CN110827940B - Health data management method based on wearable equipment - Google Patents

Health data management method based on wearable equipment Download PDF

Info

Publication number
CN110827940B
CN110827940B CN201911060362.9A CN201911060362A CN110827940B CN 110827940 B CN110827940 B CN 110827940B CN 201911060362 A CN201911060362 A CN 201911060362A CN 110827940 B CN110827940 B CN 110827940B
Authority
CN
China
Prior art keywords
key
health data
smart phone
period
cloud server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911060362.9A
Other languages
Chinese (zh)
Other versions
CN110827940A (en
Inventor
王诚
沈洁
顾君
徐琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Science and Technology Town Hospital
Original Assignee
Suzhou Science and Technology Town Hospital
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Science and Technology Town Hospital filed Critical Suzhou Science and Technology Town Hospital
Priority to CN201911060362.9A priority Critical patent/CN110827940B/en
Publication of CN110827940A publication Critical patent/CN110827940A/en
Application granted granted Critical
Publication of CN110827940B publication Critical patent/CN110827940B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • G16H40/60ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices
    • G16H40/67ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H80/00ICT specially adapted for facilitating communication between medical practitioners or patients, e.g. for collaborative diagnosis, therapy or health monitoring
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Health & Medical Sciences (AREA)
  • Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • Epidemiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Biomedical Technology (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Pathology (AREA)
  • Measuring And Recording Apparatus For Diagnosis (AREA)

Abstract

The application relates to a health data management method based on wearable equipment, which monitors health data of a user through a plurality of wearable equipment, and sends the health data to a cloud server for storage through a smart phone carried by the user, wherein the smart phone encrypts the health data in time intervals, and when a possible abnormal condition is found, a corresponding time period key is sent to the cloud server, and the cloud server decrypts the corresponding time period data and analyzes and processes the time period data. The method effectively monitors and stores the health data acquired by the user through the wearable equipment, can timely discover and report abnormal health conditions, and ensures the privacy requirement of the user on the health data.

Description

Health data management method based on wearable equipment
Technical Field
The application belongs to the field of intelligent medical treatment, and particularly relates to a health data management method based on wearable equipment.
Background
Wearable devices have evolved in recent years to present a new type of intelligent electronic device that can be worn directly on the body or integrated into the clothing or accessories of the user, typical wearable devices including smart watches, smart bracelets, smart glasses, and the like. The wearable device is not only a hardware device, but also can realize a powerful function through software support, data interaction and cloud interaction.
In the prior art, a powerful function provided by the wearable device is to monitor physical health data of a user, such as blood pressure, heart rate, blood oxygen and the like, and can send out corresponding alarms when abnormality is found. However, the wearable devices in the prior art are all independently monitored, and an alarm is sent out based on analysis of self-monitoring data, so that the analysis is not comprehensive enough, and false alarm is easy to occur. In addition, physical health data is inconvenient to send to the cloud as personal privacy data.
Disclosure of Invention
In order to solve the problems in the prior art, the application provides a health data management method based on wearable equipment.
The technical scheme adopted by the application is as follows:
a health data management method based on wearable devices, comprising the steps of:
step 100: the method comprises the steps that a plurality of wearable devices monitor human health data of a user at the same time and establish communication connection with a smart phone;
step 200: the wearable devices send the monitored health data to the smart phone through the communication connection;
step 300: the smart phone encrypts the health data in time intervals, and sends the encrypted health data to a cloud server for storage, wherein the encryption uses symmetric encryption, and encryption keys used in each time interval are different;
step 400: when any one wearable device finds that the monitored health data is abnormal, the wearable device immediately informs the smart phone;
step 500: after receiving the abnormality notification, the smart phone sends keys of the current time period and a plurality of time periods before and after to the cloud server to request the cloud server to perform abnormality analysis;
step 600: after receiving the abnormality analysis request, the cloud server decrypts the corresponding health data according to the received multiple keys and analyzes the health data, and if the analysis confirms that abnormality occurs, the analysis result is sent to the appointed equipment or personnel.
Further, in the step 300, the step of generating the key for each period includes:
step 310: the smart phone randomly generates and stores a seed key K in advance;
step 320: the smart phone sequentially numbers the time periods;
step 330: when the nth period is finished, the smart phone generates a Key Key of the period n The method comprises the following steps: key (Key) n =Hash(K||n||Timestamp);
Wherein the symbol i indicates that binary representations of the front and rear variables are connected, n is the number of the period, timestamp is the Timestamp of the current time, and Hash is a Hash function.
Further, in step 320, the smart phone numbers the time periods according to the sequence of the time periods, wherein the first time period is numbered 1, the subsequent time periods are sequentially increased, and the nth time period is numbered n.
Further, in step 320, the smart phone numbers the time periods according to the sequence of the time periods, where the first time period is m, m is a random number, the subsequent time periods are sequentially incremented, and the nth time period is m+n.
Further, in step 330, different hash functions are selected according to the key length requirement.
Further, the smart phone maintains a time period counter that maintains the number of the current time period, which is incremented automatically at the beginning of each time period.
Further, each wearable device has a wireless communication module for establishing wireless communication with the smart phone.
Further, the wireless communication module is a bluetooth communication module.
Further, in the step 600, the cloud server decrypts the received period data first, and then decrypts the data of the subsequent period with time.
Further, in step 600, the cloud server sends the analysis result to the designated mobile phone number through a short message, or to the equipment owned by the family doctor designated by the user.
The beneficial effects of the application are as follows: the health data acquired by the user through the wearable equipment can be effectively monitored and stored, abnormal health conditions can be timely found and reported, and privacy requirements of the user on the health data are guaranteed.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate and together with the description serve to explain the application, if necessary:
FIG. 1 is a schematic diagram of a system environment in which the method of the present application is applicable.
Detailed Description
The present application will now be described in detail with reference to the drawings and the specific embodiments thereof, wherein the exemplary embodiments and the description are for the purpose of illustrating the application only and are not to be construed as limiting the application.
Referring to fig. 1, a wearable device system environment to which embodiments of the present application are applicable is shown, where the system environment includes a plurality of wearable devices, a smart phone, and a cloud server.
Wherein each wearable device may monitor one or more items of health data of the user, such as blood pressure, heart rate, blood oxygen, etc. Based on a preferred embodiment, the wearable device 1 monitors the first health data, the wearable device 2 monitors the second health data, and the wearable device 3 monitors the third health data. Each wearable device has a wireless communication module that can establish wireless communication with the smart phone and transmit the monitored health data. The wireless communication module may be, for example, a bluetooth communication module.
The smart phone may collect health data sent by each wearable device, for example, obtain first health data, second health data, and third health data from three wearable devices, respectively. Thus, the smart phone can collect the health data monitored by all the wearable devices, so that complete health monitoring data is obtained.
Furthermore, the smart phone can also perform corresponding processing on the obtained health data based on the method of the application and upload the health data to the cloud server.
The cloud server is used for storing the received user health data, and can correspondingly analyze and process the health data based on the method.
Based on the system environment described above, the health data management method of the present application will be described in detail.
Step 100: the wearable devices monitor human health data of the user at the same time and establish communication connection with the smart phone.
In particular, one user may wear multiple wearable devices at the same time according to his specific needs. Existing wearable devices may monitor a variety of human health data of a user, such as blood pressure using a smart watch, electrocardiogram using a wearable electrocardiograph, and so forth.
The wearable device establishes a communication connection with the user's smartphone while monitoring the data, typically such connection is near field communication, typically using a bluetooth communication connection. It is therefore generally required that the user carries the smartphone at the same time and works well, e.g. bluetooth pairing, on the first connection. If the wearable device fails to connect to the corresponding smartphone, the wearable device may temporarily store recent data (the amount of data stored depends on its memory capacity) and periodically attempt to connect to the smartphone until the connection is successful.
Step 200: and the plurality of wearable devices send the monitored health data to the smart phone through the communication connection.
Specifically, after the human health data is monitored, each wearable device sends the human health data monitored in the time to the smart phone at regular intervals. For example, the wearable device sends the human health data it monitors over the past 10 seconds to the smart phone every 10 seconds.
Thus, the smart phone may collect a plurality of corresponding human health data corresponding to a plurality of wearable devices, and each of the human health data collected by the smart phone is a continuous human health data for a certain time under normal conditions. For example, the wearable device 1 monitors blood pressure, the wearable device 2 monitors heart rate, and the smart phone can acquire two continuous health data of blood pressure and heart rate.
Step 300: the smart phone encrypts the health data in time intervals, and sends the encrypted health data to a cloud server for storage, wherein the encryption uses symmetric encryption, and encryption keys used in each time interval are different.
Generally, health data belongs to private data of an individual, and a user is not willing to know about the private person under normal conditions, so the health data uploaded to the cloud server must be encrypted. However, in the case of a subsequent abnormality, the cloud server needs to be given the ability to decrypt a part of the data, and the server needs to be informed of the decrypted key. If only one key is used, the cloud server can decrypt all of the user's health data, which is not in line with the original purpose of encryption.
For the above reasons, the present application adopts a method of encrypting in time segments, and the length of each time segment is fixed and can be preset. For example, a period of time is 1 minute, after a period of time is over, the smart phone generates a key for the period of time, encrypts all health data in the period of time using the key, and then uploads the health data to the cloud server. In this way, if the cloud server is required to decrypt the health data of a part of time period, only the key of the corresponding time period is required to be sent to the cloud server. The cloud server can only decrypt the data in the corresponding period according to the received key and can not decrypt all the data, so that the privacy requirement of the user health data is ensured.
However, if a key is generated every minute, the smart phone needs to store a large number of keys, and the smart phone is generally limited in storage space, so that a large burden is brought to the smart phone by storing a large number of keys, and a large amount of storage resources are wasted. The present application also provides the following way to generate the time-share key, so that the smart phone does not need to store a large number of keys, which specifically includes:
step 310: the smart phone randomly generates and stores a seed key K in advance.
For security reasons, the seed key K should be of sufficient length, preferably 1024 bits. The seed key is the basis for generating the subsequent key, so the smart phone should store the seed key securely.
Step 320: the smart phone numbers the time periods in sequence.
As described above, the smart phone encrypts the health data according to the time period and uploads the health data to the cloud server, so that the smart phone can number the time period according to the sequence of the time period. For example, the period number of the first uploaded data is 1, the period numbers after that are sequentially incremented, and the nth period number is n. For added security, the first period may be numbered m, where m is a random number, and the nth period may be numbered m+n.
Step 330: when the nth period is finished, the smart phone generates a Key Key of the period n The method comprises the following steps:
Key n =Hash(K||n||Timestamp)。
the symbol i indicates that binary representations of the front and rear variables are connected, for example, if K is 1024 bits, n is 8 bits, and timestamp is 64 bits, three numbers are connected to form 1024+8+64=1096 bits binary numbers.
The Timestamp is a Timestamp of the current time, i.e., the end time of the nth period. Hash is a Hash function that can choose different Hash algorithms depending on the key length requirements. For example, if the required key length is 128 bits, the MD5 algorithm may be used, and if the required key length is 256 bits, the SHA-256 algorithm may be used.
Thus, through steps 310-330 described above, the smart phone may generate a key for any one time period, and encrypt the health data for that time period using the key. The smart phone can calculate the key of any period only by storing the seed key K, the starting value m of the period number (namely the first period number), the starting time of the first period and the period length, thereby reducing the storage requirement of the smart phone. In practice, the smart phone may maintain a time period counter that keeps the number of the current time period, which is incremented automatically at the beginning of each time period, so that in most cases the current time period number can be obtained directly without further calculation.
Step 400: when any one wearable device finds that the monitored health data is abnormal, the wearable device immediately informs the smart phone.
The application requires that each wearable device has certain storage capacity and analysis capacity, can analyze the monitored health data, and can immediately inform the smart phone if the data is abnormal. However, the wearable device may only monitor one item of health data, the acquired data is not comprehensive, and the analysis capability is limited, so that false alarm may occur, and the cloud server needs to perform subsequent accurate comprehensive analysis.
Step 500: after receiving the abnormality notification, the smart phone sends keys of the current time period and a plurality of time periods before and after to the cloud server to request the cloud server to perform abnormality analysis.
Specifically, the smart phone may calculate the key of the current period and the multiple periods before and after using the same method as steps 310-330. For example, assuming that the current period is numbered n, the smartphone can calculate the keys for the first a periods and the last b periods, i.e., the key sequence key n-a ,key n-a+1 ,key n-a+2 ,……,key n ,key n+1 ,……,key n+b A+b+1 keys in total. And sends these keys to the cloud server. The values of a and b may be predefined in order to allow the cloud server to decrypt and analyze all health data over a continuous time.
Step 600: after receiving the abnormality analysis request, the cloud server decrypts the corresponding health data according to the received multiple keys and analyzes the health data, and if the analysis confirms that abnormality occurs, the analysis result is sent to the appointed equipment or personnel.
The key received by the cloud server includes the key of the current period and a plurality of periods before and after, the cloud server can decrypt the period data received first, and then decrypt the data of the subsequent period with time. Based on the specific situation, the analysis of the time period data can be performed immediately, or can be performed after all the data are decrypted.
Because the data decrypted by the cloud server comprises all the health data obtained through monitoring, and the calculation capability and the analysis capability of the cloud server are strong, all the health data can be analyzed according to preset rules, and a relatively reliable analysis result is obtained.
Once the analysis result confirms that an abnormal health condition occurs, the cloud server may send the analysis result to a designated device or person, for example, a short message to a designated cell phone number, or to a home doctor designated by the user.
By the method steps, the health data acquired by the user through the wearable equipment are effectively monitored and stored, abnormal health conditions can be timely found and reported, and the privacy requirement of the user on the health data is ensured.
The foregoing description is only of the preferred embodiments of the application, and all changes and modifications that come within the meaning and range of equivalency of the structures, features and principles of the application are therefore intended to be embraced therein.

Claims (7)

1. The health data management method based on the wearable device is characterized by comprising the following steps of:
step 100: the method comprises the steps that a plurality of wearable devices monitor human health data of a user at the same time and establish communication connection with a smart phone;
step 200: the wearable devices send the monitored health data to the smart phone through the communication connection;
step 300: the smart phone encrypts the health data in time intervals, and sends the encrypted health data to a cloud server for storage, wherein the encryption uses symmetric encryption, and encryption keys used in each time interval are different;
step 400: when any one wearable device finds that the monitored health data is abnormal, the wearable device immediately informs the smart phone;
step 500: after receiving the abnormality notification, the smart phone sends keys of the current time period and a plurality of time periods before and after to the cloud server to request the cloud server to perform abnormality analysis;
step 600: after receiving the abnormality analysis request, the cloud server decrypts the corresponding health data according to the received multiple keys and analyzes the health data, and if the analysis confirms that abnormality occurs, the analysis result is sent to the appointed equipment or personnel;
in the step 300, the step of generating a key for each period includes:
step 310: the smart phone randomly generates and stores a seed key K in advance;
step 320: the smart phone sequentially numbers the time periods;
step 330: when the nth period is finished, the smart phone generates a Key Key of the period n The method comprises the following steps: key (Key) n =Hash(K||n||Timestamp);
Wherein, the symbol I is used for connecting binary representations of the front variable and the rear variable, n is the number of the period, timestamp is the Timestamp of the current time, and Hash is a Hash function;
in the step 500, assuming that the current period is numbered n, the smart phone calculates the keys of the first a period and the last b periods, i.e. the key sequence key n-a ,key n-a+1 ,key n-a+2 ,……,key n ,key n+1 ,……,key n+b Wherein a and b are predefined values;
the smart phone stores a seed key K, a starting value m of a time period number, a starting time of a first time period and a time period length, and can calculate a key of any time period according to the stored information.
2. The method according to claim 1, wherein in step 330, different hash functions are selected according to the key length requirement.
3. The method of any of claims 1-2, wherein the smartphone maintains a time period counter that maintains the number of the current time period, and is incremented automatically at the beginning of each time period.
4. The method of any of claims 1-2, wherein each wearable device has a wireless communication module for establishing wireless communication with a smartphone.
5. The method of claim 4, wherein the wireless communication module is a bluetooth communication module.
6. The method according to claim 1, wherein in step 600, the cloud server decrypts the received period data first, and then decrypts the data of the subsequent period with time.
7. The method according to claim 1, wherein in step 600, the cloud server sends the analysis result to the designated mobile phone number through a short message, or to a device owned by the home doctor designated by the user.
CN201911060362.9A 2019-11-01 2019-11-01 Health data management method based on wearable equipment Active CN110827940B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911060362.9A CN110827940B (en) 2019-11-01 2019-11-01 Health data management method based on wearable equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911060362.9A CN110827940B (en) 2019-11-01 2019-11-01 Health data management method based on wearable equipment

Publications (2)

Publication Number Publication Date
CN110827940A CN110827940A (en) 2020-02-21
CN110827940B true CN110827940B (en) 2023-08-22

Family

ID=69552082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911060362.9A Active CN110827940B (en) 2019-11-01 2019-11-01 Health data management method based on wearable equipment

Country Status (1)

Country Link
CN (1) CN110827940B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117240870B (en) * 2023-11-01 2024-07-12 广东壹健康健康产业集团股份有限公司 Wearable device data synchronization method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546655A (en) * 2012-02-07 2012-07-04 中山爱科数字科技股份有限公司 Secure transmission method for health information
CN105581786A (en) * 2014-10-24 2016-05-18 无锡蓝阳谐波科技有限公司 Health monitoring system
CN105812126A (en) * 2016-05-19 2016-07-27 齐鲁工业大学 Lightweight back-up and efficient restoration method of health block chain data encryption keys
CN107307855A (en) * 2017-08-02 2017-11-03 沈阳东康智能科技有限公司 Vehicular human health monitoring system and method based on wearable device
CN109938711A (en) * 2019-04-23 2019-06-28 深圳傲智天下信息科技有限公司 Health monitor method, system and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546655A (en) * 2012-02-07 2012-07-04 中山爱科数字科技股份有限公司 Secure transmission method for health information
CN105581786A (en) * 2014-10-24 2016-05-18 无锡蓝阳谐波科技有限公司 Health monitoring system
CN105812126A (en) * 2016-05-19 2016-07-27 齐鲁工业大学 Lightweight back-up and efficient restoration method of health block chain data encryption keys
CN107307855A (en) * 2017-08-02 2017-11-03 沈阳东康智能科技有限公司 Vehicular human health monitoring system and method based on wearable device
CN109938711A (en) * 2019-04-23 2019-06-28 深圳傲智天下信息科技有限公司 Health monitor method, system and computer readable storage medium

Also Published As

Publication number Publication date
CN110827940A (en) 2020-02-21

Similar Documents

Publication Publication Date Title
Hu et al. Secure and efficient data communication protocol for wireless body area networks
Ghubaish et al. Recent advances in the internet-of-medical-things (IoMT) systems security
US9626521B2 (en) Physiological signal-based encryption and EHR management
US9237012B2 (en) Establishing secure communication between an implantable medical device and an external device
US11045647B2 (en) Pulsed electromagnetic field tissue stimulation treatment and compliance monitoring
EP3091459B1 (en) Systems and methods for wireless communication with implantable and body-worn devices
US9338819B2 (en) Variable data usage personal medical system and method
US8347094B2 (en) Securing wireless body sensor networks using physiological data
CN105187216B (en) A kind of data safety processing method, device and system
US8291220B2 (en) Securing wireless body sensor networks using physiological values for nonces
Bao et al. A novel key distribution of body area networks for telemedicine
KR101677114B1 (en) Method for detecting abnormality of biometrics using homomorphic encryption
CN110827940B (en) Health data management method based on wearable equipment
Arya et al. Data security for WBAN in e-health IoT applications
JP5331963B2 (en) Wireless communication authentication method, wireless communication system, and wireless sensor
Zhao et al. Electrocardiogram based group device pairing for wearables
US11621841B2 (en) System and method for secure end-to-end electronic communication using a privately shared table of entropy
KR102303839B1 (en) Method, system and non-transitory computer-readable recording medium for managing biosignal data
Celestina et al. An auction based health monitoring scheme using group management techniques in wireless sensor network
CN112396727A (en) Response method and system of first-aid request and terminal equipment
Aldahasi et al. A Smart Elderly Monitoring System based on Cloud
Gupta et al. Delay-sensitive remote health framework for secured wban using sensor virtualization
US20230033093A1 (en) Systems and methods for remote measurement of cervical range of motion
CN113539521B (en) Intelligent medical information processing terminal and system based on Internet
Yogalakshmi et al. Secure Encrypted Data Transmission of Brainwaves Using AES

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant