Field update of an ambulatory infusion pump system

Information

  • Patent Grant
  • 9895491
  • Patent Number
    9,895,491
  • Date Filed
    Thursday, January 14, 2016
    8 years ago
  • Date Issued
    Tuesday, February 20, 2018
    6 years ago
  • Inventors
  • Original Assignees
    • Tandem Diabeters Care, Inc. (San Diego, CA, US)
  • Examiners
    • Dao; Thuy
    Agents
    • Patterson Thuente Pedersen, P.A.
Abstract
Portable or ambulatory infusion devices and systems capable of remotely updating an ambulatory fluid delivery device include safety protocols that verify the status of the ambulatory fluid delivery device before and after a field update of software. Methods of accomplishing the same field update of software are also described.
Description
FIELD OF THE INVENTION

The present invention is directed to the remote updating of information and data within portable medical devices, such as infusion devices and related systems, including methods of performing such updates. In some cases, the devices and systems may be used for infusing a medicament, including fluid medicaments such as insulin, into a patient.


BACKGROUND

As the number of patients who are treated with ambulatory medical devices increases, so does the need for a facile and reliable way to update and verify the operation of such systems. Examples of ambulatory medical devices include, e.g., cardiac pacemakers, cardioverter defibrillators, neurostimulators (for treatment of, e.g., Parkinson's Disease, epilepsy, and for pain management) and fluid infusion pumps, such as those for the treatment of chronic conditions such as diabetes. In the case of non-implantable devices such as ambulatory infusion pumps, requesting that a patient send his or her pump to a servicing facility may leave the patient without the same level of care while the pump software, for example, is updated and may become costly when numerous pumps need to be updated. Likewise, sending a skilled service provider such as a field service representative (typically from the device manufacturer) to a user's location to update the software on a pump may be efficient when dealing with a convenient number of pumps in a relatively small location. However, as the number of ambulatory infusion pumps in the field increases, and their usage becomes more wide-spread, administering software updates through visits by a skilled service provider may become cumbersome, time-consuming and costly. Additionally, setting aside the time to meet with a skilled service provider may deter some patients from updating the software on their ambulatory infusion pump.


SUMMARY

Provided herein is an ambulatory fluid device that includes a user interface, a liquid drug repository, a pump, an electrical controller, a digital storage component, and a signal processing component. The user interface of the ambulatory fluid delivery device is one which a user operates to input directions and data that determine the dosing of a medicament to a patient. The liquid drug repository contains the medicament. The pump is fluidly connected to the liquid drug repository and configured to prevent accidental release of the medicament from the drug repository, and the electrical controller is configured to direct the pump to release the medicament according to a dosing profile and additional instructions from the user interface. The digital storage component is operably connected to the electrical controller and is configured to store, for example, data regarding the administered doses, device history logs of the fluid delivery device, the operating system of the fluid delivery device, user profile information and identifying information regarding the fluid delivery device and safety protocols for the fluid delivery device. The signal processing component sends and receives electrical data to and from the controller. The fluid delivery device can be configured to receive software updates sent from a qualified source, verify the appropriateness of the software updates for the fluid delivery device based upon the identifying information and device history logs, automatically install the software updates, update the device history logs and perform tests conforming to the safety protocols after installation of the software.


In various embodiments, the software updates may be received after the user requests the software update or may be automatically received by the ambulatory fluid delivery device. The software updates may be only installed after verifying that the ambulatory fluid delivery device is in a safe condition for update. In some such embodiments, the safe condition for update may include not currently administering the medicament, not being attached to the patient, the liquid drug repository not being in fluid communication with the patient, not containing any medicament, or any combination thereof. In some embodiments, the ambulatory fluid delivery device may further include an alarm system that indicates at least one of the start and the finish of the software update installation. In various embodiments, the signal processing component may include a wireless connection means for sending in receiving digital signals, a physical port for connecting cables to a computer or other device, or both a wireless connection means and a physical port. The ambulatory fluid delivery device can be configured to display interactive verification tests on the user interface prior to installing the software updates. In such devices, the verification tests can include tests to verify proximity to a source of the software updates, the willingness of the user to initiate the software updates, or both.


In a related aspect, a system for safely administering a medication to a patient that includes the ambulatory fluid delivery device described above and a central computing system is provided. The central computing system can exchange data, instructions, or both data and instructions, with the ambulatory fluid delivery device.


In various embodiments, the central computing system may exchange data that includes the device history logs of the ambulatory fluid delivery device, a patient basal medication dosage profile, patient information, or any combination thereof. The central computing system may verify the condition of the ambulatory fluid delivery device prior to sending software updates. In such embodiments, verifying the condition of the ambulatory fluid delivery device may include examining the device history logs for irregular device performance, retrieving the current status of the ambulatory fluid delivery device to ensure that it is in a safe configuration for update, verifying the amount of digital memory and other computing hardware parameters are suitable for the software updates, confirming that the software updates and existing software currently operating on the ambulatory fluid delivery device are compatible, or any combination thereof.


In some embodiments the system can further include a remote controller that communicates between the ambulatory fluid delivery device and the central computing system, a sensor system that communicates with the ambulatory fluid delivery device, the central computing system, or both the ambulatory fluid delivery device and the central computing system, an intermediate computing device that communicates between the ambulatory fluid delivery device and the central computing system, or any combination thereof. In such embodiments, the remote controller may include a dedicated hand-held remote controlling device, a second ambulatory fluid delivery device, a portable computing device that is configured to communicate wirelessly with the ambulatory fluid delivery device, or any combination thereof.


In embodiments of the system that include a sensor system, the sensor system may include a continuous glucose monitoring system, a patient temperature monitoring system, a blood oxygen saturation monitoring system, a heart rate monitoring system, a blood pressure monitoring system, a patient activity monitoring system or any combination thereof. In embodiments of the system that include the intermediate computing device, the intermediate computing device may include a hand-held computing device, comprising a tablet, a personal digital assistant, a mobile phone, or any combination thereof, a desktop computer or a laptop computer. In various embodiments, the intermediate computing device can be a computing device configured to exchange data with the ambulatory fluid delivery device through a wireless connection and with the central computing system through the internet via a wired connection, a computing device configured to exchange data with the ambulatory fluid delivery device through a wireless connection and with the central computing system through a wireless connection comprising Wi-Fi, a cellular phone signal, or both, a computing device configured to exchange data with the ambulatory fluid delivery device and with the central computing system both via a wired connection, a computing device configured to exchange data with the ambulatory fluid delivery device through a wired connection and with the central computing system through the internet via a wireless connection comprising Wi-Fi, a mobile phone signal, or both, or any combination thereof.


In another embodiment, a method for remotely updating software on an ambulatory fluid deliver device is presented. The method can include interrogating the ambulatory fluid delivery device and obtaining data comprising a device history log from a central computing system. The method can also include the central computer system verifying that the ambulatory fluid delivery device has not exhibited unusual performance within a certain time period, verifying that the ambulatory fluid delivery device is compatible with a software update, verifying that a user of the ambulatory fluid delivery device wishes to update software on the ambulatory fluid delivery device, or any combination thereof. Additionally, the method can include sending the software update from the central computing system to the ambulatory fluid delivery device, confirming that the ambulatory fluid delivery device is in a safe condition for update, confirming that existing data on the ambulatory fluid delivery device is duplicated, performing the software update on the ambulatory fluid delivery device, verifying that the ambulatory fluid delivery device in is a safe condition for performance testing and that it performs as intended after the software update, and confirming that the duplicated, existing data on the ambulatory fluid delivery device is appropriately present on the ambulatory fluid delivery device.


In various embodiments, the method may further include prompting the user to configure the ambulatory fluid delivery device for regular operation. In such methods, regular operation may include the administration of one or more medications to a patient. A safe condition for update may include not currently administering a medicament, not being attached to a patient, a liquid drug repository not being in fluid communication with the patient, not containing any medicament, or any combination thereof. A safe condition for performance testing may include not currently administering a medicament, not being attached to a patient, a liquid drug repository not being in fluid communication with the patient, not containing any medicament, or any combination thereof.


In such embodiments, verifying that the ambulatory fluid delivery device performs as intended may include verifying the ability to dispense one or more medicaments, verifying the ability to update a device history log, verifying the ability of the ambulatory fluid delivery device to accept sensor data to influence medicament dosing, verifying the ability of the ambulatory fluid delivery device to repeatedly and safely perform dispensing actions or any combination thereof. Verifying that the ambulatory fluid delivery device has not exhibited unusual performance within a certain time period may include verifying the absence of error messages in the device history logs, examining the device history logs for unusual trends in deviation of actual dosage from intended dosage, or both. In some embodiments, verifying that the ambulatory fluid delivery device is compatible with a software update may include verifying the memory capacity of the ambulatory fluid delivery device, confirming that the model of the ambulatory fluid delivery device is compatible with the software update, or both. In some embodiments of the method, verifying that a user of the ambulatory fluid delivery device wishes to update software on the ambulatory fluid delivery device may include presenting the user with a message and accepting user input via a user interface on the ambulatory fluid delivery device, presenting the user with a message via a remote control and accepting user input via the remote control or via a user interface on the ambulatory fluid delivery device, presenting the user with a message via an external computing device and accepting user input via the external computing device or via a user interface on the ambulatory fluid delivery device; or any combination thereof.


In some embodiments, a method for remotely providing a software update for an ambulatory fluid delivery device is presented. The method can include interrogating the ambulatory fluid delivery device and obtaining data comprising a device history logs from a central computer system. The method can also include verifying that the ambulatory fluid delivery device has not exhibited unusual performance within a certain time period, verifying that the ambulatory fluid delivery device is compatible with a software update, verifying that a user of the ambulatory fluid delivery device wishes to update software on the ambulatory fluid delivery device, or any combination thereof. Additionally, the method can include sending the software update from the central computing system to the ambulatory fluid delivery device, confirming that the ambulatory fluid delivery device is in a safe condition for update, confirming that existing data on the ambulatory fluid delivery device is duplicated, receiving confirmation on the central computing system that the software update has occurred on the ambulatory fluid delivery device, receiving information verifying that the ambulatory fluid delivery device in is a safe condition for performance testing and that it performs as intended after the software update and receiving confirmation on the central computing system that the duplicated, existing data on the ambulatory delivery device is appropriately present on the ambulatory fluid delivery device.


Some embodiments include a method for remotely performing a software update on an ambulatory fluid delivery device. This method can include, in response to an interrogation from a central computing system, sending data comprising device history logs to the central computing system. The method can also include receiving confirmation from the central computing system that the ambulatory fluid delivery device has not exhibited unusual performance within a certain time period, that the ambulatory fluid delivery device is compatible with the software update, that a user of the ambulatory fluid delivery device wishes to update software on the ambulatory fluid delivery device, or any combination thereof. Additionally, the method can include receiving the software update from the central computing system on the ambulatory fluid delivery device, confirming that the ambulatory fluid delivery device is in a safe condition for update via user input, sending existing data on the ambulatory fluid delivery device to the central computing system for duplication, sending confirmation from the ambulatory fluid delivery device that the software update has occurred on the ambulatory fluid delivery device, sending information from the ambulatory fluid delivery device verifying that the ambulatory fluid delivery device in is a safe condition for performance testing and that it performs as intended after the software update, and sending confirmation to the central computing system that the duplicated, existing data on the ambulatory fluid delivery device is appropriately present on the ambulatory fluid delivery device after the software update. Certain embodiments are described further in the following description, examples, claims and drawings. These features of embodiments will become more apparent from the following detailed description when taken in conjunction with the accompanying exemplary drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a schematic of an exemplary system for safely performing software updates on an ambulatory fluid delivery device such as an ambulatory infusion pump.



FIG. 2 depicts a schematic of an exemplary sensor system.



FIG. 3 is a schematic view of an interior of an exemplary ambulatory fluid delivery device such as an infusion pump.





The drawings illustrate embodiments of the technology and are not limiting. For clarity and ease of illustration, the drawings may not be made to scale and, in some instances, various aspects may be shown exaggerated or enlarged to facilitate an understanding of particular embodiments.


DETAILED DESCRIPTION

Methods are described for updating an ambulatory medical device, including a portable fluid delivery device such as an infusion pump. The methods include, e.g., verification of the status of the ambulatory fluid delivery device or pump before and after the software update to decrease the likelihood of any unwanted or unintentional delivery of medicament or other errors of malfunctions.


Software Update System for an Ambulatory Medical Device



FIG. 1 shows a schematic of an exemplary system embodiment 200 for safely performing software updates on an ambulatory fluid delivery device, or pump 210. The system 200 includes an ambulatory fluid delivery device 210 that can administer medicament to a patient 205. The system 200 further includes a sensor system 230 coupled to the patient 205. The sensor system 230 may or may not be part of the ambulatory fluid delivery device or pump 210, and may provide data to the pump 210, or to a central computing system 220 independently, or both.


The fluid delivery device 210 and/or the sensor system 230 can be configured to communicate directly or indirectly (such as via an intermediary computing device 240) with a central computing system 220 that is accessible by a caregiver 260, such as a physician, nurse, etc. The caregiver 260 can access patient data from the central computing system 220, the patient data being obtained from the fluid delivery device 210. In some cases, the caregiver 260 may react to the patient data by interacting directly with the patient 200.


Examples of the types of software updates that may be performed include updates to the fluid delivery device's operating system, the firm ware, the communications protocols, the data encryption algorithms, the user interface, the device log, the device history record, and the like. For the purposes of the present disclosure, the term “software updates” may also include installation of the new software on the fluid delivery device and the removal of software from the fluid delivery device.


Software updates may be initiated by a user, such as a caregiver or a patient, by the fluid delivery device manufacturer or its representative, by the central computing system, or any combination thereof. The caregiver 260, if, e.g., properly prompted by the manufacturer of the pump 210, for instance, may cause the central computing system to provide software updates to the fluid delivery device 210 and/or provide care instructions to the fluid delivery device 210. Also, another entity, such as a manufacturer, authorized repair organization, distributor, or the like, may direct the central computing system 220 to provide software updates to the ambulatory fluid delivery device 210, either automatically as needed or upon prompting a user. Software updates may also be initiated automatically when the fluid delivery device 210 connects to an intermediary computing device 240 that is, in turn, connected to the central computing system 220. When an action, such as connecting the fluid delivery device 210 to an intermediary computing device 240, or an entity other than the patient initiates a software update, the fluid delivery device 210 may require input from the patient or a user before fully executing the software update.



FIG. 2 shows a schematic diagram of the sensor system 230, which may include a patient status sensor 232, such as a glucose monitor. The sensor system 230 may also include components that permit the sensor system to communicate with the central computing system 220, such as a patient sensor receiver 234, and a sensor system server 236. Systems that may be part of the sensor systems 230 include, for example, a continuous glucose monitoring system; a patient temperature monitoring system; a blood oxygen saturation monitoring system; a heart rate monitoring system; a blood pressure monitoring system; a patient activity monitoring system; and the like. In addition to sensor systems related to the status of a patient, sensor systems that indicate the status of the ambulatory fluid delivery device may be present. Such sensors may indicate, for example, whether a medicament-containing cartridge is inserted into the ambulatory fluid delivery device, whether infusion lines are connected to a patient, the amount of medicament within the ambulatory fluid delivery device, the operational status of the systems and/or subsystems of the fluid delivery device, including but not limited to the hardware and/or software thereof, and the like.


The fluid delivery device 210 and sensor system 230 are configured to exchange the patient data with one another and with the central computing system 220. The type of patient data may vary and may include patient status data, such as glucose levels, heart rate, temperature, blood pressure, activity level; as well as delivered medicament data; insulin on board; and personal data (appropriately de-identified for privacy requirements, as necessary) such as patient name, sex, age, weight, and the like. The data exchange can occur directly between the fluid delivery device 210 and the computing system 220 or can occur between the sensor system 230 and the computing system 220. The patient data can be used to confirm that any contact between the ambulatory fluid delivery device 210 and the central computing system 220 is appropriate and that a software update from the central computing system to the fluid delivery device may be completed safely, as described further below.


Communication between the components of the system 200 may vary and may include wireless or wired connections and may occur over the Internet. Wireless communication may include any suitable wireless system, such as Bluetooth, Wi-Fi, radio frequency, Zigbee communication protocols, infrared or other optical systems, mobile phone systems, and the like. Wired connections can include telephone line connections, RS22 connection, standard USB and micro-USB connections, firewire connections, proprietary connections, or any other suitable type of wired connection.


Additionally, communication between and/or among the ambulatory fluid delivery device 210, sensor system 230 and central computing system 220 may be direct or it may be through another device, such as a remote controller or an intermediary computing device 240. A remote controller may include a dedicated hand-held remote controlling device, a second ambulatory fluid delivery device, a portable computing device that is configured to communicate wirelessly with the ambulatory fluid delivery device, monitors such as blood glucose monitors (including continuous blood glucose monitors), other suitable devices that allow a user to send instructions to the ambulatory fluid delivery device, or any combination thereof.


The intermediary computing device 240 may include, for example: a hand-held computing device, such as a tablet, a personal digital assistant, a mobile phone, phone, smartphone, personal digital assistant (PDA), a desktop computer, a laptop computer, and the like. The intermediary computing device may be configured to exchange data with the ambulatory fluid delivery device 210 through a wireless connection (including optical) and with the central computing system 220 through the internet via a wired connection. Alternatively, the intermediary computing device 240 may be configured to exchange data with the ambulatory fluid delivery device 210 through a wireless connection and with the central computing system 220 through a wireless connection comprising Wi-Fi, a mobile phone signal, or both. In other instances, the intermediary computing device 240 may be configured to exchange data with the ambulatory fluid delivery device 210 and with the central computing system 220 both through via a wired connection, or the intermediary computing device may 240 be configured to exchange data with the ambulatory fluid delivery device 210 through a wired connection and with the central computing system 220 through the internet or other network via a wireless connection comprising Wi-Fi, a mobile phone signal, or both. The inclusion of another device may allow for a smaller ambulatory fluid delivery device or for the inclusion of another device in the system, such as a sensor system.


The software update may include updates to the operating system, the firm ware, the communications protocols, the data encryption algorithms, the user interface, the device history logs, the device history record, and the like, of the fluid delivery device, as mentioned above. The software update may affect the power usage of the fluid delivery device. Additionally, the software update may improve the communications between the fluid delivery device and any of: the central computing system, sensory systems, intermediary computing device, and the patient. Improvement of communications may include establishing more secure signal pathways, creating quicker signal exchanges, or making messages more concise and understandable by the patient. Software updates may also coincide with hardware updates to the fluid delivery device, including changes to a disposable component of the fluid delivery device, such as a fluid-containing cartridge.


Verification of Ambulatory Fluid Delivery Device Status and Performance


Before and/or after a software update from the central computing system 220 to the fluid delivery device 210 is performed, at least a portion of the system 200 verifies the status of the ambulatory fluid delivery device 210 such as to verify that the ambulatory fluid delivery device 210 is in a proper operational state such that the pump will not harm the patient or otherwise malfunction or present problems as a result of a software update. A proper operational state may include one in which the device history logs indicate that the fluid delivery device 210 has not had deviations from expected performance, such as from expected dosage rates, for a threshold amount of time. It may be that the expected performance may be required to be maintained for the past week, the past month, or the past several months to be considered a proper operational state. The proper operational state may also include a requisite level of charge to be present in a battery or power level to be available from a power source. Free, unobstructed movement of parts of the fluid delivery device may also be required in order for the proper operational state to exist, and certain levels of performance may also be required from the memory, user interface, communications components, sensory systems, and the like in order for the fluid delivery device to be in the proper operational state.


The ambulatory fluid delivery 210 device participates in verification by sending patient data to the central computing system 220. The patient data helps to determine the suitability of the software update for the fluid delivery device 210 and may include, for example, the device history logs of the fluid delivery device, data regarding the administered doses, the operating system of ambulatory fluid delivery device, user profile information, and any other data that may be used determine whether the ambulatory fluid delivery device is suitable for the proposed software update.


The central computing system sends requests for data both before and after the software update, as well as sending the software update, when the system determines that the software update is compatible with the intended ambulatory fluid delivery device. Both the central computing system 220 and the ambulatory fluid delivery device 210 can verify that communication regarding the software update is occurring with a qualified source before transmitting the verification information described above. To verify that communication is occurring with a qualified source, the central computing system 220 can verify, for example, the serial number or model of the intended ambulatory fluid delivery device. On the ambulatory fluid delivery device end, a password or certificate may be transmitted to aid in verifying the communication source. Other secure processing protocols and/or hardware/firmware/software may be utilized, including encrypted communication protocols, secure processors, etc., as are known in the art may be used as desired between and among the various components and entities described herein.


The software update protocol can trigger, for example, the ambulatory fluid delivery device to confirm with a user that the connection between the patient and the fluid delivery device is in a safe condition with respect to the patient. A “safe condition” may be, for example, that the patient cannot accidentally receive unintentional amounts of medicament. Such conditions may include those when the ambulatory fluid delivery system is not currently administering the medicament, not attached to the patient, when the cartridge is not located within the ambulatory fluid delivery device, when the liquid drug repository not in fluid communication with the patient, when the ambulatory fluid delivery device does not contain any medicament, or any combination thereof. When in the safe condition, the fluid delivery device may display a message to have alternative materials for delivery of the fluid normally delivered by the fluid delivery device on hand for the patient. The fluid delivery device may also display messages for verification of a battery level or a constant power supply prior to proceeding with the software update, as well as warning to disconnect the fluid delivery device from the body of the patient.


A safe condition may be verified in many ways. The ambulatory fluid delivery device may have sensors to verify that a safe condition exists. The ambulatory fluid delivery device may send an inquiry message to a user, such as by presenting a message on the graphical user interface, reciting an audio message, sending a message to an external device, or the like, to confirm that the fluid delivery device is in a safe condition. The ambulatory fluid delivery device may remind the user to maintain the safe condition until after test conforming to the safety protocols have been successfully performed after the installation of the software update. The fluid delivery device may require that a user confirm that the software update should proceed by requiring input from the user that includes the providing a number that is visible on the fluid delivery device only after a portion of the device is disengaged, for example, when a medicament containing cartridge is removed. The number may be a static number, or it may be a dynamic number that is synchronized with a number generator that is also available to the central computing system.


The tests conforming to the safety protocols may vary depending on the device and the nature of the software update. There may be some tests that are always performed by the ambulatory fluid delivery device, such as those tests that are performed after initial construction of the fluid delivery device and upon powering on of the ambulatory fluid delivery device. These self-tests may include those which confirm the software and hardware configuration of the fluid delivery device, confirm that any previously loaded configurations, settings, or other data were not unintentionally deleted, and that confirm that the fluid delivery device performs according to factory initialized, or reset, settings. The self-tests may reset certain values, such as insulin on board (IOB).


Communications between a fluid delivery device and a central computing system may include accessing data through a request sent from the fluid delivery device to the central computing system. Alternatively, communications may include data transfer over a computer network from the fluid delivery device to the central computing system via an uploader application executing at a host device, such as an intermediary computing device, such that the uploader application may authenticate the fluid delivery device, extracts a data log (e.g. device history record) from the authenticated fluid delivery device, and uploads the extracted data log to the central computing system. Additionally, access to data on the central computing system may be controlled such that access is automatically terminated such that an unattended, but previously authorized device, cannot be used to gain access. Such authenticated interactions may be helpful in maintaining the safety and privacy of patients.


More particulars regarding systems for communication between exemplary fluid delivery devices and systems that include a central server (i.e., a network data manager), including those which utilize an intermediary computing device may be found in U.S. patent application Ser. No. 13/564,188, titled, “Therapy Management System,” filed Aug. 1, 2012, the disclosure of which is incorporated by reference in its entirety herein.


Following the installation of software on the ambulatory fluid delivery device 210, the fluid delivery device 210 will conduct tests to verify the data contained on the ambulatory fluid delivery device, as well tests to confirm that the ambulatory fluid delivery device performs according to safety protocols that help to ensure the safety of the patient using the device. Data from the ambulatory fluid delivery device may be redundantly stored, or backed-up, by the central computing system prior to the installation of a software update on the ambulatory fluid delivery device. Such backed-up data may include device history logs; the device history record; user profiles, including basal rate profiles; user information, such as, but not limited to, name, age, sex, location, and care giver information; and the like. After a software update installation finishes on an ambulatory fluid delivery device 210, the fluid delivery device 210 may send the data back to the central computing system for comparison to the backed-up data. This process may assure patients that basal rate profiles and other dosing instructions, as well as other important information, will not be unexpectedly affected by a software update.


An exemplary method of performing software updates on an ambulatory fluid delivery device while the device is in the field includes verification of the ambulatory fluid delivery device status and performance, both before and after a software update occurs. The ambulatory fluid delivery device will be confirmed to be in a safe configuration and will have a performance record that indicates the fluid delivery device is in proper working order before the software update occurs. After the software update occurs, the ambulatory fluid delivery device will be tested and proven to be in working order before being returned to service, dispensing medicament to a patient.


In an exemplary method, a central computing server and an ambulatory fluid delivery device exchange information (such as over the Internet or other computer network) to confirm that a communication interaction is appropriate before taking further action. This may include a confirmation that a secure communication connection is accessible between the two components.


Once it is confirmed that the central computing server and the ambulatory fluid delivery device have an allowable connection, the central computing server verifies that the ambulatory fluid delivery device can appropriately accept a proposed software update and that the ambulatory fluid delivery device is in a safe condition. As discussed above, any of a variety of conditions can be used as criteria for the existence of a safe condition.


The central computing server then sends the software update to the ambulatory fluid delivery device. This can occur, for example, over a network such as the Internet. The ambulatory fluid delivery device, in turn, receives and installs the software update. Prior to installing the software, the ambulatory fluid delivery device may again verify that a safe condition exists.


Upon completion of the software update installation, the ambulatory fluid delivery device performs one or more tests to confirm that it is in proper operating condition. A user, such as a patient or care giver, then places the properly functioning ambulatory fluid delivery device back into service, by, for example, attaching infusion lines to the patient, adding medicament to the ambulatory fluid delivery device, or installing a medicament containing cartridge.


Example Ambulatory Fluid Delivery Device


An example of an ambulatory fluid delivery or pump device is now described. It should be appreciated that the following description is an example and the actual configuration of the ambulatory fluid delivery or pump can vary. A detailed description of exemplary devices can be found in U.S. Pat. No. 8,287,495, which is incorporated by reference in its entirety herein. Further examples of such pumps and various features that can be associated with such pumps include those disclosed in U.S. patent application Ser. No. 13/557,163, U.S. patent application Ser. No. 12/714,299, U.S. patent application Ser. No. 12/538,018, U.S. Provisional Patent Application No. 61/655,883 and U.S. Provisional Patent Application No. 61/656,967, each of which is incorporated herein by reference.



FIG. 3 is a schematic view of an open housing 124 of an ambulatory fluid delivery device 114, such as a pump device. The exemplary ambulatory fluid delivery device 114 has within the housing 124 an area into which a cartridge 112 fits. The cartridge 112 has a substantially rigid container 130 that encloses a collapsible reservoir 126. The collapsible reservoir 126 is made of a flexible material or membrane 128 and that defines an interior volume 140. The cartridge 112 also includes a delivery mechanism 132, a fill port 134 with a re-sealable septum 136 sealed over the fill port 134, a reservoir inlet port 138 in fluid communication with the interior volume 140 of the collapsible reservoir 126, a fluid dispense port 142 in fluid communication with a bore 144 of the delivery mechanism 132, and a vent inlet port 146 and a vent outlet port 148, both in fluid communication with the bore 144. The collapsible reservoir 126 may have a bag-like structure with flexible walls that can collapse and expand depending upon the amount of material in the volume of the reservoir. The interior volume of the reservoir may be in fluid isolation from the remaining interior volume of the rigid container 130.


The cartridge 112 may be secured to the housing 124 of the ambulatory fluid delivery device 114 in releasable and operable manner. The housing 124 may be configured to house a drive mechanism 150 including a motor 152 and gear box 154 disposed in the housing 124. The drive mechanism 150 may be detachably and operatively coupled to the spool 156 member of the delivery mechanism 132. At least one pressure sensor may be disposed in a volume between an outside surface of the flexible material or membrane 128 of the collapsible reservoir 126 and an inside surface of the substantially rigid shell or case 130.


A graphic user interface (GUI) may be operatively coupled to a controller 168, which may include at least one processor 170, a memory device 172 and connective circuitry or other data conduits that couple the data generating or data managing components of the device. A power storage cell in the form of a battery 174 that may be rechargeable may also be disposed within the housing 124. Data generating or managing components of the device may include the processor(s) 170, the memory device 172, sensors, including any pressure or temperature sensors, the GUI and the like.


Other components such as the vibratory motor 175, speaker, battery 174 and motor 152 of the drive mechanism 150 may also be operatively coupled to the controller 168. Connective circuitry may include conductive wiring such as copper wiring, fiber optic conduits, RF conduits and the like. The controller 168 may include at least one processor 170 and a memory device 172, the controller 168 being operatively coupled to the drive mechanism 150, a GUI, and at least one pressure sensor. The controller may be configured to generate a signal to the drive mechanism 150 to displace the spool of the delivery mechanism 132 when dispensing medicament from the ambulatory fluid delivery device. The controller may also be configured to send and receive data to and from a central computing system.


Safe configurations in this exemplary ambulatory fluid delivery device 114 include ones in which the cartridge 112 is removed from the fluid delivery device 114, the reservoir 126 is empty, the fluid dispense port 142 is disconnected from any lines or tubing connected to an infusion site on a patient, and the like.


With regard to the above detailed description, like reference numerals used therein may refer to like elements that may have the same or similar dimensions, materials and configurations. While particular forms of embodiments have been illustrated and described, it will be apparent that various modifications can be made without departing from the spirit and scope of the embodiments herein. Accordingly, it is not intended that the invention be limited by the forgoing detailed description.


The entirety of each patent, patent application, publication and document referenced herein is hereby incorporated by reference. Citation of the above patents, patent applications, publications and documents is not an admission that any of the foregoing is pertinent prior art, nor does it constitute any admission as to the contents or date of these documents.


Modifications may be made to the foregoing embodiments without departing from the basic aspects of the technology. Although the technology may have been described in substantial detail with reference to one or more specific embodiments, changes may be made to the embodiments specifically disclosed in this application, yet these modifications and improvements are within the scope and spirit of the technology. The technology illustratively described herein suitably may be practiced in the absence of any element(s) not specifically disclosed herein. Thus, for example, in each instance herein any of the terms “comprising,” “consisting essentially of,” and “consisting of” may be replaced with either of the other two terms. The terms and expressions which have been employed are used as terms of description and not of limitation, and use of such terms and expressions do not exclude any equivalents of the features shown and described or portions thereof, and various modifications are possible within the scope of the technology claimed. The term “a” or “an” may refer to one of or a plurality of the elements it modifies (e.g., “a reagent” can mean one or more reagents) unless it is contextually clear either one of the elements or more than one of the elements is described. Although the present technology has been specifically disclosed by representative embodiments and optional features, modification and variation of the concepts herein disclosed may be made, and such modifications and variations may be considered within the scope of this technology.

Claims
  • 1. A method performed by software executable instructions on a hardware processor for remotely updating software on an ambulatory fluid delivery device comprising: from a computing system, interrogating the ambulatory fluid delivery device and obtaining data, from the ambulatory fluid delivery device, the data including a patient basal medication dosage profile and device history logs;by the computing system, verifying that the ambulatory fluid delivery device is compatible with a software update, including both verifying a memory capacity of the ambulatory fluid delivery device and confirming that a model of the ambulatory fluid delivery device is compatible with the software update;verifying that a user of the ambulatory fluid delivery device wishes to update software on the ambulatory fluid delivery device;sending the software update from the computing system to the ambulatory fluid delivery device;verifying that the ambulatory fluid delivery device is in a safe condition for the software update, including verifying an absence of error messages within a certain time period in the device history logs;performing the software update on the ambulatory fluid delivery device; andverifying that the ambulatory fluid delivery device in is a safe condition to perform as intended after the software update.
  • 2. The method of claim 1, further comprising, by the computing system: receiving a password from the ambulatory fluid delivery device; andverifying the password received from the ambulatory fluid delivery device.
  • 3. The method of claim 1, wherein the computing system includes a central computing system and an intermediate computing device, and further comprising, by the intermediate computing device, facilitating communications relating to the software update between the ambulatory fluid delivery device and the central computing system.
  • 4. The method of claim 3, wherein the intermediate computing device comprises a portable computing device.
  • 5. The method of claim 1, wherein the step of verifying that the ambulatory fluid delivery device is in a safe condition for the software update is performed prior to the step of sending the software update to the ambulatory fluid delivery device.
  • 6. A system for remotely updating software operating on an ambulatory fluid delivery device, comprising: an ambulatory fluid delivery device; anda computing system having a hardware processor configured to remotely update software operating on the ambulatory fluid delivery device, wherein upon determining that a software update is available for the ambulatory fluid delivery device the hardware processor of the computing system is programmed to: interrogate the ambulatory fluid delivery device to obtain data from the ambulatory fluid delivery device, the data including a patient basal medication dosage profile and device history logs;verify that the ambulatory fluid delivery device is compatible with a software update, including both verifying a memory capacity of the ambulatory fluid delivery device and confirming that a model of the ambulatory fluid delivery device is compatible with the software update;verify that a user of the ambulatory fluid delivery device wishes to update software on the ambulatory fluid delivery device;send the software update to the ambulatory fluid delivery device; verify that the ambulatory fluid delivery device is in a safe condition for the software update, including verifying an absence of error messages within a certain time period in the device history logs;receive confirmation that the software update has occurred on the ambulatory fluid delivery device; andverify that the ambulatory fluid delivery device is in a safe condition to perform as intended after the software update.
  • 7. The system of claim 6, wherein the central computing system is further programmed to: receive a password from the ambulatory fluid delivery device; andverify the password received from the ambulatory fluid delivery device.
  • 8. The system of claim 6, wherein the computing system includes a central computing system and an intermediate computing device, the intermediate computing device configured to facilitate communications relating to the software update between the ambulatory fluid delivery device and the central computing system.
  • 9. The system of claim 8, wherein the intermediate computing device comprises a portable computing device.
  • 10. The system of claim 6, where a safe condition for the software update comprises one or more of: the ambulatory fluid delivery device not currently administering a medicament,the ambulatory fluid delivery device not being attached to a patient, anda liquid medicament repository not being in fluid communication with the patient.
  • 11. The system of claim 6, wherein verifying that the ambulatory fluid delivery device is in a safe condition to perform as intended after the software update comprises one or more of: verifying an ability of the ambulatory fluid delivery device to dispense one or more medicaments;verifying an ability of the ambulatory fluid delivery device to update a device history log; andverifying an ability of the ambulatory fluid delivery device to accept sensor data to influence medicament dosing.
  • 12. The system of claim 6, wherein verifying a user of the ambulatory fluid delivery device wishes to update software on the ambulatory fluid delivery device includes receiving an indication of user input accepting a message pertaining to the software update.
  • 13. The system of claim 6, wherein the hardware processor of the computing system is programmed to verify that the ambulatory fluid delivery device is in a safe condition for the software update prior to sending the software update to the ambulatory fluid delivery device.
  • 14. A system for remotely updating software operating on an ambulatory fluid delivery device, comprising; an ambulatory fluid delivery device;a central computing system having a hardware processor and located remotely from the ambulatory fluid delivery device; andan intermediate computing system having hardware processor configured to facilitate an update to software operating on the ambulatory fluid delivery device via the central computing system, wherein the intermediate computing device is programmed to: interrogate the ambulatory fluid delivery device to obtain data from the ambulatory fluid delivery device, the data including a patient basal medication dosage profile and device history logs;verify that the ambulatory fluid delivery device is compatible with a software update, including both verifying a memory capacity of the ambulatory fluid delivery device and confirming that a model of the ambulatory fluid delivery device is compatible with the software update;verify that a user of the ambulatory fluid delivery device wishes to update software on the ambulatory fluid delivery device;receive the software update from the central computing system;send the software update to the ambulatory fluid delivery device;verify that the ambulatory fluid delivery device is in a safe condition for the software update, including verifying an absence of error messages within a certain time period in the device history logs:receive confirmation that the software update has occurred on the ambulatory fluid delivery device; andverify that the ambulatory fluid delivery device is in a safe condition to perform as intended after the software update.
  • 15. The system of claim 14, wherein the intermediate computing device is further programmed to: receive a password from the ambulatory fluid delivery device; andverify the password received from the ambulatory fluid delivery device with the central computing system.
  • 16. The system of claim 14, wherein the intermediate computing device comprises a portable computing device.
  • 17. The system of claim 14, where a safe condition for the software update comprises one or more of: the ambulatory fluid delivery device not currently administering a medicament,the ambulatory fluid delivery device not being attached to a patient, anda liquid medicament repository not being in fluid communication with the patient.
  • 18. The system of claim 14, wherein verifying that the ambulatory fluid delivery device is in a safe condition to perform as intended after the software update comprises one or more of: verifying an ability of the ambulatory fluid delivery device to dispense one or more medicaments;verifying an ability of the ambulatory fluid delivery device to update a device history log; andverifying an ability of the ambulatory fluid delivery device to accept sensor data to influence medicament dosing.
  • 19. The system of claim 14, wherein verifying a user of the ambulatory fluid delivery device wishes to update software on the ambulatory fluid delivery device includes receiving an indication of user input accepting a message pertaining to the software update.
  • 20. The system of claim 14, wherein the intermediate computing device is programmed to verify that the ambulatory fluid delivery device is in a safe condition for the software update prior to sending the software update to the ambulatory fluid delivery device.
RELATED APPLICATION

This application is a continuation of application Ser. No. 13/838,084 filed Mar. 15, 2013, which is hereby fully incorporated herein by reference.

US Referenced Citations (230)
Number Name Date Kind
4731051 Fischell Mar 1988 A
5621797 Rosen Apr 1997 A
5704366 Tacklind et al. Jan 1998 A
5935099 Peterson et al. Aug 1999 A
6039251 Holowko et al. Mar 2000 A
6241704 Peterson et al. Jun 2001 B1
6248067 Causey, III et al. Jun 2001 B1
6360888 Mcivor et al. Mar 2002 B1
6363282 Nichols et al. Mar 2002 B1
6442433 Linberg Aug 2002 B1
6475180 Peterson et al. Nov 2002 B2
6551276 Mann et al. Apr 2003 B1
6554798 Mann et al. Apr 2003 B1
6558320 Causey, III et al. May 2003 B1
6564104 Nelson et al. May 2003 B2
6635014 Starkweather et al. Oct 2003 B2
6641533 Causey, III et al. Nov 2003 B2
6694191 Starkweather et al. Feb 2004 B2
6718547 Takeo Apr 2004 B2
6740059 Flaherty May 2004 B2
6749587 Flaherty Jun 2004 B2
6768425 Flaherty et al. Jul 2004 B2
6809653 Mann et al. Oct 2004 B1
6872200 Mann et al. Mar 2005 B2
6936029 Mann et al. Aug 2005 B2
6979326 Mann et al. Dec 2005 B2
6997920 Mann et al. Feb 2006 B2
7025743 Mann et al. Apr 2006 B2
7029455 Flaherty Apr 2006 B2
7098803 Mann et al. Aug 2006 B2
7109878 Mann et al. Sep 2006 B2
7137964 Flaherty Nov 2006 B2
7181505 Haller et al. Feb 2007 B2
7324012 Mann et al. Jan 2008 B2
7324949 Bristol Jan 2008 B2
7347836 Peterson et al. Mar 2008 B2
7383358 Kennedy Jun 2008 B1
7390458 Burow et al. Jun 2008 B2
7602310 Mann et al. Oct 2009 B2
7647237 Malave et al. Jan 2010 B2
7654976 Peterson et al. Feb 2010 B2
7717903 Estes et al. May 2010 B2
7774038 Wang et al. Aug 2010 B2
7815602 Mann et al. Oct 2010 B2
7819843 Mann et al. Oct 2010 B2
7837651 Bishop et al. Nov 2010 B2
7860583 Condurso et al. Dec 2010 B2
7875022 Wenger et al. Jan 2011 B2
7877489 Salesky et al. Jan 2011 B2
7928850 Hayter et al. Apr 2011 B2
7942844 Moberg May 2011 B2
7955843 Barringer, Jr. Jun 2011 B2
7999674 Kamen Aug 2011 B2
8002700 Ferek-Petric et al. Aug 2011 B2
8032226 Miller et al. Oct 2011 B2
8051414 Stender Nov 2011 B2
8065161 Howard et al. Nov 2011 B2
8078983 Davis et al. Dec 2011 B2
8109921 Estes et al. Feb 2012 B2
8118770 Galley et al. Feb 2012 B2
8149131 Blomquist Apr 2012 B2
8202267 Field et al. Jun 2012 B2
8206350 Mann et al. Jun 2012 B2
8209060 Ledford Jun 2012 B2
8219982 Harkanyi et al. Jul 2012 B2
8225015 Gao-Saari et al. Jul 2012 B2
8234128 Martucci et al. Jul 2012 B2
8239852 Etchegoyen Aug 2012 B2
8249683 Wang et al. Aug 2012 B2
8275438 Simpson et al. Sep 2012 B2
8285328 Caffey et al. Oct 2012 B2
8287495 Michaud et al. Oct 2012 B2
8294581 Kamen Oct 2012 B2
8323188 Tran Dec 2012 B2
8337469 Eberhart et al. Dec 2012 B2
8337486 Yodfat et al. Dec 2012 B2
8340792 Condurso et al. Dec 2012 B2
8380536 Howard et al. Feb 2013 B2
8402151 Young Mar 2013 B2
8414563 Kamen et al. Apr 2013 B2
8435206 Evans et al. May 2013 B2
8451230 Celentano et al. May 2013 B2
8452953 Buck et al. May 2013 B2
8465460 Yodfat et al. Jun 2013 B2
8475409 Tsoukalis Jul 2013 B2
8562558 Kamath et al. Oct 2013 B2
8573027 Rosinko et al. Nov 2013 B2
8579853 Reggiardo et al. Nov 2013 B2
8595607 Nekoomaram et al. Nov 2013 B2
8726266 Kiaie May 2014 B2
8740847 Levesque et al. Jun 2014 B2
8768717 Blomquist Jul 2014 B2
8788632 Taylor Jul 2014 B2
8952794 Blomquist Feb 2015 B2
8954336 Blomquist Feb 2015 B2
8986253 DiPerna Mar 2015 B2
8992475 Mann Mar 2015 B2
9135393 Blomquist Sep 2015 B1
9242043 Ludolph Jan 2016 B2
9381302 Miller Jul 2016 B2
9494150 Gray Nov 2016 B2
9675756 Kamen Jun 2017 B2
9764087 Peterfreund Sep 2017 B2
20020029776 Blomquist Mar 2002 A1
20020040208 Flaherty et al. Apr 2002 A1
20020052539 Haller et al. May 2002 A1
20020072733 Flaherty Jun 2002 A1
20030095648 Kaib May 2003 A1
20030212364 Mann et al. Nov 2003 A1
20040010207 Flaherty et al. Jan 2004 A1
20040073095 Causey et al. Apr 2004 A1
20040204673 Flaherty Oct 2004 A1
20040215278 Stegink et al. Oct 2004 A1
20040235446 Flaherty et al. Nov 2004 A1
20040260233 Garibotto et al. Dec 2004 A1
20050022274 Campbell et al. Jan 2005 A1
20050075685 Forsberg et al. Apr 2005 A1
20050102669 Marney May 2005 A1
20050171512 Flaherty Aug 2005 A1
20050171513 Mann et al. Aug 2005 A1
20050177395 Blomquist Aug 2005 A1
20050182831 Uchida Aug 2005 A1
20050240246 Lee et al. Oct 2005 A1
20050246416 Blomquist Nov 2005 A1
20050251227 Khoo et al. Nov 2005 A1
20060202859 Mastrototaro et al. Sep 2006 A1
20060235472 Goetz et al. Oct 2006 A1
20060276857 Forsberg et al. Dec 2006 A1
20070016449 Cohen et al. Jan 2007 A1
20070033074 Nitzan et al. Feb 2007 A1
20070066956 Finkel Mar 2007 A1
20070118405 Campbell et al. May 2007 A1
20070135866 Baker et al. Jun 2007 A1
20070136098 Smythe Jun 2007 A1
20070156033 Causey, III et al. Jul 2007 A1
20080033357 Mann et al. Feb 2008 A1
20080033360 Evans et al. Feb 2008 A1
20080033361 Evans et al. Feb 2008 A1
20080033402 Blomquist Feb 2008 A1
20080033749 Blomquist Feb 2008 A1
20080034323 Blomquist Feb 2008 A1
20080065007 Peterson et al. Mar 2008 A1
20080065016 Peterson et al. Mar 2008 A1
20080071580 Marcus et al. Mar 2008 A1
20080076969 Kraft et al. Mar 2008 A1
20080126969 Blomquist May 2008 A1
20080147004 Mann et al. Jun 2008 A1
20080147050 Mann et al. Jun 2008 A1
20080249470 Malave et al. Oct 2008 A1
20090018779 Cohen et al. Jan 2009 A1
20090030733 Cohen et al. Jan 2009 A1
20090042552 Coppinger et al. Feb 2009 A1
20090069745 Estes et al. Mar 2009 A1
20090069785 Miller et al. Mar 2009 A1
20090085768 Patel et al. Apr 2009 A1
20090150186 Cohen et al. Jun 2009 A1
20090150865 Young et al. Jun 2009 A1
20090170056 Nam et al. Jul 2009 A1
20090177991 Davis et al. Jul 2009 A1
20100010647 Schroeder et al. Jan 2010 A1
20100023582 Pedersen et al. Jan 2010 A1
20100031245 Meller et al. Feb 2010 A1
20100063844 Reinke Mar 2010 A1
20100130933 Holland et al. May 2010 A1
20100146300 Brown Jun 2010 A1
20100160740 Cohen et al. Jun 2010 A1
20100161236 Cohen et al. Jun 2010 A1
20100161346 Getschmann et al. Jun 2010 A1
20100168539 Palerm et al. Jul 2010 A1
20100174553 Kaufman et al. Jul 2010 A1
20100198034 Thomas et al. Aug 2010 A1
20100198183 Lanigan et al. Aug 2010 A1
20100228186 Estes et al. Sep 2010 A1
20100234708 Buck et al. Sep 2010 A1
20100274592 Nitzan et al. Oct 2010 A1
20100277119 Montague et al. Nov 2010 A1
20100286653 Kubel et al. Nov 2010 A1
20100292556 Golden Nov 2010 A1
20100324853 Wang et al. Dec 2010 A1
20110004188 Shekalim Jan 2011 A1
20110009824 Yodfat et al. Jan 2011 A1
20110028937 Powers et al. Feb 2011 A1
20110040251 Blomquist Feb 2011 A1
20110106318 Ledford May 2011 A1
20110126188 Bernstein et al. May 2011 A1
20110190694 Lanier, Jr. et al. Aug 2011 A1
20110196248 Grunwald Aug 2011 A1
20110209139 Dominick et al. Aug 2011 A1
20110213225 Bernstein et al. Sep 2011 A1
20110256024 Cole et al. Oct 2011 A1
20110257591 Nelson Konen et al. Oct 2011 A1
20110265072 Matthew Oct 2011 A1
20110320595 Konishi et al. Dec 2011 A1
20120016305 Jollota Jan 2012 A1
20120022452 Welsch et al. Jan 2012 A1
20120029433 Michaud et al. Feb 2012 A1
20120029941 Malave et al. Feb 2012 A1
20120059673 Cohen et al. Mar 2012 A1
20120096451 Tenbarge Apr 2012 A1
20120165614 Strickland et al. Jun 2012 A1
20120185267 Kamen et al. Jul 2012 A1
20130012878 Blomquist Jan 2013 A1
20130018315 Blomquist Jan 2013 A1
20130053816 DiPerna et al. Feb 2013 A1
20130104120 Arrizza et al. Apr 2013 A1
20130142367 Berry Jun 2013 A1
20130159456 Daoud et al. Jun 2013 A1
20130211854 Wagstaff Aug 2013 A1
20130231711 Kaib Sep 2013 A1
20130253600 Drew et al. Sep 2013 A1
20130254332 Stempfer Sep 2013 A1
20130268890 Jensen et al. Oct 2013 A1
20130289657 Rodriguez Oct 2013 A1
20130345625 Causey, III Dec 2013 A1
20140033002 Nekoomaram et al. Jan 2014 A1
20140039455 Miller et al. Feb 2014 A1
20140054883 Lanigan et al. Feb 2014 A1
20140094744 Blomquist Apr 2014 A1
20140094764 Blomquist Apr 2014 A1
20140095485 Blomquist Apr 2014 A1
20140095499 Blomquist Apr 2014 A1
20140163919 Manigel Jun 2014 A1
20140351712 Blomquist Nov 2014 A1
20150052511 Kiaie Feb 2015 A1
20150143356 Charlton May 2015 A1
20150154369 Blomquist Jun 2015 A1
20150157788 Gescheit et al. Jun 2015 A1
20150317437 Daoud et al. Nov 2015 A1
20150328396 Adams et al. Nov 2015 A1
20160147978 Adams et al. May 2016 A1
Foreign Referenced Citations (2)
Number Date Country
WO 2007065944 Jun 2007 WO
WO 2009032400 Mar 2009 WO
Non-Patent Literature Citations (7)
Entry
Masci et al., Verification of interactive software for medical devices: PCA infusion pumps and FDA regulation as an example, Jun. 2013, 10 pages.
Kim et al., Safety-assured development of the GPCA infusion pump software, Oct. 2011, 10 pages.
PCT Search Report and Written Opinion dated Jun. 5, 2014 for PCT Application No. PCT/US2014/021125 filed Mar. 6, 2014, 12 pages.
Application and File history for U.S. Appl. No. 13/838,084, filed Mar. 15, 2013. Inventor: Ludolph.
Masci et al., Verification of interactive software for medical devices: PCA infusion pumps and FDA regulation as an example, Jun. 2013,10 pages.
N. Hrgarek, Certification and regulatory challenges in medical device software development, Jun. 2012, 4 pages.
Search Report dated Jul. 28, 2016 for EP Application No. 14768180.3, 9 pages.
Related Publications (1)
Number Date Country
20160129185 A1 May 2016 US
Continuations (1)
Number Date Country
Parent 13838084 Mar 2013 US
Child 14995958 US