The present application relates generally to implantable medical systems, and more specifically to implantable sensor prostheses configured to communicate information to the recipients of the implantable sensory prostheses.
Medical devices having one or more implantable components, generally referred to herein as implantable medical devices, have provided a wide range of therapeutic benefits to recipients over recent decades. In particular, partially or fully-implantable medical devices such as hearing prostheses (e.g., bone conduction devices, mechanical stimulators, cochlear implants, etc.), implantable pacemakers, defibrillators, functional electrical stimulation devices, and other implantable medical devices, have been successful in performing lifesaving and/or lifestyle enhancement functions and/or recipient monitoring for a number of years.
The types of implantable medical devices and the ranges of functions performed thereby have increased over the years. For example, many implantable medical devices now often include one or more instruments, apparatus, sensors, processors, controllers or other functional mechanical or electrical components that are permanently or temporarily implanted in a recipient. These functional devices are typically used to diagnose, prevent, monitor, treat, or manage a disease/injury or symptom thereof, or to investigate, replace or modify the anatomy or a physiological process. Many of these functional devices utilize power and/or data received from external devices that are part of, or operate in conjunction with, the implantable medical device.
In one aspect disclosed herein, an apparatus comprises a housing configured to be implanted in or on a recipient. The apparatus further comprises circuitry within the housing, the circuitry comprising at least one storage device configured to store at least one secret. The circuitry is configured to generate, using the at least one secret, at least one code corresponding to the at least one secret and to transmit at least one stimulation signal to the recipient, the at least one stimulation signal indicative of the at least one code.
In another aspect disclosed herein, an apparatus comprises at least one first communication interface configured to wirelessly communicate with a system comprising at least one implant in or on a recipient. The implant is configured to generate, using at least one secret, at least one code corresponding to the at least one secret and to transmit at least one stimulation signal to the recipient, the at least one stimulation signal indicative of the at least one code. The apparatus further comprises at least one second communication interface configured to receive at least one user input signal from the recipient, the at least one user input signal indicative of the at least one code. In certain embodiments, the at least one first communication interface is further configured to transmit at least one trigger signal to the at least one implant, the at least one trigger signal configured to initiate said generating the at least one code by the at least one implant.
In yet another aspect disclosed herein, a method comprises accessing at least one secret stored on a device implanted in or on a recipient. The method further comprises generating at least one first code corresponding to the at least one secret. The method further comprises transmitting at least one stimulation signal to the recipient, the at least one stimulation signal indicative of the at least one first code.
In yet another aspect disclosed herein, a method comprises transmitting at least one trigger signal to a device implanted in or on a recipient. The device is configured to respond to the at least one trigger signal by: using at least one secret stored on the device to generate at least one code and transmitting at least one stimulation signal indicative of the at least one code to the recipient. The method further comprises receiving at least one first signal indicative of a perceived at least one code perceived by the recipient in response to the at least one stimulation signal. The method further comprises transmitting at least one second signal indicative of the perceived at least one code. The method further comprises receiving at least one comparison signal indicative of whether the at least one code and the perceived at least one code match one another or not. The method further comprises either providing the recipient with access to a restricted functionality in response to the at least one comparison signal being indicative of the at least one code matching the perceived at least one code or not providing the recipient with the access in response to the at least one comparison signal being indicative of the at least one code not matching the perceived at least one code.
Embodiments are described herein in conjunction with the accompanying drawings, in which:
Many systems require that users identify themselves prior to providing the users with access to a restricted capability of the system. For example, in response to a request from a user to access a service from the system (e.g., to access a secured internet portal or website; to perform an electronic transaction; to make an online electronic payment) or to access a real-world secured device (e.g., to operate/open a smartphone, electronic tablet, remote control, lock, door), the system can attempt to authenticate the user's claimed identity, to confirm that the user is permitted to receive the service. Authentication is typically performed by requesting information that can only be provided by the individual with the claimed identity. Such information can include, but is not limited to: a password which is assumed to be known only by the claimed individual; a key with is assumed to be held only by the claimed individual; and/or biometric dataset (e.g., fingerprint; retinal pattern) which is assumed to be available only to the claimed individual. The system provides the restricted capability to the user upon one or more correct passwords, keys, and/or biometric data sets.
However, each of these types of information have attributes which can limit its effectiveness as an authentication tool. For example, passwords can be guessed (e.g., by repeated attempts), and this limitation can be mitigated by including minimal lengths of passwords and denial of access after a limited number of guesses. Also, passwords, once known, can be exposed to others and/or used until revoked, and this limitation can be mitigated by forcing password resets after a limited amount of time. For another example, keys can be stolen, transferred between users, and/or duplicated once acquired, and these limitations can be mitigated by requiring the use of new keys after a limited amount of time. For another example, biometric data sets can be either too sensitive (e.g., the individual cannot accurately reproduce the data set) or not sufficiently specific (e.g., other individuals are able to reproduce the data set). While these limitations may be overcome in a general sense, such measures can be at the expense of usability by the individual which can limit the individual's voluntary compliance with recommendations for good security management.
Certain embodiments described herein advantageously utilize the unique relationship between a sensory prosthesis and a recipient of the sensory prosthesis to facilitate authentication of the recipient's identity (e.g., to third parties such as web service providers) without the use of passwords. In particular, the sensory prosthesis serves as a communication pathway that provides information to the recipient in a manner that is difficult if not impossible to be discerned by anyone except the recipient. For example, a code provided to the recipient through the recipient's perception of stimulation signals from the sensory prosthesis is difficult to be guessed by an unauthorized entity but easy to be recalled by the recipient. In addition, from the recipient's point of view, the sensory prosthesis provides the recipient with a password at the time of authentication that only utilizes a limited mental burden to remember (e.g., does not need to be remembered after the time of authentication).
Certain embodiments described herein utilize a secret residing within an implanted sensory prosthesis and to generate, using the secret, a code that is communicated to the recipient through stimulation signals from the implanted sensory prosthesis. In this way, knowledge of the code is an ability uniquely afforded to the recipient alone. Highly sophisticated attacks (e.g., attempts by third parties to discern the code) are possible, but such attacks are very detectable by the recipient as they likely require explantation or electrodes on the recipient's skin. The secret can be known by an authority (e.g., the implanted sensory prosthesis itself; a remote server) to facilitate confirmation whether a code received from a user corresponds to authorized access by the user of the restricted capability.
While various embodiments are described herein by citing smartphones and websites as examples of devices which can be used, the systems and methods described herein are not so limited. Certain embodiments also extend to bank safes, door locks, and any other objects that use some form of security to access, and other forms of mobile personal devices (e.g., mobile phones; smart phones; electronic tablets). Certain embodiments described herein can be used to provide higher security to access any secured or sensitive information or object. For example, certain embodiments can be used to allow users be identified and verified as being among those individuals who are authorized to access information that is secured or that is sensitive.
The teachings detailed herein are applicable, in at least some embodiments, to any type of implantable medical device (e.g., implantable sensory prostheses) configured to communicate information to the recipient of the implantable medical device. For example, the implantable medical device can comprise an auditory prosthesis system utilizing an implantable actuator assembly that generates electrical, optical, and/or vibrational stimulation signals to the recipient that are perceived by the recipient as sounds. Examples of auditory prosthesis systems compatible with certain embodiments described herein include but are not limited to: electro-acoustic electrical/acoustic systems, cochlear implant devices, implantable hearing aid devices, middle ear implant devices, bone conduction devices (e.g., active bone conduction devices; passive bone conduction devices, percutaneous bone conduction devices; transcutaneous bone conduction devices), Direct Acoustic Cochlear Implant (DACI), middle ear transducer (MET), electro-acoustic implant devices, other types of auditory prosthesis devices, and/or combinations or variations thereof, or any other suitable hearing prosthesis system with or without one or more external components. Embodiments can include any type of medical device that can utilize the teachings detailed herein and/or variations thereof. In some embodiments, the teachings detailed herein and/or variations thereof can be utilized in other types of implantable medical devices beyond auditory prostheses. For example, the concepts described herein can be applied to any of a variety of implantable medical devices comprising an implanted component configured to provide stimulation signals (e.g., electrical, optical and/or vibrational stimulation signals) to the recipient of the implanted component so as to communicate information to the recipient of the implanted component. For example, such implantable medical devices can include one or more of the following: visual prostheses (e.g., retinal implants); brain implants; seizure devices (e.g., devices for monitoring and/or treating epileptic events); sleep apnea devices; functional electrical stimulation devices.
As shown in
As shown in
The sound processing unit 126 of certain embodiments includes a power source (not shown in
The power source of the external component 142 is configured to provide power to the auditory prosthesis 100, where the auditory prosthesis 100 includes a battery (e.g., located in the internal component 144, or disposed in a separate implanted location) that is recharged by the power provided from the external component 142 (e.g., via a transcutaneous energy transfer link). The transcutaneous energy transfer link is used to transfer power and/or data to the internal component 144 of the auditory prosthesis 100. Various types of energy transfer, such as infrared (IR), electromagnetic, capacitive, and inductive transfer, may be used to transfer the power and/or data from the external component 142 to the internal component 144. During operation of the auditory prosthesis 100, the power stored by the rechargeable battery is distributed to the various other implanted components as needed.
The internal component 144 comprises an internal receiver unit 132, a stimulator unit 120, and an elongate electrode assembly 118. In some embodiments, the internal receiver unit 132 and the stimulator unit 120 are hermetically sealed within a biocompatible housing, sometimes collectively referred to as a stimulator/receiver unit. The internal receiver unit 132 comprises at least one internal inductive communication coil 136 (e.g., a wire antenna coil comprising multiple turns of electrically insulated single-strand or multi-strand platinum or gold wire), and generally, a magnet (not shown in
The elongate electrode assembly 118 has a proximal end connected to the stimulator unit 120, and a distal end implanted in the cochlea 140. The electrode assembly 118 extends from the stimulator unit 120 to the cochlea 140 through the mastoid bone 119. In some embodiments, the electrode assembly 118 can be implanted at least in the basal region 116, and sometimes further. For example, the electrode assembly 118 can extend towards an apical end of the cochlea 140, referred to as the cochlea apex 134. In certain circumstances, the electrode assembly 118 can be inserted into the cochlea 140 via a cochleostomy 122. In other circumstances, a cochleostomy can be formed through the round window 121, the oval window 112, the promontory 123, or through an apical turn 147 of the cochlea 140.
The elongate electrode assembly 118 comprises a longitudinally aligned and distally extending array 146 of electrodes or contacts 148, sometimes referred to as electrode or contact array 146 herein, disposed along a length thereof. Although the electrode array 146 can be disposed on the electrode assembly 118, in most practical applications, the electrode array 146 is integrated into the electrode assembly 118 (e.g., the electrode array 146 is disposed in the electrode assembly 118). As noted, the stimulator unit 120 generates stimulation signals which are applied by the electrodes 148 to the cochlea 140, thereby stimulating the auditory nerve 114.
While
In certain embodiments, the apparatus 200 comprises an implantable medical device (e.g., implantable sensory prostheses) configured to communicate information to the recipient of the implantable medical device. For example, the apparatus 200 can comprise an auditory prosthesis utilizing an implantable actuator assembly.
In certain embodiments, the housing 210 comprises a biocompatible material, examples of which include but are not limited to: silicone; polyurethane; polyethylene terephthalate (PET); polyimide; polyether ether ketone (PEEK); titanium; platinum; nitinol; thermoplastic polymer resin; thermoplastic elastomer. The housing 210 of certain embodiments further comprises an inner region containing the circuitry 220, the inner region hermetically sealed from an outer region outside the housing 210. The housing 210 of certain embodiments is configured to be implanted between the recipient's skull and skin tissue (e.g., adhered to or affixed to a surface of the recipient's skull).
In certain embodiments, the at least one storage device 230 comprises non-volatile memory (e.g., flash memory) circuitry in operable communication with the control circuitry 260. As described herein, the at least one storage device 230 is configured to store at least one secret 232 and to provide the at least one secret 232 to the control circuitry 260 (e.g., upon request by the control circuitry 260).
In certain embodiments, the external device 240 comprises a mobile device (e.g., mobile personal device; smart electronic device; smartphone; electronic tablet; remote control) configured to be carried by the recipient and/or kept by the recipient in proximity to the recipient. As schematically illustrated in
In certain embodiments, the sound processing circuitry 250 is located within the implantable housing 210 and comprises at least one processor 254 (e.g., microelectronic circuitry; sound processor; digital signal processor) and a stimulator unit 120, as schematically illustrated by
While
In certain embodiments, the control circuitry 260 is located within the implantable housing 210 and comprises at least one processor (e.g., microelectronic circuitry; digital signal processor) configured to receive the at least one trigger signal 242 from the external device 240 (e.g., via the external component 142 of the apparatus 200 and the internal receiver unit 132 of the circuitry 220, as schematically illustrated by
While
In certain embodiments, the at least one secret 232 is stored within the apparatus 200 prior to implantation of the apparatus 200 (e.g., at the time of fabrication of the apparatus 200). The at least one secret 232 of certain embodiments comprises an alphanumeric string (e.g., 128 bits; 256 bits; 512 bits; serial number or other information indicative of an identity of the apparatus 200) that is assigned to the apparatus 200 and stored within the apparatus 200 (e.g., by the at least one storage device 230). In certain such embodiments, the at least one code 234 is generated (e.g., by the circuitry 200; by the control circuitry 260) using the at least one secret 232 by applying at least one predetermined algorithm to the at least one secret 232 (e.g., inputting the at least one secret 232 into at least one algorithm configured to output the at least one code), the at least one algorithm comprising a series of operations (e.g., one or more modulo operations; one or more truncation operations; one or more concatenation operations; one or more mathematical operations) applied to the at least one secret 232 and the resulting information used as the at least one code 234. In certain embodiments, the at least one algorithm used to generate the at least one code 234 using the at least one secret 232 can be modified periodically (e.g., rotated at regular intervals, at irregular intervals, and/or after a predetermined time period; modified upon request by the recipient and/or by the entity providing the restricted functionality) and/or expired after a predetermined time period. In certain embodiments, the at least one secret 232 comprises a private key and the at least one code comprises a public key.
In certain embodiments, as schematically illustrated by
For example, the at least one server computer 320 can respond to the request by transmitting an authentication initiation signal to the external device 240 (e.g., via the network 310) and the external device 240 can respond by generating and transmitting the at least one trigger signal 242 to the apparatus 200. The apparatus 200 can, in response to the at least one trigger signal 242, generate the at least one code 234 corresponding to the at least one secret 232 of the apparatus 200 and can transmit the at least one code 234 to the recipient (e.g., via at least one stimulation signal 252) and to the at least one server computer 320 (e.g., via the external device 240 and the network 310). The recipient can then communicate at least one perceived code to the second external device 330 (e.g., provide at least one user input signal indicative of the at least one perceived code via a keyboard, touchpad, mouse, microphone, or other input communication interface of the second external device 330), and the second external device 330 can communicate the at least one perceived code to the at least one server computer 320 (e.g., via the network 310).
In certain embodiments, the at least one server computer 320 then compares the at least one code 234 received from the apparatus 200 and the at least one perceived code received from the second external device 330 to determine whether the recipient is the individual attempting to access the restricted functionality. For example, if the at least one code 234 and the at least one perceived code match, the at least one server computer 320 can provide access to the restricted functionality. If the at least one code 234 and the at least one perceived code do not match, the at least one server computer 320 can communicate the failed authentication to the second external device 330 and not provide access to the restricted functionality. The second external device 330 can communicate the failed authentication to the recipient (e.g., via a display, speaker, or other output communication interface of the second external device 330). In certain other embodiments, the external device 240 performs the comparison of the at least one code 234 received from the apparatus 200 and the at least one perceived code received from the second external device 330 (e.g., sent to the external device 240 by the at least one server computer 320 via the network 310).
As schematically illustrated by
For example, the at least one server computer 320 can respond to the request by transmitting an authentication initiation signal to the external device 240 (e.g., via the network 310) and the external device 240 can respond by generating and transmitting the at least one trigger signal 242 to the apparatus 200. The apparatus 200 can, in response to the at least one trigger signal 242, generate the at least one code 234 corresponding to the at least one secret 232 of the apparatus 200 and can transmit the at least one code 234 to the recipient (e.g., via at least one stimulation signal 252) and to the at least one server computer 320 (e.g., via the external device 240 and the network 310). The recipient can then communicate at least one perceived code to the external device 240 (e.g., provide at least one user input signal indicative of the at least one perceived code via a keyboard, touchpad, mouse, microphone, or other input communication interface of the external device 240), and the external device 240 can communicate the at least one perceived code to the at least one server computer 320 (e.g., via the network 310).
In certain embodiments, the at least one server computer 320 then compares the at least one code 234 received from the apparatus 200 and the at least one perceived code received from the external device 240 to determine whether the recipient is the individual attempting to access the restricted functionality. For example, if the at least one code 234 and the at least one perceived code match, the at least one server computer 320 can provide access to the restricted functionality. If the at least one code 234 and the at least one perceived code do not match, the at least one server computer 320 can communicate the failed authentication to the external device 240 and not provide access to the restricted functionality. The external device 240 can communicate the failed authentication to the recipient (e.g., via a display, speaker, or other output communication interface of the external device 240). In certain other embodiments, the external device 240 performs the comparison of the at least one code 234 received from the apparatus 200 and the at least one perceived code received from the recipient.
As schematically illustrated by
For example, the external device 240 can respond to the request from the recipient by generating and transmitting the at least one trigger signal 242 to the apparatus 200. The apparatus 200 can, in response to the at least one trigger signal 242, generate the at least one code 234 corresponding to the at least one secret 232 of the apparatus 200 and can transmit the at least one code 234 to the recipient (e.g., via at least one stimulation signal 252) and to the external device 240. The recipient can then communicate at least one perceived code to the external device 240 (e.g., provide at least one user input signal indicative of the at least one perceived code via a keyboard, touchpad, mouse, microphone, or other input communication interface of the external device 240). In certain embodiments, the external device 240 then compares the at least one code 234 received from the apparatus 200 and the at least one perceived code received from the recipient to determine whether the recipient is the individual attempting to access the restricted functionality. For example, if the at least one code 234 and the at least one perceived code match, the external device 240 can provide access to the restricted functionality. If the at least one code 234 and the at least one perceived code do not match, the external device 240 can communicate the failed authentication to the recipient (e.g., via a display, speaker, or other output communication interface of the external device 240) and not provide access to the restricted functionality.
In an operational block 510, the method 500 comprises transmitting at least one trigger signal 242 to the apparatus 200 (e.g., the implanted internal component 144 of a sensory prosthesis system) in response to a request from the recipient for access to a restricted functionality of the at least one server computer 320 (e.g., a restricted functionality accessible via the client application 410). In an operational block 512, the method 502 comprises receiving at least one trigger signal 242. For example, as schematically illustrated in
In certain embodiments, the method 500 and/or the method 502 further comprises presenting a query to the recipient, the query requesting entry of a perceived at least one code 434 from the recipient. For example, in the method 500, the trust module 420 can present the query to the recipient (e.g., using a display, speaker, or other output communication interface of the external device 240). For another example, in the method 502, the apparatus 200 can present the query to the recipient (e.g., via the at least one stimulation signal 252 provided to the recipient by the apparatus 200).
In an operational block 514, the method 502 further comprises, in response to the at least one trigger signal 242 and using the at least one secret 232, generating the at least one code 234. For example, the apparatus 200 can access the at least one secret 232 from the at least one storage device 230 and can generate the at least one code 234 using the at least one secret 232. In the operational block 516, the method 502 further comprises transmitting at least one stimulation signal 252 from the apparatus 200 to the recipient, the at least one stimulation signal 252 indicative of the at least one code 234. In the operational block 518, the method 502 further comprises transmitting at least one signal 432 indicative of the at least one code 234 from the apparatus 200 to the external device 240. For example, the apparatus 200 can transmit the at least one signal 432 via the external component 142 to the external device 240.
The recipient perceives the at least one stimulation signal 252 as a perceived at least one code 434 and the recipient communicates at least one signal 436 (e.g., at least one user input signal) to the trust module 420 of the client application 410 running on the external device 240 (e.g., via at least one input communication interface of the external device 240), the at least one signal 436 indicative of the perceived at least one code 434. In the operational block 520, the method 500 further comprises receiving the at least one signal 436 indicative of the perceived at least one code 434 from the recipient.
In an operational block 530, the method 500 further comprises transmitting the at least one code 234 and the perceived at least one code 434 to the at least one server computer 320. For example, as schematically illustrated by
In certain such embodiments, as schematically illustrated by
In an operational block 550, the method 500 further comprises, in response to the pass/fail signal 442, either providing the recipient with access to the restricted functionality (e.g., if the at least one code 234 and the perceived at least one code 434 match one another) or not providing the recipient with access to the restricted functionality (e.g., if the at least one code 234 and the perceived at least one code 434 do not match one another). In an operational block 560, the method 500 further comprises communicating to the recipient the result of the comparison operation 440. For example, the trust module 420 can set a pass/fail flag 444 to denote the success/failure of the authentication process and can cause a message 452 indicative of the success/failure of the authentication process to be communicated to the recipient (e.g., via a display, speaker, or other output communication interface of the external device 240).
In an operational block 610, the method 600 comprises transmitting at least one trigger signal 242 to the apparatus 200 (e.g., the implanted internal component 144 of a sensory prosthesis system) in response to a request from the recipient for access to a restricted functionality of the client application 410. In an operational block 612, the method 602 comprises receiving at least one trigger signal 242. For example, as schematically illustrated in
In certain embodiments, the method 600 and/or the method 602 further comprises presenting a query to the recipient, the query requesting entry of a perceived at least one code 434 from the recipient. For example, in the method 600, the trust module 420 can present the query to the recipient (e.g., using a display, speaker, or other output communication interface of the external device 240). For another example, in the method 602, the apparatus 200 can present the query to the recipient (e.g., via the at least one stimulation signal 252 provided to the recipient by the apparatus 200).
In an operational block 614, the method 602 further comprises, in response to the at least one trigger signal 242 and using the at least one secret 232, generating the at least one code 234. For example, the apparatus 200 can access the at least one secret 232 from the at least one storage device 230 and can generate the at least one code 234 using the at least one secret 232. In the operational block 616, the method 602 further comprises transmitting at least one stimulation signal 252 from the apparatus 200 to the recipient, the at least one stimulation signal 252 indicative of the at least one code 234.
The recipient perceives the at least one stimulation signal 252 as a perceived at least one code 434 and the recipient communicates at least one signal 436 (e.g., at least one user input signal) to the trust module 420 of the client application 410 running on the external device 240 (e.g., via at least one input communication interface of the external device 240), the at least one signal 436 indicative of the perceived at least one code 434. In the operational block 620, the method 600 further comprises receiving the at least one signal 436 indicative of the perceived at least one code 434 from the recipient.
In an operational block 630, the method 600 further comprises transmitting the perceived at least one code 434 to the apparatus 200. For example, as schematically illustrated by
In an operational block 634, the method 602 further comprises comparing the at least one code 234 and the perceived at least one code 434. For example, as schematically illustrated by
In an operational block 650, the method 600 further comprises, in response to the pass/fail signal 442, either providing the recipient with access to the restricted functionality (e.g., if the at least one code 234 and the perceived at least one code 434 match one another) or not providing the recipient with access to the restricted functionality (e.g., if the at least one code 234 and the perceived at least one code 434 do not match one another). In an operational block 660, the method 600 further comprises communicating to the recipient the result of the comparison operation 440. For example, the trust module 420 can set a pass/fail flag 444 to denote the success/failure of the authentication process and can cause a message 452 indicative of the success/failure of the authentication process to be communicated to the recipient (e.g., via a display, speaker, or other output communication interface of the external device 240).
In certain embodiments, communications of the at least one code 234 and/or the at least one perceived code 434 between the apparatus 200, the at least one server computer 320, the external device 240, and/or the second external device 330 are transmitted across secure communication channels (e.g., trusted communication channels). For example, referring to
It is to be appreciated that the embodiments disclosed herein are not mutually exclusive and may be combined with one another in various arrangements.
Language of degree, as used herein, such as the terms “approximately,” “about,” “generally,” and “substantially,” represent a value, amount, or characteristic close to the stated value, amount, or characteristic that still performs a desired function or achieves a desired result. For example, the terms “approximately,” “about,” “generally,” and “substantially” may refer to an amount that is within ±10% of, within ±5% of, within ±2% of, within ±1% of, or within ±0.1% of the stated amount. As another example, the terms “generally parallel” and “substantially parallel” refer to a value, amount, or characteristic that departs from exactly parallel by ±10 degrees, by ±5 degrees, by ±2 degrees, by ±1 degree, or by ±0.1 degree, and the terms “generally perpendicular” and “substantially perpendicular” refer to a value, amount, or characteristic that departs from exactly perpendicular by ±10 degrees, by ±5 degrees, by ±2 degrees, by ±1 degree, or by ±0.1 degree.
Certain embodiments described herein include methods which are performed by computer hardware, software or both, comprising one or more modules. The at least some of the hardware used for certain embodiments described herein can take a wide variety of forms, including processors, general-purpose computers, network servers, workstations, personal computers, mainframe computers and the like. The hardware running the software can include one or more input devices, such as a mouse, trackball, touchpad, and/or keyboard, a display, and computer-readable memory media, such as random-access memory (RAM) integrated circuits and a data storage device (e.g., tangible storage, non-transitory storage, flash memory, hard-disk drive). It will be appreciated that one or more portions, or all of the software code may be remote from the user and, for example, resident on a network resource, such as a LAN server, Internet server, network storage device, etc. The software code which configures the hardware to perform in accordance with certain embodiments described herein can be downloaded from a network server which is part of a local-area network or a wide-area network (such as the internet) or can be provided on a tangible (e.g., non-transitory) computer-readable medium, such as a CD-ROM or a flash drive. Various computer languages, architectures, and configurations can be used to practice the various embodiments described herein.
The invention described and claimed herein is not to be limited in scope by the specific example embodiments herein disclosed, since these embodiments are intended as illustrations, and not limitations, of several aspects of the invention. Any equivalent embodiments are intended to be within the scope of this invention. Indeed, various modifications of the invention in form and detail, in addition to those shown and described herein, will become apparent to those skilled in the art from the foregoing description. Such modifications are also intended to fall within the scope of the claims. The breadth and scope of the invention should not be limited by any of the example embodiments disclosed herein, but should be defined only in accordance with the claims and their equivalents.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IB2020/059528 | 10/9/2020 | WO |
Number | Date | Country | |
---|---|---|---|
62914734 | Oct 2019 | US |