WO2008120128A2 - System and method for pill communication and control - Google Patents

System and method for pill communication and control Download PDF

Info

Publication number
WO2008120128A2
WO2008120128A2 PCT/IB2008/051066 IB2008051066W WO2008120128A2 WO 2008120128 A2 WO2008120128 A2 WO 2008120128A2 IB 2008051066 W IB2008051066 W IB 2008051066W WO 2008120128 A2 WO2008120128 A2 WO 2008120128A2
Authority
WO
WIPO (PCT)
Prior art keywords
pill
information
medicine
dosage
released
Prior art date
Application number
PCT/IB2008/051066
Other languages
French (fr)
Other versions
WO2008120128A3 (en
Inventor
Karen Irene Trovato
Pim Theo Tuyls
Jeff Shimizu
Helen Routh
Johan Frederik Dijksman
Anke Pierik
Judith Margreet Rensen
Hans Zou
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Publication of WO2008120128A2 publication Critical patent/WO2008120128A2/en
Publication of WO2008120128A3 publication Critical patent/WO2008120128A3/en

Links

Classifications

    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61MDEVICES FOR INTRODUCING MEDIA INTO, OR ONTO, THE BODY; DEVICES FOR TRANSDUCING BODY MEDIA OR FOR TAKING MEDIA FROM THE BODY; DEVICES FOR PRODUCING OR ENDING SLEEP OR STUPOR
    • A61M31/00Devices for introducing or retaining media, e.g. remedies, in cavities of the body
    • A61M31/002Devices for releasing a drug at a continuous and controlled rate for a prolonged period of time
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B1/00Instruments for performing medical examinations of the interior of cavities or tubes of the body by visual or photographical inspection, e.g. endoscopes; Illuminating arrangements therefor
    • A61B1/00002Operational features of endoscopes
    • A61B1/00011Operational features of endoscopes characterised by signal transmission
    • A61B1/00016Operational features of endoscopes characterised by signal transmission using wireless means
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B1/00Instruments for performing medical examinations of the interior of cavities or tubes of the body by visual or photographical inspection, e.g. endoscopes; Illuminating arrangements therefor
    • A61B1/00002Operational features of endoscopes
    • A61B1/00059Operational features of endoscopes provided with identification means for the endoscope
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B1/00Instruments for performing medical examinations of the interior of cavities or tubes of the body by visual or photographical inspection, e.g. endoscopes; Illuminating arrangements therefor
    • A61B1/04Instruments for performing medical examinations of the interior of cavities or tubes of the body by visual or photographical inspection, e.g. endoscopes; Illuminating arrangements therefor combined with photographic or television appliances
    • A61B1/041Capsule endoscopes for imaging
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/0002Remote monitoring of patients using telemetry, e.g. transmission of vital signals via a communication network
    • A61B5/0031Implanted circuitry
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H20/00ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
    • G16H20/10ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B2562/00Details of sensors; Constructional details of sensor housings or probes; Accessories for sensors
    • A61B2562/08Sensors provided with means for identification, e.g. barcodes or memory chips
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/07Endoradiosondes
    • A61B5/073Intestinal transmitters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities

Definitions

  • the present invention relates in general to the field of health and medicine, and in particular to systems and methods for pill communication and control.
  • Pills or capsules that are made up of, or contain selected dosages of medication to be taken orally by a subject, are common.
  • the medication is packaged or treated in such a way that is released into the subject's system in a time-released manner. There has hitherto been little positive control over the release of medication to a subject after a pill has been ingested.
  • Encryption algorithms are one commonly used technique for providing such security, and MAC (Message Authentication Code) algorithms are known for authenticating messages. These algorithms depend on secret keys. The algorithms are generally public and only the keys are considered to be secret. The security of cryptographic algorithms depends, therefore, on the secrecy of the keys.
  • PUFs Physical Uncloneable Functions or PUFs have been proposed as a cost- effective way to produce uncloneable tokens for identification.
  • PUFs for creating tamper resistant bitstrings is disclosed in international patent application WO 2004/105125 A2, published December 2, 2004, and entitled "Semiconductor Device, Method of Authenticating and System" which designates the U.S. and is incorporated herein by reference.
  • a system is disclosed herein which includes a remote device capable of sending commands to a pill to perform one or more desired functions.
  • the desired function which will be referred to hereinafter as an active function, includes, but is not limited to:
  • treatment media such as for example a medication, radiation for radiation treatment or other purpose, or other treatment media, whether currently known or to be discovered,
  • dosage profile i.e., dosage information about the medicine to be released
  • timing profile i.e., timing information about when the medicine is to be released such as a specific time or time period, etc
  • the active function is of course not limited to these examples and includes essentially any function that can be performed in a subject's body, whether it is currently known or unknown, including all types of monitoring, diagnosis, analysis, and treatment.
  • reporting or transmitting compliance information such as actual dosage released, timing information of dosage released, or comparison data and results allows an authorized health practitioner to receive and review such compliance information to verify that the subject has complied or is compliance with his or her medication regimen and has indeed taken his prescribed medicine. Verifying that a medication has been taken is especially useful in an emergency (e.g., when a patient arrives unconscious or is unable to speak) and solves a compliance problem that is sometimes experienced with the elderly and with children.
  • a memory for storing information, such as for example, the above-identified information (dosage profile, timing profile, actual dosage of medicine released, timing information of actual dosage released, comparison data thereof, information on a patient's body, information about the pill, etc).
  • the pill is capable of creating a random, tamper resistant bitstring.
  • bitstring is defined as a set of bits that include information.
  • a bitstring can be created from a PUF (Physical Uncloneable Function) in a CMOS for example, or in programmable memory such as EPROM or EEPROM.
  • PUF Physical Uncloneable Function
  • CMOS complementary metal-oxide-semiconductor
  • EEPROM Electrical Uncloneable Function
  • the created random, tamper resistant bitstring is split arbitrarily into two parts.
  • the first part is a unique identification (pill ID)
  • the second part is secret information, for example a private key.
  • the pill ID uniquely identifies the pill.
  • the secret information is used to encrypt, or decrypt communication between the pill and other devices as well as to authenticate other devices. If more bits are required than the number available from the response of a single PUF, then more than one PUF can be used.
  • the unique identification ensures that messages intended for one pill are not accidentally read and followed by another pill that for example happens to be in the same area.
  • the secret information ensures that only authorized parties, e.g. the subject's doctor or an ER (Emergency Room) attendant, can control the pill or can read information from the pill. That is, the requirement of this secret information prevents pill communication from being open to the public and in particular, unauthorized parties. Hence, the requirement of secret information prevents the pill from being controlled by any unauthorized party for any unauthorized purpose.
  • the secret information further protects patient privacy and safety by ensuring that non-approved communication equipment cannot inquire about medications taken by a particular patient, and provides an additional layer of protection against intentional or accidental control by an unauthorized communication source.
  • PUF is advantageously implemented using a standard CMOS (Complementary Metal Oxide Semiconductor) and requires only two more layers (what do you mean here?), for example, on any of the already present ICs (Integrated Circuits) used in the pill.
  • CMOS Complementary Metal Oxide Semiconductor
  • Fig. 1A is a schematic illustration of a system in which an exemplary pill transmits information to a first remote device
  • Fig. 1 B is a schematic illustration of a system in which an exemplary pill transmits information to a relay means for relaying the information to a first remote device
  • Fig. 1 C is a schematic illustration of a system in which an exemplary pill transmits information to a second remote device
  • Fig. 2 is a schematic illustration of an exemplary pill having means for dispensing medicine
  • Fig. 3 is a schematic illustration of an exemplary pill having means for secure communication and usable in the embodiments shown in Figs. 1A-2
  • Fig. 4 is a schematic sectional view of CMOS (Complementary Metal
  • Oxide Semiconductor layers that implement PUF to form or create a tamper resisitant bitstring that is useable with the exemplary pill according to Figs. 1A-
  • FIG. 5 is a schematic illustration of the tamper resistant bitstring formed by the CMOS layers of Fig. 4.
  • FIG. 1A illustrates a system for facilitating transmission of information from a pill 10 to a remote device 62.
  • Pill 10 includes a communicator 20 for at least one of transmitting or receiving (or both) and a controller 16 for controlling an active function of the pill 10.
  • the active function constitutes at least transmission of information.
  • the controller 16 controls transmission of information by instructing the communicator 20 to transmit information.
  • the active function may constitute other functions like medicine release, as described in more detail in Fig. 2.
  • Pill 10 can have multiple active functions as well, such as for example dispensing some dosage of medication, recording dosage dispensed, and transmitting a compliance report of dosage dispensed.
  • An antenna 30 located on or in the pill 10, is connected to the communicator 20 for facilitating communication.
  • a battery powers the pill 10 and its components.
  • pill 10 is preprogrammed to transmit information at a particular time, or in response to certain events, or under certain circumstances.
  • controller 16 instructs the communicator 20 to transmit information to the remote device 62.
  • Controller 16 may obtain the information from memory and provide the information directly to communicator 20 for transmission to remote device 62.
  • the remote device 62 sends a control signal (e.g., via a message containing the command 'transmit information to remote device 62') to the pill 10 requesting transmission of information to the remote device 62.
  • Communicator 20 receives the control signal from remote device 62.
  • Communicator 20 sends the control signal to the controller 16.
  • Controller 16 reads the control signal and instructs the communicator 20 to transmit information to the remote device 62, which is accessible by a doctor, pharmacist, clinical researcher (or trial manager), home care management client, or home services management agency, or other caregiver, etc. As a part of this process, controller 16 may obtain data from memory and provide the information directly to the communicator 20.
  • Communicator 20 is programmed to initiate communication with other devices, either intermittently or constantly, to verify whether the other device is available and ready to receive information from the pill 10.
  • the pill 10 is able to substantially conserve energy and power since the pill is not constantly “on” and looking for devices to communicate with, which is especially useful if the other devices are not available, either temporarily or for a long period of time. This is also especially useful for such a small pill.
  • the communicator 20 initiates communication with the remote device 62, either intermittently or constantly, to verify whether the remote device 62 is available and ready to receive information. If the remote device 62 responds and verifies that it is available and ready to receive information, the information is transmitted from the pill 10 (via communicator 20) to the remote device 62.
  • Information that is transmitted from the pill 10 to the remote device 62 includes any information about an active function, such as for example, the information about medicine released by the medicine reservoir 14 (see Fig. 2) (type of medicine released, time of release, and amount and dosage of medicine released, etc), information about radiation released (type of radiation, time of release, duration of exposure, amount of exposure, etc), information about fluid or tissue sample taken (amount taken, time taken, duration of time taken, etc), information about the pill (e.g., orientation), information about images taken by a camera (the images, the time the images were taken, the location that the images were taken, etc), information about the patient from sensors (e.g., core body temperature, pH, or the location or position inside the body).
  • an active function such as for example, the information about medicine released by the medicine reservoir 14 (see Fig. 2) (type of medicine released, time of release, and amount and dosage of medicine released, etc), information about radiation released (type of radiation, time of release, duration of exposure, amount of exposure, etc), information about fluid or tissue sample taken (a
  • the pill 10 includes a processor 26 capable of comparing actual active function information (e.g., the time of pill ingestion, the dosage of a particular medicine actually released by controller 16) with desired active function information (the required medicine dosage to be taken) to generate a compliance report for transmission to the remote device 62. Comparison of actual data versus prescription to create a compliance report may also occur at the remote device 62.
  • the information can be made available to for example, a doctor, pharmacist, clinical researcher (or trial manager), home care management client, home services management agency, or other caregiver, etc, by way of the transmission to the remote device 62.
  • Fig. 1 B shows an alternative embodiment to Fig. 1A where the active function is transmission of information and the system further includes relay means in the form of for example, a remote unit 65 for relaying information from the pill 10 to the remote device 62.
  • the remote unit 65 is optionally wearable by the patient or is otherwise located or positioned near the patient so that the communication range from the pill 10 to the remote unit 65 is adequate.
  • the remote unit 65 is less constrained to having certain power or frequency requirements. Thus it may communicate with remote device 62 using a different frequency band and protocol as compared to the communication established to the pill 10.
  • the remote unit 65 further contains memory for storing information.
  • pill 10 is preprogrammed to transmit information at a particular time, or in response to certain events, or under certain circumstances.
  • controller 16 instructs the communicator 20 to transmit information to the remote unit 65, which relays the information to remote device 62, in a manner described in more detail below.
  • the remote device 62 transmits a control signal
  • the remote device 62 transmits this control signal to the pill 10 through the remote unit 65, or alternatively, directly to the pill 10.
  • communicator 20 receives the control signal from remote device 62.
  • Communicator 20 sends the control signal to the controller 16.
  • Controller 16 reads the control signal and instructs the communicator 20 to transmit information to the remote unit 65 for relay to the remote device 62.
  • the transmission of information from communicator 20 to remote device 62 through remote unit 65 is described in more detail below.
  • Communicator 20 is programmed to initiate communication with remote unit 65, either intermittently or constantly, to verify whether the remote unit 65 is available and ready to receive information from the pill 10. If remote unit 65 confirms it is available and ready, the communicator 20 transmits the information to remote unit 65. If remote unit 65 is not available, the pill 10 will store data internally. The amount of data storage on the pill 10 is typically limited owing to the size constraints of the pill. Thus the pill 10 will continue to query for the remote unit 65 intermittently or continuously. When communication can be established with remote unit 65, the communicator 20 transmits the stored information. The memory on the pill may then be freed for subsequent data. The transmitted information is stored on remote unit 65 that has a larger memory capacity than the pill 10.
  • the remote unit 65 will intermittently or continuously initiate communication with remote device 62.
  • the information stored on remote unit 65 will be sent to remote device 62, which is accessible to for example, a doctor, pharmacist, clinical researcher (or trial manager), home care management client, home services management agency, or other caregiver, etc.
  • the remote unit 65 will have enough memory to store data from the pill covering an extended period. It may then only need to establish communication with remote device 62 infrequently.
  • the remote device may be placed in a charging and docking station at the end of the day. The docking station might then serve as the communication port between the remote unit 65 and the remote device 62.
  • Fig. 1 B intermittent verification saves energy and power since the remote unit 65 is not constantly looking for the remote device 62. This is particularly useful if the remote device 62 is not available, either temporarily or for a long period of time. This is also particularly useful in view of the small size of the remote unit 65.
  • Remote unit 65 can have varying degrees of intelligence.
  • one form of remote unit 65 may act as a repeater without decrypting the data, but may relay the information on a slightly shifted frequency, exactly as it hears it from the local environment. This is possible with an RF repeater (receiving RF and transmitting RF), such as is performed by Amateur Radio systems. If bits can be accurately received and recognized in bytes, data received by RF can be re-transmited (relayed) via TCP/IP (i.e. the net), to remote device 62 located on the network which is identified as a receiver of such relays.
  • TCP/IP i.e. the net
  • another form of remote unit 65 can contain a PUF, and therefore be capable of decrypting or encrypting messages as an authorized device (see below for explanation for enrolment; Fig. 3).
  • the remote unit 65 can decrypt messages and take the burden of decrypting messages from the remote unit 62.
  • a plurality of remote units 65 functioning at low power, can be used to perform potentially numerous decryptions.
  • Each remote unit 65 can consolidate a plurality of received messages by decrypting and storing all of the received messages, and consolidating all of the stored messages via encryption into one encrypted pattern which is then relayed by RF, network (as described above for example) or other means.
  • This consolidation of messages can simplify the processing at the remote device 62 or other remote device.
  • 1000 messages from pills may be received by ten remote units 65 (100 messages per remote unit), and each remote unit 65 can then decrypt its share of 100 received messages, and then consolidate all 100 received messages into a single encrypted pattern, which can then be relayed to remote device 62 for example.
  • Information that is relayed by the remote unit 65 to the remote device 62 includes any information about an active function such as described above in connection with the system in Fig. 1A.
  • Messages relayed through the remote unit 65 and forwarded to either the pill, or another relay system or a remote device 62 preferably contain 'envelope information' in addition to the message. For example: 'message forwarded from pill number X. Message says that it dispensed Y ccs of medication in the past hour'. Otherwise the source of the information is lost as it is forwarded.
  • Fig. 1 C shows an alternative embodiment to Fig. 1A which further includes a report terminal 67 for receiving information from a pill 10.
  • pill 10 is preprogrammed to transmit information at a particular time, or in response to certain events, or under certain circumstances.
  • controller 16 instructs the communicator 20 to transmit information to the report terminal 67.
  • remote device 62 transmits a control signal (e.g., via a message containing the command 'transmit information to the report terminal 67') to the pill 10 requesting transmission of information to the report terminal 67, which is accessible by a doctor, pharmacist, clinical researcher (or trial manager), home care management client, or home services management agency, or other caregiver, etc.
  • a control signal e.g., via a message containing the command 'transmit information to the report terminal 67'
  • remote device 62 transmits a control signal (e.g., via a message containing the command 'transmit information to the report terminal 67') to the pill 10 requesting transmission of information to the report terminal 67, which is accessible by a doctor, pharmacist, clinical researcher (or trial manager), home care management client, or home services management agency, or other caregiver, etc.
  • Communicator 20 receives the control signal from remote device 62.
  • Communicator 20 transmits the control signal to the controller 16. Controller 16 reads the control signal and instructs the communicator 20 to transmit information to the report terminal 67. Communicator 20 initiates communication with the report terminal 67, either intermittently or constantly, to verify whether the report terminal 67 is available and ready to receive information. If the report terminal 67 responds and verifies that it is available and ready to receive information, the information is transmitted from the pill 10 (via communicator 20) to the report terminal 67.
  • a remote unit 65 may serve as a relay between the pill 10 and the report terminal 67 as described in conjunction with the embodiment shown in Fig. 1 B.
  • Information that is transmitted to the report terminal 67 includes any information about an active function, such as described above in connection with the system in Fig. 1A.
  • Still another embodiment is where the remote device 62 is connected to a network, such that it receives messages via RF, decrypts the messages, and then securely transmits them to another computer on a network, such as by TCP/IP.
  • messages are received via network connection, and then transmitted to the pill (or other devices) via RF.
  • Network connections can be wired or wireless. If they are wireless, then presumably the frequency and protocol is sufficiently different from the PUF pill or PUF device so messages do not collide.
  • a Pill or PUF device may also communicate using the same protocols as wireless LAN systems.
  • Fig. 2 shows an exemplary embodiment of a pill 10, having an ingestible shell 12, a medicine reservoir 14 in the shell and a processor 26 in the shell.
  • the processor 26 has, or is in connection or communication with, a controller 16 for controlling an active function of the arrangement.
  • the active function includes releasing medicine from the medicine reservoir 14 to the outside of the shell 12, which is controlled by controller 16.
  • the controller 16 communicates with a gate 28 and a pressure mechanism 32, which is structurally much like the plunger of a syringe.
  • the controller 16 opens the gate 28 and causes the pressure mechanism 32 to release a selected amount of medicine outside of the shell 12.
  • the pill 10 further includes a memory 18 for storing information, such as for example, dosage profile, timing profile, actual dosage of medicine released by the medicine reservoir 14, timing information of actual dosage released, comparison data thereof, information on a patient's body, or about other active functions performed by the pill 10.
  • the pill 10 optionally includes timing circuitry 24 that is part of, or separate from, the processor 26, for controlling the tinning of the opening of the gate 28 (e.g., at a selected time and/or for a selected period) for releasing a selected amount of medicine from reservoir 14 by the action of the syringe or pressure mechanism 32 at a selected time and/or for a selected period.
  • the timing circuitry 24 can be a real-time clock, either integrated with the processor, or provided separately, configured for facilitating timed events such as for example, releasing medicine at a pre- scheduled time or for a pre-scheduled period, recording information at a certain time, etc.
  • a communicator 20 such as a transceiver is also included in the shell 12 for at least receiving control signals for controlling the active function (e.g. to release medicine via controller 16), which cause controller 16 to control gate 28 and pressure mechanism 32 to facilitate release of medicine from the medicine reservoir 14 to the outside of the shell 12.
  • An antenna 30 located on or in the pill 10, is connected to the communicator 20 for facilitating such communication.
  • a battery is connected to the circuitry in pill 10 to power the pill components and active function.
  • the pill may be of the type that is surgically inserted or implanted at a selected location in the subject, e.g. subcutaneously or otherwise.
  • FIG. 2 shows one example of an active function for a pill 10.
  • an active function includes, but is not limited to:
  • a treatment media such as a medication, radiation, or other treatment media (achievable as shown in Fig. 2 for example)
  • a sample e.g. a fluid sample from a subject's alimentary tract (achievable by opening a port to an empty chamber, drawing fluid into a reservoir by mechanical displacement)
  • dosage profile i.e., dosage information about the medicine to be released
  • timing profile i.e., timing information about when the medicine is to be released such as a specific time or time period, etc
  • monitoring and/or storing data about properties of a patient's body e.g., temperature, pH, body location, etc
  • a patient's body e.g., temperature, pH, body location, etc
  • measuring or sensing the core body temperature e.g., temperature sensors
  • measuring or sensing pH in the body or specifically intestinal pH e.g., pH sensors
  • measuring or sensing light e.g., light from a photodetector for detecting fluorescence for example, or other light sensor
  • monitoring, determining, and/or storing data about the pill e.g., position or orientation of the pill achievable by for example an inclinometer
  • active functions can be implemented with the pill 10.
  • the active function can also include other functions that pills are capable of executing, e.g. as disclosed in others of the co-pending patent applications identified above and incorporated herein by reference. The only requirement is that some externally controllable treatment, sampling, sensing or other function be performed that occurs inside the subject.
  • Figs. 3-5 illustrate a preferably tamper resistant bitstring 22, formed or stored in a component 23 having a PUF for example, and accessible by the processor 26.
  • the tamper resistant bitstring 22 contains a large number of bits 40 (FIG. 5) that includes unique identification information 22a for uniquely identifying the pill, and secret information 22b for authenticating, encrypting, or decrypting communication via the communicator 20. That is, the secret information 22b is not communicated to other devices but is used by the pill to encrypt messages to other devices or decrypt messages from other devices.
  • the communicator 20 is capable of using the secret information 22b of the bitstring to authenticate messages (with commands) as authorized messages from other devices or to authenticate the other devices as authorized devices before an active function is performed by the pill. If a message is not properly authenticated, the command contained in the message will not be carried out.
  • the secret information 22b is preferably large enough so that the time required for transmitting "test" transmissions, such as those that might be used to try to break the 'secret', is much greater than the lifetime of the pill. [0067] Fig.
  • FIG. 3 further illustrates an enrolment processor 60 that is outside the shell, for reading the bitstring 22 and for storing the unique identification information 22a in a secure electronic master database that associates the identification information with a specific pill and its secret information 22b for future identification and secure control of the pill.
  • an enrolment processor 60 that is outside the shell, for reading the bitstring 22 and for storing the unique identification information 22a in a secure electronic master database that associates the identification information with a specific pill and its secret information 22b for future identification and secure control of the pill.
  • the bitstring may be formed, created, or read from a programmable, non-volatile memory, such as an EEPROM or EPROM, or from a CMOS or other component having a random but unalterable PUF.
  • EEPROM is not as tamper resistant as a component having a PUF.
  • Part of the programmable memory may be used to identify the pill or store information used for nominal actions.
  • the manufacturer or product name together with a PUF-dehved value can then also form a unique identification for the pill. Nominal actions are those that the pill would carry out without external control, such as releasing medicine at a particular dosage and timing based on dosage and timing profiles stored in the programmable memory.
  • Similar additional information can also be part of the programmable bitstring for pills having other or additional treatment, sensing, sampling or other active functions.
  • the identification, whether programmable, random-unalterable or a combination, is stored in the master database.
  • the remote device 62 which for example may be in the emergency room of a hospital, in a doctor's office or in another health care establishment, is empowered to generate an encrypted message with the secret information 22b and to transmit the encrypted message to the pill, as well as to decrypt messages with the secret information 22b.
  • Basic commands to be transmitted to the pill include for example 'activate', 'activate upon entering stomach', 'activate within 1 week', or 'pilM activate pill2 with secret S when pilM finishes'. Some transmissions may request the pill to read or transmit status information that is stored in the pill's memory.
  • the remote device 62 either contains or has access to a master database, or a subset of useful ID-Secret codes.
  • a subset may be used when known medications are delivered in a relatively constrained patient population, such as in a nursing home, hospital or intended charitable region (such as a third world country). In this last group, on-site activation can assure that the medication is delivered to the intended recipients.
  • the contents of various databases may vary depending on the expected use. In an emergency, a clearinghouse of all ID-Secret combinations must be accessible and based on a secure authorization level.
  • the secure authorization for communicating with various databases may include the use of public key encryption techniques, IP addresses and/or PUF technology to ensure that the remote device is authentic.
  • Case 1 The remote device 62 knows the identity of the pill within the person, such as if the pill was dispensed from packaging that also displayed the ID number, possibly by barcode to minimize transcription error. The ID is then entered by keypad for example, or barcode is read, into the remote device 62. The remote device 62 must acquire the secret information corresponding to the ID from the master database.
  • the master database may be stored within the remote device 62 or be accessed remotely.
  • Remote communication with the master database is for example, a secure client-server system, where the master database is stored either on-site (such as at a hospital) or remotely at a central repository (i.e., the remote device 62 is an authorized device with authorized access to the master database). If the remote device 62 is an unauthorized device, it will not have access to the master database and will not learn anything more than the random number of the ID, and will not be able to communicate any actions to the pill 10. Once the secret information is acquired, it is used by the remote device 62 to encrypt messages containing a command to be sent to the pill 10. This ensures that only the identified pill will be able to decrypt the message and carry out the command. In the situation where there are multiple pills within communication range, possibly delivering similar medicine or belonging to more than one person, safe, uniquely directed control is provided. Further, 'eavesdropping' of unintended communication devices is prevented.
  • Case 2 The remote device 62 does not know the identity of the pill, such as if a patient arrives in an emergency room.
  • the remote device 62 located in the emergency room, must send an un -encrypted message such as 'Request for Pills to identify'.
  • the pill transmits its ID un-encrypted to the remote device 62.
  • the remote device 62 uses the un-encrypted ID, the remote device 62 requests secret information from the master database corresponding to the ID so that remote device 62 can securely communicate with the pill (e.g., authentication, encryption, and decryption).
  • the remote device 62 is an authorized device.
  • the remote device 62 is a computer which receives a subset of the master database using current protocols between computers for secure communication, and may be updated through a network, by receiving a file for example from terminal 67.
  • the computer can receive the database because it is preset with a password, and standard encryption techniques to transfer the data.
  • the communicator will continue to receive messages with appropriate start-stop indicators and attempt to decrypt the messages using the secret information found in the pill. If a message successfully decrypts, it will have the proper syntax of one of several functions understood by the pill. For example, an encrypted message might decrypt to a command such as 'report medication release pattern', instructing the controller 16 of a pill 10 to cause communicator 20 to transmit information to a designated location as described above in conjunction with Figs. 1A-1 C. Ideally, the pill will first respond to the remote device 62 with a message encrypted using the pill's secret information that is the equivalent of 'message acknowledged', or ACK.
  • the requested information is then read from memory, encrypted with the pill's secret information and also transmitted to the remote device 62.
  • the remote device 62 can send an 'ACK' back to the pill (again, using the pill's secret information). If there is an error, it may either resend the command or send a 're-transmit' command.
  • the remote device 62 may transmit a command such as 'set medication release to 5 milligrams per hour for 2 hours, then 3 milligrams per hour for 5 hours'.
  • the pill would then adapt its previously stored release pattern to reflect the new setting. Since this is a more critical action, the pill may respond with a more sophisticated form of ACK, such as 'ACK- 2STEPS-5-2+3-5END'.
  • the pill may store the proposed settings in a temporary location in memory, and send the sophisticated ACK, but then wait for a further 'GO' command before actually storing the new release pattern.
  • Case 3 Pill initiated (unsolicited) communication occurs if the pill would like to report either a malfunction or a warning.
  • An example warning may be that it is running out of capacity, such as medication, power, etc.
  • the pill in this case will periodically (e.g. every 30 seconds) transmit its unencrypted ID, preferably along with a 'warning' message which is also unencrypted.
  • a remote device 62 will receive this message.
  • An authorized remote device uses this number to look up the secret, and encrypt a message similar to 'Report your Warning'.
  • the pill will decrypt this, and act to report the warning.
  • the warning which might look like: 'Medication level 10%, requiring new pill within 15 minutes', will be encrypted using its own secret.
  • the remote device 62 might in turn activate a signal at the nurse station to assure timely delivery of medication to the patient.
  • Case 4 Pill Coordination.
  • a remote device may mediate coordination of pills.
  • the pill reports that it is time for the next pill.
  • the remote device 62 then sends an 'activate' message to this second pill and after proper acknowledgment, sends a 'shutdown' message to the first pill.
  • a set of pills may be programmed to accept and decrypt the messages of the other pills in the set. In this way, all pills can hand off release to one another without an intermediary remote device 62.
  • Pill authenticates remote device For increased security, the pill may wish to authenticate the remote device. In this case, the pill sends an encrypted request using the pill's secret: 'remote device please authenticate'.
  • the remote device may then provide a second secret from the master database or rely only on the one secret that the pill already carries for responding that it is an authorized device (using a Message Authentication Code (MAC) or a Digital Signature).
  • the second secret if used, may be computed by the master database such as a function of time, or may be a fixed value stored for further authenticating the pill.
  • Fig. 4 shows a plurality of CMOS layers including a first active layer having particles 46 randomly dispersed in a particle coating 48, a passivation layer 44 covering metal sensors 42 (e.g., a comb structure), a lower metal layer 50, and a bulk layer 52 (e.g., a layer of other ICs in a pill).
  • the coating 48 may be of aluminophosphate, for example, which is doped with random dielectric particles 46 (e.g. TiO 2 , SrTiO 3 , BaTiO 3 ).
  • the random dielectric particles 46 are of random size and shape with a relative dielectric constant differing from the dielectric constant of the coating layer 48. Sufficient randomness for the particles 46 is only obtained if the dielectric particles are smaller than the distance between the sensor parts.
  • the PUF is embodied in the combination of the coating with the dielectric material.
  • a challenge is an input of voltage of a certain frequency and amplitude applied to the sensors 42 at a certain point of the sensor array.
  • the sensors 42 behave as a capacitor and therefore have a particular capacitance value when the voltage is applied, wherein the capacitance value is used to create the bitstring. That is, when the capacitance values of all sensors 42 are measured they are first quantized in a noise robust way (making use of a first set of helper data). That leads to a bitstring which can still contain some noise.
  • a discrete helper data algorithm or fuzzy extractor is used to derive a secure key.
  • the random capacitance value of the sensors 42 is based in part on the random sizes and shapes of the particles and the respective dielectric properties of the particles and coating material. If an input of voltage is applied with the exact same frequency and amplitude on a different CMOS, the random sizes and particles and the respective dielectric properties of the particles and coating are different. Hence, a different CMOS challenged in the same fashion will result in a different output due to the random characteristics of the combination of the coating with the dielectric material (i.e., the PUF).
  • the PUF is inextricably tied to the original CMOS in such a way that the original CMOS device cannot be copied. Therefore, the appropriate bitstring can only be generated on the original CMOS device. The bitstring created or extracted from the original CMOS cannot be hacked or copied.
  • the enrolment process involves first communicating with the pill using the enrolment processor 60 and communicator 20, to read the unique identification information 22a of the bitstring 22 and store it in the master database to identify the pill.
  • any other information about the pill that is desirable is also stored as part of, or is associated from another database with, the unique identification, such as (but not limited to) the type and amount of the medicine in the reservoir if the pill is of this type, or the radiation dosage in the pill, or other parameters of the active function of the pill, as well as dosage and timing information (profiles) that have been stored in the memory of the pill or programmed into the pill's controller and timing circuits, if present.
  • This additional information can be compared later with the actual dosage and timing used by the pill to check for compliance by the subject or for proper functioning of the pill.
  • ID information for the pill may include time limits with respect to when the pill must be used for a subject and/or geographic information with respect to where the pill may be used or activated. This will help ensure that the pill is used within the time and geographic limitations set by the manufacturer for use of that pill.
  • the forgoing identification step can take place without reading secret information 22b of the bitstring 22.
  • the communicator 20 transmits this secret information 22b of the bitstring 22 to the enrolment processor which then correlates it to the unique identification information 22a in the master database as discussed above.
  • the pill can be used for a subject and can thereafter be positively identified and correctly controlled, or its information correctly accessed, only by an authorized remote device 62 with authorized access to the master database.

Abstract

A pill, associated parts and method of operating the same, includes an ingestible shell (12), a medicine reservoir (14) or other treatment, sampling or sensing mechanism in the shell, a real-time clock for facilitating timed events, and a processor (26) in the shell. The processor is communication with a controller (16) for releasing medicine from the medicine reservoir or for performing other active functions for the pill. A pill memory is included for storing information about medicine released by the medicine reservoir such as dosage profile and timing profile, or other functions performed by the pill. A communicator is also in the shell for receiving control signals for controlling the release controller and for transmitting the stored information from the pill memory. A tamper resistant bitstring contains identification information for uniquely identifying the pill and secret information for encrypting, decrypting, and authenticating communication via the communicator.

Description

System and Method for Pill Communication and Control
[001] The present invention relates in general to the field of health and medicine, and in particular to systems and methods for pill communication and control.
[002] Pills or capsules that are made up of, or contain selected dosages of medication to be taken orally by a subject, are common. In some cases, the medication is packaged or treated in such a way that is released into the subject's system in a time-released manner. There has hitherto been little positive control over the release of medication to a subject after a pill has been ingested.
[003] Additionally, there is no known mechanism for obtaining precise information about the release of medication, such as actual dosage released and the time at which the dosage is released. Determining whether a patient has truly complied with a medication regimen is difficult and typically depends on patient feedback. There is a need for an objective and accurate means for determining compliance with a medication regimen, particularly with children and the elderly, who typically find more difficulty in complying with a medication regimen. Such compliance information would also be useful in a situation where a patient is unconscious or otherwise disabled in a manner that he cannot convey compliance information personally.
[004] One of the inventors of the present disclosure (Trovato) is also the sole inventor or a co-inventor of a number of co-pending patent applications that disclose various pills. These applications are not conceded to be prior art to the present invention, but rather are mentioned for their disclosure of various exemplary structures and functions that can be utilized in a pill. See, for example, the following patent applications that are all incorporated herein by reference: [005] U.S. Patent Application Serial No. 11/814,176, entitled "Electronically
Controlled lngestible Capsule For Sampling Fluids In Alimentary Tract" filed
January 16, 2006 by Karen Trovato and Judy Naamat. [006] U.S. Patent Application Serial No. 11/814,248, entitled "Electronically
Controlled Capsule" filed January 18, 2005 by Karen Trovato and Judy
Naamat. [007] U.S. Patent Application Serial No. 11/814,223, entitled "Electronically
Controlled Capsule For Releasing Radiation" filed January 18, 2005 by Karen
Trovato. [008] U.S. Patent Application Serial No. 11/814,185, entitled "System and
Method for Controlling Traversal of an Ingested Capsule" filed January 18,
2005 by Karen Trovato, Martin Ouwerkerk, Daniel Herzka and Judy Naamat. [009] U.S. Patent Application Serial No. 11/574,544, entitled "Electronically
Controlled Pill And System For Delivering At Least One Medicament" filed
September 1 , 2004 by Karen Trovato. [0010] U.S. Patent Application Serial No. 11/574,200, entitled "Electronically
And Remotely Controlled Pill And System For Delivering At Least One
Medicament" filed August 27, 2004 by Karen Trovato and G. Spekowius. [0011] U.S. Patent Application Serial No. 60/748,304, entitled "Electronic
Gastrointestinal Screening" filed December 7, 2005 by Jeff Shimizu and Karen
Trovato. [0012] U.S. Patent Application Serial No. 60/787,454, entitled "Expandable
Digestive Pill and Method of Use Thereof filed March 30, 2006 by Karen
Trovato. [0013] The present disclosure is also related to U.S. Patent Application Serial
No. 60/909,139, entitled "Personal Accessory For Use with A Pill" which has been filed on March 30, 2007 by Karen Trovato, Pirn Tuyls and Anne Barschall; and
[0014] U.S. Patent Application Serial No. 60/805,645, entitled "Medicament
Delivery System and Process" filed on June 23, 2006 by Karen Trovato and Jeff Shimizu, both of which are also incorporated here by reference. [0015] A pill-like and ingestible camera is disclosed in U.S. Patent
7,009,634 entitled "Device for In-Vivo Imaging" issued May 7, 2006 and in other patents assigned to Given Imaging LTD of Yoqneam, Israel.
[0016] The need for security is known for various media such as credit cards and smart cards. Encryption algorithms are one commonly used technique for providing such security, and MAC (Message Authentication Code) algorithms are known for authenticating messages. These algorithms depend on secret keys. The algorithms are generally public and only the keys are considered to be secret. The security of cryptographic algorithms depends, therefore, on the secrecy of the keys.
Physical Uncloneable Functions or PUFs have been proposed as a cost- effective way to produce uncloneable tokens for identification. PUFs for creating tamper resistant bitstrings is disclosed in international patent application WO 2004/105125 A2, published December 2, 2004, and entitled "Semiconductor Device, Method of Authenticating and System" which designates the U.S. and is incorporated herein by reference.
[0017] A system is disclosed herein which includes a remote device capable of sending commands to a pill to perform one or more desired functions.
[0018] The desired function, which will be referred to hereinafter as an active function, includes, but is not limited to:
1 ) releasing selected amounts of treatment media such as for example a medication, radiation for radiation treatment or other purpose, or other treatment media, whether currently known or to be discovered,
2) taking of a fluid or tissue sample from the subject, 3) controlling movement and/or orientation of the pill,
4) the taking of images of or other data from the subject's alimentary tract or other location where the pill has been inserted into the subject,
5) reading of information, such as dosage profile (i.e., dosage information about the medicine to be released) and/or timing profile (i.e., timing information about when the medicine is to be released such as a specific time or time period, etc) that has been stored in the pill,
6) monitoring and/or storing actual dosage released or timing information of dosage released,
7) comparing actual dosage released or timing information of dosage released to dosage profile or timing profile respectively,
8) reporting or transmitting compliance information such as actual dosage released, timing information of dosage released, or comparison data and results,
9) monitoring and/or storing data about properties of a patient's body (e.g., temperature, pH, body location, etc) via for example, a sensor platform for measuring biological parameters of a human body,
10) monitoring and/or storing data about the pill (e.g., orientation of the pill), and
11 ) transmitting stored information (including compliance information as described above).
[0019] The active function is of course not limited to these examples and includes essentially any function that can be performed in a subject's body, whether it is currently known or unknown, including all types of monitoring, diagnosis, analysis, and treatment.
[0020] Reporting or transmitting compliance information such as actual dosage released, timing information of dosage released, or comparison data and results allows an authorized health practitioner to receive and review such compliance information to verify that the subject has complied or is compliance with his or her medication regimen and has indeed taken his prescribed medicine. Verifying that a medication has been taken is especially useful in an emergency (e.g., when a patient arrives unconscious or is unable to speak) and solves a compliance problem that is sometimes experienced with the elderly and with children.
[0021] Also disclosed is a memory for storing information, such as for example, the above-identified information (dosage profile, timing profile, actual dosage of medicine released, timing information of actual dosage released, comparison data thereof, information on a patient's body, information about the pill, etc).
[0022] Also disclosed is a unique identification for a pill to ensure that the correct pill performs an active function and a cryptographic safety feature for a pill for authenticating, encrypting, or decrypting.
[0023] For example, the pill is capable of creating a random, tamper resistant bitstring. For the purpose of this disclosure, the term "bitstring" is defined as a set of bits that include information. A bitstring can be created from a PUF (Physical Uncloneable Function) in a CMOS for example, or in programmable memory such as EPROM or EEPROM. The word "uncloneable" indicates that the PUF cannot be copied or altered.
[0024] According to one embodiment, the created random, tamper resistant bitstring is split arbitrarily into two parts. The first part is a unique identification (pill ID), and the second part is secret information, for example a private key. The pill ID uniquely identifies the pill. The secret information is used to encrypt, or decrypt communication between the pill and other devices as well as to authenticate other devices. If more bits are required than the number available from the response of a single PUF, then more than one PUF can be used.
[0025] The unique identification ensures that messages intended for one pill are not accidentally read and followed by another pill that for example happens to be in the same area. The secret information ensures that only authorized parties, e.g. the subject's doctor or an ER (Emergency Room) attendant, can control the pill or can read information from the pill. That is, the requirement of this secret information prevents pill communication from being open to the public and in particular, unauthorized parties. Hence, the requirement of secret information prevents the pill from being controlled by any unauthorized party for any unauthorized purpose. The secret information further protects patient privacy and safety by ensuring that non-approved communication equipment cannot inquire about medications taken by a particular patient, and provides an additional layer of protection against intentional or accidental control by an unauthorized communication source.
[0026] According to another embodiment, PUF is advantageously implemented using a standard CMOS (Complementary Metal Oxide Semiconductor) and requires only two more layers (what do you mean here?), for example, on any of the already present ICs (Integrated Circuits) used in the pill.
[0027] Also disclosed is a method to check whether the pill is authentic; i.e. whether it has been counterfeit or not.
[0028] The various features of novelty which characterize the invention are pointed out with particularity in the claims annexed to and forming a part of this disclosure. For a better understanding of the invention, its operating advantages and specific objects attained by its uses, reference is made to the accompanying drawings and descriptive matter in which preferred embodiments of the invention are illustrated.
[0029] In the drawings:
[0030] Fig. 1A is a schematic illustration of a system in which an exemplary pill transmits information to a first remote device; [0031] Fig. 1 B is a schematic illustration of a system in which an exemplary pill transmits information to a relay means for relaying the information to a first remote device; [0032] Fig. 1 C is a schematic illustration of a system in which an exemplary pill transmits information to a second remote device; [0033] Fig. 2 is a schematic illustration of an exemplary pill having means for dispensing medicine; [0034] Fig. 3 is a schematic illustration of an exemplary pill having means for secure communication and usable in the embodiments shown in Figs. 1A-2; [0035] Fig. 4 is a schematic sectional view of CMOS (Complementary Metal
Oxide Semiconductor) layers that implement PUF to form or create a tamper resisitant bitstring that is useable with the exemplary pill according to Figs. 1A-
3; and [0036] Fig. 5 is a schematic illustration of the tamper resistant bitstring formed by the CMOS layers of Fig. 4.
[0037] Referring now to the drawings, in which like reference numerals are used to refer to the same or similar elements, FIG. 1A illustrates a system for facilitating transmission of information from a pill 10 to a remote device 62. Pill 10 includes a communicator 20 for at least one of transmitting or receiving (or both) and a controller 16 for controlling an active function of the pill 10. In the instant embodiment, the active function constitutes at least transmission of information. Thus, the controller 16 controls transmission of information by instructing the communicator 20 to transmit information. The active function may constitute other functions like medicine release, as described in more detail in Fig. 2. Pill 10 can have multiple active functions as well, such as for example dispensing some dosage of medication, recording dosage dispensed, and transmitting a compliance report of dosage dispensed. An antenna 30 located on or in the pill 10, is connected to the communicator 20 for facilitating communication. A battery powers the pill 10 and its components.
[0038] Transmission of information can occur in a variety of ways and two examples are provided as follows. The present application is not limited to the following examples as other examples may be evident from what is already known in the field of communication or may be covered by the spirit of the application.
[0039] In a first example, pill 10 is preprogrammed to transmit information at a particular time, or in response to certain events, or under certain circumstances. When the requirement for pill 10 to transmit information is triggered, controller 16 instructs the communicator 20 to transmit information to the remote device 62. Controller 16 may obtain the information from memory and provide the information directly to communicator 20 for transmission to remote device 62.
[0040] In a second example, the remote device 62 sends a control signal (e.g., via a message containing the command 'transmit information to remote device 62') to the pill 10 requesting transmission of information to the remote device 62. Communicator 20 receives the control signal from remote device 62. Communicator 20 sends the control signal to the controller 16. Controller 16 reads the control signal and instructs the communicator 20 to transmit information to the remote device 62, which is accessible by a doctor, pharmacist, clinical researcher (or trial manager), home care management client, or home services management agency, or other caregiver, etc. As a part of this process, controller 16 may obtain data from memory and provide the information directly to the communicator 20.
[0041] Communicator 20 is programmed to initiate communication with other devices, either intermittently or constantly, to verify whether the other device is available and ready to receive information from the pill 10. By intermittently communicating, the pill 10 is able to substantially conserve energy and power since the pill is not constantly "on" and looking for devices to communicate with, which is especially useful if the other devices are not available, either temporarily or for a long period of time. This is also especially useful for such a small pill. Accordingly, the communicator 20 initiates communication with the remote device 62, either intermittently or constantly, to verify whether the remote device 62 is available and ready to receive information. If the remote device 62 responds and verifies that it is available and ready to receive information, the information is transmitted from the pill 10 (via communicator 20) to the remote device 62.
[0042] Information that is transmitted from the pill 10 to the remote device 62 includes any information about an active function, such as for example, the information about medicine released by the medicine reservoir 14 (see Fig. 2) (type of medicine released, time of release, and amount and dosage of medicine released, etc), information about radiation released (type of radiation, time of release, duration of exposure, amount of exposure, etc), information about fluid or tissue sample taken (amount taken, time taken, duration of time taken, etc), information about the pill (e.g., orientation), information about images taken by a camera (the images, the time the images were taken, the location that the images were taken, etc), information about the patient from sensors (e.g., core body temperature, pH, or the location or position inside the body). The pill 10 includes a processor 26 capable of comparing actual active function information (e.g., the time of pill ingestion, the dosage of a particular medicine actually released by controller 16) with desired active function information (the required medicine dosage to be taken) to generate a compliance report for transmission to the remote device 62. Comparison of actual data versus prescription to create a compliance report may also occur at the remote device 62. The information can be made available to for example, a doctor, pharmacist, clinical researcher (or trial manager), home care management client, home services management agency, or other caregiver, etc, by way of the transmission to the remote device 62.
[0043] Fig. 1 B shows an alternative embodiment to Fig. 1A where the active function is transmission of information and the system further includes relay means in the form of for example, a remote unit 65 for relaying information from the pill 10 to the remote device 62. Since the pill 10 may have a limited communication range from inside the body due to bodily interference, the remote unit 65 is optionally wearable by the patient or is otherwise located or positioned near the patient so that the communication range from the pill 10 to the remote unit 65 is adequate. The remote unit 65 is less constrained to having certain power or frequency requirements. Thus it may communicate with remote device 62 using a different frequency band and protocol as compared to the communication established to the pill 10. The remote unit 65 further contains memory for storing information.
[0044] Two examples are provided below for transmitting information in the system shown in Fig. 1 B.
[0045] As in the first example in Fig. 1A, pill 10 is preprogrammed to transmit information at a particular time, or in response to certain events, or under certain circumstances. However, when the requirement for pill 10 to transmit information is triggered, controller 16 instructs the communicator 20 to transmit information to the remote unit 65, which relays the information to remote device 62, in a manner described in more detail below.
[0046] In a second example, the remote device 62 transmits a control signal
(e.g., via a message containing the command 'transmit information to the remote unit 65 for relay to the remote device 62') to the pill 10 requesting transmission of information (e.g., the time at which the pill was ingested, results of measurements, dispensing actions taken, compliance information, core body temperature, pH, etc). The remote device 62 transmits this control signal to the pill 10 through the remote unit 65, or alternatively, directly to the pill 10. Like in the embodiment of Fig 1A, communicator 20 receives the control signal from remote device 62. Communicator 20 sends the control signal to the controller 16. Controller 16 reads the control signal and instructs the communicator 20 to transmit information to the remote unit 65 for relay to the remote device 62. The transmission of information from communicator 20 to remote device 62 through remote unit 65 is described in more detail below.
[0047] Communicator 20 is programmed to initiate communication with remote unit 65, either intermittently or constantly, to verify whether the remote unit 65 is available and ready to receive information from the pill 10. If remote unit 65 confirms it is available and ready, the communicator 20 transmits the information to remote unit 65. If remote unit 65 is not available, the pill 10 will store data internally. The amount of data storage on the pill 10 is typically limited owing to the size constraints of the pill. Thus the pill 10 will continue to query for the remote unit 65 intermittently or continuously. When communication can be established with remote unit 65, the communicator 20 transmits the stored information. The memory on the pill may then be freed for subsequent data. The transmitted information is stored on remote unit 65 that has a larger memory capacity than the pill 10. Likewise, the remote unit 65 will intermittently or continuously initiate communication with remote device 62. When communication is established the information stored on remote unit 65 will be sent to remote device 62, which is accessible to for example, a doctor, pharmacist, clinical researcher (or trial manager), home care management client, home services management agency, or other caregiver, etc. The remote unit 65 will have enough memory to store data from the pill covering an extended period. It may then only need to establish communication with remote device 62 infrequently. For example the remote device may be placed in a charging and docking station at the end of the day. The docking station might then serve as the communication port between the remote unit 65 and the remote device 62.
[0048] In Fig. 1 B, intermittent verification saves energy and power since the remote unit 65 is not constantly looking for the remote device 62. This is particularly useful if the remote device 62 is not available, either temporarily or for a long period of time. This is also particularly useful in view of the small size of the remote unit 65.
[0049] Remote unit 65 can have varying degrees of intelligence. For example, one form of remote unit 65 may act as a repeater without decrypting the data, but may relay the information on a slightly shifted frequency, exactly as it hears it from the local environment. This is possible with an RF repeater (receiving RF and transmitting RF), such as is performed by Amateur Radio systems. If bits can be accurately received and recognized in bytes, data received by RF can be re-transmited (relayed) via TCP/IP (i.e. the net), to remote device 62 located on the network which is identified as a receiver of such relays.
[0050] In another example, another form of remote unit 65 can contain a PUF, and therefore be capable of decrypting or encrypting messages as an authorized device (see below for explanation for enrolment; Fig. 3). Thus, the remote unit 65 can decrypt messages and take the burden of decrypting messages from the remote unit 62. As a result, a plurality of remote units 65, functioning at low power, can be used to perform potentially numerous decryptions. Each remote unit 65 can consolidate a plurality of received messages by decrypting and storing all of the received messages, and consolidating all of the stored messages via encryption into one encrypted pattern which is then relayed by RF, network (as described above for example) or other means. This consolidation of messages can simplify the processing at the remote device 62 or other remote device. For example, 1000 messages from pills may be received by ten remote units 65 (100 messages per remote unit), and each remote unit 65 can then decrypt its share of 100 received messages, and then consolidate all 100 received messages into a single encrypted pattern, which can then be relayed to remote device 62 for example. [0051] Information that is relayed by the remote unit 65 to the remote device 62 includes any information about an active function such as described above in connection with the system in Fig. 1A. Messages relayed through the remote unit 65 and forwarded to either the pill, or another relay system or a remote device 62 preferably contain 'envelope information' in addition to the message. For example: 'message forwarded from pill number X. Message says that it dispensed Y ccs of medication in the past hour'. Otherwise the source of the information is lost as it is forwarded.
[0052] Fig. 1 C shows an alternative embodiment to Fig. 1A which further includes a report terminal 67 for receiving information from a pill 10.
[0053] In one example under this embodiment, pill 10 is preprogrammed to transmit information at a particular time, or in response to certain events, or under certain circumstances. When the requirement for pill 10 to transmit information is triggered, controller 16 instructs the communicator 20 to transmit information to the report terminal 67.
[0054] In another example, remote device 62 transmits a control signal (e.g., via a message containing the command 'transmit information to the report terminal 67') to the pill 10 requesting transmission of information to the report terminal 67, which is accessible by a doctor, pharmacist, clinical researcher (or trial manager), home care management client, or home services management agency, or other caregiver, etc.
[0055] Communicator 20 receives the control signal from remote device 62.
Communicator 20 transmits the control signal to the controller 16. Controller 16 reads the control signal and instructs the communicator 20 to transmit information to the report terminal 67. Communicator 20 initiates communication with the report terminal 67, either intermittently or constantly, to verify whether the report terminal 67 is available and ready to receive information. If the report terminal 67 responds and verifies that it is available and ready to receive information, the information is transmitted from the pill 10 (via communicator 20) to the report terminal 67. Notably, a remote unit 65 may serve as a relay between the pill 10 and the report terminal 67 as described in conjunction with the embodiment shown in Fig. 1 B. [0056] Information that is transmitted to the report terminal 67 includes any information about an active function, such as described above in connection with the system in Fig. 1A.
[0057] Still another embodiment is where the remote device 62 is connected to a network, such that it receives messages via RF, decrypts the messages, and then securely transmits them to another computer on a network, such as by TCP/IP. In the reverse direction, messages are received via network connection, and then transmitted to the pill (or other devices) via RF. Network connections can be wired or wireless. If they are wireless, then presumably the frequency and protocol is sufficiently different from the PUF pill or PUF device so messages do not collide. As electronics are further miniaturized, a Pill or PUF device may also communicate using the same protocols as wireless LAN systems.
[0058] Fig. 2 shows an exemplary embodiment of a pill 10, having an ingestible shell 12, a medicine reservoir 14 in the shell and a processor 26 in the shell. The processor 26 has, or is in connection or communication with, a controller 16 for controlling an active function of the arrangement. According to this non- limiting exemplary embodiment, the active function includes releasing medicine from the medicine reservoir 14 to the outside of the shell 12, which is controlled by controller 16. The controller 16 communicates with a gate 28 and a pressure mechanism 32, which is structurally much like the plunger of a syringe. The controller 16 opens the gate 28 and causes the pressure mechanism 32 to release a selected amount of medicine outside of the shell 12.
[0059] The pill 10 further includes a memory 18 for storing information, such as for example, dosage profile, timing profile, actual dosage of medicine released by the medicine reservoir 14, timing information of actual dosage released, comparison data thereof, information on a patient's body, or about other active functions performed by the pill 10. The pill 10 optionally includes timing circuitry 24 that is part of, or separate from, the processor 26, for controlling the tinning of the opening of the gate 28 (e.g., at a selected time and/or for a selected period) for releasing a selected amount of medicine from reservoir 14 by the action of the syringe or pressure mechanism 32 at a selected time and/or for a selected period. That is, the timing circuitry 24 can be a real-time clock, either integrated with the processor, or provided separately, configured for facilitating timed events such as for example, releasing medicine at a pre- scheduled time or for a pre-scheduled period, recording information at a certain time, etc.
[0060] A communicator 20 such as a transceiver is also included in the shell 12 for at least receiving control signals for controlling the active function (e.g. to release medicine via controller 16), which cause controller 16 to control gate 28 and pressure mechanism 32 to facilitate release of medicine from the medicine reservoir 14 to the outside of the shell 12. An antenna 30 located on or in the pill 10, is connected to the communicator 20 for facilitating such communication.
[0061] A battery is connected to the circuitry in pill 10 to power the pill components and active function.
[0062] While a pill that is ingestible or insertable into the alimentary tract (e.g. orally or rectally), is disclosed according to this embodiment, the pill may be of the type that is surgically inserted or implanted at a selected location in the subject, e.g. subcutaneously or otherwise.
[0063] Other alternatives to this embodiment shown in Fig. 2 may include a mechanism similar to the ejector of an ink jet printer head in place of the illustrated syringe-like pressure mechanism 32 and a valve (for controlling the amount and/or rate of release) in place of the gate 28. Although these alternative features are not shown, one skilled in the relevant art would understand how to implement these alternatives since they are well known features. [0064] Fig. 2 shows one example of an active function for a pill 10. However, there are many other types of active functions. Thus, an active function includes, but is not limited to:
1 ) releasing selected amounts of a treatment media such as a medication, radiation, or other treatment media (achievable as shown in Fig. 2 for example)
2) taking of a sample, e.g. a fluid sample from a subject's alimentary tract (achievable by opening a port to an empty chamber, drawing fluid into a reservoir by mechanical displacement)
3) controlling the movement or orientation of a pill such as stopping the movement of the pill along the subject's alimentary tract (achievable by expansion of a balloon of the pill 10)
4) taking images of various parts of the subject's alimentary tract (achievable by means of a camera), such as disclosed in U.S. Patent 7,009,634,
5) reading of information, such as dosage profile (i.e., dosage information about the medicine to be released) and/or timing profile (i.e., timing information about when the medicine is to be released such as a specific time or time period, etc) that has been stored in the pill,
6) monitoring and/or storing actual dosage released or timing information of dosage released,
7) comparing actual dosage released or timing information of dosage released to dosage profile or timing profile respectively,
8) reporting or transmitting compliance information such as actual dosage released, timing information of dosage released, or comparison data or results,
9) monitoring and/or storing data about properties of a patient's body (e.g., temperature, pH, body location, etc) by means of for example, measuring or sensing the core body temperature (achievable by temperature sensors), measuring or sensing pH in the body or specifically intestinal pH (achievable by pH sensors), measuring or sensing light (achievable by a photodetector for detecting fluorescence for example, or other light sensor), 10) monitoring, determining, and/or storing data about the pill (e.g., position or orientation of the pill) achievable by for example an inclinometer, and
11 ) transmitting stored information (including compliance information as described above).
[0065] Other currently known or to be discovered active functions can be implemented with the pill 10. The active function can also include other functions that pills are capable of executing, e.g. as disclosed in others of the co-pending patent applications identified above and incorporated herein by reference. The only requirement is that some externally controllable treatment, sampling, sensing or other function be performed that occurs inside the subject.
[0066] Also disclosed is a unique identification for a pill to ensure that the correct pill performs the active function and a cryptographic safety feature for authenticating, encrypting or decrypting communication. Figs. 3-5 illustrate a preferably tamper resistant bitstring 22, formed or stored in a component 23 having a PUF for example, and accessible by the processor 26. The tamper resistant bitstring 22 contains a large number of bits 40 (FIG. 5) that includes unique identification information 22a for uniquely identifying the pill, and secret information 22b for authenticating, encrypting, or decrypting communication via the communicator 20. That is, the secret information 22b is not communicated to other devices but is used by the pill to encrypt messages to other devices or decrypt messages from other devices. Also, the communicator 20 is capable of using the secret information 22b of the bitstring to authenticate messages (with commands) as authorized messages from other devices or to authenticate the other devices as authorized devices before an active function is performed by the pill. If a message is not properly authenticated, the command contained in the message will not be carried out. The secret information 22b is preferably large enough so that the time required for transmitting "test" transmissions, such as those that might be used to try to break the 'secret', is much greater than the lifetime of the pill. [0067] Fig. 3 further illustrates an enrolment processor 60 that is outside the shell, for reading the bitstring 22 and for storing the unique identification information 22a in a secure electronic master database that associates the identification information with a specific pill and its secret information 22b for future identification and secure control of the pill.
[0068] The bitstring may be formed, created, or read from a programmable, non-volatile memory, such as an EEPROM or EPROM, or from a CMOS or other component having a random but unalterable PUF. However, EEPROM is not as tamper resistant as a component having a PUF. Part of the programmable memory may be used to identify the pill or store information used for nominal actions. The manufacturer or product name together with a PUF-dehved value can then also form a unique identification for the pill. Nominal actions are those that the pill would carry out without external control, such as releasing medicine at a particular dosage and timing based on dosage and timing profiles stored in the programmable memory. Similar additional information can also be part of the programmable bitstring for pills having other or additional treatment, sensing, sampling or other active functions. The identification, whether programmable, random-unalterable or a combination, is stored in the master database.
[0069] The remote device 62, which for example may be in the emergency room of a hospital, in a doctor's office or in another health care establishment, is empowered to generate an encrypted message with the secret information 22b and to transmit the encrypted message to the pill, as well as to decrypt messages with the secret information 22b. Basic commands to be transmitted to the pill include for example 'activate', 'activate upon entering stomach', 'activate within 1 week', or 'pilM activate pill2 with secret S when pilM finishes'. Some transmissions may request the pill to read or transmit status information that is stored in the pill's memory. The remote device 62 either contains or has access to a master database, or a subset of useful ID-Secret codes. A subset may be used when known medications are delivered in a relatively constrained patient population, such as in a nursing home, hospital or intended charitable region (such as a third world country). In this last group, on-site activation can assure that the medication is delivered to the intended recipients. Thus, the contents of various databases may vary depending on the expected use. In an emergency, a clearinghouse of all ID-Secret combinations must be accessible and based on a secure authorization level. The secure authorization for communicating with various databases may include the use of public key encryption techniques, IP addresses and/or PUF technology to ensure that the remote device is authentic. The following are example cases that illustrate secure communication between a remote device 62 having properly authorized access to a database or subset and a pill: Case 1 : The remote device 62 knows the identity of the pill within the person, such as if the pill was dispensed from packaging that also displayed the ID number, possibly by barcode to minimize transcription error. The ID is then entered by keypad for example, or barcode is read, into the remote device 62. The remote device 62 must acquire the secret information corresponding to the ID from the master database. The master database may be stored within the remote device 62 or be accessed remotely. Remote communication with the master database is for example, a secure client-server system, where the master database is stored either on-site (such as at a hospital) or remotely at a central repository (i.e., the remote device 62 is an authorized device with authorized access to the master database). If the remote device 62 is an unauthorized device, it will not have access to the master database and will not learn anything more than the random number of the ID, and will not be able to communicate any actions to the pill 10. Once the secret information is acquired, it is used by the remote device 62 to encrypt messages containing a command to be sent to the pill 10. This ensures that only the identified pill will be able to decrypt the message and carry out the command. In the situation where there are multiple pills within communication range, possibly delivering similar medicine or belonging to more than one person, safe, uniquely directed control is provided. Further, 'eavesdropping' of unintended communication devices is prevented.
[0071] Case 2: The remote device 62 does not know the identity of the pill, such as if a patient arrives in an emergency room. In this case, the remote device 62, located in the emergency room, must send an un -encrypted message such as 'Request for Pills to identify'. In response, the pill transmits its ID un-encrypted to the remote device 62. Using the un-encrypted ID, the remote device 62 requests secret information from the master database corresponding to the ID so that remote device 62 can securely communicate with the pill (e.g., authentication, encryption, and decryption).
[0072] As in Case 1 above, the remote device 62 is an authorized device. For example, the remote device 62 is a computer which receives a subset of the master database using current protocols between computers for secure communication, and may be updated through a network, by receiving a file for example from terminal 67. The computer can receive the database because it is preset with a password, and standard encryption techniques to transfer the data.
[0073] The communicator will continue to receive messages with appropriate start-stop indicators and attempt to decrypt the messages using the secret information found in the pill. If a message successfully decrypts, it will have the proper syntax of one of several functions understood by the pill. For example, an encrypted message might decrypt to a command such as 'report medication release pattern', instructing the controller 16 of a pill 10 to cause communicator 20 to transmit information to a designated location as described above in conjunction with Figs. 1A-1 C. Ideally, the pill will first respond to the remote device 62 with a message encrypted using the pill's secret information that is the equivalent of 'message acknowledged', or ACK. The requested information is then read from memory, encrypted with the pill's secret information and also transmitted to the remote device 62. Once the remote device 62 receives the data, it can send an 'ACK' back to the pill (again, using the pill's secret information). If there is an error, it may either resend the command or send a 're-transmit' command. The remote device 62 may transmit a command such as 'set medication release to 5 milligrams per hour for 2 hours, then 3 milligrams per hour for 5 hours'. The pill would then adapt its previously stored release pattern to reflect the new setting. Since this is a more critical action, the pill may respond with a more sophisticated form of ACK, such as 'ACK- 2STEPS-5-2+3-5END'. As an alternative, the pill may store the proposed settings in a temporary location in memory, and send the sophisticated ACK, but then wait for a further 'GO' command before actually storing the new release pattern.
[0074] Case 3: Pill initiated (unsolicited) communication occurs if the pill would like to report either a malfunction or a warning. An example warning may be that it is running out of capacity, such as medication, power, etc. The pill in this case will periodically (e.g. every 30 seconds) transmit its unencrypted ID, preferably along with a 'warning' message which is also unencrypted. Example: 'warning 1357986420'. A remote device 62 will receive this message. An authorized remote device then uses this number to look up the secret, and encrypt a message similar to 'Report your Warning'. The pill will decrypt this, and act to report the warning. The warning, which might look like: 'Medication level 10%, requiring new pill within 15 minutes', will be encrypted using its own secret. The remote device 62 might in turn activate a signal at the nurse station to assure timely delivery of medication to the patient.
[0075] Case 4: Pill Coordination. A remote device may mediate coordination of pills. In Case 3 above, the pill reports that it is time for the next pill. Once the second pill is taken, and sends a 'ready to release' message encrypted with it's secret, the remote device 62 then sends an 'activate' message to this second pill and after proper acknowledgment, sends a 'shutdown' message to the first pill. Alternatively, a set of pills may be programmed to accept and decrypt the messages of the other pills in the set. In this way, all pills can hand off release to one another without an intermediary remote device 62.
Case 5: Pill authenticates remote device. For increased security, the pill may wish to authenticate the remote device. In this case, the pill sends an encrypted request using the pill's secret: 'remote device please authenticate'. The remote device may then provide a second secret from the master database or rely only on the one secret that the pill already carries for responding that it is an authorized device (using a Message Authentication Code (MAC) or a Digital Signature). The second secret, if used, may be computed by the master database such as a function of time, or may be a fixed value stored for further authenticating the pill.
[0076] Turning to one example of a component for forming or creating a preferred tamper resistant bitstring 22, Fig. 4 shows a plurality of CMOS layers including a first active layer having particles 46 randomly dispersed in a particle coating 48, a passivation layer 44 covering metal sensors 42 (e.g., a comb structure), a lower metal layer 50, and a bulk layer 52 (e.g., a layer of other ICs in a pill).
[0077] The coating 48 may be of aluminophosphate, for example, which is doped with random dielectric particles 46 (e.g. TiO2, SrTiO3, BaTiO3). The random dielectric particles 46 are of random size and shape with a relative dielectric constant differing from the dielectric constant of the coating layer 48. Sufficient randomness for the particles 46 is only obtained if the dielectric particles are smaller than the distance between the sensor parts. The PUF is embodied in the combination of the coating with the dielectric material.
[0078] Challenging the CMOS results in a specific output that is partly and uniquely based on the PUF. In the instant embodiment, a challenge is an input of voltage of a certain frequency and amplitude applied to the sensors 42 at a certain point of the sensor array. The sensors 42 behave as a capacitor and therefore have a particular capacitance value when the voltage is applied, wherein the capacitance value is used to create the bitstring. That is, when the capacitance values of all sensors 42 are measured they are first quantized in a noise robust way (making use of a first set of helper data). That leads to a bitstring which can still contain some noise. In order to remove the noise, a discrete helper data algorithm or fuzzy extractor is used to derive a secure key.
[0079] The random capacitance value of the sensors 42 is based in part on the random sizes and shapes of the particles and the respective dielectric properties of the particles and coating material. If an input of voltage is applied with the exact same frequency and amplitude on a different CMOS, the random sizes and particles and the respective dielectric properties of the particles and coating are different. Hence, a different CMOS challenged in the same fashion will result in a different output due to the random characteristics of the combination of the coating with the dielectric material (i.e., the PUF). The PUF is inextricably tied to the original CMOS in such a way that the original CMOS device cannot be copied. Therefore, the appropriate bitstring can only be generated on the original CMOS device. The bitstring created or extracted from the original CMOS cannot be hacked or copied.
[0080] After a pill has been manufactured, the enrolment process involves first communicating with the pill using the enrolment processor 60 and communicator 20, to read the unique identification information 22a of the bitstring 22 and store it in the master database to identify the pill. At this point any other information about the pill that is desirable is also stored as part of, or is associated from another database with, the unique identification, such as (but not limited to) the type and amount of the medicine in the reservoir if the pill is of this type, or the radiation dosage in the pill, or other parameters of the active function of the pill, as well as dosage and timing information (profiles) that have been stored in the memory of the pill or programmed into the pill's controller and timing circuits, if present. This additional information can be compared later with the actual dosage and timing used by the pill to check for compliance by the subject or for proper functioning of the pill.
[0081] Other ID information for the pill may include time limits with respect to when the pill must be used for a subject and/or geographic information with respect to where the pill may be used or activated. This will help ensure that the pill is used within the time and geographic limitations set by the manufacturer for use of that pill.
[0082] The forgoing identification step can take place without reading secret information 22b of the bitstring 22. At some point, however, the communicator 20 transmits this secret information 22b of the bitstring 22 to the enrolment processor which then correlates it to the unique identification information 22a in the master database as discussed above.
[0083] Having thus been registered in a secure manner in the master database, the pill can be used for a subject and can thereafter be positively identified and correctly controlled, or its information correctly accessed, only by an authorized remote device 62 with authorized access to the master database.
[0084] Technical solutions are provided for technical problems that may assist a physician in reaching a diagnosis or treating a patient.
[0085] The invention is not limited to the disclosed embodiments. Also, the word "comprising" does not here exclude other elements or steps, and use of the words "a" or "an" does not exclude a plurality. Further, a single processor or other unit may fulfill the functions of several elements recited in the claims, and features recited in separate dependent claims may be advantageously combined. Also, a PLA (programmable logic array) or static memory with processor is capable of performing the logic within the pill. Reference signs in the claims should not be construed as limiting the scope.
[0086] While specific embodiments of the invention have been shown and described in detail to illustrate the application of the principles of the invention, it will be understood that the invention may be embodied otherwise without departing from such principles.

Claims

What Is Claimed Is:
1. A pill arrangement comprising: a shell (12); a processor (26) in the shell, the processor having a controller (16) for controlling an active function of the arrangement; a communicator (20) at least for receiving control signals for controlling the active function; and a bitstring (22) containing unique identification information (22a) for uniquely identifying the pill.
2. A pill arrangement according to claim 1 , including an enrolment processor (60) outside the shell, for reading the bitstring and for storing the unique identification information in a pill database that associates the identification information with a specific pill.
3. A pill arrangement according to claim 1 , wherein the bitstring (22) also contains secret information (22b) for encrypting communication via the communicator, the arrangement including a remote device (62) for reading the secret information for decrypting the encrypted communication .
4. A pill arrangement according to claim 1 , wherein the bitstring is derived from a tamper resistant physical uncloneable function.
5. A pill arrangement according to claim 1 , wherein the bitstring is derived from a tamper resistant physical uncloneable function embodied in at least one complementary metal oxide semiconductor layer.
6. A pill arrangement according to claim 1 , including a medicine reservoir (14) in the shell, the controller (16) functioning to release medicine from the reservoir at selected dosage and tinning profiles, the bitstring (22) also containing secret information (22b) for encrypting communication via the communicator.
7. A pill arrangement according to claim 1 , including a medicine reservoir (14) in the shell for releasing medicine as at least part of the active function, the controller (16) functioning to release medicine from the reservoir at selected dosage and timing profiles, the pill arrangement including a pill memory (18) for storing information including the profile.
8. A pill arrangement according to claim 1 , wherein the communicator (20) is a transceiver for both receiving control signals for controlling the active function and for transmitting information, the arrangement including a medicine reservoir (14) in the shell for releasing medicine as at least part of the active function, the controller (16) functioning to release medicine from the reservoir at selected dosage and timing profiles, the bitstring (22) also containing secret information (22b) for encrypting communication via the communicator, the arrangement including a pill memory (18) for storing information selected from the group consisting of core body temperature, pH, dosage profile, timing profile, and compliance information which includes actual dosage of medicine released, timing information of actual dosage released, or a comparison of dosage profile to actual dosage of medicine released or a comparison of timing profile to actual time of medicine released, and the active function also including transmitting the information to a remote device after authentication via the secret information.
9. A pill arrangement comprising: an ingestible shell (12); a processor (26) in the shell, the processor having a controller (16) for controlling an active function of the arrangement; an electronic pill memory (18) for storing information about the active function of the arrangement; a communicator (20) for receiving control signals for controlling the active function and for transmitting; and a tamper resistant bitstring (22) containing unique identification information (22a) for uniquely identifying the pill and secret information (22b) for encrypting communication via the communicator.
10. A pill arrangement according to claim 9, including a medicine reservoir (14) in the shell, the controller (16) functioning to release medicine from the reservoir at selected dosage and timing profiles which comprises the active function; a real-time clock as a timing reference; and a sensor platform for measuring biological parameters of a human body.
11. A pill arrangement according to claim 9, including a medicine reservoir (14) in the shell for releasing medicine as at least part of the active function, the controller (16) functioning to release medicine from the reservoir at selected dosage and timing profiles, the pill arrangement including a pill memory (18) for storing information selected from the group consisting of core body temperature, pH, dosage profile, timing profile, and compliance information which includes actual dosage of medicine released, timing information of actual dosage released, or a comparison of dosage profile to actual dosage of medicine released, or a comparison of timing profile to actual time of medicine released.
12. A pill arrangement according to claim 9, wherein the bitstring is derived from a tamper resistant physical uncloneable function embodied in at least one complementary metal oxide semiconductor layer.
13. A method of performing an active function in a subject, comprising: providing a pill having an ingestible shell (12), a processor (26) in the shell, the processor being in communication with a controller (16) for controlling an active function, a pill memory (18) for storing information about the active function of the arrangement, a communicator (20) for receiving control signals for controlling the active function and for transmitting, and a tamper resistant bitstring (22) containing unique identification information (22a) for uniquely identifying the pill and secret information (22b) for encrypting communication via the communicator; identifying the pill from outside the subject by reading the identification information via the communicator; authenticating permission to operate the controller to perform the active function from outside the subject using the secret information via the communicator; issuing at least one command to the controller to perform the active function from outside the subject and via the communicator; and performing the active function as a result of the authenticating step and the issuing step.
14. A method according to claim 13, wherein the active function comprises releasing information from the pill memory.
15. A method according to claim 13, wherein the active function comprises releasing a treatment medium from the pill.
16. A method according to claim 13, wherein the active function includes releasing medicine from the pill and into the subject in compliance with selected dosage and timing profiles, the method including storing the profiles in the pill memory as the information about the active function, the active function including transmitting the profiles via the communicator.
17. A method according to claim 13, wherein the active function includes releasing medicine from the pill and into the subject in compliance with selected dosage and timing profiles, the method including comparing actual dosage released to dosage profile and comparing actual time of dosage released to timing profile to generate a compliance report, the active function including transmitting the compliance report.
18. A method according to claim 13, including using an enrolment processor (60) outside the shell, for reading the bitstring and for storing the unique identification information in an electronic master database that associates the identification information with a specific pill.
19. A method according to claim 13, including using a remote device (62) for reading the secret information for decrypting communication from the pill.
20. A method according to claim 13, wherein the bitstring is derived from a tamper resistant physical uncloneable function.
21. A system for reporting pill activity comprising: a pill inside of a patient having a means (16) for executing an active function inside of said patient and a communicator (20) for wirelessly sending information about the execution of the active function to a remote device (62) located outside of a patient; a remote device (62) for requesting the pill to wirelessly send said information to said remote device (62); and relay means (65) for receiving and relaying said information from said communicator to said remote device.
22. A system according to claim 21 , wherein said information is compliance information selected from the group consisting of dosage profile for medicine to be released, timing profile for medicine to be released, a dosage of medicine released by said pill, a time at which the medicine was released, and a comparison report comparing a dosage of medicine required to be taken to an amount or dosage of medicine actually released, and comparison data comparing a time at which the medicine is required to be released to a time at which the medicine was released.
23. A system according to claim 21 , wherein the pill further comprises means for intermittently verifying availability of said remote device.
24. A system according to claim 21 , wherein the pill further comprises means for intermittently verifying availability of said relay means.
25. A system according to claim 24, wherein the relay means further comprises means for intermittently verifying availability of said remote means.
26. A system according to claim 21 , wherein said pill further comprises a bitstring (22) containing unique identification information (22a) for uniquely identifying the pill.
27. A system according to claim 26, wherein the bitstring (22) also contains secret information (22b) for encrypting communication with the pill via the communicator (20), the arrangement including a remote device (62) for reading the secret information for decoding communication with the pill via the communicator (20).
28. A system according to claim 26, wherein the bitstring is derived from a tamper resistant physical uncloneable function embodied in at least one complementary metal oxide semiconductor layer.
29. A system according to claim 21 , wherein the remote device (62) requests the pill to wirelessly send said information to another terminal (67).
30. A system for reporting a patient's medicine dosage compliance comprising: a pill inside of a patient having a means (16) for releasing medicine inside of said patient and a communicator (20) for wirelessly sending compliance information with respect to ingestion of pill or release of said medicine; and a remote device (62) located outside of a patient for receiving said compliance information.
31. A system according to claim 30, further comprising relay means (65) for receiving and relaying said compliance information from said communicator to said remote device.
32. A system according to claim 30, wherein said compliance information is selected from the group consisting of time of ingestion of the pill, dosage profile for medicine to be released, timing profile for medicine to be released, a dosage of medicine released by said pill, a time at which the medicine was released, comparison data comparing a dosage of medicine required to be taken to an amount or dosage of medicine actually released, and comparison data comparing a time at which the medicine is required to be released to a time at which the medicine was released.
33. A system according to claim 30, wherein said pill further comprises a bitstring (22) containing unique identification information (22a) for uniquely identifying the pill.
34. A system according to claim 30, wherein the bitstring (22) also contains secret information (22b) for encrypting communication via the communicator (20), the arrangement including a remote device (62) for reading the secret information for decrypting the encrypted communication.
35. A system according to claim 30, wherein said remote device (62) requests the pill to wirelessly send said information.
36. A system according to claim 30, wherein said pill further comprises a sensor platform comprising at least one of a core body temperature sensor, a pH sensor, and a photodetector or light detector.
PCT/IB2008/051066 2007-03-30 2008-03-20 System and method for pill communication and control WO2008120128A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US90914607P 2007-03-30 2007-03-30
US60/909,146 2007-03-30

Publications (2)

Publication Number Publication Date
WO2008120128A2 true WO2008120128A2 (en) 2008-10-09
WO2008120128A3 WO2008120128A3 (en) 2009-01-08

Family

ID=39618839

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/IB2008/051066 WO2008120128A2 (en) 2007-03-30 2008-03-20 System and method for pill communication and control
PCT/IB2008/051170 WO2008120156A2 (en) 2007-03-30 2008-03-28 System and method for pill communication and control

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/IB2008/051170 WO2008120156A2 (en) 2007-03-30 2008-03-28 System and method for pill communication and control

Country Status (1)

Country Link
WO (2) WO2008120128A2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2471439A1 (en) * 2009-08-28 2012-07-04 Olympus Medical Systems Corp. Receiver system
WO2012158648A1 (en) * 2011-05-13 2012-11-22 Massachusetts Institute Of Technology Method and apparatus for delivering a substance
WO2014163746A1 (en) * 2013-03-13 2014-10-09 Motorola Mobility Llc Communicating via a body-area network
TWI562155B (en) * 2011-04-13 2016-12-11 Semiconductor Energy Lab Co Ltd Programmable lsi
WO2018175973A1 (en) * 2017-03-23 2018-09-27 Arizona Board Of Regents On Behalf Of Arizona State University Physical unclonable functions with copper-silicon oxide programmable metallization cells
US11244722B2 (en) 2019-09-20 2022-02-08 Arizona Board Of Regents On Behalf Of Arizona State University Programmable interposers for electrically connecting integrated circuits
US11935843B2 (en) 2019-12-09 2024-03-19 Arizona Board Of Regents On Behalf Of Arizona State University Physical unclonable functions with silicon-rich dielectric devices

Families Citing this family (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8836513B2 (en) 2006-04-28 2014-09-16 Proteus Digital Health, Inc. Communication system incorporated in an ingestible product
US8730031B2 (en) 2005-04-28 2014-05-20 Proteus Digital Health, Inc. Communication system using an implantable device
US8912908B2 (en) 2005-04-28 2014-12-16 Proteus Digital Health, Inc. Communication system with remote activation
US8802183B2 (en) 2005-04-28 2014-08-12 Proteus Digital Health, Inc. Communication system with enhanced partial power source and method of manufacturing same
US8847766B2 (en) 2005-04-28 2014-09-30 Proteus Digital Health, Inc. Pharma-informatics system
US9198608B2 (en) 2005-04-28 2015-12-01 Proteus Digital Health, Inc. Communication system incorporated in a container
US8956287B2 (en) 2006-05-02 2015-02-17 Proteus Digital Health, Inc. Patient customized therapeutic regimens
EP2087589B1 (en) 2006-10-17 2011-11-23 Proteus Biomedical, Inc. Low voltage oscillator for medical devices
EP2083680B1 (en) 2006-10-25 2016-08-10 Proteus Digital Health, Inc. Controlled activation ingestible identifier
EP2069004A4 (en) 2006-11-20 2014-07-09 Proteus Digital Health Inc Active signal processing personal health signal receivers
SG178740A1 (en) 2007-02-01 2012-03-29 Proteus Biomedical Inc Ingestible event marker systems
CN103066226B (en) 2007-02-14 2016-09-14 普罗透斯数字保健公司 There is the in-body power source of high surface area electrode
US9270025B2 (en) 2007-03-09 2016-02-23 Proteus Digital Health, Inc. In-body device having deployable antenna
WO2008112577A1 (en) 2007-03-09 2008-09-18 Proteus Biomedical, Inc. In-body device having a multi-directional transmitter
US8115618B2 (en) 2007-05-24 2012-02-14 Proteus Biomedical, Inc. RFID antenna for in-body device
ES2928197T3 (en) 2007-09-25 2022-11-16 Otsuka Pharma Co Ltd Intracorporeal device with virtual dipole signal amplification
KR101586193B1 (en) 2007-11-27 2016-01-18 프로테우스 디지털 헬스, 인코포레이티드 Transbody communication systems employing communication channels
MY161533A (en) 2008-03-05 2017-04-28 Proteus Digital Health Inc Multi-mode communication ingestible event markers and systems, and methods of using the same
CN102159134B (en) 2008-07-08 2015-05-27 普罗透斯数字保健公司 Ingestible event marker data framework
WO2010019778A2 (en) 2008-08-13 2010-02-18 Proteus Biomedical, Inc. Ingestible circuitry
KR101192690B1 (en) 2008-11-13 2012-10-19 프로테우스 디지털 헬스, 인코포레이티드 Ingestible therapy activator system, therapeutic device and method
US9659423B2 (en) 2008-12-15 2017-05-23 Proteus Digital Health, Inc. Personal authentication apparatus system and method
US9439566B2 (en) 2008-12-15 2016-09-13 Proteus Digital Health, Inc. Re-wearable wireless device
TWI503101B (en) 2008-12-15 2015-10-11 Proteus Digital Health Inc Body-associated receiver and method
JP2012514799A (en) 2009-01-06 2012-06-28 プロテウス バイオメディカル インコーポレイテッド Methods and systems for ingestion related biofeedback and individual pharmacotherapy
WO2010080764A2 (en) 2009-01-06 2010-07-15 Proteus Biomedical, Inc. Pharmaceutical dosages delivery system
WO2010111403A2 (en) 2009-03-25 2010-09-30 Proteus Biomedical, Inc. Probablistic pharmacokinetic and pharmacodynamic modeling
NZ596292A (en) 2009-04-28 2014-04-30 Proteus Digital Health Inc Highly reliable ingestible event markers and methods for using the same
EP2432458A4 (en) 2009-05-12 2014-02-12 Proteus Digital Health Inc Ingestible event markers comprising an ingestible component
TWI517050B (en) 2009-11-04 2016-01-11 普羅托斯數位健康公司 System for supply chain management
AU2011210648B2 (en) 2010-02-01 2014-10-16 Otsuka Pharmaceutical Co., Ltd. Data gathering system
BR112012025650A2 (en) 2010-04-07 2020-08-18 Proteus Digital Health, Inc. miniature ingestible device
TWI557672B (en) 2010-05-19 2016-11-11 波提亞斯數位康健公司 Computer system and computer-implemented method to track medication from manufacturer to a patient, apparatus and method for confirming delivery of medication to a patient, patient interface device
EP2642983A4 (en) 2010-11-22 2014-03-12 Proteus Digital Health Inc Ingestible device with pharmaceutical product
WO2012125425A2 (en) 2011-03-11 2012-09-20 Proteus Biomedical, Inc. Wearable personal body associated device with various physical configurations
WO2015112603A1 (en) 2014-01-21 2015-07-30 Proteus Digital Health, Inc. Masticable ingestible product and communication system therefor
US9756874B2 (en) 2011-07-11 2017-09-12 Proteus Digital Health, Inc. Masticable ingestible product and communication system therefor
CA2842952C (en) 2011-07-21 2019-01-08 Proteus Digital Health, Inc. Mobile communication device, system, and method
US9235683B2 (en) 2011-11-09 2016-01-12 Proteus Digital Health, Inc. Apparatus, system, and method for managing adherence to a regimen
MY182541A (en) 2012-07-23 2021-01-25 Proteus Digital Health Inc Techniques for manufacturing ingestible event markers comprising an ingestible component
US10045713B2 (en) 2012-08-16 2018-08-14 Rock West Medical Devices, Llc System and methods for triggering a radiofrequency transceiver in the human body
US8900142B2 (en) 2012-08-16 2014-12-02 Rock West Solutions, Inc. System and methods for locating a radiofrequency transceiver in the human body
ES2683709T3 (en) 2012-10-18 2018-09-27 Proteus Digital Health, Inc. Apparatus, system, and procedure for adaptively optimizing energy dissipation and diffusion energy in a power source for a communication device
TWI659994B (en) 2013-01-29 2019-05-21 美商普羅托斯數位健康公司 Highly-swellable polymeric films and compositions comprising the same
JP5941240B2 (en) 2013-03-15 2016-06-29 プロテウス デジタル ヘルス, インコーポレイテッド Metal detector device, system and method
JP6498177B2 (en) 2013-03-15 2019-04-10 プロテウス デジタル ヘルス, インコーポレイテッド Identity authentication system and method
JP6511439B2 (en) 2013-06-04 2019-05-15 プロテウス デジタル ヘルス, インコーポレイテッド Systems, devices, and methods for data collection and outcome assessment
US9796576B2 (en) 2013-08-30 2017-10-24 Proteus Digital Health, Inc. Container with electronically controlled interlock
CN110098914B (en) 2013-09-20 2021-10-29 大冢制药株式会社 Method, device and system for receiving and decoding signals
JP2016537924A (en) 2013-09-24 2016-12-01 プロテウス デジタル ヘルス, インコーポレイテッド Method and apparatus for use with electromagnetic signals received at frequencies that are not accurately known in advance
US10945635B2 (en) 2013-10-22 2021-03-16 Rock West Medical Devices, Llc Nearly isotropic dipole antenna system
US10084880B2 (en) 2013-11-04 2018-09-25 Proteus Digital Health, Inc. Social media networking based on physiologic information
US9854437B1 (en) 2014-06-13 2017-12-26 Verily Life Sciences Llc Apparatus, system and method for exchanging encrypted communications with an eye-mountable device
US10971260B2 (en) 2014-09-14 2021-04-06 Becton, Dickinson And Company System and method for capturing dose information
US10704944B2 (en) 2014-09-14 2020-07-07 Becton, Dickinson And Company System and method for capturing dose information
US11051543B2 (en) 2015-07-21 2021-07-06 Otsuka Pharmaceutical Co. Ltd. Alginate on adhesive bilayer laminate film
SG10202101937PA (en) 2016-07-22 2021-03-30 Proteus Digital Health Inc Electromagnetic sensing and detection of ingestible event markers
JP2019535377A (en) 2016-10-26 2019-12-12 プロテウス デジタル ヘルス, インコーポレイテッド Method for producing capsules with ingestible event markers

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002067449A2 (en) * 2001-02-20 2002-08-29 Ellis Michael D Modular personal network systems and methods
US20040122315A1 (en) * 2002-09-24 2004-06-24 Krill Jerry A. Ingestible medical payload carrying capsule with wireless communication
WO2004105125A2 (en) * 2003-05-26 2004-12-02 Koninklijke Philips Electronics N.V. Semiconductor device, method of authentifying and system
WO2005114524A2 (en) * 2004-05-19 2005-12-01 Sensitron, Inc. Personalized remote patient monitoring systems and methods
WO2006021932A1 (en) * 2004-08-27 2006-03-02 Koninklijke Philips Electronics, N.V. Electronically and remotely controlled pill and system for delivering at least one medicament
US20070106269A1 (en) * 2005-11-09 2007-05-10 Hood Leroy E Remotely controlled substance delivery device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002067449A2 (en) * 2001-02-20 2002-08-29 Ellis Michael D Modular personal network systems and methods
US20040122315A1 (en) * 2002-09-24 2004-06-24 Krill Jerry A. Ingestible medical payload carrying capsule with wireless communication
WO2004105125A2 (en) * 2003-05-26 2004-12-02 Koninklijke Philips Electronics N.V. Semiconductor device, method of authentifying and system
WO2005114524A2 (en) * 2004-05-19 2005-12-01 Sensitron, Inc. Personalized remote patient monitoring systems and methods
WO2006021932A1 (en) * 2004-08-27 2006-03-02 Koninklijke Philips Electronics, N.V. Electronically and remotely controlled pill and system for delivering at least one medicament
US20070106269A1 (en) * 2005-11-09 2007-05-10 Hood Leroy E Remotely controlled substance delivery device

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2471439A1 (en) * 2009-08-28 2012-07-04 Olympus Medical Systems Corp. Receiver system
EP2471439A4 (en) * 2009-08-28 2013-05-01 Olympus Medical Systems Corp Receiver system
US8786691B2 (en) 2009-08-28 2014-07-22 Olympus Medical Systems Corp. Biomedical receiver and sensor system for physiological monitoring of patients
TWI562155B (en) * 2011-04-13 2016-12-11 Semiconductor Energy Lab Co Ltd Programmable lsi
WO2012158648A1 (en) * 2011-05-13 2012-11-22 Massachusetts Institute Of Technology Method and apparatus for delivering a substance
WO2014163746A1 (en) * 2013-03-13 2014-10-09 Motorola Mobility Llc Communicating via a body-area network
US9319778B2 (en) 2013-03-13 2016-04-19 Google Inc. Communicating via a body-area network
WO2018175973A1 (en) * 2017-03-23 2018-09-27 Arizona Board Of Regents On Behalf Of Arizona State University Physical unclonable functions with copper-silicon oxide programmable metallization cells
US11127694B2 (en) 2017-03-23 2021-09-21 Arizona Board Of Regents On Behalf Of Arizona State University Physical unclonable functions with copper-silicon oxide programmable metallization cells
US11869852B2 (en) 2017-03-23 2024-01-09 Arizona Board Of Regents On Behalf Of Arizona State University Physical unclonable functions with copper-silicon oxide programmable metallization cells
US11244722B2 (en) 2019-09-20 2022-02-08 Arizona Board Of Regents On Behalf Of Arizona State University Programmable interposers for electrically connecting integrated circuits
US11935843B2 (en) 2019-12-09 2024-03-19 Arizona Board Of Regents On Behalf Of Arizona State University Physical unclonable functions with silicon-rich dielectric devices

Also Published As

Publication number Publication date
WO2008120156A2 (en) 2008-10-09
WO2008120156A3 (en) 2009-01-29
WO2008120128A3 (en) 2009-01-08

Similar Documents

Publication Publication Date Title
WO2008120128A2 (en) System and method for pill communication and control
EP2102775B1 (en) Intelligent discovery of medical devices by a programming system
US11871224B2 (en) System and method for authenticating wireless programming system and method for authenticating wireless programming devices in programmable medical systems
US7940933B2 (en) Secure telemetric link
US7930543B2 (en) Secure telemetric link
US7831828B2 (en) System and method for securely authenticating a data exchange session with an implantable medical device
US8102999B2 (en) Secure telemetric link
WO2018156386A1 (en) Facilitating trusted pairing of an implantable device and an external device
US20230364434A1 (en) Methods and devices for secure communication with and operation of an implant
US10325433B2 (en) Locking medication containers and methods of use thereof
US20100121315A1 (en) Personal accessory for use with a pill
US11289182B2 (en) Systems, devices and methods for securing and tracking drug dispensing devices
WO2008021920A2 (en) Secure telemetric link
EP3893722A1 (en) Enhanced authentication for imd communication
CA3228283A1 (en) Drug delivery system
CN117751412A (en) Over-the-air programming of sensing devices
CA3223078A1 (en) Over-the-air programming of sensing devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08719789

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08719789

Country of ref document: EP

Kind code of ref document: A2