H04L2209/88

CLOSED-LOOP ARTIFICIAL PANCREAS CONTROLLED BY BODY MOVEMENTS
20230033130 · 2023-02-02 · ·

A closed-loop artificial pancreas controlled by body movements, which includes: a sensor used for detecting blood glucose concentration; an infusion module used for infusing drug into the body; a control module connected to the sensor and the infusion module, respectively; and a sensing module operatively connected to the control module and used to sense or recognize the user's body movements, and different body movements represent different functional instructions, and according to the body movement sensed or recognized by the sensing module, the control module controls the sensor or the infusion module to execute corresponding functional instructions, which enhances the user experience.

ENCRYPTION SYSTEM FOR MEDICAL DEVICES

Certain aspects relate to encryption systems and methods for medical devices. A medical device can include a connectivity module for establishing a communication channel with a cloud system. After obtaining a test result, the device can generate an unencrypted data block comprising a device identifier and an encrypted data block comprising a serial number of the device and the test result using an encryption key associated with the device identifier. The device can securely send the test result to the cloud system by transmitting the unencrypted data block and the encrypted data block to the cloud system via the communication channel.

SYSTEMS AND METHODS FOR THE SAFE TRANSFER AND VERIFICATION OF SENSITIVE DATA

There are provided systems and methods for the safe transfer and verification of sensitive data. Personally identifying information from the sensitive data for an individual is encoded using mapping (e.g. hashing) to have statistical characteristics that limit the encoded information from being considered statistically identifiable. Identical, non-unique encoded output may be generated from multiple individuals from their respective unique personally identifying information. Determining the identity of a person using the encoded output (without any other identifying data) is statistically unlikely. The mapping may be configured such that all possible encoded output (e.g. each respective instance of output in the output space) have a statistically equal chance of being generated.

Method and system for private identity verification
11489819 · 2022-11-01 · ·

Methods, systems, and techniques for private identity verification involve obtaining a cryptographically secure commitment that is generated using a first user identifier and a private user identifier associated with the first user identifier; receiving, from an identity verification system, initial zero knowledge proof messages comprising the commitment; sending, to the identity verification system, a set of cryptographically secure known identifier commitments generated using a set of private user identifiers; receiving, from the identity verification system: (i) a zero knowledge proof response generated using the zero knowledge proof challenge; and (ii) proof that the private user identifier used in the initial zero knowledge proof messages comprises part of the set of private user identifiers; and verifying that the private user identifier used in the initial zero knowledge proof messages comprises part of the set of private user identifiers.

METHODS AND SYSTEMS FOR A SYNCHRONIZED DISTRIBUTED DATA STRUCTURE FOR FEDERATED MACHINE LEARNING

A system and method for executing a record within an immutable sequential data structure, the system including a computing device, the computing device configured to transmit a communication to a remote device, receive a remark from the remote device, retrieve an input related to a user, wherein the input is stored as an encrypted proof-linked assertion on at least an immutable sequential data structure for authorized party access, generate a record as a function of the input, transmit the record to the remote device, and store an executed record within the at least an immutable sequential data structure.

System comprising a medical apparatus and a remote control device, method for pairing the remote control device and the medical apparatus, and method for operating the medical apparatus

In a system, a medical apparatus and a remote control device perform a pairing procedure, in which the remote control device sends an identifier of the remote control device, the medical apparatus sends a time-referenced information, the remote control device receives the time-referenced information and generates a first hash key based on the identifier and the time-referenced information, and the medical apparatus receives the identifier and generates a second hash key based on the identifier and the time-referenced information. The second hash key corresponds to the first hash key, wherein, when the pairing has been successfully completed, the remote control device sends an instruction controlling the medical apparatus based on the first hash key, and the medical apparatus accepts the instruction if the first hash key corresponds to the second hash key.

MODULAR ANALYTE CONNECTIVITY SYSTEM FOR EXTENDIBLE COMMUNICATION WITH DIFFERENT TYPES OF PHYSIOLOGICAL SENSORS
20230083633 · 2023-03-16 · ·

A medical device communication system with a modular design to communicate with different types of medical devices, such as physiological sensors. The modular design is implemented using an extensible software library that provides a uniform framework for various applications or third party applications access to medical device data. The modular design also allows for regulated and unregulated portions of the system to be integrated into the system while allowing each portion to be updated separately. The regulated portion of the system may include components, such as sensors and the software library, that are subject to regulatory approval while the unregulated portion may include applications that are not subject to regulatory approval. Thus, the system enables a third party application developer to avoid having to submit the application to a regulatory agency for an application making use of the sensor data.

POLICY CONTROLLED SHARING OF DATA AND PROGRAMMATIC ASSETS
20230075525 · 2023-03-09 ·

Secure computing environments are employed to effectuate execution of algorithms to process datasets. For this purpose a secure data pipeline is used in which trusted and isolated computing environments receive and process the algorithms and datasets. A trusted and isolated computing environment is a computing environment whose computer code is able to be attested by comparing a digest of the computing environment to a baseline digest of the computing environment that is available to third parties to thereby verify computing environment integrity while also being a computing environment in which only a specified maximum number of application processes and specified system processes implementing the computing environment are able to operate.

METHOD FOR COUPLING A MEDICAL DEVICE WITH A NETWORK
20230131795 · 2023-04-27 ·

A system and method for establishing a secure communication connection between at least one medical device and a network. The system includes a first communication channel and at least one second communication channel out of a plurality of second communication channels. The method includes the steps of sending a connection request by the at least one medical device to a control unit, registering the at least one medical device via the first communication channel in the network, and encoding and establishing the communication connection via the at least one second communication channel from the plurality of second communication channels. The at least one second communication channel is selected depending on the data type and/or prioritization of data.

Secure networked respiratory therapy systems

Methods and apparatus provide communications among respiratory therapy device (“TD”), server and intermediary (e.g., a control device (“CTLD”) for the therapy device) to improve security. More secure communication channel(s) may be established using shared secrets derived with different channels. The communications may include transmitting therapy data from TD to server for authentication. The CTLD may receive the data and a nonce from a server. The CTLD receives from the TD a signing key dependent on the nonce and a secret shared by TD and server. The CTLD generates an authorisation code with received therapy data and the key for authentication of the data by the server upon its receipt of the code and data. The server computes (1) a key from the nonce and the secret known to TD, and (2) another authorisation code from received therapy data and the key. Data authentication may involve comparing received and computed codes.