System and network that leverages the popularity and functionality of mobile content playback devices for the purpose of capturing real-time data points for immediate or future analysis and potential intervention.
In the past, significantly large groups of people have had the need to capture data points in real-time for the purpose of analyzing such data for potential risks or threats. For example, a patient who has recently experienced the failure of a vital organ may need to continuously collect and analyze vital statistics in order to be assured that he or she is not in any imminent danger. The problem has been the prohibitive cost of such a system. If a company were to architect and manufacture a device that would provide them with information about their own vital statistics, it would most likely be unmarketable as it would be too expensive for the intended population.
From time to time, technologies are introduced to the market that are not intended to solve health problems, however, they provide effective building blocks that can be adapted and modified to ultimately assist people in maintaining their health. When these technologies reach a critical mass in the market place, they can then be used as a platform to introduce new and important solutions by allowing a leveraging or “piggy-back” effect based on the success of the original product.
The intention of this patent application is to teach a method and a utility for leveraging the use of a consumer's iPod™ device manufactured by Apple Computer, Inc.™ (or other similar devices) in order to capture data points in real-time for the purposes of analyzing such data and effectively reporting the results back to the consumer.
In the preferred embodiment, a patient with a health risk may wish to use his or her Apple iPod™ device to collect vital statistics during the course of an hour, day, week, month, or year. The memory capacity within the iPod™ can be used to hold the data points as they are being collected. At an appropriate time, the patient can then plug the iPod© into a data analysis facility so the data points can be effectively analyzed and the appropriate recommendations can be sent back to the patient. Such analysis can be performed by plugging the iPod™ into another consumer electronics (CE) device such as a PC or a common television set-top-box. With an appropriate harness or cradle, the data points from the iPod™ can be transmitted to a more powerful CE device that has network connectivity. Once these data have been effectively analyzed, the patient can receive instructions regarding how best to proceed on the path to improved health. Examples of instructions can be (but are not limited to) the following:
The important thing to note is the way that a number of popular consumer oriented devices can be leveraged in order to create a low-cost solution for monitoring and reporting data points.
Note: For the purposes of this patent application, the iPod™ will now be referred to simply as a “Pod”.
The current state-of-the-art pods that exist today for either music, or video, or both are typically designed with connectors both on the top of the unit and at the bottom of the unit, or either or both sides. In the preferred embodiment, either a clam-shell style adapter would wrap itself around the Pod in such a way as to connect to both the top connectors and the bottom connectors simultaneously, or adapters could be stacked atop the pod in a tower fashion. In addition, this clam shell or tower adapter houses the extra logic, sensors, and software that capture the desired data elements. As these data elements are being captured, the adapters feed data to the Pod with instructions regarding “where” and “how” to store these data elements. Given the vast amount of memory available to a current-day Pod, large amounts of data can be stored with little concern about “running out of on-board system resources”.
A companion harness or cradle (from now on referred to as the cradle) can then be used to hold the Pod while it gains access to the stored data elements and then transfers them securely to a network for analyses and reporting purposes. For example, the data can be analyzed by a physician connected to the network or by a device connected to the network.
One embodiment of the system is depicted below:
Sensors→Pod→Cradle→CE device→Network→Reporting Mechanism
The best things about leveraging a Pod device for the purposes mentioned above are:
Additionally, such a Pod can be manufactured or distributed by virtually any company as long as the device has either achieved a minimal level of success, or such a device has the potential to achieve a minimal level of success and supports essentially the same functional capabilities of the iPod™: digital input/output, data storage, internal battery, text/video screen, user interface controls.
The Sensor Adapter (2) is the module that interfaces to sensing devices that capture the empirical data in real-time.
The Data Acquisition/Adaptation Module (3) collects the empirical data received by the Sensor Adapter (2) and prepares the data in such a way that it can be communicated to the Pod for storage and subsequent external transmittal. Additionally, an Event Input (9) is used to indicate that a significant event has occurred that should be noted in the data or that signals a trigger event to the set-top-box via a short range radio frequency signal.
The Communications Adapter (4) is the input/output device that links the Pod (1) to the outside world. The primary function for this Communications Adapter (4) is to send the data elements that were captured by the Sensor Adapter (2) and prepared by the Data Acquisition/Adaptation Module (3) then subsequently stored on the Pod (1) to the Network (7) in order for the consumer to eventually receive his or her Analysis Reports (8). It is important to note that the Communications Adapter (4) is a two-way device.
Although its primary function is to send data elements to the outside world, it can also receive data for a number of purposes such as:
In one embodiment the Cradle (5) is not a part of the Pod (1). The Cradle (5) is an extension of a popular CE Device (6) such as a PC or a set-top-box. This Cradle (5) facilitates the coupling of the Pod (1) to the CE Device (6). Once the Pod (1) is connected to the Cradle (5) by way of the Communications Adapter (4), then the flow of information from the Pod to the CE Device (6) (and vice-versa), can take place.
The CE Device (6) is the component that has the extra system resources required to take the data points received from the Pod (1) and send them through the appropriate network for analyses. Although the primary purpose for the CE Device (6) is to appropriately package the data elements and send them to the intended location, the CE Device (6) can additionally conduct its own analyses and processing for the purpose of alerting (or otherwise notifying) the consumer of certain states or conditions that might exist. For example this can be accomplished by loading software onto the CE Device which accomplishes these tasks using the resources of the CE Device.
The Network (7) is either a public or private network that can facilitate the flow of information from the Pod (1) to the appropriate Analysis and Reporting Service (8). It is obvious that the flow of data must be two-way as the Analysis and Reporting Service (8) may have information that needs to be communicated to both the CE Device (6) and the Pod (1).
The Analysis and Reporting Service (8) is the entity responsible to collect the empirical data received from multiple Pods (1), format the data as required, perform the necessary analyses, and then report the findings in an expeditious manner back to the intended consumers. In one embodiment the functions of the analysis and reporting service are accomplished by the CE Device itself.
In the end, the Analysis and Reporting Service (8) will be responsible to prepare and send its findings to consumers in ways that are secure, expeditious, user-friendly, helpful, and informative.
It is of the utmost importance that this entire system be secure. These data elements collected from a consumer are considered confidential information and cannot be shared with anyone else without the express consent from the consumer. Therefore, well-known security technologies such as SSL, AES-128 Encryption, Public Key Infrastructure, X.509 standards and protocols, RSA technologies and others can be used to verify the identity of the consumer and make sure the appropriate reports are sent back to the same consumer without any form of potential piracy or compromise.
The examples used above revolve around health-related risks. Alternatively, it is possible to collect information for other disciplines as well. For example, a consumer may be concerned about biological hazards that he or she may be exposed to. Using such an example, the consumer is not worried so much about his or her own vital statistics. Instead, the consumer is more concerned about the immediate environment. In this case, the system still works using the same basic principals. The data is collected by a Pod (1), the data is the organized appropriately and then sent on for analyses. The results of the analyses are then reported back to the consumer in a timely, efficient, and ultimately helpful manner.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/US06/39280 | 10/6/2006 | WO | 00 | 4/4/2008 |
Number | Date | Country | |
---|---|---|---|
60724150 | Oct 2005 | US |