Secure wireless communications between a glucose monitor and other devices

Information

  • Patent Grant
  • 12115351
  • Patent Number
    12,115,351
  • Date Filed
    Thursday, September 30, 2021
    3 years ago
  • Date Issued
    Tuesday, October 15, 2024
    a month ago
  • Inventors
    • Nazzaro; David (Groveland, MA, US)
  • Original Assignees
  • Examiners
    • Kanaan; Simon P
    Agents
    • GOODWIN PROCTER LLP
Abstract
The exemplary embodiments may provide a secure framework for devices in a drug delivery system to wirelessly communicate. The secure framework may use encrypted keys to carry credentials and to specify the rights of the devices presenting the credentials. The devices in the drug delivery system present the keys at the time that they wish to wirelessly communicate with other devices in the drug delivery system. The devices receiving such keys, decrypt the keys and verify if the credentials are valid. If the credentials are valid, a wireless communication session between devices may be established.
Description
BACKGROUND

A typical conventional on-body insulin delivery system may include an insulin pump and a continuous glucose monitor (CGM). The insulin pump may contain insulin for delivery to a user under the control of a control algorithm. The insulin pump may be positioned on the body of the user. The CGM monitors blood glucose levels of the user on an on-going basis. The CGM, like the insulin pump, may be positioned on the body of the user. The insulin drug delivery system may also include a management device, like a dedicated handheld device or a smartphone, that runs a management application.


There may be certain communication limitations with such a conventional on-body insulin delivery system. For example, the CGM may require a Near Field Communication (NFC) capability to initialize the CGM and begin communications with the management device. For the case where the management device is a smartphone of a user that is not NFC capable, the phone is not able to initialize the CGM. In addition, such a conventional insulin delivery system may require that the management device act as an intermediary for communications between the insulin pump and the CGM. For instance, if the insulin pump wishes to read blood glucose level values stored in the CGM, the insulin pump may need to ask the management device to get the blood glucose level values from the CGM and return the retrieved blood glucose level values to the insulin pump. Due to security concerns, additional devices are not permitted to wirelessly communicate with the insulin pump or CGM.


SUMMARY

In accordance with an inventive aspect, a medicament delivery device includes a medicament supply and a pump for pumping the medicament from the medicament supply to a user. The device also includes a wireless transceiver for transmitting and receiving wireless communications. The device further includes a processor configured to receive a secure package from a requesting device via a wireless connection and extract contents of the secure package, including a key. The processor is further configured to validate the key as valid or not. Where the key is valid, wireless communications with the requesting device are permitted, and where the key is not valid, wireless communications with the requesting device are not permitted.


The processor may be further configured to generate an additional key for the medicament delivery device to wirelessly communicate with an additional device. The processor may be configured to generate a secure package containing the key and to send the secure package wirelessly to the additional device to request wireless communications with the additional device. The extracting of the contents of the secure package may involve at least one of decrypting the secure package, applying an inverse hash function to the secure package or reversing an obfuscation of the secure package. The extracting of the contents of the secure package may extract the key from the secure package and/or a timestamp. The validating the key may entail using the timestamp to determine whether the key has expired. The extracting of the contents of the secure package may involve extracting information regarding rights to be granted to the requesting device as to wireless communications. The requesting device may be one of a glucose monitor, a wearable device or a mobile computing device.


In accordance with an inventive aspect, an on-body medical device includes a wireless transceiver for transmitting and receiving wireless communications. The device also includes a processor configured to receive a secure package from a requesting device via a wireless connection and extract contents of the secure package, including a key. The processor is further configured to validate the key as valid or not. Where the key is valid, the processor permits wireless communications with the requesting device. Where the key is not valid, the processor does not permit wireless communications with the requesting device.


The extracting of the contents of the secure package may include at least one of decrypting the secure package, applying an inverse hash function to the secure package or reversing an obfuscation of the secure package. The extracting of the contents of the secure package may include extracting the key from the secure package and/or extracting a timestamp. The validating of the key may entail using the timestamp to determine whether the key has expired. The extracting of the contents of the secure package may include extracting information regarding rights to be granted to the requesting device as to wireless communications. The on-body medical device may be a glucose monitor or a drug delivery device.


In accordance with an inventive aspect, a device includes a wireless transceiver for transmitting and receiving wireless communications and a processor. The processor is configured to generate a secure package that is encrypted, hashed and/or obfuscated. The secure package contains a key for wireless communications. The processor also is configured to send the secure package wirelessly to request wireless communication to a target device. The target device is one of a drug delivery device, a biometric sensor, or a manager of a drug delivery device.


The secure package may contain a timestamp for the key. The secure package may contain identity information for the device. The secure package may contain information regarding the rights to be granted to the device regarding wireless communications.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1A depicts a diagram of a user with multiple illustrative devices for use in an exemplary embodiment.



FIG. 1B depicts a block diagram illustrating communication links for devices in a drug delivery system of an exemplary embodiments.



FIG. 2A depicts a block diagram of an illustrative device in the drug delivery system of an exemplary embodiment.



FIG. 2B depicts a block diagram of a medicament pump of an exemplary embodiment.



FIG. 3 depicts a flowchart of steps that may be performed in an exemplary embodiment to obtain a secure key for wireless communication.



FIG. 4A depicts a flowchart of illustrative steps that may be performed to get permission to wirelessly communicate in an exemplary embodiment.



FIG. 4B depicts a diagram of elements of a secure package in an exemplary embodiment.



FIG. 5A depicts a block diagram showing how an NFC capable device may initialize a CGM in an exemplary embodiment.



FIG. 5B depicts a flowchart of illustrative steps that may be performed to initialize a CGM with an NFC capable device in an exemplary embodiment.



FIG. 6 depicts a flowchart of illustrative steps that may be performed to create a wireless connection between a medicament pump and a CGM in an exemplary embodiment.



FIG. 7 depicts a flowchart showing illustrative steps that may be performed to store blood glucose level readings at a medicament pump in an exemplary embodiment.



FIG. 8 depicts a flowchart showing illustrative steps that may be performed to obtain viewing rights from a CGM in an exemplary embodiment.





DETAILED DESCRIPTION

The exemplary embodiments may provide a secure framework for devices in a drug delivery system to wirelessly communicate. The secure framework may use secure keys to carry credentials and to specify the rights of the devices presenting the credentials. The devices in the drug delivery system present the secure keys at the time that they wish to wirelessly communicate with other devices in the drug delivery system. The devices receiving such secure keys, process the keys and verify if the credentials are valid. If the credentials are valid, a wireless communication session between devices may be established. If not, a wireless communication session is not permitted.


The exemplary embodiments may eliminate the need for the management device of a drug delivery system to act as an intermediary for wireless communications among devices in the drug delivery system. Thus, an medicament pump may wirelessly communicate directly with the CGM. This may be helpful in creating a closed loop control system where the medicament pump receives blood glucose level readings directly from the CGM via wireless communications and feeds the received blood glucose level readings into the control algorithm of the medicament pump. In such circumstances, additional devices are unnecessary when the medicament pump and CGM are operating in a closed loop. After the medicament pump is activated the medicament pump and the CGM may operate in a closed loop fashion without other devices.


An additional benefit of use of the secure framework is that it allows additional devices to communicate with the CGM and medicament pump. For example, a wearable device, such as a smart watch, smart ring or smart bracelet, may communicate with the CGM or medicament pump if the wearable device contains the proper credentials. The wearables may provide some of the functionality that is otherwise provided exclusively by the management device. This may be easier from some users as opposed to needing to carry the management device as the users move about. Moreover, the form factors of the wearable devices may make them more convenient than the management device when performing activities such as exercising. Still further, the wearable device may be more discrete than the management device. A user can look at a wearable for a current blood glucose reading more discretely than a larger management device that is handheld. Also, since the wearable is worn on-body, the user does not have to be concerned with leaving the wearable behind once the wearable is secured to the user.


The ability of additional devices to be validated and communicate with the medicament pump or CGM also expands the possible configurations of the drug delivery system. For example, biometric sensors, like blood pressure sensors, heart rate sensors, galvanic sensors and accelerometers, if not already built into the medicament pump or CGM, may be set up to wirelessly communicate with the medicament pump and provide useful inputs to the control algorithm for the medicament pump. Also, the CGM may output blood glucose level readings to smart watches, tablet computers and other devices for display and analysis.


The exemplary embodiments are described below relative to a drug delivery system that delivers a medicament, such as insulin, a GLP-1 agonist or pramlintide. As a result, in the discussion below the drug delivery device is an insulin pump, and the sensor is a CGM. Nevertheless, it should be appreciated that the secure framework may also be used with other types of drug delivery systems that deliver agents such as pain management agents, chemotherapy agents, antibiotics, therapeutic agents, etc., and that deploy different biometric sensors as part of a continuous biometric meter or CBM.



FIG. 1A depicts an illustrative user 100 of a glucose monitor 102 with a number of devices that are being either carried by the user 100 or are attached to the user 100. The devices 102, 104, 106 and 108 may all be part of a medicament delivery system. The depiction is intended to be merely illustrative and not limiting. The glucose monitor 102 is a sensor that is an on body device that is affixed to the user 100. The glucose monitor 102 provides regular blood glucose level readings via a sensor placed under the skin of the user 100. The glucose monitor 102 may be a CGM. The user 100 has a management device realized as a smartphone or a personal diabetes monitor (PDM) 106. The PDM 106 is a handheld device that is dedicated for use with an insulin pump 104. An example of the insulin pump 104 is the Omnipod from Insulet Corporation. The smartphone/PDM 106 may be held by the user 100 or be in the possession of the user, such as on the user's belt or in the user's pocket. The insulin pump 104 may be secured to the user, such as on a user's abdomen or on the user's leg, as shown in FIG. 1A. The insulin pump 104 is a medicament delivery device that delivers insulin to the user. The insulin pump 104 may include a needle, a cannula and tubing or the like for providing a pathway for delivering the drug (e.g., insulin) to the user 100. In this example, an example of one of the other devices 108 is shown being worn on the wrist of the user 100. The other devices 108 may include a wearable device, such as a smart watch, a smart bracelet or a smart ring. That said, the other devices 108 need not include a wearable device but more generally may include a device that is capable of wireless communication and is able to participate in the secure framework for wireless communication as will be described in more detail below. The other devices 108 may include an NFC-enabled and/or BLE-enabled device.



FIG. 1B depicts a block diagram of the medicament delivery system 130 for the components 102, 104, 106 and 108 shown in FIG. 1A. The other devices 108 are intended to represent any device that is capable of wirelessly communicating with the other components in the drug delivery system. The other devices 108 may be a wearable device, a sensor, a fob, a tablet computer, a mobile computing device, a desktop computing device, an instrument with wireless capability or the like. In exemplary embodiments, wireless connections 112, 114, 116, 118, 120 and 124 may be established between pairs of these components in accordance with the secure framework. This enables each of the components 102, 104, 106 and 108 to wirelessly communicate with the other components. The depiction in FIG. 1B depicts total wireless connectivity between each pair of the components 102, 104, 106 and 108. In some exemplary embodiments, only a subset of the wireless connections 112, 114, 116, 118, 120 and 122 need to be established.


As can be seen in FIG. 1B, there is no longer the need for the smart phone/PDM 106 to act as an intermediary for wireless communications. Thus, for example, the insulin pump 104 may directly communicate with the CGM 102 via a wireless connection 114. As was mentioned above, the direct wireless connection 114 between the CGM and the insulin pump 104 may facilitate a control loop where blood glucose level readings from the CGM 102 are fed to the insulin pump 104 and serve as input to a control algorithm of the insulin pump 104 that adjusts insulin delivery amounts and/or timing based on the blood glucose level readings. In addition, additional devices, like other devices 108, may communicate with the devices 102, 104 and 106 in the medicament delivery system 130. As a result, the other devices 108 may, for example, display blood glucose level readings or insulin deliver history information or issue commands to the insulin pump 104 in some exemplary embodiments, such as when operating in an open-loop control fashion.


The smart phone/PDM 106 may have a connection to a network 110, such as an Internet connection, a virtual private network (VPN), a Local Area Network (LAN), a cellular phone network or a combination thereof. The connection to the network 110 provides access to a key manager 112. The key manger 112 may be resident on a server and may be provided as a cloud service in some exemplary embodiments. The key manager 112 alternatively may be resident locally, such as on the insulin pump 104 or on the CGM 112 as shown in. The key manager 112 is responsible for generating keys that are for use in the secure framework. As will be described in more detail below, the key manager 112 is responsible for generating keys that are used to establish wireless connections, like wireless connections 112, 114, 116, 118, 120 and 122, in the medicament delivery system 130. The keys may be provided upon request of the smart phone/PDM 106, insulin pump 104, CGM 102, or other devices 108.


As was discussed above, the exemplary embodiments may use devices other than a smartphone/PDM 106 to initialize an uninitialized glucose monitor 106 or to awaken a sleeping glucose monitor 106. The other devices 108 may include, for example, wearables like a smartwatch or ring, a tablet, a fob, a smart pager, a notebook computer, a badge or a tag. The other devices 108 may be able to communicate using the desired wireless protocol (e.g., NFC) such that it can perform the functionality described above. The secondary or other device 108 may have a form factor (e.g. size, weight, etc.) that lends itself to convenient use in interacting with the glucose monitor 106, or insulin pump 104, or CGM 102.



FIG. 2A shows a generalized block diagram of components of a device 200 that participates in wireless communication with at least one component in a drug delivery system like medicament delivery system 130 depicted in FIG. 1B. CGM 102, insulin pump 104, smartphone/PDM 106 and other devices 108 are examples of such a device 200. The device 200 includes a processor 202 like a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), an Application Specific Integrated Circuit, a Field Programmable Gate Array (FPGA), a System on a Chip (SoC), or other processing component. The processor 202 may execute computer programming instructions, like application 208. The application 208 may contain instructions for performing the functionality described herein relating to establishing wireless connections, generating secure packages with keys and validating keys. Each device that wishes to participate in a secure framework must run the application 208 or have equivalent functionality performed by another program, applet, module, library, routine, object, method function or the like. Wireless transceiver 204 facilitates wireless communications by transmitting and receiving communications via an antenna 205. The wireless transceiver may communicate using one or more wireless protocols, such as the Bluetooth wireless protocol, the Bluetooth Low Energy (BLE) protocol, the WiFi (IEEE 802.11) wireless protocol, the Near Field Communication (NFC) wireless protocol, the Wireless Body Area Network (WBAN) wireless protocol (IEEE 802.15.6) or other wireless protocol. Multiple wireless transceivers for different protocols may be provided in some embodiments.


A storage 206 may be provided for storing computer programs, computer program instructions and/or data. The storage may store the application 208 and a secure key 210 that is used in the secure framework described herein. The storage may include Random Access Memory (RAM), Read Only Memory (ROM), flash memory, magnetic disk storage, optical disk storage, solid state storage, computer-readable storage media, registers or the like.



FIG. 2B depicts a more detailed block diagram of an insulin pump 220 of an exemplary embodiment. Like the device 200 (which, again, may represent an insulin pump), the insulin pump 220 contains a processor 202, a wireless transceiver 204, an antenna 205, a storage 206, application 208, a secure key 210 as described above relative to FIG. 2A. The insulin pump 220 also contains an insulin storage 214 for storing the insulin to be delivered to the user and a pump 216 for pumping the insulin out of the insulin storage 214 to the user. In addition, the storage 206 stores computer programming instructions for implementing the control system functionality 218. These instructions 218 implement the control algorithm that controls delivery of insulin to the user.



FIG. 3 depicts a flowchart of steps that may be performed in an exemplary embodiment to obtain a secure key for wireless communication. The process may begin with a request from a device for a secure key that is sent to the smartphone/PDM 106 (302). Alternatively, no request may be required, or all devices may be provided secure keys at boot time in alternative embodiments. The smartphone/PDM 106 is responsible for getting such secure keys and distributing the secure keys to the devices 102, 104, 106 and 108. The smartphone/PDM submits the request to the key manager 112 (304). The key manager 112 generates the secure key and sends the secure key to the smartphone/PDM 106 (306). The generation may entail retrieving the secure key from secure storage or generating the secure key on demand. The smartphone/PDM 106 sends the secure key to the requesting device (308). The requesting device may store the secure key and/or use the secure key once received to establish wireless communication with one of the devices 102, 104, 106 or 108 (310).



FIG. 4A depicts a flowchart 400 of illustrative steps that may be performed to establish a wireless communication connection using a secure key. The requesting device that wishes to communicate creates and sends a secure package to the target device (402). FIG. 4B shows an example of illustrative contents for the secure package 420. The package may be secure in that it may be hashed, encrypted and/or otherwise obfuscated to ensure that an unauthorized listener cannot determine the contents of secure package 420. The secure package may contain identification information 422 for the requesting device. The secure package 420 may contain a secure key 424. The secure key 424 may be an encrypted value that serves as a credential. The secure package 420 may also contain information regarding the privileges of the requesting device 426. These privileges might be, for example, a read privilege where the requesting device may read information from the target device but not modify any information. The rights 426 may specify a write privilege, which enables the requesting device to write information in the storage of the target device. The rights 426, in some instances, may specify both read and write privileges for a requesting device. It should be appreciated that the rights may specify other parameters, such as what information types or particular data may be viewed or modified. The rights 426 may specify whether the requesting device is able to send commands to the target device. A payload 428 may be provided as part of the secure package 420. The payload 428 may contain messages, data, commands or other information that is to be sent to the target device. The secure package 420 may also include a timestamp 430. The timestamp 430 may specify how long the secure key 424 is good for or when the key 424 was created. After expiration of a designated time period, the secure key 424 may no longer be valid for use.


After the secure package 420 is sent from the requesting device to the target device (402), the target device decrypts and otherwise reverses the obfuscation of the secure package 420. The target device may have a suitable decryption key, reverse hash function or the like to perform the decryption and/or obfuscation. The target device extracts the contents of the secure package (404). The extraction may include decrypting the secure key 424. The target device may check whether the key 424 is valid (406). The target device possesses knowledge of what a decrypted key value should be and can check whether the decrypted value is correct and valid. Moreover, the target device may use the timestamp 430 to check whether the key 424 has expired as part of checking the validity of the key 424. If the key is determined to be valid, a connection with the requesting device is permitted (408). The requesting device may have the privileges specified by the rights 426. If the key is determined to be invalid, the request to establish a connection is denied by the target device so that wireless communication is not permitted (410). The functionality specified in the flowchart 400 may be realized as part of the application 208.


This ability provided by the secure framework for additional devices to wirelessly communicate with other components in the drug delivery system may help address the problem where a smartphone cannot initialize a CGM because the smartphone lacks NFC capability. With the secure framework another device that has NFC capability may be used to initialize or activate the CGM, or in some cases, the insulin pump.



FIG. 5A depicts a diagram 500 showing an instance in an exemplary embodiment wherein an NFC-capable device 502, e.g., a smartwatch, is used in initializing and awakening (or activating) the CGM 504. The process begins as shown in the flowchart 520 of FIG. 5B. Initially, an NFC link 506 is established between the NFC-capable device 502 and the CGM 504 by placing the NFC-capable device 502 in close proximity with the CGM 504 (522). The NFC transceivers 510 and 512 in the NFC-capable device 502 and the CGM 504 automatically establish the NFC link 506 when placed in proximity with each other. The NFC-capable device 502 then sends a secure package like the secure package 420 that was described with reference to FIG. 4B to the CGM 504 (524). The CGM 504 performs validation of the key as described above relative to FIG. 4A (526). Since the NFC-capable device 502 has a valid key, the communication session is allowed. The NFC-capable device 502 has initialization code 508 that permits it to take the necessary steps via the NFC link 506 to initialize the CGM 504 (528). This initialization code 508 may be like that found on a conventional NFC capable smartphone which is configured to enable initialization or activation of the CGM 504. Once initialized, the CGM 504 is free to communicate with other devices. An identical operation may be performed with an insulin pump having an NFC transceiver.


As was mentioned above, one advantage provided by the secure framework is that the CGM 102 is able to wirelessly communicate with the insulin pump 104. FIG. 6 provides a flowchart 600 of illustrative steps that may be performed for the CGM 102 and the insulin pump 104 to communicate via BLE. With BLE, the pairing process begins with a device sending out advertising packets on advertising channels. BLE uses 40 channels that are separated in the frequency domain. Three of these channels are designated for advertising. In this example, either the CGM 102 or the insulin pump 104 sends out advertising packets (602). This device is known as the peripheral device or the “peripheral.” The other device 102 or 104 listens and receives the advertising packets. The listening device is known as the central device or the “central.” The central sends out a connection request packet (604) to the peripheral. A connection is then established (606). However, in the secure framework, the peripheral must present a valid key to continue to wirelessly communicate. To that end, a secure package is sent from the peripheral to the central (608). The key is extracted and validated (610) as has been described above. Wireless communications via BLE between the CGM 102 and the insulin pump are then permitted (612).


As was mentioned above, the wireless connection between the CGM 102 and insulin pump 104 may be used to realize closed loop control of insulin delivery to the user 100 without involvement of other devices. FIG. 7 provides a flowchart 700 of how the wireless connection for realizing such closed loop control is used. The CGM 102 generates blood glucose level readings. These readings are sent over the wireless connection from the CGM 102 to the insulin pump 104 (702). The blood glucose level readings may be stored at the insulin pump 104 in storage (704). The stored blood glucose level readings may then be used as input into the control system (706). CGM 102 or insulin pump 104 may optionally transmit the blood glucose level readings to other devices for display or tracking purposes. Additionally, the insulin pump 104 may similarly transmit data around insulin delivery (e.g., amount and/or timing of insulin delivered, as basal or bolus amounts, amount of “insulin on board,” amount of insulin remaining in reservoir, amount of insulin used, amount of battery charge remaining, estimated expiration of insulin pump 104 based on factors such as amount of insulin remaining in reservoir and/or amount of energy remaining in batteries on insulin pump).


Another benefit of the secure framework is that it allows different devices to have different rights. It may be desirable for security purposes to limit the rights of some devices. One example of this is that a device may only have read rights (viewing rights). For instance, a requester may be granted viewing rights from a target but not write privileges. Hence, the requester can only view information from the target but cannot change values stored on the target or issue commands to the target. Thus, for example, a device may request viewing privileges to receive blood glucose level readings from the CGM 102. Similarly, a device may be granted viewing rights from the insulin pump 104, but not write (or command) privileges. Hence, the requester can only view certain data (such as that identified in the preceding paragraph), but cannot change values stored on the insulin pump 104 or issue commands to the insulin pump 104.



FIG. 8 show a flowchart 800 of illustrative steps that may be performed in such an instance. Initially, the device that is the requester passes a secure package to the device that is the target (802). The secure package contains a valid key that has not expired and specifies the rights as read privileges (“viewing privileges”). The target validates the key as discussed above (804). The requester is granted viewing privileges (806). The requester may then view information from the target (808).


While the present invention has been described with reference to exemplary embodiments herein, those skilled in the art will appreciate that various changes in form and detail may be made without departing from the intended scope as defined in the appended claims.

Claims
  • 1. A device comprising: a wireless transceiver for transmitting and receiving wireless communications;a processor configured to: transmit receive a secure package to an uninitialized glucose monitor via a wireless connection;extract contents of the secure package, including an initialization code and a key;validate the key as valid or not;where the key is valid, permitting wireless communications with the glucose monitor,validate the initialization code as valid or not,where the initialization code is valid, initialize the glucose monitor, andwhere the initialization code is not valid, not initialize the glucose monitor; andwhere the key is not valid, not permitting wireless communications with the glucose monitor.
  • 2. The device of claim 1, wherein the processor is further configured to generate an additional key for the device to wirelessly communicate with an additional device.
  • 3. The device of claim 2, wherein the processor is further configured to generate an additional secure package containing the key and to send the additional secure package wirelessly to the additional device to request wireless communications with the additional device.
  • 4. The device of claim 1, wherein the extracting the contents of the secure package comprises at least one of decrypting the secure package, applying an inverse hash function to the secure package or reversing an obfuscation of the secure package.
  • 5. The device of claim 1, wherein the extracting the contents of the secure package comprises extracting the key from the secure package.
  • 6. The device of claim 1, wherein the extracting the contents of the secure package comprises at least one of extracting a timestamp.
  • 7. The device of claim 6, wherein the validating the key comprises using the timestamp to determine whether the key has expired.
  • 8. The device of claim 1, wherein the extracting the contents of the secure package comprises extracting information regarding rights to be granted to the device as to wireless communications.
  • 9. A glucose monitor, comprising: a wireless transceiver for transmitting and receiving wireless communications;a processor configured to: receive a secure package from a device via a wireless connection;extract contents of the secure package, including a key;validate the key as valid or not;where the key is valid, in view of contents of the secure package, grant only viewing rights to the device so that the device can read information from the glucose monitor but is prohibited from changing values stored at the glucose monitor and from issuing commands to the glucose monitor; andwhere the key is not valid, not permit wireless communications with the medicament delivery device.
  • 10. The glucose monitor of claim 9, wherein the extracting the contents of the secure package comprises at least one of decrypting the secure package, applying an inverse hash function to the secure package or reversing an obfuscation of the secure package.
  • 11. The glucose monitor of claim 9, wherein the extracting the contents of the secure package comprises extracting the key from the secure package.
  • 12. The glucose monitor of claim 9, wherein the extracting the contents of the secure package comprises at least one of extracting a timestamp.
  • 13. The glucose monitor of claim 12, wherein the validating the key comprises using the timestamp to determine whether the key has expired.
  • 14. The glucose monitor of claim 12, wherein the extracting the contents of the secure package comprises extracting information regarding rights to be granted to the medicament delivery device as to wireless communications.
  • 15. The glucose monitor of claim 9, wherein the device is a wearable device or an on-body device.
  • 16. The glucose monitor of claim 14, wherein the key specifies the rights of the device as to wireless communications as the viewing only rights.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit to U.S. Provisional Application No. 63/085,822, filed Sep. 30, 2020, the entire contents of which are incorporated herein by reference in their entirety.

US Referenced Citations (588)
Number Name Date Kind
303013 Horton Aug 1884 A
2797149 Skeggs Jun 1957 A
3631847 Hobbs Jan 1972 A
3634039 Brondy Jan 1972 A
3812843 Wootten et al. May 1974 A
3841328 Jensen Oct 1974 A
3963380 Thomas, Jr. et al. Jun 1976 A
4055175 Clemens et al. Oct 1977 A
4146029 Ellinwood, Jr. Mar 1979 A
4151845 Clemens May 1979 A
4245634 Albisser et al. Jan 1981 A
4368980 Aldred et al. Jan 1983 A
4373527 Fischell Feb 1983 A
4403984 Ash et al. Sep 1983 A
4464170 Clemens et al. Aug 1984 A
4469481 Kobayashi Sep 1984 A
4475901 Kraegen et al. Oct 1984 A
4526568 Clemens et al. Jul 1985 A
4526569 Bernardi Jul 1985 A
4529401 Leslie et al. Jul 1985 A
4559033 Stephen et al. Dec 1985 A
4559037 Franetzki et al. Dec 1985 A
4573968 Parker Mar 1986 A
4624661 Arimond Nov 1986 A
4633878 Bombardieri Jan 1987 A
4657529 Prince et al. Apr 1987 A
4685903 Cable et al. Aug 1987 A
4731726 Allen, III Mar 1988 A
4743243 Vaillancourt May 1988 A
4755173 Konopka et al. Jul 1988 A
4781688 Thoma et al. Nov 1988 A
4781693 Martinez et al. Nov 1988 A
4808161 Kamen Feb 1989 A
4854170 Brimhall et al. Aug 1989 A
4886499 Cirelli et al. Dec 1989 A
4900292 Berry et al. Feb 1990 A
4919596 Slate et al. Apr 1990 A
4925444 Orkin et al. May 1990 A
4940527 Kazlauskas et al. Jul 1990 A
4975581 Robinson et al. Dec 1990 A
4976720 Machold et al. Dec 1990 A
4981140 Wyatt Jan 1991 A
4994047 Walker et al. Feb 1991 A
5007286 Malcolm et al. Apr 1991 A
5097834 Skrabal Mar 1992 A
5102406 Arnold Apr 1992 A
5109850 Blanco et al. May 1992 A
5125415 Bell Jun 1992 A
5134079 Cusack et al. Jul 1992 A
5153827 Coutre et al. Oct 1992 A
5165406 Wong Nov 1992 A
5176662 Bartholomew et al. Jan 1993 A
5178609 Ishikawa Jan 1993 A
5207642 Orkin et al. May 1993 A
5232439 Campbell et al. Aug 1993 A
5237993 Skrabal Aug 1993 A
5244463 Cordner, Jr. et al. Sep 1993 A
5257980 Van Antwerp et al. Nov 1993 A
5273517 Barone et al. Dec 1993 A
5281808 Kunkel Jan 1994 A
5299571 Mastrototaro Apr 1994 A
5308982 Ivaldi et al. May 1994 A
5342298 Michaels et al. Aug 1994 A
5377674 Kuestner Jan 1995 A
5380665 Cusack et al. Jan 1995 A
5385539 Maynard Jan 1995 A
5389078 Zalesky Feb 1995 A
5411889 Hoots et al. May 1995 A
5421812 Langley et al. Jun 1995 A
5468727 Phillips et al. Nov 1995 A
5505709 Funderburk et al. Apr 1996 A
5505828 Wong et al. Apr 1996 A
5507288 Bocker et al. Apr 1996 A
5533389 Kamen et al. Jul 1996 A
5558640 Pfeiler et al. Sep 1996 A
5569186 Lord et al. Oct 1996 A
5584813 Livingston et al. Dec 1996 A
5609572 Lang Mar 1997 A
5665065 Colman et al. Sep 1997 A
5678539 Schubert et al. Oct 1997 A
5685844 Marttila Nov 1997 A
5685859 Kornerup Nov 1997 A
5693018 Kriesel et al. Dec 1997 A
5697899 Hillman et al. Dec 1997 A
5700695 Yassinzadeh et al. Dec 1997 A
5703364 Rosenthal Dec 1997 A
5714123 Sohrab Feb 1998 A
5716343 Kriesel et al. Feb 1998 A
5722397 Eppstein Mar 1998 A
5741228 Lambrecht et al. Apr 1998 A
5746217 Erickson et al. May 1998 A
5755682 Knudson et al. May 1998 A
5758643 Wong et al. Jun 1998 A
5800405 McPhee Sep 1998 A
5800420 Gross et al. Sep 1998 A
5801057 Smart et al. Sep 1998 A
5804048 Wong et al. Sep 1998 A
5817007 Fodgaard et al. Oct 1998 A
5820622 Gross et al. Oct 1998 A
5823951 Messerschmidt Oct 1998 A
5840020 Heinonen et al. Nov 1998 A
5848991 Gross et al. Dec 1998 A
5851197 Marano et al. Dec 1998 A
5858005 Kriesel Jan 1999 A
5865806 Howell Feb 1999 A
5871470 McWha Feb 1999 A
5879310 Sopp et al. Mar 1999 A
5902253 Pfeiffer et al. May 1999 A
5931814 Alex et al. Aug 1999 A
5932175 Knute et al. Aug 1999 A
5935099 Peterson et al. Aug 1999 A
5947911 Wong et al. Sep 1999 A
5971941 Simons et al. Oct 1999 A
5993423 Choi Nov 1999 A
5997501 Gross et al. Dec 1999 A
6017318 Gauthier et al. Jan 2000 A
6024539 Blomquist Feb 2000 A
6032059 Henning et al. Feb 2000 A
6036924 Simons et al. Mar 2000 A
6040578 Malin et al. Mar 2000 A
6049727 Crothall Apr 2000 A
6050978 Orr et al. Apr 2000 A
6058934 Sullivan May 2000 A
6066103 Duchon et al. May 2000 A
6071292 Makower et al. Jun 2000 A
6072180 Kramer et al. Jun 2000 A
6077055 Vilks Jun 2000 A
6090092 Fowles et al. Jul 2000 A
6101406 Hacker et al. Aug 2000 A
6102872 Doneen et al. Aug 2000 A
6115673 Malin et al. Sep 2000 A
6123827 Wong et al. Sep 2000 A
6124134 Stark Sep 2000 A
6126637 Kriesel et al. Oct 2000 A
6128519 Say Oct 2000 A
6142939 Eppstein et al. Nov 2000 A
6143164 Heller et al. Nov 2000 A
6157041 Thomas et al. Dec 2000 A
6161028 Braig et al. Dec 2000 A
6162639 Douglas Dec 2000 A
6196046 Braig et al. Mar 2001 B1
6200287 Keller et al. Mar 2001 B1
6200338 Solomon et al. Mar 2001 B1
6214629 Freitag et al. Apr 2001 B1
6226082 Roe May 2001 B1
6244776 Wiley Jun 2001 B1
6261065 Nayak et al. Jul 2001 B1
6262798 Shepherd et al. Jul 2001 B1
6270455 Brown Aug 2001 B1
6271045 Douglas et al. Aug 2001 B1
6280381 Malin et al. Aug 2001 B1
6285448 Kuenstner Sep 2001 B1
6309370 Haim et al. Oct 2001 B1
6312888 Wong et al. Nov 2001 B1
6334851 Hayes et al. Jan 2002 B1
6375627 Mauze et al. Apr 2002 B1
6379301 Worthington et al. Apr 2002 B1
6402689 Scarantino et al. Jun 2002 B1
6470279 Samsoondar Oct 2002 B1
6475196 Vachon Nov 2002 B1
6477901 Tadigadapa et al. Nov 2002 B1
6484044 Lilienfeld-Toal Nov 2002 B1
6491656 Morris Dec 2002 B1
6512937 Blank et al. Jan 2003 B2
6525509 Petersson et al. Feb 2003 B1
6528809 Thomas et al. Mar 2003 B1
6540672 Simonsen et al. Apr 2003 B1
6544212 Galley et al. Apr 2003 B2
6546268 Ishikawa et al. Apr 2003 B1
6546269 Kurnik Apr 2003 B1
6553841 Blouch Apr 2003 B1
6554798 Mann et al. Apr 2003 B1
6556850 Braig et al. Apr 2003 B1
6558351 Steil et al. May 2003 B1
6560471 Heller et al. May 2003 B1
6561978 Conn et al. May 2003 B1
6562001 Lebel et al. May 2003 B2
6562014 Lin et al. May 2003 B2
6569125 Jepson et al. May 2003 B2
6572542 Houben et al. Jun 2003 B1
6572545 Knobbe et al. Jun 2003 B2
6574490 Abbink et al. Jun 2003 B2
6575905 Knobbe et al. Jun 2003 B2
6580934 Braig et al. Jun 2003 B1
6618603 Varalli et al. Sep 2003 B2
6633772 Ford et al. Oct 2003 B2
6645142 Braig et al. Nov 2003 B2
6653091 Dunn et al. Nov 2003 B1
6662030 Khalil et al. Dec 2003 B2
6669663 Thompson Dec 2003 B1
6678542 Braig et al. Jan 2004 B2
6699221 Vaillancourt Mar 2004 B2
6718189 Rohrscheib et al. Apr 2004 B2
6721582 Trepagnier et al. Apr 2004 B2
6728560 Kollias et al. Apr 2004 B2
6740059 Flaherty May 2004 B2
6740072 Starkweather et al. May 2004 B2
6751490 Esenaliev et al. Jun 2004 B2
6758835 Close et al. Jul 2004 B2
6780156 Haueter et al. Aug 2004 B2
6810290 Lebel et al. Oct 2004 B2
6837858 Cunningham et al. Jan 2005 B2
6837988 Leong et al. Jan 2005 B2
6846288 Nagar et al. Jan 2005 B2
6862534 Sterling et al. Mar 2005 B2
6865408 Abbink et al. Mar 2005 B1
6890291 Robinson et al. May 2005 B2
6936029 Mann et al. Aug 2005 B2
6949081 Chance Sep 2005 B1
6958809 Sterling et al. Oct 2005 B2
6989891 Braig et al. Jan 2006 B2
6990366 Say et al. Jan 2006 B2
7008404 Nakajima Mar 2006 B2
7009180 Sterling et al. Mar 2006 B2
7016713 Gardner et al. Mar 2006 B2
7018360 Flaherty et al. Mar 2006 B2
7025743 Mann et al. Apr 2006 B2
7025744 Utterberg et al. Apr 2006 B2
7027848 Robinson et al. Apr 2006 B2
7043288 Davis, III et al. May 2006 B2
7060059 Keith et al. Jun 2006 B2
7061593 Braig et al. Jun 2006 B2
7096124 Sterling et al. Aug 2006 B2
7115205 Robinson et al. Oct 2006 B2
7128727 Flaherty et al. Oct 2006 B2
7139593 Kavak et al. Nov 2006 B2
7139598 Hull et al. Nov 2006 B2
7144384 Gorman et al. Dec 2006 B2
7171252 Scarantino et al. Jan 2007 B1
7190988 Say et al. Mar 2007 B2
7204823 Estes et al. Apr 2007 B2
7248912 Gough et al. Jul 2007 B2
7267665 Steil et al. Sep 2007 B2
7271912 Sterling et al. Sep 2007 B2
7278983 Ireland et al. Oct 2007 B2
7291107 Hellwig et al. Nov 2007 B2
7291497 Holmes et al. Nov 2007 B2
7303549 Flaherty et al. Dec 2007 B2
7303622 Loch et al. Dec 2007 B2
7303922 Jeng et al. Dec 2007 B2
7354420 Steil et al. Apr 2008 B2
7388202 Sterling et al. Jun 2008 B2
7402153 Steil et al. Jul 2008 B2
7404796 Ginsberg Jul 2008 B2
7429255 Thompson Sep 2008 B2
7460130 Salganicoff Dec 2008 B2
7481787 Gable et al. Jan 2009 B2
7491187 Van Den Berghe et al. Feb 2009 B2
7500949 Gottlieb et al. Mar 2009 B2
7509156 Flanders Mar 2009 B2
7547281 Hayes et al. Jun 2009 B2
7569030 Lebel et al. Aug 2009 B2
7608042 Goldberger et al. Oct 2009 B2
7651845 Doyle, III et al. Jan 2010 B2
7680529 Kroll Mar 2010 B2
7734323 Blomquist et al. Jun 2010 B2
7766829 Sloan et al. Aug 2010 B2
7785258 Braig et al. Aug 2010 B2
7806854 Damiano et al. Oct 2010 B2
7806886 Kanderian, Jr. et al. Oct 2010 B2
7918825 OConnor et al. Apr 2011 B2
7946985 Mastrototaro et al. May 2011 B2
7972296 Braig et al. Jul 2011 B2
8221345 Blomquist Jul 2012 B2
8251907 Sterling et al. Aug 2012 B2
8449524 Braig et al. May 2013 B2
8452359 Rebec et al. May 2013 B2
8454576 Mastrototaro et al. Jun 2013 B2
8467980 Campbell et al. Jun 2013 B2
8478557 Hayter et al. Jul 2013 B2
8547239 Peatfield et al. Oct 2013 B2
8597274 Sloan et al. Dec 2013 B2
8622988 Hayter Jan 2014 B2
8810394 Kalpin Aug 2014 B2
9061097 Holt et al. Jun 2015 B2
9171343 Fischell et al. Oct 2015 B1
9233204 Booth et al. Jan 2016 B2
9486571 Rosinko Nov 2016 B2
9579456 Budiman et al. Feb 2017 B2
9743224 San Vicente et al. Aug 2017 B2
9907515 Doyle, III et al. Mar 2018 B2
9980140 Spencer et al. May 2018 B1
9984773 Gondhalekar et al. May 2018 B2
10248839 Levy et al. Apr 2019 B2
10335464 Michelich et al. Jul 2019 B1
10583250 Mazlish et al. Mar 2020 B2
10737024 Schmid Aug 2020 B2
10987468 Mazlish et al. Apr 2021 B2
11197964 Sjolund et al. Dec 2021 B2
11260169 Estes Mar 2022 B2
20010021803 Blank et al. Sep 2001 A1
20010034023 Stanton, Jr. et al. Oct 2001 A1
20010034502 Moberg et al. Oct 2001 A1
20010051377 Hammer et al. Dec 2001 A1
20010053895 Vaillancourt Dec 2001 A1
20020010401 Bushmakin et al. Jan 2002 A1
20020010423 Gross et al. Jan 2002 A1
20020016568 Lebel et al. Feb 2002 A1
20020040208 Flaherty et al. Apr 2002 A1
20020123740 Flaherty et al. Sep 2002 A1
20020128543 Leonhardt Sep 2002 A1
20020147423 Burbank et al. Oct 2002 A1
20020155425 Han et al. Oct 2002 A1
20020161288 Shin et al. Oct 2002 A1
20030023148 Lorenz et al. Jan 2003 A1
20030050621 Lebel et al. Mar 2003 A1
20030060692 Ruchti et al. Mar 2003 A1
20030086074 Braig et al. May 2003 A1
20030086075 Braig et al. May 2003 A1
20030090649 Sterling et al. May 2003 A1
20030100040 Bonnecaze et al. May 2003 A1
20030130616 Steil et al. Jul 2003 A1
20030135388 Martucci et al. Jul 2003 A1
20030144582 Cohen et al. Jul 2003 A1
20030163097 Fleury et al. Aug 2003 A1
20030195404 Knobbe et al. Oct 2003 A1
20030208113 Mault et al. Nov 2003 A1
20030208154 Close et al. Nov 2003 A1
20030212379 Bylund et al. Nov 2003 A1
20030216627 Lorenz et al. Nov 2003 A1
20030220605 Bowman, Jr. et al. Nov 2003 A1
20040010207 Flaherty et al. Jan 2004 A1
20040034295 Salganicoff Feb 2004 A1
20040045879 Shults et al. Mar 2004 A1
20040051368 Caputo et al. Mar 2004 A1
20040064259 Haaland et al. Apr 2004 A1
20040097796 Berman et al. May 2004 A1
20040116847 Wall Jun 2004 A1
20040122353 Shahmirian et al. Jun 2004 A1
20040133166 Moberg et al. Jul 2004 A1
20040147034 Gore et al. Jul 2004 A1
20040171983 Sparks et al. Sep 2004 A1
20040203357 Nassimi Oct 2004 A1
20040204868 Maynard et al. Oct 2004 A1
20040215492 Choi Oct 2004 A1
20040220517 Starkweather et al. Nov 2004 A1
20040241736 Hendee et al. Dec 2004 A1
20040249308 Forssell Dec 2004 A1
20050003470 Nelson et al. Jan 2005 A1
20050020980 Inoue et al. Jan 2005 A1
20050022274 Campbell et al. Jan 2005 A1
20050033148 Haueter et al. Feb 2005 A1
20050049179 Davidson et al. Mar 2005 A1
20050065464 Talbot et al. Mar 2005 A1
20050065465 Lebel et al. Mar 2005 A1
20050075624 Miesel Apr 2005 A1
20050105095 Pesach et al. May 2005 A1
20050137573 McLaughlin Jun 2005 A1
20050171503 Van Den Berghe et al. Aug 2005 A1
20050182306 Sloan Aug 2005 A1
20050192494 Ginsberg Sep 2005 A1
20050192557 Brauker et al. Sep 2005 A1
20050197621 Poulsen et al. Sep 2005 A1
20050203360 Brauker et al. Sep 2005 A1
20050203461 Flaherty et al. Sep 2005 A1
20050238507 Dilanni et al. Oct 2005 A1
20050261660 Choi Nov 2005 A1
20050272640 Doyle, III et al. Dec 2005 A1
20050277912 John Dec 2005 A1
20060009727 OMahony et al. Jan 2006 A1
20060079809 Goldberger et al. Apr 2006 A1
20060100494 Kroll May 2006 A1
20060134323 OBrien Jun 2006 A1
20060167350 Monfre et al. Jul 2006 A1
20060173406 Hayes et al. Aug 2006 A1
20060189925 Gable et al. Aug 2006 A1
20060189926 Hall et al. Aug 2006 A1
20060197015 Sterling et al. Sep 2006 A1
20060200070 Callicoat et al. Sep 2006 A1
20060204535 Johnson Sep 2006 A1
20060229531 Goldberger et al. Oct 2006 A1
20060253085 Geismar et al. Nov 2006 A1
20060264895 Flanders Nov 2006 A1
20060270983 Lord et al. Nov 2006 A1
20060276771 Galley et al. Dec 2006 A1
20060282290 Flaherty et al. Dec 2006 A1
20070016127 Staib et al. Jan 2007 A1
20070060796 Kim Mar 2007 A1
20070060869 Tolle et al. Mar 2007 A1
20070060872 Hall et al. Mar 2007 A1
20070083160 Hall et al. Apr 2007 A1
20070106135 Sloan et al. May 2007 A1
20070116601 Patton May 2007 A1
20070118405 Campbell et al. May 2007 A1
20070129690 Rosenblatt et al. Jun 2007 A1
20070142720 Ridder et al. Jun 2007 A1
20070173761 Kanderian et al. Jul 2007 A1
20070173974 Lin et al. Jul 2007 A1
20070179352 Randlov et al. Aug 2007 A1
20070191716 Goldberger et al. Aug 2007 A1
20070197163 Robertson Aug 2007 A1
20070225675 Robinson et al. Sep 2007 A1
20070244381 Robinson et al. Oct 2007 A1
20070249007 Rosero Oct 2007 A1
20070264707 Liederman et al. Nov 2007 A1
20070282269 Carter et al. Dec 2007 A1
20070287985 Estes et al. Dec 2007 A1
20070293843 Ireland et al. Dec 2007 A1
20080033272 Gough et al. Feb 2008 A1
20080051764 Dent et al. Feb 2008 A1
20080058625 McGarraugh et al. Mar 2008 A1
20080065050 Sparks et al. Mar 2008 A1
20080071157 McGarraugh et al. Mar 2008 A1
20080071158 McGarraugh et al. Mar 2008 A1
20080078400 Martens et al. Apr 2008 A1
20080097289 Steil et al. Apr 2008 A1
20080132880 Buchman Jun 2008 A1
20080161664 Mastrototaro et al. Jul 2008 A1
20080172026 Blomquist Jul 2008 A1
20080177165 Blomquist et al. Jul 2008 A1
20080188796 Steil et al. Aug 2008 A1
20080200838 Goldberger et al. Aug 2008 A1
20080206067 De Corral et al. Aug 2008 A1
20080208113 Damiano et al. Aug 2008 A1
20080214919 Harmon et al. Sep 2008 A1
20080228056 Blomquist et al. Sep 2008 A1
20080249386 Besterman et al. Oct 2008 A1
20080269585 Ginsberg Oct 2008 A1
20080269714 Mastrototaro et al. Oct 2008 A1
20080269723 Mastrototaro et al. Oct 2008 A1
20080287906 Burkholz et al. Nov 2008 A1
20090006061 Thukral et al. Jan 2009 A1
20090018406 Yodfat et al. Jan 2009 A1
20090030398 Yodfat et al. Jan 2009 A1
20090036753 King Feb 2009 A1
20090043240 Robinson et al. Feb 2009 A1
20090054753 Robinson et al. Feb 2009 A1
20090069743 Krishnamoorthy et al. Mar 2009 A1
20090069745 Estes et al. Mar 2009 A1
20090069787 Estes et al. Mar 2009 A1
20090099521 Gravesen et al. Apr 2009 A1
20090105573 Malecha Apr 2009 A1
20090131861 Braig et al. May 2009 A1
20090156922 Goldberger et al. Jun 2009 A1
20090156924 Shariati et al. Jun 2009 A1
20090163781 Say et al. Jun 2009 A1
20090198350 Thiele Aug 2009 A1
20090221890 Saffer et al. Sep 2009 A1
20090228214 Say et al. Sep 2009 A1
20090318791 Kaastrup Dec 2009 A1
20090326343 Gable et al. Dec 2009 A1
20100057042 Hayter Mar 2010 A1
20100114026 Karratt et al. May 2010 A1
20100121170 Rule May 2010 A1
20100137784 Cefai et al. Jun 2010 A1
20100152658 Hanson et al. Jun 2010 A1
20100174228 Buckingham et al. Jul 2010 A1
20100211003 Sundar et al. Aug 2010 A1
20100228110 Tsoukalis Sep 2010 A1
20100262117 Magni et al. Oct 2010 A1
20100262434 Shaya Oct 2010 A1
20100295686 Sloan et al. Nov 2010 A1
20100298765 Budiman et al. Nov 2010 A1
20110021584 Berggren et al. Jan 2011 A1
20110028817 Jin et al. Feb 2011 A1
20110054390 Searle et al. Mar 2011 A1
20110054399 Chong et al. Mar 2011 A1
20110124996 Reinke et al. May 2011 A1
20110144586 Michaud et al. Jun 2011 A1
20110160652 Yodfat et al. Jun 2011 A1
20110178472 Cabiri Jul 2011 A1
20110190694 Lanier, Jr. et al. Aug 2011 A1
20110202005 Yodfat et al. Aug 2011 A1
20110218495 Remde Sep 2011 A1
20110230833 Landman et al. Sep 2011 A1
20110251509 Beyhan et al. Oct 2011 A1
20110313680 Doyle et al. Dec 2011 A1
20110316562 Cefai et al. Dec 2011 A1
20120003935 Lydon et al. Jan 2012 A1
20120010594 Holt et al. Jan 2012 A1
20120030393 Ganesh et al. Feb 2012 A1
20120053556 Lee Mar 2012 A1
20120078067 Kovatchev et al. Mar 2012 A1
20120078161 Masterson et al. Mar 2012 A1
20120078181 Smith et al. Mar 2012 A1
20120101451 Boit et al. Apr 2012 A1
20120123234 Atlas et al. May 2012 A1
20120136336 Mastrototaro et al. May 2012 A1
20120190955 Rao et al. Jul 2012 A1
20120203085 Rebec Aug 2012 A1
20120203178 Tverskoy Aug 2012 A1
20120215087 Cobelli et al. Aug 2012 A1
20120225134 Komorowski Sep 2012 A1
20120226259 Yodfat et al. Sep 2012 A1
20120232520 Sloan et al. Sep 2012 A1
20120238851 Kamen et al. Sep 2012 A1
20120271655 Knobel et al. Oct 2012 A1
20120277668 Chawla Nov 2012 A1
20120282111 Nip et al. Nov 2012 A1
20120295550 Wilson et al. Nov 2012 A1
20130030358 Yodfat et al. Jan 2013 A1
20130158503 Kanderian, Jr. et al. Jun 2013 A1
20130178791 Javitt Jul 2013 A1
20130231642 Doyle et al. Sep 2013 A1
20130253472 Cabiri Sep 2013 A1
20130261406 Rebec et al. Oct 2013 A1
20130296823 Melker et al. Nov 2013 A1
20130317753 Kamen Nov 2013 A1
20130338576 OConnor et al. Dec 2013 A1
20140005633 Finan Jan 2014 A1
20140200426 Taub et al. Jan 2014 A1
20140066886 Roy et al. Mar 2014 A1
20140074033 Sonderegger et al. Mar 2014 A1
20140121635 Hayter May 2014 A1
20140128839 Dilanni et al. May 2014 A1
20140135880 Baumgartner et al. May 2014 A1
20140146202 Boss et al. May 2014 A1
20140180203 Budiman et al. Jun 2014 A1
20140180240 Finan et al. Jun 2014 A1
20140200559 Doyle et al. Jul 2014 A1
20140230021 Birthwhistle et al. Aug 2014 A1
20140276554 Finan et al. Sep 2014 A1
20140276556 Saint et al. Sep 2014 A1
20140278123 Prodhom et al. Sep 2014 A1
20140309615 Mazlish Oct 2014 A1
20140316379 Sonderegger et al. Oct 2014 A1
20140325065 Birthwhistle et al. Oct 2014 A1
20150018633 Kovachev et al. Jan 2015 A1
20150025329 Amarasingham et al. Jan 2015 A1
20150025495 Peyser Jan 2015 A1
20150120317 Mayou et al. Apr 2015 A1
20150134265 Kohlbrecher et al. May 2015 A1
20150165119 Palerm et al. Jun 2015 A1
20150173674 Hayes et al. Jun 2015 A1
20150213217 Amarasingham et al. Jul 2015 A1
20150217052 Keenan et al. Aug 2015 A1
20150217053 Booth et al. Aug 2015 A1
20150265767 Vazquez Sep 2015 A1
20150306314 Doyle et al. Oct 2015 A1
20150351671 Vanslyke et al. Dec 2015 A1
20150366945 Greene Dec 2015 A1
20160015891 Papiorek Jan 2016 A1
20160038673 Morales Feb 2016 A1
20160038689 Lee et al. Feb 2016 A1
20160051749 Istoc Feb 2016 A1
20160082187 Schaible et al. Mar 2016 A1
20160089494 Guerrini Mar 2016 A1
20160175520 Palerm et al. Jun 2016 A1
20160228641 Gescheit et al. Aug 2016 A1
20160243318 Despa et al. Aug 2016 A1
20160256087 Doyle et al. Sep 2016 A1
20160287512 Cooper et al. Oct 2016 A1
20160302054 Kimura et al. Oct 2016 A1
20160331310 Kovatchev Nov 2016 A1
20160335409 Mensinger Nov 2016 A1
20160354543 Cinar et al. Dec 2016 A1
20170049386 Abraham et al. Feb 2017 A1
20170143899 Gondhalekar et al. May 2017 A1
20170143900 Rioux et al. May 2017 A1
20170156682 Doyle et al. Jun 2017 A1
20170173261 O'Connor et al. Jun 2017 A1
20170189625 Cirillo et al. Jul 2017 A1
20170281877 Marlin et al. Oct 2017 A1
20170296746 Chen et al. Oct 2017 A1
20170311903 Davis et al. Nov 2017 A1
20170348482 Duke et al. Dec 2017 A1
20180036495 Searle et al. Feb 2018 A1
20180040255 Freeman et al. Feb 2018 A1
20180075200 Davis et al. Mar 2018 A1
20180075201 Davis et al. Mar 2018 A1
20180075202 Davis et al. Mar 2018 A1
20180092576 O'Connor et al. Apr 2018 A1
20180126073 Wu et al. May 2018 A1
20180169334 Grosman et al. Jun 2018 A1
20180200434 Mazlish et al. Jul 2018 A1
20180200438 Mazlish et al. Jul 2018 A1
20180200441 Desborough et al. Jul 2018 A1
20180204636 Edwards et al. Jul 2018 A1
20180277253 Gondhalekar et al. Sep 2018 A1
20180289891 Finan et al. Oct 2018 A1
20180296757 Finan et al. Oct 2018 A1
20180342317 Skirble et al. Nov 2018 A1
20180369479 Hayter et al. Dec 2018 A1
20190076600 Grosman et al. Mar 2019 A1
20190240403 Palerm et al. Aug 2019 A1
20190290844 Monirabbasi et al. Sep 2019 A1
20190336683 O'Connor et al. Nov 2019 A1
20190336684 O'Connor et al. Nov 2019 A1
20190348157 Booth et al. Nov 2019 A1
20200046268 Patek et al. Feb 2020 A1
20200101222 Linteruer et al. Apr 2020 A1
20200101223 Lintereur et al. Apr 2020 A1
20200101225 O'Connor et al. Apr 2020 A1
20200219625 Kahlbaugh Jul 2020 A1
20200342974 Chen et al. Oct 2020 A1
20210050085 Hayter et al. Feb 2021 A1
20210098105 Lee et al. Apr 2021 A1
20220023536 Graham et al. Jan 2022 A1
Foreign Referenced Citations (103)
Number Date Country
2015200834 Mar 2015 AU
2015301146 Mar 2017 AU
1297140 May 2001 CN
19756872 Jul 1999 DE
0341049 Nov 1989 EP
0496305 Jul 1992 EP
0549341 Jun 1993 EP
1491144 Dec 2004 EP
0801578 Jul 2006 EP
2139382 Jan 2010 EP
2397181 Dec 2011 EP
2666520 Nov 2013 EP
2695573 Feb 2014 EP
2830499 Feb 2015 EP
2943149 Nov 2015 EP
3177344 Jun 2017 EP
3314548 May 2018 EP
1571582 Apr 2019 EP
2897071 May 2019 EP
3607985 Feb 2020 EP
2443261 Apr 2008 GB
S51125993 Nov 1976 JP
02131777 May 1990 JP
2004283378 Oct 2007 JP
2017525451 Sep 2017 JP
2018153569 Oct 2018 JP
2019525276 Sep 2019 JP
200740148 Oct 2007 TW
M452390 May 2013 TW
9800193 Jan 1998 WO
9956803 Nov 1999 WO
0030705 Jun 2000 WO
0032258 Jun 2000 WO
0172354 Oct 2001 WO
2002015954 Feb 2002 WO
0243866 Jun 2002 WO
02082990 Oct 2002 WO
03016882 Feb 2003 WO
03039362 May 2003 WO
03045233 Jun 2003 WO
05110601 May 2004 WO
2004043250 May 2004 WO
04092715 Oct 2004 WO
2005051170 Jun 2005 WO
2005082436 Sep 2005 WO
2005113036 Dec 2005 WO
2006053007 May 2006 WO
2007064835 Jun 2007 WO
2007078937 Jul 2007 WO
2008024810 Feb 2008 WO
2008029403 Mar 2008 WO
2008133702 Nov 2008 WO
2009045462 Apr 2009 WO
2009049252 Apr 2009 WO
2009066287 May 2009 WO
2009066288 May 2009 WO
2009098648 Aug 2009 WO
2009134380 Nov 2009 WO
2010053702 May 2010 WO
2010132077 Nov 2010 WO
2010138848 Dec 2010 WO
2010147659 Dec 2010 WO
2011095483 Aug 2011 WO
2012045667 Apr 2012 WO
2012108959 Aug 2012 WO
2012134588 Oct 2012 WO
2012177353 Dec 2012 WO
2012178134 Dec 2012 WO
2013078200 May 2013 WO
2013134486 Sep 2013 WO
20130149186 Oct 2013 WO
2013177565 Nov 2013 WO
2013182321 Dec 2013 WO
2014109898 Jul 2014 WO
2014110538 Jul 2014 WO
2014194183 Dec 2014 WO
2015056259 Apr 2015 WO
2015061493 Apr 2015 WO
2015073211 May 2015 WO
2015081337 Jun 2015 WO
2015187366 Dec 2015 WO
2016004088 Jan 2016 WO
2016022650 Feb 2016 WO
2016041873 Mar 2016 WO
2016089702 Jun 2016 WO
2016141082 Sep 2016 WO
2016161254 Oct 2016 WO
2017004278 Jan 2017 WO
2017091624 Jun 2017 WO
2017105600 Jun 2017 WO
2017184988 Oct 2017 WO
2017205816 Nov 2017 WO
2018009614 Jan 2018 WO
2018067748 Apr 2018 WO
2018120104 Jul 2018 WO
2018136799 Jul 2018 WO
2018204568 Nov 2018 WO
2019077482 Apr 2019 WO
2019094440 May 2019 WO
2019213493 Nov 2019 WO
2019246381 Dec 2019 WO
2020081393 Apr 2020 WO
2021011738 Jan 2021 WO
Non-Patent Literature Citations (104)
Entry
US 5,954,699 A, 09/1999, Jost et al. (withdrawn)
International Search Report and Written Opinion for the International Patent Application No. PCT/US2022/013470, mailed May 6, 2022, 14 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2022/013473, mailed May 6, 2022, 13 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2022/019079, mailed Jun. 2, 2022, 14 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2022/018453, mailed Jun. 2, 2022, 13 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US22/018700, mailed Jun. 7, 2022, 13 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US22/019080, mailed Jun. 7, 2022, 14 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US22/019664, mailed Jun. 7, 2022, 14 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US21/060618, mailed Mar. 21, 2022, 15 pages.
Herrero Pau et al: “Enhancing automatic closed-loop glucose control in type 1 diabetes with an adaptive meal bolus calculator-in silicoevaluation under intra-day variability”, Computer Methods and Programs in Biomedicine, Elsevier, Amsterdam, NL, vol. 146, Jun. 1, 2017 (Jun. 1, 2017), pp. 125-131, XP085115607, ISSN: 0169-2607, DOI:10.1016/J.CMPB.2017.05.010.
Marie Aude Qemerais: “Preliminary Evaluation of a New Semi-Closed-Loop Insulin Therapy System over the prandial period in Adult Patients with type I diabetes: the WP6. 0 Diabeloop Study”, Journal of Diabetes Science and Technology Diabetes Technology Society Reprints and permissions, Jan. 1, 2014, pp. 1177-1184, Retrieved from the Internet: URL:http://journals.sagepub.com/doi/pdf/10.1177/1932296814545668 [retrieved on Jun. 6, 2022] chapter “Functioning of the Algorithm” chapter “Statistical Analysis” p. 1183, left-hand column, line 16-line 23.
Anonymous: “Kernel density estimation”, Wikipedia, Nov. 13, 2020 (Nov. 13, 2020), pp. 1-12, XP055895569, Retrieved from the Internet: URL:https://en.wikipedia.org/w/index.php?title=Kernel_density_estimation&oldid=988508333 [retrieved on Jun. 6, 2022].
Anonymous: “openaps / oref0 /lib/determine-basal-js”, openaps repository, Nov. 9, 2019 (Nov. 9, 2019), pp. 1-17, XP055900283, Retrieved from the Internet: URL:https://github.com/openaps/oref0/blob/master/lib/determine-basal/determine-basal.js [retrieved on Jun. 6, 2022] line 116-line 118, line 439-line 446.
Anonymous: “AndroidAPS screens”, AndroidAPS documentation, Oct. 4, 2020 (Oct. 4, 2020), pp. 1-12, XP055894824, Retrieved from the Internet: URL:https://github.com/openaps/AndroidAPSdocs/blob/25d8acf8b28262b411b34f416f173ac0814d7e14/docs/EN/Getting-Started/Screenshots.md [retrieved on Jun. 6, 2022].
Kozak Milos et al: “Issue #2473 of AndroidAPS”, MilosKozak / AndroidAPS Public repository, Mar. 4, 2020 (Mar. 4, 2020), pp. 1-4, XP055900328, Retrieved from the Internet: URL:https://github.com/MilosKozak/AndroidAPS/issues/2473 [retrieved on Jun. 6, 2022].
Medication Bar Code System Implementation Planning Section I: A Bar Code Primer for Leaders, Aug. 2013.
Medication Bar Code System Implementation Planning Section II: Building the Case for Automated Identification of Medications, Aug. 2013.
Villareal et al. (2009) in: Distr. Comp. Art. Intell. Bioninf. Soft Comp. Amb. Ass. Living; Int. Work Conf. Art. Neural Networks (IWANN) 2009, Lect. Notes Comp. Sci. vol. 5518; S. Omatu et al. (Eds.), pp. 870-877.
Fox, Ian G.; Machine Learning for Physiological Time Series: Representing and Controlling Blood Glucose for Diabetes Management; University of Michigan. ProQuest Dissertations Publishing, 2020. 28240142. (Year: 2020).
International Search Report and Written Opinion for the International Patent Application No. PCT/US2022/012896, mailed Apr. 22, 2022, 15 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021/046607, mailed Jan. 31, 2022, 20 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021/055745, mailed Feb. 14, 2022, 13 pages.
International Preliminary Report on Patentability in PCT/US2021/052855, mailed on Apr. 13, 2023, 8 pages.
Anonymous: “Artificial pancreas—Wikipedia”, Mar. 13, 2018 (Mar. 13, 2018), XP055603712, Retrieved from the Internet: URL: https://en.wikipedia.org/wiki/Artificial_pancreas [retrieved on Jul. 9, 2019] section “Medical Equipment” and the figure labeled “The medical equipment approach to an artifical pancreas”.
Kaveh et al., “Blood Glucose Regulation via Double Loop Higher Order Sliding Mode Control and Multiple Sampling Rate.” Paper presented at the proceedings of the 17th IFAC World Congress, Seoul, Korea (Jul. 2008).
Dassau et al., “Real-Time Hypoglycemia Prediction Suite Using Contineous Glucose Monitoring,” Diabetes Care, vol. 33, No. 6, 1249-1254 (2010).
International Search Report and Written Opinion for International Patent Application No. PCT/US17/53262, mailed on Dec. 13, 2017, 8 pages.
Van Heusden et al., “Control-Relevant Models for Glucose Control using A Priori Patient Characteristics”, IEEE Transactions on Biomedical Engineering, vol. 59, No. 7, (Jul. 1, 2012) pp. 1839-1849.
Doyle III et al., “Run-to-Run Control Strategy for Diabetes Management.” Paper presented at 23rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Istanbul, Turkey. (Oct. 2001).
Bequette, B.W., and Desemone, J., “Intelligent Dosing Systems”: Need for Design and Analysis Based on Control Theory, Diabetes Technology and Therapeutics 9(6): 868-873 (2004).
Parker et al., “A Model-Based Agorithm for Blood Gucose Control in Type 1 Diabetic Patients.” IEEE Transactions on Biomedical Engineering, 46 (2) 148-147 (1999).
International Search Report and Written Opinion for International Patent Application No. PCT/US2017/015601, mailed May 16, 2017, 12 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2018/018901, mailed on Aug. 6, 2018, 12 pages.
International Search Report and Written Opinion for International Patent Application No. PCT/US2018/052467, mailed Jan. 4, 2019, 13 pages.
“How to Create a QR Code that Deep Links to Your Mobile App”, Pure Oxygen Labs, web<https://pureoxygenlabs.com/how-to-create-a-qr-codes-that-deep-link-to-your-mobile-app/> Year:2017.
“Read NFC Tags with an iPHone App on iOS 11”, GoToTags, Sep. 11, 2017, web <https://gototags.com/blog/read-nfc-tags-with-an-iphone-app-on-ios-11/> (Year:2017).
International Search Report and Written Opinion for International Patent Application No. PCT/US2016/063350, mailed on Mar. 27, 2017, 9 pages.
Extended Search Report mailed Aug. 13, 2018, issued in European Patent Application No. 16753053.4, 9 pages.
International Search Report and Written Opinion for International Patent Application No. PCT/US16/18452, mailed on Apr. 29, 2015, 9 pages.
International Preliminary Report on Patentability mailed Aug. 31, 2017, issued in PCT Patent Application No. PCT/US2016/018452, 7 pages.
International Search Report and Written Opinion for International Patent Application No. PCT/US2019/055862, mailed on Mar. 11, 2020.
International Search Report and Written Opinion for Application No. PCT/US2019/030652, Sep. 25, 2019, 19 pages.
Unger, Jeff, et al., “Glucose Control in the Hospitalized Patient,” Emerg. Med 36(9):12-18 (2004).
“Glucommander FAQ” downloaded from https://adaendo.com/GlucommanderFAQ.html on Mar. 16, 2009.
Finfer, Simon & Heritier, Stephane. (2009). The NICE-SUGAR (Normoglycaemia in Intensive Care Evaluation and Survival Using Glucose Algorithm Regulation) Study: statistical analysis plan. Critical care and resuscitation : journal of the Australasian Academy of Critical Care Medicine. 11. 46-57.
Letters to the Editor regarding “Glucose Control in Critically Ill Patients,” N Engl J Med 361: 1, Jul. 2, 2009.
“Medtronic is Leading a Highly Attractive Growth Market,” Jun. 2, 2009.
Davidson, Paul C., et al. “Glucommander: An Adaptive, Computer-Directed System for IV Insulin Shown to be Safe, Simple, and Effective in 120,618 Hours of Operation,” Atlanta Diabetes Associates presentation.
Davidson, Paul C., et al. “Pumpmaster and Glucommander,” presented at the MiniMed Symposium, Atlanta GA, Dec. 13, 2003.
Kanji S., et al. “Reliability of point-of-care testing for glucose measurement in critically ill adults,” Critical Care Med, vol. 33, No. 12, pp. 2778-2785, 2005.
Krinsley James S., “Severe hypoglycemia in critically ill patients: Risk factors and outcomes,” Critical Care Med, vol. 35, No. 10, pp. 1-6, 2007.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021/016283, mailed Jun. 2, 2021, 15 pages.
Farkas et al. ““Single-Versus Triple-Lumen Central Catheter-Related Sepsis: A Prospective Randomized Study in a Critically Ill Population”” The American Journal of Medicine Sep. 1992vol. 93 p. 277-282.
Davidson, Paul C., et al., A computer-directed intravenous insulin system shown to be safe, simple, and effective in 120,618 h of operation, Diabetes Care, vol. 28, No. 10, Oct. 2005, pp. 2418-2423.
R Anthony Shaw, et al., “Infrared Spectroscopy in Clinical and Dianostic Analysis,” Encyclopedia of Analytical Chemistry, ed. Robert A. Meyers, John Wiley & Sons, Ltd., pp. 1-20, 2006.
Gorke, A ““Microbial Contamination Of Haemodialysis Catheter Connections”” Journal of Renal Care, European Dialysis & Transplant Nurses Association.
Lovich et al. “Central venous catheter infusions: A laboratory model shows large differences in drug delivery dynamics related to catheter dead volume” Critical Care Med 2007 vol. 35, No. 12.
Van Den Berghe, Greet, M.D., Ph.D., et al., Intensive Insulin Therapy in Critically Ill Patients, The New England Journal of Medicine, vol. 345, No. 19, Nov. 8, 2001, pp. 1359-1367.
Schlegel et al, “Multilumen Central Venous Catheters Increase Risk for Catheter-Related Bloodstream Infection: Prospective Surveillance Study”.
Wilson, George S., et al., Progress toward the Development of an Implantable Sensor for Glucose, Clin. Chem., vol. 38, No. 9, 1992, pp. 1613-1617.
Yeung et al. “Infection Rate for Single Lumen v Triple Lumen Subclavian Catheters” Infection Control and Hospital Epidemiology, vol. 9, No. 4 (Apr. 1988) pp. 154-158 The University of Chicago Press.
International Search Report and Written Opinion, International Application No. PCT/US2010/033794 mailed Jul. 16, 2010.
International Search Report and Written Opinion in PCT/US2008/079641 dated Feb. 25, 2009.
Berger, ““Measurement of Analytes in Human Serum and Whole Blood Samples by Near-Infrared Raman Spectroscopy,”” Ph.D. Thesis, Massachusetts Institute of Technology, Chapter 4, pp. 50-73, 1998.
Berger, “An Enhanced Algorithm for Linear Multivariate Calibration,” Analytical Chemistry, vol. 70, No. 3, pp. 623-627, Feb. 1, 1998.
Billman et. al., “Clinical Performance of an In line Ex-Vivo Point of Care Monitor: A Multicenter Study,” Clinical Chemistry 48: 11, pp. 2030-2043, 2002.
Widness et al., “Clinical Performance on an In-Line Point-of-Care Monitor in Neonates”; Pediatrics, vol. 106, No. 3, pp. 497-504, Sep. 2000.
Finkielman et al., “Agreement Between Bedside Blood and Plasma Glucose Measurement in the ICU Setting”; retrieved from http://www.chestjournal.org; CHEST/127/5/May 2005.
Glucon Critical Care Blood Glucose Monitor; Glucon; retrieved from http://www.glucon.com.
Fogt, et al., “Development and Evaluation of a Glucose Analyzer for a Glucose-Controlled Insulin Infusion System (Biostator)”; Clinical Chemistry, vol. 24, No. 8, pp. 1366-1372, 1978.
Vonach et al., “Application of Mid-Infrared Transmission Spectrometry to the Direct Determination of Glucose in Whole Blood,” Applied Spectroscopy, vol. 52, No. 6, 1998, pp. 820-822.
Muniyappa et al., “Current Approaches for assessing insulin sensitivity and resistance in vivo: advantages, imitations, and appropriate usage,” AJP-Endocrinol Metab, vol. 294, E15-E26, first published Oct. 23, 2007.
International Preliminary Report on Patentability for the International Patent Application No. PCT/US2019/053603, mailed Apr. 8, 2021, 9 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2019/053603, mailed Jan. 7, 2020, 16 pages.
Dassau et al., “Detection of a meal using continuous glucose monitoring: Implications for an artificial [beta]-cell.” Diabetes Care, American Diabetes Association, Alexandria, VA, US, 31(2):295-300 (2008).
Cameron et al., “Probabilistic Evolving Meal Detection and Estimation of Meal Total Glucose Appearance Author Affiliations”, J Diabetes Sci and Tech,vol., Diabetes Technology Society ;(5):1022-1030 (2009).
Lee et al., “A closed-loop artificial pancreas based on model predictive control: Human-friendly identification and automatic meal disturbance rejection”, Biomedical Signal Processing and Control, Elsevier, Amsterdam, NL, 4 (4):1746-8094 (2009).
Anonymous: “Fuzzy control system”, Wikipedia, Jan. 10, 2020. URL: https://en.wikipedia.org/w/index.php?title=Fuzzy_control_system&oldid=935091190.
An Emilia Fushimi: “Artificial Pancreas: Evaluating the ARG Algorithm Without Meal Annoucement”, Journal of Diabetes Science and Technology Diabetes Technology Society, Mar. 22, 2019, pp. 1025-1043.
International Search Report and Written Opinion for the InternationalPatent Application No. PCT/US2021/017441, mailed May 25, 2021, 12 pages.
Mirko Messori et al: “Individualized model predictive control for the artificial pancreas: In silico evaluation of closed-loop glucose control”, IEEE Control Systems, vol. 38, No. 1, Feb. 1, 2018, pp. 86-104.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021/017662, mailed May 26, 2021, 14 pages.
Anonymous: “Reservoir Best Practice and Top Tips” Feb. 7, 2016, URL: https://www.medtronic-diabetes.co.uk/blog/reservoir-best-practice-and-top-tips, p. 1.
Gildon Bradford: “InPen Smart Insulin Pen System: Product Review and User Experience” Diabetes Spectrum, vol. 31, No. 4, Nov. 15, 2018, pp. 354-358.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021/016050, mailed May 27, 2021, 16 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2020/065226, mailed May 31, 2021, 18 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021/017659, mailed May 31, 2021, 13 pages.
Montaser Eslam et al., “Seasonal Local Models for Glucose Prediction in Type 1 Diabetes”, IEE Journal of Biomedical and Health Informatics, IEEE, Piscataway, NJ, USA, vol. 24, No. 7, Nov. 29, 2019, pp. 2064-2072.
Samadi Sediqeh et al., “Automatic Detection and Estimation of Unannouced Meals for Multivariable Artificial Pancreas System”, Diabetis Technology & Therapeutics, vol. 20m No. 3, Mar. 1, 2018, pp. 235-246.
Samadi Sediqeh et al., “Meal Detection and Carbohydrate Estimation Using Continuous Glucose Sensor Data” IEEE Journal of Biomedical and Health Informatics, IEEE, Piscataway, NJ, USA, vol. 21, No. 3, May 1, 2017, pp. 619-627.
Khodaei et al., “Physiological Closed-Loop Contol (PCLC) Systems: Review of a Modern Frontier in Automation”, IEEE Access, IEEE, USA, vol. 8, Jan. 20, 2020, pp. 23965-24005.
E. Atlas et al., “MD-Logic Artificial Pancreas System: A pilot study in adults with type 1 diabetes”, Diabetes Care, vol. 33, No. 5, Feb. 11, 2010, pp. 1071-1076.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2020/052125, mailed Aug. 12, 2020, 15 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2020/050332, mailed Sep. 12, 2020, 12 pages.
European Patent Office, “Notification of Transmittal of the ISR and the Written Opinion of the International Searching Authority, or the Declaration,” in PCT Application No. PCT/GB2015/050248, Jun. 23, 2015, 12 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021/012246, mailed Apr. 13, 2021, 15 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021/013639, mailed Apr. 28, 2021, 14 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2020/063326, mailed May 3, 2021, 17 pages.
European Search Report for the European Patent Application No. 21168591, mailed Oct. 13, 2021, 04 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021/041954, mailed Oct. 25, 2021, 13 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021/052855, mailed Dec. 22, 2021, 11 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021/047771, mailed Dec. 22, 2021, 11 pages.
International Search Report and Written Opinion for the International Patent Application No. PCT/US2021051027, mailed Jan. 7, 2022, 16 pages.
International Search Report and Written Opinion for International application No. PCT/US2021/052372, mailed on Jan. 26, 2022, 15 pages.
Related Publications (1)
Number Date Country
20220096750 A1 Mar 2022 US
Provisional Applications (1)
Number Date Country
63085822 Sep 2020 US