WO2008134738A1 - Plateforme de collecte de données hétérogènes et d'exploration de données - Google Patents

Plateforme de collecte de données hétérogènes et d'exploration de données Download PDF

Info

Publication number
WO2008134738A1
WO2008134738A1 PCT/US2008/062052 US2008062052W WO2008134738A1 WO 2008134738 A1 WO2008134738 A1 WO 2008134738A1 US 2008062052 W US2008062052 W US 2008062052W WO 2008134738 A1 WO2008134738 A1 WO 2008134738A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
computer
causing
code means
program code
Prior art date
Application number
PCT/US2008/062052
Other languages
English (en)
Inventor
Demetrios Sapounas
Original Assignee
Senior Vitals. Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/010,447 external-priority patent/US20080294020A1/en
Priority claimed from US12/068,285 external-priority patent/US20080287748A1/en
Priority claimed from US12/068,969 external-priority patent/US20080288500A1/en
Application filed by Senior Vitals. Inc. filed Critical Senior Vitals. Inc.
Publication of WO2008134738A1 publication Critical patent/WO2008134738A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/954Navigation, e.g. using categorised browsing

Definitions

  • This invention is generally directed to systems and methods for data collection, data processing, analysis and mining of data obtained from heterogeneous and disparate systems and devices.
  • the invention provides a framework and an open interface for communication and integration of data received from heterogeneous devices, whether those are wireless or physically connected to a network.
  • the invention provides for analysis and mining of the data, by defining operations and transformations on the data. This lends to realizing value from the data, supporting the purposes for which the data was collected.
  • This invention has no limitation to the number or nature and location of the devices used for data collection, and thus, can scale to accommodate any number, resulting in higher accuracy, increased functionality and more data for data mining purposes.
  • Data processing is a well-established art in the computer field. It refers to the processing of the actual raw data and it is customary to define a set of transformations on that data, to serve a specific purpose. This is accomplished through computer systems, custom and off-the-shelf algorithms (computer programs) and possibly database systems. The resulting process is defined by a data flow and processes at various steps of the data flow and produces the results defined by the requirements.
  • aspects of the present invention provide an open and standards-based computing architecture and methods for collecting, storing, processing/analyzing, securely transmitting and presenting data.
  • the described systems are designed such that they can serve multiple constituencies, ranging from scientists and researchers to business professionals and consumers.
  • aspects of the present invention are directed toward decision support computer systems and application programs for collecting, analyzing, storing, and displaying in a user-friendly interface, heterogeneous data.
  • aspects of the present invention include the aggregation of such data from numerous remote collection points by receiving data transmitted over computer networks.
  • An open interface is defined, which enables the receipt and processing of data irrespective of the source.
  • aspects of the present invention also include the dissemination of data through similar methods.
  • the architecture consists of a number of networked computer systems, each configured to perform a specific set of functions. No system by itself is capable of providing the functionality and capabilities described herein; only the collection of all systems in the defined architecture can produce the desired results.
  • the architecture may consist of commercial off-the-shelf (COTS) network and computer systems (hardware) and a collection of custom and COTS computer programs (software).
  • Custom software may define the data flows and operations on the data that achieve the objectives of this concept. This custom software may collect the data from remote collection points, process and store it in a data warehouse, thereby making the data easily accessible for online and batch processing. Analytical processing on the data is also performed to uncover relationships and trends hidden in the aggregate data, and also defines the methods of presenting and communicating the findings to human beings through a user- friendly interface.
  • COTS commercial off-the-shelf
  • software software
  • Custom software may define the data flows and operations on the data that achieve the objectives of this concept. This custom software may collect the data from remote collection points, process and store it in a data warehouse, thereby making the data easily accessible for online and batch processing. Analytical processing on the data is also performed to uncover relationships and trends hidden in the aggregate data, and also defines the methods of presenting and communicating the findings to human beings through
  • Another advantage of aspects of the present invention is the described aggregation of raw and processed data from disparate collection points and processes for transforming the data and presenting it in a user-friendly interface to support analysis and decision making.
  • Another advantage of aspects of the present invention is a decision support system to be used by business users and consumers in the process of reaching conclusions derived from the underlying data.
  • Yet another advantage of aspects of the present invention is an analytical environment for raw and processed data analysis, which contributes to research and development studies and advances for scientific and business purposes.
  • FIG. 1 is a high-level depiction of a system architecture according to an exemplary aspect of the present invention.
  • FIG. 2 presents an exemplary system diagram of various hardware components and other features, for use in accordance with an implementation of aspects of the present invention.
  • FIG. 3 is a high-level data and operational flow chart according to an exemplary aspect of the present invention.
  • FIG. 4 is an operational data analysis flow chart according to an exemplary aspect of the present invention.
  • FIG. 5 is a data analysis and data mining flow chart according to an exemplary aspect of the present invention.
  • FIG. 6 is a high-level depiction of a system architecture according an exemplary aspect of the present invention.
  • FIG. 7 is a high-level depiction of a system architecture according an exemplary aspect of the present invention.
  • FIG. 8 is a high-level depiction of a system architecture according an exemplary aspect of the present invention.
  • FIG. 9 is a high-level depiction of a system architecture according an exemplary aspect of the present invention.
  • FIG. 10 is a high-level depiction of a system architecture according an exemplary aspect of the present invention.
  • FIG. 1 A general depiction of the architecture is provided in Figure 1. This represents the primary hardware components of the architecture.
  • the system architecture 100 defines two methods of communicating with external devices and users: one through the Internet 102, which is used for incoming data from the collection devices and for providing user access to the data; and one through a wireless network 104, which is used for outgoing alerts and other notification messages destined for subscribers, call centers and other destinations.
  • network 104 may be cellular networks (CDMA, GSM and others), ZigBee (802.15.4), Wi-Fi (802.1 Ix) 1 ANT, Bluetooth, and Ultra Wide Band, among others.
  • firewall 106 configured such that only authorized connections can gain access to the systems and data.
  • the purpose of the firewall 106 is to provide security and restrict unauthorized access to the systems and client data.
  • Behind the firewall 106 there is also an intrusion detection system (IDS), not shown in Figure 1 , which provides another defense barrier against unauthorized access.
  • IDS intrusion detection system
  • the system architecture 100 represents a typical multi-tier environment, depicted here as having three tiers, where different functions and different levels of control are implemented at each tier.
  • the first tier represents outward facing functions.
  • These include web servers 108 for the presentation layer of the application and the subscriber portal.
  • the web servers 108 enable subscribers to authenticate, manage subscriptions, define profiles, and gain access to the collected data and the reporting capabilities.
  • Another component of this tier is email servers 110, used for communicating with subscribers and business partners.
  • Data receipt servers 112 are an important component of this tier and of the whole architecture 100. This may be where the open interface is published and where data is received for follow-on processing.
  • This tier may also contain the alerts servers 114, which may construct and transmit alerts based on a combination of analysis on a subscriber's data and corresponding personalized profile settings. Among others transmission of alerts may be accomplished primarily through cellular connections, though other protocols like wireless, voice over Internet protocol (IP) (VoIP), ZigBee (802.15.4), Cellular (CDMA, GSM and others), Wi-Fi (802.11x), ANT, Bluetooth, and Ultra Wide Band, among others.
  • IP voice over Internet protocol
  • ZigBee 802.15.4
  • CDMA Code Division Multiple Access
  • GSM Global System for Mobile communications
  • Wi-Fi 802.11x
  • ANT Bluetooth
  • Ultra Wide Band Ultra Wide Band
  • the second tier of the architecture 100 may consist of application servers 116 responsible for performing the majority of processing on the data and responding to requests coming from the previous tier.
  • a set of application servers 116 may be assigned to perform analysis of incoming data and generate any alerts based on the analysis, plus process subscriber requests for online analytics and data presentation. This may effectively be the decision support element of the architecture 100, which among other things may empower subscribers to formulate action plans based on an analysis of the collected data.
  • Another set of application servers 118 may be responsible for aggregating all the data, normalising it and preparing the data for storage in the data warehouse and for analysis, whether online or offline (batch).
  • a third set of application servers 120 may be responsible for all the data processing and data analytics.
  • the third tier of the architecture 100 contains the data collected, which may be housed in a data warehouse.
  • database servers 122 define data models for data storage and retrieval and the access point into the data.
  • the security level may also be the highest, to safeguard and detect against unauthorized access.
  • the system architecture 100 describes a number of servers, which in effect are computer systems similar to the block diagram, in Figure 2, depicting various computer system components for use with an exemplary implementation of a data collection, analysis, storage, presentation, distribution, and communications system, in accordance with aspects of the present invention.
  • the computer architecture of aspects of the present invention may be implemented using hardware, software, or a combination thereof, and may be implemented in one or more computer systems or other processing systems.
  • One aspect of the present invention is directed toward one or more computer systems capable of carrying out the functionality described herein.
  • An example of such a computer system 100 is shown in FIG. 2.
  • the computer system 200 includes one or more processors, such as processor 204.
  • Processor 204 is connected to a communications infrastructure 202 (e.g., a communications bus, cross-over bar, or network).
  • a communications infrastructure 202 e.g., a communications bus, cross-over bar, or network.
  • Computer system 200 can include a display interface 208 that forwards graphics, text, and other data from the communication infrastructure 202 (or from a frame buffer not shown) for display on display unit 210.
  • Computer system 200 also includes a main memory 206, preferably random access memory (RAM), and may also include a secondary memory 212.
  • the secondary memory 212 may include, for example, a hard disk drive 214 and/or a removable storage drive 216, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc.
  • the removable storage drive 216 reads from and/or writes to a removable storage unit 218 in a well known manner.
  • Removable storage unit 218 represents a floppy disk, magnetic tape, optical disk, etc. which is read by and written to by removable storage drive 216.
  • the removable storage unit 218 includes a computer usable storage medium having stored therein computer software and/or data.
  • secondary memory 212 may include other similar devices for allowing computer programs or other instructions to be loaded into computer system 200.
  • Such devices may include, for example, a secondary removable storage unit 222 and an interface 220. Examples of such may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an erasable programmable read only memory (EPROM), or programmable read only memory (PROM)) and associated socket, and other secondary removable storage units 222 and interfaces 220, which allow software and data to be transferred from the secondary removable storage unit 222 to computer system 200.
  • a program cartridge and cartridge interface such as that found in video game devices
  • EPROM erasable programmable read only memory
  • PROM programmable read only memory
  • Computer system 200 may also include a communications interface 224.
  • Communications interface 224 allows software and data to be transferred between computer system 200 and external devices. Examples of communications interface 224 may include a modem, a network interface (such as an Ethernet card), a communications port, a Personal Computer Memory Card International Association (PCMCIA) slot and card, etc.
  • Software and data transferred via communications interface 224 are in the form of signals 226 which may be electronic, electromagnetic, optical or other signals capable of being received by communications interface 224. These signals 226 are provided to communications interface 224 via a communications path (e.g., channel) 228. This channel 228 carries signals 226 and may be implemented using wire or cable, fiber optics, a telephone line, a cellular link, an radio frequency (RF) link and other communications channels.
  • RF radio frequency
  • computer program medium and “computer usable medium” are used to generally refer to media such as removable storage drive 216, a hard disk installed in hard disk drive 214, and signals 226. These computer program products provide software to computer system 200. The invention is directed to such computer program products.
  • Computer programs are stored in main memory 206 and/or secondary memory 212. Computer programs may also be received via communications interface 224. Such computer programs, when executed, enable the computer system 200 to perform the features of the present invention, as discussed herein. In particular, the computer programs, when executed, enable the processor 204 to perform the features of the present invention. Accordingly, such computer programs represent controllers of the computer system 200.
  • the software may be stored in a computer program product and loaded into computer system 200 using removable storage drive 216, hard drive 214 or communications interface 224.
  • the control logic when executed by the processor 204, causes the processor 204 to perform the functions of the invention as described herein.
  • the present invention is implemented primarily in hardware using, for example, hardware components such as application specific integrated circuits (ASICs).
  • ASICs application specific integrated circuits
  • the present invention is implemented using a combination of both hardware and software.
  • FIG. 1 provides a pictorial representation of the overall data flow 300, indicating where data transformations occur.
  • Block 302 may be only an entry point and represents the path used for receiving data collected and transmitted from a plurality of remote devices and sources.
  • Block 358 is both an entry and exit point, representing a user interface for user interaction with the system.
  • Two possible exit points are depicted by the "User Input” (block 358) and “transmit to Mobile Device” (block 356).
  • Block 358 was described previously.
  • Block 356 may be only an exit point and may be used for transmitting information to remote devices, which may include among other devices smart cell-phones, and personal digital assistants (PDAs).
  • PDAs personal digital assistants
  • Transmission point is provided. As stated, this may be the entry point for receiving data transmitted from remote data collection devices.
  • the first check performed, in step 304 is to determine whether it is encrypted or not. It is important to encrypt transmitted data for increased security. If the data is encrypted, the proper decryption algorithms in step 306 are used to decrypt the data so it can be processed further. If the data is not encrypted, then the decryption step 306 is bypassed.
  • the next step is to identify the data in step 308.
  • Identification means to create an association between the transmitted message and the data source. Since the data is transmitted without specific identifying information other than an ID code, this ID is used to identify the class of data collection device and thus the class of data contained in the message. By using the ID code for transmitted data and by only connecting data, such as medical data, with personal identification material after receipt in the system, confidential information can be further protected.
  • the next step is to parse the message information and extract the data contained in the message in step 310, for further processing. Parsing refers to the process of traversing the message definition and fields, to extract the respective values.
  • Messages are defined through an extensible markup language (XML) schema. This XML schema may be published so that any data collection and transmission source can send information to the platform, described in an aspect of the present invention, as long as such information is transmitted in messages conforming to the XML schema. Among other things, this will allow the system to collect data from multiple types of remote devices from multiple manufacturers.
  • XML extensible markup language
  • the data flow 300 may split into two separate paths, each describing a different use for the data.
  • One path may directly support individual subscriber operations and the other may address the needs for broader analytical processing and data warehousing.
  • First, aspects of a subscriber support operation data flow are described.
  • step 308 the association between the received data and a source has been established in step 308.
  • the computer programs resident on system architecture 100 may process the data elements in association with a data class (weather, financial, entertainment, medical, etc.), and the time span for the data. This then enables storing the data in the operational database in step 330 for follow-on analysis.
  • a data class weather, financial, entertainment, medical, etc.
  • Figure 4 provides an expanded detail of representative elements of the operational analysis data flow.
  • the Analysis of the data is controlled by the Operational Data Analyses processes in step 332, which may operate on the respective data classes by invoking the respective analysis algorithms.
  • Figure 4 presents five exemplary data/information classes: weather, financial, sports, medical and entertainment.
  • the data classes handled by the operational analysis process since the XML schema can be used for defining the data class.
  • weather analysis in step 400 may process the weather data received and updates the current and future information, based on this data. This analysis is performed based on location and time stamp information, plus algorithms for compiling a current state and future prediction for a particular locale.
  • Financial data analysis in step 402 may process the data, based on the subclasses of this data.
  • the financial data class may represent a large set of data classes, including stock market, interest rates, commodities, and associated news.
  • the analysis operates on the sub-classes of this data and provides aggregates and subclass specific views.
  • sports data in step 404 may also define a number of subclasses, identified by specific sports.
  • the analysis operates on the respective subclasses and compiles the received data so that both aggregate and detailed views are available.
  • Detailed views are defined by the data subclasses, i.e. the individual sports categories.
  • Medical data in step 406 may represent multi-faceted data and subclasses, many of which have specific requirements including security/privacy, accuracy and timeliness, plus may be governed by Government regulations.
  • Subclasses of medical data may include general market information and studies, but it may also include data associated with individuals.
  • the latter class of data may represent information collected due to wellness activities and monitoring, where individuals collect such data during the course of regular activities designed to maintain and/or improve their state of health and conditioning.
  • the medical data may be either or a combination of ambient temperature, skin temperature, humidity, heart rate, physical activity, movement, location, blood pressure, blood-oxygen level, respiration, or core body temperature of a system user.
  • Another use is for monitoring the general well-being of individuals who may be of frail health and whose data may be accessed by care givers and/or medical professionals. The operational analysis of such individual data would provide an up- to-date situational awareness for the respective individual.
  • Entertainment data in step 408 may also consist of a number of subclasses, as defined by the various entertainment categories and further defined by locale and time span. The analysis of this class of data operates on the subclasses and on the aggregate.
  • step 332 After the analysis of the data is performed in step 332, the data flow continues, as shown in Figure 3. At this point the analysis results may be prepared for presentation and communication. For presentation purposes multiple views are possible, including Historical/Running View in step 334, which includes data for the time period defined in the user profile and Custom View in step 336, which includes data (classes and subclasses) defined by the user. The rest of the data flow 300 is driven by the user's level of service and profile.
  • One of the options is for a user to receive notifications to wireless devices in step 338, for user-defined triggers in the data, based on trigger parameters defined in the user profile. Thus, if receiving such notifications is not part of the service level for a user, no further action is taken in step 340 and the data flow terminates. If the service level includes wireless notifications, then the processing continues and the notification messages are created and sent.
  • the system 100 checks whether there are triggers in step 342, to warrant an immediate transmission. For example, a subscriber may define a trigger as a heart rate falling below a pre-defined rate. The incoming collected data is analyzed to determine if the data includes data meeting the definition. If that is not the case, then the system 100 checks in step 344 whether it is time to initiate a transmission, based on a predefined transmission schedule. If it is not time for transmission, the system 100 will wait in step 346 until the next transmission time or an out of sequence trigger event, to start the transmission process again.
  • a trigger for example, a subscriber may define a trigger as a heart rate falling below a pre-defined rate.
  • the incoming collected data is analyzed to determine if the data includes data meeting the definition. If that is not the case, then the system 100 checks in step 344 whether it is time to initiate a transmission, based on a predefined transmission schedule. If it is not time for transmission, the system 100 will wait in step 346 until the next transmission time or an out of sequence
  • step 348 the pertinent data is aggregated in step 348. This includes the data readings and the analysis results, so that the user receiving this information can formulate an educated decision as to the next steps and actions to be taken. For example, if medical data is collected, the user may determine if the transmission received is an emergency or if it merely warrants a check up or further monitoring of the subscriber.
  • the system 100 may check, in step 352, to see whether the user device can handle encrypted data, which is driven by the user profile.
  • the user may define whether encrypted data transmissions can be processed properly, and also the encryption algorithm to be used. Thus, if encryption is to be used, the data is encrypted in step 352, before going to the next step.
  • the message itself may be assembled for transmission.
  • the message envelope and header information are wrapped around the content, so that the transmission protocol to be used for sending the message can accurately route the message to the intended recipient.
  • the message may be transmitted through the network in step 356, to arrive at the defined destination. This may also be one of the two exit points from the data flow.
  • the system has established associations between the received data the individual data sources, and individual subscribers in step 308.
  • Some data classes, most notably medical data contain associations to individual subscribers and other persons who the data belong.
  • identifying information such as name, address, phone number, SSN or other identification numbers, may be removed from the data, leaving only the raw data, source device information and the demographic data.
  • the computer programs may conduct group analysis of the anoymised data examining the data to determine the collection source, as it relates to the type of data, what it measures (temperature, motion, heart rate, etc.), the time period covered, as in time of day, and separate the data into those categories in step 316. This then enables storing, also in step 316, the data in the analytical data warehouse 318 for follow-on analysis.
  • Other data classes may not require anonymisation. Such classes include, among others, financial, weather and sports data.
  • Analytical data processing 320 defines the operations on the anonymised data, to support non-consumer uses, including product enhancements, research and development, population and age studies, and drug discovery.
  • the analytical data processing in step 320 includes operations and transformations on the data in the data warehouse and makes use of complex data schemas and analytical stores (also referred to as data cubes), plus complex computer algorithms.
  • Figure 5 depicts only a small subset of the possible set of analytical processing.
  • Trend Analysis may be used for identifying patterns in the anonymised data over time, with the objective of associating trends to certain events.
  • the trend analysis can define operations on a single source or multiple data sources, and also combine all available data to reach results contributing to decision support.
  • the Trend Analysis data flow in Figure 5 depicts analysis based on the financial class of data (block 500) and further demonstrates the analysis based on stock market data (block 526), for a single security (block 534) or combination of securities (block 536). Trend analysis may also be done for an individual's collected data, which may be accessed by the subscriber.
  • Data Fusion could also be used for trend analysis, which makes use of multiple data subclasses, including many more than those shown in the figure 5. It is worth noting that it is not the intent of this document to provide an exhaustive listing of all possible data classes and subclasses, rather only a representative sample. The reader can easily extrapolate that additional data classes and subclasses would be analysed through similar data flows and underlying algorithms.
  • the Source Analysis data flow is also expanded to demonstrate analysis on the Medical or Wellness class of data, as shown in block 324.
  • Block 502 further is defined by more data subclasses, a representative sample of which is depicted in Figure 5.
  • Data Fusion could also be used on this subclass of data, which would result in a more complete picture of the overall state of medical condition and/or wellness, further annotated by demographic and time information.
  • Custom Analysis allows a user performing analysis to define the data classes and analysis operations on those classes.
  • analysis of demographic data is shown in block 504, defined as a set of operations on the data, from the demographic data perspective.
  • Demographic analysis starts with one or multiple demographic data classes as the base of analysis and then adds additional data points, from the available set of data.
  • analysis could start based on age, as shown in block 506, or culture, as shown in block 508, use all available data classes and then expand by introducing additional data from other data classes, like one of medical subclasses, time information, prescription drug information, etc.
  • the system may further include a user interface to allow outside access to the anonymised data.
  • a drug company may want to access the continually collected data as part of a drug study.
  • the user interface may further provide the ability for a subscriber to the anonymised data to define their own algorithms for the analysis of collected data.
  • Each subscriber to the anonymised data aspect of the system may be given access to at least a part of the collected data.
  • the second entry point to the data flow is through User Input as shown in block 358, which is also an exit point, since information is returned back to the user.
  • This is also an interactive data flow.
  • the data flow is initialized by a user who accesses the secure web portal in step 360 to get information, perform analysis or some other action.
  • a user may be the monitored person/entity, a family member of a monitored person, a physician or caregiver of a monitored person, or a company or entity interested in the monitored entity. Access may be initialized through a secure web browser connection.
  • a user Once connected and authenticated to the site, a user has a number of options, including: Manage Subscription in step 366, Set/Edit Preferences in step 364, and View Subscribed Data in step 362.
  • a user can renew or cancel the service in step 368, set a different service level, or choose additional options.
  • a user effectively defines the profile to be used for data analysis. This includes settings and thresholds for triggers and the conditions activating them, notification preferences, notification list, contact information.
  • a user can also view the subscribed data in step 362. Since a user may have subscribed to multiple data classes and subclasses (data channels), access to the data and associated analyses is through the respective data channel, indicated in Figure 3 as Source 1 ... Source n, as shown in blocks 370a, 370b, ... 37On, respectively, and Custom View 1 ... Custom View n, as shown in blocks 372a, 372b, ... , 372n, respectively. Through those channels the user can access the underlying data and displays for the area of interest and can view current data and historical trends for each subscription channel, plus could use this information to adjust preferences, triggers and notification levels. Through this data flow, a user obtains a complete update on all subscribed data channels, aggregated and transmitted by the data collection sources. This results in situational awareness of the respective data channel at any given point in time and provides decision support for any follow-on actions.
  • Figure 6 illustrates system architecture 600 for collecting, analyzing, storing and displaying heterogeneous data, according to an implementation of aspects of the present invention.
  • System architecture 600 in one exemplary variation, includes a person 602 wearing a simple-to-put-on, lightweight sensor 604 attached to their body to collect the data, along with a body-wearable gateway device (BWGD) 606 to receive the collected data.
  • the collected data may include physiological data, movement data, positional data, and ambient data.
  • sensor 604 is an adhesive patch integrating several miniaturized sensors, which is attached to the body.
  • Sensor 604 includes a microprocessor, a miniaturized power supply, Personal Area Network (PAN) connectivity, sensor control, and some intelligence potential.
  • Sensor 604 obtains heterogeneous data, which can then be processed, encrypted, and aggregated for transmission through a PAN 608 to a gateway device 606 at p re-determined intervals.
  • the personal area network may be a commercial PAN, for example, ZigBee or Bluetooth. However, other personal area networks or even point-to-point communications are possible.
  • BWGD 606 is a wrist-wearable device integrating several other sensors, a microprocessor, a wireless Personal Area Network hub, software for control of sensors, connectivity and reporting, wireless Local Area Network (LAN) connectivity, cell phone connectivity, and software for intelligent decisions.
  • BWGD 606 processes and encrypts its sensor data, then aggregates this data with the incoming supplied data from the 604 sensor.
  • the microprocessor packages the aggregated data, for example, for transmissions through the LAN at pre-determined or pre-selected intervals.
  • the system architecture 100 is an open architecture which includes open standards for data and communication enabling communication with various sources.
  • other sensors and sensor suites, blocks 610-614 may join the personal area network 608, as illustrated in Figure 6. Therefore, any number of protocols may be used, the majority of which specify an operating frequency range. Other protocols may operate on a single frequency. Transmission protocols may include ZigBee (802.15.4), Cellular (CDMA, GSM and others), Wi-Fi (802.11x), ANT, Bluetooth, and Ultra Wide Band, among others.
  • FIG. 7 illustrates system architecture 700 for collecting, analyzing, storing and displaying heterogeneous data, according to a variation of aspects of the present invention.
  • BWGD 606 may be in wireless communication with a wireless LAN 710 for connectivity to the internet 716 to transmit data and voice. Additionally, BWGD 606 may be connected to another source, for example, a cell phone tower 720 to transmit data and voice.
  • BWGD 606 when person 602 is outside a home or a building, BWGD 606 may be in wireless communication with a cell phone tower 720 for transmission of data and voice. In addition, when person 602 is outside the home or a building, BWGD 606 may be connected to another source, for example, a LAN 710, for transmission of data and voice.
  • Figure 8 illustrates system architecture 800 for collecting, analyzing, storing and displaying heterogeneous data, according to a variation of aspects of the present invention.
  • person 802 is connected to a wireless LAN 812 for connectivity to the internet 828 to transmit data and voice through the BWGD 806.
  • Person 802 can also be connected to the cell tower 832 through BWGD 806 to transmit data and voice.
  • wireless LAN 812 may be connected to a personal computer 816, router 826, stove sensors 818, motion detectors 820, smoke detector 824, a web cam 810, or the like. Additionally, router 826 may be connected to the wireless LAN 812, television 814, personal computer 816, the Internet 828, or the like. As will be appreciated by those skilled in the relevant art(s) after reading the description herein, the wireless LAN 812 may be in communication with one or more networked sets of servers and communication devices for collecting, analyzing, storing and displaying heterogeneous data of one or more persons 802.
  • FIG. 9 illustrates system architecture 900 for collecting, analyzing, storing and displaying heterogeneous data, according to aspects of the present invention.
  • an internet 918 is receiving data from different collection points.
  • internet 918 is receiving data from a person outside (block 906), a person at home (block 912), a person in the nursing home (block 914) and a person in the hospital (block 916).
  • the people mentioned in blocks 906- 916 may also be in communication with a cell phone/public switched network 910.
  • the Internet 918 is in wireless communication with a call center 904, where a live operator may respond to the alter trigger sent by a person in one of blocks 906-916 wearing a BWGD 606.
  • This alert may be used, for example, for emergency two-way voice communication between a person 906-912 and personnel at a call center 904.
  • a cell phone/public switched telephone network is in communication with a call center 904, where a live operator may respond to the alert trigger sent by person wearing a BWGD 606.
  • the Internet 918 is in communication with a web portal 908.
  • Web portal 908 may process, display, analyze, store, send alerts, set up billing and provide security for data sent from the Internet 918 in a user-friendly interface to support analysis and decision making. Additionally, web portal 908 may be in communication with personnel at a call center 904 and people connected to a cell phone/public switched network 910.
  • the web portal 908 is in communication with authorized persons 920, who may be a person being monitored, family members, caretakers, medical services provider, health care provider, or the like. Such communications may be through wireless communications to a mobile device (e.g., mobile telephone or the like) for display on a personal computer or other device. In an alternative variation, such communication may be between a wide or local area network (WAN or LAN) running a secure communications protocol (e.g., secure sockets layer (SSL)). In another variation, authorized persons 920 may be in communication with personnel at a call center 904 or personnel at emergency services 902.
  • WAN or LAN wide or local area network
  • SSL secure sockets layer
  • authorized personnel 920 may receive and interface with data from web portal 908, call center 904 and emergency services 902 using any processing device, including, but not limited to, a desktop computer, laptop, palmtop, workstation, set-top box, mobile telephone, personal data assistant (PDA), or the like.
  • any processing device including, but not limited to, a desktop computer, laptop, palmtop, workstation, set-top box, mobile telephone, personal data assistant (PDA), or the like.
  • Figure 10 illustrates system architecture 1000 for collecting, analyzing, storing and displaying heterogeneous data, according to a variation of aspects of the present invention.
  • a hospital system 1022 is in communication with web portal 1020. Hospital system 1022 may display the information received from web portal 1020, set up billing, or collaborate the data, for example.
  • physicians 1024 may be connected to a hospital system 1022, a web portal 1020 and a call center 1004. Such communications may be through wireless communications to a mobile device (e.g., mobile telephone or the like) for display on a personal computer or other device. In an alternative variation, such communication may be between a wide or local area network (WAN or LAN) running a secure communications protocol (e.g., secure sockets layer (SSL)).
  • WAN or LAN wide or local area network
  • SSL secure sockets layer
  • physicians 1024 may receive and interface with data from web portal 1020, call center 1004 and hospital systems 1022 using any processing device, including, but not limited to, a desktop computer, laptop, palmtop, workstation, set-top box, mobile telephone, personal data assistant (PDA), or the like.
  • any processing device including, but not limited to, a desktop computer, laptop, palmtop, workstation, set-top box, mobile telephone, personal data assistant (PDA), or the like.

Abstract

L'invention concerne des systèmes, procédés et produits-programmes informatiques pour collecter, mémoriser, traiter/analyser, transmettre en toute sécurité et présenter des données hétérogènes dans une architecture de système ouvert. La collecte de données hétérogènes à partir de nombreux points de collecte à distance et l'agrégation des données collectées pour un affichage sur une interface conviviale sont prévues. Les systèmes, procédés et produits-programmes informatiques présentés ici, selon des aspects variables, se prêtent facilement à des modifications de composant et de fonctionnalité incrémentales qui permettent une augmentation des sources de données, de la précision, de la fiabilité et de l'utilité des informations collectées, consolidant en outre la spécificité et la convivialité des procédés et des produits-programmes informatiques.
PCT/US2008/062052 2007-04-30 2008-04-30 Plateforme de collecte de données hétérogènes et d'exploration de données WO2008134738A1 (fr)

Applications Claiming Priority (24)

Application Number Priority Date Filing Date Title
US92408307P 2007-04-30 2007-04-30
US60/924,083 2007-04-30
US92412507P 2007-05-01 2007-05-01
US60/924,125 2007-05-01
US610007P 2007-12-19 2007-12-19
US609407P 2007-12-19 2007-12-19
US609507P 2007-12-19 2007-12-19
US609807P 2007-12-19 2007-12-19
US609707P 2007-12-19 2007-12-19
US609907P 2007-12-19 2007-12-19
US61/006,094 2007-12-19
US61/006,097 2007-12-19
US61/006,100 2007-12-19
US61/006,095 2007-12-19
US61/006,099 2007-12-19
US61/006,098 2007-12-19
US12/010,447 2008-01-25
US12/010,447 US20080294020A1 (en) 2007-01-25 2008-01-25 System and method for physlological data readings, transmission and presentation
US12/068,285 2008-02-05
US12/068,285 US20080287748A1 (en) 2007-02-05 2008-02-05 System and method for physiological data readings, transmission and presentation
US697708P 2008-02-08 2008-02-08
US61/006,977 2008-02-08
US12/068,969 2008-02-13
US12/068,969 US20080288500A1 (en) 2007-02-13 2008-02-13 Physiological data processing architecture for situation awareness

Publications (1)

Publication Number Publication Date
WO2008134738A1 true WO2008134738A1 (fr) 2008-11-06

Family

ID=39926133

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/062052 WO2008134738A1 (fr) 2007-04-30 2008-04-30 Plateforme de collecte de données hétérogènes et d'exploration de données

Country Status (1)

Country Link
WO (1) WO2008134738A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9377452B2 (en) 2007-11-13 2016-06-28 Roche Diagnostics Operations, Inc. Method for monitoring the use of a consumable in a disposable design in one or more analyzers
US9886560B2 (en) 2008-12-12 2018-02-06 Roche Diagnostics Operations, Inc. Process for the management of data of analysis devices, analysis device and system comprising analysis devices

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040164961A1 (en) * 2003-02-21 2004-08-26 Debasis Bal Method, system and computer product for continuously monitoring data sources for an event of interest
US20050250440A1 (en) * 2000-06-30 2005-11-10 Zhou Peter Y Systems and methods for monitoring and tracking

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050250440A1 (en) * 2000-06-30 2005-11-10 Zhou Peter Y Systems and methods for monitoring and tracking
US20040164961A1 (en) * 2003-02-21 2004-08-26 Debasis Bal Method, system and computer product for continuously monitoring data sources for an event of interest

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9377452B2 (en) 2007-11-13 2016-06-28 Roche Diagnostics Operations, Inc. Method for monitoring the use of a consumable in a disposable design in one or more analyzers
US9886560B2 (en) 2008-12-12 2018-02-06 Roche Diagnostics Operations, Inc. Process for the management of data of analysis devices, analysis device and system comprising analysis devices

Similar Documents

Publication Publication Date Title
US20090019065A1 (en) Heterogeneous data collection and data mining platform
US20080294020A1 (en) System and method for physlological data readings, transmission and presentation
US20080288500A1 (en) Physiological data processing architecture for situation awareness
CN110140364B (zh) 实时定位平台信标协议系统和方法
Konstantas et al. Mobihealth-innovative 2.5/3G mobile services and applications for health care
Tsui et al. Technical description of RODS: a real-time public health surveillance system
US20170048360A1 (en) Method and system for processing machine-to-machine sensor data
Ackerman et al. Developing next-generation telehealth tools and technologies: patients, systems, and data perspectives
US10535423B2 (en) Module and system for medical information management
US9367822B2 (en) Supervision and data cyber superhighway system, method and medium
US10049368B2 (en) Systems, methods and computer program products for providing compliant messaging services
Alshammari The internet of things healthcare monitoring system based on MQTT protocol
Tripathi et al. Sms: A secure healthcare model for smart cities
AU2016261830A1 (en) Distributed system architecture for continuous glucose monitoring
Siau et al. Mobile healthcare informatics
US20090030967A1 (en) Personal wearable microserver
Famá et al. An IoT-based interoperable architecture for wireless biomonitoring of patients with sensor patches
Mouttham et al. Event-driven data integration for personal health monitoring
Su et al. A novel framework for a remote patient monitoring (RPM) system with abnormality detection
Li et al. Developing an active emergency medical service system based on WiMAX technology
WO2008134738A1 (fr) Plateforme de collecte de données hétérogènes et d'exploration de données
Mendonça et al. An IoT-based healthcare ecosystem for home intelligent assistant services in smart homes
Gupta et al. Telemedicine: A brief analysis
Gopinath et al. Design of Fog Computing System For Health Care Applications Based On IoT
Rao et al. AIoT and Big Data Analytics for Smart Healthcare Applications

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08754969

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08754969

Country of ref document: EP

Kind code of ref document: A1