your Siemens Service
or your system administrator.
0.0
0.0
0.0
A.4
NOTE
As long as you have assigned full access rights to service,
i.e. maintenance is in progress, you cannot continue
working with your system. A.4
C AU T I O N
Source of danger: Terminating remote service without
consultation with the service engineers. A.4
0.0
Logbook A.4
Your system has a logbook that records all system and applica-
tion-relevant events, for example error messages. A.4
You can select the type and date of the messages that you want
to display. A.4
0.0
0.0
B.1 Introduction
Terms and definitions in security ............................... B.15
0.0
syngo MR 2006T B1
Contents Safety standards in syngo MR
0.0
B2 Operator Manual
CHAPTER
B.1 Introduction B.1
Data and Function Based on diagnostic images and medical reports decisions are
Security B.1 made that affect the health of patients. Therefore, in modern
health care it is necessary to protect such sensitive documents
from unauthorized access and to record all actions on the
data. B.1
0.0
B.1 B.1
NOTE
Security has to be set up on every workstation except for
satellite consoles, which take the security settings from
their main console. Therefore, you cannot configure the
security system on satellite consoles. B.1
0.0
Use Cases B.1 The following use cases show you some benefits of the syngo
MR user management and security system. B.1
0.0
0.0
Access Rights B.1 In syngo MR security, rights protect the access to patient
health information (data) with group/user specific permissions.
B.1
Authentication B.1 Authentication of users who are working with syngo MR is the
underlying basis of all security measures. A user account is cre-
ated for every person who will be working with syngo MR. To
log on to the system, the user enters his/her user account and
password. By this, a user is identifiable.
B.1
Audit Trail B.1 On a secure system, all actions on data are logged. syngo uses
auditing to track which user account was used to access files or
other objects, as well as logon attempts, system shutdowns or
restarts, and similar events. B.1
0.0
Data Access and Groups B.1 The data access security check is based on groups and users:B.1
Users need to have access to patient data within their sphere
of influence (for example, their ward).
Users are assigned to groups that correspond with their
sphere of influence; these groups are allowed access to the
corresponding patient data.
It is easier to manage permissions for groups than for individ-
ual users.
Access to patient data is secured through the needed permis-
sions: In order to reduce complexity, only the following permis-
sion levels are implemented: B.1
NO ACCESS
FULL CONTROL
0.0
Everyone (Group and syngo MR security makes use of the Everyone group and a
Role) B.1 Everyone role. B.1
0.0
B.1
NOTE
Because it is not possible to deny rights, the Everyone
group and role have but the user shall not, we recommend
to take special care when configuring the data access
permission and the functional privileges. B.1
0.0
Groups B.1 Groups are assigned to users which are members of a team or
a department. All members of a group receive the same data
access rights (permission, for example, to view or to process
data). B.1
Permissions B.1 Data access rights. The right to create, read, update, delete or
protect data is granted via permissions. The following permis-
sion levels are available: B.1
NO ACCESS
FULL CONTROL
0.0
Privileges B.1 The right to execute functions is granted via privileges. The
functional security check is based on roles and users: B.1
Roles B.1 Users having the same tasks are assigned a role (for example,
radiologists, administrators, or technicians). Then all users of a
role have the same right to execute functions, such as storing
data. B.1
0.0
Trusted Hosts B.1 Trusted hosts is a principle for a secure exchange of data
between systems in a network. The trusted host functionality
can be switched on in the Local Service Software. Switching
on has the following consequences: B.1
0.0
0.0
Administrators tasks B.2 Once the syngo MR security system has been installed,
Administrators are responsible for establishing and maintaining
competent user management, and for ensuring that the system
remains secure. This includes the following main tasks: B.2
NOTE
User management has to be set up on every computer,
except for satellite consoles, which take the security
settings from their main console. B.2
0.0
Principles of the syngo MR Patient data is sensitive information that has to be protected
User Management B.2 from unauthorized access, modification, transfer or deletion.
B.2
User Authentication B.2 A user account has to be created for every person who will be
working with syngo MR. To log on to the system, the user
enters his/her user account and password.
B.2
User Authorization B.2 The syngo MR user management and security system pro-
vides a highly configurable access control and ensures that
users obtain access only to application functions and patient
data they are authorized to work with. B.2
0.0
B.2
Grouping of Users: Roles Setting up the access rights for each user individually would
and Groups B.2 take a long time and would inevitably lead to inconsistent rights
for similar users. B.2
0.0
You can also set up permissions and privileges for each user
individually.
0.0
Special User Accounts B.2 The syngo MR security system knows the following special
user accounts: B.2
Administrator
By default, the security system is installed with a general
Administrator user account assigned to the groups Admin-
istrators and SecurityAdmins and having assigned a role
called SecurityAdmins. B.2
0.0
LocalServiceUser
This account usually is set up to have restricted access to
patient data, but full functional privileges for checking and
maintaining the system. B.2
0.0
RemoteServiceUser
This account is used for remote service sessions. B.2
Emergency Access
To ensure emergency access to the system at all times, you
should create at least one special user account for common
emergency logon. B.2
0.0
Internal Users B.2 Internal user accounts are essential for the system. They con-
sist of built-in users of the Windows operating system and
syngo MR internal users. B.2
NOTE
Although it is possible to change the password of these
internal accounts, we strongly recommend not to modify
any of the internal users. B.2
0.0
0.0
DICOM Nodes B.2 For the security system, DICOM network nodes are treated as
virtual user accounts. They are not intended for local logon;
they are required for proper networking (transfer of data).
B.2
To set up the access rights for data being transferred from and
to the network workstation, you should put each DICOM node
into a user group and assign a role (this effectively assigns the
workstation a user group and role). The relationship between
user groups and patient groups define the permissions on the
data as well as the default patient group, the roles define the
functional privileges of the DICOM nodes. B.2
0.0
Tracking of User Activities B.2 In syngo MR, the activities of a user are recorded in the audit
trail - including the users identity. According to national regula-
tions, it is not allowed to share user accounts. B.2
TIP
Recommend the users to use the Log In Different User
function to switch the user quickly at the workstation. B.2
B.2
Multistage Security Setup B.2 Security in syngo MR has a multistage security concept: B.2
0.0
The following preparatory steps will help you to set up the secu-
rity system from scratch. Depending on the options selected for
your security system, you do not have to perform all steps: B.2
Get a license for the security system.
Outline the intended user management system with the help
of a drawing similar to the one shown below.
As a basis, outline the intended daily workflow at the system.
For example, consider who can stand in as an acting physi-
cian and set up the necessary access rights accordingly. B.2
For basic user management you need user accounts and
groups. When using the functional check too, you also need
to think about the organization of roles. B.2
0.0
For each patient group you can later grant groups and
users the permission to have full control or no access to
data that is marked with that patient group. You can also
grant the right to modify the assigned patient group.
Whenever a real user or a virtual DICOM node user
creates new patient data on your system, a patient group
that defines the access rights to the data can be applied.
Registration of new patients or data received from a
DICOM node are the most common ways new data is cre-
ated.
If studies of a patient are already stored in the local data-
base, the existing patient group assignment is also used
for any additional studies.
After switching the data access check option of the secu-
rity system on, you will find all of your patient studies in the
STANDARD patient group.
0.0
0.0
B.2
CAUTION
Source of danger: Behavior of secured systems. B.2
Remedy: B.2
0.0
B.2
NOTE
You have to set up the security system on every syngo MR
workstation in your hospital except for satellite consoles,
which take the security settings from their main console. B.2
B.2
NOTE
In any case, the security system should never be configured
during an acquisition B.2
0.0
Create user accounts for every user who will work with the
workstation. Do not forget to create at least one user account
that is intended to stand in as both an administrator and
security administrator.
Page B.225
Please check the personal administrator account(s) inten-
sively to make sure they work properly. After finishing and
testing the security configuration, we recommend to disable
the built-in Administrator or to set an individual password
for it.
Page B.41
Create the groups and roles of your user model. Add the cor-
responding users to those groups and roles. Do not forget to
assign the user account(s) intended as administrator both to
the groups and roles Administrators and SecurityAdmins.
Page B.235
Create patient groups to define the various data access
rights (= permissions). Assign them the desired user groups
and set up the default patient group. If necessary, you can
also set individual permissions at user level.
Page B.248
0.0
0.0
Securing the System B.2 By activating the syngo MR security system, the customer ser-
vice technician turns your system into a system with high data
protection level. The service technician needs the appropriate
service key for service level 7. B.2
B.2
CAUTION
Source of danger: There is no undo! B.2
0.0
0.0
User management Activates user management which is the basis for all other security options. When
activating any other security option, the user management will also be switched on
automatically.
Data access check Access to data is always provided in accordance with the current permissions. If this
check box is not selected, you cannot restrict any data access rights.
Functional check Access to functions is always provided in accordance with the privileges granted to a user
role. If this check box is not selected, you cannot restrict the use of functions.
Auditing Access to the system and configured actions are recorded in an audit trail.
To confirm, click Save and Finish in the status bar of the win-
dow.
End the service session and log off.
After a restart of the system, only authenticated and authorized
persons can use the workstation. B.2
0.0
Opening the Security You need Administrator and SecurityAdmin rights to config-
Configuration Console B.2 ure the security system. B.2
0.0
B.2
TIP
Use the Show/Hide Console Tree icon if the tree view
does not appear after start-up. B.2
0.0
B.2
TIP
The items to be recorded in the audit trail are configured in
the Audit Trail Viewer Console ( Page B.288) and
storing parameters are set up in the Audit Trail
Configuration dialog box ( Page B.277). B.2
0.0
User Accounts B.2 For every user who will work with the system, create a user
account and assign a password. B.2
B.2
NOTE
Always work in the syngo MR Security Configuration,
never use the Microsoft Management Console (MMC) to
create or to manage user accounts. syngo MR expands the
Windows-related security system by a data security
management and distinguishes between groups and
roles. B.2
0.0
Special User Accounts B.2 The security system comes with some default and some inter-
nal user accounts, and automatically generates DICOM Node
user accounts. B.2
Default users are delivered with the software and contain, for
example, the Administrator, the LocalServiceUser and the
RemoteServiceUser.
All internal users are essential for the system and indicated
as such. We strongly recommend not changing the pass-
words of these users.
DICOM nodes are required for remote network functions.
They are created as soon as you configure the DICOM ser-
vices (AET). You can only change the password and the
group assignment of these users.
For a detailed list of the internal user accounts see
Page B.22. B.2
0.0
Handling of Passwords B.2 The password of a user in syngo MR never expires, but the
users are allowed to change their passwords on their own
(depending on your security policy). B.2
B.2
CAUTION
Source of danger: User access may be prevented due to
forgotten or unknown accounts or passwords, or wrong
setup (for example, in case of an emergency). B.2
Creating a new User One basic task for configuration is the creation of the necessary
Account B.2 user accounts. A number of general user accounts come pre-
installed with the system. B.2
0.0
B.2
NOTE
Misuse of the emergency account defeats the security
system! B.2
Ensure that all users have been properly informed about the
use of the emergency access account and the use of the
password. Misuse of the account is illegal! B.2
0.0
Right-click the Users folder and choose New > User from
the context menu.
Or B.2
Select the Users folder and choose the Action > New >
User menu item.
The User tab card is displayed: B.2
0.0
Name Name of the user account (= logon name). Note, that the name has to be unique within
the system. The user name is not case sensitive. Only alphanumeric characters are
allowed.
Full name Information that helps to identify the user, for example, first, second name and title of the
user.
Description Further information about the user (for example, his/her department).
New Password The password that has to be entered by the user in order to log on to a workstation. The
password is case sensitive.
Confirm Password For validation purposes, the password has to be entered a second time.
According to the hospitals security policies, users in syngo may be allowed to change
passwords on their own.
Account is disabled If selected, the user account is set up but the user cannot log onto the system. You may
use this option, for example, for users who are off-site for some time.
Password never This option is selected by default and cannot be changed: The users password does not
expires expire regularly (for example, this setting is important for the EmergencyAccess account).
User cannot change If selected, the user cannot change the password on their own. For the
password EmergencyAccess, we strongly recommend to disable the change of password.
0.0
for Editing
Open the syngo MR Security Configuration console.
B.2
Page B.222
On the left-hand side, open the User Management folder.
Click the Users folder.
All available user accounts are displayed on the right-hand side.
You can identify the users by the information in the Name, Full
Name and Description columns. B.2
Modifying a User Account You can change the account properties or enable/disable an
and Passwords B.2 account. Also it is possible to change the password for normal
users and DICOM Nodes. B.2
B.2
NOTE
We strongly recommend not to change passwords of any
internal user accounts, otherwise important system
services may no longer work properly. B.2
0.0
0.0
On the User tab card, you can change the Full Name and
the Description of the user account.
To change a password, type the desired password into the
New Password field and repeat it in the Confirm Password
field.
To disable/enable the account, select/clear the Account is
disabled check box.
To prevent users from changing their password, select the
User cannot change password check box.
The Member of tab card lists all groups (for data access) this
user is assigned to. B.2
The Owner of tab card lists all roles (for use cases or functional
privileges) this user owns. B.2
0.0
Deleting a User Account B.2 You can delete user accounts that are no longer needed. B.2
B.2
NOTE
For reason of system integrity, it is not possible to delete
internal users, DICOM nodes, and special users. B.2
Select the desired user account and choose the Action >
Delete menu item.
Confirm the security notice with Yes.
The user account is deleted. B.2
0.0
About Groups and Roles B.2 The syngo MR security system makes use of users, groups
and roles. B.2
Groups are used to configure the same data access rights for
a group of people (for example, everyone who works in a par-
ticular ward).
We recommend that you create a user group for every team
or department of your user model. Then you assign the user
accounts that belong to that group.
Roles are used to configure the same function execution
privileges for people with similar tasks (for example, physi-
cians, nurses, or assistants).
You then assign the user accounts that will own that role.
Built-in Groups and Roles B.2 By default, some general groups and roles are already
installed. They are created automatically when you install the
Windows operating system and syngo MR. These groups and
roles are named identically: B.2
Emergency_Access
SecurityAdmins
syngoServiceUsers
0.0
No Group Hierarchies B.2 Note that you cannot plan sub-groups (groups-in-groups), such
as Hospital for hospital-wide permissions and Neurology for
defining permissions for people working in the neurology
department of the hospital.
B.2
Configuration Levels B.2 The security configuration provides you two different ways to
assign group members and owners of roles. Which one you
prefer depends on your interest; it is often useful to switch
between both: B.2
Creating a new Group or Because groups and roles handled almost identically, their han-
Role B.2 dling is described here together. B.2
0.0
0.0
0.0
B.2
NOTE
The name has to be unique within the system. The name is
case sensitive. Special characters such as " / \\\\\\\\
[ ] : ; | = , + * ? < > are not allowed. B.2
0.0
0.0
B.2
NOTE
Because you cannot rename groups or roles, you must
instead delete them and recreate them. B.2
0.0
for Editing
Open the syngo MR Security Configuration console.
B.2
Page B.222
In the tree on the left-hand side, open the User Manage-
ment item.
Select the Groups or the Roles item.
All available groups or roles are listed on the right-hand side. B.2
Double-click an entry to edit it.
Adding or Removing Group To add or remove group members or role owners: B.2
0.0
Select the desired group or role and choose the Action >
Delete menu item.
Confirm the security notice with OK.
The group account is deleted; all members lose the corre-
sponding privileges/rights. B.2
0.0
NOTE
The different security levels applied to application functions
and patient data in the context of the clinical workflow are
normally defined in the hospitals security policy. B.2
Privileges B.2 A privilege is the right to use a specific syngo MR function, for
instance, sending data or invoking the Patient Registration.
B.2
Patient Group Patient group permissions regulate the access to data: B.2
Permissions
You define a list of patient groups according to the data secu-
B.2
0.0
For each patient group, you can grant users and groups the
permission to access data that is assigned to this group. B.2
You can set permissions for the following types of access: B.2
Full Control: The user has access to the data, and can work
with it according to his/her role. In general, the user can: B.2
create data objects, like studies or series
read data, for example, load it into the Viewer
update or modify data, for example, draw annotations on
images or correct the patients name
delete data
execute changes to the security levels applying to certain
data, for example, to hide the data of VIP patients from
some doctors on the ward
Permissions can be set at the patient or study level. Series
and images inherit their permissions from the study they
belong to. B.2
0.0
NOTE
To reduce your configuration efforts, define permissions on
group level and privileges on role level whenever possible.B.2
0.0
Example B.2 Example: Doctor Stern wants to send a study of the patient Mr.
Smith to the archive. To do so, he needs the permission to
access Mr. Smith study and he needs the privilege to send data
to the archive. B.2
B.2
Inheritance of Permissions The Everyone group is the top level of inheritance. The per-
and Privileges B.2 missions set for the Everyone group are transferred to all
groups of your security system. The same rule applies to the
Everyone role. B.2
Typically, a user belongs to at least one group and one role. But
you can also assign a user to more than one group or role. B.2
B.2
NOTE
Keep in mind that user rights are inherited. It is not possible
to assign someone function execution rights for a specific
group. B.2
0.0
0.0
0.0
0.0
Creating and Managing To create a new patient group for data protection: B.2
Patient Groups
Open the syngo MR Security Configuration console.
B.2
Page B.222
In the tree on the left-hand side, open the Security Manage-
ment and the Data Access Permissions item.
Right-click the Patient Groups item and choose New >
Patient Group from the context menu.
Or B.2
Select the Patient Groups item and choose the Action >
New > Patient Group menu item.
0.0
0.0
0.0
Opening the Data To access the setup of data permissions on patient groups: B.2
Permission Setup
Open the syngo MR Security Configuration console.
B.2
Page B.222
In the tree on the left-hand side, open the Security Manage-
ment and the Data Access Permissions item.
Click the by User/Groups item.
Or B.2
0.0
Setting up Permissions in To set up the data access permissions for patient groups: B.2
At the top of the dialog box, select the level you want to set
up for the available patient groups:
0.0
Everyone Shows the permissions for the special group Everyone. This is the top level for the rights
inheritance on all other groups and all users. This group is one reason that the effective
permissions often differ from the setup permission. The permissions in this group should
be the minimum permissions of all users.
Groups Shows the permissions at the group level. This allows you to set up group access rights
one after the other.
Users Shows the permissions at the user level. This allows you to set up individual access
rights. Note that users inherit their permissions from the Everyone group and from their
group memberships.
This symbol indicates that the list item represents a group. B.2
This symbol indicates that the list item represents a single user
account. B.2
0.0
B.2
NOTE
To modify an existing configuration or to reduce the amount
of displayed groups and users, you can select the List only
objects with permissions assigned check box. B.2
No Access Prohibits any access to the data stored in this patient group. The data will not be visible
to the user or group.
Full Control Allows all actions to the data assigned with this patient group: create, read, update,
delete, and execute change protection.
0.0
Select the Default check box for those patient groups you
want to assign by default to the user or group.
Check the Eff. Default column to see which default protec-
tion attributes are actually become true.
Again, the deviation may originate from a different configuration
on user and group level, or from a membership in different user
groups, etc.
B.2
0.0
Setting up Permissions in To define a new set of default data protections for a group or
the Patient Groups View B.2 user: B.2
From the Patient Groups list, select the patient group you
want to configure.
0.0
B.2
TIP
To modify an existing configuration or to reduce the amount
of displayed groups and users, you can select the List only
objects with permissions assigned check box. B.2
Below the Patient Groups list, select the type of objects you
want to set up for the selected patient group:
Everyone Shows the permissions for the special group Everyone. This is the top level for the rights
inheritance on all other groups and all users. This group is one reason that the effective
permissions and the effective default differ from the permission set up for users or groups.
Groups Shows the permissions at the user group level. This allows you to set up group access
rights one after the other.
Users Shows the permissions at the user level, so that you can set up individual data access
rights.
0.0
After your selection, the table shows the permissions the vari-
ous users or user groups have for the selected patient group.
Each table row represents a single user or user group: B.2
This symbol indicates that the row belongs to a user group. B.2
No Access Prohibits any access to the data stored in this patient group.
Full Control Allows all actions to the data stored in the patient group: create, read, update, delete, and
execute change protection.
0.0
You can configure the default protections for groups and users
here, so that it is possible to specify a default protection for each
user individually. B.2
Select the check box Default for those user groups you want
to assign the selected patient group as default.
Check the Eff. Default column to see which default protec-
tion attributes are actually become true.
The deviation may originate from a different configuration on
user and group level, or from a membership in different user
groups, etc.
B.2
0.0
Setting up the Privileges Privileges allow a user to execute syngo MR functions, such as
for a Role or a User B.2 sending data over network or invoking the patient registration. B.2
The privileges set for a role a user belongs to override the priv-
ileges explicitly set for the user. B.2
B.2
NOTE
For the emergency role and user, we strongly recommend
not to grant any functional privileges that allow deletion or
export of patient data. B.2
0.0
The Privileges of... page is displayed, with the side tabs corre-
sponding to the various syngo MR modules installed at your
system: B.2
At the top of the dialog box, select the level of objects you
want to configure:
0.0
Everyone Shows the privileges at the Everyone level. This are the basic functional rights for all
roles and users.
Roles Shows the privileges at the role level. This allows you to set up privileges for all members
of a role.
User Shows the privileges at the user level. This allows you to set up the individual privileges.
B.2
This symbol indicates that the list item is a single user account.
B.2
0.0
The explicit privileges for the selected item are marked in the
selection table. B.2
B.2
NOTE
Please remember that the configuration of a user is also
influenced by the configuration of the role a user is
assigned. B.2
Click the application tab with the functions you want to allow
or restrict for users or roles.
0.0
B.2
NOTE
Use the double arrow at the bottom of the page to see
further application tabs. B.2
0.0
Archnet Archive allows to store data on storage disks or in the central network archive server.
Export allows to export data on disks or to the file system. Send allows to send data to
other network nodes. The Query/Retrieve functionality is not protected but restricted to
trusted hosts.
AuditTrail Archive allows to invoke the Audit Trail Archiving dialog box and the Audit Trail Archiving
Settings. Only users with this privilege are able to use the according menu items.
SetFilter allows to open the audit trail management and configure (filter) the events to be
logged in the audit trail. View allows to view logs. The privileges are intended for
administrators or experienced and instructed users. We recommend not to assign these
privileges to the emergency role or user.
Correct&Rearrange Correct allows to change any patient and study data. History allows to open a dialog box
for the history of changes on the data. Rearrange allows to drag data objects in the
Patient Browser.
Filming Expose allows to expose film tasks or single film sheets on a camera or to print them.
PatientBrowser Delete allows to delete data objects in the Patient Browser. ModifyPatientGroups allows
to change the patient group assigned to data (and change this way the permissions on
data access). SetStateComplete allows to set this work status on data objects.
SetStateRead allows to set this work status.SetStateVerified allows to set this work
status.
Patient InvokeRegistration allows to open the registration form and perform registration.
Registration
0.0
SecuritySystem All these privileges are important for security administrators. BypassBlockedSystem
allows logging on to a system even if the security system is blocked. At least one
administrator must have this privilege. It is also useful to grant the AuditTrail - Archive
and the SetMode privilege. Configuration_Read allows access to the security
configuration for viewing only.Configuration_ReadWrite: With this privilege, you are
able to change and store the security configuration. You also need the Configuration
privilege to do so. DesktopAccess allows to access the desktop of the Windows
operating system with the help of short cutkeys (Windows key or CTRL +ESC).
EnableServiceAccount allows to create a temporary password for the service
technician ServiceUser. InteractiveLogin allows to log on to the system to have
desktop access. We recommend to set this privilege on Everyone level for all users.
SetMode allows a user to change the security system mode. This privilege is needed for
activating security options in the Local Service Software and for bypassing a blocked
system. At least one SecurityAdmin must have this right.
UserAutoStart AllUsers allows to automatically start processes or components for all users.
SecurityConfigurationConsole is an internal privilege.
0.0
Configuration B.2
0.0
Audit Trail and Log Files B.2 The syngo MR security system has an audit trail for recording
the following actions: B.2
The audit trail consists of several log files, where only one log
file is open at any one time. A new log file is created whenever
the current log file is closed. This occurs, for example, at syngo
MR startup. A new log file is also created at system restart after
a power failure. B.2
Naming of Log Files B.2 To keep the files in the correct order, a number is appended to
the file name, which is incremented with each new file: B.2
0.0
Administration B.2 Authorized users (such as administrators) can set up the audit
trail and view, store and delete stored audit trail log files. The
files are protected against manual manipulation.
B.2
Configuration B.2 To configure the audit trail, you need to define general security
parameters, such as the trail's location and size, as well as any
transactions that are to be recorded. B.2
The setup of the audit trail consists of two different parts (and
two different configuration dialog boxes): B.2
0.0
B.2
NOTE
You have to store the audit trail at regular intervals. Failure
to do this will cause the audit trail to fill up the disk partition,
causing the system to block until the audit trail has been
stored and removed. B.2
B.2
NOTE
The system informs the users when the size of the audit trail
exceeds the specified warning levels. It issues low level and
high level warnings by displaying colored icons in the status
bar. Any user recognizing the warning should inform the
system administrator immediately for storing the audit trail.B.2
0.0
Time synchronization B.2 Time stamps for log file entries have to be consistent within all
log files in the audit trail. Therefore, time synchronization
between all system components is very important. B.2
B.2
NOTE
You carry the responsibility for maintaining the time server.
Ensure that you set the correct time, otherwise your service
licence may become outdated. This is because the license
manager only accepts a jitter of 24 hours. When the service
licence becomes invalid, the system must be completely
reinstalled. B.2
0.0
Log on as administrator.
Page B.35
From any task card, choose the Options > Configuration
menu item.
The Configuration Panel appears. B.2
0.0
At full, the dialog box provides the following setting pages: B.2
0.0
To define the parameters for the storing of the audit trail and the
common properties: B.2
0.0
B.2
Local Audit Trail This section displays the current settings for storing the logs of the audit trail.
Disk quota checks This section displays the warning levels.
Audit Trail archive This section displays the current storage settings.
target
0.0
Select where the log files of the audit trail are to be stored:
CD-R drive Selects the CD-R writer of your system for storing the audit trail. After clicking Next, you
will be guided to the CD-R page to set up the parameters.
Network Share Defines that the audit trail is to be stored on a shared folder in the network. After clicking
Next, you will be guided to the Network Share page to set up the parameters.
B.2
0.0
0.0
Single Session Specifies that a CD-R is written once and then closed. You cannot use it for further
storing.
Multi Session Specifies that you can store on a CD-R several times (until its capacity is full).
Finalize Select this check box to close a multi session CD-R.
B.2
Drive Letter Select the drive letter of the CD Recorder. Use the same drive letter as for storing
patient data on CD-R.
Burning Speed Select the speed the recorder is able to write data to CD-R. Example: Storing 200 MB
at 4x speed takes about 5 min.
0.0
To set up the network You need the server share name (not letter) and path to set up
share for storing B.2 the Network Share option. We recommend to use the Win-
dows Explorer to check the connection. B.2
0.0
User name Enter the user name for logging to the network shared folder. This user must be
allowed to write the audit trail log files at the network node. Note that this user name
can derive from the local user name that is allowed to start the audit trail storing (and
has to have at least the AuditTrail > Archive privilege).
Domain Enter either the workstation's domain or local computer name here.
Password Enter the password for the logon.
Share name Enter the server name and the path. Use the UNC convention to enter server name
and path (you cannot use drive letters).
Test Click the Test button to check if the folder is available in the network.
B.2
NOTE
The syntax for a share name is:
\\servername\sharename\[folder]: B.2
Make sure that the specified folder exists, and that it can be
written to. B.2
0.0
To set up the common After clicking the Next button on any of the configuration
parameters of the pages of the Audit Trail Settings dialog box, you reach the
audit trail B.2 Audit Trail page.
B.2
Enter the parameters to set up the path and size of the audit
trail as well as the warning levels.
0.0
B.2
AuditTrail Directory Enter the path for the folder in which the log files of the audit trail are stored. If the
path does not exist, the system creates it automatically. We recommend to use the
default path: %medhome%\log\Auditing. Keep in mind that the audit trail has to be
protected from normal users.
max. Size [KBytes] Enter or select the size of the audit trail. Default size is 1024 kBytes (=1 MByte).
When a log file reaches this size, it is closed, and a new log file is created.
Zipped Select this check box to have the audit trail automatically compressed in a ZIP file.
Warning level % As soon as the given percentage of the hard disks capacity is reached, an orange
warning icon appears in the status bar. 70-75% may be useful values (70% is the
minimum value).
Quota limit % As soon as this percentage of the hard disks capacity is reached, a red warning icon
appears in the status bar and the Audit Trail Archiver opens. Storing should be started
immediately. If the current user has no privilege to store, there is a message box
which informs the user about the situation and gives a hint what to do. 80-85% may
be useful values (80% is the minimum value).
0.0
B.2
NOTE
Inform the system users about what to do if audit trail
storing should be started. If the current user does not have
storage rights, the End Session dialog box calls the Log in
different user function to switch to a user account with
storage rights. B.2
Event recording and the audit trail viewer are configured in the
syngo MR - Audit Trail Management console. B.2
Only authorized users can handle the log files of the audit
trail. They need the AuditTrail > View and the AuditTrail >
SetFilter privilege to open and use the syngo MR - Audit
Trail Management console.
To open this management console, choose the Options >
Audit Trail > Viewing menu item from any task card.
0.0
With the Audit Filter folder, you can define the events to be
recorded. B.2
With the Audit Trail Viewer item, you can view the various log
files of the audit trail. B.2
0.0
B.2
NOTE
Note that very detailed recording can slow down system
performance. B.2
0.0
B.2
CAUTION
Source of danger: The system blocks when the audit trail
is filled (too many records, or too much drive space
covered). B.2
0.0
0.0
B.2
TIP
Click the Reset button to clear your changes. B.2
B.2
Only authorized users have access to the log files of the audit
trail. They need the AuditTrail - View privilege. B.2
In the tree on the left-hand side, click the Audit Trail Viewer
item.
0.0
You must close the current log file before you can view it:
Click the New Audit Trail button.
The current log file is closed and a new log file is created imme-
diately. B.2
0.0
Filtering the Log Files for To further inspect a log file, you can apply different filters or
Viewing B.2 apply certain filter criteria. B.2
Choose the desired filters from the lists above the display
area. For example, you can filter by Action types, Function
Point IDs, Applications and Users.
In the Argument Filter criteria field, you can copy a param-
eter from the log file and initiate an exact match search.
To apply the filter, click the Refresh button.
The display area shows only the data records that meet the filter
criteria. B.2
0.0
The audit trail storing method defines whether the log files are
stored to a remote shared disk or CD-R.
See Page B.277 for more information. B.2
You must close the current log file before you can store it and
you must have stored a log file before you can delete it. B.2
Only authorized users are able to store or delete the log files of
the audit trail. They need the Audit Trail Archive and Audit-
Trail Delete privileges. B.2
From any task card, choose the Options > Audit Trail >
Archiving menu item.
0.0
The Audit Trail Archiving dialog box appears. All audit trail log
files of your system are listed showing their current archive and
importance status. A green icon at the bottom left indicates that
the security system is running properly: B.2
0.0
B.2
NOTE
Stored log files obtain the status archived and are marked
with the archived icons. B.2
The selected log files are saved to disk or to CD-R (as config-
ured). The system issues a message upon completion. B.2
0.0
Deleting stored log files B.2 You can only delete log files that have been stored. B.2
Select the log file you want to delete and click the Delete but-
ton.
The log file is deleted from the disk partition containing the audit
trail. The list is automatically updated.
B.2
B.2
CAUTION
Source of danger: The system blocks when the audit trail
is filled (too many records, or too much drive space
covered). B.2
0.0
Only authorized users are able to store the log files of the
audit trail. They need the AuditTrail Archive privilege.
Open the Audit Trail Archiver dialog box.
Page B.275
The Audit Trail Archiver dialog box opens and lists all log files
of the audit trail with their current archive status. B.2
Store all log files and delete them from the audit trail.
Page B.294
Click the Restart button. This button is active only when the
system is blocked.
The system resumes operation. B.2
0.0
0.0
Security of Protocols B.2 For security reasons, syngo MR follows a restrictive policy con-
cerning ports and IP addresses. Data traffic through all unnec-
essary ports and addresses is blocked. Data exchange is
restricted to defined paths only. B.2
0.0
Assigning Nodes to Your To establish a trusted zone, you must assign nodes to this
Trusted Zone B.2 zone. B.2
From any task card, choose the Options > Service > Local
Service menu item to open the Service Software window.
Navigate to the Configuration > Security > Settings page.
In the Security properties, select the Enable trusted host
functionality for your computer.
B.2
NOTE
This function must be enabled on all syngo MR
workstations with which you want to exchange data.
Additionally, it is also possible to communicate with
secured legacy systems (Secured by means of
restricted physical access). B.2
B.2
0.0
0.0
Security System B.3 For security reasons, only authorized persons have access to
sensitive data, such as diagnostic images, results, or reports. B.3
syngo MR allows you to work only with the data and functions
that you have been authorized to use. All other patient data is
not visible to you and the prohibited functions are not avail-
able. B.3
B.3
NOTE
The audit trail logs all activities you perform on sensitive
data in an audit trail. This also includes your identity. B.3
Except for emergency access, you are only allowed to work
with a syngo MR workstation if you are logged into your
personal user account. B.3
0.0
User Accounts, The syngo MR user model ensures that every user is allowed
Permissions and to access only to the data he/she is authorized to work with
Privileges B.3 (data security) and to the functions he/she is authorized to use
(functional security). B.3
0.0
0.0
B.3
TIP
The user configuration depends on the security regulations
of your hospital. For questions about your rights, ask the
system administrator. B.3
0.0
B.3
NOTE
Logging off or locking a workstation does not interrupt or
abort running or queued background jobs, such as filming
images. Every background job is protocolled under the
identity of the user who initiated it. B.3
0.0
0.0
If you are the person who locked the workstation, you will find
your session as you left it. B.3
If another user unlocks your computer and does not have the
appropriate access rights, a warning appears. Only after explicit
confirmation, any patient data is unloaded (without saving) and
the currently active application function is terminated. B.3
B.3
NOTE
If a screen saver has been enabled on your workstation, it
is automatically activated whenever there has been no
mouse or keyboard activity for a certain period. The screen
saver has the same effect as Lock Computer. B.3
0.0
B.3
NOTE
When a user logs off, unsaved data are lost
irretrievably. B.3
0.0
B.3
NOTE
If the new user has the same (or sufficient) access rights,
the current images are not unloaded. B.3
If the new user does not have the appropriate access rights,
all patient data is unloaded and the currently active
application function is terminated. Unsaved data will be lost. B.3
If a measurement or an image calculation of a previous user
is still running in the background, the current user cannot
start his measurement until the previous users
measurement or image calculation is finished. B.3
0.0
0.0
B.3
NOTE
Do not misuse the emergency access account to log on to
the system if you forget your password. B.3
0.0
You cannot change your account name, but you can change
your own password. Only administrators are allowed to change
user accounts. B.3
0.0
B.3
NOTE
You can set data protections at patient or study level. Series
and images inherit protections from the patient or the study
they belong to. B.3
0.0
Click the Users button to view and set up the access permis-
sions of individual users.
To confirm, click OK.
The dialog box closes. The new access permissions on data
take effect immediately. B.3
0.0
Local access B.3 Usually, a user account with restricted rights is created for the
service technician for carrying out local service activities. B.3
0.0
Remote access B.3 Remote service access lets a service technician carry out
maintenance activities from a remote workstation. B.3
You start a remote service session and wait for the response
from the remote workstation. Depending on the required ser-
vice activities, you then grant the technician full or limited
access to your workstation. B.3
Full Access
Allows the service technician to take control of your worksta-
tion (which blocks it to you).
Limited Access
This mode provides access to all service functions that do
not interfere with regular patient operations.
Access to Patient Data
The service technician has no access to patient data from a
remote system. If he needs one, he will explicitly have to
request it.
Remote Application Access
No Access
0.0
0.0
0.0
NOTE
Transfer the password as securely as possible to the
service technician. Sending passwords via unencrypted e-
mail or mail is not secure! B.3
0.0
Audit Trail B.3 The syngo MR security system supports tracking of the follow-
ing actions: B.3
NOTE
Important! You carry the responsibility for all transactions
that have been performed under your user account. B.3
In your own interest, lock the computer or log off when you
have finished work or when leaving the workstation
unattended for a longer period. B.3
0.0
Audit Trail full? B.3 A full audit trail blocks the entire system. You cannot proceed
working. Emergency access is also not possible. B.3
0.0
0.0
Service Access Rights B.4 For any service activities to take place, you must ask a user or
the system administrator to allow local access to the worksta-
tion. B.4
Audit Trail B.4 All system activities affecting sensitive data are recorded in the
audit trail for later review. Each local and remote service ses-
sion leads to an entry in the audit trail. B.4
0.0
Different Types of Access B.4 If service personnel needs access to patient data, or the config-
uration of the system has to be changed during a remote ser-
vice session, this has to be enabled by the local user first. B.4
0.0
Enter both parts of the service key necessary for the desired
service level.
The service key decides with which service level the Service
Software will open. B.4
0.0
B.4
NOTE
The detailed view of the Resource Monitor is only
available after you have logged on to the Service
Software. B.4
0.0
0.0
B.4
NOTE
Because the Remote Service Access Control may be
closed on the local system at the time, you should call the
local user to get the confirmation. B.4
0.0
B.4
NOTE
Do not forget to store the audit trail before software update
or upgrade. The audit trail has to be saved separately. The
backup and restore functionality under Local Service does
not store the audit trail. B.4
0.0
0.0
0.0
syngo MR 2006T C1
Contents Managing and Adjusting the System
0.0
C2 Operator Manual
CHAPTER
C.1 System Manager C.1
0.0
0.0
You can shut down the entire system at once (the console, the
MR scanner, and the image reconstruction system), for exam-
ple, at the end of the day or to disconnect the system from the
power supply for service work or reinitialization of the hardware
and software. C.1
0.0
0.0
0.0
0.0
0.0
C.1
C AU T I O N
After a forced system shut down, all unsaved data and
unfinished filming or storage jobs will be lost. All
background activities are forced to terminate. C.1
0.0
running
The application is in progress.
not running
The application is not running.
undefined
The application status has not been received shortly after
starting the system manager.
not responding
It is not possible to communicate with this software compo-
nent.
unknown name
Certain components of the application are not available.
stop in progress
The application is being shut down.
startup in progress
The application is being started up.
0.0
Stopping an application C.1 You may stop an individual application (e.g. the 3D module) to
save memory space. C.1
C.1
Starting an application C.1 You may explicitly start applications that you have stopped or
that do not start automatically. C.1
Restarting an application C.1 You can shut down and restart applications, e.g. if they are no
longer responding. C.1
0.0
If you have to leave the workstation for a short time, you can
protect the data on the computer from unauthorized access
without having to log off. C.1
0.0
When you have finished working with the system, you must log
off. C.1
C.1
NOTE
When a user logs off, unsaved data are irretrievably
lost. C.1
Always check for unsaved data and save any data you want
to keep before logging off. C.1
0.0
A new user can log onto the system even if the current user has
not logged off. C.1
0.0
0.0
0.0
Displaying the status of the The status bar of the system contains an icon indicating the sta-
image reconstruction tus of the image reconstruction system:
system C.1 C.1
In the event of a fault, you can shut down and reboot the entire
image reconstruction system.
C.1
0.0
C.1
Restarting software If errors occur during image calculation, all software compo-
components C.1 nents running on the image reconstruction system, except the
Peripherie Server (peripheral server), will be shut down and
restarted.
C.1
0.0
Restarting the Peripherie The Peripherie Server (peripheral server) component estab-
Server (peripheral server) lishes the connection with the MR scanner and is restarted sep-
component C.1 arately.
C.1
0.0
0.0
Operating status of the All the components of the MR scanner are listed under Compo-
individual components C.1 nent Name. C.1
The helium fill level is shown below the list on the MR Scanner
card. The display is in % (percentages).
C.1
Status of the MR scanner C.1 The status of the MR scanner is shown both on the
MR Scanner subtask card and on the status bar of the system.
C.1
0.0
Switching the MR scanner If you do not intend to perform scans for a longer period of time
and image processor to or only want to process or evaluate images on the console, you
standby C.1 can save energy by switching off the voltage supply to the MR
Scanners and image processor.
C.1
NOTE
After switch-over to standby, it is not possible to start a new
scan. C.1
0.0
However, if the image processor still has jobs in the job list, it
may not be possible to immediately end these jobs. C.1
This dialog allows you to determine whether and how the image
processor should be shut down. C.1
0.0
C.1
Option Consequences
Proceed The image processor is shut down only after calculating the
current image processor jobs. This may take several
minutes. There is no associated loss in data. The dialog box
is closed and cannot be called up again.
Cancel Shut-down of the image processor is stopped.
End Now The image calculation in progress is ended immediately.
Data may be lost in this case.
Switching the power If your MR scanner is in Stand By mode, you can switch on the
supply on again C.1 power supply again to resume scanning.
C.1
0.0
Tools C.1
0.0
0.0
The most important system files are checked every time the
system boots.
C.1
0.0
0.0
(1)
(2)
(3)
(4)
(5)
(6)
0.0
0.0
0.0
Displaying the drives C.1 The Disk list displays all physical (e.g. CD-ROM) and logical
(e.g. network drives) drives. The capacity and free space still
available is listed next to them. C.1
0.0
Displaying the databases C.1 The Database list contains all local databases that contain
header as well as pixel data. C.1
You are also told how many images can still be stored for each
matrix. C.1
0.0
0.0
Updating the network If the dialog window has been open for a while, you may refresh
display C.1 the network information display.
C.1
0.0
The Patents card lists all the patents used by syngo MR. C.1
0.0
If the Info... dialog window has been open for a while, you may
refresh the data displayed.
C.1
0.0
0.0
You may view and edit (if required) the automatic adjustment
parameters on the System parameter card. C.2
C.2
NOTE
All system adjustment settings made on the System
parameter card only apply to the protocol currently open. C.2
0.0
0.0
Setting shim mode C.2 For the 3D-shim, up to three settings are available per protocol
depending on the various scanning requirements: C.2
0.0
Performing adjustments Normally, all adjustments are performed using the coil elements
with the body coil C.2 defined in each protocol and used during subsequent imaging.
You may also perform the adjustment measurements using the
body coil only. This method saves time, since it is not necessary
to make readjustments after changing the selection of coil ele-
ments. C.2
Confirming or changing the After an inline adjustment, you may pause the system and
resonance frequency C.2 accept or change the resonant frequency. C.2
0.0
Adjustment in silicone The Assume Silicone option optimizes scanning for patients
mode C.2 with silicone implants. C.2
Changing the reference The TxRef/Ref display field shows a list of reference ampli-
amplitude C.2 tudes for the selected primary or secondary nucleus. C.2
0.0
Imaging protocols C.2 The default setting of the adjustment volume depends on the
slices and slabs. In most cases, an orthogonal cuboid com-
pletely encloses the slices or slabs to be measured.
C.2
Spectroscopy protocols C.2 Here, the adjustment volume is equivalent to the VOI.
C.2
C.2
NOTE
Protocols that do not require shim adjustment
measurements (e.g. tune-up mode) or water suppression
adjustment use a fixed adjustment volume in the form of a
large central cuboid.
This saves time since readjustment is not necessary after
slice positioning.
Of course, you may also manually adapt the adjustment
volume at any time. C.2
0.0
Editing the adjustment During graphic slice positioning, you may display the adjust-
volume graphically C.2 ment volume as an additional graphic object in the reference
images. C.2
0.0
Adjustment volume To enlarge/minimize you must first select the adjustment vol-
selecting C.2 ume. C.2
(1)
(2)
(3)
0.0
Moving the adjustment Place the mouse pointer on the center of the adjustment vol-
volume C.2 ume.
The mouse pointer changes shape. C.2
Press the left mouse button and drag the adjustment volume
to its new position.
Or C.2
0.0
Resizing the adjustment Click a contour line of the adjustment volume if the handles
volume C.2 of the adjustment volume are not yet visible.
Place the mouse pointer on one of the handles.
The mouse pointer changes shape. C.2
Press and hold the left mouse button while dragging the han-
dle in the desired direction.
The size of the adjustment volume is increased/decreased
symmetrically. C.2
Also press the Alt key while performing the steps described
above.
The center of the adjustment volume is moved accordingly. C.2
0.0
Rotating the adjustment The volume element may be rotated about its center point. The
volume C.2 rotational axis is now perpendicular to the reference image. C.2
Place the mouse pointer on the contour line of the adjust-
ment volume, but not on a handle.
The mouse pointer changes shape. C.2
Hold down the left mouse button and drag the contour line of
the volume element in the desired direction.
The adjustment volume may only be rotated about the center in
one spatial direction.
C.2
Tilting the adjustment The volume element can be tilted about an axis that runs paral-
volume C.2 lel to the reference image and through the center point. C.2
Press the Alt key and drag the contour line in the required
direction.
The tilting axis is perpendicular to the movement of the
mouse. C.2
0.0
The rotational axis runs through the center of the volume ele-
ment and is perpendicular to the reference image. C.2
0.0
Adjustment volume To set the adjustment volume with millimeter precision, you may
set numerically C.2 also enter the parameters numerically. The respective input
fields are located on the Adjustment subtask card of the Sys-
tem parameter card.
C.2
0.0
Applying the settings C.2 To apply the settings simply press the Return key after
numeric input.
Or C.2
Click the image area with the mouse to update the graphic
display.
0.0
(1) (5)
(2)
(3)
(6)
(4)
0.0
The left side of the parameter card displays the values of the
last successful transmitter tuning: C.2
C.2
0.0
Undoing changes C.2 All manually changed values and settings are marked by an
exclamation point ("!"). C.2
0.0
Dependencies between When adjusting the system, the sequence of adjustment oper-
adjustments C.2 ations is important since some adjustments may invalidate the
results of previously performed adjustments. After 3D-shim, for
example, frequency adjustment is automatically performed
again because changing the magnetic field causes the system
frequency to change.
These dependencies are always taken into account by auto-
matic adjustments. C.2
0.0
Validity of the adjustment The adjustment parameters obtained after successful adjust-
parameters obtained C.2 ment may be used for further protocols. They become invalid in
the following cases: C.2
0.0
C.2
NOTE
Manual adjustment of the system should only be performed
by experienced users and should not be performed during
routine operation. C.2
0.0
Opening a protocol C.2 Open the protocol that requires manual adjustment. C.2
0.0
Preparing for adjustment C.2 Select Options > Adjustments and go to the Frequency
card.
0.0
(1)
(6)
(2) (7)
(8)
(3) (9)
(10)
(4)
(11)
(5) (12)
0.0
Entering the frequency C.2 A different transmit frequency may be used for each iteration. C.2
0.0
Amplitude C.2
You can enter the transmit amplitude to be used for the scan.
Range display C.2 You can use the range display to verify whether your inputs for
the frequency and amplitude are correct. You have to correct
them if they are out of range. C.2
When you enter the amplitude, the labeling of the range dis-
play is modified accordingly. It will then show the amplitude
values.
0.0
Sequence and resolution C.2 The following options are available: C.2
0.0
Selecting the gain C.2 You may set the receive gain to match the intensity of the mea-
sured signal. C.2
Starting to scan C.2 After you have entered all parameters, you can start the adjust-
ment. C.2
Canceling the
measurement C.2
0.0
Results display C.2 The results are displayed both numerically and graphically.
C.2
Numeric results C.2 The results are listed below the running numbers. The following
parameters are displayed: C.2
0.0
Graphic results C.2 The results are displayed graphically in both the time and the
frequency domain. The maximum values of the raw data set are
displayed numerically in the graphics. C.2
Vertical marker C.2 A vertical marker is shown when you position the mouse pointer
inside the graphic display of the frequency domain. It indicates
the delta frequency of the calculated resonance frequency. If no
peak was detected during the adjustment, the absolute fre-
quency is indicated instead. C.2
Transferring the You may select a frequency graphically by moving the vertical
frequency C.2 marker. C.2
0.0
Inverting the frequency A context menu is available when the mouse pointer is posi-
axis and zooming the tioned inside the graphic display of the frequency domain. C.2
graphic C.2
You can invert the default display of all frequency axes (from left
to right) or zoom into the detected peak. If no peak is available,
the program zooms into the center of the graphic. C.2
When you select a new patient, the default display of the fre-
quency axes is restored. Any zoom applied is reset when you
perform a new measurement.
0.0
Receive channel The receive channel is used to select the signals of the local
selecting C.2 coils. In addition to the receive channel (Ch.), the coil name
(Coil) and the connector (Con.) are displayed in the selection
list. C.2
Accepting the frequency After successful adjustment "Y" in the numeric result field), the
for the measurement frequency is automatically loaded in the scan system. This may
system C.2 require several iterations.
C.2
Manual acceptance You may correct the frequency manually if the system cannot
without successful detect the correct frequency, e.g. due to the proximity of the res-
adjustment C.2 onance signals.
C.2
0.0
Preparing for adjustment C.2 Select Options > Adjustments and go to the Transmitter
card.
0.0
(1)
(2) (7)
(8)
(3)
(9)
(4)
(10)
(5) (11)
(6) (12)
0.0
Start amplitude C.2 The Start amplitude text field shows the amplitude value (spe-
cific parameter of the transmitter coil) used for the first iteration.C.2
0.0
Range display C.2 The range displayed shows the range available for the refer-
ence amplitude. If your entry is outside the range, you have to
correct it accordingly. C.2
Selecting the gain C.2 You can set the receiver gain depending on the signal intensity.
Page C.228, Selecting the gain
C.2
Starting to scan C.2 After you have entered all parameters, you can start the adjust-
ment. C.2
Canceling the
measurement C.2
0.0
Results display C.2 The results are displayed both numerically and graphically.
C.2
Numeric results C.2 The results are listed below the running number of the iteration.
The following parameters are displayed: C.2
0.0
Graphic results C.2 The following results are displayed graphically: C.2
C.2
Receive channel The receive channel is used to select the signals of the local
selecting C.2 coils.
C.2
Accepting the frequency After successful adjustment ("Y" in the numeric field), the
for the measurement amplitude is automatically transferred to the scan system.
system C.2
C.2
Manual acceptance Within a certain range, you can also enter a reference ampli-
without successful tude and manually transfer it to the system without adjustment
adjustment C.2 scanning. C.2
0.0
3D Shim C.2
Preparing for adjustment C.2 Select Options > Adjustments and go to the 3D Shim card.
0.0
(1)
(7)
(5)
(8)
(2)
(9)
(6)
(10)
(3)
(4)
(11)
0.0
Before you can perform the 3D shim, you first have to enter the
necessary parameters. The system suggests a default value.
C.2
C.2
Entering the shim The nine parameters are part of a parameter set that describes
parameters C.2 the field correction.
C.2
These shim parameters are used for field map acquisition. C.2
0.0
Loading from tune up C.2 Alternatively, you can load the parameters from the last system
tune up as temporary parameters. C.2
Or C.2
Loading system Load the parameters currently used by the system as tempo-
parameters C.2 rary parameters. C.2
C.2
Mode selection C.2 The shim mode used to perform the adjustment is defined with
the protocol.
Page C.24, Setting shim mode C.2
0.0
Selecting the gain C.2 You can set the receiver gain to match the intensity of the mea-
sured signal (low/high).
Page C.228, Selecting the gain
C.2
Starting to scan C.2 After you have entered all parameters, you can start the adjust-
ment. The scan takes approximately 20 seconds.
C.2
0.0
Displaying the field map C.2 The field map is displayed in the image area of the dialog box.
images are shown with a maximum resolution of
64 64 pixels. C.2
0.0
Windowing images C.2 If the window values of the images are not optimally set, you
may readjust them manually using the two sliders in the bottom
right-hand corner of the image area. C.2
Selecting magnitude or You may display the images as magnitude or phase images.
phase image C.2 C.2
Selecting the receive The receive channel is used to select the signals of the local
channel C.2 coils. In addition to the receive channel (Ch.), the coil name
(Coil) and the connector (Con.) are displayed in the selection
list. C.2
0.0
Shim parameters After scanning has been completed and the results are dis-
calculating C.2 played, you may calculate the new shim parameters.
C.2
C.2
Numeric results C.2 The results are listed below the running number of the iteration.
The following parameters are displayed: C.2
C.2
NOTE
The three-dimensional field-map scan always shows the
entire homogeneity volume of the magnet independent of
the adjustment volume.
The adjustment volume is taken into consideration and the
field homogeneity is optimized during the calculation of the
shim parameters. For this reason, changing the adjustment
volume also results in different shim parameter settings for
the same field map. C.2
0.0
Accepting the field map The temporary field map (valid locally for the adjustment) may
for the scan system C.2 be applied to the scan system.
C.2
Click the Apply button in the upper section of the dialog box.
Manual acceptance of the After you have calculated the new parameters with Calculate,
calculated parameters C.2 you may apply them directly to the scan system as temporary
parameters. At the same time the Field Map is transferred to the
scan system.
C.2
Click the Apply button in the lower part of the dialog box.
Manual acceptance You can also enter shim parameters and apply them to the scan
without successful system without performing a scan or calculation. C.2
adjustment C.2
Click the Apply button in the lower part of the dialog box.
The parameters will be applied to the scan system. C.2
0.0
Preparing for adjustment C.2 Select Options > Adjustments from the menu and go to the
Interactive shim card.
0.0
(1)
(2) (7)
(8)
(3) (9)
(10)
(4)
(5)
(6)
(11)
(12)
0.0
Physio selection C.2 For the adjustment scan, you may apply physiological measure-
ment parameters from the relevant parameter card of the proto-
col.
C.2
Entering the shim The nine parameters are part of a parameter set that describes
parameters C.2 the field correction.
C.2
0.0
Using the plus and minus Instead of entering shim parameters numerically, you can
buttons increase or decrease their values using the plus or minus but-
C.2 ton. C.2
Fine tuning of shim Shimming normally begins with significant changes to the
parameters C.2 parameter values and concludes with very small adjustments
using the plus and minus buttons. C.2
Range display C.2 The range display indicates at what interval you can change the
transmit amplitude or shim parameters. C.2
0.0
Display of When the measurement is complete, the results for each mea-
results C.2 surement are displayed numerically and graphically. C.2
0.0
Receive channel The receive channel is used to select the signals of the local
selecting C.2 coils. In addition to the receive channel (Ch.), the coil name
(Coil) and the connector (Con.) are displayed in the selection
list. C.2
Changing parameters C.2 Once the measurement results are displayed, you can make
changes while the measurement is in progress. The Tendency
column provides valuable information. C.2
0.0
Loading stored You can load the system parameters currently stored in the
parameters C.2 measurement system as temporary shim parameters and use
them, for example, as start parameters. C.2
Loading from tune up C.2 As an alternative, you can also load parameters from the last
system tune-up as temporary parameters. C.2
0.0
Loading best shim The "best" shim parameters obtained in the current scan may
parameters C.2 be imported as temporary shim parameters. They are then
used for the next adjustment scan. C.2
This is especially useful if you have moved away from the most
optimal values while varying parameters. The most optimal
shim parameters are determined based on the maximum trans-
verse relaxation time (T2*). C.2
Deleting the best shim You may delete the "best" shim parameters obtained in the cur-
parameter C.2 rent scan, making them invalid. The corresponding display is
deleted. C.2
Applying parameters to You can transfer the optimal shim parameters for the measure-
the scan system C.2 ment to the measurement system.
C.2
C.2
measurement C.2
0.0
There are special RF pulses that are used for water suppres-
sion during scans. With this adjustment, you determine a cor-
rection factor for the transmitter amplitude for these RF pulses.
Within the adjustment volume, the flip angles are set for optimal
suppression of the water signal.
C.2
Preparing for adjustment C.2 Select Options > Adjustments and go to the Water suppr.
card.
0.0
(1)
(12)
(2) (11)
(10)
(3)
(9)
(4) (8)
(5) (7)
(6)
0.0
Entering the correction For the first iteration, the system suggests an amplitude correc-
factor C.2 tion factor of 1.0 which you may edit. C.2
C.2
Entering the transmitter You can enter an increment to determine the correction factor.
increment (delta transmit A number of test measurements are performed followed by
amplitude) C.2 eleven adjustment measurements. The adjustment measure-
ments cover the range of the correction factor entered minus
five increments up to the correction factor entered plus five
increments. C.2
0.0
Selecting the gain C.2 You can set the receiver gain depending on the signal intensity.
Page C.228, Selecting the gain
C.2
Starting to scan C.2 After you have entered all parameters, you can start the adjust-
ment. C.2
C.2
Canceling the
measurement C.2
0.0
Results display C.2 The measurement results are displayed both numerically and
graphically.
C.2
Numeric results C.2 The results are listed below the running number of the iteration.
The following parameters are displayed: C.2
0.0
Graphic results C.2 The following results are displayed graphically: C.2
0.0
Selecting the receive The receive channel is used to select the signals of the local
channel C.2 coils. In addition to the receive channel (Ch.), the coil name
(Coil) and the connector (Con.) are displayed in the selection
list. C.2
Accepting the correction After successful adjustment, the correction factor is automati-
factor C.2 cally loaded into the measurement system.
C.2
Manual acceptance Within a certain range, you can enter a correction factor and
without successful manually accept it without adjustment measurement.
adjustment C.2 C.2
0.0
You have performed all adjustments and now want to undo the
settings. C.2
Click Reset.
The parameters displayed when the dialog box was opened are
re-loaded. C.2
0.0
Aborting adjustment C.2 You can cancel a scan in progress at any time.
C.2
0.0
0.0
(1)
(2)
(3)
(4)
(5)
0.0
Graphic display of the The graphic display of the last frequency scan is displayed. C.2
0.0
0.0
Range display C.2 Use the range display to verify the accuracy of the selected fre-
quency. If it is out of range, correct it accordingly. C.2
Receive channel The receive channel is used to select the signals of the local
selecting C.2 coils. In addition to the receive channel (Ch.), the coil name
(Coil) and the connector (Con.) are displayed in the selection
list. C.2
Starting the measurement C.2 After you have corrected the resonance frequency, you may
start scanning. C.2
Canceling the You may stop the examination if you are not satisfied with the
measurement C.2 frequency spectrum. C.2
0.0
0.0
NOTE
This list is usually provided for diagnostic purposes
handled by Siemens Service. C.2
Updating the display of You can update the scan results displayed on the card after
parameters C.2 each adjustment.
C.2
Rejecting all adjustment If you want to reject all the adjustments already performed:
results C.2 C.2
0.0
Detail of information for the You can define the scope of the information to be displayed. All
parameters displayed C.2 of the important parameters are displayed in "customer"
mode. C.2
Adjustment vector C.2 Select the parameter sets you want to display. C.2
0.0
0.0
0.0
D.1 Introduction
Databases and drives .................................................... D.12
Data levels ..................................................................... D.14
Calling up the Patient Browser ....................................... D.16
The Patient Browser window ......................................... D.17
Customizing the Patient Browser window ............... D.110
Image stamps .............................................................. D.116
0.0
syngo MR 2006T D1
Contents Patient Browser
0.0
D2 Operator Manual
Patient Browser Contents
D.8 Reporting
Basics ............................................................................ D.83
Layout ........................................................................ D.84
Creating a report ............................................................ D.86
Editing a report............................................................... D.87
Opening a report ........................................................ D.88
Navigating in the report ........................................... D.810
Editing a report ........................................................ D.812
Saving a report ........................................................ D.822
Printing a report ........................................................... D.824
Opening the print preview ........................................ D.824
Close the print preview ............................................ D.826
Starting to print ........................................................ D.827
Sending a report .......................................................... D.829
0.0
syngo MR 2006T D3
Contents Patient Browser
0.0
D4 Operator Manual
CHAPTER
D.1 Introduction D.1
With the Patient Browser you can search for data in a fast and
uncomplicated way and then process that data in the browser
or in the task cards.
D.1
When to access data with To examine a patient who has already been examined once
the Patient Browser D.1 before with your system.
To view the images of a patient from earlier examinations in
order to compare them with current results.
To comment or postprocess images after an examination.
To correct incorrect information for a patient stored in your
system.
To save patient and examination data or to send them to
another location in your hospital via the network.
To expose images of a patient onto film for reporting or doc-
umentation purposes.
Security-Privileges D.1 When Security is activated, you can correct, rearrange and set
work states only if you are authorized to do so.
Page B.268, PatientBrowser D.1
0.0
Scheduler D.1
0.0
0.0
(1) Database
(2) Patient
(3) Study
(4) Series
(5) Instances
Depending on the database, the work status of each data-
base entry is displayed as an abbreviation. You will find infor-
mation about the processing status on
Page D.62, Defining the work status
0.0
Patient D.1 The examination data of different patients are stored by the
names of the patients in your database.
D.1
Instances D.1
D.1 On the lowest data level, the Instance Level, the individual
images are stored and depending on the modality, the data sets
from which images can be generated (e.g. raw data). All entries
on the Instance Level are generally referred to as images.
In the Scheduler, you will find the individual Action Items for
the Procedure Step in question at this point. D.1
0.0
You can call up the Patient Browser window either from the
main menu or by using the symbol keypad.
D.1
Or D.1
D.1
NOTE
If a dialog box is open and active the button Patient
Browser might not function. D.1
D.1
NOTE
If you call up the Patient Browser on the satellite console,
it will not be updated automatically. D.1
0.0
0.0
Tool bar D.1 You can work on the data you have selected using the menus
or the icon buttons on the tool bar. D.1
Navigation area D.1 The lower data levels for the selected databases, patients,
examinations, and series are displayed graphically in the navi-
gation area. D.1
Using the mouse you can select patient, study, series or image
data in order to edit it or to transfer it to other applications. Every
selection you make in the navigation area is automatically
shown in the content area.
D.1
Information area D.1 In the information area you can see brief information about the
patient and study selected. When the navigation area is hidden,
you can also see which database is open and which data level
is displayed.
Page D.112, Showing and hiding window sections D.1
0.0
Content area D.1 In the content area you will see a list of the studies or proce-
dures for the patient selected in the navigation area. If you
select the lower data levels, you can see which series or proce-
dure steps are stored for a study and which images or action
items are stored for a series or procedure step. D.1
In the content area you can also select patient and examination
data for further processing. D.1
0.0
You can alter the display of the Patient Browser window and in
this way optimize it for your way of working. For example, you
can have a certain area enlarged in order to view as much data
as possible at one time.
D.1
Changing the window You can enlarge, reduce, and pan the Patient Browser window
size D.1 on your screen as you require.
Page A.225, Resizing and moving a window D.1
0.0
Enlarging and reducing the You can change the height of the navigation and content areas
navigation and content with respect to one another using the mouse. The larger you
areas D.1 make the navigation area the smaller the content area will
become and vice versa. D.1
D.1 Move the mouse cursor to the border of the navigation area.
Drag the line down to enlarge the navigation area and reduce
the content area.
Or D.1
0.0
Showing and hiding You can have the tool bar, navigation area, and information area
window sections D.1 either displayed or not, in order to create more room in the
Patient Browser window. D.1
D.1 Click on View > Toolbar to hide or show the tool bar.
Click on View > Info Area to hide or show the information
area.
Click on View > Tree to hide or show the data structure in the
navigation area.
If the data structure is not displayed, the data level set in the
configuration is displayed in the content area. In the navigation
area, you can see which database these entries belong to.
Page D.715, Single View of the content area D.1
0.0
Display of lists and image If you have selected a study or series in the navigation area, all
stamps in the content areaD.1 the associated series and images are displayed in the content
area. With the View menu you can toggle between a list or
image stamp display.
D.1
0.0
Showing and hiding You can have individual databases and drives either displayed
databases and drives D.1 or not in the navigation area depending on whether you need
them for your work. D.1
0.0
Customizing the table in The list display of patient and examination data in the content
the content area D.1 area consists of a table. You can alter the preset column widths
for each column. D.1
Click on the header of the table in the content area with the
mouse cursor.
Drag the right column boundary to the right to enlarge the
column.
0.0
If View > Image Stamps is activated, all data objects are dis-
played as image stamps on the image/data level. D.1
D.1 Data objects include series or images of a patient and data sets
from which images can be generated (e.g. raw data, 3D
objects) as well as curves (e.g. ECG curves) and texts. D.1
If you click on an image stamp with the mouse the object will be
selected.
Double-click or drag & drop loads the data into the task card
that is at the top of the stack of cards, e.g. the Viewing card.
D.1
Data objects D.1 This is a selection of possible data objects. (The range of pos-
sible objects is continuously expanded with each software ver-
sion.) D.1
0.0
D.1
0.0
0.0
In the Patient Browser window you can view all the patient and
examination data stored in the databases of your system and
on external archiving media. D.2
You can search for patient data in the Patient Browser by nav-
igating through the data levels of the window by mouse click or
using the keyboard. D.2
0.0
In the content area you can see a list of all studies that are avail-
able for that patient. D.2
0.0
Select the menu entry View > Open Subtree to view all the
entries of lower data levels (open up the data tree com-
pletely).
Or D.2
Or D.2
Call up the popup menu with the right mouse button (or Shift
+ F10) and click on Open Subtree.
The function Open Subtree is especially useful if you have
selected several patients simultaneously.
If you select the icon for a database or drive the Open Sub-
tree menu item and the button remain dimmed. At this level
you cannot open the data tree.
Closing a subtree D.2 Call up View > Close Subtree in the main menu or Close
Subtree in the popup menu to close the lower information
levels again.
0.0
Updating the scheduler D.2 If your system is connected to an HIS/RIS system, the sched-
uler is automatically updated at regular intervals with informa-
tion from the registration depending on the service configura-
tion. You can also start this updating operation manually. In this
way you can ensure that you are always working with the latest
data. D.2
Click on the icon for the scheduler to update it and then open
it.
Depending on the configuration, the Worklist Time Range
window is displayed in which you can limit the time frame for
your query.
Page E.33, Defining the worklist time range
In the Patient Browser, all patients who are preregistered for
examination on your system are now displayed.
D.2
Clearing the scheduler D.2 You have the possibility to delete data from the Scheduler. D.2
0.0
Updating the display Changes and additions to database entries that you make on
of the databases D.2 your workstation or are made via the network are automatically
displayed in the Patient Browser window. You can initiate this
updating manually, too, if the automatic process is delayed.
D.2
NOTE
If you are working on a satellite console, you must update
the database with Refresh key. D.2
0.0
After you have called up the Patient Browser window for the
first time the local database will open. All the patients stored in
it are listed in the navigation and content area. D.2
The data levels of the first patient are displayed in the naviga-
tion area. D.2
0.0
Now select a database in the navigation area and search for the
patient you require. You then open the lower levels of informa-
tion until you have found the data you are looking for of the
patient concerned. D.2
0.0
Example D.2 For example, to select certain images of a patient for process-
ing you can open the information levels patient, study, and
series one after the other until the images you require are listed
or displayed (as image stamps) in the content area. D.2
D.2 Click on the icon for the database in which the patient is
stored in the navigation area.
If necessary, scroll through the list of patients using the scroll
bar until you have found the patient you require.
You will find the patient you are looking for even faster if you
press the key for the first letter of the patient's name on the
keyboard. The selection then jumps to the first patient entry
with this initial letter.
D.2 Click on the patient you are looking for in the navigation area
to view the information levels stored for this patient as icons.
All the studies of this patient are displayed in the content
area.
D.2 Click on a study in the navigation area to select it and to view
all the associated series.
0.0
Data selection with the Using the keyboard you can reach various data entries in the
keyboard D.2 Patient Browser very quickly. The key assignment for the
selection options in the active area (navigation or content area)
is summarized in the following table. D.2
D.2
When you press and hold the Ctrl key and click the data input
with the mouse, you are selecting the inputs exclusively. How-
ever, when you press the Shift key and click data inputs with
the mouse, you are selecting the inputs inclusively (standard
Windows functionality).
0.0
Multiple selection D.2 You can also select several patients at once, for example, to
save their data, or you can select several images of one patient
in order to review them. D.2
0.0
D.2
When filtering your data you can use filter criteria that are
offered by default by your system. These are available to you on
the menu bar or with the buttons on the toolbar. D.2
Or D.2
0.0
Not Archived
Only the data which have not been saved are displayed.
Not Printed
Only the data which have not yet been printed are displayed.
Not Sent
Only the data which have not yet been sent in the network are
displayed.
Not Marked
Only the data which are not marked are displayed.
Marked
Only marked data are displayed.
0.0
Deactivating the filter D.2 A filter remains active until you replace it by another filter. D.2
D.2 Call up Filter > Off or click on the icon button to have all the
data displayed again (unfiltered).
Using the Patient Browser you can also create your own filter
criteria in order to filter the database according to a combination
of target items. D.2
If you keep self-defined filters general, you can use them more
frequently to have a certain subset of the data displayed in a
quick and uncomplicated manner. D.2
If you define very specific filters, you can search for patient and
examination data in a direct and time-saving way. D.2
0.0
0.0
D.2 Select one of the filtering criteria offered in the selection list.
Depending on which criteria you select, input fields combined
with and, or or From ... to appear or the criteria has no addi-
tional input field.
D.2
Enter target items in the input fields combined with and that
must all be fulfilled.
0.0
Example of a user- The following user-defined filter was created to find a particular
defined filter D.2 series of a thorax examination in a database. D.2
This filter only selects marked series that have already been
completed, filmed, and archived and that were acquired with a
slice position between 0 and 100. D.2
0.0
Using user-defined filters D.2 User-defined filters are placed in the Filter menu as additional
menu entries. D.2
0.0
Removing user-defined When you no longer require a user-defined filter, you can
filters D.2 remove it from the Filter menu again to keep the menu clear. D.2
Call up the Filter dialog box and select the filter you want to
delete in the selection list next to Filter Name.
Or D.2
0.0
You can sort the data displayed in the Patient Browser by var-
ious criteria. This enables you to output the data in a certain
sequence and makes it easier to find certain patient and exam-
ination data. D.2
You can define your own sort schemes with up to three sort lev-
els for sorting the images. D.2
You can reverse the sorting order for each selected sort criteria.D.2
0.0
You may sort the list of patients in the local database or sched-
uler. D.2
0.0
0.0
0.0
0.0
Sorting in the You can also sort in the content area. D.2
D.2
MR-specific sort criteria D.2 MR images and data may also be sorted by further sorting cri-
teria and schemes. D.2
Selecting a sort criteria from the menu under Sort > Modal-
ity Specific Data > ....
D.2 Anatomical
Multiple standard sort scheme for localizer and anatomical
examinations.
Page F.316, Using a Siemens sort scheme
Triggered
Multiple Siemens sort scheme for triggered examinations.
Page F.316, Using a Siemens sort scheme
Chronological
Multiple Siemens sort scheme for sorting by time of creation
of the images.
Page F.316, Using a Siemens sort scheme
0.0
Instance Oriented
Multiple Siemens sort scheme for sorting by image number.
Page F.316, Using a Siemens sort scheme
Echo Time (TE)
Series that have been acquired with multiple echo protocols,
contain images based on different contrasts (e.g. T2 images,
proton density images). You can use sorting to separate
these images by echo time.
Repetition Time (TR)
The images of a series are sorted by TR.
Inversion Time (TI)
The images of a series are sorted by TI.
Trigger Time (TT)
The images of a series are sorted by TT.
0.0
Multiple sorting D.2 You can define a separate sort scheme with up to three levels
for sorting within a series. You define a sort criteria for each of
the three levels. D.2
The images are first ordered by the sort criteria of the first level.
The sort criteria of the second level is used if images are iden-
tical by the first sort criteria. The sort criteria of the third level is
only used if images are identical by the first and second sort cri-
teria.
D.2
0.0
0.0
You can even print data lists of you have already stored the
patient data, for example, for archiving or transfer to a local
data medium.
Page D.55, Printing patient data from data media
Displaying the print Call up Patient > Print Preview... to have the printout dis-
preview D.2 played in a preview.
Click on Close window to close the print preview again.
0.0
Printing out a list D.2 Call up Patient > Print List to print out the data listed in the
content area.
In a list of patients, the content and date of creation of the list is
stated in the header of the printout. For all other data levels, the
content of the information area is also printed. D.2
0.0
Changing printer You can change the printer settings (e.g. page margins) in the
settings D.2 Windows NT/Windows XP print dialog. D.2
0.0
Data media D.2 Depending on the drive setting of your system, you can read
data from the following media: D.2
0.0
Changing data media D.2 Call up Transfer > Eject from... and select the appropriate
drive from the list which is then displayed.
D.2 Remove the data medium from the drive and insert the new
medium into the corresponding drive.
Or D.2
D.2
Showing/hiding data With View > Source, you can hide or display archiving media
sources D.2 individually in the navigation area.
Page D.114, Showing and hiding databases and drives D.2
0.0
Selecting data D.2 You search and select patient and examination data from
archive media by clicking through the data levels in the naviga-
tion area. D.2
Importing data D.2 You can import the patient and examination data selected in the
archive medium into the local database, e.g. to evaluate it, to
send it through the network, or to store it on another data
medium. D.2
0.0
You can import the required data into your local database via
the network and work on your workstation in the usual way, e.g.
loading the data into the Viewing task card for evaluation. D.2
You can retrieve patient and examination data only from work-
stations that are set up as a network node and support the
Search function.
Calling up standard You can perform your data search in the Search window. There
patient search D.2 you enter the search criteria, start the search, and select the
data to import. D.2
0.0
(1)
(2)
(3)
(4)
(5)
(6)
0.0
You search for the patients, studies or series you want to import
into your local database by entering patient, study or series
details in the input fields of the Patient Search dialog. D.2
D.2 Select the network node on which the data searched for are
located.
Enter the last name, ID and date of birth of the patient you are
searching for.
The following characters are not permitted: ^ = \
The search distinguishes between upper and lower case!
Enter the characters correctly.
If you only know part of the name or the patient ID, you can
also use the character * as wildcard.
Page E.35, Wildcards for patient name and ID
0.0
Select Any from the dropdown list if you do not want the sex
to be considered for the search.
Select the Sex from the dropdown list.
0.0
0.0
Start Search D.2 After having entered patient, study or series details you can
start the search. D.2
Search result D.2 All patients and studies found are displayed in the information
area. D.2
0.0
D.2
N OT E
If the Patient ID is not unique, studies may be listed which
do not belong to the patient selected and displayed in the
information area. D.2
Image List D.2 With Image List you obtain a list of the instances of a series, in
case you want to explicitly import special instances. D.2
0.0
0.0
Starting importing data D.2 Select one or more patients, studies or series from the infor-
mation or search output area of the Search dialog.
Or D.2
0.0
Checking data Just as for archiving or exporting you can view import pro-
transmission D.2 cesses. D.2
D.2 Click Clear if you want all entries to be cleared, stop the cur-
rent search and start a new one.
All input fields, the information area and the result output list are
cleared.
D.2
Closing Patient Search D.2 You have two possibilities to close the Search window. D.2
0.0
You can adapt the user interface of the Search dialog window
to your method of working. The dropdown lists of the search cri-
teria Modality and Body Part are configurable. D.2
0.0
D.2 Click Cancel to close the dialog without saving the settings.
0.0
At any one time the EPR Web browser only displays the EPR
for one patient. You can view but not import the data of the
patient with the EPR Web browser.
The first time you launch the EPR Web browser you must log
on (see the operating instructions of your EPR Web browser).
The syngo MR interface must be individually adapted to the
EPR Web browser by your system administrator.
0.0
Calling up the EPR Web To display the electronic report for a particular patient, select a
browser D.2 patient (or a study, series, instances) from the Patient Browser
or in another task card. D.2
D.2 Call up Patient > Retrieve EPR in the main menu to display
the EPR Web browser.
Or
D.2
If you click with the mouse outside the EPR Web browser, the
window is placed in the background.
0.0
Placing the EPR Web You can call up the Web browser with the same patient data
browser in the again.
foreground D.2
Or
D.2
The EPR Web browser is again displayed with the same con-
tents.
D.2
Closing the EPR Web Call up File > Close to close the EPR Web browser.
browser D.2
The EPR Web browser is closed. D.2
D.2
0.0
You have found the patient and examination data you require in
the Patient Browser window and would now like to make use
of this data in another application. D.3
0.0
0.0
With the Patient Browser you can transfer the images of one
or more patients from the local database to the Viewing task
card for viewing and editing. D.3
Depending on which data level you are in, you can transfer the
following image material to the Viewing card: D.3
0.0
All images of a patient, Select the patient, study, or series in the navigation or con-
study or series D.3 tent area of the Patient Browser.
Call up Patient > Load to Viewing or click on the button on
the toolbar to transfer the associated images to the Viewing
task card.
Or D.3
One or more than one Click the Viewing card to the top of the stack.
image of a patient
Double-click on the data icon of the image that you want to
D.3
Select more than one image in the content area and transfer
it to the Viewing card with Patient > Load to Viewing or the
Load to Viewing button on the toolbar.
Page D.210, Multiple selection
0.0
Drag & drop D.3 In addition to the methods described above you can also trans-
fer images to the Viewing task card by drag & drop. In this way
you can determine in which segment the first of your selected
images is to be displayed. D.3
0.0
If the task card is not in the foreground you can also drag the
images from the Browser onto the corresponding tab. The
task card moves into the foreground and the images are
loaded into the image area.
In the Viewing task card you can view and edit the transferred
images.
Part G D.3
0.0
Splitting a mosaic image D.3 Select one mosaic image from the Patient Browser.
Select Applications > Mosaic > Split to one Series.
The images of the selected mosaic image are saved in a new
series under the same study. D.3
0.0
Splitting several mosaic Select two or more mosaic images or all mosaic images in
images D.3 the Patient Browser.
Select Applications > Mosaic > Split to one Series.
The images of all selected mosaic images are saved in a new
series under the same study D.3
Or D.3
D.3
NOTE
Due to safety standards splitting of the images may take
some time. This process runs in the background and is
accomplished even if the current user logs off or if the user
changes. D.3
0.0
Canceling splitting of Select Applications > Mosaic > Abort Splitting process....
mosaic images D.3
D.3
NOTE
To cancel a running spiltting process when the user
changes is only possible if the different user disposes of the
corresponding access rights. D.3
0.0
D.3 Call up Applications > 3D > MPR or click on the icon button
to start image processing as multiplanar reconstruction
(MPR).
Or D.3
0.0
0.0
D.3
0.0
You can use the Patient Browser to search for this patient in
the database and then call up a dialog box in which you can pro-
cess the data. D.4
History of changes D.4 Every time you change the data of a patient or examination, this
is recorded in a history of changes on your system. The correc-
tion list is maintained for each object level. You can view the his-
tory of changes for an entry in the local database at any time
in order to see what changes have been made to it. D.4
0.0
D.4
NOTE
As long as you have not generated all the Position Display
images of a patients examinations, you must not change
the respective patient and examination data. D.4
0.0
Close the patient in all task cards (Patient > Close Patient).
D.4 Click on the icon button on the toolbar to open the Correct
dialog box.
You cannot correct data that was delete-protected with Edit >
Protect. You must first remove the delete protection with
Edit > Remove Protection.
Data that are used by other applications or are being pro-
cessed on another console cannot be corrected, either. The
corresponding entries in the Correct dialog box are then
dimmed.
0.0
0.0
Selected patient D.4 On the title bar of the Correct window, you can see which
patient and data you have selected. D.4
Content display D.4 In the first line of the window of the header line, the number of
studies, series, and images which are selected for correction is
displayed.
D.4
Entering data D.4 In the input and selection fields of the Correct window you can
see the information that has been stored for the selected patient
or selected study or series so far.
D.4
0.0
Updating a current If you have called up the Correct window from the examination
examination D.4 card, you can incorporate the changes in the current examina-
tion. D.4
0.0
0.0
One patient stored in the A patient whose name was spelled incorrectly during an exam-
database twice D.4 ination or who was once registered as an emergency patient is
stored in the database twice. D.4
As soon as you save the corrected patient name, the dialog box
asks you whether you want to merge the examination data of
the two patient entries or not. D.4
D.4 Click on OK to store all the selected data under the corrected
patient name.
0.0
Changing external data D.4 If you change patient and examination data that you have pre-
viously imported into your local database (e.g. from another
archiving medium) or that was imported into your system (e.g.
via HIS/RIS), the Losing External References message box is
displayed. D.4
Or D.4
0.0
C AU T I O N
Source of danger: Correcting/rearranging objects with
references. D.4
0.0
Restrictions D.4 The data of the Service Patient, the Quality Assurance Patient,
and the Test Patient cannot be moved. The same applies to
data imported via an HIS/RIS system or linked with such a sys-
tem. D.4
You cannot move data that are already opened in another appli-
cation (e.g. the Viewing card) or are delete-protected with
Edit > Protect. D.4
You can only move studies into other studies or patient entries,
series into other series or studies, images into other series. D.4
For example, you can move images from one series into
another series or all images of one series into another study.
For example, you cannot move the images of a study into an
individual series of another study.
0.0
Drag & drop or cut You can move data either with the mouse (drag & drop) or using
& paste D.4 the Edit menu (cut & paste). D.4
If you accidentally cut and move data by drag & drop, you can
cancel the operation at any time with the Esc key.
Drag the selected data to the target position and release the
mouse button.
Or D.4
D.4 Call up Edit > Cut or click on the icon button on the toolbar.
Click on the target position.
D.4 Call up Edit > Paste or click on the icon button on the toolbar.
0.0
Or D.4
0.0
0.0
0.0
D.4 If an object has been moved, the entry is marked ">" under
Attribute in window Correct & Rearrange History.
Depending on how many levels have changed when you
change an object, up to four lines of texts can be inserted into
the table.
0.0
Finally you can use the Patient Browser to film images for doc-
umentation or reporting. D.5
0.0
Storing data on CD D.5 Select the data that you want to archive in the navigation or
content area of the Patient Browser.
Call up Transfer > Export To....
Select the data medium you require in the Export To dialog
box.
D.5 Click on Export to save the data on the selected data
medium.
0.0
Or
D.5
0.0
0.0
Showing print preview D.5 To show the data in the print preview, select Patient > Print
Preview.
Printing out the data list D.5 To print out the data list, select Patient > Print List.
The content and date of creation of the list appears in the
header of the list of patients. For all other data levels the con-
tent of the information area is also printed out.
The list is always printed in English.
Changing printer settings D.5 To change any printer settings, select Patient > Print... and
make your settings in the dialog box that opens.
Click OK to confirm your changes.
0.0
0.0
Filming D.5
You can use the Patient Browser to send single images or all
images of one or more patients, studies or series to the Filming
task card.
D.5
Or
D.5
Click the Filming card to the top of the stack and double-click
on the entries that you want to film in the Patient Browser.
Or D.5
Drag the selection to the Filming task card with the mouse
(drag & drop).
Just like loading the images into the Viewing task card you can
determine in which segment of the film sheet the images are to
appear.
Page D.35, Drag & drop D.5
0.0
With one of the above commands, all the selected images are
transferred to the Filming task card. Depending on whether
Auto Expose has been activated there, the images are
exposed on film immediately, as soon as a film sheet is full, or
they are first collected in a film job.
Chapter O.2, Semi-automatic/Manual Filming
D.5
Film preview D.5 Call up Patient > Film Preview to view a preview showing
how the images will be filmed or printed.
Or D.5
0.0
Exposing images on film D.5 You can expose or print a patients images that you have col-
lected in a film job from the Patient Browser. To do that you do
not have to switch to the Filming task card first. D.5
0.0
Film Task Status D.5 You can obtain an overview of all film jobs that have already
been sent to a camera or printer and, for example, change the
sequence in which they are to be processed.
Page O.53, Viewing and manipulating film jobs
D.5
Call up Patient > Film Task Status to display the Film Task
Status dialog box with a list of all pending film jobs.
Or D.5
0.0
If you maintain your data collection regularly you can keep your
data management clear and access times to the databases
short. This is an important contribution to the efficiency of daily
examinations. D.6
0.0
Via the work status, you can define, for example, precondi-
tions for storing and sending data.
Chapter J.7, Configuring Data Transfer
(e.g. com/p/a/s/e/r/h)
com/p/a/s/e/r/H - the first part provides information about the
D.6
0.0