SYSTEMS AND METHODS FOR PHYSICALLY SUPPORTING USERS DURING EXERCISE WHILE ENHANCED OXYGEN TREATMENT
20170262589 · 2017-09-14
Inventors
Cpc classification
G16H20/30
PHYSICS
G07F9/001
PHYSICS
H04W12/33
ELECTRICITY
G07F17/0092
PHYSICS
A61H3/008
HUMAN NECESSITIES
H04L63/107
ELECTRICITY
G06Q20/34
PHYSICS
H04L63/0861
ELECTRICITY
G16H10/60
PHYSICS
A61B5/4848
HUMAN NECESSITIES
A61H1/0229
HUMAN NECESSITIES
A61B5/0205
HUMAN NECESSITIES
International classification
A61H3/00
HUMAN NECESSITIES
Abstract
User access to exercise with oxygen therapy (EWOT), therapy progress data, and user profile/record integration can be enabled via portable and wearable computing devices in use at treatment facilities is described. Embodiments leverage the field of wireless communications can access facility-based transponders, user authentication, data access, and data tracking. The invention enables access to oxygen therapy during exercise at various facilities by authorizing user access, tracking usage, providing access to user profiles/records, recording user progress, providing notification to providers of subsequent user treatment, and user record management based on proximity of a provider to a user during treatment. A safety harness system can include a circular padded rail to encircle the waist/torso of a user underneath the user's arms; hydraulically controlled legs can enable manipulation/movement under hydraulic control when the padded rail is secured to the user and while the user is moving on exercise equipment.
Claims
1. A method for providing user access to EWOT systems, said method comprising: wirelessly detecting a presence of a user mobile device in close proximity to an EWOT system in a facility; determining whether the user is authorized to use the EWOT system based on association of the user via the mobile device with a user profile accessible via a data network from a remote server; and authorizing the user's access to the EWOT system when and if confirmed by the remote server.
2. The method of claim 1, wherein the step of determining whether the user is authorized includes the step of authenticating an identity of the user with credentials including at least one of: a biometric acquired from the user; a passcode accepted by the user in a user interface; acquiring a signal from an RFID tag and/or NFC-enabled credentialed device carried by the user.
3. The method of claim 1, wherein the mobile device carried by the user comprises a wearable computing device worn by the user.
4. The method of claim 1, including authenticating the identity of the user occurs prior to authorizing access to the EWOT system, wherein authentication is provided by at least one of: acquiring a biometric; and acquiring entry of a passcode from the user on the user interface.
5. The method of claim 4, further comprising wherein said authenticating is facilitated over the data network by the at least one remote server.
6. The method of claim 4, wherein data and/or services are accessed by the healthcare provider based on the authentication and is retrieved over the data network from the at least one remote server.
7. The method of claim 3, further comprising associating the wearable computing device worn by the healthcare provider with a wireless hand held computer, wherein the wireless hand held computer includes a display screen and user interface for the healthcare provider to review, create, and manage records associated with the user.
8. The method of claim 1, wherein the step of wirelessly determining the location of the wearable computing device worn by the user is facilitated by at least one transponder out of a plurality of transponders dispersed throughout the facility.
9. A system for authorizing user access to an exercise with oxygen therapy (EWOT), comprising: an EWOT system including an oxygen source including a connection for an oxygen mask and collocated with exercise equipment; and a user interface also collocated with the exercise equipment enabling a user to interact with the user interface physically or via a portable device associated with the user and obtain authorization to use the EWOT system.
10. A system of claim 9, comprising: a fitness and health facility containing at least one of the EWOT system and an associated user interface collocated with a plurality of exercise equipment also located within the fitness and health facility.
11. The system of claim 9, wherein the authorization can be obtained by at least one of: entry of a passcode, entry of a biometric, synchronization with a smart card, swiping a magnetic card, and wirelessly connecting via a mobile device.
12. The system of claim 10, wherein the fitness and health facility further includes a data network including a plurality of transponders deployed throughout the fitness and health facility, wherein the transponders enable determination of wearable device location the data network facilitates user authentication and access to records.
13. The system of claim 10, wherein user association with an EWOT system is determined from a user profile stored on the at least one server when a user wearing a wearable device is determined by at least one transponder to be in close proximity to an EWOT system, and the user is authorized access to at least one of the EWOT system and data associated with the user based on determination.
14. The system of claim 9, wherein the user interface includes a biometric scanner for authenticating healthcare provider identity, said biometric scanner further comprising at least one of: an iris recognition scanner, a voice recognition scanner, a fingerprint recognition device, an ear acoustical scanner for biometric identification using acoustic properties of an ear canal.
15. A method for providing security to a user of exercise equipment while the user moves on or about the exercise equipment, said method comprising: providing a safety harness system in association with exercise equipment, the safety harness system further including a circular padded rail that can encircle the waist or torso of a user underneath the user's arms, hydraulically controlled legs that enable the safety harness system to be manipulated/moved under hydraulic control when the padded rail is secured to the user and while the user is moving on exercise equipment, wherein hydraulics integrated with the hydraulically controlled legs slow/control bending action of the legs while a user moves about the exercise equipment, wherein the safety harness system traverses the workout equipment; accepting a user into the circular padded rail and securing the user within the padded rail; and wherein the safety harness system moves under hydraulic control as the user is moving on the exercise equipment.
16. The method of claim 15, further comprising the steps of: wirelessly detecting a presence of a user mobile device in close proximity to an EWOT system associated with the exercise equipment; determining whether the user is authorized to use the EWOT system based on association of the user via a mobile device in further association with a user profile accessible from at least one of the mobile device or via a remote server through a data network via the mobile device; and authorizing the user's access to the EWOT system when and if confirmed by the remote server.
17. The method of claim 16, wherein the step of determining whether the user is authorized includes the step of authenticating an identity of the user with credential including at least one of: a biometric acquired from the user; a passcode accepted by the user in a user interface; acquiring a signal from an RFID tag, and/or NFC-enabled credentialed device carried by the user.
18. The method of claim 16, wherein the mobile device carried by the user comprises a wearable computing device worn by the user.
19. The method of claim 18, including authenticating the identity of the user occurs prior to authorizing access to the EWOT system, wherein authentication is provided by at least one of: acquiring a biometric; and acquiring entry of a passcode from the user on the user interface.
20. The method of claim 19, further comprising wherein said authenticating is facilitated over the data network by the at least one remote server.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0044] The accompanying figures, in which like reference numerals refer to identical or functionally similar elements throughout the separate views and which are incorporated in and form a part of the specification, further illustrate the present invention and, together with the detailed description herein, serve to explain the principles of the disclosed embodiments.
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
DETAILED DESCRIPTION
[0055] The particular values and configurations discussed in these non-limiting examples can be varied and are cited merely to illustrate at least one embodiment and are not intended to limit the scope thereof.
[0056] The embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which illustrative are shown. The embodiments disclosed herein can be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
[0057] The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosed embodiments. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
[0058] Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which disclosed embodiments belong. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
[0059] As will be appreciated by one skilled in the art, the present invention can be embodied as a method, system, and/or a processor-readable medium. Accordingly, the embodiments may take the form of an entire hardware application, an entire software embodiment, or an embodiment combining software and hardware aspects all generally referred to herein as a “circuit” or “module.” Furthermore, the embodiments may take the form of a computer program product on a computer-usable storage medium having computer-usable program code embodied in the medium. Any suitable computer readable medium may be utilized including, for example, hard disks, USB Flash Drives, DVDs, CD-ROMs, optical storage devices, magnetic storage devices, etc.
[0060] Computer program code for carrying out operations of the disclosed embodiments may be written in an object oriented programming language (e.g., Python, Java, PHP C++, etc.) The computer program code, however, for carrying out operations of the disclosed embodiments may also be written in conventional procedural programming languages, such as the “C” programming language or in a visually oriented programming environment, such as, for example, Visual Basic.
[0061] The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer. In some described scenarios, the wearable device may be connected to sensor deployed throughout a facility and obtain communication to a network and remote server via NFC, RFID, Bluetooth, WiFi, and cellular data communications. In other scenarios, remote server and secured cloud-based storage facilities may be connected to a user's computer through a local area network (LAN) or a wide area network (WAN), wireless data network e.g., Wi-Fi, Wimax, 802.xx, Bluetooth and cellular data communications networks, or the connection may be made to an external computer via most third party supported networks (for example, through the Internet using an Internet Service Provider).
[0062] Aspects of the disclosed embodiments can be implemented as an “app” or application software that runs in, for example, a web browser and/or is created in a browser-supported programming language (e.g., such as a combination of JavaScript, HTML, and CSS) and relies on a web browser to render the application. The ability to update and maintain web applications without distributing and installing software on potentially thousands of client computers is a key reason for the popularity of such apps, as is the inherent support for cross-platform compatibility. Common web applications include webmail, online retail sales, online auctions, wikis and many other functions. Such an “app” can also be implemented as an Internet application that runs on smartphones, tablet computers, wearable devices, and other computing devices such as laptop and personal computers.
[0063] The disclosed embodiments are described in part below with reference to flowchart illustrations and/or block diagrams of methods, systems, and computer program products and data structures according to preferred and alternative embodiments. It will be understood that each block of the illustrations, and combinations of blocks, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general-purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the block or blocks.
[0064] These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function/act specified in the block or blocks.
[0065] The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the block or blocks.
[0066] Reference is made to healthcare providers, facilities, patients, and users throughout this disclosure. It should be appreciated that healthcare providers can include fitness instructors, occupational therapists, physicians, nurses, and the like. Facilities can include healthcare facilities, hospitals, gyms, private clubs, spas, hotels, resorts, and the like. Users can be patients receiving therapy or simply individuals seeking better fitness outcomes. No limitation is meant by reference to a particular place, person, system, and/or event.
[0067] Referring to
[0068] Referring to
[0069] Referring to
[0070] Referring to
[0071] As mentioned above, a wearable computer 220 can include electronic circuitry, which can further include a wireless communications module (such as cellular, short-range wireless (e.g. Bluetooth, RFID, NFC), or Wi-Fi circuitry) for connection to remote devices (e.g., server 260, transponders 275 and other computing devices 210). It is known that a microprocessor controls all functions (e.g., display, communications, input) in computers. It is also generally known that a wearable computer can further include a rechargeable power source, such as a battery to power the other circuitry.
[0072] The communication link is illustrated as a wireless connection; however, wired connections can also be used. For example, the communication link may be a wired serial bus such as a universal serial bus or a parallel bus. A wired connection may be a proprietary connection as well. The communication link can also be a wireless connection using, e.g., Bluetooth™ radio technology, communication protocols described in IEEE 802.xx (including any IEEE 802.11 revisions), Cellular technology (such as GSM, CDMA, UMTS, EVDO, WiMAX, or LTE), or Zigbee™ technology, among other possibilities such as near field communications (NFC) and RFID. The remote device 210 and/or remote server 260 can be accessible via the Internet/Intranet and may include an accompanying smartphone handheld device, a tablet computer, and a computing cluster associated with a particular data services (e.g., electronic medical/health record access and management).
[0073] The wearable computing device 220 can also include one or more connection contacts that can be used to connect device 220 to a power source to recharge a battery without removal thereof. Alternative charging functionality can be incorporated into the wearable device, such as electromagnetic recharging, or motion-based electromagnetic charging. Further, the wearable computing device 220 can include a connection port (e.g., USB) that can be used to connect the wearable computing device 210 directly to an external device such as a smartphone or a computer. Port and contacts can be combined as any standardized connection type port such as USB, fire-wire, thunderbolt, or can be provided as specialized connections.
[0074]
[0075] Referring to
[0076] Referring to
[0077] Referring to
[0078] The aforementioned authorization steps shown in blocks 840 and 940 can further include a step or logical operation for determining the identity of the user and providing the user access to the data and/or the services based on the identity of the user. Examples of data are, for example, coupons, advertising information, video, video clips, replays, statistics, information, text, voice, etc. Examples of services are, for example, tour guides (self-guided tours), providing historical information with respect to a point of interest, providing entertainment information (e.g., voice, text, etc.) to fans at a sporting or concert event, providing medical data and user monitoring during, for example, surgery, treatment, and recovery. Other examples of services include providing assistance to drivers to prevent fatigue and auto accidents, and directional and navigational information to drivers.
[0079] A biometric scanner can be integrated with an optical and image-processing system associated with the EWOT system in the form of a user interface, or via the wearable device, and/or can be implemented as an “app” that enables the wearable device to perform biometric scanning (recognition) operations. The wearable device can be implemented as head gear worn by a user. Examples of such headgear include, for example, eyeglasses or a hardware system configured in the form of virtual reality gaming goggles worn by the user.
[0080] In accordance with another feature, the aforementioned at least one biometric may be, for example, a retinal scan gathered through optics integrated with the wearable device. In yet another embodiment, the at least one biometric can include at least one other biometric gathered through the wearable device. The wearable device may be implemented as data enabled eyewear. Additionally, in some embodiments, the aforementioned authenticating steps shown can be facilitated by a remote server (e.g., a server or group of servers). The data and/or the services can be accessed and retrieved from such a remote server based on the identity of the user. As shown in blocks 730 and 830, a user's presence in close proximity to EWOT system can be detected (e.g., via Bluetooth, RFID, NFC, etc.) based on a user's portable computing device carried or wearable computing device worn by the user.
[0081] Authentication can be provided for wirelessly communicating data and/or services between the wearable device and at least one transponder out of a plurality of transponders and dispersed with a facility. The at least one transponder is preferably within wireless communications range (e.g., Bluetooth LERFID, NFC) of the user's mobile/wearable computing device. One example of a transponder that can be implemented in accordance with one or more embodiments is the “iBeacon.” iBeacon is the trademark for the proximity system that Apple Inc. has referred to as “a new class of low-powered, low-cost Bluetooth transmitters that can notify nearby iOS devices of their presence.” The technology enables an iOS device or other hardware to send push notifications to iOS devices in close proximity. Devices running the Android operating system, for example, can receive iBeacon advertisements but cannot emit iBeacon advertisements (i.e., central role only). Currently, the iBeacon operates on Bluetooth Low Energy (BLE), also known as Bluetooth Smart. BLE can also be found on Bluetooth 4.0 devices that support dual mode. iBeacon uses Bluetooth low energy proximity sensing to transmit a universally unique identifier capable of being picked up by a compatible app or operating system that can be turned into a physical location or trigger an action on the device.
[0082] Note that in an embodiment, a step or logical operation can be provided for authenticating an identify of the healthcare provider prior to authorizing access to the healthcare records, wherein authentication comprises: at least one of acquiring a biometric; and acquiring entry of a passcode from the healthcare provider; and an RFID tag and/or NFC-enabled credentialed smartcard or worn bracelet that is challenged throughout a healthcare facility (e.g., upon entry into a user's room, wherein a user awaits treatment).
[0083] Referring to
[0084] It should be appreciated that variations of the above-disclosed and other features and functions, or alternatives thereof, may be desirably combined into many other different systems or applications. Also, that various presently unforeseen or unanticipated alternatives, modifications, variations or improvements therein may be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims.