AUTHENTICATION TO MEDICAL DEVICE VIA MOBILE APPLICATION
20230005592 · 2023-01-05
Assignee
Inventors
Cpc classification
G16H20/40
PHYSICS
G16H10/60
PHYSICS
G06F21/34
PHYSICS
A61M1/14
HUMAN NECESSITIES
A61M2205/3553
HUMAN NECESSITIES
International classification
G16H20/40
PHYSICS
A61M1/28
HUMAN NECESSITIES
Abstract
A medical system, device, and methods are provided having programming to communicate with a mobile device; the medical device further having programming to authenticate the mobile device; the medical device granting access to one or more functions if the mobile device is authenticated.
Claims
1. A medical device, comprising: a medical apparatus; a transceiver; a processor; and a memory wherein instructions are encoded within the memory to instruct the processor to determine that a mobile device has communicatively coupled to the transceiver, to authenticate the mobile device, and to grant access to one or more functions of the medical device if the authentication is successful.
2. The medical device of claim 1, wherein the instructions determine if authentication failed, and denying access to one or more functions of the medical device.
3. The medical device of claim 1, wherein the medical device is a dialysis system.
4. The medical device of claim 1, wherein the medical device is selected from a group consisting of: an insulin pump, a sleep apnea machine, a pulse oximeter, an external neural stimulator, intravenous (IV) equipment, a noninvasive blood pressure measuring device, and a smart thermometer.
5. The medical device of claim 1, wherein authenticating the mobile device comprises two-factor verification.
6. The medical device of claim 1, wherein the transceiver is a short-range wireless transceiver.
7. The medical device of claim 6, the transceiver is selected from a near-field communication (NFC) or Bluetooth low energy (BLE) transceiver.
8. The medical device of claim 1, wherein the one or more functions comprise initiating a dialysis session.
9. The medical device of claim 1, wherein the one or more functions comprise modifying one or more treatment parameters.
10. The medical device of claim 1, wherein the one or more functions comprise access to a function of the medical apparatus.
11-31. (canceled)
32. A method performed by a medical device, comprising: connecting to a mobile device via a transceiver; receiving authentication information from the mobile device; authenticating the mobile device; and providing access to one or more access-controlled functions of the medical device if the mobile device is authenticated.
33. The method of claim 32, wherein connecting to the mobile device comprises connecting wirelessly.
34. The method of claim 32, wherein connecting wirelessly comprises connecting according to a near-field communication (NFC) or Bluetooth low energy (BLE) protocol.
35. The method of claim 32, wherein the medical device is a dialysis system.
36. The method of claim 32, wherein the medical device is selected from a group consisting of: an insulin pump, a sleep apnea machine, a pulse oximeter, an external neural stimulator, and IV equipment.
37. The method of claim 32, wherein the one or more functions comprise initiating a dialysis session.
38. The method of claim 32, wherein the one or more functions comprise modifying one or more treatment parameters.
39. The method of claim 32, wherein the one or more functions comprise accessing a treatment history.
40. The method of claim 32, wherein the one or more functions comprise retrieving one or more patient alerts.
41. The method of claim 32, wherein the one or more functions comprise communicating with a patient associated with the medical device.
42. (canceled)
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0045]
[0046]
[0047]
[0048]
[0049]
DETAILED DESCRIPTION
[0050] Unless defined otherwise, all technical and scientific terms used have the same meaning as commonly understood by one of ordinary skill in the art.
[0051] The articles “a” and “an” are used to refer to one to over one (i.e., to at least one) of the grammatical object of the article. For example, “an element” means one element or over one element.
[0052] The term “authenticate” refers to proving to a device, a system, or a module, to the satisfaction of that device, system, or module, that a person or device is what the person or device purports to be.
[0053] The term “administrative functions” refers to functions of an apparatus that can be used to control the apparatus at a low level, or with little or no restrictions.
[0054] The term “authentication information” refers to any information or data that can be used to verify the identity of a person or a device. Common examples of authentication information include a personal identification number (PIN), a username and password combination, a biometric, or a two-factor authentication.
[0055] The term “Bluetooth low energy (BLE)” refers to a wireless communication protocol that is similar to, but independent of, traditional Bluetooth, that permits devices to communicate over short distances with lower energy. Although BLE is independent of Bluetooth, the two protocols can be supported by a single device, and can use a single antenna.
[0056] The term “certificate authority” refers to a cloud or network-based service that issues cryptographic certificates. A trusted certificate authority is a CA that a device trusts to provide valid certificates and certificate data. This could be a well-known public CA, or a special-purpose or local CA setup for a local network.
[0057] The term “circuit” refers to a network of electrical or electronic devices, which can be programmable or non-programmable. In the case of a programmable circuit, the circuit also includes any logic or instructions that are used to program the circuit.
[0058] The term “cloud service” refers to a service that is provided over a network connection, via a non-local computer.
[0059] A “cryptographic certificate” refers a data structure that can be verified via cryptographic methods. For example, the cryptographic certificate can include a cryptographic key of a pre-determined size, which can be verified via a hash algorithm.
[0060] The term “database” refers to device stored in either a structured or unstructured data storage format.
[0061] The term “dialysis system” refers to any biomedical device that replaces or partially replaces the function of a failed or partially-failed kidney. Dialysis systems can remove urea and other impurities from the blood, and can also remove water and other fluids. Common examples of dialysis include peritoneal dialysis and hemodialysis.
[0062] The term “expiry” refers to a relative or absolute date at which a device or thing expires, or is no longer valid.
[0063] The term “external neural stimulator” refers to an electrical device to stimulate neurons.
[0064] The term “health care professional” refers to any practitioner of the medical arts, including a doctor, a registered nurse, a nurse practitioner, a licensed vocational nurse, or similar.
[0065] The term “insulin pump” refers to any medical device that injects insulin into a patient.
[0066] The term “local database” refers to data stored locally on a device.
[0067] The term “medical device” refers to any electronic device that provides at least one medical function.
[0068] The term “mobile device” refers to any handheld computational device. Common examples of mobile devices include cellular phones, smart phones, tablets, and laptops.
[0069] The term “near-field communication (NFC)” refers to a set of communication protocols and supporting hardware and software that allow devices to communicate in near proximity to one another. Current NFC standards allow devices to communicate over a distance of approximately 4 cm, or 1½ inches.
[0070] The tern “noninvasive blood pressure measuring device” refers to a device to measure a patient's blood pressure that does not require invasive apparatus, such as needles or a large pressure cuff.
[0071] The term “patient alert” refers to a notification that can be provided to a patient or to a healthcare professional, for example via a mobile device, to provide any necessary information for the patient or healthcare professional.
[0072] The term “pulse oximeter” refers to a device that is generally placed on a finger, and that uses pulses of red light to measure the patient's heart rate and oxygen saturation.
[0073] The term “sleep apnea machine” refers to any device that helps to treat or prevent sleep apnea in patients. A common sleep apnea machine is the continuous positive airway pressure (CPAP) device, although other similar devices, such as mechanical devices, can also be used.
[0074] The term “smart thermometer” refers to a device for measuring a patient's temperature that also includes communication or network functionality to communicate or coordinate with a home, clinic, or cloud service.
[0075] The term “stored patient parameters” refers to information about a patient, which can be stored locally or on a separate device.
[0076] The term “transceiver” refers to a circuit that provides transmitter and receiver functionality.
[0077] The term “treatment history” refers to a record containing information about a patient's past treatments, including treatment prescriptions, treatment results, and treatment parameters.
[0078] The term “treatment parameters” refers to any information that is used to configure or direct a prescribed treatment for a patient. Treatment parameters could include, for example, a prescribed blood flow rate, a prescribed treatment regimen, pharmaceuticals to be administered, pressure settings, minimum or maximum blood pressure, alert conditions, dialysis flow rate, sodium prescription, potassium prescription, glucose prescription, ultrafiltration rate, patient dry weight, intravenous device type, indicated intravenous drug, drug dose, drug delivery flow rate, or other information that can affect the administration of a treatment.
[0079] The term “two-factor authentication” refers to any combination of two or more factors that can be used to authenticate a person or a device. A common example of two-factor authentication is a combination of “something you know” (e.g., a password) and “something you have” (e.g., a mobile device, an RFID card, a USB token, a hardware key, a software key, a certificate, or other device or data).
[0080] Medical Device Ecosystem
[0081]
[0082] In any embodiment of the medical device ecosystem 100, a patient 104 operates a medical device such as a hemodialysis or a peritoneal dialysis machine 108, which includes a graphical user interface (GUI) 112. Although
[0083] Entering the various modes can be performed by a username and password combination, a biometric authentication, a key card, or a two-factor authentication, by way of illustrative and nonlimiting example. However, operating on the machine can be inconvenient for patient 104 or others who operate on the machine to carry extra devices for such authentication. On the other hand, individuals can carry a mobile device 105 known to one of ordinary skill such as a smart phone or similar. Because patient 104 may already be carrying mobile device 105, use of mobile device 105 can be convenient for authentication to machine 108. For example, mobile device 105 could have a transceiver, such as a BLE or near-field communication (NFC) transceiver. This transceiver can be used to communicate over short distances. Similarly, machine 108 can also have a BLE or NFC circuit, and could, for example, have a designated spot (designated, for example, by a placard or other visible indicator) for performing authentication. Thus, patient 104 can be able to simply touch mobile device 105 to the designated spot on machine 108, and thereby provide instant authentication. This instant authentication can be facilitated by a mobile application running on mobile device 105, which can be provided, for example, by a vendor of machine 108. This simple one-touch authentication uses a device that patient 104 can already have in his or her possession.
[0084] In any embodiment, the ecosystem 100 can also include a home gateway 120, which connects to various devices on a network. The various devices can provide additional inputs such as blood pressure and other detectable physiological parameters to machine 108. For example, a smart scale 116 could be used to measure the patient's dry weight, and/or the patient's weight after dialysis. Home blood pressure monitor 118 could be used to periodically check the blood pressure of patient 104, and to keep track of blood pressure trends. In some illustrative embodiments, machine 108, smart scale 116, and/or home blood pressure monitor 118 can communicatively couple to home gateway 120, such as via a wired or wireless network. Home gateway 120 can act as a gateway between the home environment and internet 124, which provides a wider and uncontrolled network. A cloud data service 132 can communicatively couple to home gateway 120 via internet 124, and can provide services to patient 104. The home gateway 120 can provide for communication between the home gateway 120 and a cloud data service 132. The cloud data service 132 can have various software modules to connect to the home gateway 120. Notably, the cloud data service 132 can establish a data communication channel with the home gateway 120 through a TCP/IP protocol or other suitable process, where a terminal is connected to the home gateway 120. The home gateway 120 software can send a first software message to the cloud data service 132 through the data communication channel so that the home gateway 120 establishes connection with cloud data service 132. One of ordinary will understand that other suitable connection methods, steps, and protocols can be implemented to establish such connection with an external cloud server. In some cases, clinic 128 can also connect to cloud data service 132 via internet 124, or via an intranet or other internal network. Clinic 128 can provide data such as electronic health records, a treatment prescription, and other inputs as described herein to cloud data service 132. Cloud data service 132 can then use those data to build the pre-trained artificial intelligence (AI) model for use by machine 108.
[0085] Medical Treatment Ecosystem
[0086]
[0087] In one nonlimiting embodiment, the machine 208 can be a hemodialysis or peritoneal dialysis machine. The machine 208 can require authentication for certain modes of operation. For example, machine 208 could provide an administrative mode, in which a system administrator can configure the machine. This can require relatively unrestricted access to machine 208. In a therapy configuration mode, a healthcare professional or an authorized agent can configure machine 208 with the prescribed therapy and treatment parameters. Finally, in a therapy administration mode, patient 204 or healthcare professional 210 can administer the therapy.
[0088] In any embodiment, entering these various modes can be performed by a username and password combination, a biometric authentication, a key card, or a two-factor authentication, by way of illustrative and nonlimiting example. However, operating on the machine can be inconvenient for patient 204, healthcare professional 210, or others who operate on the machine to carry extra devices for such authentication. On the other hand, individuals sometimes carry a mobile device 205, such as a smart phone or similar. Because patient 204 or healthcare professional 210 can already be carrying mobile device 205, use of mobile device 205 can be convenient for authentication to machine 208. For example, mobile device 205 could have a transceiver, such as a BLE or near-field communication (NFC) transceiver. This transceiver can be used to communicate over short distances. Similarly, machine 208 can also have a BLE or NFC circuit, and could, for example, have a designated spot (designated, for example, by a placard or other visible indicator) for performing authentication. Thus, patient 204 or healthcare professional 210 can be able to simply touch mobile device 205 to the designated spot on machine 208, and thereby provide instant authentication. This instant authentication can be facilitated by a mobile application running on mobile device 205, which can be provided, for example, by a vendor of machine 208. This simple one-touch authentication advantageously uses a device that patient 204 or healthcare professional 210 can already have.
[0089] In this example, within the clinic there can be an enterprise gateway 220, which provides connectivity between various devices. Similar to
[0090] In embodiments, devices can be enrolled by the health care provider, and can be associated with individual users, such as patient 204 or healthcare professional 210. Enterprise gateway 220 can provide (or communicate with) a cloud service, which optionally can maintain communicative contact with machine 208. This allows the healthcare provider to enroll, revoke, authorize, or otherwise manage authorized users and devices. This is different from, for example, a more traditional consumer solution where the end user “owns” his or her own credentials.
[0091] Enrollment can authorize the patient 204 or healthcare professional 210 to use a particular device for therapy, as well as authorizing individual users (via their associated mobile devices) to perform given functions. For example, patient 204 can be authorized to administer (including self-administer) treatment via an authorized device 208, whereas healthcare professionals 210 or administrators can be authorized to perform other functions, as further illustrated in connection with
[0092] In any embodiment, device 205 can also help prevent medical errors, by ensuring that the correct patient is being treated. For example, healthcare professional 210 can go through discrete or separate enrollments on a per-patient basis. Authentication can then include healthcare professional 210 accessing a particular patient-specific screen or mode within mobile device 205, tablet of any other suitable hand-held device. This can be done, for example, by using a camera or infrared scanner to scan a bar code on a wrist band worn by patient 204. This can place mobile device 205 in a mode where providing an authentication code that is specific to the combination of patient 204 and medical professional 210. When machine 208 authenticates mobile device 205, device 205 can thus authenticate not only healthcare professional 210, but can also provide a contextual authentication that is unique to the treatment context (e.g., unique to the patient being treated). Device 205 can then ensure that it has a profile loaded for patient 204, and that healthcare professional 210 is authorized to treat patient 204 on machine 208. This can be superior to a more generic authentication that merely determines that healthcare professional 210 is authorized to use machine 208.
[0093] Authentication Via Mobile Device
[0094]
[0095] In block 308, the user authenticates to the application. For example, the application can require the user to enter a password or a PIN, or to provide another authentication. In common usage, many mobile devices have fingerprint scanners, and users are able to unlock banking, password, and other secure applications by simply placing a finger or thumb on the fingerprint scanner of the mobile device. Thus, the mobile device could use a similar fingerprint scanning technology, thus allowing the user to authenticate to the application using a very natural and common gesture that the user is already familiar with.
[0096] In block 312, once the user has authenticated to the application, the user enters a home screen for the application. The home screen for the application could include various fields, such as a physician information field 316, a treatment and scheduling field 336, or (in
[0097] Physician information field 316 provides access to various physician-related functions. For example, in block 320, the user can be able to view physician information. This can include, for example, the physician's name, phone number, location, links to a map for the clinic, or other information about the physician.
[0098] Block 324 provides a facility to message or otherwise contact the physician. Thus, if the patient has questions, or needs to otherwise communicate, the user could operate this control to get in touch with the physician.
[0099] Block 328 is a control that allows the patient to schedule a visit or videoconference with the physician. This can be useful, for example, if the patient has questions, or feels that additional clarification is necessary. This could also be used if the patient believes that there can be a need to update a prescription, or otherwise interact directly with the physician.
[0100] In block 332, there is a control provided to document newly discovered healthcare issues. For example, if the patient has had an adverse reaction to a treatment or to a drug, or has experienced new symptoms, the patient can notify the attending physician.
[0101] Block 336 represents the treatment and scheduling field of the user interface. Within block 336, in block 340, the user can view treatment history. For example, the user could view a graph of past treatments, the results of treatments, and the dates, times, or other information about treatments.
[0102] In block 348, the patient can view treatment information. This could include, for example, the prescribed treatment, the length of treatment, therapies administered, pharmaceuticals used, or other information.
[0103] In block 352, the patient can view and adjust an upcoming schedule. For example, the patient can view when treatments are to happen, and if there is a conflict, the patient can be able to suggest a replacement time for that treatment.
[0104] In block 356, the patient can create or modify treatment reminders. For example, if the patient wants to be reminded 30 minutes before each treatment, the user can set an alert, which can be provided via a known and existing alert application programming interface (API) for the mobile device.
[0105] In block 360, the user can also create restocking reminders. For example, if the medical device has consumables, the patient can need to remember to order restocking of these consumable supplies. Thus, the application can use an existing reminder architecture or API within the mobile device to create reminders for the patient.
[0106] Turning to
[0107] In block 372, the patient can review machine information, such as the device serial number, the device model number, the manufacturer, the state of consumables, and other information about the device.
[0108] In block 368, the patient can operate a control to get the BLE/NFC certification for the machine. This control can be the control used for the actual authentication to the device, and can be used to initiate communication. In one example, the mobile application includes a certificate or other security key that can be used to cryptographically verify the identity of the mobile device. Following off-page connector 2, this certificate or security key can be provided via a technology such as BLE or NFC to the medical device for authentication of the mobile device, and consequently, authentication of the operator of the mobile device.
[0109] Biomedical Device Authentication
[0110]
[0111] In block 404, the patient can obtain a mobile device with the installed application. This mobile device could be configured to perform method 300 of
[0112] In block 408, the user turns on the biomedical device that is to administer the treatment. In block 412, the user encounters the login screen for the device. As described above, this login screen could provide a traditional login mechanism, such as a username and password combination. Similarly, this login screen could expect an RFID key card, or a USB hardware token. However, as described above, such login mechanisms can be relatively cumbersome and can require inconvenient interactions from the user. Use of a properly configured mobile device for authentication can be preferable, as illustrated by following off-page connector 1 from
[0113] In block 416, the user taps the mobile device against the NFC authenticator on the machine. As described above, this NFC authenticator could be indicated by a placard, an icon, or some other visual indicator representing the spot where the NFC or BLE authentication can take place. The user taps the mobile device against this spot, and the authentication proceeds. The medical device can then open an NFC or BLE session with the mobile device, and establish communication. Once the two devices have established, for example, a secure link, the medical device can retrieve from the mobile device the appropriate key or security token to authenticate. The medical device then cryptographically verifies this key or token, for example, using a previously provisioned certificate on the medical device.
[0114] In decision block 420, the medical device determines whether authentication was successful, and if so, in block 490, access is granted.
[0115] If authentication was unsuccessful, then this could mean that the device is an unauthorized device, and there will be no authentication. Alternatively, it's possible that the device is authentic, but that some other issue has prevented authentication. Thus, in block 424, the user can verify the user credentials, and in block 428, the user can verify that the NFC transceiver for the mobile device is turned on. After performing these checks, the user can again attempt authentication in block 416.
[0116]
[0117] In this illustrative example, medical device 502 includes a processor 504 and a memory 508. Processor 504 and memory 508 together provide a hardware platform on which software can run. This can include software for authenticating the user, for controlling and configuring the device, for controlling access to the device, for providing a plurality of modes, and for performing other functions.
[0118] Medical device 502 includes a medical apparatus 512, which provides a medical function such as, by way of illustrative and nonlimiting example, a dialysis machine, an insulin pump, a sleep apnea machine, a pulse oximeter, an external neural simulator, and intravenous device, a noninvasive blood measurement device, a smart thermometer, or other home healthcare or clinic-based medical apparatus.
[0119] Network circuit 520 provides the hardware, software, and/or firmware to communicatively couple medical device 502 to a network 540. Network circuit 520 could provide a wired network such as an ethernet, a wireless network such as WiFi, or some other communication protocol such as USB, FireWire, or other.
[0120] Medical device 502 includes a transceiver 516, which can provide local communication via for example WiFi, RF, BTLE, or other. Transceiver 516 enables medical device 502 to make a local connection 518 to mobile device 522.
[0121] Mole device 522 includes a processor 532 and memory 536, which can be used to provide a hardware platform for executing software. A transceiver 524 allows mobile device 522 to make a local connection 518 to transceiver 516 of medical device 502. Mobile device 522 includes a network circuit 528, which allows mobile device 522 to communicatively couple to network 540.
[0122] In some cases, cloud service 544 provides centralized credentials for users, including their associated mobile devices such as mobile device 522. Cloud service 544 can push authentication data to medical device 502, including providing definitions for a plurality of modes. When a user uses mobile device 522 to authenticate to medical device 502, medical device 502 can authenticate the mobile device, and then grant access to one or more functions of the medical device if authentication is successful. The one or more functions could include, by way of illustrative and nonlimiting example, initiating a dialysis session, modifying treatment parameters, accessing a function of the medical apparatus, accessing administrative functions of the medical device, accessing a treatment history, retrieving one or more patient alerts, communicating with the patient associated with medical device, communicating with the healthcare professional, or configuring device settings.
[0123] Alternatively, if authentication fails, then medical device 502 can deny access to the one or more functions of the medical device.
[0124] In some embodiments, medical device 502 can determine that mobile device 522 is associated with a patient of the medical apparatus, and can retrieve one or more stored treatment parameters for the patient. The treatment parameters can include, by way of illustrative and nonlimiting example, treatment time, blood flow rate, dialysis flow rate, sodium prescription, bicarbonate prescription, magnesium prescription, calcium prescription, potassium prescription, glucose prescription, ultrafiltration rate, and/or patient dry weight. For an intravenous device, the parameters could include, for example, intravenous device type, indicated intravenous drug, drug dose, and drug delivery flow rate.
[0125] Medical device 502 could retrieve these parameters from a local database, or could query cloud service 544 for the treatment parameters. In another embodiment, particularly if medical device 502 lacks always-on network connectivity, medical device 502 could query mobile device 522 via local connection 518 for the parameters. Mobile device 522 could retrieve the treatment parameters from a local database, or from cloud service 544.
[0126] Authentication via mobile device 522 can be managed by cloud service 544, and also via CA 538. Certificate authority (CA) 538 can be any trusted certificate authority, which could be a well-known certificate authority that is publicly trusted, or a CA that has established a private trust with cloud service 544, such as a certificate authority operated by cloud service 544 specifically for the benefit of medical device 502 or a class of medical devices similar to medical device 502.
[0127] Cloud service 544 can instruct medical device 502 to authorize certain mobile devices, or to not authorize other mobile devices. This authorization could include an expiry, which can in some cases be enforced by a certificate with its own expiry. For example, CA 538 can issue a certificate to mobile device 522, which certificate can have an expiration date. CA 538 can also issue validation data to medical device 502, such as information necessary to authenticate the certificate provided by mobile device 522. Thus, when mobile device 522 authenticates to medical device 502, mobile device 522 can be authenticated only after providing a valid certificate and the certificate has not expired. Furthermore, cloud service 544 can define an authorized access level associated with mobile device 522, or more particularly for a user associated with mobile device 522. For example, if mobile device 522 is owned by an administrative user, then cloud service 544 can instruct mobile device 502 via network 540 to authorize administrative access after medical device 502 has authenticated mobile device 522. Because such administrative access can be both powerful and dangerous, the authorization can include an expiration date.
[0128] In some cases, medical device 502 can receive authorization credentials from cloud service 544, and store a local database of authorized users or devices, including authorized access levels for those authorized users and devices. Furthermore, medical device 502 can receive from cloud service 544 instructions to revoke authorization of a mobile device, and thereafter cease authenticated authenticating the revoked mobile device.
[0129] One skilled in the art will understand that various combinations and/or modifications and variations can be made in the described systems and methods depending upon the specific needs for operation. Various aspects disclosed herein can be combined in different combinations than the combinations specifically presented in the description and accompanying drawings. Moreover, features illustrated or described as being part of an aspect of the disclosure can be used in the aspect of the disclosure, either alone or in combination, or follow a preferred arrangement of one or more of the described elements. Depending on the example, certain acts or events of any of the processes or methods described herein can be performed in a different sequence, can be added, merged, or left out altogether (e.g., certain described acts or events may not be necessary to carry out the techniques). In addition, while certain aspects of this disclosure are described as performed by a single module or unit for purposes of clarity, the techniques of this disclosure can be performed by a combination of units or modules associated with, for example, a device.