EP4232977A1 - Procédé, appareil et système permettant de stocker des données d'utilisation et de suivre un produit médical - Google Patents
Procédé, appareil et système permettant de stocker des données d'utilisation et de suivre un produit médicalInfo
- Publication number
- EP4232977A1 EP4232977A1 EP21794864.5A EP21794864A EP4232977A1 EP 4232977 A1 EP4232977 A1 EP 4232977A1 EP 21794864 A EP21794864 A EP 21794864A EP 4232977 A1 EP4232977 A1 EP 4232977A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- usage
- product
- medical device
- blockchain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 60
- 229940127554 medical product Drugs 0.000 title claims abstract description 43
- 238000003860 storage Methods 0.000 claims abstract description 35
- 238000001514 detection method Methods 0.000 claims description 32
- 238000005516 engineering process Methods 0.000 claims description 25
- 238000012545 processing Methods 0.000 claims description 11
- 230000003287 optical effect Effects 0.000 claims description 9
- 230000000903 blocking effect Effects 0.000 claims description 8
- 238000012790 confirmation Methods 0.000 claims description 6
- 238000004422 calculation algorithm Methods 0.000 claims description 5
- 238000013479 data entry Methods 0.000 claims description 5
- 230000015654 memory Effects 0.000 description 29
- 230000005540 biological transmission Effects 0.000 description 22
- 238000004519 manufacturing process Methods 0.000 description 14
- 230000008901 benefit Effects 0.000 description 7
- 230000004044 response Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 6
- 238000004806 packaging method and process Methods 0.000 description 6
- 230000001954 sterilising effect Effects 0.000 description 6
- 238000004659 sterilization and disinfection Methods 0.000 description 6
- 238000012546 transfer Methods 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000001802 infusion Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000004140 cleaning Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000005520 cutting process Methods 0.000 description 2
- 230000036512 infertility Effects 0.000 description 2
- 239000003550 marker Substances 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011022 operating instruction Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 210000000988 bone and bone Anatomy 0.000 description 1
- 238000011109 contamination Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000009365 direct transmission Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000003801 milling Methods 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000003449 preventive effect Effects 0.000 description 1
- 238000000275 quality assurance Methods 0.000 description 1
- 238000003908 quality control method Methods 0.000 description 1
- 238000004064 recycling Methods 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 238000012958 reprocessing Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B90/00—Instruments, implements or accessories specially adapted for surgery or diagnosis and not covered by any of the groups A61B1/00 - A61B50/00, e.g. for luxation treatment or for protecting wound edges
- A61B90/90—Identification means for patients or instruments, e.g. tags
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61B—DIAGNOSIS; SURGERY; IDENTIFICATION
- A61B90/00—Instruments, implements or accessories specially adapted for surgery or diagnosis and not covered by any of the groups A61B1/00 - A61B50/00, e.g. for luxation treatment or for protecting wound edges
- A61B90/90—Identification means for patients or instruments, e.g. tags
- A61B90/98—Identification means for patients or instruments, e.g. tags using electromagnetic means, e.g. transponders
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Definitions
- the present invention relates generally to the use of medical devices.
- the storage of data about their use in a forgery-proof manner is described, at least in the currently technically generally possible and economically sensible framework.
- the present disclosure relates in particular to a tracking system for securely and reliably tracking at least one disposable medical device and a tracking method according to the preambles of the independent claims.
- an object of the present invention is to overcome or at least mitigate the above-described disadvantages of the prior art, improve the prior art, and/or at least offer a useful alternative to the existing prior art.
- an object of the present invention is to be seen as providing a (tracking) method, a (tracking) device and a (tracking) system for tracking a medical product, which a medical product to be tracked, in particular a disposable medical product, safely and unfalsifiably tracked in order to ensure or at least support a limited number of uses of this medical device, to be able to make a reliable statement about a (usage) condition of a medical device and to increase patient safety.
- the historical course of a medical product should be documented with the data being unfalsifiable. Another subtask can be seen in ensuring that a medical product is protected against counterfeiting.
- the present invention solves the above problem by the subject matter or by the features of the independent patent claims.
- the present invention solves the problem with regard to a tracking method according to the invention by the features of claim 1, with regard to a computer-readable storage medium according to the invention by the features of claim 8, with regard to a tracking system according to the invention by the features of claim 9 and with regard to a device according to the invention by the features of claim 15
- Advantageous developments can be found in the respective dependent patent claims.
- the present invention achieves the object by detecting use/use of the product, creating usage data/usage data relating to the detected use of the product, and storing the usage data in a data set in a form that cannot be modified later.
- a “subsequently non-modifiable form” is to be understood in particular as a form of storage that cannot be changed from an economic point of view, for example because the effort involved in making a change is uneconomically large.
- blockchain technology is used to store the usage data in the data set, which effectively prevents subsequent modification of the data.
- decentralized storage can be implemented, which means that storage can be secured against the failure of individual servers.
- a high level of reliability is an advantage.
- the object is achieved by providing a medical tracking system for secure tracking of at least one single-use medical device, with: a single-use medical device to be tracked, which has a unique (i.e. only assigned once) identification, in particular a unique serial number and /or has an ID element; at least one detection unit, in particular a reading device, which is adapted to detect the identification of the disposable medical product and to make it available in computer-readable form; a computer network with at least three computers/data processing units/nodes, on each of which a digital tracking book with a directory of blocks of information on the at least one disposable medical device is stored decentrally as/in the form of a blockchain, with at least in a first (genesis) block the unique identification (or identification data) of the at least one disposable medical product and a first (cryptological) hash (in particular as a checksum) are stored; a usage module adapted to send a usage transaction for the single-use medical device to the computer network upon detection of the single-use medical device by the detection unit/device
- the usage transaction for the medical device to issue an alarm and/or to block the use of the single-use medical device.
- the single-use medical device is used only once and that a requirement for a sterile standard is complied with, for example.
- the output of the alarm is appended as an alarm transaction in the blockchain to ensure secure documentation of a user warning and to have clear evidence.
- the identification in particular the serial number and/or a QR code
- the detection unit can have and/or an optical detection unit, in particular a camera the identification, in particular the serial number, can be stored in a REID tag of the disposable medical device and the
- Recording unit have an RFID reader / RFID reader.
- the identification is inextricably linked and stored in the single-use medical device and can be read by a compatible reader/reader.
- a compatible reader/reader In the case of the engraved serial number and an RFID tag, which is preferably sealed off from the environment, a requirement for sterility of the medical product can be ensured and, in particular, read out using a contactless reader. Security is further increased.
- the at least one disposable medical product can be a medical, in particular surgical, instrument and/or a perforated basket and/or a holder and/or an electrically operated medical device.
- a complete and secure follow-up is particularly important in these cases and can be efficiently implemented using the follow-up system.
- a (disposable) surgical instrument for example, should be used during the operation and then no longer used.
- the instrument is recorded by the registration unit before it is used and the usage transaction is added according to the blockchain.
- the usage transaction is read in the blockchain and it is determined that the instrument can no longer be used.
- a sterilization transaction is written to the blockchain when the medical device has been sterilized, and the tracking module reads the blockchain and determines that there is no use in a use transaction with a sterilization transaction following the use transaction and a new one Use is permitted without issuing an alert and/or barring use. In this way, the sterility of the medical product is always ensured.
- the disposable medical product can preferably be an electrically operated medical device and the tracking module can be adapted to interrupt an electrical power supply to the disposable medical product when it is used again or when a usage transaction for this medical product is read out. In this way, unintentional use of a non-sterile single-use product is reliably prevented.
- the tracking system can preferably have a display device on which an alarm is output visually as soon as renewed use of the medical product has been detected.
- a user must make an entry, in particular on a touch display of the tracking system, in order to be able to continue using the medical product, in particular an electrically operated medical device, contrary to the warning, for example if the medical product is to be used again due to an emergency.
- a corresponding transaction can be recorded in the blockchain of the computer network. In this way, it is also documented if a single-use medical device is used several times contrary to a specification.
- an acoustic alarm can also be output via a loudspeaker.
- the tracking system has a central database on at least one computer, in which additional entries/data on the at least one single-use medical product are stored.
- data such as operating instructions or sterilization instructions for the medical device are stored in the database, with a unique hash value (entry hash) being generated for the entries/data, in particular the operating instructions, which is stored in the blockchain for the medical device in order to ensure that the data stored in the database is protected against forgery.
- entity hash unique hash value
- a file (data) such as instructions, an image of the medical device or documentation is stored in a standard database, for example, to this file (as data) using a hash procedure a ( Entry) hash is generated as a type of certificate signature and this unique (entry) hash is stored in the blockchain for the medical device. If, for example, an instruction in the central database is changed (even just a single bit), the entire hash changes and no longer matches the authentic hash of the blockchain. In this way, manipulation can be prevented by appropriate checking. In this way, important data with large file sizes can be stored centrally and protected against falsification via the entries (hashes) of or in the blockchain.
- a hash value is a short character string that only requires a few bytes of storage space and can be efficiently updated in the blockchain.
- a best-before date can also be stored in the first (genesis) block and the tracking module can be adapted to compare the best-before date with the current date when it is recorded by the recording unit and to issue an alarm and/or to block the use of the medical device if the BBD is exceeded.
- an article number for allocation of the medical device can be stored in the (genesis) block.
- the use module can be adapted to add a dead-end marker to the corresponding medical device of the blockchain in addition to the use transaction, in order to reliably and quickly recognize that the corresponding medical device can no longer be used when it is used again.
- the usage module can add a dead-end marker to the blockchain if the best-before date is exceeded.
- a warehouse entry detection device can record the unique identification of the medical device and add a warehouse transaction with a warehouse entry date (as a time stamp) in the blockchain to the medical device in order to document a warehouse entry.
- the warehouse entry detection device is adapted to determine that it is a location of a warehouse (rather than a location of use) via a data connection to a warehouse data hotspot.
- a sales detection device can capture the unique identification of the medical device and the tracking system can add a sales transaction to the medical device with a sale date (as a time stamp) and also preferably a customer number in the blockchain in order to document a sale of the medical device .
- a shipping detection device can capture the unique identification of the medical device and add a shipping transaction with a shipping date (as a time stamp) to the medical device in the blockchain in order to document a shipping of the medical device.
- a shipping transaction with a shipping date (as a time stamp)
- the tracking system may be adapted to determine a location of the sensing device in order to perform a transaction corresponding to the location via the location. If, for example, a medical product is scanned by the reader in the warehouse, the reader determines its location in the warehouse (e.g.
- the individual stations of the medical product can be recorded with a standardized recording device, with the recording device being assigned as a warehouse entry recording device.
- GPS localization system
- WLAN hotspot warehouse a data connection
- the tracking system for a temporary interruption in the connection to the computer network with the (main) blockchain can have a side chain in which a usage transaction is temporarily written and when a connection is established to the computer network with the (main) blockchain the stored transactions (with a time delay) in be written to the blockchain.
- the object with regard to a (tracking) method is achieved in particular by providing a computer-implemented medical tracking method for reliable tracking of at least one disposable medical device, in particular for a medical tracking system according to the present disclosure, with the steps: detecting a one-to-one Identification of a disposable medical device by a detection device; calculating, based on the unique identifier, a first hash value; storing a first (genesis) block with the detected identification in a blockchain on each computer of a computer network with at least three computers; detecting a usage of the disposable medical device by a detection device and sending a usage transaction to the computing network; Checking whether there is a usage block in the blockchain for the single-use medical device; If there is no usage block yet: Generate based on the usage transaction of a usage block with the first hash, a timestamp, the usage transaction and a usage hash and provide to the computer network to add this usage block in the computers of the computer network respectively to the blockchain; and If there is a block of use: issuing an
- an NFT non-fungible token
- a digital twin in the blockchain.
- the digital twin can be created and tracked.
- a digital twin is stored in the blockchain, in particular with at least the article number, the serial number and a UID.
- a sterilization time stamp can be stored in a sterilization step.
- At least one or a combination of the following time stamps can be stored with the corresponding transaction:
- At least one or a combination of the following time stamps can also be stored with the corresponding transaction:
- the tracking system can record the use of the single-use medical product by reading in the unique identification by the registration unit and by a stored association of the registration device as a usage registration device with the use.
- the tracking method can also have the steps: In addition to the unique identification with a unique serial number: storing a unique control number associated with the serial number in the first block, which was generated as an alphanumeric number code by a specified, non-public algorithm
- detecting the use of the disposable medical device checking the serial number and the control number associated with the serial number and determining that the disposable medical device is counterfeit if the control number does not match the serial number.
- the serial number is encrypted using a private and publicly unknown algorithm and an associated control number is created, which is also stored in the blockchain.
- a corresponding test algorithm can be used to check whether the control number actually matches the serial number. This prevents counterfeiting with a consecutive serial number, since an "encrypted" and changing control number is required in addition to the consecutive serial number.
- the usage data can also be transferred from the product being used to one or more computers and stored there.
- a computer is to be understood as meaning any type of data processing device.
- the blockchain data record can be integrated into an existing data construct on the one or more computers, which can also be based on blockchain.
- the storage on the product or the computers can be carried out in different ways. It is possible that the storage locations are all non-public, eg within a company or a hospital. However, the computers can also be arranged in a distributed, non-public manner, for example with the manufacturer, service partner and user of the product. Or, the storage is carried out in a publicly accessible DLT.
- the data transmission used here can be accomplished, for example, by various technologies: Bluetooth, IR, LAN, WLAN, loT, mobile radio, eg 2G, 3G, 4G, 5G, GSM and/or LTE, LoRaWAN (Low Range Wide Area Network). However, other wired or wireless protocols or transmission technologies can also be used. In addition, direct transmission or transmission via intermediate stations such as smart hubs, repeaters, routers, switches, mobile hotspots, data gates, access points and/or the Internet is possible.
- Additional information can also be stored in the stored data sets or data constructs.
- information about the article and/or serial number of the product and/or a permitted use such as an expiry date after which the product may no longer be used, or a permitted number of uses is stored in the data records. This information can either be written into the data construct when the product is manufactured, or it can be recorded when the use is recorded and then saved in the data record.
- Other information that can be stored is, for example, information relating to dates of manufacture, storage, shipping, sale of the product.
- a signal can be output, for example acoustically and/or optically.
- data can be transmitted at a trigger such a signal or cause a notification there on another device.
- a request can be issued and the product can only be released for use after confirmation of the request, for example by a user. This enables emergency use, for example, so that a product that is actually no longer usable can still be used.
- Reasons for this can be, for example, that there is no unused product or a product that can be used within the usage parameters.
- the product can be blocked for the requested further use, so that it cannot be used for the use determined as unauthorized use.
- This can increase overall safety, since a product can possibly pose a safety risk after reaching the permitted usage times or number of uses, since the cutting edges of cutting tools, for example, can potentially cause damage.
- FIGS. 1 to 4 flow charts of a method according to preferred embodiments
- FIGS. 5 to 8 show schematic views of devices and systems of preferred embodiments
- FIG. 9 shows a flow chart of a method according to a preferred embodiment with additional data.
- proof of use is required. Ideally, such proof is forgery-proof so that uses cannot be added, deleted or changed afterwards.
- a solution is proposed which ensures that the data cannot be falsified in the form of logs and thus documents the usage historically and reliably.
- DLT English for technology of distributed cash books
- DLT is used for documenting certain transactions.
- any number of copies of the ledger which are in principle equal, are maintained decentrally by different parties. Appropriate measures are taken to ensure that new transactions to be added are adopted in all copies of the ledger and that there is agreement (consensus) on the current status of the ledger.
- DLT is a form of blockchain, others are e.g. Tangle.
- the generic term blockchain is used below, but the invention can also be implemented with any other blockchain technology.
- a user e.g. manufacturer, user or retailer, etc.
- a user can validly determine and log whether a product has been used more than the specified maximum number of uses. For example, it can be determined whether a single-use item (a product that may only be used once for hygienic reasons, for example) has been used several times.
- the user can also ensure that the products are only used once. This can be done by blocking (e.g. live devices) or by signals (e.g. acoustic, optical signals) or a prompt in a computer dialog.
- Such information or signals can, for example, be sent to computers, mobile devices, software that is operated on such (e.g.
- SMS short message
- e-mail Transmission Control Protocol
- TCP/IP Transmission Control Protocol
- data transmission via Bluetooth IR, LAN, WLAN, loT
- mobile radio e.g. 2G, 3G, 4G, 5G, GSM and/or LTE, LoRaWAN.
- Communication can also take place either directly or via intermediate stations such as smart hubs, repeaters, routers, switches, mobile hotspots, data gates, access points, and/or the Internet.
- Tamper-proof logging is a future-oriented technology and any party using such logging is prepared for the future requirements.
- everyone involved can establish themselves as participants in a blockchain and thus increase their reputation with institutions and authorities. This may be decisive for the economic award of orders.
- a falsification of data can no longer occur through use, since the history is mapped via the respective blocks.
- application cycles can also be logged validly and immutably for reusable products.
- Previous solutions include logging or logging of usage data in traditional databases such as mysql, sql, etc. Some of these are cloud-based. As a rule, such solutions have no security against forgery.
- the data may also be entered into such databases by users themselves and are therefore also subject to errors in data acquisition and/or data entry.
- data in such databases can be changed by IT administrators (with so-called administration rights, i.e. extended access to the data) or by unwanted access (e.g. attacks) by third parties. Under certain circumstances, such changes can only be noticed relatively late, so that countermeasures can then only be initiated with a time delay. Overall, this leads to a high administration and monitoring effort. Likewise, fraudulent intentions regarding
- Products with limited use, in particular single-use products are provided by the customer for the intended, e.g. one-off, use and are usually marked or described accordingly.
- Single-use products can be marked with a crossed-out number 2, for example.
- the invention presupposes that products can be recorded and recognized electronically. This is described in the prior art, e.g.
- So-called smart hubs, mobile hotspots, data gates, access points, repeaters, etc. are also known from the prior art, which offer a connection between devices and/or to the Internet.
- Such devices include mobile hotspots over the mobile network (5G, 4G, 3G, dual-band, etc.), basic devices for loT devices, smartphones or WLAN routers that can establish a hotspot, LoRaWAN that uses a technology that is known alongside 5G as a one of the possible bases for IOT devices to be established, and the like.
- LoRaWAN uses a technology that is known alongside 5G as a one of the possible bases for IOT devices to be established, and the like.
- the functionality of being able to communicate with at least one blockchain and to carry out transactions or to be able to insert information (in blocks) is described.
- FIG. 9 Some possible phases of the life cycle are described below as examples. These are shown in FIG. The content of the stored data is displayed as an example for each phase.
- the data given in FIG. 9 are for illustration purposes only; further data can be stored, as explained in this description; data can also possibly be omitted, depending on the respective application.
- Phase 1 is the manufacture of the product.
- the product is manufactured and finally equipped with data. This happens in the form of laser inscription or writing to data storage devices, or something similar.
- Such processes are described, for example, in DE 102018125884.
- an article number e.g. GP111SU, a unique serial number e.g. SN0001020, optionally including a uniquely assigned data sequence, e.g. a NONE COPY IDENTIFICATION, NCID for short, which can optionally also be encrypted and/or a best before date, eg: 2019-09 for September 2019, can be logged.
- a unique serial number e.g. SN0001020
- NCID for short
- NCID for short
- NCID can optionally also be encrypted and/or a best before date, eg: 2019-09 for September 2019, can be logged.
- One or more of this information can also indicate, for example, that the product is intended for single use only.
- Phase 2 describes the warehousing of the product.
- data is added to the data record that has already been logged, which, for example, indicates the day of stock entry and thus the salability.
- This data is written to the blockchain in addition to the already existing data package.
- Other information describing the access to the warehouse and the previously covered routes and intermediate stations of the product is also possible, e.g. date of dispatch from the factory, indication of the transport phase, number and number of intermediate stations, transport duration, distance traveled by the product, etc.
- Phase 3 describes the sale of the product.
- data is added to the data record that has already been logged, which, for example, shows the time the product was placed on the market. This can be done as just a tag or with additional information such as time, location, time zone, etc.
- This data is written to the blockchain in addition to the already existing data package.
- Other information is also possible, e.g. price, number and number of owners, identification of the owner, identification of the buyer, identification of the seller, etc.
- the identifications described above can also be carried out in the case of desired anonymity via encrypted ID data, e.g. numbers, symbols, and the like that are only known to a limited extent, e.g. only to the manufacturer or only to public authorities.
- Phase 4 describes the shipping of the product.
- data is added to the data record that has already been logged, which, for example, shows the time of dispatch. This can be done as just a tag or with additional information such as time, location, time zone, etc.
- This data is written to the blockchain in addition to the already existing data package. Further information is also possible, e.g. day of earlier dispatch, indication of the transport phase, number and number of intermediate stations, transport duration, distance covered by the product, identification of the sender, identification of the recipient, transport restrictions, such as fragile or no air freight increased by a to avoid air pressure, etc.
- the identifications described above can also be carried out in the case of desired anonymity via encrypted ID data, eg numbers, symbols, and the like, which are only known to a limited extent, eg only to the manufacturer or only to public authorities.
- Phase 5 describes the actual use of the product.
- data is added to the data record that has already been logged, which, for example, shows the time of use. This can be done as just a tag or with additional information such as time, location, time zone, etc.
- This data is written to the blockchain in addition to the already existing data package. Further information is also possible, e.g. writing out temporarily stored usage data in the device since the last connection to the recording unit, identification of the person or device using, which can be recorded, e.g. via identification before use, further data on use, i.e. type of use, duration of use Usage, number and number of usages, number of switching on and off processes or actions performed during usage. If anonymity is desired, the identifications described above can also be made using encrypted ID data, e.g. numbers, symbols and the like, which are only known to a limited extent, e.g. only to the manufacturer, the owner, or only to public authorities.
- Phase 6 describes the end of the life cycle. It is determined, e.g. by the product itself or another device, based on the previously stored data, e.g. number and/or number of uses already stored, daily data of the stored uses, etc. that the end of the product's life cycle has been reached.
- the product is thus marked as expired, and it is therefore valid that this product should be disposed of and should not be used again.
- the time at which the product was marked as "expired” can also be recorded. If corresponding data is stored in the blockchain for the product, the use can also be saved in phase 5 with a special mark, e.g. as off-label use, and/or the product can be blocked for use if the technical possibilities for this are available. For example, if a product marked as "expired” were recorded again in a usage environment on a later day or after a defined period of time, off-label use can be determined as mentioned above. This reduces both patient and user risk.
- a user could confirm the interposed request, which in turn could be stored in phase 5 via additional data in the data record in the blockchain. This can in turn be done with the identification of the user or the device used as described above. Otherwise a product would have to be used whose life cycle has not yet reached the end.
- the user is not informed. Off-label use is only logged.
- the relevant party e.g. the company or institution where the product is in use, can view the product data in the blockchain and determine if a product has been used several times. If necessary, a quality assurance officer can then intervene and have the product removed from the cycle.
- the user receives information that indicates the end of the life cycle. This can be done via an audible or visual display on the product or on a suitable device involved in its use.
- suitable output units can be, for example, the following: tablet, control device, smart watch, display, screen in the usage space and all suitable output devices. If necessary, the reference to permitted use can be made together with an indication of whether the product is at all suitable for the intended use.
- a corresponding note can also be output elsewhere. Either on an output device at a central monitoring point or as feedback to the manufacturer. From there, a service technician or sales person can be sent to the customer to advise on the use.
- the same or similar data as described above can be stored in the blockchain for the further course of the life cycle, such as return, maintenance, reprocessing, recycling and/or disposal.
- the product for storing the data is usually read by an electronic reader. This can be done, for example, by reading a barcode, in 2D or 3D, or an NFC (Near Field Communication) tag on the product, the outer packaging or the shipping packaging. Allocation via the shipping packaging via an intermediate database query is also possible.
- the DLT or blockchain can be used in different variations.
- One possibility is a so-called private blockchain.
- the blockchain is operated within a closed network within a company or institution and possibly kept redundantly on several servers. These servers are considered so-called nodes/masternodes. The block contents are therefore not visible to other parties outside the private network. Nevertheless, a corresponding data transfer can take place in order to be able to provide corresponding proof.
- a semi-private blockchain can be managed and operated jointly by two or more participants, i.e. it can be described.
- read-only access is also possible for some participants.
- An example here is the operation of the shared blockchain for users and manufacturers, so that, for example, a reorder of expired products can be automated. The block contents are therefore not visible to other parties outside the semi-private network. Nevertheless, a corresponding data transfer can take place in order to be able to provide corresponding proof.
- Another possibility is a public blockchain.
- the blockchain is operated publicly and all those involved, possibly even those who are not involved, ie the public, can view the transactions, ie the block contents.
- the data that is written to it can be stored in plain text or in encrypted form, which in turn can create a certain degree of anonymity.
- Mastemodes can be operated at the various company locations around the world. If necessary, customers are integrated into the network with their own mastemodes.
- an adaptation to an existing blockchain such as Ethereum, NEO, Cardano is conceivable in order to feed the data to be written there.
- a so-called sidechain can be established on the product or on a device that is in communicative connection with the product, parallel to the blockchain actually used. This can also happen ad hoc, i.e. without preparation, if a data communication error is detected.
- an independent, continuous blockchain can be operated locally, which first of all generates blocks locally and logs the resulting product uses locally, ie logs them.
- connection e.g. as part of maintenance, preventive maintenance, a service technician assignment, or another planned data transfer
- the connection can be established a connection to the actual blockchain, here the main blockchain, can be established and the data content of the sidechain can be transferred to the main blockchain or integrated into it.
- the data blocks of the sidechain are then stored as further blocks in the main blockchain, for example.
- This variant also enables products that are operated without a data connection, i.e. offline, to be integrated into the blockchain, albeit with a time delay. As a result, medical products can be used with a high level of availability without having to forego the advantages mentioned. Hardware requirements can be kept low because only one sidechain is generated and stored locally. There is no need for complex mechanisms for replication and synchronization of classic databases, which means that high availability can be achieved.
- Another advantage of the solution is the increased security against counterfeit products.
- Data such as the serial number are combined with a unique control number, which is generated via an algorithm and consists, for example, of a unique alphanumeric number code, is stored for a product in the blockchain. If a counterfeit product with the same serial number and an attempted counterfeit control number is then identified, this product is declared as a counterfeit and the user or customer or the currently acting participant is informed and/or this is logged in the blockchain.
- Patient safety can be increased.
- Counterfeit products can also be detected using other methods, such as comparing checksums or comparing an attached encrypted data record (e.g. a control number) with one on a server (e.g. in the cloud, i.e. on a server that can be reached via data communication).
- remote storage stored primary key. This can be used to determine whether the product is authentic or a fake.
- the encryption used can then be decoded with the primary key and compared with the previously stored data record (e.g. with the manufacturer or another participant in the supply chain). In this way, the authenticity can be verified and the potentially dangerous use of counterfeit products can be avoided.
- a first step 110 the usage is recorded first.
- This can be done by the product or a component thereof, or by an external device that records usage, e.g. by the product being within the detection range of the device, e.g. by means of WLAN, Bluetooth, or another wireless technology, or by the product the device transmits a corresponding signal.
- the detection can be done optically, eg by reading a bar code, in 2D or 3D on the product, or electronically, eg by NFC (Near Field Communication).
- the usage data relating to the recorded use of the product is created based on the recording.
- data can be recorded here, such as the time of use, just as a day or with additional information, such as time, location, time zone, etc.
- the usage data can also identify the person or device using it, e.g identification before use can be recorded, further data on use, i.e. type of use, duration of use, number and number of uses, number of switching on and off processes or actions carried out during use. If anonymity is desired, the identifications described above can also be made using encrypted ID data, e.g. numbers, symbols and the like, which are only known to a limited extent, e.g. only to the manufacturer, the owner, or only to public authorities.
- Step 120 may be performed by the product or component thereof, or by an external device that has sensed the usage or to which the sensing has been communicated.
- a next step 130 the usage data is then stored in a data set in a form that cannot be modified later.
- the form that cannot be subsequently modified is, for example, as described above, a DLT such as a blockchain.
- the data record is added to existing ones blocks of data written to the blockchain.
- the writing 130 can also be performed by the product or a component thereof, or by an external device that created the usage data or to which the usage data was communicated. The writing can be performed on a memory located in the product or in a memory allocated to an external device.
- FIG. 2 shows that the method 100 can include the previously described transmission 140 of the usage data to one or more computers, each with a memory, after the creation 120 and before the storage 130 .
- the storage in step 130 can then be carried out by one or more computers.
- the writing can be performed on a memory located in the product or in a memory associated with an external device.
- FIG. 3 shows that the method 100 can be carried out in such a way that the product is first saved in step 130 in its own memory and then a previously described method is followed by a transmission 150 of the data record to one or more computers which each have a memory, and then the data set is stored by one or more computers in its memory.
- the data record here already has the form that cannot be subsequently modified from step 130, i.e. it is available as a DLT or blockchain, this corresponds, for example, to the sidechain explained above.
- the computer could also only have a simple database in which the sidechain is stored for later use.
- Figure 4 shows that the method 100 as previously described, in response to a request for further use of the product, may be followed by a step 170 of determining that the further use constitutes unauthorized use.
- This determination can be made, for example, by evaluating the data set and/or data stored in the data construct as previously described. This step can also take place in the product or in one of the devices or computers described above.
- step 180 further use or the request for further use can be stored in the data record and/or the data construct.
- step 181 an optical and/or acoustic signal can be output. As previously described, this can be done on the product or at a location remote from the product.
- data may be transmitted, e.g., to a computer such as those previously described, where the data then causes a signal or notification to an external device.
- a request can be issued to a user, which the user must first confirm. The receipt of the release again occurs in step 185, and only then in step 184 is the release of the product effected.
- the prompting and enabling may be performed by the product itself or by another device, such as a computer, as previously described.
- step 186 the product can be blocked so that further use is not possible.
- the steps described in connection with Figures 1 to 4, which include the transmission of data, can use one or more of the following technologies, for example: e.g. Bluetooth, IR, LAN, WLAN, loT, mobile radio, e.g. 2G, 3G, 4G, 5G, GSM and/or LTE, LoRaWAN, and either directly or via intermediate stations such as smart hubs, repeaters, routers, switches, mobile hotspots, data gates, access points, and/or the Internet.
- Bluetooth e.g. Bluetooth, IR, LAN, WLAN, loT
- mobile radio e.g. 2G, 3G, 4G, 5G, GSM and/or LTE, LoRaWAN
- intermediate stations such as smart hubs, repeaters, routers, switches, mobile hotspots, data gates, access points, and/or the Internet.
- one or more pieces of information can additionally be stored from: information regarding item, serial number of the product and/or a permitted use, such as an expiry date after which the product may no longer be used, or a permitted number of uses, the information being written into the data construct at the time of manufacture of the product or at the recording in step 110 of the use can also be recorded and then stored in the data record, or information regarding dates of manufacture, storage, shipping, sale of the product.
- a system for data processing that includes a processor that can execute the method as described above is not shown. Also not described is a computer program product and/or computer-readable storage medium, each of which includes instructions that, when executed, implement the method as described above.
- FIG. 5 shows an exemplary device 200 for storing usage data 210 of a product 220.
- the device comprises a detection unit 201, which detects the use of the product 220 in the manner described above.
- FIG. 5 While in FIG. 5 the device 200 is a device independent of the product 220, FIG. However, the other relationships described above and below are generally equally applicable to the illustrations in FIGS.
- the device 200 records the usage, e.g. by direct signal transmission within the product 220.
- the device 200 is not part of the product, use can be implemented, for example, by recognizing that the product is within the detection range of the device, for example by means of WLAN, Bluetooth, or another radio technology, or by the product of the device sends a corresponding signal.
- the detection can also be done optically, for example by reading a bar code, in 2D or 3D on the product, or electronically, for example by NFC (Near Field Communication).
- the device 200 includes a data processing unit 202 which creates the usage data 210 relating to the recorded usage of the product 220 .
- Creation can be performed in the product or in an external device.
- data can be recorded here, such as the time of use, just as a day or with additional information, such as time, location, time zone, etc.
- the usage data can also identify the person or device using it, e.g identification before use can be recorded, further data on use, i.e. type of use, duration of use, number and number of uses, number of switching on and off processes or actions carried out during use.
- the identifications described above can also be made using encrypted ID data, e.g. numbers, symbols and the like, which are only known to a limited extent, e.g. only to the manufacturer, the owner, or only to public authorities.
- the device 200 also includes a memory unit 203, which stores the usage data 210 in a data record 230 in a form that cannot be modified later.
- the form that cannot be subsequently modified is, for example, a blockchain, as described above. If necessary, the data record is written to the blockchain in addition to existing data blocks.
- the storage unit can be part of the product or part of an external device that created the usage data or to which the usage data was communicated. The storing may be performed on a memory located in the product or in a memory associated with an external device.
- the device 200 may be part of a system 300, the system 300 further comprising one or more computers 240, one for each Memory 250.
- the device 200 then has a transmission unit 204 which transmits the usage data 210 to one or more of the computers 240.
- the receiving computers then store the usage data 210 in a data record 230 in a subsequently non-modifiable form, specifically a DLT or blockchain, in the respective memories 250, as described above.
- the device 200 can again be embodied as part of the product 220, or externally, as can be seen in FIG. 5 and FIG. 6, respectively.
- the transmission unit 204 can also transmit the data set 230 created in the device 200 to the one or more computers 240 .
- this data record 230 can be transmitted from the transmission unit 204 to the computer or computers 240 in order to be stored there or elsewhere.
- the computer or computers 240 generate the data record 230 from the usage data 210, then the usage data 210 will be transmitted from the transmission unit 204 to the computer or computers 240 in order to be stored there or elsewhere in a data record 230.
- the computer(s) 240 can have a calculation unit 241, which converts the transferred data record 230 into an existing data construct 280, which is also not subsequently modifiable, i.e. also, for example, in DLT or available as a blockchain.
- the device 200 can have a determination unit 320 which, in response to a request for further use, can determine that the further use constitutes unauthorized use. This determination can be made, for example, by evaluating the data stored in the data set 230 and/or the data construct 280, as described above. In the event that the determination unit 320 determines unauthorized use, one or more of the computers 240, as shown in Figures 5, 6 and 8, or the device 200, as shown in Figure 7, can have one or more of the following elements, or be adjusted in the following way.
- the device 200 or the system 300 may store the further usage in the data set 230 and/or the data construct 280 if unauthorized usage has been determined by the determining unit 320 .
- a signal device 330 can emit an optical and/or acoustic signal if unauthorized use has been determined by the determination unit 320 . As previously described, this can be done on the product or at a location remote from the product.
- the transmission unit 204 may transmit data that causes a signal or notification to an external device 310 if unauthorized use has been determined by the determination unit 320 .
- An output device 340 may issue a request and a release device 350 may, in response to receiving a user confirmation in response to the request, release the product for the requested further use if unauthorized use was determined by the determination unit 320.
- a blocking device 360 can block the product 220 so that further use is not possible if unauthorized use has been determined by the determining unit 320 .
- the elements described in connection with Figures 5 to 8, which include the transmission of data, can use one or more of the following technologies, for example: Bluetooth, IR, LAN, WLAN, loT, mobile radio, e.g. 2G, 3G, 4G, 5G, GSM and/or LTE, LoRaWAN, and either directly or via intermediate stations such as smart hubs, repeaters, routers, switches, mobile hotspots, data gates, access points, and/or the Internet.
- Bluetooth IR, IR, LAN, WLAN, loT
- mobile radio e.g. 2G, 3G, 4G, 5G, GSM and/or LTE, LoRaWAN
- intermediate stations such as smart hubs, repeaters, routers, switches, mobile hotspots, data gates, access points, and/or the Internet.
- one or more pieces of information can be stored, from: information regarding the article, the serial number of the product and/or a permitted use, such as an expiry date after which the product may no longer be used, or a permitted number of uses, the information Written into the data construct when the product is manufactured or recorded when the use is recorded and then stored in the data record, or information relating to the dates of manufacture, storage, shipping and sale of the product.
- the tool forms the product 220 .
- the tool can, for example, be in the form of a surgical milling cutter intended for processing bones.
- the tool is provided with a QR code as an ID element, which includes at least an article number and a serial number.
- the tool can also have an RFID tag, an NFC tag or barcodes as an ID element.
- the ID element contains at least one serial number, which can be read electronically in an embodiment as an RFID or NFC tag and optically in an embodiment as a QR code or bar code.
- the handpiece includes the detection unit 201.
- the detection unit is designed as an optical reading unit that is provided for reading the QR code on the tool.
- the detection unit can also be in the form of an RFID reader or an NFC reader.
- the detection unit 201 is arranged in the handpiece. If the tool is inserted into the handpiece or connected to the handpiece, the detection unit 201 records the ID element and determines at least the serial number.
- the control unit includes the data processing unit 202, the memory unit 203 and the transmission unit 204. The handpiece is connected to the control unit in an operational state. If the tool is coupled to the handpiece, the detection unit 201 reads the ID element.
- the data processing unit 202 creates the usage data 210 using the serial number determined from the ID element and possibly other data recorded during operation.
- the transmission unit 204 is intended to connect the control device to the computer 240 .
- the computer 240 is preferably designed as a local server, for example as an intranet server for a hospital.
- the system 300 includes access points that are not shown in detail.
- the transmission unit 204 is provided for a wireless connection to the access points.
- the computer 240 and the access points can be connected to the computer 240 by wire, for example by means of a LAN connection, or wirelessly.
- the server includes the determination unit 320.
- the determination as to whether use of the product 200 is permitted or not takes place centrally on the server 200. If the determination unit 320 recognizes non-permitted use, the computer 240 sends corresponding information to the device 200.
- device 200 In the configuration as a control unit, device 200 has a display on which the information can be shown. Various functions for processing the information about unauthorized use can be stored in the device. If the determination unit 320 recognizes, for example, that the tool is a single-use tool that has already been used, the control unit displays the relevant information allow emergency operation.
- An exemplary configuration of the device 200 from FIG. 6 is a medical pump, for example an infusion pump.
- the usage data 210 which is stored in the data record 230 in a form that cannot be subsequently modified, can be information about service checks that have been carried out, for example.
- a data set 230 is created, which contains usage data 210 about the commissioning. If the determination unit 320 recognizes that the data record 230 with usage data 210 about the commissioning belongs to a device in which the last data record 230 with usage data 210 for a service check carried out has expired, the device 220 embodied as a medical pump can emit a signal, that the service check has expired.
- FIG. 8 An exemplary configuration for FIG. 8 is, for example, the configuration of the product 220 as an infusion bag.
- the device 200 can be embodied as a holder for the infusion bag.
- the device 200 it is also conceivable for the device 200 to be in the form of a hand-held scanner or the like, such as is used, for example, when goods are received or dispatched in a warehouse.
- the device 200 is intended to record at least one identification number of the product 220, such as a batch number.
- different methods can be used.
- the device can be provided for optical recognition of a barcode or a QR code.
- the device can be provided for reading an NFC or RFID tag.
- the device 220 is connected to the computer 240 . If the device 220 is a hand-held scanner, the processor 240 can be a computer, for example of a warehouse management system. If the device 220 is a holder, the computer 240 can be part of a patient monitoring system, for example.
- the device 310 implemented separately from the computer 240 is advantageous in order to ensure that the user is informed that the product 220 has been blocked.
- the device 310 can be embodied, for example, as an LED, which signals the blocking.
- An alternative tracking system can be configured as follows (not shown).
- the medical tracking system is used to securely track and document the history of a disposable medical device designed in the form of a scalpel.
- a QR code with an encoded, unique serial number is engraved on the outside of the scalpel, which a reading device in the form of a camera can detect and read.
- a digital tracking book with a directory of information blocks on the at least one disposable medical device is stored decentrally as a blockchain in the computers, with the serial number, the article number being stored in a first block and a control number of the medical product are stored and these data are self-contained via a first hash or hash value.
- the first hash is used to control the stored data and, so to speak, closes the data record/block. If the data of the first block were changed later, the first hash would also change.
- a use transaction is sent to the computer network when the first use is recorded and a use block with a To create a time stamp, the usage transaction and a usage hash (for a new completion of the block) and to make them available to the computer network in order to add this usage block to the blockchain in the computers of the computer network. Should now If, contrary to the specification, the disposable medical device is used again, it would first have to be read in again with the help of the reader.
- a tracking module is adapted to read the blockchain for the at least one disposable medical product and to detect an existing use block (with corresponding use transaction) in the blockchain. Instead of adding a second usage block, the tracking module is designed to issue a visual alarm via a surgical monitor and also generate an audible signal. In this way, re-use can be safely avoided and the user informed of the illegal two-way use.
- Usage data (210) of a product (220) the method (100) comprising: detecting (110) usage of the product (220);
- spekt method (100) Transmission (150) of the data set (230) to at least one computer (240), each comprising a memory (250); and Storing (160) the data set (230) from the at least one computer (240) in the respective memory (250).
- spekt method (100) according to aspect 3 wherein the data record (230) of the product (220) after the transfer (150) of the data record (230) in the at least one computer (240) in an existing data construct (280), which is also not is subsequently modifiable, is inserted.
- spekt Method (100) according to aspect 4 wherein the data construct (280) uses blockchain technology.
- spekt method (100) according to any one of aspects 1 to 5, wherein the blockchain technology is embodied in one of the following forms:
- Blockchain that is only stored in memories (250) of non-public computers (240) of a network (260);
- Blockchain that is stored in memories (250) of non-public computers (240) of at least two networks (260, 270); or
- spekt Method (100) according to one of aspects 2 to 6, wherein one or more of the steps of transmitting (140) the usage data and transmitting (150) the data set (230) uses one or more of the following technologies, for example: Bluetooth, IR, LAN, WLAN, loT, mobile communications, e.g. 2G, 3G, 4G, 5G, GSM and/or LTE, LoRaWAN, and either directly or via intermediate stations such as smart hubs, repeaters, routers, switches, mobile hotspots, data gates, access points, and /or be transmitted over the Internet.
- spekt Method (100) according to one of aspects 1 to 7, wherein one or more pieces of information are additionally stored in the data set (230) and/or the data construct (280), from:
- spekt Method (100) according to any one of aspects 1 to 8, wherein the product (220) is a medical device.
- Aspect A data processing system comprising a processor adapted to perform the method of any one of aspects 1 to 11.
- Aspect A computer program product comprising instructions which, when the program is executed by a computer, cause the computer to perform the method of any one of aspects 1 to 11.
- Aspect A computer-readable storage medium comprising instructions which, when executed by a computer, cause it to perform the method of any one of aspects 1 to 11. .
- Product (220) characterized by: a detection unit (201) which is set up to detect use of the product (220); a data processing unit (202) which is set up to create the usage data (210) relating to the recorded usage of the product (220); and a storage unit (203) which is set up to store the usage data (210) in a data record (230) in a form which cannot be modified subsequently, the data record (230) using blockchain technology. .
- Aspect System (300) comprising a device (200) according to aspect 15, and at least one computer (240), each comprising a memory (250), wherein the device (200) further comprises: a transmission unit (204) set up for this purpose is to transmit the usage data (210) to the at least one computer (240); and wherein the respective memories (250) are set up to store the usage data (210) in a data record (230) in a form that cannot be modified later. .
- Aspect System (300) comprising a device (200) according to aspect 15, and at least one computer (240), each comprising a memory (250), wherein the device (200) is embodied as part of the product (220), and further comprises: a transmission unit (204) which is set up to transmit the data set (230) to the at least one computer (240); and wherein the respective memories (250) are configured to store the data set (230), the data construct (280) using blockchain technology.
- Blockchain that is only stored in memories (250) of non-public computers (240) of a network
- Blockchain that is stored in memories (250) of non-public computers (240) of at least two networks;
- Aspect System (300) according to one of aspects 17 to 19, wherein the transmission unit (204) uses one or more of the following technologies: Bluetooth, IR, LAN, WLAN, loT, mobile communications, e.g. 2G, 3G, 4G, 5G, GSM and/or LTE, LoRaWAN, and either directly or via intermediate stations such as smart hubs, repeaters, routers, switches, mobile hotspots, data gates, access points , and/or Internet transfers data. .
- Aspect Apparatus (200) or system (300) according to any one of aspects 15 to
- a determination unit (320) which is set up to determine, in response to a request for further use of the product (220), by evaluating the data stored in the data record (230) and/or the data construct (280) that the further use constitutes unauthorized use.
- Aspect Device (200) or system (300) according to aspect 22, wherein the device (200) or system (300) is further configured to allow further use in the data set (230) and/or the data construct (280). store if unauthorized use has been determined by the determination unit (320); wherein the device (200) or system (300) further comprises a signal device (330) which is set up to emit an optical and/or acoustic signal if unauthorized use has been determined by the determination unit (320); wherein the transmission unit (204) is further configured to transmit data causing a signal or triggering a notification at an external device (310) if unauthorized use has been determined by the determination unit (320); wherein the device (200) or system (300) further comprises an output device (340) arranged to issue a request, and an enabling device (350) arranged to, in response to receiving a user confirmation as responding to the request to authorize the product for the requested further use if unauthorized use has been determined by the determination unit (320); and/or wherein the device (200) or system
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Surgery (AREA)
- Life Sciences & Earth Sciences (AREA)
- Physics & Mathematics (AREA)
- Human Resources & Organizations (AREA)
- Public Health (AREA)
- Medical Informatics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Molecular Biology (AREA)
- Bioethics (AREA)
- Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Pathology (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Biomedical Technology (AREA)
- Heart & Thoracic Surgery (AREA)
- General Engineering & Computer Science (AREA)
- Animal Behavior & Ethology (AREA)
- Veterinary Medicine (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Epidemiology (AREA)
- Primary Health Care (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Game Theory and Decision Science (AREA)
- Electromagnetism (AREA)
- Computer Networks & Wireless Communication (AREA)
Abstract
La présente invention concerne un procédé de suivi mis en œuvre par ordinateur, un appareil et un système de suivi pour stocker des données d'utilisation d'un produit médical, comprenant la détection de l'utilisation du produit médical, la création des données d'utilisation qui se rapportent à l'utilisation détectée du produit médical, et le stockage des données d'utilisation dans un enregistrement de données sous une forme qui ne peut pas être modifiée rétrospectivement, spécifiquement dans une chaîne de blocs. De plus, la présente invention concerne un système de suivi, un appareil et un support de stockage lisible par ordinateur selon les revendications indépendantes supplémentaires.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP20202940.1A EP3989137A1 (fr) | 2020-10-21 | 2020-10-21 | Applications de sécurité à usage unique des produits su au moyen de dlt /chaîne de blocs |
PCT/EP2021/079136 WO2022084414A1 (fr) | 2020-10-21 | 2021-10-20 | Procédé, appareil et système permettant de stocker des données d'utilisation et de suivre un produit médical |
Publications (1)
Publication Number | Publication Date |
---|---|
EP4232977A1 true EP4232977A1 (fr) | 2023-08-30 |
Family
ID=73005340
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20202940.1A Withdrawn EP3989137A1 (fr) | 2020-10-21 | 2020-10-21 | Applications de sécurité à usage unique des produits su au moyen de dlt /chaîne de blocs |
EP21794864.5A Pending EP4232977A1 (fr) | 2020-10-21 | 2021-10-20 | Procédé, appareil et système permettant de stocker des données d'utilisation et de suivre un produit médical |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20202940.1A Withdrawn EP3989137A1 (fr) | 2020-10-21 | 2020-10-21 | Applications de sécurité à usage unique des produits su au moyen de dlt /chaîne de blocs |
Country Status (5)
Country | Link |
---|---|
US (1) | US20240021278A1 (fr) |
EP (2) | EP3989137A1 (fr) |
JP (1) | JP2023547848A (fr) |
CN (1) | CN116419729A (fr) |
WO (1) | WO2022084414A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116033491B (zh) * | 2023-03-29 | 2023-07-04 | 至控科技(湖州)创新研究院有限公司 | 实时定位系统中的数据压缩缓存上传方法和装置 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7630791B2 (en) * | 2005-12-09 | 2009-12-08 | CareFusion 303 Inc. | System and method for storing items and tracking item usage |
US20190206569A1 (en) * | 2017-12-28 | 2019-07-04 | Ethicon Llc | Method of cloud based data analytics for use with the hub |
PL3807828T3 (pl) * | 2018-06-15 | 2023-03-06 | Circularise Bv | Struktury rozproszonych baz danych dla anonimowej wymiany informacji |
US20200042925A1 (en) * | 2018-07-31 | 2020-02-06 | Digiverv Inc | Methods and systems for measuring and improving real-time user satisfaction in hospitality industry |
DE102018121682A1 (de) | 2018-09-05 | 2020-03-05 | Aesculap Ag | Verpackung für ein medizintechnisches Werkzeug mit automatischer Werkzeugerkennung und Verfahren zum Verpacken mit einer solchen Verpackung |
DE102018125884A1 (de) | 2018-10-18 | 2020-04-23 | Aesculap Ag | Werkzeug mit einer im Schaftbereich angeordneten Arbeitsendenbestimmungsvorrichtung |
DE102018126969A1 (de) | 2018-10-29 | 2020-04-30 | Aesculap Ag | Haltevorrichtung und Produktüberwachungssystem |
US20200143085A1 (en) * | 2018-11-05 | 2020-05-07 | Jason Ryan Cooner | System, business and technical methods, and article of manufacture for design, implementation, and usage of internet of things devices and infrastructure, social media architecture and general computing device security advancements |
DE102018133503A1 (de) | 2018-12-21 | 2020-06-25 | Aesculap Ag | Spülwerkzeug für ein Handstück eines chirurgischen Instruments |
EP3699923A1 (fr) | 2019-02-20 | 2020-08-26 | Fresenius Medical Care Deutschland GmbH | Mécanisme de sécurité pour le fonctionnement d'appareils médicaux à l'aide d'objets de consommation dans un environnement d'une dialyse |
CN110197707B (zh) * | 2019-05-23 | 2021-07-30 | 泰康保险集团股份有限公司 | 基于区块链的病历信息处理方法、装置、介质及电子设备 |
-
2020
- 2020-10-21 EP EP20202940.1A patent/EP3989137A1/fr not_active Withdrawn
-
2021
- 2021-10-20 US US18/032,762 patent/US20240021278A1/en active Pending
- 2021-10-20 WO PCT/EP2021/079136 patent/WO2022084414A1/fr active Application Filing
- 2021-10-20 CN CN202180070714.8A patent/CN116419729A/zh active Pending
- 2021-10-20 EP EP21794864.5A patent/EP4232977A1/fr active Pending
- 2021-10-20 JP JP2023524455A patent/JP2023547848A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
WO2022084414A1 (fr) | 2022-04-28 |
US20240021278A1 (en) | 2024-01-18 |
EP3989137A1 (fr) | 2022-04-27 |
CN116419729A (zh) | 2023-07-11 |
JP2023547848A (ja) | 2023-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE19602136C2 (de) | Dokumenten-Verarbeitungssystem und Verfahren zum Verarbeiten eines Dokuments | |
US20050062603A1 (en) | Secure, networked and wireless access, storage and retrival system and method utilizing tags and modular nodes | |
DE202023102181U1 (de) | Blockchain-basiertes System zur Fälschungssicherheit und Rückverfolgbarkeit | |
CN101021934A (zh) | 一种医疗器械全程追溯监管的方法 | |
DE202020103841U1 (de) | Krankheitserregerbehandlungsverwaltungssystem | |
EP4232977A1 (fr) | Procédé, appareil et système permettant de stocker des données d'utilisation et de suivre un produit médical | |
EP1184801B1 (fr) | Système de tele-traitement médical | |
WO2002056234A2 (fr) | Systeme de detection et de memorisation de donnees specifiques de personnes et element a memoire correspondant, et procede permettant de secourir et/ou de fournir des soins medicaux a des etres vivants en cas d'urgence | |
CN110728530A (zh) | 基于区块链的溯源智能机器人的监控告警方法 | |
US20140172446A1 (en) | System and method for the traceability of a surgical instrumentation system | |
DE202021102756U1 (de) | Elektronisches Veranstaltungsticket mit einem Gesundheitsindikator und Ticketshop zum Erzeugen eines elektronischen Veranstaltungstickets | |
WO2020169638A1 (fr) | Unité de consommation pourvue d'élément de sécurité, élément de sécurité et procédé de sécurisation côté fabricant d'une consommation autorisée | |
DE102018115348B4 (de) | Fälschungssicherung und Abgabekontrolle von Verbrauchsgütern | |
EP3699923A1 (fr) | Mécanisme de sécurité pour le fonctionnement d'appareils médicaux à l'aide d'objets de consommation dans un environnement d'une dialyse | |
BRPI0718158A2 (pt) | Método e sistema para rastreabilidade e rastreamento integral de uma pluralidade de produtos sendo entrados em um ciclo de produção e/ou distribuição até sua saída do mesmo ciclo. | |
CN1643535A (zh) | 安全传送数据载体上患者数据用的方法 | |
DE102008011882A1 (de) | Vorrichtung und Verfahren zum kontrollierten Datenaustausch zwischen mindestens zwei Datenträgern | |
WO2009071525A1 (fr) | Dispositif et procédé pour identifier un objet | |
EP3671379A1 (fr) | Système d'authentification et procédé d'authentification permettant de mettre en uvre un processus de travail sur un objet | |
EP3723339B1 (fr) | Libération sécurisée d'une fonction protégée | |
EP2697758A1 (fr) | Procédé de gestion d'informations sur des produits | |
DE102022115865A1 (de) | Vorrichtung und Verfahren zur interaktiven Freigabe eines Betriebsmodus | |
AT526983A1 (de) | Verfahren zur Verifizierung eines elektronischen Etiketts und System hierzu | |
EP3699922A1 (fr) | Documentation protégée contre la manipulation d'une utilisation d'objets de consommation lors du fonctionnement d'un appareil de dialyse | |
EP1235179B1 (fr) | Système de collection et de stockage de données personnelles et élément de mémoire associé et méthode de sauvetage et de traitement médical d'un être vivant en urgence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20230517 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) |