Embodiments of this disclosure relate, generally, to medication therapy systems, and more specifically, some embodiments relate to systems and methods for establishing trusted connections among two or more therapy devices that form a medication therapy system.
Medication delivery devices are commonly used to deliver medication to the human body, including as part of a medical treatment provided as a therapy for a medical condition. Medication delivery devices such as a transdermal liquid dosing device (e.g., an injection pen), inhalers, and syringes provide a convenient, often reusable means of delivering medication to the human body in fluid or aerosolized form. Infusion pumps also provide a convenient means of delivering medication to the human body in controlled amounts of fluid, and are often used when there is a desire to deliver medication in precisely calculated volumes (large and small) at precise rates and/or intervals. By way of example, medication delivery means may deliver medication intravenously, subcutaneously, arterially, and epidurally (i.e., via the epidural space around the spinal cord). Infusion pumps use a variety of techniques to deliver medication that do not require any or only a limited amount of manual manipulation. By way of example, infusion pumps may use positive displacement (e.g., a peristaltic pump, diaphragm pump, etc.), positive pressure (e.g., a drive system that advances a plunger), reciprocating positive pressure (e.g., plunger pumps that draw medication from a cartridge into a delivery chamber), and more.
One advantage of infusion pumps is that their dimensions may be such that they can be worn “on the body.” For example, on-body infusion pumps are sometimes used for subcutaneous delivery of medication—the infusion pump delivers medication via a subcutaneous cannula, and an adhesive patch secures the pump, cannula and any other elements of the infusion set at the infusion site. The adhesive helps maintain the cannula in fluidic communication with the tissue and/or vasculature of the patient so that medication may be delivered to the patient's body.
Medication delivery devices are sometimes used in combination with other therapy related devices to deliver therapeutic amounts of medication. For example, when a treatment is based, at least in part, on an amount of an analyte in a patient's blood stream. An analyte sensor may be used to detect and/or measure amounts of the analyte and provide analyte data to a user, a medication delivery device, or other therapy related devices. A therapy application may store and analyze the analyte data, plan therapy activities, provide and receive information from users (e.g., via an interface), provide recommendations to users (e.g., via an interface), and, in some arrangements, provide instructions to a medication delivery device for medication delivery.
Medication therapies can exact a toll on users that, due to dangers associated with administering external biologically effective medication (e.g., hormone, analgesics, antibiotics, nutrients, etc.), must track, plan, and calculate amounts of medication delivered. So, therapy applications can be a tremendous boon, and off-load some of the cognitive and emotional burden associated with a medication therapy.
While this disclosure concludes with claims particularly pointing out and distinctly claiming specific embodiments, various features and advantages of embodiments within the scope of this disclosure may be more readily ascertained from the following description when read in conjunction with the accompanying drawings, in which:
In the following detailed description, reference is made to the accompanying drawings, which form a part hereof, and in which are shown, by way of illustration, specific example embodiments in which the present disclosure may be practiced. These embodiments are described in sufficient detail to enable a person of ordinary skill in the art to practice the present disclosure. However, other embodiments may be utilized, and structural, material, and process changes may be made without departing from the scope of the disclosure.
It should be understood that any reference to an element herein using a designation such as “first,” “second,” and so forth does not limit the quantity or order of those elements, unless such limitation is explicitly stated. Rather, these designations are used herein as a convenient method of distinguishing between two or more elements or instances of an element. Thus, a reference to first and second elements does not mean that only two elements can be employed or that the first element must precede the second element in some manner. Also, unless stated otherwise a set of elements may comprise one or more elements. Likewise, sometimes elements referred to in the singular form may also include one or more instances of the element.
The following description may include examples to help enable one of ordinary skill in the art to practice the disclosed embodiments. The use of the terms “exemplary,” “by example,” and “for example,” means that the related description is explanatory, and though the scope of the disclosure is intended to encompass the examples and legal equivalents, the use of such terms is not intended to limit the scope of an embodiment or this disclosure to the specified components, steps, features, functions, or the like.
Sometimes therapy devices are wirelessly connected to each other to form a therapy system that is configured for medication delivery. For example, an analyte monitoring device may be wirelessly connected to a medication delivery device. While it is common for devices to connect wirelessly to form a system (e.g., a speaker connecting to a media source via BLUETOOTH®), there are specific challenges and concerns that arise in medication delivery, especially ambulatory medication delivery.
For example, for some conditions and therapies, a patient may need to carry an ambulatory medication delivery device (e.g., an infusion pump, injection pen, an inhaler, etc.) with them all times. Even if not necessary, many patients carry their drug delivery devices with them simply for convenience and risk aversion. So, a patient could take an ambulatory medication delivery device loaded with a dangerous medication, literally, anywhere in the world.
Opportunities for mis-delivery and dangerous consequences are higher when patients are being treated by a therapy system that includes a variety of therapy devices communicating with each other. For example, a patient may be treated by a therapy system that includes an analyte monitoring device, a therapy application executing on a mobile device, and a medication delivery device. In a typical operational cycle, the analyte monitoring device sends analyte measurement data to the therapy application. The therapy application performs therapy related analysis, determines changes to a medication therapy regime based on the analyte measurement data, and sends instructions to implement the changes to the medication delivery device. The medication delivery device reconfigures its medication delivery (e.g., dose amount, rate of dosing, etc.) based, at least in part, on the instructions.
If a third-party device (i.e., a therapy device that is not part of the therapy system) connects with any of the therapy devices that form the therapy system, that connection could interfere with the operation of the therapy system. The other device could be part of another therapy system, in which case the connection could interfere with operation of both therapy systems. So, even an inadvertent connection could cause information and instructions to be missed, or erroneous instructions to be sent. Moreover, the third-party device may be a malicious device that intends to capture therapy related information or even hijack operation of the therapy system and interfere with medication delivery (e.g., so called “main-in-the-middle” attacks).
Whether inadvertent or malicious, a misconnection and incorrect operation brings a significant risk of injury and death to users of therapy systems. The risk of an inadvertent or malicious connection are increased if the therapy devices are able to connect to each other and third-party devices using wireless communication links.
As used herein “a connection” and “connected” when used with references to two or more devices means that there is a communication link between two devices. The communication link may be wired, unwired (e.g., using wireless radio-frequency (RF) signals), and combinations thereof. “Connecting” means one or more operations are being taken to establish a communication link or a type of communication link, for example, operations to establish an intermediate communication link, which in turn may be used for performing one or more operations to establish a trusted communication link.
One way to restrict wireless connections is to configure devices to limit at least certain communication to a trusted connection. One of ordinary skill in the art would appreciate a number of ways to establish a trusted connection (when two devices form or have a trusted connection, that is also referred to herein as “pairing” and being “paired”), and one non-limiting example is: discovery, authentication, agreement on a communication protocol, sharing identifiers, agreement on an encryption scheme, and then agreement that the trusted connection is active.
Due to the risk of inadvertent connections and malicious connections, passwords and/or passkeys are often used when establishing trusted connections. For example, a user reads an N-digit code at a first device that is in a pairing mode, and enters the N-digit code at a second device that is in a pairing mode. The second device provides the N-digit code to the first device over a wired or wireless connection. If the first device determines that the displayed N-digit code matches the received N-digit code, then the first device approves the pairing and the first and second devices establish a trusted connection. The N-digit code is an example of a “shared secret,” which is a piece of data, known only to parties involved in setting up the trusted connection. By way of example, a shared secret may be a password, a passphrase, a big number, an array of randomly chosen bytes, and the like. In some cases, both devices will store the shared secret and, periodically, the first device will ask the second device to again provide the shared secret to the first device in order to maintain the trusted connection.
Shared-secrets are effective, but as time passes, the risk that the shared secret will be compromised grows (e.g., a third-party might see the code displayed on the first device). Further, even with a shared secret, there is the risk of a brute force attack on the device where an attacker iterates through candidate passkeys until one is accepted.
Security risks aside, in the case of medication therapies, there are social and privacy drawbacks to current pairing techniques. For example, a user may be embarrassed to look at an analyte monitoring device and program a passkey into a medication delivery device in public because it exposes their health condition to strangers. If the devices are visible, that exposes the user to risk because a malicious actor may observe the user and target the user's devices, including in the manner described above. Further, physically reading a shared secret at the first device and entering it at the second device affects the user experience, and can cause a system that is supposed to reduce cognitive burden on a user to be more burdensome. Finally, the first device that provides the passkey must include a user interface sufficient to present the passkey to a user (e.g., a display, light-emitting-diodes, a speaker).
Accordingly, the inventors of this disclosure see a need for systems, methods, and devices that securely facilitate establishing trusted connections among therapy devices that form medication therapy systems.
In one or more embodiments, medication therapy electronics 104 is configured, generally, to analyze therapy related information, provide therapy recommendation to users, and send therapy instructions to medication delivery unit 118. Medication therapy electronics 104 is operatively coupled to medication delivery unit 118, and, in one or more embodiments, medication therapy electronics 104 and medication delivery unit 118 are components of a medication delivery device. In one embodiment, the medication delivery device may be a “smart” medication delivery device, where the medication therapy electronics 104 provides processing power related to the therapy as well as the user experience. For example, the medication delivery device may be an infusion pump system that is configured to automatically deliver medication based on control signals determined at the pump system (e.g., at the medication therapy electronics 104). By way of further example, the medication delivery device may be an injection pen that is configured to provide therapy recommendations based on detected delivery events and/or physiological information about a patient.
In another embodiment, medication therapy electronics 104 may be, or be a component of, a first device and medication delivery unit 118 may be, or be a component of, a second device. The first and second devices may be operatively coupled by a wired or wireless connection. In one embodiment, the connection may be a trusted connection established in accordance with one or more embodiments of the disclosure.
In one or more embodiments, medication therapy electronics 104 is configured to establish a trusted communication link with one or more therapy related devices, including analyte monitoring unit 102 and/or medication delivery unit 118. In one contemplated process for establishing a trusted communication link with analyte monitoring unit 102, medication therapy electronics 104 is configured to provide a candidate shared secret key 116 over an intermediate communication link 114a to analyte monitoring unit 102. In various embodiments, candidate shared secret key 116 may be a value or string of alpha-numeric characters representative of a candidate shared secret to be validated against a shared secret that is unique to analyte monitoring unit 102. In one or more embodiments, shared secrets and candidate shared secrets may be values, strings of alpha-numeric characters, algorithms, or combination thereof. In a contemplated operation of therapy system 100 candidate shared secret key 116 is used, but it is specifically contemplated that there may be multiple pairs of therapy related devices within a therapy system that use different unique shared secrets, candidate shared secrets, and candidate shared secret keys to establish trusted connections. In one embodiment, a shared secret may be unique to therapy system 100 (e.g., a therapy system identifier, algorithm, or combination thereof), and so the same shared secret, candidate shared secret, and candidate shared secret key may be used to establish trusted communication links between some or all of the therapy devices that comprise therapy system 100.
Turning back to the example of
In one embodiment, establishing a trusted communication link includes recording at both devices that intermediate communication link 114a is a trusted communication link. In another embodiment, intermediate communication link 114a is ended and a new communication link 114b is established with trusted communication characteristics (e.g., protocol, encryption, etc.). In various embodiments, the trusted communication link 114b may use the same or different communication equipment (e.g., transceivers configured for BLUETOOTH®, ZIGBEE®, NFC, etc.) as intermediate communication link 114a.
In various embodiments, medication therapy electronics 104 may be configured to communicate over intermediate communication link 114a and trusted communication links, 114b as well as over communication network 108, and may include equipment for several types of communication.
In one or more embodiments, remote therapy management system 106 may execute on one or more computer servers remote from one or more other therapy devices, such as the medication therapy electronics 104, analyte monitoring unit 102, and medication delivery unit 118. The other therapy related devices may be carried with a user, while the remote therapy management system 106 operates remotely and provides services to devices within the therapy system 100.
In one embodiment, medication therapy electronics 104 sends a shared secret parameters request 112 to remote therapy management system 106. Remote therapy management system 106 receives shared secret parameters request 112 and sends response 110. Response 110 may include, for example, the requested shared secret parameters or a denial message denying the request 112. Medication therapy electronics 104 generates candidate shared secret key 116 responsive to shared secret parameters in the response 110.
Analyte monitoring unit 102 is configured to receive candidate shared secret key 116, and sends an acceptance or rejection message (not shown) over intermediate communication link 114a responsive to candidate shared secret key 116.
Connection manager 131 is configured, generally, to manage establishing one or more communication links with therapy related devices, including, for example, trusted and untrusted (e.g., intermediate) communication links. Connection manager 131 is configured to use network communication interface 130 to send shared secret parameter requests 112 from remote therapy management system 106 (
In one or more embodiments, network communication interface 130 may be configured to send requests to, and receive response messages from, remote therapy management system 106 (
Therapy communication interface 136 may be configured for personal, local, and/or wide-area network communication with a related therapy device. By way of example, and not limitation, therapy communication interface 136 may be configured for BLUETOOTH communication (including BLUETOOTH Low Energy (BLE)), NFC (near field communication), WiFi, ZIGBEE, IrDA (infrared data association), wireless USB (universal serial bus), combinations thereof, and more.
Shared secret key calculator 133 is configured to receive shared secret parameters 132 and provide candidate shared secret key 134. In one or more embodiments, shared secret key calculator 133 is configured to generate candidate shared secret key 134 responsive to shared secret parameters 132 and one or more secret operations. In one embodiment, shared secret key calculator 133 may be pre-configured to perform secret operations, and in another embodiment shared secret key calculator 133 may perform secret operations responsive to secret operation instructions that are included with the shared secret parameters 132.
In various embodiments, one or more shared secret parameters and/or secret operations may be a contemplated shared secret.
In one embodiment, pre-defined component 141 and variable component 142 are both received by shared secret key calculator 133 (see
In one or more embodiments, secret operations 143 may be a one-way function configured to obfuscate its input parameters (e.g., pre-defined component 141 and variable component 142). Secret operations 143 may be performed using pre-defined component 141 and variable component 142. In one embodiment, each of pre-defined component 141 and variable component 142 may be a parameter of secret operations 143. In another embodiment, secret operations 143 may use a post-processed parameter that is based, at least in part, on pre-defined component 141 and variable component 142 (e.g., a combination of the two parameters using concatenation, exclusive OR, multiplication, etc.).
In one or more embodiments, secret operations 143 is a hashing function, shared secret parameters 132 is a hash key, and candidate shared secret key 134 is a hash. Shared secret key calculator 133 is configured to generate the hash by hashing the hash key using the hashing function. By using both the pre-defined component 141 and variable component 142, a correct candidate shared secret key 134 is harder to recover illicitly without knowing how the variable component affects secret operations 143.
In one or more embodiments, therapy management application 137 (see
In one or more embodiments, remote therapy management system 106 may include a parameters request manager 166, a therapy system policy enforcer 163, therapy system records 161, and therapy related policies 162.
In one or more embodiments, parameters request manager 166 may be configured, generally, to manage parameter requests 167 for shared secret parameters received from therapy related devices that are attempting to establish trusted communication links. In one embodiment, parameter request manager 166 may be configured to provide one or more group identifiers 165 to therapy system policy enforcer 163 responsive to receiving a parameter request 167 for shared secret parameters. Group identifiers 165 may be unique identifiers that describe one or more groups of therapy related devices that form medication therapy system. In one embodiment, a group identifier 165 may be a string of digits or characters. In another embodiment, a group identifier 165 may be a patient's name or a string associated with a patient's name (e.g., an anonymizing identifier). In one embodiment, group identifiers 165 may for one or more of the therapy related devices that are attempting to establish a trusted communication link.
Therapy system policy enforcer 163 may be configured, generally, to enforce therapy related policies 162. More particularly, therapy system policy enforcer 163 may be configured to enforce therapy related policies 162 related to forming medication therapy systems from a group of therapy related devices, and more specifically still, to establishing trusted communication links among therapy related devices. So, when a therapy related device requests shared secret parameters, therapy system policy enforcer 163 may be configured to determine whether establishing a trusted communication link would violate one or more therapy related policies 162. For example, if the requesting therapy related device is attempting to establish a trusted communication link with an analyte monitoring unit, therapy system policy enforcer 163 may be configured to reject the request if the therapy system records 161 indicate that the requesting therapy related device already has an active trusted communication link with another, different, analyte monitoring unit. By way of another example, if the requesting therapy related device is attempting to establish a trusted communication link with an analyte monitoring unit, therapy system policy enforcer 163 may be configured to reject the request if the therapy system records 161 indicate that the analyte monitoring unit already has an active trusted communication link with another, different, therapy related device or has reached a maximum number of active trusted communication links with other, different, therapy related devices. By way of yet another example, if the requesting therapy related device is attempting to establish a trusted communication link with an analyte monitoring unit, therapy system policy enforcer 16 may be configured to reject the request if the requesting therapy related device and the other therapy related device are not compatible. For example, therapy related policies 162 may describe lists of compatible types of devices (or, conversely, lists of incomputable devices), and if the requesting therapy related device and the other therapy related device are not compatible then therapy system policy enforcer 16 may be configured to reject the request.
In the contemplated example of
Therapy system records 161 may include records stored in a database that are related to one or more medication therapy systems. Therapy system records 161 may describe therapy related devices that form a medication therapy system, including identifiers, type of devices, patient information, insurance information, provider information, and more.
Monitoring unit communication interface 183 is configured, generally, to send and receive messages to and from other therapy related devices, for example, over trusted and/or untrusted communication links. In one or more embodiments, messages sent by monitoring unit communication interface 183 may include one or more of analyte measurement information received from analyte sensors 184, and status information about analyte monitoring unit 102 (e.g., battery life, component health, etc.). Monitoring unit communication interface 183 may also be configured to send and receive messages related to establishing trusted communication links with other therapy related devices.
Monitoring unit connection manager 181 is configured, generally, to manage establishment of trusted communication links with other therapy related devices. Monitoring unit connection manager 181 may include or have access to primary shared secrets 182 stored at analyte monitoring unit 102. In a contemplated operation of analyte monitoring unit 102, when a therapy device attempts to establish a trusted communication link with analyte monitoring unit 102, monitoring unit connection manager 181 is configured to validate a candidate shared secret responsive to candidate shared secret key 186 and primary shared secrets 182.
In one or more embodiments, primary shared secret manager 187 is configured to generate and provide primary shared secret parameters 182 to monitoring unit connection manager 181. In one embodiment, primary shard secret manager 187 stores one or more primary shared secret parameters that it provides to connection manager 181. In one contemplated operation, the primary shared secret parameters may include a unique identifier (e.g., a string of alpha numeric characters), a decryption key, and an encrypted string (e.g., cyphertext) that was generated based, at least in part, on the unique identifier, an encryption algorithm corresponding to the decryption algorithm, and an encryption key. Connection manager 181 may decrypt the encrypted string using the decryption algorithm and the candidate shared secret key 186. In a contemplated operation, if the decrypted string matches the unique identifier than that is indicative that a candidate shared secret matches a primary shared secret of the analyte monitoring unit 102. The primary shared secret may be a unique identifier, a hash function, or both.
In another embodiment, primary shared secret parameters 182 may be a primary shared secret key generated by primary shared secret manager 187. Primary shared secret manager 187 may perform secret operations with a unique identifier to generate a primary key, and provide the primary key to connection manager 181 to compare the primary key to candidate shared secret key 186. In a case where candidate shared secret key 186 matches the primary key then that is indicative that the primary secret operations and primary shared secret parameters are the same as the ones used to generate candidate shared secret key 186. For example, the secret operations performed at primary shared secret manager 187 may be the same hashing function or other one-way function performed at shared secret key calculator 133 (see
Any suitable technique known by one of ordinary skill in the art may be used by monitoring unit connection manger 181 to perform comparisons described herein. For example, a symbol-to-symbol comparison, bit-to-bit comparison, converting to an integer (e.g., if they are strings) and comparing integer values, and the like.
One or more embodiments relate, generally, to a process for establishing trusted connections that may be performed by therapy devices using shared secrets stored or determined locally, and systems and devices for accomplishing the same.
Notably, a remote therapy system is not shown as part of therapy system 300 because, in one or more embodiments, medication therapy electronics 312 is configured to store and/or calculate the shared secret locally. Nevertheless, one of ordinary skill in the art would understand that therapy system 300 may include remote therapy management elements.
In one or more embodiments, medication therapy electronics 312 includes a connection manager 314, a shared secret manager 316, a communication interface 318, and a therapy management application 320. In one embodiment, shared secret manager 316 is configured to retrieve a locally stored candidate shared secret key 322 responsive to a request to provide a shared secret from analyte monitoring unit 302, and connection manager 314 is configured to provide candidate shared secret key 322 to analyte monitoring unit 302. Candidate shared secret key 322 may be, for example, a hash of a unique identifier associated with analyte monitoring unit 302.
In one or more embodiments, shared secret manager 316 is configured to determine candidate shared secret key 322. In one embodiment, a secret and one or more secret operations are stored at medication therapy electronics 312. By way of example, the secret may be a hash key and the secret operations may be a hashing function. Shared secret manager 316 determines candidate shared secret key 322 by performing secret operations using secrets as a parameter.
In one or more embodiments, a secret may be static, for example, it may be a unique identifier associated with analyte monitoring unit 302. In one or more embodiments, the secret operations may be configured to use at least two parameters: a static component (e.g., a unique identifier) and a variable component (e.g., a time), such that the candidate shared secret key 322 is different for different variable components. In yet another embodiment, the secret may be a combination of a unique identifier and a variable component.
In one or more embodiments, analyte monitoring unit 302 may include monitoring unit connection manager 304, primary shared secret manager 306, monitoring unit communication interface 308, and analyte sensors 310. Monitoring unit connection manager 304 is configured to validate a candidate shared secret based, at least in part, on candidate shared secret key 322 responsive to a primary shared secret provided by primary shared secret manager 306, for example, by comparing candidate shared secret key 322 to a primary shared secret or a primary shared secret key generated using a primary shared secret.
In one embodiment, analyte monitoring unit 302 may store a primary shared secret. In another embodiment, primary secret parameters and secret operations may be stored at analyte monitoring unit 302, and primary shared secret manager 306 may be configured to determine a primary shared secret or a primary shared secret key, at least in part, using secret operations. In the example of
Notably, candidate shared secret key 322 may also include a variable component if used to generate it, for example, a time stamp. Primary shared secret manager 306 may generate a primary shared secret or primary shared secret key responsive to a variable component, primary secret operations, and primary shared secret parameters.
One or more embodiments of the disclosure relate to insulin therapy systems configured to implement pairing techniques described in this disclosure.
Diabetes mellitus is a chronic metabolic disorder caused by the inability of a person's pancreas to produce sufficient amounts of the hormone insulin such that the person's metabolism is unable to provide for the proper absorption of sugar and starch. This failure leads to hyperglycemia, i.e., the presence of an excessive amount of glucose within the blood plasma. Persistent hyperglycemia has been associated with a variety of serious symptoms and life threatening long-term complications such as dehydration, ketoacidosis, diabetic coma, cardiovascular diseases, chronic renal failure, retinal damage and nerve damages with the risk of amputation of extremities. Because healing is not yet possible, a permanent therapy is necessary which provides constant glycemic control in order to constantly maintain the level of blood analyte within normal limits. Such glycemic control is achieved by regularly supplying external drugs to the body of the patient to thereby reduce the elevated levels of blood analyte.
An external biologically effective drug (e.g., insulin or its analog) is commonly administered by means of daily injections. In some cases, multiple, daily injections (MDI) of a mixture of rapid- and long-acting insulin via a reusable transdermal liquid dosing device (commonly referred to as an “insulin pen”) or a hypodermic syringe. The injections are typically administered by a person with diabetes (PWD), and so requires self-monitoring of blood glucose and the self-administration of insulin. The PWD that manages their care using MDI often plans insulin injections for each day, in advance, based on basal insulin requirement as well as external factors such as meals, exercise, sleep, etc. A typical dosing plan will include the time of day for an injection, the type of insulin (e.g., fast acting, long acting, a mixture of fast acting and long acting, etc.), and amount of insulin for each dose. In addition, PWDs will self-monitor their blood glucose and self-administer “bolus” dose(s) of rapid-acting insulin if their blood glucose is too high or consume carbohydrates (or sometimes administer glycogen) if their blood glucose is too low.
The “correct” insulin dose is a function of the level of glucose in the blood, physiological factors such as a person's insulin sensitivity, and lifestyle factors such as meals (e.g., recently consumed carbohydrates that have yet to be metabolized into glucose and absorbed into the blood). Moreover, even with careful planning and self-monitoring, a PWD may skip doses, double dose, and dose the wrong amount and/or type of insulin. Insufficient insulin can result in hyperglycemia, and too much insulin can result in hypoglycemia, which can result in clumsiness, trouble talking, confusion, loss of consciousness, seizures, or death. Accordingly, PWDs face a considerable cognitive burden in determining appropriate doses of insulin.
In order to assist with self-treatment, some insulin therapy devices (e.g., blood glucose meters, continuous glucose meters, insulin pumps, insulin pens etc.) are equipped with insulin therapy applications that assist user with making appropriate therapy decisions while minimizing the burdens of data entry, mental calculations, procedures, etc.). For example, insulin bolus calculators may be used that have the user input an estimate (e.g., numerical estimate) of the quantity of carbohydrates consumed or about to be consumed (or additionally or alternatively protein, fat, or other meal data) and the bolus calculator outputs a recommended size for the insulin bolus dosage. Although bolus calculators remove some of the mental calculations that need to be made by the user in determining an appropriate insulin bolus dosage, bolus calculators still burden the user with the mental task of evaluating the constituents of their meal, may require the use of a secondary device, and often require manual entry of data.
Automated insulin delivery may also be used to relieve some of the burdens of self-treatment. A glucose monitoring unit measures levels of glucose in blood samples and sends at least some of the measurements to a therapy application that is monitoring patient's response to insulin therapy. The therapy application determines insulin dosing (e.g., amount, timing, rates of insulin, etc.) dosing to account for a patient's basal insulin needs as well as to account for physiological events such as carbohydrate intake, exercise, sleep, medication intake (other than insulin), and more. The therapy application uses glucose levels received from the glucose monitoring unit as a control variable to determine insulin dosing instructions that it then sends to an insulin delivery device, such an infusion pump. The operation of the insulin delivery device is configured by the insulin dosing instructions and the insulin delivery device will then deliver insulin according to the new configuration. Insulin therapy systems that implement automated insulin delivery may operate in “open loop” modes and “closed loop” modes. By way of example, in an open loop mode, the insulin therapy system may involve some user interaction before sending the insulin delivery instructions 326 to the insulin delivery device (e.g., a user acceptance of change). In a closed loop mode, the therapy application may determine and automatically send the insulin delivery instructions 326 to the insulin delivery device without user interaction.
In one or more embodiments, insulin injection pen 404 and BGM 402 are configured for pairing in accordance with the embodiments for establishing a trusted communication link described in this disclosure. In one embodiment, a shared secret is locally stored at BGM 402, and upon request, insulin injection pen 404 is configured to provide a candidate shared secret to BGM 402 in order to pair with BGM 402 and start receiving glucose level measurement data from BGM 402. If insulin injection pen 404 fails to provide candidate shared secret 410 or BGM 402 does not validate candidate shared secret 410 (e.g., using its stored primary shared secret, or using a shared secret key and secret operations), pairing will fail and trusted communication link 408 will not be established.
In one or more embodiments, mobile computer device 406 and insulin injection pen 404 are configured for pairing in accordance with the embodiments for establishing a trusted communication link described in this disclosure. In one embodiment, a shared secret is locally stored at insulin injection pen 404, and upon request, mobile computing device 406 is configured to provide a candidate shared secret 414 in order to pair with insulin injection pen 404 and start receiving insulin dosing event information from insulin injection pen 404. If mobile computing device 406 fails to provide candidate shared secret 414 or if insulin injection pen 404 does not validate candidate shared secret 410 against its stored primary shared secret, pairing will fail and trusted communication link 412 will not be established.
In one or more embodiments, insulin infusion pump 506 and CGM 502 are configured for pairing in accordance with the embodiments for establishing a trusted communication link described in this disclosure. In one embodiment, a shared secret is locally stored at CGM 502, and upon request, insulin infusion pump 506 is configured to provide a candidate shared secret 510 to CGM 502 in order to pair with CGM 502 and start receiving glucose level measurement data from CGM 502. If insulin infusion pump 506 fails to provide candidate shared secret 510 or CGM 502 does not validate candidate shared secret 510 (e.g., using its stored primary shared secret, or using a shared secret key and secret operations), pairing will fail and trusted communication link 508 will not be established.
By using the process for establishing trusted communication links, mobile computing devices and infusion pumps that are not part of automated insulin therapy system 500 may be restricted from receiving blood glucose level measurement data from CGM 502.
In one or more embodiments, mobile computer device 504 and insulin infusion pump 506 are configured for pairing in accordance with the embodiments for establishing a trusted communication link described in this disclosure. In one embodiment, a shared secret is locally stored at insulin infusion pump 506, and upon request, mobile computing device 504 is configured to provide a candidate shared secret 514 in order to pair with insulin infusion pump 506 and start receiving insulin dosing event information from insulin infusion pump 506. If mobile computing device 504 fails to provide candidate shared secret 514 or if insulin infusion pump 506 does not validate candidate shared secret 514 against its stored primary shared secret, pairing will fail and trusted communication link 512 will not be established. By using the process for establishing trusted communication links, mobile computing devices that are not part of automated insulin therapy system 500 may be restricted from receiving insulin dosing event information from insulin infusion pump 506 and sending insulin dosing instructions to insulin infusion pump 506.
In operation 610, user 602 provides BGM pairing instruction to mobile application 604. In operation 612, mobile application 604 provides a BGM pairing instruction to insulin delivery device 606 responsive to the BGM pairing instruction received in operation 610. Pairing operations between insulin delivery device 606 and BGM 608 are initiated by insulin delivery device 606 and BGM 608 “discovering” each other. In operation 614, insulin delivery device 606 enters a scanning mode responsive to receiving the BGM pairing instruction in operation 612, and scans for advertising messages. In operation 616, user 602 provides an advertise instruction to BGM 608, for example, but actuating a button for some pre-defined period of time. In operation 618, BGM enters and advertising mode and sends advertisement messages that may be received by nearby devices. In operation 620, insulin delivery device 606 sends to mobile application 604 an available BGM list comprising one or more identifiers for available BGM devices (e.g., unique BGM devices for which advertisement messages have been received in the most recent scan mode period), including an identifier for BGM 608. In operation 622, mobile application 604 presents the available BGM list at a display for user 602. In operation 624, user 602 provides a BGM selection to mobile application 604, the BGM selection uniquely identifying one of the BGM devices listed in the BGM list. In operation 626, responsive to the selection, mobile application 604 provides a connection instruction to insulin delivery device 606 that, at least in part, identifies the selected BGM device—here, BGM 608.
In operation 628, insulin delivery device 606 provides a connection request to BGM 608 responsive to receiving the connection instruction in operation 626. In operation 630, insulin delivery device 606 provides a read device information service (DIS) request (or some other request for identifying information, without limitation) to BGM 608. In operation 632, BGM 608 provides DIS information (or other identifying information, without limitation) to insulin delivery device 606 responsive to the read DIS request in operation 630.
In operation 634, insulin delivery device 606 provides a read time request to BGM 608. In one embodiment, BGM 608 provides stored time information (e.g., in seconds) to insulin delivery device 606 in operation 640, responsive to the read time request in operation 634. In another embodiment, BGM 608 may determine in operation 636 whether the stored time is usable or unusable (e.g., because it is incorrect). Responsive to a determination that the stored time is usable, BGM 608 may provide the time in seconds in operation 640. Responsive to a determination that the stored time is not usable, BGM 608 may provide the seconds elapsed since last battery insertion in operation 638.
In operation 642, insulin delivery device 606 generates a passkey responsive to the time information received in operations 640 (or in operation 638) and the DIS information received in operation 632. At about the same time as operation 642, in operation 644 BGM 608 generates a passkey responsive to the time information sent in operation 640 and the DIS information sent in operation 632.
In operation 646, insulin delivery device 606 provides a connection security start request to BGM 608 to attempt to establish a trusted communication link between insulin delivery device 606 and BGM 608. In operation 648, insulin delivery device 606 provides an authentication request that includes a public key “pka” to BGM 608. In operation 650, BGM 608 provides a public key “pkb” to BGM 608 responsive to receiving the authentication request in operation 648. Up receipt of “pkb,” insulin delivery device 606 and BGM 608 may send and receive messages using public key encryption.
In operation 652, insulin delivery device 606 generates DHkey, which is a candidate shared secret, in accordance with tone or more processes for generating candidate shared secrets of this disclosure. In operations 654 and 656, insulin delivery device 606 provides a verification request to BGM 608 that includes DHKey encrypted using the public encryption keys “pka” and “pkb.”
In operation 658, BGM 608 determines whether DHkey is a valid key or an invalid key in accordance with one or more processes for validating candidate shared secrets of this disclosure. Responsive to determining that DHkey is an invalid key, in operation 676 BGM 608 provides a connection security failure response to insulin delivery device 606, and in operation 678 BGM 608 sends a disconnect message to insulin delivery device 606 to end the untrusted communication link, and terminates the link locally. In operation 680, insulin delivery device 606 sends a connection failure message to mobile application 604, which, in one or more embodiments, presents a failure message to user 602.
Responsive to determining that DHkey is a valid key, in operation 662, BGM 608 sends a connection successful message to insulin delivery device 606 and stores the DHkey in operation 666. In operation 664, insulin delivery device 606 stores the DHkey responsive to receiving the connection successful message provided in operation 662. In operation 674, insulin delivery device 606 provides a connection successful message to mobile application 604.
In one or more embodiments, insulin delivery device 606 and BGM 608 may be configured to continuously perform a truncated authentication process 668 while the trusted communication link is active. In operation 670, insulin delivery device 606 may provide a request to continue the trusted communication link to BGM 608. The request may include DHkey or a new key that is the result of modifying DHkey according to some pre-agreed operations. In operation 672, BGM 608 may provide a response message indicating that the truncated authentication was successful, for example, responsive to validating the DHkey or new key received from insulin delivery device 606 in operation 670.
While one-way sharing of candidate shared secrets has been generally described in this disclosure, one of ordinary skill in the art would understand that two-way sharing of candidate shared secrets is within the scope of the disclosure. When two therapy devices attempt to pair, each therapy device may require the other therapy device to provide a shared secret in order to establish a trusted communication link. In one or more embodiments that implement two-way sharing, each therapy related device may include means for requesting, generating, and/or retrieving a candidate shared secret to provide to the other therapy related device. Similarly, each therapy related device may include means for validating a received candidate shared secret.
One or more of shared secrets, shared secret parameters, secret keys, and secrete operations, may be stored on therapy devices at manufacture or during an initial setup. For example, before an analyte monitoring unit is provided to a patient, the serial number may be used to generate a shared secret that is stored at the monitoring unit and provided either to the patient's specially configured mobile computing device or a remote therapy management system. Alternatively or in addition, the operations used to generate the shared secret may be provided to the patient's specially configured mobile computing device or the remote therapy management system along with the parameters used to generate the shared secret.
Information and signals described herein may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits, symbols, and chips that may be referenced throughout the description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof. Some drawings may illustrate signals as a single signal for clarity of presentation and description. It should be understood by a person of ordinary skill in the art that the signal may represent a bus of signals, wherein the bus may have a variety of bit widths and the disclosure may be implemented on any number of data signals including a single data signal.
It should be understood that any reference to an element herein using a designation such as “first,” “second,” and so forth does not limit the quantity or order of those elements, unless such limitation is explicitly stated. Rather, these designations are used herein as a convenient method of distinguishing between two or more elements or instances of an element. Thus, a reference to first and second elements does not mean that only two elements can be employed or that the first element must precede the second element in some manner. Also, unless stated otherwise a set of elements may comprise one or more elements. Likewise, sometimes elements referred to in the singular form may also include one or more instances of the element.
Many of the functional descriptions in this specification may be illustrated, described or labeled as modules, threads, steps, or other segregations of programming code, including firmware, in order to more particularly emphasize their implementation independence. Modules may be at least partially implemented in hardware, in one form or another. For example, a module may be implemented as a hardware circuit comprising custom VLSI circuits or gate arrays, off-the-shelf semiconductors such as logic chips, transistors, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices, or the like.
Modules may also be implemented using software or firmware, stored on a physical storage device (e.g., a computer readable storage medium), in memory, or a combination thereof for execution by various types of processors.
An identified module of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions, which may, for instance, be organized as a thread, object, procedure, or function. Nevertheless, the executable of an identified module need not be physically located together, but may comprise disparate instructions stored in different locations which, when joined logically together, comprise the module and achieve the stated purpose for the module.
Indeed, a module of executable code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several storage or memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, and may exist, at least partially, merely as electronic signals on a system or network. Where a module or portions of a module are implemented in software, the software portions are stored on one or more physical devices, which are referred to herein as computer readable media.
In some embodiments, the software portions are stored in a non-transitory state such that the software portions, or representations thereof, persist in the same physical location for a period of time. Additionally, in some embodiments, the software portions are stored on one or more non-transitory storage devices, which include hardware elements capable of storing non-transitory states and/or signals representative of the software portions, even though other portions of the non-transitory storage devices may be capable of altering and/or transmitting the signals. Examples of non-transitory storage devices are flash memory and random-access-memory (RAM). Another example of a non-transitory storage device includes a read-only memory (ROM) which can store signals and/or states representative of the software portions for a period of time. However, the ability to store the signals and/or states is not diminished by further functionality of transmitting signals that are the same as or representative of the stored signals and/or states. For example, a processor may access the ROM to obtain signals that are representative of the stored signals and/or states in order to execute the corresponding software instructions.
Some embodiments of the disclosure include or are described as implementing a server. A server is a computer program that provides functionality or services to other programs, commonly called clients. While a server is a computer program or process (i.e., executing program), the term may also be used to refer to a computer running one or more server programs, and so, unless otherwise indicated, the use of the term server in this description is intended to cover both situations. Further, the term computer is intended to cover a single machine, several machines (e.g., a server farm), as well as virtual clusters of computers that emulate one or more hardware elements including without limitation central processing units, graphics processing units, local and system memory, memory storage (e.g., hard disks and solid state drives), operating systems, and networking equipment.
Any characterization in this disclosure of something as ‘typical,’ ‘conventional,’ or ‘known’ does not necessarily mean that it is disclosed in the prior art or that the discussed aspects are appreciated in the prior art. Nor does it necessarily mean that, in the relevant field, it is widely known, well-understood, or routinely used.
While the present disclosure has been described herein with respect to certain illustrated embodiments, those of ordinary skill in the art will recognize and appreciate that the present invention is not so limited. Rather, many additions, deletions, and modifications to the illustrated and described embodiments may be made without departing from the scope of the invention as hereinafter claimed along with their legal equivalents. In addition, features from one embodiment may be combined with features of another embodiment while still being encompassed within the scope of the invention as contemplated by the inventor.
This application claims the benefit under 35 U.S.C. § 119(e) of U.S. Provisional Patent Application Ser. No. 62/752,493, filed Oct. 30, 2018, the disclosure of which is hereby incorporated herein in its entirety by this reference.
Number | Name | Date | Kind |
---|---|---|---|
4498904 | Turner et al. | Feb 1985 | A |
4515584 | Abe et al. | May 1985 | A |
4950216 | Weder | Aug 1990 | A |
4973318 | Holm et al. | Nov 1990 | A |
4988660 | Campbell | Jan 1991 | A |
5233571 | Wirtschafter | Aug 1993 | A |
5279586 | Balkwill | Jan 1994 | A |
5523560 | Manique et al. | Jun 1996 | A |
5536249 | Castellano et al. | Jul 1996 | A |
5564414 | Walker et al. | Oct 1996 | A |
5626566 | Petersen et al. | May 1997 | A |
5640954 | Pfeiffer et al. | Jun 1997 | A |
5645534 | Chanoch | Jul 1997 | A |
5665065 | Colman et al. | Sep 1997 | A |
5678571 | Brown | Oct 1997 | A |
5681285 | Ford et al. | Oct 1997 | A |
5822715 | Worthington et al. | Oct 1998 | A |
5918603 | Brown | Jul 1999 | A |
5925021 | Castellano et al. | Jul 1999 | A |
5984900 | Mikkelsen | Nov 1999 | A |
6004297 | Steenfeldt-Jensen et al. | Dec 1999 | A |
6032119 | Brown et al. | Feb 2000 | A |
6042571 | Hjertman et al. | Mar 2000 | A |
6235004 | Steenfeldt-Jensen et al. | May 2001 | B1 |
6287283 | Ljunggreen et al. | Sep 2001 | B1 |
6302855 | Lav et al. | Oct 2001 | B1 |
6354996 | Drinan et al. | Mar 2002 | B1 |
6482185 | Hartmann | Nov 2002 | B1 |
6650951 | Jones et al. | Nov 2003 | B1 |
6685678 | Evans et al. | Feb 2004 | B2 |
6810290 | Lebel et al. | Oct 2004 | B2 |
6817986 | Slate et al. | Nov 2004 | B2 |
6827702 | Lebel et al. | Dec 2004 | B2 |
6956572 | Zaleski | Oct 2005 | B2 |
7025743 | Mann et al. | Apr 2006 | B2 |
7109878 | Mann et al. | Sep 2006 | B2 |
7133329 | Skyggebjerg et al. | Nov 2006 | B2 |
7241265 | Cummings et al. | Jul 2007 | B2 |
7291107 | Hellwig et al. | Nov 2007 | B2 |
7343197 | Shusterman | Mar 2008 | B2 |
7397730 | Skyggebjerg et al. | Jul 2008 | B2 |
7404796 | Ginsberg | Jul 2008 | B2 |
7454359 | Rosenfeld et al. | Nov 2008 | B2 |
7553281 | Hellwig et al. | Jun 2009 | B2 |
7570980 | Ginsberg | Aug 2009 | B2 |
7591801 | Brauker et al. | Sep 2009 | B2 |
7647237 | Malave et al. | Jan 2010 | B2 |
7713229 | Veit et al. | May 2010 | B2 |
7751907 | Blomquist | Jul 2010 | B2 |
7837647 | Estes et al. | Nov 2010 | B2 |
7850641 | Lebel et al. | Dec 2010 | B2 |
7871376 | Brown | Jan 2011 | B2 |
7878975 | Liljeryd et al. | Feb 2011 | B2 |
7905833 | Brister et al. | Mar 2011 | B2 |
7931613 | Haueter et al. | Apr 2011 | B2 |
7955303 | Burren et al. | Jun 2011 | B2 |
7976492 | Brauker et al. | Jul 2011 | B2 |
8012119 | Estes et al. | Sep 2011 | B2 |
8052655 | Moeller et al. | Nov 2011 | B2 |
8108299 | Waelbroeck et al. | Jan 2012 | B1 |
8127946 | Winig et al. | Mar 2012 | B2 |
8132101 | Buck et al. | Mar 2012 | B2 |
8156070 | Buck et al. | Apr 2012 | B2 |
8206340 | Arefieg | Jun 2012 | B2 |
8217946 | Halpern et al. | Jul 2012 | B2 |
8219222 | Blomquist | Jul 2012 | B2 |
8221345 | Blomquist | Jul 2012 | B2 |
8221356 | Enggaard et al. | Jul 2012 | B2 |
8229535 | Mensinger et al. | Jul 2012 | B2 |
8231531 | Brister et al. | Jul 2012 | B2 |
8231562 | Buck et al. | Jul 2012 | B2 |
8237715 | Buck et al. | Aug 2012 | B2 |
8250483 | Blomquist | Aug 2012 | B2 |
D667948 | Moldenhauer | Sep 2012 | S |
8257652 | Drucker et al. | Sep 2012 | B2 |
8257653 | Drucker et al. | Sep 2012 | B2 |
8266906 | Wu et al. | Sep 2012 | B2 |
8273296 | Drucker et al. | Sep 2012 | B2 |
8279226 | Krieftewirth | Oct 2012 | B2 |
RE43834 | Steenfeldt-Jensen et al. | Nov 2012 | E |
8310415 | McLaughlin et al. | Nov 2012 | B2 |
8333752 | Veit et al. | Dec 2012 | B2 |
8337469 | Eberhart et al. | Dec 2012 | B2 |
8357091 | Say et al. | Jan 2013 | B2 |
8365065 | Gejdos et al. | Jan 2013 | B2 |
8372005 | Say et al. | Feb 2013 | B2 |
8439834 | Schmelzeisen-Redeker et al. | May 2013 | B2 |
8444595 | Brukalo et al. | May 2013 | B2 |
8460231 | Brauker et al. | Jun 2013 | B2 |
8514086 | Harper et al. | Aug 2013 | B2 |
8529838 | Drucker et al. | Sep 2013 | B2 |
8529839 | Drucker et al. | Sep 2013 | B2 |
8529841 | Drucker et al. | Sep 2013 | B2 |
8551039 | Veit et al. | Oct 2013 | B2 |
8556865 | Krulevitch et al. | Oct 2013 | B2 |
8556867 | Krulevitch et al. | Oct 2013 | B2 |
8562558 | Kamath et al. | Oct 2013 | B2 |
8565848 | Brister et al. | Oct 2013 | B2 |
D694252 | Helm | Nov 2013 | S |
8579815 | Galley et al. | Nov 2013 | B2 |
8591455 | Mensinger et al. | Nov 2013 | B2 |
8601005 | Bousamra et al. | Dec 2013 | B2 |
8615366 | Galley et al. | Dec 2013 | B2 |
8622906 | Say et al. | Jan 2014 | B2 |
8657779 | Blomquist | Feb 2014 | B2 |
8663109 | Brister et al. | Mar 2014 | B2 |
8719945 | Birtwhistle et al. | May 2014 | B2 |
8721585 | Brauker et al. | May 2014 | B2 |
8738925 | Park et al. | May 2014 | B1 |
8743662 | Sjolund et al. | Jun 2014 | B2 |
8750955 | Brister et al. | Jun 2014 | B2 |
8756074 | Brzustowicz | Jun 2014 | B2 |
8761940 | Long et al. | Jun 2014 | B2 |
8774887 | Say et al. | Jul 2014 | B2 |
8808228 | Brister et al. | Aug 2014 | B2 |
8816862 | Harper et al. | Aug 2014 | B2 |
8817258 | Whalley et al. | Aug 2014 | B2 |
8821452 | Dasbach et al. | Sep 2014 | B2 |
8882722 | Bode et al. | Nov 2014 | B2 |
8882741 | Brauker et al. | Nov 2014 | B2 |
8895315 | Batman et al. | Nov 2014 | B2 |
8920401 | Brauker et al. | Dec 2014 | B2 |
8926585 | Brauker et al. | Jan 2015 | B2 |
8932250 | Montgomery et al. | Jan 2015 | B2 |
8961465 | Blomquist | Feb 2015 | B2 |
8992464 | Bashan et al. | Mar 2015 | B2 |
D727928 | Allison et al. | Apr 2015 | S |
9008803 | Blomquist | Apr 2015 | B2 |
9020572 | Mensinger et al. | Apr 2015 | B2 |
9022996 | Eberhart et al. | May 2015 | B2 |
9033877 | Werner et al. | May 2015 | B2 |
9041730 | Johnson et al. | May 2015 | B2 |
9050409 | Haueter et al. | Jun 2015 | B2 |
9050413 | Brauker et al. | Jun 2015 | B2 |
9072477 | Say et al. | Jul 2015 | B2 |
9089650 | Nielsen et al. | Jul 2015 | B2 |
9101723 | Larsen | Aug 2015 | B2 |
9108006 | Jensen et al. | Aug 2015 | B2 |
D738385 | Lim et al. | Sep 2015 | S |
9125991 | Schabbach et al. | Sep 2015 | B2 |
9134823 | Grant et al. | Sep 2015 | B2 |
9136939 | Galley et al. | Sep 2015 | B2 |
9143569 | Mensinger et al. | Sep 2015 | B2 |
9155843 | Brauker et al. | Oct 2015 | B2 |
9159148 | Boyer et al. | Oct 2015 | B2 |
9186113 | Harper et al. | Nov 2015 | B2 |
9198623 | Fern et al. | Dec 2015 | B2 |
D747333 | Supino et al. | Jan 2016 | S |
D748101 | Bang et al. | Jan 2016 | S |
D748126 | Sarukkai et al. | Jan 2016 | S |
9233210 | Bock et al. | Jan 2016 | B2 |
D749103 | Song | Feb 2016 | S |
9250111 | Whalley et al. | Feb 2016 | B2 |
9255830 | Whalley et al. | Feb 2016 | B2 |
D753685 | Zimmerman et al. | Apr 2016 | S |
D754689 | Lee | Apr 2016 | S |
D759684 | Bijlani et al. | Jun 2016 | S |
9358334 | Arefieg | Jun 2016 | B2 |
D761280 | Chung et al. | Jul 2016 | S |
D763308 | Wang et al. | Aug 2016 | S |
D766958 | Salazar et al. | Sep 2016 | S |
9435666 | Richter | Sep 2016 | B2 |
9446194 | Kamath et al. | Sep 2016 | B2 |
9483620 | Reimer | Nov 2016 | B2 |
9498155 | Brauker et al. | Nov 2016 | B2 |
9501219 | Yoshimoto et al. | Nov 2016 | B2 |
9526838 | Baran et al. | Dec 2016 | B2 |
D777760 | Zhao et al. | Jan 2017 | S |
9545482 | Binier | Jan 2017 | B2 |
9561324 | Estes | Feb 2017 | B2 |
D781890 | Gathman et al. | Mar 2017 | S |
9604004 | Jakobsen | Mar 2017 | B2 |
D783037 | Hariharan et al. | Apr 2017 | S |
D783648 | Vazquez et al. | Apr 2017 | S |
D784391 | Yuguchi et al. | Apr 2017 | S |
D785025 | Zimmerman et al. | Apr 2017 | S |
9619625 | Bengtsson | Apr 2017 | B2 |
9623188 | Nielsen et al. | Apr 2017 | B2 |
9629901 | Estes | Apr 2017 | B2 |
D786273 | Herman et al. | May 2017 | S |
9636461 | Bengtsson et al. | May 2017 | B2 |
9636464 | Binier | May 2017 | B1 |
9638564 | Whalley et al. | May 2017 | B2 |
9642968 | Whalley et al. | May 2017 | B2 |
9649448 | Madsen | May 2017 | B2 |
9651482 | Blei et al. | May 2017 | B2 |
9672328 | Saint et al. | Jun 2017 | B2 |
9675761 | Hoeholt et al. | Jun 2017 | B2 |
D791806 | Brewington et al. | Jul 2017 | S |
D794047 | Gandhi et al. | Aug 2017 | S |
D795900 | Bischoff et al. | Aug 2017 | S |
D795919 | Bischoff et al. | Aug 2017 | S |
D795927 | Bischoff et al. | Aug 2017 | S |
9721176 | Prager | Aug 2017 | B2 |
9730621 | Cohen et al. | Aug 2017 | B2 |
9734302 | Nielsen et al. | Aug 2017 | B2 |
9737665 | Heumann et al. | Aug 2017 | B2 |
D797760 | Tsujimura et al. | Sep 2017 | S |
D798312 | Tsujimura et al. | Sep 2017 | S |
9750882 | Blei et al. | Sep 2017 | B2 |
9750886 | Plambech et al. | Sep 2017 | B2 |
9775543 | Brister et al. | Oct 2017 | B2 |
9782543 | Groeschke et al. | Oct 2017 | B2 |
9782544 | Heumann et al. | Oct 2017 | B2 |
9788172 | Ewe et al. | Oct 2017 | B1 |
9789260 | Binier | Oct 2017 | B1 |
9790977 | Baran et al. | Oct 2017 | B2 |
D802760 | Neby | Nov 2017 | S |
9833576 | Windum et al. | Dec 2017 | B2 |
9848774 | Bergstrom et al. | Dec 2017 | B2 |
D808986 | Dudey | Jan 2018 | S |
D809544 | Ambielli | Feb 2018 | S |
D809545 | Ban et al. | Feb 2018 | S |
D811425 | Olsen et al. | Feb 2018 | S |
D815127 | Phillips et al. | Apr 2018 | S |
D815667 | Yeung | Apr 2018 | S |
D819043 | Yamaura et al. | May 2018 | S |
9980140 | Spencer | May 2018 | B1 |
D820297 | Gardner et al. | Jun 2018 | S |
9996668 | Reihman et al. | Jun 2018 | B2 |
10016565 | Nielsen et al. | Jul 2018 | B2 |
10043093 | Allerdings et al. | Aug 2018 | B2 |
10071205 | Blei et al. | Sep 2018 | B2 |
D831049 | Agarwal et al. | Oct 2018 | S |
D831684 | Ghosh | Oct 2018 | S |
D832292 | Hu et al. | Oct 2018 | S |
10086141 | Steel et al. | Oct 2018 | B2 |
10105094 | Baran et al. | Oct 2018 | B2 |
10105497 | Dreier et al. | Oct 2018 | B2 |
D832870 | Hu | Nov 2018 | S |
D833469 | Coleman et al. | Nov 2018 | S |
D834710 | Michael | Nov 2018 | S |
10117996 | Stefansen | Nov 2018 | B2 |
10117999 | Andersen | Nov 2018 | B2 |
10133948 | Hammen | Nov 2018 | B2 |
D835118 | Lee et al. | Dec 2018 | S |
10155090 | Larsen et al. | Dec 2018 | B2 |
10159797 | Andersen et al. | Dec 2018 | B2 |
10159798 | Blei et al. | Dec 2018 | B2 |
D837807 | Baber et al. | Jan 2019 | S |
D838734 | Kruse et al. | Jan 2019 | S |
10166338 | Nielsen et al. | Jan 2019 | B2 |
10166340 | Blei et al. | Jan 2019 | B2 |
10169539 | Reihman et al. | Jan 2019 | B2 |
10173015 | Fiedler et al. | Jan 2019 | B2 |
10179207 | Haupt | Jan 2019 | B2 |
10183119 | Andersen et al. | Jan 2019 | B2 |
10183120 | Sihlanick et al. | Jan 2019 | B2 |
10190901 | Whalley et al. | Jan 2019 | B2 |
10195351 | Allerdings et al. | Feb 2019 | B2 |
10195352 | Baran et al. | Feb 2019 | B2 |
10195355 | Allerdings et al. | Feb 2019 | B2 |
D842888 | Krainer et al. | Mar 2019 | S |
D843402 | Casse et al. | Mar 2019 | S |
D846590 | Cabrera et al. | Apr 2019 | S |
D847165 | Kolbenheyer | Apr 2019 | S |
D849757 | Jing et al. | May 2019 | S |
10296128 | Nold et al. | May 2019 | B1 |
10341866 | Spencer | Jul 2019 | B1 |
10524110 | Klem | Dec 2019 | B1 |
10667759 | Duke et al. | Jun 2020 | B2 |
10686898 | Phillips et al. | Jun 2020 | B1 |
10702658 | Shekalim | Jul 2020 | B2 |
10896245 | Crothall | Jan 2021 | B2 |
11464459 | Sjolund et al. | Oct 2022 | B2 |
20030028089 | Galley et al. | Feb 2003 | A1 |
20030032868 | Graskov et al. | Feb 2003 | A1 |
20030065536 | Hansen et al. | Apr 2003 | A1 |
20040039255 | Simonsen et al. | Feb 2004 | A1 |
20040062148 | Skyggebjerg et al. | Apr 2004 | A1 |
20040093331 | Garner et al. | May 2004 | A1 |
20040153257 | Munk | Aug 2004 | A1 |
20050005121 | Chen | Jan 2005 | A1 |
20050038674 | Braig et al. | Feb 2005 | A1 |
20050049179 | Davidson et al. | Mar 2005 | A1 |
20050192557 | Brauker et al. | Sep 2005 | A1 |
20060036144 | Brister et al. | Feb 2006 | A1 |
20060173417 | Rosen et al. | Aug 2006 | A1 |
20070021715 | Kohlbrenner et al. | Jan 2007 | A1 |
20070173708 | Dobbles et al. | Jul 2007 | A9 |
20070186923 | Poutiatine et al. | Aug 2007 | A1 |
20070239486 | Gordon | Oct 2007 | A1 |
20080119705 | Patel et al. | May 2008 | A1 |
20080162192 | Vonk et al. | Jul 2008 | A1 |
20080188813 | Miller et al. | Aug 2008 | A1 |
20080201169 | Galasso et al. | Aug 2008 | A1 |
20080228057 | Graskov et al. | Sep 2008 | A1 |
20080234663 | Yodfat et al. | Sep 2008 | A1 |
20080235053 | Ray et al. | Sep 2008 | A1 |
20080262469 | Brister et al. | Oct 2008 | A1 |
20080287755 | Sass et al. | Nov 2008 | A1 |
20080300572 | Rankers et al. | Dec 2008 | A1 |
20080310676 | Silver | Dec 2008 | A1 |
20080312512 | Brukalo et al. | Dec 2008 | A1 |
20080312584 | Montgomery et al. | Dec 2008 | A1 |
20090036771 | Fago et al. | Feb 2009 | A1 |
20090048561 | Burren et al. | Feb 2009 | A1 |
20090103124 | Kimura et al. | Apr 2009 | A1 |
20090120716 | Yamamoto et al. | May 2009 | A1 |
20090131875 | Green | May 2009 | A1 |
20090144089 | Heywood et al. | Jun 2009 | A1 |
20090163793 | Koehler et al. | Jun 2009 | A1 |
20090171589 | Kovatchev | Jul 2009 | A1 |
20090209938 | Matti | Aug 2009 | A1 |
20090240440 | Shurabura et al. | Sep 2009 | A1 |
20090299276 | Brauker et al. | Dec 2009 | A1 |
20090299279 | Richter | Dec 2009 | A1 |
20090318865 | Moeller et al. | Dec 2009 | A1 |
20100017141 | Campbell et al. | Jan 2010 | A1 |
20100049126 | Bronfeld et al. | Feb 2010 | A1 |
20100058060 | Schneider | Mar 2010 | A1 |
20100063438 | Bengtsson | Mar 2010 | A1 |
20100081993 | O'Connor | Apr 2010 | A1 |
20100095229 | Dixon et al. | Apr 2010 | A1 |
20100198520 | Breton et al. | Aug 2010 | A1 |
20100292634 | Kircher et al. | Nov 2010 | A1 |
20100305965 | Benjamin et al. | Dec 2010 | A1 |
20100331656 | Mensinger et al. | Dec 2010 | A1 |
20110009727 | Mensinger et al. | Jan 2011 | A1 |
20110124996 | Reinke et al. | May 2011 | A1 |
20110178462 | Moberg et al. | Jul 2011 | A1 |
20110184343 | Veit et al. | Jul 2011 | A1 |
20110191343 | Heaton et al. | Aug 2011 | A1 |
20110193704 | Harper et al. | Aug 2011 | A1 |
20110201911 | Johnson et al. | Aug 2011 | A1 |
20110270158 | Brauker et al. | Nov 2011 | A1 |
20110275986 | Bashan et al. | Nov 2011 | A1 |
20110281791 | Zion et al. | Nov 2011 | A1 |
20110282409 | Ternes et al. | Nov 2011 | A1 |
20110295215 | Nielsen et al. | Dec 2011 | A1 |
20110313350 | Krulevitch et al. | Dec 2011 | A1 |
20110313395 | Krulevitch et al. | Dec 2011 | A1 |
20120046606 | Arefieg | Feb 2012 | A1 |
20120072236 | Atkin | Mar 2012 | A1 |
20120078665 | Johnson et al. | Mar 2012 | A1 |
20120165746 | Harms et al. | Jun 2012 | A1 |
20120186581 | Brauker et al. | Jul 2012 | A1 |
20120190953 | Brauker et al. | Jul 2012 | A1 |
20120191063 | Brauker et al. | Jul 2012 | A1 |
20120215201 | Brauker et al. | Aug 2012 | A1 |
20120220979 | Brauker et al. | Aug 2012 | A1 |
20120238852 | Brauker et al. | Sep 2012 | A1 |
20120238853 | Arefieg | Sep 2012 | A1 |
20120271557 | Sekimoto et al. | Oct 2012 | A1 |
20120296311 | Brauker et al. | Nov 2012 | A1 |
20130004844 | Hosoe et al. | Jan 2013 | A1 |
20130030841 | Bergstrom et al. | Jan 2013 | A1 |
20130035575 | Mayou et al. | Feb 2013 | A1 |
20130035865 | Mayou et al. | Feb 2013 | A1 |
20130035871 | Mayou et al. | Feb 2013 | A1 |
20130047084 | Sanders et al. | Feb 2013 | A1 |
20130171938 | Mears et al. | Jul 2013 | A1 |
20130184547 | Taub et al. | Jul 2013 | A1 |
20130184996 | Zivitz et al. | Jul 2013 | A1 |
20130197479 | Butler et al. | Aug 2013 | A1 |
20130211248 | Cowan et al. | Aug 2013 | A1 |
20130291116 | Homer | Oct 2013 | A1 |
20130298063 | Joy et al. | Nov 2013 | A1 |
20130310756 | Whalley et al. | Nov 2013 | A1 |
20130331659 | Koski et al. | Dec 2013 | A1 |
20130338453 | Duke et al. | Dec 2013 | A1 |
20140012117 | Mensinger et al. | Jan 2014 | A1 |
20140012118 | Mensinger et al. | Jan 2014 | A1 |
20140012510 | Mensinger et al. | Jan 2014 | A1 |
20140012511 | Mensinger et al. | Jan 2014 | A1 |
20140018733 | Sjoelund et al. | Jan 2014 | A1 |
20140019396 | Carlsgaard et al. | Jan 2014 | A1 |
20140025400 | Galley et al. | Jan 2014 | A1 |
20140058749 | Galley et al. | Feb 2014 | A1 |
20140068487 | Steiger et al. | Mar 2014 | A1 |
20140074041 | Pedersen et al. | Mar 2014 | A1 |
20140081662 | Bradrick et al. | Mar 2014 | A1 |
20140091941 | Johnson et al. | Apr 2014 | A1 |
20140094743 | Bengtsson | Apr 2014 | A1 |
20140113856 | Pohl et al. | Apr 2014 | A1 |
20140114161 | Kamath et al. | Apr 2014 | A1 |
20140128705 | Mazlish | May 2014 | A1 |
20140148659 | Sloan et al. | May 2014 | A1 |
20140187889 | Cohen et al. | Jul 2014 | A1 |
20140200426 | Taub et al. | Jul 2014 | A1 |
20140207080 | Allerdings | Jul 2014 | A1 |
20140257065 | Brister et al. | Sep 2014 | A1 |
20140276531 | Walsh | Sep 2014 | A1 |
20140288494 | Brister et al. | Sep 2014 | A1 |
20140297299 | Lester, IV | Oct 2014 | A1 |
20140309615 | Mazlish | Oct 2014 | A1 |
20140324020 | Stefansen | Oct 2014 | A1 |
20140371682 | Bengtsson et al. | Dec 2014 | A1 |
20150018770 | Baran et al. | Jan 2015 | A1 |
20150043410 | Chaturvedi et al. | Feb 2015 | A1 |
20150073337 | Saint et al. | Mar 2015 | A1 |
20150151050 | Estes | Jun 2015 | A1 |
20150164415 | Bashan et al. | Jun 2015 | A1 |
20150193595 | McNamara et al. | Jul 2015 | A1 |
20150202375 | Schabbach et al. | Jul 2015 | A1 |
20150202377 | Haupt | Jul 2015 | A1 |
20150205947 | Berman et al. | Jul 2015 | A1 |
20150246179 | Zur et al. | Sep 2015 | A1 |
20150260726 | Refvik | Sep 2015 | A1 |
20150289823 | Rack-Gomer et al. | Oct 2015 | A1 |
20150290396 | Nagar et al. | Oct 2015 | A1 |
20150306304 | Schabbach et al. | Oct 2015 | A1 |
20150350147 | Shepherd et al. | Dec 2015 | A1 |
20150351683 | Brauker et al. | Dec 2015 | A1 |
20150356273 | Cave | Dec 2015 | A1 |
20150359490 | Massey et al. | Dec 2015 | A1 |
20150359965 | O'Connor et al. | Dec 2015 | A1 |
20150365826 | Mancini | Dec 2015 | A1 |
20160030673 | White et al. | Feb 2016 | A1 |
20160030679 | Nielsen et al. | Feb 2016 | A1 |
20160030680 | Veasey et al. | Feb 2016 | A1 |
20160030683 | Taylor et al. | Feb 2016 | A1 |
20160038675 | Estes et al. | Feb 2016 | A1 |
20160047685 | Blei et al. | Feb 2016 | A1 |
20160047743 | Blei et al. | Feb 2016 | A1 |
20160051760 | Krusell et al. | Feb 2016 | A1 |
20160065799 | Haupt et al. | Mar 2016 | A1 |
20160066843 | Mensinger et al. | Mar 2016 | A1 |
20160081632 | Kamath et al. | Mar 2016 | A1 |
20160082192 | Veasey et al. | Mar 2016 | A1 |
20160101232 | Kamath et al. | Apr 2016 | A1 |
20160101234 | Bock et al. | Apr 2016 | A1 |
20160106927 | Moeller et al. | Apr 2016 | A1 |
20160113558 | Bhavaraju et al. | Apr 2016 | A1 |
20160117481 | Booth et al. | Apr 2016 | A1 |
20160155081 | Legisa et al. | Jun 2016 | A1 |
20160213848 | Whalley et al. | Jul 2016 | A1 |
20160223380 | Whalley et al. | Aug 2016 | A1 |
20160235925 | Kuhn et al. | Aug 2016 | A1 |
20160263327 | Radmer et al. | Sep 2016 | A1 |
20160266752 | Wu et al. | Sep 2016 | A1 |
20160287804 | Madsen et al. | Oct 2016 | A1 |
20160287807 | Madsen et al. | Oct 2016 | A1 |
20160324463 | Simpson et al. | Nov 2016 | A1 |
20170053101 | Booth et al. | Feb 2017 | A1 |
20170053552 | Zhong et al. | Feb 2017 | A1 |
20170068799 | Mensinger et al. | Mar 2017 | A1 |
20170103175 | Chopra et al. | Apr 2017 | A1 |
20170106052 | Spat et al. | Apr 2017 | A1 |
20170124275 | Reihman et al. | May 2017 | A1 |
20170131993 | Salameh et al. | May 2017 | A1 |
20170132120 | Salameh et al. | May 2017 | A1 |
20170132392 | Gerken | May 2017 | A1 |
20170138769 | Jones et al. | May 2017 | A1 |
20170139974 | Javed et al. | May 2017 | A1 |
20170151390 | Muller-Pathle | Jun 2017 | A1 |
20170173261 | O'Connor et al. | Jun 2017 | A1 |
20170181645 | Mahalingam et al. | Jun 2017 | A1 |
20170181678 | Newberry | Jun 2017 | A1 |
20170182258 | Michael | Jun 2017 | A1 |
20170185283 | Bhavaraju et al. | Jun 2017 | A1 |
20170185284 | Bhavaraju et al. | Jun 2017 | A1 |
20170189615 | Estes | Jul 2017 | A1 |
20170189616 | Bengtsson et al. | Jul 2017 | A1 |
20170189625 | Cirillo et al. | Jul 2017 | A1 |
20170199985 | Mazlish et al. | Jul 2017 | A1 |
20170215811 | Newberry | Aug 2017 | A1 |
20170216518 | Davis et al. | Aug 2017 | A1 |
20170216524 | Haider et al. | Aug 2017 | A1 |
20170219486 | Blei et al. | Aug 2017 | A1 |
20170220751 | Davis et al. | Aug 2017 | A1 |
20170224922 | Lepple-Wienhues | Aug 2017 | A1 |
20170224927 | Windum et al. | Aug 2017 | A1 |
20170228518 | Booth et al. | Aug 2017 | A1 |
20170232203 | Krusell | Aug 2017 | A1 |
20170235919 | Bauss et al. | Aug 2017 | A1 |
20170235920 | Bauss et al. | Aug 2017 | A1 |
20170251982 | Koehler et al. | Sep 2017 | A1 |
20170266389 | McLoughlin et al. | Sep 2017 | A1 |
20170270276 | Saint et al. | Sep 2017 | A1 |
20170270829 | Bauss | Sep 2017 | A1 |
20170286194 | Morris et al. | Oct 2017 | A1 |
20170286614 | Morris et al. | Oct 2017 | A1 |
20170286638 | Searle et al. | Oct 2017 | A1 |
20170304538 | Renstad et al. | Oct 2017 | A1 |
20170304541 | Bauss et al. | Oct 2017 | A1 |
20170304552 | Prager | Oct 2017 | A1 |
20170312446 | Kunz et al. | Nov 2017 | A1 |
20170316178 | Riedel et al. | Nov 2017 | A1 |
20170338864 | Rolsted et al. | Nov 2017 | A1 |
20170340808 | Andersen et al. | Nov 2017 | A1 |
20170340826 | Draper | Nov 2017 | A1 |
20170351842 | Booth et al. | Dec 2017 | A1 |
20170366617 | Mensinger et al. | Dec 2017 | A1 |
20170367627 | Brister et al. | Dec 2017 | A1 |
20170368263 | Ploch | Dec 2017 | A1 |
20170368265 | Groeschke et al. | Dec 2017 | A1 |
20180001027 | Klemm et al. | Jan 2018 | A1 |
20180008773 | Hautaviita et al. | Jan 2018 | A1 |
20180008778 | Erbstein | Jan 2018 | A1 |
20180008779 | Hautaviita et al. | Jan 2018 | A1 |
20180028759 | Riedel et al. | Feb 2018 | A1 |
20180028760 | Gugl et al. | Feb 2018 | A1 |
20180036484 | Andersen | Feb 2018 | A1 |
20180036495 | Searle et al. | Feb 2018 | A1 |
20180042559 | Cabrera et al. | Feb 2018 | A1 |
20180043104 | Mueller Pathle | Feb 2018 | A1 |
20180050157 | Whalley et al. | Feb 2018 | A1 |
20180060008 | Bender et al. | Mar 2018 | A1 |
20180060529 | Crothall | Mar 2018 | A1 |
20180064879 | Sall et al. | Mar 2018 | A1 |
20180085532 | Desborough et al. | Mar 2018 | A1 |
20180099084 | Schabbach et al. | Apr 2018 | A1 |
20180103879 | Masciotti et al. | Apr 2018 | A1 |
20180121630 | Portnoy | May 2018 | A1 |
20180147362 | Arenas et al. | May 2018 | A1 |
20180154086 | Toporek et al. | Jun 2018 | A1 |
20180161505 | Prager | Jun 2018 | A1 |
20180185587 | Brauker et al. | Jul 2018 | A1 |
20180217917 | Hayter et al. | Aug 2018 | A1 |
20180221582 | Klemm et al. | Aug 2018 | A1 |
20180224315 | Schabbacha et al. | Aug 2018 | A1 |
20180226150 | Hayter et al. | Aug 2018 | A1 |
20180228977 | Schabbach et al. | Aug 2018 | A1 |
20180236172 | Schabbach et al. | Aug 2018 | A1 |
20180236185 | Sall et al. | Aug 2018 | A1 |
20180243504 | Scott et al. | Aug 2018 | A1 |
20180262578 | Shaw et al. | Sep 2018 | A1 |
20180268236 | Klemm | Sep 2018 | A1 |
20180272072 | Radmer et al. | Sep 2018 | A1 |
20180277246 | Zhong et al. | Sep 2018 | A1 |
20180289901 | Bggild-Damkvist et al. | Oct 2018 | A1 |
20180296767 | Sall | Oct 2018 | A1 |
20180303417 | Mensinger et al. | Oct 2018 | A1 |
20180304028 | Riedel | Oct 2018 | A1 |
20180326164 | Bauss et al. | Nov 2018 | A1 |
20180339113 | Wendland et al. | Nov 2018 | A1 |
20180341826 | Allerdings et al. | Nov 2018 | A1 |
20180353694 | Riedel et al. | Dec 2018 | A1 |
20180353698 | Saint et al. | Dec 2018 | A1 |
20180353699 | Helmer et al. | Dec 2018 | A1 |
20180353700 | Sall et al. | Dec 2018 | A1 |
20180361067 | Sall et al. | Dec 2018 | A1 |
20180361076 | Klemm et al. | Dec 2018 | A1 |
20180361082 | Sall et al. | Dec 2018 | A1 |
20180368683 | Hu et al. | Dec 2018 | A1 |
20180369479 | Hayter et al. | Dec 2018 | A1 |
20180369488 | Carlsson et al. | Dec 2018 | A1 |
20180369490 | Rehbein et al. | Dec 2018 | A1 |
20190001060 | Gylleby et al. | Jan 2019 | A1 |
20190001069 | Carlsson et al. | Jan 2019 | A1 |
20190009032 | Hautaviita et al. | Jan 2019 | A1 |
20190015020 | Brister et al. | Jan 2019 | A1 |
20190015596 | Saint et al. | Jan 2019 | A1 |
20190022320 | Carlsson et al. | Jan 2019 | A1 |
20190029590 | Baran et al. | Jan 2019 | A1 |
20190030250 | Steel et al. | Jan 2019 | A1 |
20190035500 | Saint et al. | Jan 2019 | A1 |
20190036688 | Wasily | Jan 2019 | A1 |
20190076070 | Nogueira et al. | Mar 2019 | A1 |
20190125224 | Kamath et al. | May 2019 | A1 |
20190125969 | Montgomery et al. | May 2019 | A1 |
20190132801 | Kamath et al. | May 2019 | A1 |
20190149887 | Williams et al. | May 2019 | A1 |
20190173885 | Kamath et al. | Jun 2019 | A1 |
20190175833 | Sjolund et al. | Jun 2019 | A1 |
20190175841 | Sjolund et al. | Jun 2019 | A1 |
20190183434 | Sjolund et al. | Jun 2019 | A1 |
20190184091 | Sjolund et al. | Jun 2019 | A1 |
20190184092 | Sjolund et al. | Jun 2019 | A1 |
20190184093 | Sjolund et al. | Jun 2019 | A1 |
20190184094 | Sjolund et al. | Jun 2019 | A1 |
20190184107 | Sjolund et al. | Jun 2019 | A1 |
20190184108 | Sjolund et al. | Jun 2019 | A1 |
20190184109 | Sjolund et al. | Jun 2019 | A1 |
20190184111 | Sjolund et al. | Jun 2019 | A1 |
20190192071 | Taub et al. | Jun 2019 | A1 |
20190237181 | Steinberg | Aug 2019 | A1 |
20190239825 | Kumar et al. | Aug 2019 | A1 |
20190274598 | Scott et al. | Sep 2019 | A1 |
20190282141 | Causey et al. | Sep 2019 | A1 |
20190332774 | Nix | Oct 2019 | A1 |
20200016336 | Patek et al. | Jan 2020 | A1 |
20200205724 | Lee et al. | Jul 2020 | A1 |
20200261673 | Hickey | Aug 2020 | A1 |
20200350052 | Saint et al. | Nov 2020 | A1 |
20200360794 | Intonato et al. | Nov 2020 | A1 |
Number | Date | Country |
---|---|---|
2925458 | Apr 2015 | CA |
201248860 | Jun 2009 | CN |
103443798 | Dec 2013 | CN |
103957961 | Jul 2014 | CN |
104411349 | Mar 2015 | CN |
104797282 | Jul 2015 | CN |
105377118 | Mar 2016 | CN |
107073207 | Aug 2017 | CN |
0298067 | Jan 1989 | EP |
0513128 | Nov 1992 | EP |
0927057 | Jul 1999 | EP |
1571582 | Sep 2005 | EP |
1680175 | Jul 2006 | EP |
2401011 | Jan 2012 | EP |
2572740 | Mar 2013 | EP |
2767297 | Aug 2014 | EP |
2911717 | Sep 2015 | EP |
2926846 | Oct 2015 | EP |
3049132 | Aug 2016 | EP |
2879740 | Mar 2017 | EP |
3167393 | May 2017 | EP |
2797660 | Oct 2019 | EP |
2014-514046 | Jun 2014 | JP |
2014-531283 | Nov 2014 | JP |
2015-178044 | Oct 2015 | JP |
2016-515452 | May 2016 | JP |
2016-517601 | Jun 2016 | JP |
6058673 | Jan 2017 | JP |
8502544 | Jun 1985 | WO |
9110460 | Jul 1991 | WO |
9638190 | Dec 1996 | WO |
9810813 | Mar 1998 | WO |
2005046559 | May 2005 | WO |
2010037828 | Apr 2010 | WO |
2010052275 | May 2010 | WO |
2010056718 | May 2010 | WO |
2010098927 | Sep 2010 | WO |
2011041007 | Apr 2011 | WO |
2011091238 | Jul 2011 | WO |
2012046199 | Apr 2012 | WO |
2013004844 | Jan 2013 | WO |
2013037754 | Mar 2013 | WO |
2013053695 | Apr 2013 | WO |
2013177135 | Nov 2013 | WO |
2014020010 | Feb 2014 | WO |
2014029621 | Feb 2014 | WO |
2014064691 | May 2014 | WO |
2014128157 | Aug 2014 | WO |
2014145049 | Sep 2014 | WO |
2015047870 | Apr 2015 | WO |
2015169814 | Nov 2015 | WO |
2015185686 | Dec 2015 | WO |
2016004210 | Jan 2016 | WO |
2016019192 | Feb 2016 | WO |
2016007935 | Apr 2016 | WO |
2016071912 | May 2016 | WO |
WO-2016116853 | Jul 2016 | WO |
2016151973 | Sep 2016 | WO |
2017123523 | Jul 2017 | WO |
2017123525 | Jul 2017 | WO |
2017132557 | Aug 2017 | WO |
2017132577 | Aug 2017 | WO |
2018064222 | Apr 2018 | WO |
Entry |
---|
“Calculating Insulin Dose.” Diabetes Education Online, University of California, San Francisco, https://web.archive.org/web/20110711172015/dtc.ucsf.edu/types-of-diabetes/type2/treatment-of-type-2-diabetes/medications-and-therapies/type-2-insulin-rx/calculating-insulin-dose/. Retrieved Feb. 2021. (Year: 2011). |
Baker, New Technologies for Diabetes, Mar. 25, 2017, XP055568829, 76, https://diabetes-education.com/wp-content/uploads/2017/03/Baker-HCP3.pdf. |
Hu et al., An Improved PID Algorithm Based on Insulin-on-Board Estimate for Blood Glucose Control with Type 1 Diabetes, Jan. 1, 2015, Computational and Mathematical Methods in Medicine, 1-8, 2015. |
Near Field Communication versus Bluetooth, Jan. 3, 2016, NearFieldCommunication.org via web.archive.org (Year: 2016). |
Sara Krugman, Bionic Pancreas User Interface (3/4): Interface Details, Tidepool.org, Jul. 20, 2015. |
T:slimx2 Insulin Pump User Guide, Tandem Diabetes Care, Jul. 22, 2016. |
White, Common Sensing, May 2, 2017, XP055568837, 15, Mar. 13, 2019. |
Cision PR News Wire, “Companion Medical Announces Insights by InPen, the Future of MDI Reports”, Jun. 20, 2018. |
Chinese First Office Action and Search Report for Chinese Application No. 201880080537.X, dated Apr. 27, 2023, 53 pages with translation. |
Chinese First Office Action and Search Report for Chinese Application No. 201880080699.3, dated May 11, 2023, 47 pages with translation. |
European Communication pursuant to Article 94(3) EPC for European Application No. 18839959, dated Apr. 4, 2023, 6 pages. |
European Communication pursuant to Article 94(3) EPC for European Application No. 18839960.4, dated May 26, 2023, 6 pages. |
European Examination Report for EP Application No. 18840106.1, mailed Mar. 24, 2023, 14 pages. |
European Search Report and Search Opinion Received for EP Application No. 21212980.3, dated on Jul. 7, 2022, 10 pages. |
Hu et al., An Improved PID Algorithm Based on Insulin-on-Board Estimate for Blood Glucose Control with Type 1 Diabetes, Jan. 1, 2015, Computational and Mathematical Methods in Medicine, pp. 1-8, 2015. |
Indian Patent Examination Report for Indian Application No. 202027023258 dated May 19, 2022, 6 pages. |
Japanese Notice of Reasons for Refusal for Japanese Patent Application No. 2020-551774, dated Dec. 4, 2023, 14 pages with English translation. |
Australian Patent Examination Report No. 1 for Australian Patent Application No. 2018383731, dated Oct. 17, 2023, 6 pages. |
Australian Patent Examination Report No. 1 for Australian Patent Application No. 2018383743, dated Oct. 23, 2023, 5 pages. |
Chinese Second Office Action for Chinese Application No. 201880080537.X, dated Nov. 10, 2023, 44 pages with English translation. |
Chinese Second Office Action for Chinese Application No. 201880080699.3, dated Dec. 25, 2023, 33 pages with English translation. |
Communication pursuant to Article 94(3) EPC for European Patent Application No. 18 852 783.2, mailed Jun. 22, 2023, 9 pages. |
Japanese Notice of Reasons for Rejection for Japanese Application No. 2020-551774, dated Sep. 25, 2023, 6 pages with English translation. |
Summons to attend oral proceedings pursuant to Rule 115(1) EPC for European Application No. 18839960.4, dated Jan. 25, 2024, 7 pages. |
Number | Date | Country | |
---|---|---|---|
62752493 | Oct 2018 | US |