INTERNET OF THINGS DISTRIBUTION SYSTEM AND METHOD OF IMPLEMENTING THE SAME
20240223656 ยท 2024-07-04
Inventors
Cpc classification
H04L67/12
ELECTRICITY
International classification
Abstract
Internet of things distribution system and method is disclosed that utilizes blockchain ledgers. The system has a client-side component with an IoT gateway with a messaging protocol and sensors to collect data from a plurality of IoT devices. The system has access points in communication with the client-side component and a wireless mesh network composed of multiple access points, a backend component in communication with the client-side component and access point via a messaging broker, an analytics module configured to view and analyze the data collected by the sensors, and the ability to deliver the data to an existing server in a format that allows the server to distribute the IoT information in real time. A user device in communication with the backend component is configured to receive the analyzed data from the analytics module is further disclosed herein.
Claims
1. An internet of things (IoT) system comprising: a client-side component comprising an IoT gateway having a messaging protocol and one or more sensors to collect data from a plurality of IoT devices; at least one access point in communication with the client-side component, wherein the access point is connected to a wireless mesh network; a backend component in communication with the client-side component and the access point via a messaging broker comprising: an analytics module configured to view and analyze the IoT data collected by the sensors and further configured to deliver the data to an existing server in a format that allows the server to distribute the IoT data in real time, and one or more database configured to store the analyzed data of the IoT gateway, and a user device in communication with the backend component is configured to receive the analyzed data from the analytics module; wherein the backend component is in communication with a blockchain ledger to create a ledger of IoT data.
2. The system of claim 1, wherein the backend component comprises an active and standby network configuration.
3. The system of claim 2, wherein the active network configuration comprises an active communication device.
4. The system of claim 2, wherein the standby network configuration comprises a standby communication device.
5. The system of claim 1, wherein the database comprises at least two network interface controller (NIC) ports connected to a same virtual network and further comprises an uplink set including uplinks in both interconnects.
6. The system of claim 5, wherein the uplinks in one interconnect and the active communications device are active while the uplinks in the other interconnect, and the standby communications device are on standby and available in the event of a network or interconnect failure.
7. The system of claim 1, wherein the messaging broker is a MQTT messaging broker.
8. The system of claim 1, wherein the messaging protocol is a MQTT messaging protocol.
9. The system of claim 1, wherein the access point is configured to connect with a local network.
10. The system of claim 1, wherein the backend component comprises a load balancer configured to improve the distribution of incoming traffic from the one or more access points to ensure the connection is fast and efficient.
11. The system of claim 3, wherein the active communication device in communication with the user device is configured to view and analyze the information presented in the analytics module and to make real time adjustments to the system.
12. The system of claim 1, is configured to integrate with third party services, third party devices and plugins.
13. The system of claim 1, is implemented utilizing the blockchain ledger o create an undeniable ledger of events on a hyperledger.
14. A method for IoT communication over an aggregate of instrumentalities, the method comprising: receiving one or more input data from a plurality of IoT devices at a client-side component via an IoT gateway including a messaging protocol and one or more sensors; analyzing and organizing the received inputs at a backend component in communication with the client-side component and access point via a messaging broker comprising an analytics module, and delivering the organized input data to an existing server in a format that allows the server to distribute the IoT information in real time to a user device; ledgering IoT data on a blockchain in communication with the backend component.
15. The method of claim 14, wherein the input from the IoT devices is used for real-time analytics and to build empirical data for analysis.
16. The method of claim 14, is configured to integrate with third party services, third party devices and plugins.
17. The method of claim 14, is implemented utilizing the blockchain methodology to create an ledger of events on a hyperledger.
18. The method of claim 14, wherein the client-side component is in communication with one or more access points, wherein the access point is connected to a wireless mesh network composed of multiple access points.
19. The method of claim 14, wherein the messaging broker is a MQTT messaging broker.
20. The method of claim 14, wherein the messaging protocol is a MQTT messaging protocol.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
DETAILED DESCRIPTION OF THE INVENTION
[0039] The present invention is best understood by reference to the detailed figures and description set forth herein.
[0040] Embodiments of the invention are discussed below with reference to the Figures. However, those skilled in the art will readily appreciate that the detailed description given herein with respect to these figures is for explanatory purposes as the invention extends beyond these limited embodiments. For example, it should be appreciated that those skilled in the art will, in light of the teachings of the present invention, recognize a multiplicity of alternate and suitable approaches, depending upon the needs of the particular application, to implement the functionality of any given detail described herein, beyond the particular implementation choices in the following embodiments described are shown. That is, there are numerous modifications and variations of the invention that are too numerous to be listed but that all fit within the scope of the invention. Also, singular words should be read as plural and vice versa and masculine as feminine and vice versa, where appropriate, and alternative embodiments do not necessarily imply that the two are mutually exclusive.
[0041] It is to be further understood that the present invention is not limited to the particular methodology, compounds, materials, manufacturing techniques, uses, and applications, described herein, as these may vary. It is also to be understood that the terminology used herein is used for the purpose of describing particular embodiments only, and is not intended to limit the scope of the present invention. It must be noted that as used herein and in the appended claims, the singular forms a, an, and the include the plural reference unless the context clearly dictates otherwise. Thus, for example, a reference to an element is a reference to one or more elements and includes equivalents thereof known to those skilled in the art. Similarly, for another example, a reference to a step or a means is a reference to one or more steps or means and may include sub-steps and subservient means. All conjunctions used are to be understood in the most inclusive sense possible. Thus, the word or should be understood as having the definition of a logical or rather than that of a logical exclusive or unless the context clearly necessitates otherwise. Structures described herein are to be understood also to refer to functional equivalents of such structures. Language that may be construed to express approximation should be so understood unless the context clearly dictates otherwise.
[0042] As used herein, the term device shall mean any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, originate, switch, route, or utilize any form of information, intelligence, or data for business, scientific, control, entertainment, or other purposes. For example, a device can be a personal computer, a laptop computer, a smart phone, a tablet device, a network server, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price. Furthermore, a device may include processing resources for executing machine-executable code, such as a central processing unit (CPU) or a programmable logic array (PLA), as well as one or more computer-readable media for storing machine-executable code, such as software or data.
Additional components of a device may include one or more storage devices that can store machine-executable code, one or more communications ports for communicating with external devices, and various input and output (I/O) devices, such as a keyboard, a mouse, and a video display.
[0043] As used herein, the term enterprise shall mean an organization that uses computers, such as corporations, small businesses, non-profit institutions, government bodies, and possibly other kinds of organizations.
[0044] As used herein, the term Internet of Things (IoT) gateway is used to refer to any object (e.g., an appliance, a sensor, etc.) that has an addressable interface (e.g., an Internet protocol (IP) address, a Bluetooth identifier (ID), a near-field communication (NFC) ID, etc.) and can transmit information to one or more other devices over a wired or wireless connection. An IoT gateway may have a passive communication interface, such as a quick response code, a radio-frequency identification tag, an NFC tag, or the like, or an active communication interface, such as a modem, a transceiver, a transmitter-receiver, or the like. An IoT gateway can have a particular set of attributes (e.g., a device state or status, such as whether the IoT gateway is on or off, open or closed, idle or active, available for tasks execution or busy, and so on, a cooling or heating function, an environmental monitoring or recording function, a light-emitting function, a sound-emitting function, etc.) that can be embedded in and/or controlled/monitored by a central processing unit (CPU), microprocessor, ASIC, or the like, and configured for connection to an IoT network such as a local ad-hoc network or the Internet. For example, IoT gateways may include, but are not limited to, refrigerators, toasters, ovens, microwaves, freezers, dishwashers, dishes, hand tools, clothes washers, clothes dryers, furnaces, air conditioners, thermostats, televisions, light fixtures, vacuum cleaners, sprinklers, electricity meters, gas meters, medical devices, etc., so long as the devices are equipped with an addressable communications interface for communicating with the IoT network. IoT gateways may also include cell phones, desktop computers, laptop computers, tablet computers, etc. Accordingly, the IoT network may be comprised of a combination of legacy Internet-accessible devices (e.g., laptop or desktop computers, cell phones, etc.) in addition to devices that do not typically have Internet-connectivity (e.g., dishwashers, fridges).
[0045] Referring now to
[0046] Still referring to
[0047] Still referring to
[0048] Still referring to
[0049] Still referring to
[0050] Referring now to
[0051] Referring now to
[0052] Referring now to
[0053] Referring now to
[0054] Still referring to
[0055] Indeed, in today's age of big data, the system and method according to the present invention are configured to manage and connect multiple different software and hardware systems. This is achieved through API's, which are integration touchpoints for connecting multiple systems, however they are weak points of a system and are exposed. The weak points are compensated by Blockchain technology that locks down the API and keeps the architecture of the system safe. All data is hashed and stored in blocks on a chain. This chain makes it easy to see the data flow and identify every user who has or has had access to that specific data. This also allows for advanced analytics for not only the data itself but for its path across the network. With blockchain methodologies, the system and method according to the present invention take control of your data privacy and ensure the right people have access to the required information and prevent others from gaining access.
Example 1
[0056] In operation, the network described herein is useful for a myriad of different vertices. One exemplary vertical is an assisted living home.
[0057] The network discussed above may be integrated as an assisted living resident and staff monitoring platform, providing real time information and alerts to staff, KPI reporting to management, and patient KPI reporting to family members. The network can communicate reliably and securely using hardware capable of operating in critical and emergency situations and utilize Al to intelligently monitor and store patient and staff status over time, trigger appropriate and actionable alerts, and allow for KPI reporting and event replay. The system will integrate with other systems by way of its built-in Enterprise Service Bus (ESB) and is capable of measuring a number of patient parameters and storing those in a database, distilling the data and monitoring in real-time soft or hard alerts to staff as well as provide management-level reporting.
[0058] All communication between IoT devices is handled over the dedicated mesh network to reduce traffic on existing networks and maintain a secure environment. Some variables which may be tracked, distilled, monitored and communicated are as follows: Patient tracking including patient speed, acceleration, and location; Environmental tracking including temperature and humidity; Alert devices including fall alerts and sedentary alerts, and battery life alerts and unauthorized access alerts; and Monitoring wetness for bed wetting or expulsion of bodily fluids as one further example.
[0059] The IoT device will have built in shock resistance to protect from drops and fall, and will also have an accelerometer that will be used to detect falls, as well as monitor body orientation. The IoT device will have a temperature sensor that can track ambient temperature of the device and will also track location of an individual. The IoT device will also have a single button for ease of usability that when pressed, will send information to the database and alert staff through the user interface of the location of the device and the time the message was sent; when pressed, the IoT device will also make a voice connection with a currently on duty staff member. In practice, a staff member would answer the call and initiate the voice communication, wherein the resident and staff member would then have a two-way conversation that will end once the staff member terminates the call. The communication button while be large and easy to press, but not by accident.
[0060] The IoT device will communicate under standard 802.11x protocols (i.e. Security, authentication, transmission, etc.) and will utilize a rechargeable battery that provides power for a minimum of two (2) days under normal operating conditions. The battery will be rechargeable via a USB-C connection. The IoT device will be housed within a case that will be small and discreet, appearing non-medical. The case will be anchored to the user with a removable lanyard and a discrete clip. The IoT device will communicate using WiFi or cellular communication selectively. More specifically, the IoT device must communicate wirelessly and switch communications between WiFi and cellular as it moves in and out of the local network.
[0061] The IoT device must store local data in the event the network is unavailable through WiFi and cellular. Finally, the IoT device will have removable components that are clearly labeled as to allow for easy replacement of any faulty or defective components. For example, the IoT device could be in the form of an incontinence device integrated into a bed that will directly connect to the AP via Bluetooth Low Energy. In this example, IoT device must be able to detect moisture, be easy to clean, sanitize and reuse, and should not be invasive.
[0062] The access point (AP) connects to the wireless mesh network that is comprised of multiple AP devices. The AP will also be able to connect to the local network of the living facility via standard RJ45 network cables. The AP will be designed to operate at the commercial grade operating temperature and will be powered by direct power, either through a standard power jack or Power over Ethernet, with a backup battery in the event of a power failure. The AP will communicate under standard 802.11x protocols (i.e. Security, authentication, transmission, etc.). The AP will be mountable on the wall as well as the ceiling and will track the location of other APs within a defined range inside the assisted living facility. The AP will support a variety of external environmental sensors through an industry standard terminal block. As the market shifts towards the digitization of care delivery and more personalized treatment, a secure and connected healthcare IT ecosystem to manage patient information becomes of paramount importance. Healthcare data is a high value target for theft. With this information, victims could very quickly have their identity stolen. Healthcare organizations are also frequently extorted for money through ransomware. In embodiments of the present invention, the Blockchain powered by the system locks down high value patient data and authenticate its path in every step of treatment. An event, alarm, or trigger on the system according to the present invention has a distinct life cycle 800, as shown in
[0063] In embodiments, devices are assigned to residents or attached to facilities at a residential facility/assisted living/nursing home. At step 802, at the start, an input is received. Event Triggered by Device (STATE=RECEIVED). This step comprises event triggering and event monitoring using the system, which that an event is triggered from these devices whenever an incident occurs. Incidents could be of different types like fall, temperature change, wetness alert and the like, each being classified into critical alerts and warnings. When an event is triggered, the server records the timestamp (device timestamp) of event trigger, received timestamp (server), event type, client id, company id, meta and location information related to an event.
[0064] At step 804 Event Notified to Users Through Different Channels (STATE=OPEN) is implemented once the event is processed and stored, it is dispatched to caretakers/staffs through various channels such as web sockets, SMS, email for sending notifications from staff to patients or staff to staff, or provider to staff.
[0065] At step 806, an event is Accepted/Acknowledged by the User (STATE=ACCEPTED) followed by step 808 (STATUS=ASSIGNED). An event is accepted by an available staff at the facility. Staff who have accepted the event may attend to the incident. Staff who have already accepted another event cannot accept new event until the old event is completed, each being recorded in the blockchain.
[0066] In some instances, staff may decline step 810 which is marked as Event Declined by the User (STATE=DECLINED) followed by (STATE=OPEN) step 804.
[0067] The system is then configured Event Re-assigned to Different User (STATE=REASSIGNED). At any point the user could re-assign an event to a different user. The system is configured to notify the status update to all online caretakers/staffs. If a staff member has accepted an event but is unable attend it, he/she could decline at any time. This would change the state of the event to open. A status update would notify all online caretakers/staffs. Each instance is recorded using Blockchain.
[0068] At step 814, the Event Attended by User (STATE=SERVING). The event in progress represented by a state serving, which demarks the staff attending to the instance.
[0069] At step 816, the Event is marked Completed by Use (STATE=COMPLETED) The completed event could be marked by the staff as completed. False alarm can be reported by staff at this point.
[0070] Each of the events are archived via blockchain; Event Archived (STATE=ARCHIVED) and is stored in a secure archival database.
[0071] Specific configurations and arrangements of the invention, discussed above regarding the accompanying drawing, are for illustrative purposes only. Other configurations and arrangements that are within the purview of a skilled artisan can be made, used, or sold without departing from the spirit and scope of the invention. For example, a reference to an element is a reference to one or more elements and includes equivalents thereof known to those skilled in the art. All conjunctions used are to be understood in the most inclusive sense possible. Thus, the word or should be understood as having the definition of a logical or rather than that of a logical exclusive or unless the context clearly necessitates otherwise. Structures described herein are to be understood also to refer to functional equivalents of such structures.
[0072] While the present invention has been described in connection with what are presently considered to be the most practical and preferred embodiments, it is to be understood that the present invention is not limited to these herein disclosed embodiments. Rather, the present invention is intended to include the various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
[0073] Although specific features of various embodiments of the invention may be shown in some drawings and not in others, this is for convenience only. In accordance with the principles of the invention, the feature(s) of one drawing may be combined with any or all of the features in any of the other drawings. The words including, comprising, having, and with as used herein are to be interpreted broadly and comprehensively, and are not limited to any physical interconnection. Moreover, any embodiments disclosed herein are not to be interpreted as the only possible embodiments. Rather, modifications and other embodiments are intended to be included within the scope of the appended claims.