This application relates generally to securable enclosures for infusion pumps.
A substance is a “controlled substance” when it is determined to be abusable, has shown a pattern of abuse leading to dependency, and that abuse has been shown to create a risk to public health and safety. In many instances, controlled substances have legitimate medical therapeutic uses, and so may be purchased, stored, dispensed and administered to patients during the treatment of injury or disease. Healthcare institutions may be required to maintain stores of controlled substances for these uses, and those stores may attract individuals who wish to use them for other purposes, leading to abuse. Those individuals may be employees of the healthcare institution itself. Thus, any organization that routinely uses controlled substances for valid therapeutic purposes can become a target for diversion.
Moreover, drug seeking behavior is highly adaptive and diverters will constantly challenge any control system looking for a way to defeat it and acquire the drugs they seek. While diverters may include patients or visitors of patients, diverters may also include healthcare professionals. Indeed, diversion of controlled substances by healthcare professionals can occur within any profession that has routine and appropriate access to these substances. The healthcare professionals with the most frequent access include physicians, nurses, pharmacists and pharmacy technicians. In general, when healthcare workers divert drugs, it is for personal use and is symptomatic of addiction. Also, drug diverters attempt to disguise their diversion as apparently legitimate use of controlled substances.
Current automated control systems have tightened security around controlled substances, but diversion still exists. While control systems limit the opportunity for diversion, they cannot entirely prevent it. Medical cabinets are routinely secured with locks and monitored. Lock boxes have been constructed and utilized for preventing access to the infusion pumps that deliver controlled substances. Lock boxes are designed to completely encompass, and prevent access to, both the infusion device and the medication container connected to the infusion pump. Lock boxes provide a good deterrent to diversion activities; however, a lock box must be manually removed, often with a physical key, before any adjustment can be made to the infusion pump, a time consuming process that imposes a significant impediment to critical care needs.
The subject technology provides a method for securing a pump, comprising: securing at least a portion of an infusion pump within a lockbox, the lockbox configured to enclose and prevent access to at least a user interface of the infusion pump and a medication receptacle of the infusion pump, the lockbox comprising a lockbox control interface configured to obtain authorization for access to the lockbox from a pump communication interface of the infusion pump and enclosed within the lockbox; electronically coupling the lockbox control interface with the pump communication interface; facilitating transmission of a wireless credential to the pump communication interface for authorization to the lockbox; receiving, by the lockbox control interface from the pump communication interface, the authorization for access based on the wireless credential; and performing, by the lockbox control interface, an action according to the received authorization for access. Other aspects include corresponding devices and computer program products for implementation of the corresponding method and its features.
According to various aspects, a system for securing a pump, comprises: a lockbox configured to enclose and prevent access to at least a user interface of an infusion pump and a medication receptacle of the infusion pump; and a lockbox control interface associated with the lockbox configured to obtain authorization for access to the lockbox from a pump communication interface of the infusion pump and enclosed within the lockbox, the lockbox control interface comprising a processor configured to: electronically couple the lockbox control interface with the pump communication interface; facilitate transmission of a wireless credential to the pump communication interface for authorization to the lockbox; receive, from the pump communication interface, the authorization for access based on the wireless credential; and cause performance of an action according to the received authorization for access. Other aspects include corresponding devices, methods, and computer program products for implementation of the corresponding system and its features.
It is understood that other configurations of the subject technology will become readily apparent to those skilled in the art from the following detailed description, wherein various configurations of the subject technology are shown and described by way of illustration. As will be realized, the subject technology is capable of other and different configurations and its several details are capable of modification in various other respects, all without departing from the scope of the subject technology. Accordingly, the drawings and detailed description are to be regarded as illustrative in nature and not as restrictive.
For a better understanding of the various described implementations, reference should be made to the Description below, in conjunction with the following drawings. Like reference numerals refer to corresponding parts throughout the figures and description.
Reference will now be made to implementations, examples of which are illustrated in the accompanying drawings. In the following description, numerous specific details are set forth in order to provide an understanding of the various described implementations. However, it will be apparent to one of ordinary skill in the art that the various described implementations may be practiced without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks have not been described in detail so as not to unnecessarily obscure aspects of the implementations.
The subject technology provides an intelligent system for securing an infusion device. As will be described further, the infusion device is secured within a lockbox, with the lockbox configured to enclose and prevent access to at least a user interface of the infusion pump and a medication receptacle of the infusion pump. The lockbox includes a communication interface configured to receive a credential and to pass that credential to the infusion device within the lockbox to obtain authorization for access to the lockbox from the infusion device.
According to various implementations, the lockbox comprises retractable multi-folding doors each configured to enclose respective portions of the infusion pump. Opening of the lockbox is motor controlled, and the lockbox includes a top configured to automatically open, and opposing sides of the housing that are configured to automatically slide in a rearward direction, to provide greater access to the infusion pump. When closed, the top, sides, and folding doors are integral to each other to seal the lockbox and prevent access to the infusion pump within the lockbox.
The lockbox of the subject technology may be communicatively connectable (e.g., using BLUETOOTH) to the infusion pump and/or a mobile device for receiving signals to open the lockbox. There is no need for a hard key, and clinicians may scan a badge to open the lockbox. On authentication, the mechanical parts of the lockbox (e.g., doors, top, sides) may open, with the doors folding and the sides sliding backwards to reveal the pump.
The syringe pump 30 can include a control panel 36 providing multiple buttons 32 for control of the pump 26 as well as a display 34 used to present pump-specific information to the operator (see also
The control unit 14 may include a communications system (not shown) with which the control unit 14 may communicate with external equipment such as a medical facility server or other computer and with a portable processor, such as a handheld communication device or a laptop-type of computer, or other information device that a clinician may have to transfer information as well as to download drug libraries to a control unit (such as pump 30 or, e.g., modules of
In some embodiments, the pressure measurements from the upstream and/or downstream pressure sensors are transmitted to a server or other coordination device, and the methods disclosed herein are implemented on the server or other coordination device. For example, a pressure sensor may be used to determine a pressure or force within the infusion line downstream of the pump (e.g., between the patient and the pump). More sophisticated and computationally intensive approaches like machine-learning can be implemented on a server (or on a control unit with a larger memory and/or CPU resources). In some embodiments, machine learning is used to identify empty conditions based on pressure signals received from the pump.
In the depicted example, patient care unit 12 comprises a control module 14, also referred to as main frame infusion controller 14, connected to one or more functional modules 16, 18, 20, 22. Main frame infusion controller 14 includes a central processing unit (CPU) 50 connected to a memory, for example, random access memory (RAM) 58, and one or more interface devices such as user interface device 54, a coded data input device 60, a network connection 52, and an auxiliary interface 62 for communicating with additional modules or devices. Main frame infusion controller 14 also, although not necessarily, includes a main non-volatile storage unit 56, such as a hard disk drive or non-volatile flash memory, for storing software and data and one or more internal buses 64 for interconnecting the aforementioned elements. Patient care unit 12 may include or incorporate pumps, physiological monitors (e.g., heart rate, blood pressure, ECG, EEG, pulse oximeter, and other patient monitors), therapy devices, and other drug delivery devices may be utilized according to the teachings set forth herein.
In various implementations, user interface device 54 is a touch screen for displaying information to a user and allowing a user to input information by touching defined areas of the screen. Additionally, or in the alternative, user interface device 54 could include any means for displaying and inputting information, such as a monitor, a printer, a keyboard, softkeys, a mouse, a track ball and/or a light pen. Data input device 60 may be a bar code reader capable of scanning and interpreting data printed in bar coded format. Additionally or in the alternative, data input device 60 can be any device for entering coded data into a computer, such as a device(s) for reading a magnetic strips, wireless communication (e.g., radio frequency or Bluetooth), radio-frequency identification (RFID) devices whereby digital data encoded in RFID tags or smart labels (defined below) are captured by the reader 60 via radio waves, PCMCIA smart cards, radio frequency cards, memory sticks, CDs, DVDs, or any other analog or digital storage media. Other examples of data input device 60 include a voice activation or recognition device or a portable personal data assistant (PDA). Depending upon the types of interface devices used, user interface device 54 and data input device 60 may be the same device. Although data input device 60 is shown as being disposed within main frame infusion controller 14, it is recognized that data input device 60 may be integral within pharmacy system or located externally and communicating with pharmacy system through an RS-232 serial interface or any other appropriate communication means. Auxiliary interface 62 may be an RS-232 communications interface, however any other means for communicating with a peripheral device such as a printer, patient monitor, infusion pump or other medical device may be used without departing from the subject technology. Additionally, data input device 60 may be a separate functional module, such as modules 16, 18, 20 and 22, and configured to communicate with a main frame infusion (controller) device 14, or any other system on the network, using suitable programming and communication protocols.
Network connection 52 may be a wired or wireless connection, such as by Ethernet, WiFi, BLUETOOTH, an integrated services digital network (ISDN) connection, a digital subscriber line (DSL) modem or a cable modem. Any direct or indirect network connection may be used, including, but not limited to a telephone modem, an MIB system, an RS232 interface, an auxiliary interface, an optical link, an infrared link, a radio frequency link, a microwave link or a WLANS connection or other wireless connection.
Functional modules 16, 18, 20, 22 are any devices for providing care to a patient or for monitoring patient condition. At least one of functional modules 16, 18, 20, 22 may be an infusion pump module such as an intravenous infusion pump for delivering medication or other fluid to a patient. For the purposes of this discussion, functional module 16 is an infusion pump module. Each of functional modules 16, 18, 20, 22 may be any patient treatment or monitoring device including, but not limited to, an infusion pump, a syringe pump, a PCA pump, an epidural pump, an enteral pump, a blood pressure monitor, a pulse oximeter, an EKG monitor, an EEG monitor, a heart rate monitor, an intracranial pressure monitor, or the like. Functional module 16, 18, 20 and/or 22 may be a printer, scanner, bar code reader, near-field communication reader, RFID reader, radio frequency (RF) transmission, BLUETOOTH, or any other peripheral input, output or input/output device.
Data to and from the various data sources can be converted into network-compatible data with existing technology, and movement of the information between the medical device and network can be accomplished by a variety of means. For example, patient care unit 12 and network 10 may communicate via automated interaction, manual interaction or a combination of both automated and manual interaction. Automated interaction may be continuous or intermittent and may occur through direct network connection 52 (as shown in
A rear side of the housing of lockbox 200 (see
As shown, when the lockbox 200 receives an authorized signal to trigger opening of the lockbox, the motors and gears operate to retract the multi-folding doors in opposing left and right directions 206a, 206b to expose the respective portions of the front face of the patient care unit 10 within the housing. Each door is physically and hingedly coupled to a respective left or right side wall 208a, 208b of the lockbox housing. Contemporaneous with the retraction of the multi-folding doors, the walls 208a, 208b are moved backwards in a direction 210 to expose and provide access to at least a portion of the sides of the patient care unit 10. Contemporaneous with the retraction of the doors and sides, the top face 204 may swing open according to an upward directional arc 212 to reveal and provide access to at least a portion of the top of the patient care unit 10. In some implementations, the lockbox may open without motors. In such implementations, the gears may be interlinked so that, when the door and/or top of the lockbox is manually opened (e.g., after a user is granted access), the doors, top, and or sides move collectively together to open the lockbox.
According to various implementations, the lockbox 200 includes a lockbox control interface device 214 that is integral with the housing (e.g., embedded within the housing or securely attached to the housing). In the depicted example, control interface device 214 is embedded in a door. The control interface device 214 may be electronically or communicatively coupled to the various motors and gears within the lockbox housing and configured to operate the motors to control opening and closing of the various doors, sides, and lid of the housing.
In some implementations, the control interface 214 is configured to receive a user credential and/or other user input. In some implementations, control interface 214 may include a touch-screen for receiving the input. Additionally or in the alternative, control interface 214 may include a traditional keypad. In some implementations, the lockbox control interface 214 includes a wireless communication module (e.g., radio-frequency identification (RFID)) scanner to receive the credential from a (e.g., RFID or BLUETOOTH) transmitting device. As will be described further, the control interface 214 may be communicatively connected to the control unit 14 or other processing device of the patient control unit 10 to authenticate/validate credentials received via the interface 214 or to receive a signal from the patient care device 10 to open the lockbox 200. Upon receiving an authorized credential, the control interface 214 may automatically retract the doors 202, lid 204, and/or sides 208 to provide user access to the patient care device. In some implementations, on receiving the authorized credential, the control interface 214 may provide (e.g., via the touch screen display) an extension of the various displays 4 and inputs 6 of the patient care device 10 (see
According to various implementations, the lockbox is self powered, and includes a power supply 304 within the lockbox (e.g., inaccessible to a person outside the lockbox when the lockbox is secured). In some implementations, power for the lockbox doors and/or control interface 302 may be provided or supplemented by the infusion device (e.g., PCU 10). In such implementations, lockbox power interface 304 may include a wired connection configured to connect to and/or plug into a power charger 306 (e.g., outlet) provided by the infusion device 10 (e.g., on the main frame control unit 14). In some implementations, the lockbox 200 may be powered with PoE (power over ethernet). In some implementations, the lockbox power interface 304 may include wireless charging capabilities, and may be positioned adjacent a wireless power charger 306 attached to or integrated in the infusion device such as to receive charging and/or power from the infusion device when the lockbox is secured to the infusion device. In
In some implementations, the lockbox control interface 302 includes an input device such as a touch screen device. In this regard, the touchscreen device may display a lockbox user interface that prompts for and/or receives credentials. For example, the touchscreen may prompt for a username and password and then provide a virtual keypad for entry of the credentials. In some implementations, the interface 302 may include a biometric scanner such as a fingerprint reader. In some implementations, the lockbox control interface 302 includes a wireless scanner (e.g., RFID or BLUETOOTH receiver) configured to receive the user credential wirelessly from a transmitting device 308 associated with a user. For example, a user may scan his or her badge 308 at the interface 302 to provide a credential stored within an RFID device within the badge to the interface 302.
Accordingly, the lockbox interface 302 facilitates transmission of a authentication/authorization credential to the infusion device for authorization to the lockbox, for example, by receiving the credential wirelessly from a transmitting device 308 and retransmitting it (or a representation of it) to a control processor 50 within the infusion device 10. The processor 50 may then authenticate the user associated with the credential and, upon authentication, the processor may authorize the user to the lockbox. The processor 50 may signal the lockbox interface to indicate that the user is authorized to perform an action with regard to the lockbox. As will be described further, the action may include causing the lockbox to open (as shown in
In the depicted process 400, an infusion device (e.g., a pump) is secured within a lockbox (402). According to various implementations, the lockbox is configured to enclose and prevent access to at least a control interface of the infusion pump and a medication receptacle of the infusion pump (e.g., an infusion bag). As described with regard to
In some implementations, securing the infusion device may include locking the lockbox doors 202 and/or activating the control interface 302 to require authorized credentials to unlock the doors.
The lockbox control interface 302 is electronically coupled with the pump communication interface 52 (404). In some implementations, electronically coupling the lockbox control interface with the pump communication interface includes wirelessly pairing the lockbox control interface with the pump communication interface, for example, using a BLUETOOTH connection. In some implementation, the coupling includes a wired connection within the lockbox 200 (secured from outside tampering).
The lockbox 200 facilitates transmission of a credential to the infusion pump communication interface for authorization to the lockbox. Accordingly, in some implementations, a credential received by the lockbox control interface 302 and transmitted to the infusion pump communication interface 52 for authorization of the user to the lockbox (406). In some implementations, the credential may be entered via a lockbox user interface displayed or provided at the control interface 302. In some implementations, the credential is received from a badge scanned by the RFID scanner at the control interface 302. In some implementations, facilitating transmission by the lockbox includes the RFID credential being scanned by the pump communication interface 52 through a housing of the lockbox.
The process 500 continues with the lockbox control interface 302 receiving, from the pump communication interface 52, an authorization for access for the user to access the lockbox (408). Accordingly, the authorization for access may be received by the lockbox control interface 302 from the pump communication interface 52 responsive to transmitting the user credential to the pump communication interface 52 (and the pump authorizing the credential).
The lockbox control interface 302 performs an action according to the received authorization for access (410). According to some implementations, performing the action includes automatically (without further user intervention) unlocking the lockbox to allow user access to a user interface of the infusion pump and the medication receptacle. In some implementations, performing the action includes activating the pump user interface to receive user input while the lockbox remains locked. For example, contemporaneous with opening the lockbox, the pump's display(s) may switch from an off state (e.g., power off and/or unable to receive input) to an activated state (e.g., power and lights switch on and ready to receive input). In this regard, the lockbox user interface may extend (e.g., virtually) the pump's user interface such as the display 4 or control keys 6. The authorized user may then provide input for controlling the pump via the lockbox user interface 302 while the lockbox remains locked. The lockbox control interface 302 receives the user input via the activated lockbox user interface, and transmits the user input to the pump communication interface 52 (and processor 50) for operation for the infusion pump in accordance with the authorization for access (e.g., as if the input had been received directly by the pump user interface).
According to the depicted examples, responsive to unlocking the lockbox the lockbox control interface causes the lockbox to automatically open at least one access door to expose the user interface or the medication receptacle (412). As described previously, the lockbox includes a housing enclosing the patient care unit and/or infusion pump 10. The retractable multi-folding doors are configured to form the front face of the housing when the lockbox is closed. The multi-folding doors may include a left bifold door 202a and a right bifold door 202b that open like folding closet doors, with each half of the bifold doors folding over the other as the door opens. In this regard, the process continues with the lockbox (by way of motors and/or gears) automatically retracting, responsive to unlocking the lockbox, the retracting multi-folding doors to expose the respective portions of the front face of the housing and the respective portions of opposing sides of the housing, thereby providing user access to the infusion pump (414).
According to some implementations, once the doors 202a, 202b are completely open, the respective left and right sides of the lockbox 200 are configured to move in a direction 210 away from the front face of the housing when the lockbox is unlocked. In this regard, the process of unlocking the lockbox further includes automatically moving, responsive to unlocking the lockbox, the respective left and right sides, thereby providing user access to at least a portion of a left and right side of the infusion pump (416).
As shown in
Many of the above-described example process 400 and related features and applications, may also be implemented as software processes that are specified as a set of instructions recorded on a computer readable storage medium (also referred to as computer readable medium), and may be executed automatically (e.g., without user intervention). When these instructions are executed by one or more processing unit(s) (e.g., one or more processors, cores of processors, or other processing units), they cause the processing unit(s) to perform the actions indicated in the instructions. Examples of computer readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc. The computer readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.
The term “software” is meant to include, where appropriate, firmware residing in read-only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor. Also, in some implementations, multiple software aspects of the subject disclosure can be implemented as sub-parts of a larger program while remaining distinct software aspects of the subject disclosure. In some implementations, multiple software aspects can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software aspect described here is within the scope of the subject disclosure. In some implementations, the software programs, when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
A computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, object, or other unit suitable for use in a computing environment. A computer program may, but need not, correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
Electronic system 500 may include various types of computer readable media and interfaces for various other types of computer readable media. In the depicted example, electronic system 500 includes a bus 508, processing unit(s) 512, a system memory 504, a read-only memory (ROM) 510, a permanent storage device 502, an input device interface 514, an output device interface 506, and one or more network interfaces 516. In some implementations, electronic system 500 may include or be integrated with other computing devices or circuitry for operation of the various components and methods previously described.
Bus 508 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of electronic system 500. For instance, bus 508 communicatively connects processing unit(s) 512 with ROM 510, system memory 504, and permanent storage device 502.
From these various memory units, processing unit(s) 512 retrieves instructions to execute and data to process, in order to execute the processes of the subject disclosure. The processing unit(s) can be a single processor or a multi-core processor in different implementations.
ROM 510 stores static data and instructions that are needed by processing unit(s) 512 and other modules of the electronic system. Permanent storage device 502, on the other hand, is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when electronic system 500 is off. Some implementations of the subject disclosure use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as permanent storage device 502.
Other implementations use a removable storage device (such as a floppy disk, flash drive, and its corresponding disk drive) as permanent storage device 502. Like permanent storage device 502, system memory 504 is a read-and-write memory device. However, unlike storage device 502, system memory 504 is a volatile read-and-write memory, such as, random access memory. System memory 504 stores some of the instructions and data that the processor needs at runtime. In some implementations, the processes of the subject disclosure are stored in system memory 504, permanent storage device 502, and/or ROM 510. From these various memory units, processing unit(s) 512 retrieves instructions to execute and data to process in order to execute the processes of some implementations.
Bus 508 also connects to input and output device interfaces 514 and 506. Input device interface 514 enables the user to communicate information and select commands to the electronic system. Input devices used with input device interface 514 include, e.g., alphanumeric keyboards and pointing devices (also called “cursor control devices”). Output device interfaces 506 enables, e.g., the display of images generated by the electronic system 500. Output devices used with output device interface 506 include, e.g., printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some implementations include devices such as a touchscreen that functions as both input and output devices.
Also, as shown in
These functions described above can be implemented in computer software, firmware, or hardware. The techniques can be implemented using one or more computer program products. Programmable processors and computers can be included in or packaged as mobile devices. The processes and logic flows can be performed by one or more programmable processors and by one or more programmable logic circuitry. General and special purpose computing devices and storage devices can be interconnected through communication networks.
Some implementations include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (also referred to as computer-readable storage media, machine-readable media, or machine-readable storage media). Some examples of such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra density optical discs, any other optical or magnetic media, and floppy disks. The computer-readable media can store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations. Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
While the above discussion primarily refers to microprocessor or multi-core processors that execute software, some implementations are performed by one or more integrated circuits, such as application specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs). In some implementations, such integrated circuits execute instructions that are stored on the circuit itself.
As used in this specification and any claims of this application, the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms display or displaying means displaying on an electronic device. As used in this specification and any claims of this application, the terms “computer readable medium” and “computer readable media” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral signals.
To provide for interaction with a user, implementations of the subject matter described in this specification can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; e.g., feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input. In addition, a computer can interact with a user by sending documents to and receiving documents from a device that is used by the user; e.g., by sending web pages to a web browser on a user's client device in response to requests received from the web browser.
Embodiments of the subject matter described in this specification can be implemented in a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back end, middleware, or front end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), an inter-network (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks).
The computing system can include clients and servers. A client and server are generally remote from each other and may interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. In some embodiments, a server transmits data (e.g., an HTML page) to a client device (e.g., for purposes of displaying data to and receiving user input from a user interacting with the client device). Data generated at the client device (e.g., a result of the user interaction) can be received from the client device at the server.
Those of skill in the art would appreciate that the various illustrative blocks, modules, elements, components, methods, and algorithms described herein may be implemented as electronic hardware, computer software, or combinations of both. To illustrate this interchangeability of hardware and software, various illustrative blocks, modules, elements, components, methods, and algorithms have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. The described functionality may be implemented in varying ways for each particular application. Various components and blocks may be arranged differently (e.g., arranged in a different order, or partitioned in a different way) all without departing from the scope of the subject technology.
It is understood that the specific order or hierarchy of steps in the processes disclosed is an illustration of example approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged. Some of the steps may be performed simultaneously. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented.
Various examples of aspects of the disclosure are described as numbered clauses (1, 2, 3, etc.) for convenience. These are provided as examples, and do not limit the subject technology. Identifications of the figures and reference numbers are provided below merely as examples and for illustrative purposes, and the clauses are not limited by those identification.
Clause 1: A system for securing a pump, comprising: a lockbox configured to enclose and prevent access to at least a user interface of an infusion pump and a medication receptacle of the infusion pump; and a lockbox control interface associated with the lockbox configured to obtain authorization for access to the lockbox from a pump communication interface of the infusion pump and enclosed within the lockbox, the lockbox control interface comprising a processor configured to: electronically couple the lockbox control interface with the pump communication interface; facilitate transmission of a wireless credential to the pump communication interface for authorization to the lockbox; receive, from the pump communication interface, the authorization for access based on the wireless credential; and cause performance of an action according to the received authorization for access.
Clause 2. The system of Clause 1, wherein the processor is further configured to: receive a user credential via the lockbox control interface; and transmit, via the lockbox control interface, the received user credential to the pump communication interface, wherein the authorization for access is received by the lockbox control interface from the pump communication interface responsive to transmitting the user credential to the pump communication interface.
Clause 3. The system of Clause 2, wherein the lockbox control interface comprises a scanner configured to receive the user credential wirelessly from a transmitting device associated with a user, the processor being further configured to: receive the user credential from a badge scanned by the scanner.
Clause 4. The system of any one of Clauses 1-3, wherein electronically coupling the lockbox control interface with the pump communication interface comprises: wirelessly pairing the lockbox control interface with the pump communication interface.
Clause 5. The system of any one of Clauses 1-4, wherein performing the action comprises: unlocking the lockbox to allow user access to the user interface and the medication receptacle.
Clause 6. The system of Clause 5, wherein the lockbox comprises at least one access door, the action further comprising: automatically opening, responsive to unlocking the lockbox, the at least one access door to expose the user interface or the medication receptacle; and automatically switching, responsive to opening the at least one access door, the user interface of the infusion pump from an off state to an activated state.
Clause 7. The system of Clause 6, wherein the lockbox comprises a housing enclosing the infusion pump and comprises a retractable multi-folding door on each side of a front face of the housing that, when closed, form a front face of the housing, the action further comprising: automatically retracting, responsive to unlocking the lockbox, the retracting multi-folding doors to expose at least a portion of a front face of the infusion pump.
Clause 8. The system of Clause 7, wherein the lockbox further comprises a retractable top that, when closed, is integrally coupled to the front face, the action further comprising: automatically opening, responsive to unlocking the lockbox, the retractable top, thereby providing user access to at least a portion of a top surface of the infusion pump.
Clause 9. The system of Clause 7, wherein the lockbox further comprises respective left and right sides configured to move in a direction away from the front face of the housing when the lockbox is unlocked, the action further comprising: automatically moving, responsive to unlocking the lockbox, the respective left and right sides, thereby providing user access to at least a portion of a left and right side of the infusion pump.
Clause 10. The system of any one of Clauses 1-9, wherein the lockbox control interface is configured to receive user input, wherein performing the action comprises activating the lockbox control interface to receive user input, and wherein the processor is further configured to: receive the user input via the activated lockbox control interface; and transmit, after the authorization for access, the user input to the pump communication interface for operation of the infusion pump in accordance with the authorization for access.
Clause 11. The system of any one of Clauses 1-10, wherein the pump communication interface comprises a scanner and is configured to receive the user credential wirelessly via the scanner from a transmitting device associated with a user, and to transmit the authorization for access based on the wireless credential to the lockbox control interface.
Clause 12. A method for securing a pump, comprising: securing at least a portion of an infusion pump within a lockbox, the lockbox configured to enclose and prevent access to at least a user interface of the infusion pump and a medication receptacle of the infusion pump, the lockbox comprising a lockbox control interface configured to obtain authorization for access to the lockbox from a pump communication interface of the infusion pump and enclosed within the lockbox; electronically coupling the lockbox control interface with the pump communication interface; facilitating transmission of a wireless credential to the pump communication interface for authorization to the lockbox; receiving, by the lockbox control interface from the pump communication interface, the authorization for access based on the wireless credential; and performing, by the lockbox control interface, an action according to the received authorization for access.
Clause 13. The method of Clause 12, further comprising: receiving a user credential via the lockbox control interface; and transmitting, by the lockbox control interface, the received user credential to the pump communication interface, wherein the authorization for access is received by the lockbox control interface from the pump communication interface responsive to transmitting the user credential to the pump communication interface.
Clause 14. The method of Clause 12, wherein the pump communication interface comprising comprises a scanner configured to receive the user credential through the lockbox wirelessly from a transmitting device associated with a user outside the lockbox, wherein the authorization for access is received by the lockbox control interface from the pump communication interface responsive to the user credential being scanned at the pump communication interface.
Clause 15. The method of any one of Clauses 12-14, wherein electronically coupling the lockbox control interface with the pump communication interface comprises: wirelessly pairing the lockbox control interface with the pump communication interface.
Clause 16. The method of any one of Clauses 12-15, wherein performing the action comprises: unlocking the lockbox to allow user access to the user interface and the medication receptacle.
Clause 17. The method of Clause 16, wherein the lockbox comprises at least one access door, the action further comprising: automatically opening, responsive to unlocking the lockbox, the at least one access door to expose the user interface or the medication receptacle; and automatically switching, responsive to opening the at least one access door, the user interface of the infusion pump from an off state to an activated state.
Clause 18. The method of Clause 17, wherein the lockbox comprises a housing enclosing the infusion pump and comprises a retractable multi-folding door on each side of a front face of the housing that, when closed, form a front face of the housing, the action further comprising: automatically retracting, responsive to unlocking the lockbox, the retracting multi-folding doors to expose at least a portion of a front face of the infusion pump.
Clause 19. The method of Clause 18, wherein the lockbox further comprises a retractable top that, when closed, is integrally coupled to the front face, the action further comprising: automatically opening, responsive to unlocking the lockbox, the retractable top, thereby providing user access to at least a portion of a top surface of the infusion pump.
Clause 20. The method of Clause 18, wherein the lockbox further comprises respective left and right sides configured to move in a direction away from the front face of the housing when the lockbox is unlocked, the action further comprising: automatically moving, responsive to unlocking the lockbox, the respective left and right sides, thereby providing user access to at least a portion of a left and right side of the infusion pump.
Clause 21. The method of any one of Clauses 12-20, wherein the lockbox control interface is configured to receive user input, wherein performing the action comprises activating the lockbox control interface to receive user input, and wherein the method further comprises: receiving the user input via the activated lockbox control interface; and transmitting, after the authorization for access, the user input to the pump communication interface for operation of the infusion pump in accordance with the authorization for access.
It is understood that the specific order or hierarchy of steps in the processes disclosed is an illustration of example approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged. Some of the steps may be performed simultaneously. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented.
The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. The previous description provides various examples of the subject technology, and the subject technology is not limited to these examples. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but is to be accorded the full scope consistent with the language claims, wherein reference to an element in the singular is not intended to mean “one and only one” unless specifically so stated, but rather “one or more.” Unless specifically stated otherwise, the term “some” refers to one or more. Pronouns in the masculine (e.g., his) include the feminine and neuter gender (e.g., her and its) and vice versa. Headings and subheadings, if any, are used for convenience only and do not limit the invention described herein.
The predicate words “configured to”, “operable to”, and “programmed to” do not imply any particular tangible or intangible modification of a subject, but, rather, are intended to be used interchangeably. For example, a processor configured to monitor and control an operation, or a component may also mean the processor being programmed to monitor and control the operation or the processor being operable to monitor and control the operation. Likewise, a processor configured to execute code can be construed as a processor programmed to execute code or operable to execute code.
The term automatic, as used herein, may include performance by a computer or machine without user intervention; for example, by instructions responsive to a predicate action by the computer or machine or other initiation mechanism. The word “example” is used herein to mean “serving as an example or illustration.” Any aspect or design described herein as “example” is not necessarily to be construed as preferred or advantageous over other aspects or designs.
A phrase such as an “aspect” does not imply that such aspect is essential to the subject technology or that such aspect applies to all configurations of the subject technology. A disclosure relating to an aspect may apply to all configurations, or one or more configurations. An aspect may provide one or more examples. A phrase such as an aspect may refer to one or more aspects and vice versa. A phrase such as an “embodiment” does not imply that such embodiment is essential to the subject technology or that such embodiment applies to all configurations of the subject technology. A disclosure relating to an embodiment may apply to all embodiments, or one or more embodiments. An embodiment may provide one or more examples. A phrase such as an “embodiment” may refer to one or more embodiments and vice versa. A phrase such as a “configuration” does not imply that such configuration is essential to the subject technology or that such configuration applies to all configurations of the subject technology. A disclosure relating to a configuration may apply to all configurations, or one or more configurations. A configuration may provide one or more examples. A phrase such as a “configuration” may refer to one or more configurations and vice versa.
As used herein a “user interface” (also referred to as an interactive user interface, a graphical user interface or a UI) may refer to a network based interface including data fields and/or other control elements for receiving input signals or providing electronic information and/or for providing information to the user in response to any received input signals. Control elements may include dials, buttons, icons, selectable areas, or other perceivable indicia presented via the UI that, when interacted with (e.g., clicked, touched, selected, etc.), initiates an exchange of data for the device presenting the UI. A UI may be implemented in whole or in part using technologies such as hyper-text mark-up language (HTML), FLASH™, JAVA™, .NET™, C, C++, web services, or rich site summary (RSS). In some embodiments, a UI may be included in a stand-alone client (for example, thick client, fat client) configured to communicate (e.g., send or receive data) in accordance with one or more of the aspects described. The communication may be to or from a medical device or server in communication therewith.
As used herein, the terms “determine” or “determining” encompass a wide variety of actions. For example, “determining” may include calculating, computing, processing, deriving, generating, obtaining, looking up (e.g., looking up in a table, a database or another data structure), ascertaining and the like via a hardware element without user intervention. Also, “determining” may include receiving (e.g., receiving information), accessing (e.g., accessing data in a memory) and the like via a hardware element without user intervention. “Determining” may include resolving, selecting, choosing, establishing, and the like via a hardware element without user intervention.
As used herein, the terms “provide” or “providing” encompass a wide variety of actions. For example, “providing” may include storing a value in a location of a storage device for subsequent retrieval, transmitting a value directly to the recipient via at least one wired or wireless communication medium, transmitting or storing a reference to a value, and the like. “Providing” may also include encoding, decoding, encrypting, decrypting, validating, verifying, and the like via a hardware element.
As used herein, the term “message” encompasses a wide variety of formats for communicating (e.g., transmitting or receiving) information. A message may include a machine readable aggregation of information such as an XML document, fixed field message, comma separated message, JSON, a custom protocol, or the like. A message may, in some implementations, include a signal utilized to transmit one or more representations of the information. While recited in the singular, it will be understood that a message may be composed, transmitted, stored, received, etc. in multiple parts.
As used herein, the term “selectively” or “selective” may encompass a wide variety of actions. For example, a “selective” process may include determining one option from multiple options. A “selective” process may include one or more of: dynamically determined inputs, preconfigured inputs, or user-initiated inputs for making the determination. In some implementations, an n-input switch may be included to provide selective functionality where n is the number of inputs used to make the selection.
As user herein, the terms “correspond” or “corresponding” encompasses a structural, functional, quantitative and/or qualitative correlation or relationship between two or more objects, data sets, information and/or the like, preferably where the correspondence or relationship may be used to translate one or more of the two or more objects, data sets, information and/or the like so to appear to be the same or equal. Correspondence may be assessed using one or more of a threshold, a value range, fuzzy logic, pattern matching, a machine learning assessment model, or combinations thereof.
In any embodiment, data generated or detected can be forwarded to a “remote” device or location, where “remote,” means a location or device other than the location or device at which the program is executed. For example, a remote location could be another location (e.g., office, lab, etc.) in the same city, another location in a different city, another location in a different state, another location in a different country, etc. As such, when one item is indicated as being “remote” from another, what is meant is that the two items can be in the same room but separated, or at least in different rooms or different buildings, and can be at least one mile, ten miles, or at least one hundred miles apart. “Communicating” information references transmitting the data representing that information as electrical signals over a suitable communication channel (e.g., a private or public network). “Forwarding” an item refers to any means of getting that item from one location to the next, whether by physically transporting that item or otherwise (where that is possible) and includes, at least in the case of data, physically transporting a medium carrying the data or communicating the data. Examples of communicating media include radio or infra-red transmission channels as well as a network connection to another computer or networked device, and the internet or including email transmissions and information recorded on websites and the like.
This application claims the benefit of and priority to U.S. Provisional Application No. 63/534,781, filed on Aug. 25, 2023, the entirety of which is incorporated herein by reference for all purposes.
Number | Date | Country | |
---|---|---|---|
63534781 | Aug 2023 | US |