Method of pairing therapy devices using shared secrets, and related systems, methods and devices

Information

  • Patent Grant
  • 12205699
  • Patent Number
    12,205,699
  • Date Filed
    Tuesday, October 29, 2019
    5 years ago
  • Date Issued
    Tuesday, January 21, 2025
    11 days ago
Abstract
Systems, methods and devices are described for establishing trusted connections among two or more therapy devices that form, or form part of, a medication therapy system. A medication delivery electronics may include a first communication interface, a connection manager, and a therapy management application. A first communication interface may be configured to establish and communicate over one or more communication links. A connection manager may be configured to generate a candidate shared secret key and provide the shared key to a first therapy device over a first communication link established by a first communication interface. A candidate shared key may be generated responsive to one or more shared secret parameters. A therapy management application may be configured to receive, using the first communication interface, the first therapy related information from the first therapy device over a first trusted communication link established by the first communication interface responsive to acceptance of a candidate shared secret.
Description
TECHNICAL FIELD

Embodiments of this disclosure relate, generally, to medication therapy systems, and more specifically, some embodiments relate to systems and methods for establishing trusted connections among two or more therapy devices that form a medication therapy system.


BACKGROUND

Medication delivery devices are commonly used to deliver medication to the human body, including as part of a medical treatment provided as a therapy for a medical condition. Medication delivery devices such as a transdermal liquid dosing device (e.g., an injection pen), inhalers, and syringes provide a convenient, often reusable means of delivering medication to the human body in fluid or aerosolized form. Infusion pumps also provide a convenient means of delivering medication to the human body in controlled amounts of fluid, and are often used when there is a desire to deliver medication in precisely calculated volumes (large and small) at precise rates and/or intervals. By way of example, medication delivery means may deliver medication intravenously, subcutaneously, arterially, and epidurally (i.e., via the epidural space around the spinal cord). Infusion pumps use a variety of techniques to deliver medication that do not require any or only a limited amount of manual manipulation. By way of example, infusion pumps may use positive displacement (e.g., a peristaltic pump, diaphragm pump, etc.), positive pressure (e.g., a drive system that advances a plunger), reciprocating positive pressure (e.g., plunger pumps that draw medication from a cartridge into a delivery chamber), and more.


One advantage of infusion pumps is that their dimensions may be such that they can be worn “on the body.” For example, on-body infusion pumps are sometimes used for subcutaneous delivery of medication—the infusion pump delivers medication via a subcutaneous cannula, and an adhesive patch secures the pump, cannula and any other elements of the infusion set at the infusion site. The adhesive helps maintain the cannula in fluidic communication with the tissue and/or vasculature of the patient so that medication may be delivered to the patient's body.


Medication delivery devices are sometimes used in combination with other therapy related devices to deliver therapeutic amounts of medication. For example, when a treatment is based, at least in part, on an amount of an analyte in a patient's blood stream. An analyte sensor may be used to detect and/or measure amounts of the analyte and provide analyte data to a user, a medication delivery device, or other therapy related devices. A therapy application may store and analyze the analyte data, plan therapy activities, provide and receive information from users (e.g., via an interface), provide recommendations to users (e.g., via an interface), and, in some arrangements, provide instructions to a medication delivery device for medication delivery.


Medication therapies can exact a toll on users that, due to dangers associated with administering external biologically effective medication (e.g., hormone, analgesics, antibiotics, nutrients, etc.), must track, plan, and calculate amounts of medication delivered. So, therapy applications can be a tremendous boon, and off-load some of the cognitive and emotional burden associated with a medication therapy.





BRIEF DESCRIPTION OF DRAWINGS

While this disclosure concludes with claims particularly pointing out and distinctly claiming specific embodiments, various features and advantages of embodiments within the scope of this disclosure may be more readily ascertained from the following description when read in conjunction with the accompanying drawings, in which:



FIG. 1 is a functional block diagram of a therapy system, which includes at least some therapy devices that are configured to establish trusted connections in accordance with one or more embodiments of the disclosure.



FIG. 2 is a flowchart of a process for establishing trusted communication links among therapy devices, in accordance with one or more embodiments of the disclosure.



FIG. 3A is a functional block diagram of medication therapy electronics configured for establishing trusted communication links in accordance with one or more embodiments of the disclosure.



FIG. 3B is a flow chart of operations for determining a candidate shared secret key using a pre-defined component and a variable component, in accordance with one or more embodiments of the disclosure.



FIG. 4 is a flowchart of a process for establishing a trusted communication link with another therapy related device, in accordance with one or more embodiments of the disclosure.



FIG. 5 is a functional block diagram of a remote therapy management system, in accordance with one or more embodiments of the disclosure.



FIG. 6 is a flowchart of a process for enforcing policies for establishing trusted communication links among therapy devices, in accordance with one or more embodiments of the disclosure.



FIG. 7 is a functional block diagram of an analyte monitoring unit configured for establishing trusted communication links, in accordance with one or more embodiments of the disclosure.



FIG. 8 is a flowchart of a process for establishing trusted communication links with a therapy device, in accordance with one or more embodiments of the disclosure.



FIG. 9 shows a functional block diagram of a therapy system that includes at least some therapy devices that are configured to establish trusted connections in accordance with one or more embodiments of the disclosure.



FIG. 10 shows a flowchart of a process for establishing a trusted communication link with another therapy related device, in accordance with one or more embodiments of the disclosure.



FIG. 11 shows an insulin therapy system configured for pairing therapy devices in accordance with one or more embodiments of the disclosure.



FIG. 12 shows an automated insulin therapy system configured for pairing therapy devices in accordance with one or more embodiments of the disclosure.



FIGS. 13A and 13B show a sequence of operations that are part of a pairing process between a BGM and an insulin delivery device, in accordance with one or more embodiments of the disclosure.





DETAILED DESCRIPTION

In the following detailed description, reference is made to the accompanying drawings, which form a part hereof, and in which are shown, by way of illustration, specific example embodiments in which the present disclosure may be practiced. These embodiments are described in sufficient detail to enable a person of ordinary skill in the art to practice the present disclosure. However, other embodiments may be utilized, and structural, material, and process changes may be made without departing from the scope of the disclosure.


It should be understood that any reference to an element herein using a designation such as “first,” “second,” and so forth does not limit the quantity or order of those elements, unless such limitation is explicitly stated. Rather, these designations are used herein as a convenient method of distinguishing between two or more elements or instances of an element. Thus, a reference to first and second elements does not mean that only two elements can be employed or that the first element must precede the second element in some manner. Also, unless stated otherwise a set of elements may comprise one or more elements. Likewise, sometimes elements referred to in the singular form may also include one or more instances of the element.


The following description may include examples to help enable one of ordinary skill in the art to practice the disclosed embodiments. The use of the terms “exemplary,” “by example,” and “for example,” means that the related description is explanatory, and though the scope of the disclosure is intended to encompass the examples and legal equivalents, the use of such terms is not intended to limit the scope of an embodiment or this disclosure to the specified components, steps, features, functions, or the like.


Sometimes therapy devices are wirelessly connected to each other to form a therapy system that is configured for medication delivery. For example, an analyte monitoring device may be wirelessly connected to a medication delivery device. While it is common for devices to connect wirelessly to form a system (e.g., a speaker connecting to a media source via BLUETOOTH®), there are specific challenges and concerns that arise in medication delivery, especially ambulatory medication delivery.


For example, for some conditions and therapies, a patient may need to carry an ambulatory medication delivery device (e.g., an infusion pump, injection pen, an inhaler, etc.) with them all times. Even if not necessary, many patients carry their drug delivery devices with them simply for convenience and risk aversion. So, a patient could take an ambulatory medication delivery device loaded with a dangerous medication, literally, anywhere in the world.


Opportunities for mis-delivery and dangerous consequences are higher when patients are being treated by a therapy system that includes a variety of therapy devices communicating with each other. For example, a patient may be treated by a therapy system that includes an analyte monitoring device, a therapy application executing on a mobile device, and a medication delivery device. In a typical operational cycle, the analyte monitoring device sends analyte measurement data to the therapy application. The therapy application performs therapy related analysis, determines changes to a medication therapy regime based on the analyte measurement data, and sends instructions to implement the changes to the medication delivery device. The medication delivery device reconfigures its medication delivery (e.g., dose amount, rate of dosing, etc.) based, at least in part, on the instructions.


If a third-party device (i.e., a therapy device that is not part of the therapy system) connects with any of the therapy devices that form the therapy system, that connection could interfere with the operation of the therapy system. The other device could be part of another therapy system, in which case the connection could interfere with operation of both therapy systems. So, even an inadvertent connection could cause information and instructions to be missed, or erroneous instructions to be sent. Moreover, the third-party device may be a malicious device that intends to capture therapy related information or even hijack operation of the therapy system and interfere with medication delivery (e.g., so called “main-in-the-middle” attacks).


Whether inadvertent or malicious, a misconnection and incorrect operation brings a significant risk of injury and death to users of therapy systems. The risk of an inadvertent or malicious connection are increased if the therapy devices are able to connect to each other and third-party devices using wireless communication links.


As used herein “a connection” and “connected” when used with references to two or more devices means that there is a communication link between two devices. The communication link may be wired, unwired (e.g., using wireless radio-frequency (RF) signals), and combinations thereof. “Connecting” means one or more operations are being taken to establish a communication link or a type of communication link, for example, operations to establish an intermediate communication link, which in turn may be used for performing one or more operations to establish a trusted communication link.


One way to restrict wireless connections is to configure devices to limit at least certain communication to a trusted connection. One of ordinary skill in the art would appreciate a number of ways to establish a trusted connection (when two devices form or have a trusted connection, that is also referred to herein as “pairing” and being “paired”), and one non-limiting example is: discovery, authentication, agreement on a communication protocol, sharing identifiers, agreement on an encryption scheme, and then agreement that the trusted connection is active.


Due to the risk of inadvertent connections and malicious connections, passwords and/or passkeys are often used when establishing trusted connections. For example, a user reads an N-digit code at a first device that is in a pairing mode, and enters the N-digit code at a second device that is in a pairing mode. The second device provides the N-digit code to the first device over a wired or wireless connection. If the first device determines that the displayed N-digit code matches the received N-digit code, then the first device approves the pairing and the first and second devices establish a trusted connection. The N-digit code is an example of a “shared secret,” which is a piece of data, known only to parties involved in setting up the trusted connection. By way of example, a shared secret may be a password, a passphrase, a big number, an array of randomly chosen bytes, and the like. In some cases, both devices will store the shared secret and, periodically, the first device will ask the second device to again provide the shared secret to the first device in order to maintain the trusted connection.


Shared-secrets are effective, but as time passes, the risk that the shared secret will be compromised grows (e.g., a third-party might see the code displayed on the first device). Further, even with a shared secret, there is the risk of a brute force attack on the device where an attacker iterates through candidate passkeys until one is accepted.


Security risks aside, in the case of medication therapies, there are social and privacy drawbacks to current pairing techniques. For example, a user may be embarrassed to look at an analyte monitoring device and program a passkey into a medication delivery device in public because it exposes their health condition to strangers. If the devices are visible, that exposes the user to risk because a malicious actor may observe the user and target the user's devices, including in the manner described above. Further, physically reading a shared secret at the first device and entering it at the second device affects the user experience, and can cause a system that is supposed to reduce cognitive burden on a user to be more burdensome. Finally, the first device that provides the passkey must include a user interface sufficient to present the passkey to a user (e.g., a display, light-emitting-diodes, a speaker).


Accordingly, the inventors of this disclosure see a need for systems, methods, and devices that securely facilitate establishing trusted connections among therapy devices that form medication therapy systems.



FIG. 1 is a functional block diagram of a therapy system 100, which includes at least some therapy devices that are configured to establish trusted connections in accordance with one or more embodiments of the disclosure. Therapy system 100 is configured, generally, to monitor a patient and deliver therapeutic amounts of medication to the patient. In one or more embodiments, therapy system 100 includes an analyte monitoring unit 102, medication therapy electronics 104, a remote therapy management system 106, and a medication delivery unit 118.


In one or more embodiments, medication therapy electronics 104 is configured, generally, to analyze therapy related information, provide therapy recommendation to users, and send therapy instructions to medication delivery unit 118. Medication therapy electronics 104 is operatively coupled to medication delivery unit 118, and, in one or more embodiments, medication therapy electronics 104 and medication delivery unit 118 are components of a medication delivery device. In one embodiment, the medication delivery device may be a “smart” medication delivery device, where the medication therapy electronics 104 provides processing power related to the therapy as well as the user experience. For example, the medication delivery device may be an infusion pump system that is configured to automatically deliver medication based on control signals determined at the pump system (e.g., at the medication therapy electronics 104). By way of further example, the medication delivery device may be an injection pen that is configured to provide therapy recommendations based on detected delivery events and/or physiological information about a patient.


In another embodiment, medication therapy electronics 104 may be, or be a component of, a first device and medication delivery unit 118 may be, or be a component of, a second device. The first and second devices may be operatively coupled by a wired or wireless connection. In one embodiment, the connection may be a trusted connection established in accordance with one or more embodiments of the disclosure.


In one or more embodiments, medication therapy electronics 104 is configured to establish a trusted communication link with one or more therapy related devices, including analyte monitoring unit 102 and/or medication delivery unit 118. In one contemplated process for establishing a trusted communication link with analyte monitoring unit 102, medication therapy electronics 104 is configured to provide a candidate shared secret key 116 over an intermediate communication link 114a to analyte monitoring unit 102. In various embodiments, candidate shared secret key 116 may be a value or string of alpha-numeric characters representative of a candidate shared secret to be validated against a shared secret that is unique to analyte monitoring unit 102. In one or more embodiments, shared secrets and candidate shared secrets may be values, strings of alpha-numeric characters, algorithms, or combination thereof. In a contemplated operation of therapy system 100 candidate shared secret key 116 is used, but it is specifically contemplated that there may be multiple pairs of therapy related devices within a therapy system that use different unique shared secrets, candidate shared secrets, and candidate shared secret keys to establish trusted connections. In one embodiment, a shared secret may be unique to therapy system 100 (e.g., a therapy system identifier, algorithm, or combination thereof), and so the same shared secret, candidate shared secret, and candidate shared secret key may be used to establish trusted communication links between some or all of the therapy devices that comprise therapy system 100.


Turning back to the example of FIG. 1, in one or more embodiments, medication therapy electronics 104 provides candidate shared secret key 116 responsive to shared secret parameters that it requests and receives from remote therapy management system 106 over communication network 108. If analyte monitoring unit 102 accepts candidate shared secret key 116, or more specifically, if the analyte monitoring unit 102 verifies the candidate shared secret based, at least in part, on the candidate shared secret key 116, then a trusted communication link is established between analyte monitoring unit 102 and medication therapy electronics 104.


In one embodiment, establishing a trusted communication link includes recording at both devices that intermediate communication link 114a is a trusted communication link. In another embodiment, intermediate communication link 114a is ended and a new communication link 114b is established with trusted communication characteristics (e.g., protocol, encryption, etc.). In various embodiments, the trusted communication link 114b may use the same or different communication equipment (e.g., transceivers configured for BLUETOOTH®, ZIGBEE®, NFC, etc.) as intermediate communication link 114a.


In various embodiments, medication therapy electronics 104 may be configured to communicate over intermediate communication link 114a and trusted communication links, 114b as well as over communication network 108, and may include equipment for several types of communication.


In one or more embodiments, remote therapy management system 106 may execute on one or more computer servers remote from one or more other therapy devices, such as the medication therapy electronics 104, analyte monitoring unit 102, and medication delivery unit 118. The other therapy related devices may be carried with a user, while the remote therapy management system 106 operates remotely and provides services to devices within the therapy system 100.


In one embodiment, medication therapy electronics 104 sends a shared secret parameters request 112 to remote therapy management system 106. Remote therapy management system 106 receives shared secret parameters request 112 and sends response 110. Response 110 may include, for example, the requested shared secret parameters or a denial message denying the request 112. Medication therapy electronics 104 generates candidate shared secret key 116 responsive to shared secret parameters in the response 110.


Analyte monitoring unit 102 is configured to receive candidate shared secret key 116, and sends an acceptance or rejection message (not shown) over intermediate communication link 114a responsive to candidate shared secret key 116.



FIG. 2 is a flowchart of a process 120 for establishing a trusted communication among therapy devices, in accordance with one or more embodiments of the disclosure. In operation 121, a candidate shared secret is generated responsive to one or more shared secret parameters. In operation 122, the candidate shared secret key is provided to a therapy device over an intermediate communication link. Candidate shared secret key is representative of one or more candidate shared secrets at a therapy device. In operation 123, a trusted communication link is established with a therapy device responsive to the therapy device accepting a candidate shared secret. In various embodiments and as described more fully herein, a candidate shared secret may be validated based, at least in part, on a candidate shared secret key. The trusted communication link is configured to enable communication of therapy related information from the first therapy device, so, in operation 124, first therapy related information is received from the first therapy device over the trusted communication link.



FIG. 3A is a functional block diagram of medication therapy electronics 104, in accordance with one or more embodiments of the disclosure. Medication therapy electronics 104 includes a connection manager 131, a shared secret key calculator 133, a therapy management application 137, and a user interface 138. Medication therapy electronics 104 also includes a network communication interface 130 and a therapy communication interface 136.


Connection manager 131 is configured, generally, to manage establishing one or more communication links with therapy related devices, including, for example, trusted and untrusted (e.g., intermediate) communication links. Connection manager 131 is configured to use network communication interface 130 to send shared secret parameter requests 112 from remote therapy management system 106 (FIG. 1), send one or more shared secret parameters 132 to shared secret key calculator 133 for processing, and to send candidate shared secret keys 134 from shared secret key calculator 133. Connection manager 131 is configured to receive candidate shared secret key 134 and provide candidate shared secret key 134 to a therapy related device (e.g., analyte monitoring unit 102 of FIG. 1) via therapy communication interface 136.


In one or more embodiments, network communication interface 130 may be configured to send requests to, and receive response messages from, remote therapy management system 106 (FIG. 1) over one or more networks, which may include, at least in part, the Internet. By way of example and not limitation, network communication interface 130 may be configured for wireless network communication (e.g., an IEEE 802.11 standard), cellular network communication (e.g., 3G, 4G LTE, 5G, CDMA, GSM etc.), microwave network communication, and combinations thereof.


Therapy communication interface 136 may be configured for personal, local, and/or wide-area network communication with a related therapy device. By way of example, and not limitation, therapy communication interface 136 may be configured for BLUETOOTH communication (including BLUETOOTH Low Energy (BLE)), NFC (near field communication), WiFi, ZIGBEE, IrDA (infrared data association), wireless USB (universal serial bus), combinations thereof, and more.


Shared secret key calculator 133 is configured to receive shared secret parameters 132 and provide candidate shared secret key 134. In one or more embodiments, shared secret key calculator 133 is configured to generate candidate shared secret key 134 responsive to shared secret parameters 132 and one or more secret operations. In one embodiment, shared secret key calculator 133 may be pre-configured to perform secret operations, and in another embodiment shared secret key calculator 133 may perform secret operations responsive to secret operation instructions that are included with the shared secret parameters 132.


In various embodiments, one or more shared secret parameters and/or secret operations may be a contemplated shared secret.



FIG. 3B shows a flow chart of a shared secret calculation process 140, in accordance with one or more embodiments of the disclosure. Secret operations 143 are performed responsive to a pre-defined component 141 and a variable component 142. In one embodiment, pre-defined component 141 may be a unique identifier that is associated with the therapy related device with which a trusted communication link is being established. By way of example, unique identifier may be a serial number that is associated with the therapy related device at manufacture or an identifier generated by a remote therapy system. Variable component 142 may be non-static, that is, it may change each time the shared secret calculation process 140 is performed. By way of example, variable component 142 may be time-based—e.g., a time (e.g., “4:28:09”) or calculated using a specific time (e.g., “4:28:09”→4×28×09=1008). If calculated using a specific time, that time may be stored (e.g., in a time stamp format) and sent with the candidate shared secret key 134.


In one embodiment, pre-defined component 141 and variable component 142 are both received by shared secret key calculator 133 (see FIG. 3A) as part of shared secret parameters 132. In another embodiment, shared secret key calculator 133 may be include a variable component calculation module (e.g., a clock circuitry, calculation circuitry, random number generator, etc.) configured to generate variable component 142.


In one or more embodiments, secret operations 143 may be a one-way function configured to obfuscate its input parameters (e.g., pre-defined component 141 and variable component 142). Secret operations 143 may be performed using pre-defined component 141 and variable component 142. In one embodiment, each of pre-defined component 141 and variable component 142 may be a parameter of secret operations 143. In another embodiment, secret operations 143 may use a post-processed parameter that is based, at least in part, on pre-defined component 141 and variable component 142 (e.g., a combination of the two parameters using concatenation, exclusive OR, multiplication, etc.).


In one or more embodiments, secret operations 143 is a hashing function, shared secret parameters 132 is a hash key, and candidate shared secret key 134 is a hash. Shared secret key calculator 133 is configured to generate the hash by hashing the hash key using the hashing function. By using both the pre-defined component 141 and variable component 142, a correct candidate shared secret key 134 is harder to recover illicitly without knowing how the variable component affects secret operations 143.


In one or more embodiments, therapy management application 137 (see FIG. 3A) may be configured, generally, to receive therapy related information (e.g., analyte measurements), and provide one or more of therapy recommendations and therapy instructions. User interface 138 may be configured to provide therapy recommendations generated by therapy management application 137 to a user and receiver user input. In one or more embodiments, user interface 138 may be a graphical user interface presentable at a display operably coupled to medication therapy electronics 104 (see FIG. 1), that is configured to present therapy recommendations and/or therapy related information to a user. By way of example, and not limitation, therapy related information may include notifications, alarms, alerts, combinations thereof, and more. Therapy recommendations may include one or more of changes to medication dosing parameters, recommended bolus doses, recommended correction doses, dietary recommendations (e.g., to eat), physiological recommendations (e.g., sleep or exercise) and more. User input may include approvals, acknowledgements, dismissals, information about therapy relevant events, physiological information, parameters for medication therapies, and more.



FIG. 4 shows a flowchart of a process 150 for establishing a trusted communication link with another therapy related device, in accordance with one or more embodiments of the disclosure. In one or more embodiments, operations of process 150 may be performed at medication therapy electronics 104 (see FIG. 1), and is one contemplated operation of medication therapy electronics 104. In operation 151, remotely stored shared secret parameters are requested from a remote therapy management system. In one embodiment, shared secret parameters are received in a reply message from the remote therapy system. If the remote therapy management system rejects the request or fails to find the requested shared parameters, a reply message may be received indicating that the request was rejected or the system failed. In operation 152, a candidate shared secret key is generated responsive to received one or more shared secret parameters and at least one shared secret operation. The shared secret parameters may be a unique identifier, and, in one embodiment, may include a variable component as described in this disclosure. Shared secret operations may be locally stored or may be remotely stored and received with the shared secret parameters. In operation 153, a candidate shared secret key is provided to the therapy related device. The candidate shared secret key may be provided over an intermediate communication link. By way of example, the intermediate communication link may be an untrusted communication link, a temporary communication link used for establishing a trusted communication link, or a combination thereof. In operation 154, a trusted communication link is established with the therapy related device responsive to an acceptance of a candidate shared secret. The trusted communication link enables receipt of therapy related information from the therapy related device.



FIG. 5 shows a functional block diagram of remote therapy management system 106, in accordance with one or more embodiments of the disclosure. Remote therapy management system 106 is configured, generally, to manage records related to therapy system 100 (see FIG. 1) and monitor aspects of operation of therapy system 100 and therapeutic delivery of medication more generally. In one or more embodiments, remote therapy management system 106 is configured to monitor and manage therapy system 100 responsive to one or more therapy related policies 162. Therapy related policies 162 may include, for example, restrictions on the number and kinds of therapy related devices that may be part of therapy system 100, as well as physical and operational requirements (e.g., security, updates, etc.) for therapy related devices that may be part of therapy system 100.


In one or more embodiments, remote therapy management system 106 may include a parameters request manager 166, a therapy system policy enforcer 163, therapy system records 161, and therapy related policies 162.


In one or more embodiments, parameters request manager 166 may be configured, generally, to manage parameter requests 167 for shared secret parameters received from therapy related devices that are attempting to establish trusted communication links. In one embodiment, parameter request manager 166 may be configured to provide one or more group identifiers 165 to therapy system policy enforcer 163 responsive to receiving a parameter request 167 for shared secret parameters. Group identifiers 165 may be unique identifiers that describe one or more groups of therapy related devices that form medication therapy system. In one embodiment, a group identifier 165 may be a string of digits or characters. In another embodiment, a group identifier 165 may be a patient's name or a string associated with a patient's name (e.g., an anonymizing identifier). In one embodiment, group identifiers 165 may for one or more of the therapy related devices that are attempting to establish a trusted communication link.


Therapy system policy enforcer 163 may be configured, generally, to enforce therapy related policies 162. More particularly, therapy system policy enforcer 163 may be configured to enforce therapy related policies 162 related to forming medication therapy systems from a group of therapy related devices, and more specifically still, to establishing trusted communication links among therapy related devices. So, when a therapy related device requests shared secret parameters, therapy system policy enforcer 163 may be configured to determine whether establishing a trusted communication link would violate one or more therapy related policies 162. For example, if the requesting therapy related device is attempting to establish a trusted communication link with an analyte monitoring unit, therapy system policy enforcer 163 may be configured to reject the request if the therapy system records 161 indicate that the requesting therapy related device already has an active trusted communication link with another, different, analyte monitoring unit. By way of another example, if the requesting therapy related device is attempting to establish a trusted communication link with an analyte monitoring unit, therapy system policy enforcer 163 may be configured to reject the request if the therapy system records 161 indicate that the analyte monitoring unit already has an active trusted communication link with another, different, therapy related device or has reached a maximum number of active trusted communication links with other, different, therapy related devices. By way of yet another example, if the requesting therapy related device is attempting to establish a trusted communication link with an analyte monitoring unit, therapy system policy enforcer 16 may be configured to reject the request if the requesting therapy related device and the other therapy related device are not compatible. For example, therapy related policies 162 may describe lists of compatible types of devices (or, conversely, lists of incomputable devices), and if the requesting therapy related device and the other therapy related device are not compatible then therapy system policy enforcer 16 may be configured to reject the request.


In the contemplated example of FIG. 5, if therapy system policy enforcer 163 determines that the trusted communication link would not violate one or more of therapy related policies 162, then it may retrieve the shared secret parameters responsive to group identifiers 165, therapy system records 161, and the policy determination. Therapy system policy enforcer 163 may provide the shared secret parameters 164 to parameters request manager 166, which in turn may generate and send a reply message to the requesting therapy related device, and the reply message may include shared secret parameters 164. If the request is rejected or fails (e.g., because no relevant therapy system records 161 may be found responsive to group identifiers 165), then the reply message may indicate the rejection or failure.


Therapy system records 161 may include records stored in a database that are related to one or more medication therapy systems. Therapy system records 161 may describe therapy related devices that form a medication therapy system, including identifiers, type of devices, patient information, insurance information, provider information, and more.



FIG. 6 is a flowchart of a process 170 for enforcing policies for establishing trusted communication links among therapy devices, in accordance with one or more embodiments of the disclosure. In one or more embodiments, operations of process 170 may be performed at remote therapy management system 106, and is one contemplated operation of remote therapy management system 106. In operation 171, a request for shared secret parameters is received. The request may be received from a first therapy device that is attempting to establish a trusted communication link with a second therapy device. In operation 172, a reply message is sent responsive to the request for shared secret parameters. The contents of the reply message may be selected responsive to one or more therapy system policies and/or searches of therapy system records, and may include, for example, shared secret parameters or a denial message. The therapy system policies and therapy system records may be managed at one or more databases. Therapy system policies may describe restrictions that apply to therapy devices and groups of therapy devices. Therapy system records may describe individual therapy devices and groups of therapy devices that form medication therapy systems.



FIG. 7 is a functional block diagram of analyte monitoring unit 102, in accordance with one or more embodiments of the disclosure. Analyte monitoring unit 102 is configured, generally, to measure analyte levels in blood samples and send the measurements to therapy related devices that, together with analyte monitoring unit 102, may be part of a medication therapy systems. One or more embodiments of analyte monitoring unit 102 may include a monitoring unit connection manager 181, a monitoring unit communication interface 183, and analyte sensors 184.


Monitoring unit communication interface 183 is configured, generally, to send and receive messages to and from other therapy related devices, for example, over trusted and/or untrusted communication links. In one or more embodiments, messages sent by monitoring unit communication interface 183 may include one or more of analyte measurement information received from analyte sensors 184, and status information about analyte monitoring unit 102 (e.g., battery life, component health, etc.). Monitoring unit communication interface 183 may also be configured to send and receive messages related to establishing trusted communication links with other therapy related devices.


Monitoring unit connection manager 181 is configured, generally, to manage establishment of trusted communication links with other therapy related devices. Monitoring unit connection manager 181 may include or have access to primary shared secrets 182 stored at analyte monitoring unit 102. In a contemplated operation of analyte monitoring unit 102, when a therapy device attempts to establish a trusted communication link with analyte monitoring unit 102, monitoring unit connection manager 181 is configured to validate a candidate shared secret responsive to candidate shared secret key 186 and primary shared secrets 182.


In one or more embodiments, primary shared secret manager 187 is configured to generate and provide primary shared secret parameters 182 to monitoring unit connection manager 181. In one embodiment, primary shard secret manager 187 stores one or more primary shared secret parameters that it provides to connection manager 181. In one contemplated operation, the primary shared secret parameters may include a unique identifier (e.g., a string of alpha numeric characters), a decryption key, and an encrypted string (e.g., cyphertext) that was generated based, at least in part, on the unique identifier, an encryption algorithm corresponding to the decryption algorithm, and an encryption key. Connection manager 181 may decrypt the encrypted string using the decryption algorithm and the candidate shared secret key 186. In a contemplated operation, if the decrypted string matches the unique identifier than that is indicative that a candidate shared secret matches a primary shared secret of the analyte monitoring unit 102. The primary shared secret may be a unique identifier, a hash function, or both.


In another embodiment, primary shared secret parameters 182 may be a primary shared secret key generated by primary shared secret manager 187. Primary shared secret manager 187 may perform secret operations with a unique identifier to generate a primary key, and provide the primary key to connection manager 181 to compare the primary key to candidate shared secret key 186. In a case where candidate shared secret key 186 matches the primary key then that is indicative that the primary secret operations and primary shared secret parameters are the same as the ones used to generate candidate shared secret key 186. For example, the secret operations performed at primary shared secret manager 187 may be the same hashing function or other one-way function performed at shared secret key calculator 133 (see FIG. 3A). In a case where candidate shared secret key 186 does not match a primary key, then any of the secret operations and shared secret parameters may be different than those used to generate candidate shared secret key 186.


Any suitable technique known by one of ordinary skill in the art may be used by monitoring unit connection manger 181 to perform comparisons described herein. For example, a symbol-to-symbol comparison, bit-to-bit comparison, converting to an integer (e.g., if they are strings) and comparing integer values, and the like.



FIG. 8 is a flowchart of a process 190 for establishing trusted communication links with a therapy device, in accordance with one or more embodiments of the disclosure. In one or more embodiments, operations of process 190 may be performed at analyte monitoring unit 102 (see FIG. 1 and/or FIG. 7). In operation 191, an intermediate communication link is established with a therapy device that is attempting to establish a trusted communication link. In operation 192, a request for a shared secret is sent to the therapy device over the intermediate communication link. In operation 193, a candidate shared secret key is received from the therapy device over the intermediate communication link. In one embodiment, a countdown is implemented and if the candidate shared secret key is not provided within a certain amount of time, the request “times out” and a candidate shared secret is automatically rejected. This avoids a problem whereby the requesting therapy device is waiting in an active intermediate mode, which may happen if the requesting therapy device fails to receive shared secret parameters from a remote therapy management system. In operation 194, a candidate shared secret is validated responsive to a primary shared secret. In various embodiments, the primary shared secret or values indicative of it may be stored or calculated locally. In operation 195, a trusted communication link is established with the requesting therapy device responsive to the comparison. For example, if a candidate shared secret matches a primary shared secret then an acceptance message is provided to the requesting therapy device. If a candidate shared secret does not match a primary shared secret then a rejection message is provided to a requesting therapy device. Once the trusted communication link is established, therapy related information may be sent between therapy devices. For example, analyte monitoring unit 102 may send analyte measurement data 326 to a therapy related device that includes without limitation medication therapy electronics 104.


One or more embodiments relate, generally, to a process for establishing trusted connections that may be performed by therapy devices using shared secrets stored or determined locally, and systems and devices for accomplishing the same.



FIG. 9 is a functional block diagram of therapy system 300 that includes at least some therapy devices that are configured to establish trusted connections in accordance with one or more embodiments of the disclosure. Therapy system 300 is configured, generally, to monitor a patient and deliver therapeutic amounts of medication to the patient. In one or more embodiments, therapy system 300 includes an analyte monitoring unit 302, medication therapy electronics 312, and a medication delivery unit 328.


Notably, a remote therapy system is not shown as part of therapy system 300 because, in one or more embodiments, medication therapy electronics 312 is configured to store and/or calculate the shared secret locally. Nevertheless, one of ordinary skill in the art would understand that therapy system 300 may include remote therapy management elements.


In one or more embodiments, medication therapy electronics 312 includes a connection manager 314, a shared secret manager 316, a communication interface 318, and a therapy management application 320. In one embodiment, shared secret manager 316 is configured to retrieve a locally stored candidate shared secret key 322 responsive to a request to provide a shared secret from analyte monitoring unit 302, and connection manager 314 is configured to provide candidate shared secret key 322 to analyte monitoring unit 302. Candidate shared secret key 322 may be, for example, a hash of a unique identifier associated with analyte monitoring unit 302.


In one or more embodiments, shared secret manager 316 is configured to determine candidate shared secret key 322. In one embodiment, a secret and one or more secret operations are stored at medication therapy electronics 312. By way of example, the secret may be a hash key and the secret operations may be a hashing function. Shared secret manager 316 determines candidate shared secret key 322 by performing secret operations using secrets as a parameter.


In one or more embodiments, a secret may be static, for example, it may be a unique identifier associated with analyte monitoring unit 302. In one or more embodiments, the secret operations may be configured to use at least two parameters: a static component (e.g., a unique identifier) and a variable component (e.g., a time), such that the candidate shared secret key 322 is different for different variable components. In yet another embodiment, the secret may be a combination of a unique identifier and a variable component.


In one or more embodiments, analyte monitoring unit 302 may include monitoring unit connection manager 304, primary shared secret manager 306, monitoring unit communication interface 308, and analyte sensors 310. Monitoring unit connection manager 304 is configured to validate a candidate shared secret based, at least in part, on candidate shared secret key 322 responsive to a primary shared secret provided by primary shared secret manager 306, for example, by comparing candidate shared secret key 322 to a primary shared secret or a primary shared secret key generated using a primary shared secret.


In one embodiment, analyte monitoring unit 302 may store a primary shared secret. In another embodiment, primary secret parameters and secret operations may be stored at analyte monitoring unit 302, and primary shared secret manager 306 may be configured to determine a primary shared secret or a primary shared secret key, at least in part, using secret operations. In the example of FIG. 8, if secret operations and a secret key used by primary shared secret manager 306 are the same as secret operation(s) and a secret key(s) used by shared secret manager 316 of medication therapy electronics 312 to generate candidate shared secret key 322, then primary shared secret key will match candidate shared secret key 322. If a candidate shared secret is validated at least in part using candidate shared secret key 322, then analyte monitoring unit 302 is configured to send an acceptance message to medication therapy electronics 312, and the two devices may establish trusted communication link 324b.


Notably, candidate shared secret key 322 may also include a variable component if used to generate it, for example, a time stamp. Primary shared secret manager 306 may generate a primary shared secret or primary shared secret key responsive to a variable component, primary secret operations, and primary shared secret parameters.



FIG. 10 is a flowchart of a process 330 for establishing a trusted communication link with another therapy related device, in accordance with one or more embodiments of the disclosure. In one or more embodiments, operations of process 330 may be performed at medication therapy electronics 312, and is one contemplated operation of medication therapy electronics 312. In operation 332, a candidate shared secret key is generated responsive to one or more locally stored shared secret parameters and locally stored shared secret operations. In various embodiments, the shared secret parameters may include static components, variable components, and/or secret operations. In operation 334, a candidate shared secret key is provided to a therapy related device over an intermediate communication link 324a. In operation 336, a trusted communication link is established with the therapy related device responsive to an acceptance of a candidate shared secret. Acceptance may be communicated responsive to validating a candidate share secret using a candidate shared secret key. In one or more embodiments, a trusted communication link is configured to enable receipt of therapy related information from the therapy device.


One or more embodiments of the disclosure relate to insulin therapy systems configured to implement pairing techniques described in this disclosure.


Diabetes mellitus is a chronic metabolic disorder caused by the inability of a person's pancreas to produce sufficient amounts of the hormone insulin such that the person's metabolism is unable to provide for the proper absorption of sugar and starch. This failure leads to hyperglycemia, i.e., the presence of an excessive amount of glucose within the blood plasma. Persistent hyperglycemia has been associated with a variety of serious symptoms and life threatening long-term complications such as dehydration, ketoacidosis, diabetic coma, cardiovascular diseases, chronic renal failure, retinal damage and nerve damages with the risk of amputation of extremities. Because healing is not yet possible, a permanent therapy is necessary which provides constant glycemic control in order to constantly maintain the level of blood analyte within normal limits. Such glycemic control is achieved by regularly supplying external drugs to the body of the patient to thereby reduce the elevated levels of blood analyte.


An external biologically effective drug (e.g., insulin or its analog) is commonly administered by means of daily injections. In some cases, multiple, daily injections (MDI) of a mixture of rapid- and long-acting insulin via a reusable transdermal liquid dosing device (commonly referred to as an “insulin pen”) or a hypodermic syringe. The injections are typically administered by a person with diabetes (PWD), and so requires self-monitoring of blood glucose and the self-administration of insulin. The PWD that manages their care using MDI often plans insulin injections for each day, in advance, based on basal insulin requirement as well as external factors such as meals, exercise, sleep, etc. A typical dosing plan will include the time of day for an injection, the type of insulin (e.g., fast acting, long acting, a mixture of fast acting and long acting, etc.), and amount of insulin for each dose. In addition, PWDs will self-monitor their blood glucose and self-administer “bolus” dose(s) of rapid-acting insulin if their blood glucose is too high or consume carbohydrates (or sometimes administer glycogen) if their blood glucose is too low.


The “correct” insulin dose is a function of the level of glucose in the blood, physiological factors such as a person's insulin sensitivity, and lifestyle factors such as meals (e.g., recently consumed carbohydrates that have yet to be metabolized into glucose and absorbed into the blood). Moreover, even with careful planning and self-monitoring, a PWD may skip doses, double dose, and dose the wrong amount and/or type of insulin. Insufficient insulin can result in hyperglycemia, and too much insulin can result in hypoglycemia, which can result in clumsiness, trouble talking, confusion, loss of consciousness, seizures, or death. Accordingly, PWDs face a considerable cognitive burden in determining appropriate doses of insulin.


In order to assist with self-treatment, some insulin therapy devices (e.g., blood glucose meters, continuous glucose meters, insulin pumps, insulin pens etc.) are equipped with insulin therapy applications that assist user with making appropriate therapy decisions while minimizing the burdens of data entry, mental calculations, procedures, etc.). For example, insulin bolus calculators may be used that have the user input an estimate (e.g., numerical estimate) of the quantity of carbohydrates consumed or about to be consumed (or additionally or alternatively protein, fat, or other meal data) and the bolus calculator outputs a recommended size for the insulin bolus dosage. Although bolus calculators remove some of the mental calculations that need to be made by the user in determining an appropriate insulin bolus dosage, bolus calculators still burden the user with the mental task of evaluating the constituents of their meal, may require the use of a secondary device, and often require manual entry of data.


Automated insulin delivery may also be used to relieve some of the burdens of self-treatment. A glucose monitoring unit measures levels of glucose in blood samples and sends at least some of the measurements to a therapy application that is monitoring patient's response to insulin therapy. The therapy application determines insulin dosing (e.g., amount, timing, rates of insulin, etc.) dosing to account for a patient's basal insulin needs as well as to account for physiological events such as carbohydrate intake, exercise, sleep, medication intake (other than insulin), and more. The therapy application uses glucose levels received from the glucose monitoring unit as a control variable to determine insulin dosing instructions that it then sends to an insulin delivery device, such an infusion pump. The operation of the insulin delivery device is configured by the insulin dosing instructions and the insulin delivery device will then deliver insulin according to the new configuration. Insulin therapy systems that implement automated insulin delivery may operate in “open loop” modes and “closed loop” modes. By way of example, in an open loop mode, the insulin therapy system may involve some user interaction before sending the insulin delivery instructions 326 to the insulin delivery device (e.g., a user acceptance of change). In a closed loop mode, the therapy application may determine and automatically send the insulin delivery instructions 326 to the insulin delivery device without user interaction.



FIG. 11 shows an insulin therapy system 400 configured for pairing in accordance with one or more embodiments of the disclosure. Insulin therapy system 400 includes a blood glucose meter (BGM) 402, an insulin injection pen 404, and a mobile computing device 406 with an insulin therapy application executing thereon.


In one or more embodiments, insulin injection pen 404 and BGM 402 are configured for pairing in accordance with the embodiments for establishing a trusted communication link described in this disclosure. In one embodiment, a shared secret is locally stored at BGM 402, and upon request, insulin injection pen 404 is configured to provide a candidate shared secret to BGM 402 in order to pair with BGM 402 and start receiving glucose level measurement data from BGM 402. If insulin injection pen 404 fails to provide candidate shared secret 410 or BGM 402 does not validate candidate shared secret 410 (e.g., using its stored primary shared secret, or using a shared secret key and secret operations), pairing will fail and trusted communication link 408 will not be established.


In one or more embodiments, mobile computer device 406 and insulin injection pen 404 are configured for pairing in accordance with the embodiments for establishing a trusted communication link described in this disclosure. In one embodiment, a shared secret is locally stored at insulin injection pen 404, and upon request, mobile computing device 406 is configured to provide a candidate shared secret 414 in order to pair with insulin injection pen 404 and start receiving insulin dosing event information from insulin injection pen 404. If mobile computing device 406 fails to provide candidate shared secret 414 or if insulin injection pen 404 does not validate candidate shared secret 410 against its stored primary shared secret, pairing will fail and trusted communication link 412 will not be established.



FIG. 12 shows an automated insulin therapy system 500 configured for pairing in accordance with one or more embodiments of the disclosure. Automated insulin therapy system 500 includes a continuous glucose monitor (CGM) 502, an insulin infusion pump 506, and a mobile computing device 504 with an insulin therapy application executing thereon. Automated insulin therapy system 500 may be configured for open loop and closed loop delivery of insulin to a patient.


In one or more embodiments, insulin infusion pump 506 and CGM 502 are configured for pairing in accordance with the embodiments for establishing a trusted communication link described in this disclosure. In one embodiment, a shared secret is locally stored at CGM 502, and upon request, insulin infusion pump 506 is configured to provide a candidate shared secret 510 to CGM 502 in order to pair with CGM 502 and start receiving glucose level measurement data from CGM 502. If insulin infusion pump 506 fails to provide candidate shared secret 510 or CGM 502 does not validate candidate shared secret 510 (e.g., using its stored primary shared secret, or using a shared secret key and secret operations), pairing will fail and trusted communication link 508 will not be established.


By using the process for establishing trusted communication links, mobile computing devices and infusion pumps that are not part of automated insulin therapy system 500 may be restricted from receiving blood glucose level measurement data from CGM 502.


In one or more embodiments, mobile computer device 504 and insulin infusion pump 506 are configured for pairing in accordance with the embodiments for establishing a trusted communication link described in this disclosure. In one embodiment, a shared secret is locally stored at insulin infusion pump 506, and upon request, mobile computing device 504 is configured to provide a candidate shared secret 514 in order to pair with insulin infusion pump 506 and start receiving insulin dosing event information from insulin infusion pump 506. If mobile computing device 504 fails to provide candidate shared secret 514 or if insulin infusion pump 506 does not validate candidate shared secret 514 against its stored primary shared secret, pairing will fail and trusted communication link 512 will not be established. By using the process for establishing trusted communication links, mobile computing devices that are not part of automated insulin therapy system 500 may be restricted from receiving insulin dosing event information from insulin infusion pump 506 and sending insulin dosing instructions to insulin infusion pump 506.



FIGS. 13A and 13B show a sequence of operations that are part of a pairing process 600 performed by a BGM 608, mobile application 604, and insulin delivery device 606 (e.g., an insulin injection pen, medication delivery accessory such as a pen cap, an insulin infusion pump, etc.) that together form, at least in part, an insulin therapy system, in accordance with one or more embodiments of the disclosure. One or more operations of pairing process 600 may be performed by a user 602 of the insulin therapy system. In one or more embodiments, operations indicated as performed by a user may be performed by a user action to activate GUI elements, actuate buttons, speaking voice commands, physically performing pre-defined motions (e.g., waiving a device near another device), etc. Performing the user action(s) initiates some recognition of the action and therefore the operation(s) at a device that is acted on. However, this is not intended to limit this disclosure to requiring a specific user action(s). For example, one or more embodiments may include a recognition of a user action or what is assumed to be a user action, but not the user action itself.


In operation 610, user 602 provides BGM pairing instruction to mobile application 604. In operation 612, mobile application 604 provides a BGM pairing instruction to insulin delivery device 606 responsive to the BGM pairing instruction received in operation 610. Pairing operations between insulin delivery device 606 and BGM 608 are initiated by insulin delivery device 606 and BGM 608 “discovering” each other. In operation 614, insulin delivery device 606 enters a scanning mode responsive to receiving the BGM pairing instruction in operation 612, and scans for advertising messages. In operation 616, user 602 provides an advertise instruction to BGM 608, for example, but actuating a button for some pre-defined period of time. In operation 618, BGM enters and advertising mode and sends advertisement messages that may be received by nearby devices. In operation 620, insulin delivery device 606 sends to mobile application 604 an available BGM list comprising one or more identifiers for available BGM devices (e.g., unique BGM devices for which advertisement messages have been received in the most recent scan mode period), including an identifier for BGM 608. In operation 622, mobile application 604 presents the available BGM list at a display for user 602. In operation 624, user 602 provides a BGM selection to mobile application 604, the BGM selection uniquely identifying one of the BGM devices listed in the BGM list. In operation 626, responsive to the selection, mobile application 604 provides a connection instruction to insulin delivery device 606 that, at least in part, identifies the selected BGM device—here, BGM 608.


In operation 628, insulin delivery device 606 provides a connection request to BGM 608 responsive to receiving the connection instruction in operation 626. In operation 630, insulin delivery device 606 provides a read device information service (DIS) request (or some other request for identifying information, without limitation) to BGM 608. In operation 632, BGM 608 provides DIS information (or other identifying information, without limitation) to insulin delivery device 606 responsive to the read DIS request in operation 630.


In operation 634, insulin delivery device 606 provides a read time request to BGM 608. In one embodiment, BGM 608 provides stored time information (e.g., in seconds) to insulin delivery device 606 in operation 640, responsive to the read time request in operation 634. In another embodiment, BGM 608 may determine in operation 636 whether the stored time is usable or unusable (e.g., because it is incorrect). Responsive to a determination that the stored time is usable, BGM 608 may provide the time in seconds in operation 640. Responsive to a determination that the stored time is not usable, BGM 608 may provide the seconds elapsed since last battery insertion in operation 638.


In operation 642, insulin delivery device 606 generates a passkey responsive to the time information received in operations 640 (or in operation 638) and the DIS information received in operation 632. At about the same time as operation 642, in operation 644 BGM 608 generates a passkey responsive to the time information sent in operation 640 and the DIS information sent in operation 632.


In operation 646, insulin delivery device 606 provides a connection security start request to BGM 608 to attempt to establish a trusted communication link between insulin delivery device 606 and BGM 608. In operation 648, insulin delivery device 606 provides an authentication request that includes a public key “pka” to BGM 608. In operation 650, BGM 608 provides a public key “pkb” to BGM 608 responsive to receiving the authentication request in operation 648. Up receipt of “pkb,” insulin delivery device 606 and BGM 608 may send and receive messages using public key encryption.


In operation 652, insulin delivery device 606 generates DHkey, which is a candidate shared secret, in accordance with tone or more processes for generating candidate shared secrets of this disclosure. In operations 654 and 656, insulin delivery device 606 provides a verification request to BGM 608 that includes DHKey encrypted using the public encryption keys “pka” and “pkb.”


In operation 658, BGM 608 determines whether DHkey is a valid key or an invalid key in accordance with one or more processes for validating candidate shared secrets of this disclosure. Responsive to determining that DHkey is an invalid key, in operation 676 BGM 608 provides a connection security failure response to insulin delivery device 606, and in operation 678 BGM 608 sends a disconnect message to insulin delivery device 606 to end the untrusted communication link, and terminates the link locally. In operation 680, insulin delivery device 606 sends a connection failure message to mobile application 604, which, in one or more embodiments, presents a failure message to user 602.


Responsive to determining that DHkey is a valid key, in operation 662, BGM 608 sends a connection successful message to insulin delivery device 606 and stores the DHkey in operation 666. In operation 664, insulin delivery device 606 stores the DHkey responsive to receiving the connection successful message provided in operation 662. In operation 674, insulin delivery device 606 provides a connection successful message to mobile application 604.


In one or more embodiments, insulin delivery device 606 and BGM 608 may be configured to continuously perform a truncated authentication process 668 while the trusted communication link is active. In operation 670, insulin delivery device 606 may provide a request to continue the trusted communication link to BGM 608. The request may include DHkey or a new key that is the result of modifying DHkey according to some pre-agreed operations. In operation 672, BGM 608 may provide a response message indicating that the truncated authentication was successful, for example, responsive to validating the DHkey or new key received from insulin delivery device 606 in operation 670.


While one-way sharing of candidate shared secrets has been generally described in this disclosure, one of ordinary skill in the art would understand that two-way sharing of candidate shared secrets is within the scope of the disclosure. When two therapy devices attempt to pair, each therapy device may require the other therapy device to provide a shared secret in order to establish a trusted communication link. In one or more embodiments that implement two-way sharing, each therapy related device may include means for requesting, generating, and/or retrieving a candidate shared secret to provide to the other therapy related device. Similarly, each therapy related device may include means for validating a received candidate shared secret.


One or more of shared secrets, shared secret parameters, secret keys, and secrete operations, may be stored on therapy devices at manufacture or during an initial setup. For example, before an analyte monitoring unit is provided to a patient, the serial number may be used to generate a shared secret that is stored at the monitoring unit and provided either to the patient's specially configured mobile computing device or a remote therapy management system. Alternatively or in addition, the operations used to generate the shared secret may be provided to the patient's specially configured mobile computing device or the remote therapy management system along with the parameters used to generate the shared secret.


Information and signals described herein may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof. Some drawings may illustrate signals as a single signal for clarity of presentation and description. It should be understood by a person of ordinary skill in the art that the signal may represent a bus of signals, wherein the bus may have a variety of bit widths and the disclosure may be implemented on any number of data signals including a single data signal.


It should be understood that any reference to an element herein using a designation such as “first,” “second,” and so forth does not limit the quantity or order of those elements, unless such limitation is explicitly stated. Rather, these designations are used herein as a convenient method of distinguishing between two or more elements or instances of an element. Thus, a reference to first and second elements does not mean that only two elements can be employed or that the first element must precede the second element in some manner. Also, unless stated otherwise a set of elements may comprise one or more elements. Likewise, sometimes elements referred to in the singular form may also include one or more instances of the element.


Many of the functional descriptions in this specification may be illustrated, described or labeled as modules, threads, steps, or other segregations of programming code, including firmware, in order to more particularly emphasize their implementation independence. Modules may be at least partially implemented in hardware, in one form or another. For example, a module may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, or the like.


Modules may also be implemented using software or firmware, stored on a physical storage device (e.g., a computer readable storage medium), in memory, or a combination thereof for execution by various types of processors.


An identified module of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions, which may, for instance, be organized as a thread, object, procedure, or function. Nevertheless, the executable of an identified module need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module.


Indeed, a module of executable code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several storage or memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, and may exist, at least partially, merely as electronic signals on a system or network. Where a module or portions of a module are implemented in software, the software portions are stored on one or more physical devices, which are referred to herein as computer readable media.


In some embodiments, the software portions are stored in a non-transitory state such that the software portions, or representations thereof, persist in the same physical location for a period of time. Additionally, in some embodiments, the software portions are stored on one or more non-transitory storage devices, which include hardware elements capable of storing non-transitory states and/or signals representative of the software portions, even though other portions of the non-transitory storage devices may be capable of altering and/or transmitting the signals. Examples of non-transitory storage devices are flash memory and random-access-memory (RAM). Another example of a non-transitory storage device includes a read-only memory (ROM) which can store signals and/or states representative of the software portions for a period of time. However, the ability to store the signals and/or states is not diminished by further functionality of transmitting signals that are the same as or representative of the stored signals and/or states. For example, a processor may access the ROM to obtain signals that are representative of the stored signals and/or states in order to execute the corresponding software instructions.


Some embodiments of the disclosure include or are described as implementing a server. A server is a computer program that provides functionality or services to other programs, commonly called clients. While a server is a computer program or process (i.e., executing program), the term may also be used to refer to a computer running one or more server programs, and so, unless otherwise indicated, the use of the term server in this description is intended to cover both situations. Further, the term computer is intended to cover a single machine, several machines (e.g., a server farm), as well as virtual clusters of computers that emulate one or more hardware elements including without limitation central processing units, graphics processing units, local and system memory, memory storage (e.g., hard disks and solid state drives), operating systems, and networking equipment.


Any characterization in this disclosure of something as ‘typical,’ ‘conventional,’ or ‘known’ does not necessarily mean that it is disclosed in the prior art or that the discussed aspects are appreciated in the prior art. Nor does it necessarily mean that, in the relevant field, it is widely known, well-understood, or routinely used.


While the present disclosure has been described herein with respect to certain illustrated embodiments, those of ordinary skill in the art will recognize and appreciate that the present invention is not so limited. Rather, many additions, deletions, and modifications to the illustrated and described embodiments may be made without departing from the scope of the invention as hereinafter claimed along with their legal equivalents. In addition, features from one embodiment may be combined with features of another embodiment while still being encompassed within the scope of the invention as contemplated by the inventor.

Claims
  • 1. A medication delivery electronics, comprising: a first communication interface configured to communicate with a remote therapy management system;a second communication interface configured to communicate with a first therapy device via a first communication link and with a therapy management application via a first trusted communication link, wherein the first trusted communication link is established by the second communication interface in response to verifying a candidate shared secret;a connection manager configured to: request a first value from the remote therapy management system via the first communication interface, the first value comprising a first variable component and a first pre-defined component, wherein the first pre-defined component is a unique identifier associated with the first therapy device;receive the first value from the remote therapy management system responsive to a determination by the remote therapy management system that establishing a trusted communication link would not violate one or more therapy related policies defined by the remote therapy management system;hash the first value to generate a first hash key;generate a candidate shared secret key responsive to the generated first hash key; andprovide, via the second communication interface, the candidate shared secret key to the first first therapy device over the first communication link, wherein the candidate shared secret is verified based on the candidate shared secret key, andthe therapy management application configured to receive, via the second communication interface, first therapy related information from the first therapy device over the first trusted communication link.
  • 2. The medication delivery electronics of claim 1, wherein the pre-defined component comprises a unique identifier component.
  • 3. The medication delivery electronics of claim 1, wherein the unique identifier is a serial number associated with the first therapy device or a public identifier associated with the first therapy device.
  • 4. The medication delivery electronics of claim 1, wherein the first communication link is an intermediate communication link and the second communication interface is configured to end the intermediate communication link responsive to the first trusted communication link being established.
  • 5. The medication delivery electronics of claim 1, wherein the first therapy device is an analyte monitoring device selected from a group consisting essentially of: a blood glucose meter and a continuous glucose monitor, and the therapy related information comprises blood glucose levels and timing information related to the blood glucose levels.
  • 6. The medication delivery electronics of claim 1, wherein: the connection manager is configured to: hash a second value to generate a second hash key, the second value comprising a second variable component and a second pre-defined component;generate a second candidate shared secret key responsive to the generated second hash key;provide, via the second communication interface, the second candidate shared secret key to a second therapy device over a second intermediate communication link established by the second communication interface, andthe therapy management application configured to send, via the second communication interface, second therapy related information to the second therapy device over a second trusted communication link established by the second communication interface responsive to acceptance of a second candidate shared secret.
  • 7. The medication delivery electronics of claim 6, wherein: the first therapy device is a blood glucose meter and the first therapy related information comprises blood glucose levels and timing information related to the blood glucose levels; andthe second therapy device is an insulin delivery device and the second therapy related information comprises insulin dosing action data.
  • 8. The medication delivery electronics of claim 7, wherein the medication delivery electronics is incorporated into an accessory unit, the accessory unit adapted to releasably and re-attachably couple to the insulin delivery device.
  • 9. The medication delivery electronics of claim 8, wherein the insulin delivery device is selected from a group consisting essentially of an insulin pen, an insulin inhaler, and a syringe.
  • 10. The medication delivery electronics of claim 1, wherein the first therapy device is a continuous glucose monitor and the first therapy related information comprises glucose values and timing information related to the glucose values.
  • 11. The medication delivery electronics of claim 10, further comprising a digital controller configured to automatically control insulin delivery by an infusion pump responsive to the first therapy related information.
  • 12. The medication delivery electronics of claim 11, wherein the connection manager is configured to: hash a second value to generate a second hash key, the second value comprising a second variable component and a second pre-defined component;generate a second candidate shared secret key responsive to the generated second hash key;provide, via the second communication interface, the second candidate shared secret key to a therapy recommendation application executing at a mobile device over a second intermediate communication link established by the second communication interface, andthe therapy management application configured to send, via the second communication interface, second therapy related information to the therapy recommendation application over a second trusted communication link established by the second communication interface responsive to acceptance of a second candidate shared secret.
  • 13. The medication delivery electronics of claim 12, wherein the therapy recommendation application is configured to determine therapy recommendations based on first therapy related information and user provided therapy information.
  • 14. The medication delivery electronics of claim 13, wherein the user provided therapy information comprises one or more of physiological information, therapy-relevant event information, and projected therapy-relevant information.
CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit under 35 U.S.C. § 119(e) of U.S. Provisional Patent Application Ser. No. 62/752,493, filed Oct. 30, 2018, the disclosure of which is hereby incorporated herein in its entirety by this reference.

US Referenced Citations (577)
Number Name Date Kind
4498904 Turner et al. Feb 1985 A
4515584 Abe et al. May 1985 A
4950216 Weder Aug 1990 A
4973318 Holm et al. Nov 1990 A
4988660 Campbell Jan 1991 A
5233571 Wirtschafter Aug 1993 A
5279586 Balkwill Jan 1994 A
5523560 Manique et al. Jun 1996 A
5536249 Castellano et al. Jul 1996 A
5564414 Walker et al. Oct 1996 A
5626566 Petersen et al. May 1997 A
5640954 Pfeiffer et al. Jun 1997 A
5645534 Chanoch Jul 1997 A
5665065 Colman et al. Sep 1997 A
5678571 Brown Oct 1997 A
5681285 Ford et al. Oct 1997 A
5822715 Worthington et al. Oct 1998 A
5918603 Brown Jul 1999 A
5925021 Castellano et al. Jul 1999 A
5984900 Mikkelsen Nov 1999 A
6004297 Steenfeldt-Jensen et al. Dec 1999 A
6032119 Brown et al. Feb 2000 A
6042571 Hjertman et al. Mar 2000 A
6235004 Steenfeldt-Jensen et al. May 2001 B1
6287283 Ljunggreen et al. Sep 2001 B1
6302855 Lav et al. Oct 2001 B1
6354996 Drinan et al. Mar 2002 B1
6482185 Hartmann Nov 2002 B1
6650951 Jones et al. Nov 2003 B1
6685678 Evans et al. Feb 2004 B2
6810290 Lebel et al. Oct 2004 B2
6817986 Slate et al. Nov 2004 B2
6827702 Lebel et al. Dec 2004 B2
6956572 Zaleski Oct 2005 B2
7025743 Mann et al. Apr 2006 B2
7109878 Mann et al. Sep 2006 B2
7133329 Skyggebjerg et al. Nov 2006 B2
7241265 Cummings et al. Jul 2007 B2
7291107 Hellwig et al. Nov 2007 B2
7343197 Shusterman Mar 2008 B2
7397730 Skyggebjerg et al. Jul 2008 B2
7404796 Ginsberg Jul 2008 B2
7454359 Rosenfeld et al. Nov 2008 B2
7553281 Hellwig et al. Jun 2009 B2
7570980 Ginsberg Aug 2009 B2
7591801 Brauker et al. Sep 2009 B2
7647237 Malave et al. Jan 2010 B2
7713229 Veit et al. May 2010 B2
7751907 Blomquist Jul 2010 B2
7837647 Estes et al. Nov 2010 B2
7850641 Lebel et al. Dec 2010 B2
7871376 Brown Jan 2011 B2
7878975 Liljeryd et al. Feb 2011 B2
7905833 Brister et al. Mar 2011 B2
7931613 Haueter et al. Apr 2011 B2
7955303 Burren et al. Jun 2011 B2
7976492 Brauker et al. Jul 2011 B2
8012119 Estes et al. Sep 2011 B2
8052655 Moeller et al. Nov 2011 B2
8108299 Waelbroeck et al. Jan 2012 B1
8127946 Winig et al. Mar 2012 B2
8132101 Buck et al. Mar 2012 B2
8156070 Buck et al. Apr 2012 B2
8206340 Arefieg Jun 2012 B2
8217946 Halpern et al. Jul 2012 B2
8219222 Blomquist Jul 2012 B2
8221345 Blomquist Jul 2012 B2
8221356 Enggaard et al. Jul 2012 B2
8229535 Mensinger et al. Jul 2012 B2
8231531 Brister et al. Jul 2012 B2
8231562 Buck et al. Jul 2012 B2
8237715 Buck et al. Aug 2012 B2
8250483 Blomquist Aug 2012 B2
D667948 Moldenhauer Sep 2012 S
8257652 Drucker et al. Sep 2012 B2
8257653 Drucker et al. Sep 2012 B2
8266906 Wu et al. Sep 2012 B2
8273296 Drucker et al. Sep 2012 B2
8279226 Krieftewirth Oct 2012 B2
RE43834 Steenfeldt-Jensen et al. Nov 2012 E
8310415 McLaughlin et al. Nov 2012 B2
8333752 Veit et al. Dec 2012 B2
8337469 Eberhart et al. Dec 2012 B2
8357091 Say et al. Jan 2013 B2
8365065 Gejdos et al. Jan 2013 B2
8372005 Say et al. Feb 2013 B2
8439834 Schmelzeisen-Redeker et al. May 2013 B2
8444595 Brukalo et al. May 2013 B2
8460231 Brauker et al. Jun 2013 B2
8514086 Harper et al. Aug 2013 B2
8529838 Drucker et al. Sep 2013 B2
8529839 Drucker et al. Sep 2013 B2
8529841 Drucker et al. Sep 2013 B2
8551039 Veit et al. Oct 2013 B2
8556865 Krulevitch et al. Oct 2013 B2
8556867 Krulevitch et al. Oct 2013 B2
8562558 Kamath et al. Oct 2013 B2
8565848 Brister et al. Oct 2013 B2
D694252 Helm Nov 2013 S
8579815 Galley et al. Nov 2013 B2
8591455 Mensinger et al. Nov 2013 B2
8601005 Bousamra et al. Dec 2013 B2
8615366 Galley et al. Dec 2013 B2
8622906 Say et al. Jan 2014 B2
8657779 Blomquist Feb 2014 B2
8663109 Brister et al. Mar 2014 B2
8719945 Birtwhistle et al. May 2014 B2
8721585 Brauker et al. May 2014 B2
8738925 Park et al. May 2014 B1
8743662 Sjolund et al. Jun 2014 B2
8750955 Brister et al. Jun 2014 B2
8756074 Brzustowicz Jun 2014 B2
8761940 Long et al. Jun 2014 B2
8774887 Say et al. Jul 2014 B2
8808228 Brister et al. Aug 2014 B2
8816862 Harper et al. Aug 2014 B2
8817258 Whalley et al. Aug 2014 B2
8821452 Dasbach et al. Sep 2014 B2
8882722 Bode et al. Nov 2014 B2
8882741 Brauker et al. Nov 2014 B2
8895315 Batman et al. Nov 2014 B2
8920401 Brauker et al. Dec 2014 B2
8926585 Brauker et al. Jan 2015 B2
8932250 Montgomery et al. Jan 2015 B2
8961465 Blomquist Feb 2015 B2
8992464 Bashan et al. Mar 2015 B2
D727928 Allison et al. Apr 2015 S
9008803 Blomquist Apr 2015 B2
9020572 Mensinger et al. Apr 2015 B2
9022996 Eberhart et al. May 2015 B2
9033877 Werner et al. May 2015 B2
9041730 Johnson et al. May 2015 B2
9050409 Haueter et al. Jun 2015 B2
9050413 Brauker et al. Jun 2015 B2
9072477 Say et al. Jul 2015 B2
9089650 Nielsen et al. Jul 2015 B2
9101723 Larsen Aug 2015 B2
9108006 Jensen et al. Aug 2015 B2
D738385 Lim et al. Sep 2015 S
9125991 Schabbach et al. Sep 2015 B2
9134823 Grant et al. Sep 2015 B2
9136939 Galley et al. Sep 2015 B2
9143569 Mensinger et al. Sep 2015 B2
9155843 Brauker et al. Oct 2015 B2
9159148 Boyer et al. Oct 2015 B2
9186113 Harper et al. Nov 2015 B2
9198623 Fern et al. Dec 2015 B2
D747333 Supino et al. Jan 2016 S
D748101 Bang et al. Jan 2016 S
D748126 Sarukkai et al. Jan 2016 S
9233210 Bock et al. Jan 2016 B2
D749103 Song Feb 2016 S
9250111 Whalley et al. Feb 2016 B2
9255830 Whalley et al. Feb 2016 B2
D753685 Zimmerman et al. Apr 2016 S
D754689 Lee Apr 2016 S
D759684 Bijlani et al. Jun 2016 S
9358334 Arefieg Jun 2016 B2
D761280 Chung et al. Jul 2016 S
D763308 Wang et al. Aug 2016 S
D766958 Salazar et al. Sep 2016 S
9435666 Richter Sep 2016 B2
9446194 Kamath et al. Sep 2016 B2
9483620 Reimer Nov 2016 B2
9498155 Brauker et al. Nov 2016 B2
9501219 Yoshimoto et al. Nov 2016 B2
9526838 Baran et al. Dec 2016 B2
D777760 Zhao et al. Jan 2017 S
9545482 Binier Jan 2017 B2
9561324 Estes Feb 2017 B2
D781890 Gathman et al. Mar 2017 S
9604004 Jakobsen Mar 2017 B2
D783037 Hariharan et al. Apr 2017 S
D783648 Vazquez et al. Apr 2017 S
D784391 Yuguchi et al. Apr 2017 S
D785025 Zimmerman et al. Apr 2017 S
9619625 Bengtsson Apr 2017 B2
9623188 Nielsen et al. Apr 2017 B2
9629901 Estes Apr 2017 B2
D786273 Herman et al. May 2017 S
9636461 Bengtsson et al. May 2017 B2
9636464 Binier May 2017 B1
9638564 Whalley et al. May 2017 B2
9642968 Whalley et al. May 2017 B2
9649448 Madsen May 2017 B2
9651482 Blei et al. May 2017 B2
9672328 Saint et al. Jun 2017 B2
9675761 Hoeholt et al. Jun 2017 B2
D791806 Brewington et al. Jul 2017 S
D794047 Gandhi et al. Aug 2017 S
D795900 Bischoff et al. Aug 2017 S
D795919 Bischoff et al. Aug 2017 S
D795927 Bischoff et al. Aug 2017 S
9721176 Prager Aug 2017 B2
9730621 Cohen et al. Aug 2017 B2
9734302 Nielsen et al. Aug 2017 B2
9737665 Heumann et al. Aug 2017 B2
D797760 Tsujimura et al. Sep 2017 S
D798312 Tsujimura et al. Sep 2017 S
9750882 Blei et al. Sep 2017 B2
9750886 Plambech et al. Sep 2017 B2
9775543 Brister et al. Oct 2017 B2
9782543 Groeschke et al. Oct 2017 B2
9782544 Heumann et al. Oct 2017 B2
9788172 Ewe et al. Oct 2017 B1
9789260 Binier Oct 2017 B1
9790977 Baran et al. Oct 2017 B2
D802760 Neby Nov 2017 S
9833576 Windum et al. Dec 2017 B2
9848774 Bergstrom et al. Dec 2017 B2
D808986 Dudey Jan 2018 S
D809544 Ambielli Feb 2018 S
D809545 Ban et al. Feb 2018 S
D811425 Olsen et al. Feb 2018 S
D815127 Phillips et al. Apr 2018 S
D815667 Yeung Apr 2018 S
D819043 Yamaura et al. May 2018 S
9980140 Spencer May 2018 B1
D820297 Gardner et al. Jun 2018 S
9996668 Reihman et al. Jun 2018 B2
10016565 Nielsen et al. Jul 2018 B2
10043093 Allerdings et al. Aug 2018 B2
10071205 Blei et al. Sep 2018 B2
D831049 Agarwal et al. Oct 2018 S
D831684 Ghosh Oct 2018 S
D832292 Hu et al. Oct 2018 S
10086141 Steel et al. Oct 2018 B2
10105094 Baran et al. Oct 2018 B2
10105497 Dreier et al. Oct 2018 B2
D832870 Hu Nov 2018 S
D833469 Coleman et al. Nov 2018 S
D834710 Michael Nov 2018 S
10117996 Stefansen Nov 2018 B2
10117999 Andersen Nov 2018 B2
10133948 Hammen Nov 2018 B2
D835118 Lee et al. Dec 2018 S
10155090 Larsen et al. Dec 2018 B2
10159797 Andersen et al. Dec 2018 B2
10159798 Blei et al. Dec 2018 B2
D837807 Baber et al. Jan 2019 S
D838734 Kruse et al. Jan 2019 S
10166338 Nielsen et al. Jan 2019 B2
10166340 Blei et al. Jan 2019 B2
10169539 Reihman et al. Jan 2019 B2
10173015 Fiedler et al. Jan 2019 B2
10179207 Haupt Jan 2019 B2
10183119 Andersen et al. Jan 2019 B2
10183120 Sihlanick et al. Jan 2019 B2
10190901 Whalley et al. Jan 2019 B2
10195351 Allerdings et al. Feb 2019 B2
10195352 Baran et al. Feb 2019 B2
10195355 Allerdings et al. Feb 2019 B2
D842888 Krainer et al. Mar 2019 S
D843402 Casse et al. Mar 2019 S
D846590 Cabrera et al. Apr 2019 S
D847165 Kolbenheyer Apr 2019 S
D849757 Jing et al. May 2019 S
10296128 Nold et al. May 2019 B1
10341866 Spencer Jul 2019 B1
10524110 Klem Dec 2019 B1
10667759 Duke et al. Jun 2020 B2
10686898 Phillips et al. Jun 2020 B1
10702658 Shekalim Jul 2020 B2
10896245 Crothall Jan 2021 B2
11464459 Sjolund et al. Oct 2022 B2
20030028089 Galley et al. Feb 2003 A1
20030032868 Graskov et al. Feb 2003 A1
20030065536 Hansen et al. Apr 2003 A1
20040039255 Simonsen et al. Feb 2004 A1
20040062148 Skyggebjerg et al. Apr 2004 A1
20040093331 Garner et al. May 2004 A1
20040153257 Munk Aug 2004 A1
20050005121 Chen Jan 2005 A1
20050038674 Braig et al. Feb 2005 A1
20050049179 Davidson et al. Mar 2005 A1
20050192557 Brauker et al. Sep 2005 A1
20060036144 Brister et al. Feb 2006 A1
20060173417 Rosen et al. Aug 2006 A1
20070021715 Kohlbrenner et al. Jan 2007 A1
20070173708 Dobbles et al. Jul 2007 A9
20070186923 Poutiatine et al. Aug 2007 A1
20070239486 Gordon Oct 2007 A1
20080119705 Patel et al. May 2008 A1
20080162192 Vonk et al. Jul 2008 A1
20080188813 Miller et al. Aug 2008 A1
20080201169 Galasso et al. Aug 2008 A1
20080228057 Graskov et al. Sep 2008 A1
20080234663 Yodfat et al. Sep 2008 A1
20080235053 Ray et al. Sep 2008 A1
20080262469 Brister et al. Oct 2008 A1
20080287755 Sass et al. Nov 2008 A1
20080300572 Rankers et al. Dec 2008 A1
20080310676 Silver Dec 2008 A1
20080312512 Brukalo et al. Dec 2008 A1
20080312584 Montgomery et al. Dec 2008 A1
20090036771 Fago et al. Feb 2009 A1
20090048561 Burren et al. Feb 2009 A1
20090103124 Kimura et al. Apr 2009 A1
20090120716 Yamamoto et al. May 2009 A1
20090131875 Green May 2009 A1
20090144089 Heywood et al. Jun 2009 A1
20090163793 Koehler et al. Jun 2009 A1
20090171589 Kovatchev Jul 2009 A1
20090209938 Matti Aug 2009 A1
20090240440 Shurabura et al. Sep 2009 A1
20090299276 Brauker et al. Dec 2009 A1
20090299279 Richter Dec 2009 A1
20090318865 Moeller et al. Dec 2009 A1
20100017141 Campbell et al. Jan 2010 A1
20100049126 Bronfeld et al. Feb 2010 A1
20100058060 Schneider Mar 2010 A1
20100063438 Bengtsson Mar 2010 A1
20100081993 O'Connor Apr 2010 A1
20100095229 Dixon et al. Apr 2010 A1
20100198520 Breton et al. Aug 2010 A1
20100292634 Kircher et al. Nov 2010 A1
20100305965 Benjamin et al. Dec 2010 A1
20100331656 Mensinger et al. Dec 2010 A1
20110009727 Mensinger et al. Jan 2011 A1
20110124996 Reinke et al. May 2011 A1
20110178462 Moberg et al. Jul 2011 A1
20110184343 Veit et al. Jul 2011 A1
20110191343 Heaton et al. Aug 2011 A1
20110193704 Harper et al. Aug 2011 A1
20110201911 Johnson et al. Aug 2011 A1
20110270158 Brauker et al. Nov 2011 A1
20110275986 Bashan et al. Nov 2011 A1
20110281791 Zion et al. Nov 2011 A1
20110282409 Ternes et al. Nov 2011 A1
20110295215 Nielsen et al. Dec 2011 A1
20110313350 Krulevitch et al. Dec 2011 A1
20110313395 Krulevitch et al. Dec 2011 A1
20120046606 Arefieg Feb 2012 A1
20120072236 Atkin Mar 2012 A1
20120078665 Johnson et al. Mar 2012 A1
20120165746 Harms et al. Jun 2012 A1
20120186581 Brauker et al. Jul 2012 A1
20120190953 Brauker et al. Jul 2012 A1
20120191063 Brauker et al. Jul 2012 A1
20120215201 Brauker et al. Aug 2012 A1
20120220979 Brauker et al. Aug 2012 A1
20120238852 Brauker et al. Sep 2012 A1
20120238853 Arefieg Sep 2012 A1
20120271557 Sekimoto et al. Oct 2012 A1
20120296311 Brauker et al. Nov 2012 A1
20130004844 Hosoe et al. Jan 2013 A1
20130030841 Bergstrom et al. Jan 2013 A1
20130035575 Mayou et al. Feb 2013 A1
20130035865 Mayou et al. Feb 2013 A1
20130035871 Mayou et al. Feb 2013 A1
20130047084 Sanders et al. Feb 2013 A1
20130171938 Mears et al. Jul 2013 A1
20130184547 Taub et al. Jul 2013 A1
20130184996 Zivitz et al. Jul 2013 A1
20130197479 Butler et al. Aug 2013 A1
20130211248 Cowan et al. Aug 2013 A1
20130291116 Homer Oct 2013 A1
20130298063 Joy et al. Nov 2013 A1
20130310756 Whalley et al. Nov 2013 A1
20130331659 Koski et al. Dec 2013 A1
20130338453 Duke et al. Dec 2013 A1
20140012117 Mensinger et al. Jan 2014 A1
20140012118 Mensinger et al. Jan 2014 A1
20140012510 Mensinger et al. Jan 2014 A1
20140012511 Mensinger et al. Jan 2014 A1
20140018733 Sjoelund et al. Jan 2014 A1
20140019396 Carlsgaard et al. Jan 2014 A1
20140025400 Galley et al. Jan 2014 A1
20140058749 Galley et al. Feb 2014 A1
20140068487 Steiger et al. Mar 2014 A1
20140074041 Pedersen et al. Mar 2014 A1
20140081662 Bradrick et al. Mar 2014 A1
20140091941 Johnson et al. Apr 2014 A1
20140094743 Bengtsson Apr 2014 A1
20140113856 Pohl et al. Apr 2014 A1
20140114161 Kamath et al. Apr 2014 A1
20140128705 Mazlish May 2014 A1
20140148659 Sloan et al. May 2014 A1
20140187889 Cohen et al. Jul 2014 A1
20140200426 Taub et al. Jul 2014 A1
20140207080 Allerdings Jul 2014 A1
20140257065 Brister et al. Sep 2014 A1
20140276531 Walsh Sep 2014 A1
20140288494 Brister et al. Sep 2014 A1
20140297299 Lester, IV Oct 2014 A1
20140309615 Mazlish Oct 2014 A1
20140324020 Stefansen Oct 2014 A1
20140371682 Bengtsson et al. Dec 2014 A1
20150018770 Baran et al. Jan 2015 A1
20150043410 Chaturvedi et al. Feb 2015 A1
20150073337 Saint et al. Mar 2015 A1
20150151050 Estes Jun 2015 A1
20150164415 Bashan et al. Jun 2015 A1
20150193595 McNamara et al. Jul 2015 A1
20150202375 Schabbach et al. Jul 2015 A1
20150202377 Haupt Jul 2015 A1
20150205947 Berman et al. Jul 2015 A1
20150246179 Zur et al. Sep 2015 A1
20150260726 Refvik Sep 2015 A1
20150289823 Rack-Gomer et al. Oct 2015 A1
20150290396 Nagar et al. Oct 2015 A1
20150306304 Schabbach et al. Oct 2015 A1
20150350147 Shepherd et al. Dec 2015 A1
20150351683 Brauker et al. Dec 2015 A1
20150356273 Cave Dec 2015 A1
20150359490 Massey et al. Dec 2015 A1
20150359965 O'Connor et al. Dec 2015 A1
20150365826 Mancini Dec 2015 A1
20160030673 White et al. Feb 2016 A1
20160030679 Nielsen et al. Feb 2016 A1
20160030680 Veasey et al. Feb 2016 A1
20160030683 Taylor et al. Feb 2016 A1
20160038675 Estes et al. Feb 2016 A1
20160047685 Blei et al. Feb 2016 A1
20160047743 Blei et al. Feb 2016 A1
20160051760 Krusell et al. Feb 2016 A1
20160065799 Haupt et al. Mar 2016 A1
20160066843 Mensinger et al. Mar 2016 A1
20160081632 Kamath et al. Mar 2016 A1
20160082192 Veasey et al. Mar 2016 A1
20160101232 Kamath et al. Apr 2016 A1
20160101234 Bock et al. Apr 2016 A1
20160106927 Moeller et al. Apr 2016 A1
20160113558 Bhavaraju et al. Apr 2016 A1
20160117481 Booth et al. Apr 2016 A1
20160155081 Legisa et al. Jun 2016 A1
20160213848 Whalley et al. Jul 2016 A1
20160223380 Whalley et al. Aug 2016 A1
20160235925 Kuhn et al. Aug 2016 A1
20160263327 Radmer et al. Sep 2016 A1
20160266752 Wu et al. Sep 2016 A1
20160287804 Madsen et al. Oct 2016 A1
20160287807 Madsen et al. Oct 2016 A1
20160324463 Simpson et al. Nov 2016 A1
20170053101 Booth et al. Feb 2017 A1
20170053552 Zhong et al. Feb 2017 A1
20170068799 Mensinger et al. Mar 2017 A1
20170103175 Chopra et al. Apr 2017 A1
20170106052 Spat et al. Apr 2017 A1
20170124275 Reihman et al. May 2017 A1
20170131993 Salameh et al. May 2017 A1
20170132120 Salameh et al. May 2017 A1
20170132392 Gerken May 2017 A1
20170138769 Jones et al. May 2017 A1
20170139974 Javed et al. May 2017 A1
20170151390 Muller-Pathle Jun 2017 A1
20170173261 O'Connor et al. Jun 2017 A1
20170181645 Mahalingam et al. Jun 2017 A1
20170181678 Newberry Jun 2017 A1
20170182258 Michael Jun 2017 A1
20170185283 Bhavaraju et al. Jun 2017 A1
20170185284 Bhavaraju et al. Jun 2017 A1
20170189615 Estes Jul 2017 A1
20170189616 Bengtsson et al. Jul 2017 A1
20170189625 Cirillo et al. Jul 2017 A1
20170199985 Mazlish et al. Jul 2017 A1
20170215811 Newberry Aug 2017 A1
20170216518 Davis et al. Aug 2017 A1
20170216524 Haider et al. Aug 2017 A1
20170219486 Blei et al. Aug 2017 A1
20170220751 Davis et al. Aug 2017 A1
20170224922 Lepple-Wienhues Aug 2017 A1
20170224927 Windum et al. Aug 2017 A1
20170228518 Booth et al. Aug 2017 A1
20170232203 Krusell Aug 2017 A1
20170235919 Bauss et al. Aug 2017 A1
20170235920 Bauss et al. Aug 2017 A1
20170251982 Koehler et al. Sep 2017 A1
20170266389 McLoughlin et al. Sep 2017 A1
20170270276 Saint et al. Sep 2017 A1
20170270829 Bauss Sep 2017 A1
20170286194 Morris et al. Oct 2017 A1
20170286614 Morris et al. Oct 2017 A1
20170286638 Searle et al. Oct 2017 A1
20170304538 Renstad et al. Oct 2017 A1
20170304541 Bauss et al. Oct 2017 A1
20170304552 Prager Oct 2017 A1
20170312446 Kunz et al. Nov 2017 A1
20170316178 Riedel et al. Nov 2017 A1
20170338864 Rolsted et al. Nov 2017 A1
20170340808 Andersen et al. Nov 2017 A1
20170340826 Draper Nov 2017 A1
20170351842 Booth et al. Dec 2017 A1
20170366617 Mensinger et al. Dec 2017 A1
20170367627 Brister et al. Dec 2017 A1
20170368263 Ploch Dec 2017 A1
20170368265 Groeschke et al. Dec 2017 A1
20180001027 Klemm et al. Jan 2018 A1
20180008773 Hautaviita et al. Jan 2018 A1
20180008778 Erbstein Jan 2018 A1
20180008779 Hautaviita et al. Jan 2018 A1
20180028759 Riedel et al. Feb 2018 A1
20180028760 Gugl et al. Feb 2018 A1
20180036484 Andersen Feb 2018 A1
20180036495 Searle et al. Feb 2018 A1
20180042559 Cabrera et al. Feb 2018 A1
20180043104 Mueller Pathle Feb 2018 A1
20180050157 Whalley et al. Feb 2018 A1
20180060008 Bender et al. Mar 2018 A1
20180060529 Crothall Mar 2018 A1
20180064879 Sall et al. Mar 2018 A1
20180085532 Desborough et al. Mar 2018 A1
20180099084 Schabbach et al. Apr 2018 A1
20180103879 Masciotti et al. Apr 2018 A1
20180121630 Portnoy May 2018 A1
20180147362 Arenas et al. May 2018 A1
20180154086 Toporek et al. Jun 2018 A1
20180161505 Prager Jun 2018 A1
20180185587 Brauker et al. Jul 2018 A1
20180217917 Hayter et al. Aug 2018 A1
20180221582 Klemm et al. Aug 2018 A1
20180224315 Schabbacha et al. Aug 2018 A1
20180226150 Hayter et al. Aug 2018 A1
20180228977 Schabbach et al. Aug 2018 A1
20180236172 Schabbach et al. Aug 2018 A1
20180236185 Sall et al. Aug 2018 A1
20180243504 Scott et al. Aug 2018 A1
20180262578 Shaw et al. Sep 2018 A1
20180268236 Klemm Sep 2018 A1
20180272072 Radmer et al. Sep 2018 A1
20180277246 Zhong et al. Sep 2018 A1
20180289901 Bggild-Damkvist et al. Oct 2018 A1
20180296767 Sall Oct 2018 A1
20180303417 Mensinger et al. Oct 2018 A1
20180304028 Riedel Oct 2018 A1
20180326164 Bauss et al. Nov 2018 A1
20180339113 Wendland et al. Nov 2018 A1
20180341826 Allerdings et al. Nov 2018 A1
20180353694 Riedel et al. Dec 2018 A1
20180353698 Saint et al. Dec 2018 A1
20180353699 Helmer et al. Dec 2018 A1
20180353700 Sall et al. Dec 2018 A1
20180361067 Sall et al. Dec 2018 A1
20180361076 Klemm et al. Dec 2018 A1
20180361082 Sall et al. Dec 2018 A1
20180368683 Hu et al. Dec 2018 A1
20180369479 Hayter et al. Dec 2018 A1
20180369488 Carlsson et al. Dec 2018 A1
20180369490 Rehbein et al. Dec 2018 A1
20190001060 Gylleby et al. Jan 2019 A1
20190001069 Carlsson et al. Jan 2019 A1
20190009032 Hautaviita et al. Jan 2019 A1
20190015020 Brister et al. Jan 2019 A1
20190015596 Saint et al. Jan 2019 A1
20190022320 Carlsson et al. Jan 2019 A1
20190029590 Baran et al. Jan 2019 A1
20190030250 Steel et al. Jan 2019 A1
20190035500 Saint et al. Jan 2019 A1
20190036688 Wasily Jan 2019 A1
20190076070 Nogueira et al. Mar 2019 A1
20190125224 Kamath et al. May 2019 A1
20190125969 Montgomery et al. May 2019 A1
20190132801 Kamath et al. May 2019 A1
20190149887 Williams et al. May 2019 A1
20190173885 Kamath et al. Jun 2019 A1
20190175833 Sjolund et al. Jun 2019 A1
20190175841 Sjolund et al. Jun 2019 A1
20190183434 Sjolund et al. Jun 2019 A1
20190184091 Sjolund et al. Jun 2019 A1
20190184092 Sjolund et al. Jun 2019 A1
20190184093 Sjolund et al. Jun 2019 A1
20190184094 Sjolund et al. Jun 2019 A1
20190184107 Sjolund et al. Jun 2019 A1
20190184108 Sjolund et al. Jun 2019 A1
20190184109 Sjolund et al. Jun 2019 A1
20190184111 Sjolund et al. Jun 2019 A1
20190192071 Taub et al. Jun 2019 A1
20190237181 Steinberg Aug 2019 A1
20190239825 Kumar et al. Aug 2019 A1
20190274598 Scott et al. Sep 2019 A1
20190282141 Causey et al. Sep 2019 A1
20190332774 Nix Oct 2019 A1
20200016336 Patek et al. Jan 2020 A1
20200205724 Lee et al. Jul 2020 A1
20200261673 Hickey Aug 2020 A1
20200350052 Saint et al. Nov 2020 A1
20200360794 Intonato et al. Nov 2020 A1
Foreign Referenced Citations (63)
Number Date Country
2925458 Apr 2015 CA
201248860 Jun 2009 CN
103443798 Dec 2013 CN
103957961 Jul 2014 CN
104411349 Mar 2015 CN
104797282 Jul 2015 CN
105377118 Mar 2016 CN
107073207 Aug 2017 CN
0298067 Jan 1989 EP
0513128 Nov 1992 EP
0927057 Jul 1999 EP
1571582 Sep 2005 EP
1680175 Jul 2006 EP
2401011 Jan 2012 EP
2572740 Mar 2013 EP
2767297 Aug 2014 EP
2911717 Sep 2015 EP
2926846 Oct 2015 EP
3049132 Aug 2016 EP
2879740 Mar 2017 EP
3167393 May 2017 EP
2797660 Oct 2019 EP
2014-514046 Jun 2014 JP
2014-531283 Nov 2014 JP
2015-178044 Oct 2015 JP
2016-515452 May 2016 JP
2016-517601 Jun 2016 JP
6058673 Jan 2017 JP
8502544 Jun 1985 WO
9110460 Jul 1991 WO
9638190 Dec 1996 WO
9810813 Mar 1998 WO
2005046559 May 2005 WO
2010037828 Apr 2010 WO
2010052275 May 2010 WO
2010056718 May 2010 WO
2010098927 Sep 2010 WO
2011041007 Apr 2011 WO
2011091238 Jul 2011 WO
2012046199 Apr 2012 WO
2013004844 Jan 2013 WO
2013037754 Mar 2013 WO
2013053695 Apr 2013 WO
2013177135 Nov 2013 WO
2014020010 Feb 2014 WO
2014029621 Feb 2014 WO
2014064691 May 2014 WO
2014128157 Aug 2014 WO
2014145049 Sep 2014 WO
2015047870 Apr 2015 WO
2015169814 Nov 2015 WO
2015185686 Dec 2015 WO
2016004210 Jan 2016 WO
2016019192 Feb 2016 WO
2016007935 Apr 2016 WO
2016071912 May 2016 WO
WO-2016116853 Jul 2016 WO
2016151973 Sep 2016 WO
2017123523 Jul 2017 WO
2017123525 Jul 2017 WO
2017132557 Aug 2017 WO
2017132577 Aug 2017 WO
2018064222 Apr 2018 WO
Non-Patent Literature Citations (24)
Entry
“Calculating Insulin Dose.” Diabetes Education Online, University of California, San Francisco, https://web.archive.org/web/20110711172015/dtc.ucsf.edu/types-of-diabetes/type2/treatment-of-type-2-diabetes/medications-and-therapies/type-2-insulin-rx/calculating-insulin-dose/. Retrieved Feb. 2021. (Year: 2011).
Baker, New Technologies for Diabetes, Mar. 25, 2017, XP055568829, 76, https://diabetes-education.com/wp-content/uploads/2017/03/Baker-HCP3.pdf.
Hu et al., An Improved PID Algorithm Based on Insulin-on-Board Estimate for Blood Glucose Control with Type 1 Diabetes, Jan. 1, 2015, Computational and Mathematical Methods in Medicine, 1-8, 2015.
Near Field Communication versus Bluetooth, Jan. 3, 2016, NearFieldCommunication.org via web.archive.org (Year: 2016).
Sara Krugman, Bionic Pancreas User Interface (3/4): Interface Details, Tidepool.org, Jul. 20, 2015.
T:slimx2 Insulin Pump User Guide, Tandem Diabetes Care, Jul. 22, 2016.
White, Common Sensing, May 2, 2017, XP055568837, 15, Mar. 13, 2019.
Cision PR News Wire, “Companion Medical Announces Insights by InPen, the Future of MDI Reports”, Jun. 20, 2018.
Chinese First Office Action and Search Report for Chinese Application No. 201880080537.X, dated Apr. 27, 2023, 53 pages with translation.
Chinese First Office Action and Search Report for Chinese Application No. 201880080699.3, dated May 11, 2023, 47 pages with translation.
European Communication pursuant to Article 94(3) EPC for European Application No. 18839959, dated Apr. 4, 2023, 6 pages.
European Communication pursuant to Article 94(3) EPC for European Application No. 18839960.4, dated May 26, 2023, 6 pages.
European Examination Report for EP Application No. 18840106.1, mailed Mar. 24, 2023, 14 pages.
European Search Report and Search Opinion Received for EP Application No. 21212980.3, dated on Jul. 7, 2022, 10 pages.
Hu et al., An Improved PID Algorithm Based on Insulin-on-Board Estimate for Blood Glucose Control with Type 1 Diabetes, Jan. 1, 2015, Computational and Mathematical Methods in Medicine, pp. 1-8, 2015.
Indian Patent Examination Report for Indian Application No. 202027023258 dated May 19, 2022, 6 pages.
Japanese Notice of Reasons for Refusal for Japanese Patent Application No. 2020-551774, dated Dec. 4, 2023, 14 pages with English translation.
Australian Patent Examination Report No. 1 for Australian Patent Application No. 2018383731, dated Oct. 17, 2023, 6 pages.
Australian Patent Examination Report No. 1 for Australian Patent Application No. 2018383743, dated Oct. 23, 2023, 5 pages.
Chinese Second Office Action for Chinese Application No. 201880080537.X, dated Nov. 10, 2023, 44 pages with English translation.
Chinese Second Office Action for Chinese Application No. 201880080699.3, dated Dec. 25, 2023, 33 pages with English translation.
Communication pursuant to Article 94(3) EPC for European Patent Application No. 18 852 783.2, mailed Jun. 22, 2023, 9 pages.
Japanese Notice of Reasons for Rejection for Japanese Application No. 2020-551774, dated Sep. 25, 2023, 6 pages with English translation.
Summons to attend oral proceedings pursuant to Rule 115(1) EPC for European Application No. 18839960.4, dated Jan. 25, 2024, 7 pages.
Provisional Applications (1)
Number Date Country
62752493 Oct 2018 US