Home treatment can provide tremendous benefits for sufferers of chronic ailments such as renal failure. But there is potential for harm in the home setting that is offset in a clinical setting by the presence of trained staff. If a patient undergoing dialysis, for example, has a reaction due to unforeseen conditions, the staff can take immediate action to assist the patient, even if the patient loses consciousness. In the home, this role may be played by a trained assistant. The instructions and training associated with home use may be replete with admonitions against attempting to perform a treatment without following the requirement that the assistant be in attendance, but there is always a need for creative approaches that further help to ensure that such requirements are fulfilled.
A home treatment system includes various devices to limit the potential for a patient to misuse a home medical treatment device or its components by limiting access to or use of equipment while not attended by an assistant or other authorized party.
According to an embodiment, a method verifies proper use of a medical device. The method includes authenticating an authorized person other than a patient to be treated using a device attached to a treatment device used to treat the patient, generating an enabling signal to cause the treatment device to become operable in response to a result of the step of authenticating, verifying at least one time during a treatment interval that an individual other than the patient is at a treatment location where the patient and the treatment device are located, performing a warning procedure responsively to a result of the step of verifying. The warning procedure includes generating a signal to indicate an impending termination of treatment within a specified time. The method further includes waiting for the individual to verify a presence of the individual within the specified time and terminating a treatment of the patient responsively to and after the step of waiting.
In a further embodiment, the authenticating includes machine-recognizing a biometric indicator of identity. The warning procedure may include displaying requirements for a treatment procedure, a message requesting the presence of the authorized person, a message transmission to a remote terminal such as a cell phone, a remote networked terminal (such as at a medical center), or a land line telephone. The authenticating may include reading a magnetic medium storing a data key, a finger, retina, keypad entry, RFID tag, the receiving of a mechanical key, or any suitable authentication process.
In a particular embodiment, the authenticating includes machine-classification of a video image such as recognizing the face of an assistant. Video classification is particularly useful in this context because it allows the treatment scene to be assessed in a variety of ways. For example, a video scene can be classified to determine if a person other than the patient remains with the patient during the treatment. The video system can “watch” the scene to make sure that if the helper does leave for a period of time, it is only for a predefined interval. A model of the treatment scene can be predefined as part of the classification process. For example, the model may specify that the helper will prepare a meal at a particular time or that the helper uses the bathroom with a predefined frequency. Thus, the model may be identified as storing a “pattern of presences of the helper.” The model can be programmed specifically for this purpose or it can be acquired passively by observing behavior. By comparing consistency with the model (or in the case of the passively acquired model, this amounts to consistency from treatment to treatment) the video recognition system can determine if the non-presence of a helper is out of an expected bound. For example, if the model indicates that the helper should leave approximately at noon for 15 minutes and the helper leaves for 30 minutes, the system may initiate the protective features described in this application, such as sounding an annunciator or displaying a message to try to call back the helper or, upon failing that, the system may go into a failsafe mode. A video system even can have the ability to determine if the helper has fallen asleep by observing posture and movement of the helper.
Preferably, the method further includes authenticating an authorized person at least three times during a treatment interval, the three times being spaced apart such that the third time is more than half-way through the treatment interval. Even more preferably, the system continuously monitors indicia of the presence of the helper.
A medical device, comprising: controls for operating the medical device; a lock that prevents at least some functions of medical device from being operable through the controls; the lock granting initial access to the medical when a key is applied to the lock; a message generator that indicates that the medical device will go into a failsafe mode unless the lock is applied again at at least one time during a treatment interval; the lock permitting continued operation of the in response to the key being applied at the at least one time; the medical device being configured to go into the failsafe mode when the key is not applied during the at least one time.
The lock may be configured to perform machine-recognition of a biometric indicator of identity. The device may include a display and a message generator that displays on the display requirements for a treatment procedure. The device may also have a communication device including one of a wireless terminal, a telephone, and a networked terminal that generates a message indicating the failure of the key to be applied to the lock at the at least one time. The key may include a magnetic medium storing a data key. The lock may include a video camera and a device configured for machine-classification of a video image from the video camera. The lock may be a simple structure, for example one that prevent access by locking an access panel covering the controls.
Note that here and elsewhere in the specification, the term “video image” can also refer to a video stream or sequence of images or a metric derived from it. For example, an activity level in a scene can be determined from a compression metric such as MPEG motion compensation vector, or the average total energy in the motion compensation vector over a period of time. This would also fall under the meaning of “video image.”
According to another embodiment, a medical device, has a medical treatment component and a monitoring system configured to receive data from sensors to confirm the presence of a helper. The helper is different from a patient receiving treatment by the medical treatment component. The monitoring system is configured to confirm a pattern of presences of the helper during a treatment period in which the medical treatment component is operative to deliver therapy to a patient. The monitoring system generates a signal indicative of an abnormal condition when the pattern of presences of the helper is not confirmed.
The monitoring system can include a video camera and a video classification engine that monitors a scene that includes a patient and a helper. In this embodiment, the monitoring system may initially authenticate the helper using any of a variety of known techniques, such as fingerprint identification. This process may also include machine-classification of a video image such as recognizing the face of the helper. Video classification is particularly useful in this context because it allows the treatment scene to be assessed in a variety of ways and continually monitored. For example, a video scene can be classified to determine if a person other than the patient remains with the patient during the treatment. The video system can “watch′” the scene to make sure that if the helper does leave for a period of time, it is only for a predefined interval. A model of the treatment scene can be predefined as part of the classification process. For example, the model may specify that the helper will prepare a meal at a particular time or that the helper uses the bathroom with a predefined frequency. Thus, the model may be identified as storing a “pattern of presences of the helper.” The model can be programmed specifically for this purpose or it can be acquired passively by observing behavior. By comparing consistency with the model (or in the case of the passively acquired model this amounts to consistency from treatment to treatment) the video recognition system can determine if the non-presence of a helper is out of an expected bound. For example, if the model indicates that the helper should leave approximately at noon for 15 minutes and the helper leaves tor 30 minutes, the system may initiate the protective features described in this application, such as sounding an annunciator or displaying a message to try to call back the helper or, upon failing that, the system may go into a failsafe mode. A video system even can have the ability to determine if the helper has fallen asleep by observing posture and movement of the helper.
The sensors in this embodiment, instead of being a video camera (or in addition to a video camera and recognition engine) can also include components that are much simpler such as a pressure sensor in a chair or a proximity sensor which responds to the presence of the helper near or on the sensor. The sensor may be a keypad the prompts the helper to enter a code that indicates that helper is present and there are no problems with the treatment. The ability of the keypad entry to be made confirms the helper is available. Preferably, the helper would know the keycode for entry into the keypad but the patient would not. In this way the presence of the helper can be confirmed quite simply.
The authentication device or the presence indicator or sensor may include at least one of a key code receiver, an RFID reader, a mechanical lock, a biometric reader, a mag stripe reader, a non-volatile memory card reader, a smart card reader, a video camera, or a bar code reader. The monitoring system may go into a failsafe mode in response to the abnormal condition signal. The monitoring system may cause the medical treatment component to go into a failsafe mode in response to the abnormal condition signal. The monitoring system can generate an alert signal in response to the abnormal condition signal. It may wait for the reception of an alert-cancel command after generating the alert signal in which case it would reset and continue normal treatment operation of the medical treatment component. But if the alert-cancel command was not received, the monitoring system would cause the medical treatment component to go into a failsafe mode.
The failsafe mode of the present and other embodiments may include clamping blood lines and/or sending remote alerts such as a phone call to an ambulance service or 24 hour medical treatment facility. It may include the slowing of the blood pumping rate. The failsafe mode may be any operational mode that reduces the risk to the patient for any of the problems that can arise in a treatment. In a preferred embodiment, the features described in the present patent specification are applied to a renal replacement therapy system and/or a extracorporeal blood treatment.
Referring to
The medical device 10 may have a movable or stationary locking or lockable part 40 that is susceptible to locking or effects a locked and/or unlocked state. For example, it may be a part that is locked or a device, such as an actuator, that actually effects locking. Examples include solenoids, simple mechanical locks, software state machines with locked states through which operational flow is blocked, and other equivalent devices.
The controller 2 may implement a locking function or the entire medical device 10 may be susceptible to locking. Examples of a lockable part 30 include an access panel, hatch, door or other mechanical security component or mechanical interface such as a slot for receiving consumable components; a component controller, power supply, or a crucial component such as a pump or other prime mover; a user interface or component interface. The lockable part 40 may or may not be physically attached to the medical device 10. Its operative relationship with the medical device 10 and other elements, however, will become clearer from the greater disclosure.
The Medical device 10 may have one or more of a variety of communications and input and output elements, including:
A wireless terminal 70 to communicate with remote wireless terminals 75 such as cell phones, email devices, telemetry systems, wireless computer terminals, and similar devices. The medical device 10 may, for example, transmit information and receive commands via such devices.
An imaging device 35 such as a charge coupled device (CCD) video camera, laser scanner such as an industrial photometric scanner, an infrared camera, terahertz wave (T-wave) shortwave, acoustic, or other kind of imaging device. The medical device 10 may employ video image processing and recognition techniques to identify faces, determine the number of individuals present in a room, patient body surface temperature profile, or myriad other functions using the one or more imaging devices represented by imaging device 35.
A wired terminal 85 such as a plain old telephone (POT), annunciator such as an audible or visual alarm, intercom, or similar device. The medical device 10 may employ the wired terminal 85 to notify local or remote personnel of status or change of status at a treatment site. For example, the device 10 may place an automatic phone call to emergency medical personnel if predefined conditions are detected. The medical device 10 may also report attempts to authorize a treatment (see further below for discussion of this) or an attempt to use the medical device 10 to an authorized party with supervisory obligations.
The treatment device 10 (or a component thereof) may be connected to a network or the Internet 54 to communicate with information servers 55 and/or remote terminals 80. The medical device may use this capability to obtain instructions from the server 56, to report status or notify of conditions requiring special or immediate attention, and similar transactions. The medical device 10 may also use such communication modes to report attempts to authorize a treatment (see further below for discussion of this) or an attempt to use the medical device 10 to an authorized party with supervisory obligations.
A direct input/output (I/O) interface 15 such as a keyboard, keypad, speech interface, digital display, touchscreen, touchpad, or other I/O device and mechanical interface such as levers, buttons, knobs, etc. One or more such devices may be used to allow users or others to command and control the medical device 10 and/or the controller 2.
A connector 25 such as a port (e.g., USB port), mechanical keyhole, smart card reader, bar-code reader, mag-stripe reader, RFID reader, biometric sensor, handwriting recognition interface, or other interface device, which may be used for authorizing and/or authenticating a user and/or assistant.
A key or identification indicator represented figuratively at 20. These may include a human finger (fingerprint), retina, face, or other biometric indicator; an electronic key such as a magnetic stripe, radio frequency identification device (RFID) unit, nonvolatile memory (NV memory), bar code or other data carrier; mechanical key; or any device used in a remote or local authorization or authentication process. Another example is a key fob with a password or digital key embedded in a memory and a USB connector on it.
The above examples are by no means intended as an exhaustive list and are considered to encompass their equivalents and additional examples within the identified categories.
In an alternative embodiment, shown in
Referring now to
A function A may be to prevent access by the patient 1 without the assistant 2 being present. In embodiments, the assistant 2 carries a key or, inherently, a biometric identifier such as his/her face. If the assistant 2 is not present, the medical device &/or associated component(s) M may be equipped, as discussed above, to deny access to the medical device &/or associated component(s) M. This prevents the patient 1 from using the medical device &/or associated component(s) M without assistance.
Another function B may be to check external conditions such as a time of day when use of the medical device &/or associated component(s) M is permitted or scheduled. This may provide an additional layer of protection against misuse. The medical device &/or associated component(s) M may check the external conditions, such as time of day, whether the assistant's training is current or expired, whether a prescription has been provided, or other separate criterion beyond the presence of the assistant. The presence of the assistance may be verified by another function C which is an authentication function. In the latter, the assistant may present his/her key or other indicia of identity and presence to unlock the medical device &/or associated component(s) M for use.
Another function D is to permit access to the medical device &/or associated component(s) M and, depending on the embodiment, including receiving and executing commands for control and setup as well as administering treatment or other service. Another function E is to provide services by the medical device &/or associated component(s) M.
Any improper use or proper attempt, to use the medical device &/or associated component(s) M may be reported by a function F to supervisor 3. For example, if the medical device &/or associated component(s) M detects a failure of authentication, it may report the event to the supervisor 3. The medical device &/or associated component(s) M may report every attempt, whether proper or improper, to the supervisor 3, and may also report to the assistant 2. In the latter case, if an authentication function C is executed without the assistant 2 being present, the assistant 2 may be notified by a communication to a remote terminal such as a cell phone. The latter situation could arise if the assistant 2 lost his/her key.
Note that the above use cases are not comprehensive nor is each function essential. Some benefits may be provided by a mechanically-locking cabinet configured to house the medical device &/or associated component(s) M, where the key is retained by the assistant. Another simple alternative for the medical device is for it to have a locking component.
Referring now to
Physically, what's going on so far in the process of
In step S25, the validation process may verify that the key or identification indicia are present. This provide evidence that the assistant or authorized party is present such that access may be provided (to medical device 10, 50 or locker 55) in step S30. If a valid authorization is not completed in step S25, a failure action may be taken such as the display of a message on the user interface of the medical device or locker 10/50/55 or an output on any of the other I/O devices shown in
Step S20 may include using any type of key/ID indicator 20 or any action using I/O interface 15. For example, a username and/or password may be entered using the I/O interface 15 or a mechanical key may be used to unlock the lockable part 40, Also, step S30 may include enhancing services that are available through the medical device &/or associated component(s) M rather than simply enabling or disabling access. Step S40 may provide for remote notification such as an automated email or cell phone message. It may also include permanent logging of failures to authorize access.
Referring now to
Step S50 may correspond to one or more of the following, which are shown to provide illustrative examples and not to limit the embodiments in any way:
Prompting at predefined intervals through I/O interface 15 for confirmation of identity and presence of the assistant 2 by entering a password or voice command (with voice biometric identification).
Prompting at predefined intervals through I/O interface 15 for confirmation of identity and presence of assistant 2 by connecting a key/ID indicator 20.
Classifying a scene taken in by imaging device 35 to determine if the assistant 2 is still present, taking appropriate actions. Support for known techniques for this and other video classification concepts are shown in U.S. Pat. No. 6,611,206 for “Automatic system for monitoring independent person requiring occasional assistance;” U.S. Pat. No. 7,028,269 for “Multi-modal video target acquisition and re-direction system and method;” U.S. Pat. No. 6,931,596 for “Automatic positioning of display depending upon the viewer's location;” U.S. Pat. No. 6,925,197 for “Method and system for name-face/voice-role association;” U.S. Pat. No. 6,778,705 for “Classification of objects through model ensembles;” U.S. Pat. No. 6,714,594 for “Video content detection method and system leveraging data-compression constructs;” U.S. Pat. No. 5,561,718 for “Classifying faces;” U.S. Pat. No. 7,110,569 for “Video based detection of fall-down and other events;” U.S. Pat. No. 7,110,570 for “Application of human facial features recognition to automobile security and convenience;” US Application Publication Nos. 20060210112 for “Behavior recognition system;” 20060210958 for “Gesture training;” 20060204050 for “Face authenticating apparatus and entrance and exit management apparatus;” 20030128126 for “Method and apparatus for error warning with multiple alarm levels and types” and 20030128125 for “Method and apparatus for machine error detection by combining multiple sensor inputs” all of which are hereby incorporated by reference as if fully set forth in its entirety herein. (Note: The latter two applications describe mechanisms for observing a patient for safety reasons and illustrate a context in which video is captured of a treatment scene. This context is similar to what is described presently in the context of confirming the presence of the patient's helper. That is, these applications illustrate how a camera may be positioned to acquire the scene including a patient and a helper. They also illustrate response mechanism that may be used with the present embodiments.)
Classifying a scene taken in by imaging device 35 to determine the status of the patient, for example, if the patient's body temperature profile has changed to a predetermined pattern indicating imminent loss of consciousness, lack of blood flow or a pathological condition such as rapid or slow breathing. Support for known techniques for this may also be found in the above reference.
Step S55 may correspond to one or more of the following, which are shown to provide illustrative examples and not to limit the embodiments in any way:
Generating a wireless message or automated cell phone call to the assistant 2.
Generating a wireless message or automated cell phone call to the supervisor 3.
Generating an alarm.
Changing the operational regime of the medical device 10, 50 to a safe mode.
Note that step S60 may include returning the medical device 10, 50 to a normal operating mode. If the operating mode is changed, or performing a function to disable an alarm or respond to a message.
Referring now to
Referring to
Although the present invention has been described herein with reference to a specific preferred embodiment, many modifications and variations therein will be readily occurring to those skilled in the art. Accordingly, all such variations and modifications are included within the intended scope of the present invention as defined by the following claims.
The present application is a continuation of U.S. patent application Ser. No. 15/977,619 filed on May 11, 2018, which is a continuation of U.S. patent application Ser. No. 15/189,532 filed Jun. 22, 2016, which is a continuation of U.S. patent application Ser. No. 14/682,440 filed Apr. 9, 2015, now U.S. Pat. No. 9,375,527 issued Jun. 28, 2016, which is a continuation of U.S. patent application Ser. No. 13/618,716 filed Sep. 14, 2012, now U.S. Pat. No. 9,024,746 issued May 5, 2015, which is a continuation of U.S. patent application Ser. No. 12/091,728 filed Aug. 19, 2008, abandoned, which is a national stage entry of International Application No. PCT/US2006/060218 filed Oct. 25, 2006, which claims the benefit of priority of U.S. Provisional Patent Application No. 60/596,840 filed Oct. 25, 2005, all of which are incorporated herein by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
4710164 | Levin et al. | Dec 1987 | A |
4718891 | Lipps | Jan 1988 | A |
4885571 | Pauley | Dec 1989 | A |
5104374 | Bishko et al. | Apr 1992 | A |
5218344 | Ricketts | Jun 1993 | A |
5232439 | Campbell et al. | Aug 1993 | A |
5507277 | Rubsamen et al. | Apr 1996 | A |
5531697 | Olsen et al. | Jul 1996 | A |
5561718 | Trew et al. | Oct 1996 | A |
5905602 | Pak | May 1999 | A |
5984175 | Popp | Nov 1999 | A |
6026684 | Calder | Feb 2000 | A |
6039251 | Holowko | Mar 2000 | A |
6183412 | Benkowski et al. | Feb 2001 | B1 |
6297738 | Newham | Oct 2001 | B1 |
6359557 | Bilder | Mar 2002 | B2 |
6515575 | Kataoka | Feb 2003 | B1 |
6594524 | Esteller | Jul 2003 | B2 |
6611206 | Eshelman et al. | Aug 2003 | B2 |
6611914 | Lee | Aug 2003 | B1 |
6615356 | Byun | Sep 2003 | B1 |
6699195 | Nakazawa et al. | Mar 2004 | B2 |
6714594 | Dimitrova et al. | Mar 2004 | B2 |
6717518 | Pirim et al. | Apr 2004 | B1 |
6717957 | Quine | Apr 2004 | B1 |
6766456 | McKeeth | Jul 2004 | B1 |
6778705 | Gulla et al. | Aug 2004 | B2 |
6782415 | Quine | Aug 2004 | B1 |
6796799 | Yoshiike et al. | Sep 2004 | B1 |
6796955 | O'Mahony | Sep 2004 | B2 |
6889074 | Uber et al. | May 2005 | B2 |
6920360 | Lee | Jul 2005 | B2 |
6925197 | Dimitrova et al. | Aug 2005 | B2 |
6931596 | Gutta et al. | Aug 2005 | B2 |
6993658 | Engberg | Jan 2006 | B1 |
7028269 | Cohen-Solal et al. | Apr 2006 | B1 |
7110569 | Brodsky et al. | Sep 2006 | B2 |
7110570 | Berenz et al. | Sep 2006 | B1 |
7236936 | White et al. | Jun 2007 | B2 |
7522057 | Stern | Apr 2009 | B2 |
7539724 | Callaghan | May 2009 | B1 |
7706896 | Music et al. | Apr 2010 | B2 |
7734476 | Wildman | Jun 2010 | B2 |
7742821 | Vamos | Jun 2010 | B1 |
7780618 | Felt et al. | Aug 2010 | B2 |
7925063 | Ishida et al. | Apr 2011 | B2 |
7933780 | De La Huerga | Apr 2011 | B2 |
7965171 | Hershkovitz | Jun 2011 | B2 |
8006099 | Aoyama et al. | Aug 2011 | B2 |
8143994 | Jung | Mar 2012 | B2 |
8402141 | Seraphin | Mar 2013 | B2 |
8954336 | Blomquist | Feb 2015 | B2 |
9864839 | Baym et al. | Jan 2018 | B2 |
10232103 | Karoor | Mar 2019 | B1 |
10792414 | Updyke | Oct 2020 | B2 |
20010012917 | Inukai et al. | Aug 2001 | A1 |
20010016696 | Bystrom | Aug 2001 | A1 |
20010037056 | Nunome | Nov 2001 | A1 |
20020010679 | Felsher | Jan 2002 | A1 |
20020038392 | De La Huerga | Mar 2002 | A1 |
20020049916 | Nozaki | Apr 2002 | A1 |
20020067258 | Lyons et al. | Jun 2002 | A1 |
20020069030 | Xydis | Jun 2002 | A1 |
20020082480 | Riff et al. | Jun 2002 | A1 |
20020103674 | Reeder | Aug 2002 | A1 |
20020147423 | Burbank | Oct 2002 | A1 |
20020167408 | Trajkovic et al. | Nov 2002 | A1 |
20020169635 | Shillingburg | Nov 2002 | A1 |
20020173696 | Kolarovic et al. | Nov 2002 | A1 |
20020196274 | Comfort | Dec 2002 | A1 |
20030001743 | Menard | Jan 2003 | A1 |
20030025602 | Medema et al. | Feb 2003 | A1 |
20030055321 | Watrous et al. | Mar 2003 | A1 |
20030079746 | Hickle | May 2003 | A1 |
20030080850 | Kline | May 2003 | A1 |
20030128125 | Burbank | Jul 2003 | A1 |
20030128126 | Burbank et al. | Jul 2003 | A1 |
20030138349 | Robinson et al. | Jul 2003 | A1 |
20030152482 | O'Mahony | Aug 2003 | A1 |
20030172940 | Rogers | Sep 2003 | A1 |
20040034810 | Heckmann | Feb 2004 | A1 |
20040143677 | Novak | Jul 2004 | A1 |
20040167465 | Mihai | Aug 2004 | A1 |
20040172301 | Mihai | Sep 2004 | A1 |
20040199408 | Johnson | Oct 2004 | A1 |
20040199769 | Proudler | Oct 2004 | A1 |
20040230811 | Siegel et al. | Nov 2004 | A1 |
20040243046 | Brugger et al. | Dec 2004 | A1 |
20050004502 | O'Mahony et al. | Jan 2005 | A1 |
20050055244 | Mullan et al. | Mar 2005 | A1 |
20050065817 | Mihai | Mar 2005 | A1 |
20050080326 | Mathew | Apr 2005 | A1 |
20050085760 | Ware | Apr 2005 | A1 |
20050102167 | Kapoor | May 2005 | A1 |
20050107689 | Sasano | May 2005 | A1 |
20050109333 | Thomas | May 2005 | A1 |
20050119597 | O'Mahony | Jun 2005 | A1 |
20050131740 | Massenzio et al. | Jun 2005 | A1 |
20050137653 | Friedman | Jun 2005 | A1 |
20050137827 | Takamiya | Jun 2005 | A1 |
20050159985 | Bertram | Jul 2005 | A1 |
20050165626 | Karpf | Jul 2005 | A1 |
20050196023 | Chen et al. | Sep 2005 | A1 |
20050200486 | Greer | Sep 2005 | A1 |
20050212658 | Kinsella | Sep 2005 | A1 |
20050234381 | Niemetz et al. | Oct 2005 | A1 |
20050240305 | Bogash | Oct 2005 | A1 |
20050261942 | Wheeler | Nov 2005 | A1 |
20050270140 | Oh | Dec 2005 | A1 |
20050277890 | Stewart et al. | Dec 2005 | A1 |
20050283198 | Haubrich et al. | Dec 2005 | A1 |
20050288572 | Graw | Dec 2005 | A1 |
20060030891 | Saltzstein | Feb 2006 | A1 |
20060092455 | Maeda et al. | May 2006 | A1 |
20060105751 | Bloom | May 2006 | A1 |
20060122863 | Gottesman et al. | Jun 2006 | A1 |
20060132283 | Eberhart et al. | Jun 2006 | A1 |
20060138915 | Goldberg | Jun 2006 | A1 |
20060155389 | Pessolano et al. | Jul 2006 | A1 |
20060156028 | Aoyama et al. | Jul 2006 | A1 |
20060181424 | Graves et al. | Aug 2006 | A1 |
20060204050 | Takizawa | Sep 2006 | A1 |
20060210112 | Cohen et al. | Sep 2006 | A1 |
20060210958 | Rimas-Ribikauskas et al. | Sep 2006 | A1 |
20060294390 | Navratil et al. | Dec 2006 | A1 |
20070021981 | Cox | Jan 2007 | A1 |
20070055888 | Miller et al. | Mar 2007 | A1 |
20070088664 | Nakano et al. | Apr 2007 | A1 |
20070174099 | Ostroscki et al. | Jul 2007 | A1 |
20070180047 | Dong et al. | Aug 2007 | A1 |
20070185615 | Bossi et al. | Aug 2007 | A1 |
20070209063 | Ohto | Sep 2007 | A1 |
20080053905 | Brugger et al. | Mar 2008 | A9 |
20080055039 | Eberhart et al. | Mar 2008 | A1 |
20080059228 | Bossi et al. | Mar 2008 | A1 |
20080143538 | Young et al. | Jun 2008 | A1 |
20090012472 | Ahm | Jan 2009 | A1 |
20090037715 | Ali et al. | Feb 2009 | A1 |
20090219131 | Barnett et al. | Sep 2009 | A1 |
20090275807 | Sitzman et al. | Nov 2009 | A1 |
20180184971 | Hong | Jul 2018 | A1 |
20200111341 | Zhao | Apr 2020 | A1 |
20210073545 | Buchaca | Mar 2021 | A1 |
20210125715 | Burbank | Apr 2021 | A1 |
Entry |
---|
Srinivasan et al., A Wireless Continuous Patient Health Monitoring System Using IoT (Year: 2021). |
Suarez-Coloma et al., Personalized temporal medical alert system (Year: 2013). |
Number | Date | Country | |
---|---|---|---|
20210125715 A1 | Apr 2021 | US |
Number | Date | Country | |
---|---|---|---|
60596840 | Oct 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15977619 | May 2018 | US |
Child | 17139442 | US | |
Parent | 15189532 | Jun 2016 | US |
Child | 15977619 | US | |
Parent | 14682440 | Apr 2015 | US |
Child | 15189532 | US | |
Parent | 13618716 | Sep 2012 | US |
Child | 14682440 | US | |
Parent | 12091728 | US | |
Child | 13618716 | US |