SECURE REMOTE COMMUNICATION WITH A MEDICAL DEVICE
20230277857 · 2023-09-07
Inventors
- Keron Greene (Valencia, CA, US)
- Yue Li (Encino, CA, US)
- Chirag Shah (Valencia, CA, US)
- Joshua Uyeda (Los Angeles, CA, US)
Cpc classification
A61N1/37254
HUMAN NECESSITIES
H04L9/0819
ELECTRICITY
A61N1/37282
HUMAN NECESSITIES
G16H40/40
PHYSICS
A61N1/37252
HUMAN NECESSITIES
A61N1/37247
HUMAN NECESSITIES
International classification
A61N1/372
HUMAN NECESSITIES
Abstract
A system may include a user device, a clinician programmer and an implantable medical device. A first security protocol may be used to establish a first encrypted communication channel between the clinician programmer and the user device through cloud server(s). The first security protocol may authenticate entities and establish a first key set for encrypting and decrypting messages transmitted within the first encrypted communication channel. The user device and the implantable medical device may be configured to wirelessly communicate with each other through a secure wireless connection. A second security protocol may be used to establish a second encrypted communication channel, by establishing at least a first secret key, at least partially within the first encrypted communication channel. The second encrypted communication channel may extend between the implantable medical device and the clinician programmer. The first encrypted messages wrap the second encrypted messages.
Claims
1. A system configured to communicate via at least one cloud server, comprising: a user device, a clinician programmer, wherein the clinician programmer and the user device are configured to establish, using a first security protocol, a first encrypted communication channel between the clinician programmer and the user device through the at least one cloud server, wherein the first security protocol authenticates entities and establishes a first key set for encrypting and decrypting messages transmitted within the first encrypted communication channel; and an implantable medical device, wherein the user device and the implantable medical device are configured to wirelessly communicate with each other through a secure wireless connection, wherein the implantable medical device and the clinician programmer are configured to establish, using a second security protocol, a second encrypted communication channel at least partially within the first encrypted communication channel, wherein the second encrypted communicated channel is established by establishing at least a first secret key for exchanging encrypted messages, and wherein the second encrypted communication channel extends between implantable medical device and the clinician programmer, wherein the clinician programmer is configured to program the implantable medical device by communicating with the user device using first encrypted messages within the first encrypted communication channel and communicating with the implantable device using encrypted messages within the second encrypted communication channel, the first encrypted messages wrapping the second encrypted messages, wherein the at least one cloud server does not know the first secret key and is unable to decipher messages between the clinician programmer and the implantable device using the first secret key.
2. The system of claim 1, wherein the user device does not know the first secret key and is unable to decipher messages between the clinician programmer and the implantable device using the first secret key.
3. The system of claim 1, wherein: the first secret key is used to exchange encrypted messages within the second encrypted communication channel between the clinician programmer and the user device, the second encrypted communication channel is established by establishing a second secret key used to exchange encrypted messages between the implantable medical device and the user device, and the user device is configured to use the first secret key to decipher messages between the clinician programmer and the implantable medical device, and is further configured to relay the deciphered messages to the implantable medical device using the second secret key.
4. The system of claim 1, wherein the first security protocol includes Transport Layer Security (TLS).
5. The system of claim 1, wherein the user device includes a smart phone or a tablet with a downloadable app configured to communicate over the first encrypted communication channel with the clinical programmer, configured to communicate over the secure wireless connection with the implantable medical device, and configured to relay messages between the implantable medical device and the clinical programmer using the second encrypted communication channel within the first encrypted communication channel.
6. The system of claim 1, wherein the user device includes a remote control programming device configured to communicate over the first encrypted communication channel with the clinical programmer, configured to communicate over the secure wireless connection with the implantable medical device, and configured to relay messages between the implantable medical device and the clinical programmer using the second encrypted communication channel within the first encrypted communication channel.
7. The system of claim 1, wherein the implantable medical device is configured to deliver a therapy.
8. The system of claim 7, wherein the implantable medical device includes a neuromodulator.
9. The system of claim 8, wherein the neuromodulator includes a spinal cord stimulator (SCS), a deep brain stimulator (DBS), a peripheral nerve stimulator (PNS), a peripheral nerve field stimulator (PNFS), or a functional electric stimulator (FES).
10. The system of claim 7, wherein the implantable medical device includes a cardiac stimulator configured to stimulate myocardia.
11. The system of claim 7, wherein the implantable medical device includes at least one sensor configured to sense at least one health-related parameter.
12. The system of claim 1, wherein the secure wireless connection includes inductive near-field communication, a Bluetooth connection, or a wireless local area network.
13. The system of claim 1, wherein the first security protocol uses certificates to authenticate entities.
14. The system of claim 1, wherein the second security protocol authenticates the user device to communicate with the implantable medical device.
15. The system of claim 14, wherein the authentication includes at least one of one or more passwords and two-factor or multi-factor authentication.
16. A method for using a clinician programmer to remotely program an implantable medical device, the method comprising: establishing, using a first security protocol, a first encrypted communication channel between the clinician programmer and a user device through at least one cloud server, wherein the user device is configured to wirelessly communicate with the implantable medical device through a secure wireless connection, wherein the first security protocol authenticates entities and establishes a first key set for encrypting and decrypting messages transmitted within the first encrypted communication channel; establishing, using a second security protocol, a second encrypted communication channel at least partially within the first encrypted communication channel, wherein the second encrypted communication channel extends between implantable medical device and the clinician programmer, wherein the establishing the second encrypted communicated channel includes establishing at least a first secret key for exchanging encrypted messages; and using the clinician programmer to program the implantable medical device by communicating between the clinician programmer and the user device using first encrypted messages within the first encrypted communication channel, and communicating between the clinician programmer and the implantable medical device using second encrypted messages within the second encrypted communication channel, the second encrypted messages being wrapped within the first encrypted messages between the clinician programmer and the user device, wherein the at least one cloud server does not know the first secret key and is unable to decipher messages between the clinician programmer and the implantable device using the first secret key.
17. The method of claim 16, wherein the user device does not know the first secret key and is unable to decipher messages between the clinician programmer and the implantable device using the first secret key.
18. The method of claim 16, wherein: the first secret key is used to exchange encrypted messages within the second encrypted communication channel between the clinician programmer and the user device, the establishing the second encrypted communication channel includes establishing a second secret key used to exchange encrypted messages between the implantable medical device and the user device, and the user device is configured to use the first secret key to decipher messages between the clinician programmer and the implantable medical device, and is further configured to relay the deciphered messages to the implantable medical device using the second secret key.
19. The method of claim 16, wherein the using the clinician programmer to program the implantable medical device includes programming the implantable medical device to deliver a therapy.
20. A method for using a clinician programmer to remotely program an implantable medical device, the method comprising: establishing, using a first security protocol including Transport Layer Security (TLS), a first encrypted communication channel between the clinician programmer and a user device through at least one cloud server, wherein the user device includes a smart phone or a tablet with a downloadable app in the smart phone or the tablet, wherein the user device is configured to wirelessly communicate with the implantable medical device through a secure wireless connection, wherein the secure wireless connection includes inductive near-field communication, a Bluetooth connection, or a wireless local area network, and wherein the first security protocol authenticates entities and establishes a first key set for encrypting and decrypting messages transmitted within the first encrypted communication channel; establishing, using a second security protocol, a second encrypted communication channel at least partially within the first encrypted communication channel, wherein the second encrypted communication channel extends between implantable medical device and the clinician programmer, wherein the establishing the second encrypted communication channel includes establishing at least a first secret key for exchanging encrypted messages; and using the clinician programmer to program the implantable medical device by: encrypting digital data using the second security protocol to create a second encrypted message; encrypting the second encrypted message using the first security protocol to create a first encrypted message; transmitting the first encrypted message to the user device; deciphering the first encrypted message at the user device to obtain the second encrypted message; and using the second encrypted message to program the implantable medical device.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0043] Various embodiments are illustrated by way of example in the figures of the accompanying drawings. Such embodiments are demonstrative and not intended to be exhaustive or exclusive embodiments of the present subject matter.
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
[0055]
[0056]
[0057]
DETAILED DESCRIPTION
[0058] The following detailed description of the present subject matter refers to the accompanying drawings which show, by way of illustration, specific aspects and embodiments in which the present subject matter may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the present subject matter. Other embodiments may be utilized and structural, logical, and electrical changes may be made without departing from the scope of the present subject matter. References to “an”, “one”, or “various” embodiments in this disclosure are not necessarily to the same embodiment, and such references contemplate more than one embodiment. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope is defined only by the appended claims, along with the full scope of legal equivalents to which such claims are entitled.
[0059] Various embodiments of the present subject matter may employ a certificate-based, end-to-end encryption to provide secure communication that prevents devices from sniffing data packets during remote programming sessions or during other remote communication. Clinicians may use an application (e.g., clinician programmer) that communicates with a server (e.g., cloud server) used to relay information between the clinician and the medical device (e.g., stimulator) by way of another device (e.g., user device such as a phone or remote) serving as a “middleman.” More than one cloud server may be used to relay the information. Thus, as will be described in more detail below, the system for remote communication (or more specifically for remote programming by way of example) may include four main communication points, including a clinician application, cloud, a middleman application, and a medical device (e.g., implantable stimulator such as a cardiac stimulator or a neuromodulator). Certificate-based encryption/authentication mechanisms may be implemented to communicate between the user device and the clinician application through the cloud. For example, state-of-the art cryptographic protocols that provide encryption and authentication (e.g., Transport Layer Security (TLS)) may be used to establish secure communication between a clinician application and the cloud and between the cloud and a middleman application. TLS, which evolved from Secure Socket Layers (SSL), is commonly used in secure web browsing as it provides end-to-end security of data transmitted over the Internet between applications. TLS prevents information that is being transmitted from being seen by others. The middleman application may communicate with an implantable medical device over a short-range connection (e.g., a wireless connection such as Bluetooth Low Energy (BLE)) and relay encrypted messages between the clinician application and the implantable medical device. Certificate-based encryption/authentication mechanisms also may be implemented over the short-range connection between the user device and the medical device. According to some embodiments, no middleman layers (e.g., cloud, middleman application) can read or modify programming data exchanged between clinician programmer and the medical device. According to some embodiments, end-to-end encryption may be established between the clinical programmer and the middleman using one key and between middleman and the medical device using another key. A benefit may be significant cost and time savings, since patient reps will no longer have to travel and meet with patients for consultations, and patients will no longer have to travel to a clinic to have their stimulation parameters adjusted.
[0060]
[0061] More particularly,
[0062]
[0063] The therapy delivery device 201 may provide an open-loop therapy or a closed-loop therapy. Sensing circuitry may be configured for use to detect a biological signal for use to provide feedback for the closed-loop therapy. Sensing circuitry may include various components such as an application specific integrated circuit (ASIC), hardware and/or firmware. Sensing circuitry may include software implemented using a processor to further analyze feature(s) of the biological signal. The biological signal may be a measurable signal produced by electrical, chemical or mechanical activity. Examples of electrical signals may include sensing electrical activity in the brain (e.g., EEGs), electrical activity in nerves and muscles (e.g., EMGs), cardiac activity (e.g., ECGs), and other nerve sensing including both non-evoked responses and evoked responses (e.g., evoked compound action potentials (ECAPs) or evoked resonant nerve activity (ERNA)). Examples of mechanical signals may include sounds contractions detected via flex or strain sensors. Examples of chemical signals may include detected analyte concentrations such as glucose and the like. The system may include a feature detector that is configured to detect a plurality of available features of the biological signal. At least one of the features may be used as a closed-loop sensed feature of the biological signal, which may be used by a controller to provide a closed-loop therapy. The closed-loop sensed feature may be compared to a setpoint of that feature, and the difference may be fed into a feedback control algorithm.
[0064] The user device 202 may be a personal device of the user such as the user's smartphone, the user's tablet, or the user's wearable device such as a smart watch. The user may install a downloadable app 205 to be executed on the user device 202 to enable the user device to communicate with the therapy delivery device and to communicate with the remote, clinician programming device 203 through pass-through device(s) (“cloud” 204).
[0065]
[0066] The illustrated monitoring system 301 may include at least one data collection platform 306, an event detector 307, and a data output 308. The data collection platform(s) 306 may be configured to collect healthcare-related data and the data output 308 may be configured to transfer at least some of the collected data through the network(s) 304 to a data receiving system 303, which may include one or more server(s) or other systems remotely located from the patient. Thus, the data transfer may use various network protocols, including cryptographic protocols such as TLS, to communicate and transfer data through one or more networks which may include the Internet. The data collection platform(s) 306 may include at least one processor configured to execute instructions stored in memory (e.g., illustrated as processor(s)/memory) to perform processes to collect and transfer data. The event detector(s) 307 may be configured for detecting event(s), which may be used to determine when data is collected, or the data type/data resolution that is collected. The event detector 307 may detect event(s) using sensor(s), using user input(s), using a timer or clock, using indicator(s) of device usage, patient compliance with data collection and/or therapy, or various combinations thereof. Examples of healthcare data 309 may include patient data, medical device data, patient environmental data, therapy data, or various combinations thereof. The patient data may include objective data such as data collected from physiological sensor(s) and subjective data such as data collected from user-answered question(s) (e.g., “How do you rate your pain?”).
[0067] A monitoring system 301 may include medical device(s), external system(s) or other healthcare related data source(s) configured for use to collect healthcare-related data for transfer to a data receiving system. One or more of the medical device(s), external system(s) or other healthcare-related data source(s) may include technology used by the system to collect data, and thus may form part of the data collection platform. The data collection platform may be on one device or may be distributed among more than one device in the system. The monitoring system may include more than one medical device configured to communicate with each other or to an external system. Examples of medical devices include implantable and wearable devices. The medical device may be configured to only collect data, to only deliver therapy, or to both collect data and deliver therapy. The medical device may include sensor(s) configured for use to collect patient data (e.g., objective patient data). The medical device may be configured to collect and provide medical device data such as device model, configuration, settings, and the like. Thus, the medical device may be configured to collect patient data, medical device data, environmental data, and therapy data such as stimulation settings. Examples of external system(s) include remote controls, programmers, and personal devices such as phones, tablets, smart watches, personal computers, and the like. The external system(s) may include at least one user interface configured for use to receive user input, which may include user answers to questions. The user answers received via the user interface(s) may include subjective patient data (e.g., “How do you rate your pain?” or “Where do you feel pain?”) or objective patient data (e.g., “What is your heart rate?”, “What is your blood pressure?”, or “When did you fall asleep and wake up?”). The external system may be configured to collect medical device data from the medical device. Other healthcare-related data source(s) may include patient data received via a provider's server that stores patient health records. For example, patients may use a patient portal to access their health records such as test results, doctor notes, prescriptions, and the like. Other healthcare-related data sources may include various apps on a patient's phone or other device, or the data on a server accessed by those apps. By way of example and not limitation, this type of data may include heart rate, blood pressure, weight, respiration activity, muscle activity, analyte measurements (e.g., glucose measurements from a continuous glucose monitor), and the like. An app on a phone or patient's device may include or may be configured to access environmental data such as weather data and air quality information or location elevation data such as may be determined using cellular networks and/or a global positioning system (GPS). Weather data may include, but is not limited to, barometric pressure, temperature, sunny or cloud cover, wind speed, and the like.
[0068]
[0069]
[0070] The present subject matter may use a certificate-based, end-to-end encryption to provide secure communication. Certificate-based authentication uses a digital certificate to identify a user, machine, or device before granting access to a resource, network, application, etc. to allow access only to approved users or devices, and prevent unauthorized users or devices. Both parties at the end of a communication link may be required to prove its identity before a connection can be made. Thus, digital certificates may be used to authenticate each device, including the intermediate device(s) in the cloud, used to transmit the communication. When a certificate-providing device provides its digital certificate, another device can verify the certificate with the certificate authority that issued it to confirm that the certificate-providing device is who it says it is. Encryption involves various processes to ensure the messages are unreadable in transit between network nodes for the purpose of providing data security over a shared communication channel. Encryption key(s) are established on the ends (e.g., “applications”) of intended communication channel so that only the applications operating on devices with the encryption key(s) are able to encrypt and decrypt the messages. A handshake process may be used to initiate secure communication between devices. For example, TLS (Transport Layer Security), which uses asymmetric encryption (public/private key), may perform the following in a handshake. A first device (e.g., “client”) may send to a second device (e.g., “server”) a “hello” message, including a string of random bytes and supported cipher suites, and the second device may reply by sending the second device's certificate, the second device's chosen cipher suite, and another random string of bytes. A cipher suite is a set of mathematical operations or algorithms used to establish the secure communication by making the communicated data appear random. The first device can verify the certificate with the certificate authority that issued it to confirm that the second device is who it says it is. The first device may use a public key, obtained from the second device, to encrypt random bytes, and the second device uses a private key to decrypt the random bytes. Both devices can generate session keys from the random bytes, and generated session keys can then be used to provide the encrypted communication.
[0071] The illustration presented in
[0072]
[0073]
[0074]
[0075]
[0076]
[0077]
[0078]
[0079]
[0080]
[0081] The above detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are also referred to herein as “examples.” Such examples may include elements in addition to those shown or described. However, the present inventors also contemplate examples in which only those elements shown or described are provided. Moreover, the present inventors also contemplate examples using combinations or permutations of those elements shown or described.
[0082] Method examples described herein may be machine or computer-implemented at least in part. Some examples may include a computer-readable medium or machine-readable medium encrypted with instructions operable to configure an electronic device to perform methods as described in the above examples. An implementation of such methods may include code, such as microcode, assembly language code, a higher-level language code, or the like. Such code may include computer readable instructions for performing various methods. The code may form portions of computer program products. Further, in an example, the code may be tangibly stored on one or more volatile, non-transitory, or non-volatile tangible computer-readable media, such as during execution or at other times. Examples of these tangible computer-readable media may include, but are not limited to, hard disks, removable magnetic disks or cassettes, removable optical disks (e.g., compact disks and digital video disks), memory cards or sticks, random access memories (RAMs), read only memories (ROMs), and the like.
[0083] The above description is intended to be illustrative, and not restrictive. For example, the above-described examples (or one or more aspects thereof) may be used in combination with each other. Other embodiments may be used, such as by one of ordinary skill in the art upon reviewing the above description. The scope of the invention should be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.