WO2019060367A1 - Apparatus and method for recognition of suspicious activities - Google Patents

Apparatus and method for recognition of suspicious activities Download PDF

Info

Publication number
WO2019060367A1
WO2019060367A1 PCT/US2018/051669 US2018051669W WO2019060367A1 WO 2019060367 A1 WO2019060367 A1 WO 2019060367A1 US 2018051669 W US2018051669 W US 2018051669W WO 2019060367 A1 WO2019060367 A1 WO 2019060367A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
medication
mouth
patient
indications
Prior art date
Application number
PCT/US2018/051669
Other languages
French (fr)
Inventor
Adam Hanina
Daniel Glasner
Li Zhang
Chloe CHAH
Original Assignee
Adam Hanina
Daniel Glasner
Li Zhang
Chah Chloe
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Adam Hanina, Daniel Glasner, Li Zhang, Chah Chloe filed Critical Adam Hanina
Priority to EP18858751.3A priority Critical patent/EP3685390A4/en
Priority to AU2018335288A priority patent/AU2018335288B2/en
Publication of WO2019060367A1 publication Critical patent/WO2019060367A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/188Capturing isolated or intermittent images triggered by the occurrence of a predetermined event, e.g. an object reaching a predetermined position
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/0002Inspection of images, e.g. flaw detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/20Analysis of motion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/20ICT specially adapted for the handling or processing of patient-related medical or healthcare data for electronic clinical trials or questionnaires
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H20/00ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
    • G16H20/10ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • G16H40/60ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices
    • G16H40/67ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/20ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/30ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for calculating health indices; for individual health risk assessment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/12Classification; Matching

Definitions

  • the subject matter described in this application generally relates to patient compliance to medication administration protocol scenarios including ingestion of medication, and more particularly to an apparatus and method for the identification of suspicious or purposefully malicious activity on the part of the patient, where the patient is purposefully not properly administering their medication.
  • the subject matter described in this application is directed to a system and method for detecting suspicious activity of a user (hereafter also referred to as a patient), and to thwart users who purposefully do not take their medication.
  • the system presents an advanced mechanism for teaching a system to acquire and learn what to look for related to suspicious activity, and further includes a mechanism for analyzing input captured video to determine suspicious activity.
  • the system may also interact in real-time with the patient when something is identified as incorrect, wrong or suspicious and either prompt a different action or raise an alert and recommend an intervention by a healthcare provider.
  • a motion capture procedure for capturing patient motion data related to the administration of pill or film based oral medications, or injectable, inhaler-based, other non- pill based medication, or any other form of patient administration task that may be performed, may be utilized.
  • Other capture sensors may further be utilized, including range (depth) sensors, hyperspectral sensors, such as infrared or near infrared sensor, and the like. Such sensors may help to localize and segment the face and hand, improving the ability to discern motion and other attributes of a video and other data capture. Use of such other sensors may also help to identify material properties of an item, such as a medication pill, thus assisting in confirming the pill's authenticity.
  • a method and apparatus may be provided for analyzing the captured patient motion data to provide feedback to the user and/or to determine a number of times the user performs a suspicious action.
  • the system can detect suspicious action and provide feedback to the user in near real-time, and importantly, in time sufficient to allow for the feedback to be useful to the subject while the subject is still performing the activity.
  • the patient performance information may be analyzed asynchronously to determine other features of data that may suggest a malicious intent on the part of the patient.
  • Figure 1 is a flow chart diagram depicting a method for identifying suspicious activities of a patient administering a medication
  • Figure 2 is a flowchart diagram depicting a method for capturing a video sequence of a patient;
  • Figure 3 is a table describing monitored elements for determining one or more actions;
  • Figure 4 is a timing chart depicting timing of monitoring of one or more items to be monitored.
  • Figure 5 is a depiction of a method for calculating a likelihood of cheating by a patient.
  • Figure 6 is a block diagram depicting the details of an exemplary hardware configuration for implementing the system and method described in this application.
  • Figure 7 is a block diagram depicting additional details of an exemplary hardware configuration for implementing the system and method described in this application.
  • Compliance and medication adherence technologies can increase the statistical power of clinical trials. Through the use of such technology, clinical events can be precisely linked to medication use history. Captured data can be linked to other sources such as EDC, patient diaries and data collected by the physician. Technologies can create many possibilities for remote visits and data capture. While smart packaging technologies exist such as RFID- enabled computer chip technology, smart blister packs and MEMS caps (microprocessor in a bottle cap), they are: a) invasive and need to be physically attached to the medications; b) are non-conclusive regarding compliance - a patient may activate the technology without ingestion of the medication; c) remain largely un-adopted in clinical trials by the pharmaceutical and biotech companies due to their high cost; and d) take a longer time to implement.
  • information about a particular drug to be the subject of a clinical trial, to be employed in a public health or disease management situation, or the like, other medication administration program or prescription, or other patient self-administered medical task such as performing a home based urine test or the like may be provided in a hardware-based database 105.
  • Existing industry medication information databases 110 are employed to access prescription, interaction, application, and other available information about any number of proposed prescription and non-prescription medications and their possible interaction with the clinical trial or other medications.
  • external patient medical records 115 may be used, and as will be described below, in conjunction with the industry medical information and a medical professional's prescribing expertise to confirm that a patient is a good candidate for such a clinical trial, or medication administration program.
  • This information may further include information related to typical elements of suspicious or malicious behavior. Such elements may be based upon the type of medication, method of medication administration, demographics or other information about the patient, other features, or a combination of these elements.
  • Suspicious activity information 118 is transferred to the system at this time as well, and as noted above may include one or more indications of patient movements or other actions that may indicate suspicious behavior on behalf of the patient, a malicious intent to trick the system, or actions of other high risk population.
  • the various embodiments of the present invention may also be provided to determine if a patient is performing an action or task correctly or if they are simply making a mistake.
  • a medication administration and ingestion or other medication regimen in accordance with the clinical trial or other prescription requirements such as in a public health, medical practice environment or the like may be prescribed and entered into the system of the invention at 120.
  • Such medication administration regimen may include one or more of ingesting or swallowing a pill, using an inhaler device, using an injectable medication device, employing a patch, sublingual administration, a cheek or other skin located medication administration device or the like.
  • the present invention may be applied to any patient administered procedure.
  • a particular prescription regimen may cause a set of user instructions, various training sequences and the like 125 to be generated and transmitted to an apparatus (e.g., the remote information capture apparatus 1000 of Figure 6) provided to a patient in accordance with an embodiment of the disclosure for access to the system.
  • instructions to be provided by the system i.e., instructions to be displayed on an apparatus such as the apparatus 1000 of Figure 6 and Figure 7) to the patient are predefined for each different prescription for which the system is to be applicable.
  • a healthcare provider, patient, or other individual may indicate the medication regimen to be administered by the patient to the system.
  • the system may provide a regimen (i.e.
  • training instructions and patient guidance for oral medication administration may be provided, while if other routes of administration are to be used, instructions for these routes may be provided.
  • training modules may be available for additional modules to be provided, such as a barcode reading module, questions to be presented to and answered by the subject, etc. In this manner, once the patient is assigned a protocol, all required regimens, training materials and interaction materials will be provided to the patient to allow for automated, proper training and administration assistance for the assigned protocol.
  • Such an apparatus may comprise a user device, such as a smart phone, a netbook, a laptop computer, a desktop computer, a tablet device, a free standing or built into a mirror or cabinet, or other computing appliance.
  • the apparatus includes a video and audio capture apparatus (e.g., a camera, a voice recorder, and/or a video capture device), and a video and audio analysis and transmission apparatus for transmitting the captured video/audio to another system or device.
  • the apparatus allows for the display of the user instructions to a patient, and allowing for the eventual capture, analysis and transmission of video, audio and other analysis information.
  • the apparatus can be considered as the patient facing portion of the system (e.g., the information capture and analysis system of Figure 6).
  • the patient can download and install a software application directed to a medication protocol on the apparatus.
  • the software runs on the apparatus (local user device) asynchronous to a back end system (e.g., the remote data and computing device 3000).
  • a back end system e.g., the remote data and computing device 3000.
  • user information and data captured by the apparatus is encrypted, stored, and transmitted to a back end system.
  • User information and data may be deleted after use.
  • Separate software runs on the back end system can perform additional analysis to determine suspicious activities of the patient over time, for example, and then providing data/information about the suspicious activities to a healthcare provider on browser-based dashboards.
  • the software When installing software on a user's own hardware system, it is preferred that the software detect and otherwise test or determine that the hardware attempting to be utilized by the patient is sufficient to implement the system and method described in this disclosure and is sufficient to run a software package provided in accordance with the system and method described herein.
  • the software may check that a camera includes sufficient resolution, that a memory of the device is of sufficient size to allow for sufficient captured video storage, that audio may be properly captured, and that the transmission system includes sufficient bandwidth to transmit and receive captured video, audio, video instructions and the like. Processing may also be performed at a remote location, thus allowing the user to include a lighter application or the like on their local device.
  • the user may employ the local device as a gateway only, all data being transmitted to a remote system (e.g., the remote data and computing device 3000 of Figure 6 and Figure 7) for processing, and receiving responses from the remote system as a result of such processing.
  • a remote system e.g., the remote data and computing device 3000 of Figure 6 and Figure 7.
  • a user may be able to dial up a video conference number, or otherwise interact with a remote site, such as by visiting a particular website or URL.
  • Such user instructions and training sequences may include general instructions about the particular medication subject to the current trial or medication administration protocol, methods for administration, warnings about side effects, and concerns about drug interactions with common substances or medications, or other medications prescribed to the patient by the system or by another medical service provider. It is contemplated in accordance with an embodiment of the invention that such set of user instructions may be interactive, allowing a user to view additional information about such instructions or prescriptions as desired. These instructions may comprise written, audio or video instructions provided to the user on a display of the user apparatus. It is further contemplated that such instructions may indicate one or more movement sequences to be associated with a corresponding one or more medication administration sequences.
  • These instructions indicate proper and improper motions that may be taken by a patient for ingesting a pill, using an inhaler, using an injectable medication, and the like, and may indicate various motions that may or may not be performed by a user.
  • the patient may be instructed to properly perform all requested actions, and avoid actions that may be indicative of a patient trying to trick the system.
  • the user After being recognized as performing undesirable actions a predefined number of times (for example, after three, five, ten, twelve, or twenty times), the user may be identified as one who should have heightened security applied. Thus, a user may be first started in a low level of observation. After a predetermined number of potentially suspicious actions are recognized, the user may be labeled as a user that is attempting to trick the system, or that is performing one or more suspicious acts, thus warranting a heightened level of security. Additional suspicion will surround review of all actions of the patient. After properly using the system correctly for another predetermined period of time, the heightened level of security may be removed. If on the other hand, suspicious activity continues, the user may be recommended to be removed from a clinical trial, or taken off a particular medication, for example.
  • a predefined number of times for example, after three, five, ten, twelve, or twenty times.
  • one or more of these sets of motions or actions may include confirmation that a user has placed a pill in their mouth and has properly swallowed the pill correctly and has therefore ingested the medication properly through visual confirmation of location, confirmation that the user has properly used an inhaler device through visual confirmation of position and/or audio confirmation of actuation, confirmation that the user has properly used an injectable device through visual confirmation of position and/or audio confirmation of actuation, or the like.
  • the horizontal line indicates a time for patient administration of medication.
  • the user may be notified to take their medication through any desirable communication and notification system, including text messaging, email, telephone call, automated calendar reminder or the like.
  • the identity of a user may be confirmed through the use of a facial recognition sequence, other biometric identification sequence, voice recognition, other password identification system, or a combination thereof.
  • Other features of use of the system such as time to turn on or time to perform other tasks may be recorded to further aid in determining a consistent identity of a user of the system.
  • the user may also be asked to say "hello" or some other word sequence to allow for audio recognition of the voice of the user.
  • the system may display user data including one or more data items regarding the individual.
  • the data items may include one or more of patient name, patient status, medication to be administered, or calendar indicating to the patient when medication has been administered and if any administration times have been missed.
  • the data may include a score indicative of a level of compliance of the individual with the medication protocol.
  • Other metrics may also be tracked, for example, a metric indicating whether too many skips have been registered by a user, or whether too many self-reports that the user has taken their medication without the use of the automated system, each indicating a potentially suspicious activity.
  • the user data may be stored at a remote location (e.g., a distributed database system) to aid in determining whether a particular user is registering at more than one site, with more than one device, and thus attempting to be paid twice for the trial. Such patients are unlikely to be interested in taking the medication at all. Additional attributes of a patient may also be stored in a centralized database or the like to potentially alert other clinical trials of potential offenders. Thus, one or more of a patient behavior profile, facial identification characteristics, voice recognition patterns, or a combination thereof, may allow one or more patients to be placed on a watch list or the like after having been identified as non-compliers. Thus, patients trying to get medication from multiple clinics, patients trying to sign up for multiple clinical trials, or patients trying to sign up at multiple sites in a single clinical trial may be recognized and determined before being able to be engaged at these other sites.
  • a remote location e.g., a distributed database system
  • the system shall be able to learn the pattern of suspicious patients based on all data collected (such as number of misses, number of skips, manual ratios, time on tasks, number of usability errors, number of suspicious errors, study coordinator/sponsors notes, flags, video reviewing results.).
  • the system can learn the pattern using machine learning techniques such as unsupervised learning or supervised learning techniques, and therefore the system learns as data is processed during use. Based on prior patient data, the system is able to recognize patterns and classify the patient based upon these patterns.
  • a patient may be classified as one likely to be lost to follow up, and to purposefully not take medication.
  • a patient can therefore be easily classified as suspicious level 1, level 2... or not by checking whether the patient fits in certain partem.
  • the system will keep learning each day when more data are gathered and more patients are enrolled.
  • This risk category can then be used to define a level of observance and appropriate follow up for the particular category of patient.
  • the patient may show the system a medication (e.g., a pill or dissolvable film), administration apparatus (e.g., an inhaler, injectable apparatus, or other medication form such as a pill bottle) to confirm that the medication is correct.
  • administration apparatus e.g., an inhaler, injectable apparatus, or other medication form such as a pill bottle
  • the system confirms that the medication shown by the patient is the currently prescribed medication for the patient through the use of text recognition, medication recognition, barcode or other code reading of one or more unique identifiers from the administration apparatus, pill bottle or the like, or other appropriate medication recognition scheme.
  • the system may track how patient holds the pill or other medication, and further may track continuous motion from hand to mouth to confirm that no suspicious action has taken place. Thus, the system may also check consistent hand usage between identification of the pill and placing the pill in the mouth of the user. In addition to tracking the motion of the hand, if the user is to take the pill out of a blister pack, the user may track a motion sequence for tracking complete gestures on screen from taking out of the pill bottle or blister pack all the way to placing in mouth / ingesting, drinking water, showing and tracking water go down, swallowing, and even showing empty mouth so that any deviation from the desired sequence may be identified as a potentially suspicious activity.
  • the system may view the blister pack to determine if the correct number of pills have been removed, that the correct number of pills are remaining, and whether other pills or the like have been removed that should not have been removed. Such suspicious activity may be used to automatically flag potentially suspicious activity.
  • the system instructs the patient to administer the medication in the prescribed manner.
  • One or more of these administration sequences may include confirmation that a user has placed a pill in their mouth (ingested the pill) through a visual confirmation of the location of the pill in the user's mouth, confirmation that the user has properly used an inhaler device through visual confirmation of position and/or audio confirmation of actuation, and/or confirmation that the user has properly used an injectable device through visual confirmation of position and/or audio confirmation of actuation.
  • the system (for example, the information capture and analysis system of Figure 6) then verifies the patient's adherence to the prescribed administration schedule for the medication as prescribed by the clinical trial or other prescription regimen, while identifying suspicious or malicious behavior of the patient (step 135 of FIG .1 for adherence verification).
  • the system may ask the user to place the pill in their mouth, show the pill in their mouth to the camera to confirm its presence, drink a glass of water, and show an empty mouth to the camera to confirm the pill is gone.
  • the system may ask the user to change the position of their tongue relative to the pill to provide a more complete view of the pill in the mouth of the user to the camera.
  • the system may flag that activity as suspicious.
  • the system may further automatically recognize improper tilting of the glass of water, or the head of the user when drinking the water as potentially suspicious activity, and subsequently change the risk category of the user and/or change a level of scrutiny for reviewing activity of the user.
  • the system may confirm swallowing motions, and identify the absence thereof as evidence of potentially suspicious or malicious behavior.
  • the system may ask the user to properly position the inhaler and show the positioning to the camera, to actuate the inhaler in view of the camera, to breathe in view of the camera, and to hold their breath for a predetermined period of time in front of the camera.
  • the system may record and identify different sounds, for example different frequencies emitted from the inhaler, as suspicious given that, in some cases, the user may be blocking the aerosol or power of the inhaler with their teeth on purpose. Such incorrect positioning may suggest incorrect placement, and therefore incorrect medication administration.
  • the system may ask the user to show the medication to the camera, to place the injectable medication adjacent the proper body part to receive the injection in view of the camera, to actuate the injectable medication in view of the camera, and the like.
  • the system monitors potentially suspicious activities performed by the patient (step 140 of Figure 1 for administrator review and intervention).
  • the system may determine whether the head or face of the patient leaves the field of view of the camera may be determined, and as will be described below, a risk category of the user may be changed based upon this or other suspicious activities noted in accordance with this application.
  • the system may track other suspicious activities including the patient covering their mouth with their hand during medication administration of a pill based medication and other body movements indicating an attempt to remove the medication or the like.
  • the system may employ audio recognition to determine, for example, whether the patient is spitting out a pill, or to assist in determining whether an inhalable or injectable medication has been properly actuated.
  • Each of these features may be preferably monitored over time so that while a single indication of potentially suspicious behavior provides important information, continued performance of such suspicious behavior will provide a more complete picture of attempts to trick the system, thus allowing for intervention to identify the patient, and address the suspicious behavior.
  • Different actions performed on the part of the user may allow the user to be classified into one or more categories, the category being changed based upon one or more actions they may perform over time.
  • Such a system may be provided in accordance with one or more features as described in copending US Patent Application Serial No. 13/189,516, filed July 24, 2011 to Hanina et al, titled Method and Apparatus for Monitoring Medication Adherence, the contents thereof being incorporated by reference in its entirety.
  • the medication administration system noted therein may be employed to classify suspicious users based upon their actions.
  • the system may be employed to measure visually if that symptom is improving. For example, concentration, speed to complete tasks, motor control etc. If symptoms or behavior (eye movement still erratic for example) fail to improve, this may suggest that the user is not taking their medication. Mood may also be measured and monitored as a signal of whether the user is taking their medication.
  • the system may perform various actions to classify a user in one or more medication administration risk category, thus suggesting a level of review and follow up that may be required by the system to follow up with the user.
  • the system may determine a movement of the imaging device, through analysis of information provided in the field of view thereof, or through the use of one or more gyroscopes or accelerometers thereon.
  • the system can detect the user's suspicious action and automatically notifies a monitor or a healthcare provider.
  • Other clues such as changes in a background setting at one or more critical times of medication administration, or other indications of movement of the device, or the like.
  • the patient may be provided with a progress report regarding how they have performed over time, and further providing encouragement for future adherence.
  • the progress report may include adherence to the medication protocol over time, adherence changes recently, percentage of medication protocol completed, etc. Additionally, notice of a next administration time may be provided, along with one or more messages from a healthcare provider regarding protocol changes, or other desired information.
  • the system may report various detected instances of potentially suspicious behavior to a healthcare provider (e.g., a doctor or a nurse) via a dashboard, and preferably a browser-based dashboard that the healthcare provider can access over the Internet with a user name and password specific to the provider.
  • the provider dashboard allows for the review of near real-time adherence and other information about each patient using the system.
  • the dashboard reports general adherence information along with the noted suspicious activity information.
  • the system may cause a display of a warning message to the patient.
  • the warning message indicates that unusual activity has been detected.
  • the warning message may inform the patient that incorrect use of the medication or protocol may result in their study coordinator / healthcare provider being contacted, their being removed from the trial, or there may be an additional level of monitoring applied to the patient.
  • confirmation of patient adherence to the prescribed administration schedule for the medication as prescribed by the clinical trial or other prescription regimen may be determined by the system, which includes hardware component, while suspicious or malicious behavior may be identified by the system. While such confirmation may take a number of forms, in some embodiments, a method for such confirmation may include capturing a video and audio sequence of the patient actually administering the medication.
  • such a sequence for such confirmation may include employing a facial recognition sequence or other biometric confirmation that a particular patient is in fact receiving treatment, but may also provide for the ability to obscure the face or other identifying feature of a user, simplify a displayed image through rotoscoping or the like, or otherwise encrypt such information to allow for the storage and use of such images while protecting the identity of the patient, a technique that may be beneficial when a medication administration manager is providing a general report about a clinical trial, and not trying to remedy a situation with a particular patient, or in particular in a public health or disease management scenario.
  • Activity recognition, gesture recognition, computer vision processing, deep learning processing, or other feature for determining whether a particular subject movement meets a predefined movement sequence may be performed by a computer system to be sure that the patient is properly taking prescribed medication. This same gesture recognition may also be employed to determine suspicious or malicious behavior on the part of the user, as described above.
  • Computerized techniques for performing activity recognition, gesture recognition are known in the art, for example, as described in Niebles, J. C, Wang, H., and Fei-Fei, L. Unsupervised Learning of Human Action Categories Using Spatial-temporal Words. Int J Comput Vis. 16 March 2007.) Audio recognition may also be employed by the system, which includes hardware components, to determine suspicious noises such as coughing noises or the like at one or more critical key moments associated with medication administration.
  • time on task indicative of an amount of time required for the user to perform one or more prescribed steps may also be employed by the system to aid in determining suspicious behavior.
  • This time on task may be measured across many different devices and instances of use of the apparatus to determine one or more trends that may be interesting, and may be used to determine suspicious behavior.
  • time on task may be employed to determine miming of an activity that the user I not really performing the medication administration steps as required.
  • a method in accordance with an embodiment of the present disclosure for performing audio and video capture and recognition of adherence to a prescribed protocol, and for determining one or more indications of suspicious or malicious activities is described, as set forth in steps 130 and 135 of Figure 1.
  • One or more of the steps of the method may be performed by the information capture and analysis system described in detailed below with reference to Figure 6 and Figure 7.
  • a patient may first log into the system of the invention at step 205, employing the facial recognition, biometric recognition, password entry, voice recognition, or other patient identification method, and at step 210 proper medication is preferably confirmed as noted above, through the use of bar code reading, text recognition, visual recognition employing video or still image recognition, or other medication recognition technique as described above.
  • processing then passes to step 225 where the system prompts the user to perform one or more predetermined actions and captures the video and/or audio of each of these actions.
  • the system analyzes the captured video/audio of each of these actions at step 230.
  • the system may determine whether the action has been properly captured, and whether the captured action has been properly analyzed by the system in one or more manners as will be described below. That is, the system checks to confirm whether the captured action has been properly captured, and whether the action has been properly analyzed. The failure of this step results in a request to recapture the information to re-perform the capture and analysis step.
  • processing may return to step 225 and the user may be once again prompted to perform the action. (Of course, if this process involves actual administration of pill, film, inhaler, injectable medication, or any other medication, it may not be proper to request re- performance of the action, unless it can be determined that the user did not actually administer the medication.)
  • processing ends at step 250 where the various captured video sequences are stored. These stored sequences may also be made available for human review and involvement, when it is determined that this would be beneficial, and may further preferably be employed to determine suspicious or malicious activity. Areas of interest for review may be highlighted and marked as potentially including suspicious or incorrect activity. Percentage estimates of risk may be automatically provided by the system based on risk algorithms that are generated, and based upon a category into which the user may have been placed based upon their prior activity, and one or more learned activities from a plurality of users.
  • a table is shown describing a plurality of items to be monitored by a system such as the information capture and analysis system of Figure 6 during medication administration (within the table), and a category for which the monitored item is applicable (noted across the top of the table on the first row).
  • the table is stored in a database and the system can reference the database to determine which items to monitor.
  • items to be monitored can be selected by an operator or user of the system ahead of time.
  • monitored items may also be used to monitor usability, suspicious activity, or cheating, or confirm that some information is missing.
  • MNV Mouth not Visible
  • PIM Pill In Mouth
  • EM Empty Mouth
  • EUT Empty Under Tongue
  • TOT Time On Task
  • HTM Hand To Mouth
  • SNS Same Not Same
  • elements monitored for usability include 1) Mouth Not Visible; 2) Time on Task greater than 20 seconds; 3) Use of an opaque container; 4) Rotation of the mobile device; and 5) Time out of the system.
  • Monitoring of these elements over time in accordance with the subject matter described in this disclosure will give a picture of status of the user related to usability issues.
  • Elements monitored for suspicious activity include: 1) Hand to Mouth (HTM) during or after the Pill in Mouth step; 2) Mouth not Visible (MNV) during or after the Pill in Mouth (PIM) Step, or when checking for an Empty space under the Tongue when not drinking; 3) Mouth not Visible during or after the Pill in Mouth Step, or when checking for an Empty space under the Tongue and the phone is rotating; 4) When the patient is not drinking and the pill is physically large, and thus hard to dry-swallow.
  • HTM Hand to Mouth
  • MNV Mouth not Visible
  • PIM Pill in Mouth
  • the system can determine that this is a suspicious activity; 5) if the patient is found to be spitting out the pill; 6) if the patient is found not to be swallowing; 7) if the patient is found to have a closed mouth between the empty mouth step and the empty under tongue check step; 8) if there is a very short time (e.g., one second or two seconds) between the pill in mouth and the empty mouth step (e.g., the time between the pill in mouth and the empty mouth is less than a predefined time); 9) if there is considerable motion from the muscles of mastication and buccinators (jaw and cheek).
  • Considerable motion refers to motion that is sufficient for the system to determine that the user has placed the pill in their cheek. The system can learn to determine consideration motion over time when trained with examples of patients placing the pill in their cheek.
  • Elements monitored for cheating activity include: 1) Pill detection after empty mouth; 2) Pill detection after pill in mouth and spitting of the pill; 3) Pill detection after pill in mouth and detection of not swallowing; 4) Miming of the pill in hand step; 5) Generic pill or object in hand is confirmed, while the specific pill of interest in hand is not confirmed; 6) Generic pill or object in mouth is confirmed, while the specific pill of interest in mouth is not confirmed; 7) wrong person is recognized; 8) double enrollment is recognized; and 9) the pill recognized for the pill in hand and the pill in mouth steps do not match.
  • elements monitored to confirm missing information include: 1) mouth not visible in either of the pill in mouth or the empty under tongue check; 2) system recognizes it is too bright or too dark, and 3) there is corrupt video or missing frames.
  • the system may provide responses to the user in real time or near real time in the event that one or more of the elements to be monitored are recognized, thus providing immediate and helpful feedback to the user to properly perform the desired sequence of actions. As noted above, it may be desirable to not report some of the monitoring results to the user, so that a consistent review of action may be provided without alerting the user to adjust their behavior.
  • a chart depicting steps (as noted above) related to confirming medication administration.
  • the chart is stored in a database and the system can reference the database to determine which steps to be performed by the system.
  • the steps to be performed by the system can be preset by an operator or user of the system ahead of time. These steps are noted in the top row in Figure 4, which includes: 1) facial recognition (Face); 2) pill in hand (PIH) confirmation; 3) pill in mouth (PIM) recognition; 4) empty mouth (EM) check and empty under tongue (EUT) check.
  • the elements to be monitored including: 1) mouth not visible; 2) hand to mouth; 3) rotation of camera; 4) problems while drinking; 5) pill detector; 6) opaque container detector; 7) miming of pill in hand step (i.e., the system determines in advance there is no pill in the hand); 8) a generic pill (i.e., a pill that has been identified as not corresponding to the expected pill) used in the pill in hand step; 9) a generic pill used in the pill in mouth step; 10) recognition of spitting out of the pill; and 11) recognition of pill swallowing.
  • the chart depicts during which steps associated with medication administration each of the measured elements are preferably monitored.
  • the left column and the bottom row of Figure 4 use the following notations: PIH for pill in hand, PIM for pill in mouth, EM for empty mouth, EUT for empty under the tongue, MNV for mouth not visible, HTM for hand to mouth, SNS for Same/Not Same.
  • the top row of Figure 4 represents steps performed by a patient (e.g., face confirmation, pill in hand, pill in mouth, empty mouth, and empty under tongue.)
  • the left column notes types of motions or gestures of the patient that the system is configured to look for. Bar graphs in Figure 4 shows during which steps the motions or gestures that the system is looking for are potentially "active.”
  • the system can also check whether the pill is still the same as originally imaged (to check for substitution).
  • monitored elements may be combined in accordance with an equation of the Bayesian form as follows.
  • the equation notes that the probability of cheating being detected is proportional to the likelihood that the data will support an inference of cheating and a prior determination of the probability of cheating.
  • the likelihood that the data will support an inference of cheating is preferably a concatenation of a number of elements, as shown in Figure 5.
  • Bayes formula (or other appropriate functions) can also be applied iteratively here to perform Bayesian updates of the posterior probability over time as we collect additional evidence. In the update step the posterior probability estimate from the previous timestep can be treated as the updated prior for the next timestep. In this manner, the estimation will gradually give more and more weight to the observed evidence and less weight to the initial a priori belief.
  • 6) is a regression model parameterized by theta which infers a continuous likelihood value based on the evidence x (concatenation of the features).
  • are the parameters of the model which can be modified over time.
  • can be learned from supervised data.
  • the training data in accordance with an embodiment of the present disclosure, comprises videos of doses and their corresponding features x. Supervision of the training system and process comes from one or more other computer systems or human annotators and from PK data whenever that is available.
  • confirmation of status of particular actions from one or more other computer systems or human annotators may be provided to the learning system at the time of acquisition or at a later date in order to teach the system preferred and proper evaluation, allowing the system to in the future also make such accurate and proper evaluations.
  • Examples of implementations of R can be, Support Vector Regression, Random Forest, Logistic Regression, Neural networks, Recurrent neural networks, LSTMs, etc.
  • Calculation of the prior determination of the probability of cheating is preferably related to one or more of Age, Gender, Race, on any additional attribute found to be related to likelihood of cheating. These additional attributes may be determined in accordance with analysis of prior data related to medication administration and determined cheating. Data may furthermore be collected from one or more patient populations related to therapeutic area, response to medications, co-morbidities, other demographic information, and the like. Such data may also be provided by one or more healthcare providers, sites in clinical trials, or other available databases of information.
  • the system may provide one or more prompts to a patient related to measurement of any of the elements shown in Figures 3 or 4.
  • Prompts may be selectively provided to the patient, so that certain prompts encourage proper administration by the user, while other prompts may be withheld so that actions may be monitored without alerting the patient that their activity is under scrutiny.
  • Mechanisms for measuring the elements in Figures 3 or 4 may be provided in an interactive manner as well. For example, if a patient is suspected of not properly administering their medication, the system may react adaptively to the actions of the patient, and for example, ask the patient to pull open their cheek or adjust the position of their open mouth to allow the camera to have a better view of the inside of the mouth of the patient to allow for a better chance to see if a pill is still positioned within the mouth of the patient.
  • the system may further employ one or more 3D cameras, infrared cameras, or other cameras designed for a particular purpose in order to improve the quality of images and the ability to see, for example, distortion of the cheek of a patient attempting to hide a medication pill.
  • the system may employ these additional video capture techniques, and may further provide feedback to the patient during medication administration, such as by requesting, for example, that the device be brought closer to the mouth of the patient to provide a better view thereof, by looking at one or more predetermine micro-expressions indicative of swallowing, attempts to hide the medication, pill, removal of the medication pill and the like.
  • Audio recognition may also be used, either alone or in conjunction with the video capture, to further allow review of the system to, for example, listen for the sound of pills being spit out.
  • Video capture may be performed at very high speed, allowing for subsequent higher temporal resolution review of elements of medication administration.
  • Video element may also be amplified to allow for easier distinction of medication adherence issues.
  • the system may compare captured video information to previously captured video to look for anomalies, i.e. differences from standard performance of medication administration, or similarities to administration actions designated to be suspicious.
  • the system may further present one or more questions, or other information to the patient in response to a recognition of potentially suspicious activity, and gauge a response.
  • the response can be considered for not only content, but also for status of the user when responding. Thus, it is possible to judge whether the user appears to be nervous and stressed or calm when answering the question, for example. Other issues, such a slurring speech, speeding up or slowing down when speaking may also be correlated with the responses from the user and ultimately correlating with an actual determination of whether the user is properly administering the medication, or is cheating/performing suspicious activity.
  • Users may be associated with a score indicative of medication adherence, likelihood of future proper medication adherence or the like. Through such a scoring system, it is possible to easily categorize and manage users so that similarly-scored users can be provided with similar intervention, follow up and scrutiny.
  • Deep learning and other supervised or unsupervised learning techniques may be employed to improve the responsiveness of the system, and to extract patterns that may be predictive of future action on the part of users.
  • expert systems may review input data in an automated fashion, and provide correlations between the data that are predictive in the future moving forward.
  • each bottle, or each dose may be imprinted with a unique identifying barcode, QR code, data matrix code, or other code that allows for a reader to determine an identity based upon a visual capture of the code.
  • Codes may be assigned to define categories of pills, individual groups of doses, or individual pills, and may further be customized to allow for the assignment of a particular pill to be correlated with a single individual.
  • facial recognition results may be combined with QR code results from a bottle or pill to confirm that the correct pill is being taken by the corresponding correct person.
  • measurements of actual drug levels may be determined and fed back into the system. Therefore, by way of example, if during monitoring, the system finds a particular patient who have caused one or more of the elements for suspicious activity to have been recognized, subsequent to this process, the system may determine actual drug levels in the blood of the patients. This is an accurate depiction of whether the patient has ingested the medication, at least on the few days before the blood was drawn (depending on half-life of drug). Thus, it is possible to correlate recognition of suspicious activity elements (or other elements) with actual drug blood levels.
  • the system may recognize patterns or groups of elements that correlate with lack of drug in the blood, and then use the pattems or groups of elements in the future to better predict the likely failure to properly administer medication. Furthermore, as additional information becomes available, such as in a clinical trial where it might be years before knowledge of actual medication blood levels may be determined, data may be reprocessed to determine any correlations between any one or more of the monitored elements and actual drug levels.
  • a method and apparatus are provided that allow for the automated confirmation of adherence to administration protocol for medication, and provide for a most sophisticated method for confirming and studying methods of administration of such prescription medication.
  • the system described in this disclosure can monitor suspicious activity, cheating, and other elements in order to insure proper administration, and can learn to improve its performance based upon actual use of the system by patients.
  • Figure 6 illustrates an information capture and analysis system that includes a remote information capture apparatus 1000, a communication system 2000, and a remote data and computing device 3000.
  • the information capture and analysis system is adapted to allow for the capture and processing of information in order to implement the system and method in accordance with the present disclosure.
  • the information capture apparatus 1000 communicates with a remote data and computing device 3000 via a communication system 2000 (e.g., the Internet, Wi-Fi, LAN, WAN, Bluetooth, or other communication system). Via the communication system 2000, information captured by apparatus 1000 may be transmitted to remote data and computing device 3000, and analysis information or other instructions may be provided from remote data and computing device 3000 to apparatus 1000.
  • a communication system 2000 e.g., the Internet, Wi-Fi, LAN, WAN, Bluetooth, or other communication system.
  • a plurality of such information capture apparatuses 1000 may be coordinated to monitor a larger space than a space that can be covered by a single such apparatus.
  • the apparatuses can be made aware of the presence of the other apparatuses, and may operate by transmitting all information to one of the apparatuses 1000, or these apparatuses may each independently communicate with remote data and computing location, which is adapted to piece together the various information received from the plurality of devices 1000.
  • FIG. 7 shows a more detailed view of an example embodiment of remote information capture apparatus 1000 and remote data and computing device 3000 of the information capture and analysis system of FIG. 6.
  • the apparatus 1000 comprises an information capture device 1110 for capturing video and audio data as desired.
  • a motion detector 1115 or other appropriate trigger device may be provided associated with capture device 1110 to allow for the initiation and completion of data capture.
  • Information capture device 1110 may comprise a visual data capture device, such as a visual camera, or may be provided with an infrared, night vision, or other appropriate information capture device.
  • a storage location 1120 is further provided for storing captured information, and a processor 1130 is provided to control such capture and storage, as well as other functions associated with the operation of remote information capture apparatus 1000.
  • An analysis module 1135 is provided in accordance with processor 1130 to perform a portion of analysis of any captured information at the remote information capture apparatus 1000.
  • Apparatus 1000 is further provided with a display 1140, and a data transmission and receipt system 1150 and 1160 for displaying information, and for communicating with remote data and computing device 3000.
  • display 1140 may be used, along with an audio speaker, if desired, to provide one or more interview questions in accordance with an automated interview process. In such a situation, information capture device 1110 would then capture video and audio information provided by a user in response to the automated interview process.
  • the remote data and computing device 3000 comprises system management functions 3030, and a transmission and reception system 3050 and 3060 for communicating with apparatus 1000.
  • Transmission and reception system 3050 and 3060 may further comprise various GPS modules so that a location of the device can be determined at any time, and may further allow for a message to be sent to one or more individual apparatuses, broadcast to all apparatuses in a particular trial, or being used for administration of a particular prescription regimen, of broadcast to all available apparatuses.
  • apparatus 1000 is adapted to be part of a system that monitors user (patient) medication administration, and determined that the correct user is administering the correct medication at the correct time. Users of apparatus 1000 in accordance with this system give administrators a tangible and concrete manner in which to review activities and collected information related to proper medication administration. Apparatus 1000 of the disclosure is adapted to receive medication protocol and instructions for medication administration, or the like for patients from remote data and computing device 3000 and provide these instructions to patients to guide them in administering their medication.
  • Such instructions may comprise written, audio or audio/video instructions for guiding a user to perform one or more medication administration activities, such as showing a face of the user, showing a pill to be ingested, or confirming that the medication has been properly ingested, and therefore confirming whether a user is adhering to a prescribed medication protocol.
  • the video instructions can be provided either by a real person or by an animated cartoon character (avatar), or the like, and are designed to be interactive in nature.
  • Embodiments of the subject matter and the functional operations can be implemented in digital electronic circuitry, in tangibly- embodied computer software or firmware, in computer hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them.
  • Embodiments of the subject matter described in this specification can be implemented as one or more computer programs, i.e., one or more modules of computer program instructions encoded on a tangible non-transitory program carrier for execution by, or to control the operation of, data processing apparatus.
  • the computer storage medium can be a machine-readable storage device, a machine-readable storage substrate, a random or serial access memory device, or a combination of one or more of them.
  • data processing apparatus refers to data processing hardware and encompasses all kinds of apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers.
  • the apparatus can also be or further include special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
  • the apparatus can optionally include, in addition to hardware, code that creates an execution environment for computer programs, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them.
  • a computer program which may also be referred to or described as a program, software, a software application, a module, a software module, a script, or code, can be written in any form of programming language, including compiled or interpreted languages, or declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
  • a computer program may, but need not, correspond to a file in a file system.
  • a program can be stored in a portion of a file that holds other programs or data, e.g., one or more scripts stored in a markup language document, in a single file dedicated to the program in question, or in multiple coordinated files, e.g., files that store one or more modules, sub-programs, or portions of code.
  • a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a data communication network.
  • Computers suitable for the execution of a computer program include, by way of example, can be based on general or special purpose microprocessors or both, or any other kind of central processing unit.
  • a central processing unit will receive instructions and data from a read-only memory or a random access memory or both.
  • the essential elements of a computer are a central processing unit for performing or executing instructions and one or more memory devices for storing instructions and data.
  • a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks.
  • mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks.
  • a computer need not have such devices.
  • a computer can be embedded in another device, e.g., a mobile telephone, a personal digital assistant (PDA), a mobile audio or video player, a game console, a Global Positioning System (GPS) receiver, or a portable storage device, e.g., a universal serial bus (USB) flash drive, to name just a few.
  • PDA personal digital assistant
  • GPS Global Positioning System
  • USB universal serial bus
  • Computer-readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
  • semiconductor memory devices e.g., EPROM, EEPROM, and flash memory devices
  • magnetic disks e.g., internal hard disks or removable disks
  • magneto-optical disks e.g., CD-ROM and DVD-ROM disks.
  • the processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
  • a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer.
  • a display device e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor
  • a keyboard and a pointing device e.g., a mouse or a trackball
  • Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
  • a computer can interact with a user by sending documents to and receiving documents from a device that is used by the user; for example, by sending web pages to
  • Embodiments of the subject matter described in this specification can be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface or a web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back-end, middleware, or front-end components.
  • the components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (LAN) and a wide area network (WAN), e.g., the Internet.
  • LAN local area network
  • WAN wide area network
  • the computing system can include clients and servers.
  • a client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
  • a server transmits data, e.g., an HTML page, to a user device, e.g., for purposes of displaying data to and receiving user input from a user interacting with the user device, which acts as a client.
  • Data generated at the user device e.g., a result of the user interaction, can be received from the user device at the server.

Abstract

Methods and systems for recognizing suspicious activities of a user administering a medication are described. One of the methods include capturing one or more video sequences of a user administering a medication by a video capture device; analyzing the captured one or more video sequences to determine one or more indications of a suspicious activity of the user; and adaptively performing a follow-up operation in response to a determination of one or more indications of a suspicious activity of the user.

Description

APPARATUS AND METHOD FOR RECOGNITION OF SUSPICIOUS ACTIVITIES
Cross-reference to related application
This application claims priority to U.S. Provisional Application Serial No.
62/560,528, filed on September 22, 2017. The disclosure of the prior application is considered part of and is incorporated by reference in the disclosure of this application.
Field
[001] The subject matter described in this application generally relates to patient compliance to medication administration protocol scenarios including ingestion of medication, and more particularly to an apparatus and method for the identification of suspicious or purposefully malicious activity on the part of the patient, where the patient is purposefully not properly administering their medication.
Background
[002] Traditionally, participants attend introductions and follow ups for clinical trials in-person. Other patients outside of the clinical trial setting attempting to adhere to a particular medication protocol similarly are given a prescription and a particular set of instructions from a prescribing medical provider or prescribing doctor. Compliance is then measured at a next visit with that prescribing professional through traditional methods of counting unused medication, and patient interviews. Thus, data collection is similarly limited to patient visits, rather than on a daily basis. These old methods such as patient questioning and medication counting have been proven to be inadequate measures of adherence and offer no information on dose timing and drug holidays (omission of medication for three or more sequential days). Summary
[003] US Patent Application Serial No. 13/831,555, filed March 14, 2013, titled Apparatus and Method for Recognition of Suspicious Activities to Hanina et al, the contents of this application being incorporated herein by reference in its entirety, describes a system, method and apparatus that allow for determination of suspicious activity by a patient administering medication following a predetermined protocol or prescription.
[004] The subject matter described in this application is directed to a system and method for detecting suspicious activity of a user (hereafter also referred to as a patient), and to thwart users who purposefully do not take their medication. The system presents an advanced mechanism for teaching a system to acquire and learn what to look for related to suspicious activity, and further includes a mechanism for analyzing input captured video to determine suspicious activity. The system may also interact in real-time with the patient when something is identified as incorrect, wrong or suspicious and either prompt a different action or raise an alert and recommend an intervention by a healthcare provider.
[005] In accordance with an embodiment of the subj ect matter described in the present application, a motion capture procedure for capturing patient motion data related to the administration of pill or film based oral medications, or injectable, inhaler-based, other non- pill based medication, or any other form of patient administration task that may be performed, may be utilized. Other capture sensors may further be utilized, including range (depth) sensors, hyperspectral sensors, such as infrared or near infrared sensor, and the like. Such sensors may help to localize and segment the face and hand, improving the ability to discern motion and other attributes of a video and other data capture. Use of such other sensors may also help to identify material properties of an item, such as a medication pill, thus assisting in confirming the pill's authenticity. Therefore, in accordance with an embodiment of the present application, a method and apparatus may be provided for analyzing the captured patient motion data to provide feedback to the user and/or to determine a number of times the user performs a suspicious action. The system can detect suspicious action and provide feedback to the user in near real-time, and importantly, in time sufficient to allow for the feedback to be useful to the subject while the subject is still performing the activity. Additionally, the patient performance information may be analyzed asynchronously to determine other features of data that may suggest a malicious intent on the part of the patient.
[006] Still other objects and advantages of the subject matter described in this application will in part be obvious and will in part be apparent from the specification and drawings.
[007] The subject matter described in this application accordingly comprises the several steps and the relation of one or more of such steps with respect to each of the others, and the apparatus embodying features of construction, combinations of elements and arrangement of parts that are adapted to affect such steps, all as exemplified in the following detailed disclosure, and the scope of the subject matter described herein will be indicated in the claims.
Brief Description of the Drawings
[008] For a more complete understanding of the subject matter described in this application, reference is made to the following description and accompanying drawings, in which:
[009] Figure 1 is a flow chart diagram depicting a method for identifying suspicious activities of a patient administering a medication;
[010] Figure 2 is a flowchart diagram depicting a method for capturing a video sequence of a patient; [Oil] Figure 3 is a table describing monitored elements for determining one or more actions;
[012] Figure 4 is a timing chart depicting timing of monitoring of one or more items to be monitored; and
[013] Figure 5 is a depiction of a method for calculating a likelihood of cheating by a patient.
[014] Figure 6 is a block diagram depicting the details of an exemplary hardware configuration for implementing the system and method described in this application; and
[015] Figure 7 is a block diagram depicting additional details of an exemplary hardware configuration for implementing the system and method described in this application.
Detailed Description
[016] Compliance and medication adherence technologies can increase the statistical power of clinical trials. Through the use of such technology, clinical events can be precisely linked to medication use history. Captured data can be linked to other sources such as EDC, patient diaries and data collected by the physician. Technologies can create many possibilities for remote visits and data capture. While smart packaging technologies exist such as RFID- enabled computer chip technology, smart blister packs and MEMS caps (microprocessor in a bottle cap), they are: a) invasive and need to be physically attached to the medications; b) are non-conclusive regarding compliance - a patient may activate the technology without ingestion of the medication; c) remain largely un-adopted in clinical trials by the pharmaceutical and biotech companies due to their high cost; and d) take a longer time to implement. Further, electronic patient diaries allow for ease of entry of data by a patient. These diaries, however, are still subject to issues related to compliance with medication adherence. Thus, even if a patient is meticulous about entering information into the diary, and thus complying with the requirements for data entry, there is still no guarantee that they are properly taking medication at prescribed times. This problem is even more acute when a participant is performing a suspicious action, or is otherwise maliciously avoiding taking their medication.
[017] The subject matter of the present disclosure aims to address the drawbacks of the prior systems. The subject matter of the present disclosure will now be described making reference to the following drawings in which like reference numbers denote like structure or steps. Referring to Figure 1, a data flow overview in accordance with the operation of a system (for example, the information capture and analysis system described in detail below with reference to Figure 6 and Figure 7) for identifying suspicious activities of a patient when administering a medication is shown. In accordance with this embodiment, information about a particular drug to be the subject of a clinical trial, to be employed in a public health or disease management situation, or the like, other medication administration program or prescription, or other patient self-administered medical task such as performing a home based urine test or the like may be provided in a hardware-based database 105. Existing industry medication information databases 110 are employed to access prescription, interaction, application, and other available information about any number of proposed prescription and non-prescription medications and their possible interaction with the clinical trial or other medications. Further, external patient medical records 115 may be used, and as will be described below, in conjunction with the industry medical information and a medical professional's prescribing expertise to confirm that a patient is a good candidate for such a clinical trial, or medication administration program. These databases may be accessed using non-manual techniques in a manner known to one of ordinary skill in the art. This information may further include information related to typical elements of suspicious or malicious behavior. Such elements may be based upon the type of medication, method of medication administration, demographics or other information about the patient, other features, or a combination of these elements. Suspicious activity information 118 is transferred to the system at this time as well, and as noted above may include one or more indications of patient movements or other actions that may indicate suspicious behavior on behalf of the patient, a malicious intent to trick the system, or actions of other high risk population. The various embodiments of the present invention may also be provided to determine if a patient is performing an action or task correctly or if they are simply making a mistake.
[018] Once confirmed, a medication administration and ingestion or other medication regimen in accordance with the clinical trial or other prescription requirements such as in a public health, medical practice environment or the like may be prescribed and entered into the system of the invention at 120. Such medication administration regimen may include one or more of ingesting or swallowing a pill, using an inhaler device, using an injectable medication device, employing a patch, sublingual administration, a cheek or other skin located medication administration device or the like. Of course, the present invention may be applied to any patient administered procedure. Once entered into the system, a particular prescription regimen may cause a set of user instructions, various training sequences and the like 125 to be generated and transmitted to an apparatus (e.g., the remote information capture apparatus 1000 of Figure 6) provided to a patient in accordance with an embodiment of the disclosure for access to the system. In accordance with an embodiment of the disclosure, instructions to be provided by the system (i.e., instructions to be displayed on an apparatus such as the apparatus 1000 of Figure 6 and Figure 7) to the patient are predefined for each different prescription for which the system is to be applicable. Thus, a healthcare provider, patient, or other individual may indicate the medication regimen to be administered by the patient to the system. In response, the system may provide a regimen (i.e. one pill, twice per day, etc.) to be followed by the patient. Similarly, if the medication to be administered is oral, training instructions and patient guidance for oral medication administration may be provided, while if other routes of administration are to be used, instructions for these routes may be provided. Finally, training modules may be available for additional modules to be provided, such as a barcode reading module, questions to be presented to and answered by the subject, etc. In this manner, once the patient is assigned a protocol, all required regimens, training materials and interaction materials will be provided to the patient to allow for automated, proper training and administration assistance for the assigned protocol.
[019] Such an apparatus may comprise a user device, such as a smart phone, a netbook, a laptop computer, a desktop computer, a tablet device, a free standing or built into a mirror or cabinet, or other computing appliance. The apparatus includes a video and audio capture apparatus (e.g., a camera, a voice recorder, and/or a video capture device), and a video and audio analysis and transmission apparatus for transmitting the captured video/audio to another system or device. The apparatus allows for the display of the user instructions to a patient, and allowing for the eventual capture, analysis and transmission of video, audio and other analysis information. The apparatus can be considered as the patient facing portion of the system (e.g., the information capture and analysis system of Figure 6). Once the patient is registered with the system, the patient can download and install a software application directed to a medication protocol on the apparatus. The software runs on the apparatus (local user device) asynchronous to a back end system (e.g., the remote data and computing device 3000). When the patient interacts with the software application, user information and data captured by the apparatus is encrypted, stored, and transmitted to a back end system. User information and data may be deleted after use. Separate software runs on the back end system can perform additional analysis to determine suspicious activities of the patient over time, for example, and then providing data/information about the suspicious activities to a healthcare provider on browser-based dashboards. [020] When installing software on a user's own hardware system, it is preferred that the software detect and otherwise test or determine that the hardware attempting to be utilized by the patient is sufficient to implement the system and method described in this disclosure and is sufficient to run a software package provided in accordance with the system and method described herein. Thus, the software may check that a camera includes sufficient resolution, that a memory of the device is of sufficient size to allow for sufficient captured video storage, that audio may be properly captured, and that the transmission system includes sufficient bandwidth to transmit and receive captured video, audio, video instructions and the like. Processing may also be performed at a remote location, thus allowing the user to include a lighter application or the like on their local device. Alternatively, the user may employ the local device as a gateway only, all data being transmitted to a remote system (e.g., the remote data and computing device 3000 of Figure 6 and Figure 7) for processing, and receiving responses from the remote system as a result of such processing. Thus, a user may be able to dial up a video conference number, or otherwise interact with a remote site, such as by visiting a particular website or URL.
[021] Such user instructions and training sequences may include general instructions about the particular medication subject to the current trial or medication administration protocol, methods for administration, warnings about side effects, and concerns about drug interactions with common substances or medications, or other medications prescribed to the patient by the system or by another medical service provider. It is contemplated in accordance with an embodiment of the invention that such set of user instructions may be interactive, allowing a user to view additional information about such instructions or prescriptions as desired. These instructions may comprise written, audio or video instructions provided to the user on a display of the user apparatus. It is further contemplated that such instructions may indicate one or more movement sequences to be associated with a corresponding one or more medication administration sequences. These instructions indicate proper and improper motions that may be taken by a patient for ingesting a pill, using an inhaler, using an injectable medication, and the like, and may indicate various motions that may or may not be performed by a user. In such a manner, the patient may be instructed to properly perform all requested actions, and avoid actions that may be indicative of a patient trying to trick the system.
[022] In an alternative embodiment, it may be possible to particularly not describe to the patient the various suspicious behaviors that will be tracked in an attempt to monitor without notification of the unsuspecting malicious patient. These traps may be maintained and running in a background of the system. Thus, as will be described below, detection of one or more errors may generate real time displayed video and/or audio feedback to the patient in order to correct actions during the session during which they are taking the medication so that the current administration session is not lost and may still be a successful administration, while one or more other errors may be logged by the system but preferably provide no feedback to the patient, and thus may be accumulated and used to analyze patient actions without providing instructions and help to avoid being recognized by the system. After being recognized as performing undesirable actions a predefined number of times (for example, after three, five, ten, twelve, or twenty times), the user may be identified as one who should have heightened security applied. Thus, a user may be first started in a low level of observation. After a predetermined number of potentially suspicious actions are recognized, the user may be labeled as a user that is attempting to trick the system, or that is performing one or more suspicious acts, thus warranting a heightened level of security. Additional suspicion will surround review of all actions of the patient. After properly using the system correctly for another predetermined period of time, the heightened level of security may be removed. If on the other hand, suspicious activity continues, the user may be recommended to be removed from a clinical trial, or taken off a particular medication, for example. [023] In accordance with one or more embodiments of the present disclosure, one or more of these sets of motions or actions may include confirmation that a user has placed a pill in their mouth and has properly swallowed the pill correctly and has therefore ingested the medication properly through visual confirmation of location, confirmation that the user has properly used an inhaler device through visual confirmation of position and/or audio confirmation of actuation, confirmation that the user has properly used an injectable device through visual confirmation of position and/or audio confirmation of actuation, or the like.
[024] Referring to the lower portion of Figure 1, the horizontal line indicates a time for patient administration of medication. At such time, the user may be notified to take their medication through any desirable communication and notification system, including text messaging, email, telephone call, automated calendar reminder or the like. While not explicitly shown, first, the identity of a user may be confirmed through the use of a facial recognition sequence, other biometric identification sequence, voice recognition, other password identification system, or a combination thereof. Other features of use of the system, such as time to turn on or time to perform other tasks may be recorded to further aid in determining a consistent identity of a user of the system. The user may also be asked to say "hello" or some other word sequence to allow for audio recognition of the voice of the user. Upon recognition of the individual, the system may display user data including one or more data items regarding the individual. For example, the data items may include one or more of patient name, patient status, medication to be administered, or calendar indicating to the patient when medication has been administered and if any administration times have been missed. In some cases, the data may include a score indicative of a level of compliance of the individual with the medication protocol. Other metrics may also be tracked, for example, a metric indicating whether too many skips have been registered by a user, or whether too many self-reports that the user has taken their medication without the use of the automated system, each indicating a potentially suspicious activity. The user data may be stored at a remote location (e.g., a distributed database system) to aid in determining whether a particular user is registering at more than one site, with more than one device, and thus attempting to be paid twice for the trial. Such patients are unlikely to be interested in taking the medication at all. Additional attributes of a patient may also be stored in a centralized database or the like to potentially alert other clinical trials of potential offenders. Thus, one or more of a patient behavior profile, facial identification characteristics, voice recognition patterns, or a combination thereof, may allow one or more patients to be placed on a watch list or the like after having been identified as non-compliers. Thus, patients trying to get medication from multiple clinics, patients trying to sign up for multiple clinical trials, or patients trying to sign up at multiple sites in a single clinical trial may be recognized and determined before being able to be engaged at these other sites.
[025] In some implementations, the system shall be able to learn the pattern of suspicious patients based on all data collected (such as number of misses, number of skips, manual ratios, time on tasks, number of usability errors, number of suspicious errors, study coordinator/sponsors notes, flags, video reviewing results.). The system can learn the pattern using machine learning techniques such as unsupervised learning or supervised learning techniques, and therefore the system learns as data is processed during use. Based on prior patient data, the system is able to recognize patterns and classify the patient based upon these patterns. For example, if a patient is showing erratic administration time and times on task, coupled with some administration misses, and one or more suspicious activity errors, the patient may be classified as one likely to be lost to follow up, and to purposefully not take medication. A patient can therefore be easily classified as suspicious level 1, level 2... or not by checking whether the patient fits in certain partem. The system will keep learning each day when more data are gathered and more patients are enrolled. Thus, a more accurate placement of the user in a particular category or risk classification, as will be described below, can be more accurately determined. This risk category can then be used to define a level of observance and appropriate follow up for the particular category of patient.
[026] Once identified and notified of a type of medication to be administered, the patient may show the system a medication (e.g., a pill or dissolvable film), administration apparatus (e.g., an inhaler, injectable apparatus, or other medication form such as a pill bottle) to confirm that the medication is correct. As shown in Figure. 1, at step 130, the system confirms that the medication shown by the patient is the currently prescribed medication for the patient through the use of text recognition, medication recognition, barcode or other code reading of one or more unique identifiers from the administration apparatus, pill bottle or the like, or other appropriate medication recognition scheme.
[027] In addition to recognizing the pill or other medication, the system may track how patient holds the pill or other medication, and further may track continuous motion from hand to mouth to confirm that no suspicious action has taken place. Thus, the system may also check consistent hand usage between identification of the pill and placing the pill in the mouth of the user. In addition to tracking the motion of the hand, if the user is to take the pill out of a blister pack, the user may track a motion sequence for tracking complete gestures on screen from taking out of the pill bottle or blister pack all the way to placing in mouth / ingesting, drinking water, showing and tracking water go down, swallowing, and even showing empty mouth so that any deviation from the desired sequence may be identified as a potentially suspicious activity. Furthermore, the system may view the blister pack to determine if the correct number of pills have been removed, that the correct number of pills are remaining, and whether other pills or the like have been removed that should not have been removed. Such suspicious activity may be used to automatically flag potentially suspicious activity. [028] Thereafter, the system instructs the patient to administer the medication in the prescribed manner. One or more of these administration sequences may include confirmation that a user has placed a pill in their mouth (ingested the pill) through a visual confirmation of the location of the pill in the user's mouth, confirmation that the user has properly used an inhaler device through visual confirmation of position and/or audio confirmation of actuation, and/or confirmation that the user has properly used an injectable device through visual confirmation of position and/or audio confirmation of actuation.
[029] The system (for example, the information capture and analysis system of Figure 6) then verifies the patient's adherence to the prescribed administration schedule for the medication as prescribed by the clinical trial or other prescription regimen, while identifying suspicious or malicious behavior of the patient (step 135 of FIG .1 for adherence verification). For example, for an oral administration, the system may ask the user to place the pill in their mouth, show the pill in their mouth to the camera to confirm its presence, drink a glass of water, and show an empty mouth to the camera to confirm the pill is gone. The system may ask the user to change the position of their tongue relative to the pill to provide a more complete view of the pill in the mouth of the user to the camera. For example, if the user only presents the top of their tongue to the camera, and refuses to show under their tongue, the system may flag that activity as suspicious. The system may further automatically recognize improper tilting of the glass of water, or the head of the user when drinking the water as potentially suspicious activity, and subsequently change the risk category of the user and/or change a level of scrutiny for reviewing activity of the user. The system may confirm swallowing motions, and identify the absence thereof as evidence of potentially suspicious or malicious behavior. For an inhaler, the system may ask the user to properly position the inhaler and show the positioning to the camera, to actuate the inhaler in view of the camera, to breathe in view of the camera, and to hold their breath for a predetermined period of time in front of the camera. The system may record and identify different sounds, for example different frequencies emitted from the inhaler, as suspicious given that, in some cases, the user may be blocking the aerosol or power of the inhaler with their teeth on purpose. Such incorrect positioning may suggest incorrect placement, and therefore incorrect medication administration. For an injectable medication, the system may ask the user to show the medication to the camera, to place the injectable medication adjacent the proper body part to receive the injection in view of the camera, to actuate the injectable medication in view of the camera, and the like.
[030] During this administration, the system monitors potentially suspicious activities performed by the patient (step 140 of Figure 1 for administrator review and intervention). In particular, the system may determine whether the head or face of the patient leaves the field of view of the camera may be determined, and as will be described below, a risk category of the user may be changed based upon this or other suspicious activities noted in accordance with this application. The system may track other suspicious activities including the patient covering their mouth with their hand during medication administration of a pill based medication and other body movements indicating an attempt to remove the medication or the like. Furthermore, the system may employ audio recognition to determine, for example, whether the patient is spitting out a pill, or to assist in determining whether an inhalable or injectable medication has been properly actuated. Each of these features may be preferably monitored over time so that while a single indication of potentially suspicious behavior provides important information, continued performance of such suspicious behavior will provide a more complete picture of attempts to trick the system, thus allowing for intervention to identify the patient, and address the suspicious behavior. Different actions performed on the part of the user may allow the user to be classified into one or more categories, the category being changed based upon one or more actions they may perform over time. Such a system may be provided in accordance with one or more features as described in copending US Patent Application Serial No. 13/189,516, filed July 24, 2011 to Hanina et al, titled Method and Apparatus for Monitoring Medication Adherence, the contents thereof being incorporated by reference in its entirety. The medication administration system noted therein may be employed to classify suspicious users based upon their actions.
[031] If a medication is being used to treat a certain symptom, therefore in accordance with one or more embodiments of the subject matter of this disclosure, the system may be employed to measure visually if that symptom is improving. For example, concentration, speed to complete tasks, motor control etc. If symptoms or behavior (eye movement still erratic for example) fail to improve, this may suggest that the user is not taking their medication. Mood may also be measured and monitored as a signal of whether the user is taking their medication. The system may perform various actions to classify a user in one or more medication administration risk category, thus suggesting a level of review and follow up that may be required by the system to follow up with the user.
[032] Additionally, the system may determine a movement of the imaging device, through analysis of information provided in the field of view thereof, or through the use of one or more gyroscopes or accelerometers thereon. Thus, if the user tampers with the position of the imaging device or camera, the system can detect the user's suspicious action and automatically notifies a monitor or a healthcare provider. Other clues, such as changes in a background setting at one or more critical times of medication administration, or other indications of movement of the device, or the like.
[033] After confirmation or failure of confirmation of such administration, the patient may be provided with a progress report regarding how they have performed over time, and further providing encouragement for future adherence. The progress report may include adherence to the medication protocol over time, adherence changes recently, percentage of medication protocol completed, etc. Additionally, notice of a next administration time may be provided, along with one or more messages from a healthcare provider regarding protocol changes, or other desired information. Furthermore, the system may report various detected instances of potentially suspicious behavior to a healthcare provider (e.g., a doctor or a nurse) via a dashboard, and preferably a browser-based dashboard that the healthcare provider can access over the Internet with a user name and password specific to the provider. The provider dashboard allows for the review of near real-time adherence and other information about each patient using the system. The dashboard reports general adherence information along with the noted suspicious activity information. The system may cause a display of a warning message to the patient. The warning message indicates that unusual activity has been detected. The warning message may inform the patient that incorrect use of the medication or protocol may result in their study coordinator / healthcare provider being contacted, their being removed from the trial, or there may be an additional level of monitoring applied to the patient.
[034] Therefore, in accordance with the present disclosure, confirmation of patient adherence to the prescribed administration schedule for the medication as prescribed by the clinical trial or other prescription regimen may be determined by the system, which includes hardware component, while suspicious or malicious behavior may be identified by the system. While such confirmation may take a number of forms, in some embodiments, a method for such confirmation may include capturing a video and audio sequence of the patient actually administering the medication. In a further preferred method, such a sequence for such confirmation may include employing a facial recognition sequence or other biometric confirmation that a particular patient is in fact receiving treatment, but may also provide for the ability to obscure the face or other identifying feature of a user, simplify a displayed image through rotoscoping or the like, or otherwise encrypt such information to allow for the storage and use of such images while protecting the identity of the patient, a technique that may be beneficial when a medication administration manager is providing a general report about a clinical trial, and not trying to remedy a situation with a particular patient, or in particular in a public health or disease management scenario. Activity recognition, gesture recognition, computer vision processing, deep learning processing, or other feature for determining whether a particular subject movement meets a predefined movement sequence may be performed by a computer system to be sure that the patient is properly taking prescribed medication. This same gesture recognition may also be employed to determine suspicious or malicious behavior on the part of the user, as described above. Computerized techniques for performing activity recognition, gesture recognition are known in the art, for example, as described in Niebles, J. C, Wang, H., and Fei-Fei, L. Unsupervised Learning of Human Action Categories Using Spatial-temporal Words. Int J Comput Vis. 16 March 2007.) Audio recognition may also be employed by the system, which includes hardware components, to determine suspicious noises such as coughing noises or the like at one or more critical key moments associated with medication administration. For example, if coughing consistently occurs routinely after the user has pace a medication pill in their mouth, then the patient may be escalated to a risk category providing for a higher level of scrutiny of review during the administration process over time. Finally, measurement of time on task, indicative of an amount of time required for the user to perform one or more prescribed steps may also be employed by the system to aid in determining suspicious behavior. This time on task may be measured across many different devices and instances of use of the apparatus to determine one or more trends that may be interesting, and may be used to determine suspicious behavior. For example, time on task may be employed to determine miming of an activity that the user I not really performing the medication administration steps as required.
[035] Referring next to Figure 2, a method in accordance with an embodiment of the present disclosure for performing audio and video capture and recognition of adherence to a prescribed protocol, and for determining one or more indications of suspicious or malicious activities, is described, as set forth in steps 130 and 135 of Figure 1. One or more of the steps of the method may be performed by the information capture and analysis system described in detailed below with reference to Figure 6 and Figure 7. In Figure 2, a patient may first log into the system of the invention at step 205, employing the facial recognition, biometric recognition, password entry, voice recognition, or other patient identification method, and at step 210 proper medication is preferably confirmed as noted above, through the use of bar code reading, text recognition, visual recognition employing video or still image recognition, or other medication recognition technique as described above. The patient may be reminded to log onto the system to take their medication through any type of reminder, such as a text message, email, phone call, automated alarm or the like. Processing then passes to step 225 where the system prompts the user to perform one or more predetermined actions and captures the video and/or audio of each of these actions. The system analyzes the captured video/audio of each of these actions at step 230. At step 235, the system may determine whether the action has been properly captured, and whether the captured action has been properly analyzed by the system in one or more manners as will be described below. That is, the system checks to confirm whether the captured action has been properly captured, and whether the action has been properly analyzed. The failure of this step results in a request to recapture the information to re-perform the capture and analysis step.
[036] If the system determines that administration of the medication did not take place properly, processing may return to step 225 and the user may be once again prompted to perform the action. (Of course, if this process involves actual administration of pill, film, inhaler, injectable medication, or any other medication, it may not be proper to request re- performance of the action, unless it can be determined that the user did not actually administer the medication.) If the action has been properly performed and is able to be analyzed, processing ends at step 250 where the various captured video sequences are stored. These stored sequences may also be made available for human review and involvement, when it is determined that this would be beneficial, and may further preferably be employed to determine suspicious or malicious activity. Areas of interest for review may be highlighted and marked as potentially including suspicious or incorrect activity. Percentage estimates of risk may be automatically provided by the system based on risk algorithms that are generated, and based upon a category into which the user may have been placed based upon their prior activity, and one or more learned activities from a plurality of users.
[037] Referring next to Figure 3, a table is shown describing a plurality of items to be monitored by a system such as the information capture and analysis system of Figure 6 during medication administration (within the table), and a category for which the monitored item is applicable (noted across the top of the table on the first row). In some implementations, the table is stored in a database and the system can reference the database to determine which items to monitor. In some implementations, items to be monitored can be selected by an operator or user of the system ahead of time. Thus, in addition to monitoring items for suspicious activity, monitored items may also be used to monitor usability, suspicious activity, or cheating, or confirm that some information is missing. Please note that the following acronyms are used in Figure 3: Mouth not Visible (MNV); Pill In Mouth (PIM); Empty Mouth (EM); Empty Under Tongue (EUT); Time On Task (TOT); Hand To Mouth (HTM); Same Not Same (SNS).
[038] Thus, as is shown in Figure 3, elements monitored for usability include 1) Mouth Not Visible; 2) Time on Task greater than 20 seconds; 3) Use of an opaque container; 4) Rotation of the mobile device; and 5) Time out of the system. Monitoring of these elements over time in accordance with the subject matter described in this disclosure will give a picture of status of the user related to usability issues.
[039] Elements monitored for suspicious activity include: 1) Hand to Mouth (HTM) during or after the Pill in Mouth step; 2) Mouth not Visible (MNV) during or after the Pill in Mouth (PIM) Step, or when checking for an Empty space under the Tongue when not drinking; 3) Mouth not Visible during or after the Pill in Mouth Step, or when checking for an Empty space under the Tongue and the phone is rotating; 4) When the patient is not drinking and the pill is physically large, and thus hard to dry-swallow. More specifically, if the pill is very large/hard to swallow without liquid, and if the system determines that the patient nonetheless does not have any liquid, the system can determine that this is a suspicious activity; 5) if the patient is found to be spitting out the pill; 6) if the patient is found not to be swallowing; 7) if the patient is found to have a closed mouth between the empty mouth step and the empty under tongue check step; 8) if there is a very short time (e.g., one second or two seconds) between the pill in mouth and the empty mouth step (e.g., the time between the pill in mouth and the empty mouth is less than a predefined time); 9) if there is considerable motion from the muscles of mastication and buccinators (jaw and cheek). Considerable motion refers to motion that is sufficient for the system to determine that the user has placed the pill in their cheek. The system can learn to determine consideration motion over time when trained with examples of patients placing the pill in their cheek.
[040] Elements monitored for cheating activity include: 1) Pill detection after empty mouth; 2) Pill detection after pill in mouth and spitting of the pill; 3) Pill detection after pill in mouth and detection of not swallowing; 4) Miming of the pill in hand step; 5) Generic pill or object in hand is confirmed, while the specific pill of interest in hand is not confirmed; 6) Generic pill or object in mouth is confirmed, while the specific pill of interest in mouth is not confirmed; 7) wrong person is recognized; 8) double enrollment is recognized; and 9) the pill recognized for the pill in hand and the pill in mouth steps do not match.
[041] Finally, elements monitored to confirm missing information include: 1) mouth not visible in either of the pill in mouth or the empty under tongue check; 2) system recognizes it is too bright or too dark, and 3) there is corrupt video or missing frames. [042] The system may provide responses to the user in real time or near real time in the event that one or more of the elements to be monitored are recognized, thus providing immediate and helpful feedback to the user to properly perform the desired sequence of actions. As noted above, it may be desirable to not report some of the monitoring results to the user, so that a consistent review of action may be provided without alerting the user to adjust their behavior.
[043] As is next shown in Figure 4, a chart is provided depicting steps (as noted above) related to confirming medication administration. In some implementations, the chart is stored in a database and the system can reference the database to determine which steps to be performed by the system. In some implementations, the steps to be performed by the system can be preset by an operator or user of the system ahead of time. These steps are noted in the top row in Figure 4, which includes: 1) facial recognition (Face); 2) pill in hand (PIH) confirmation; 3) pill in mouth (PIM) recognition; 4) empty mouth (EM) check and empty under tongue (EUT) check. Additionally depicted are the elements to be monitored, including: 1) mouth not visible; 2) hand to mouth; 3) rotation of camera; 4) problems while drinking; 5) pill detector; 6) opaque container detector; 7) miming of pill in hand step (i.e., the system determines in advance there is no pill in the hand); 8) a generic pill (i.e., a pill that has been identified as not corresponding to the expected pill) used in the pill in hand step; 9) a generic pill used in the pill in mouth step; 10) recognition of spitting out of the pill; and 11) recognition of pill swallowing. The chart depicts during which steps associated with medication administration each of the measured elements are preferably monitored.
[044] The left column and the bottom row of Figure 4 use the following notations: PIH for pill in hand, PIM for pill in mouth, EM for empty mouth, EUT for empty under the tongue, MNV for mouth not visible, HTM for hand to mouth, SNS for Same/Not Same. [045] The top row of Figure 4 represents steps performed by a patient (e.g., face confirmation, pill in hand, pill in mouth, empty mouth, and empty under tongue.) The left column notes types of motions or gestures of the patient that the system is configured to look for. Bar graphs in Figure 4 shows during which steps the motions or gestures that the system is looking for are potentially "active."
[046] During the "pill in hand" and "pill in mouth" steps (when a pill is visible), the system can also check whether the pill is still the same as originally imaged (to check for substitution).
[047] In accordance with a further embodiment of the subject matter described in this disclosure, monitored elements may be combined in accordance with an equation of the Bayesian form as follows.
p[cheating | data] DC p[data | cheating ] p[cheating] The equation notes that the probability of cheating being detected is proportional to the likelihood that the data will support an inference of cheating and a prior determination of the probability of cheating. The likelihood that the data will support an inference of cheating is preferably a concatenation of a number of elements, as shown in Figure 5. Bayes formula (or other appropriate functions) can also be applied iteratively here to perform Bayesian updates of the posterior probability over time as we collect additional evidence. In the update step the posterior probability estimate from the previous timestep can be treated as the updated prior for the next timestep. In this manner, the estimation will gradually give more and more weight to the observed evidence and less weight to the initial a priori belief.
[048] R(x|6) is a regression model parameterized by theta which infers a continuous likelihood value based on the evidence x (concatenation of the features). Θ are the parameters of the model which can be modified over time. In particular, θ can be learned from supervised data. The training data, in accordance with an embodiment of the present disclosure, comprises videos of doses and their corresponding features x. Supervision of the training system and process comes from one or more other computer systems or human annotators and from PK data whenever that is available. Thus, confirmation of status of particular actions from one or more other computer systems or human annotators may be provided to the learning system at the time of acquisition or at a later date in order to teach the system preferred and proper evaluation, allowing the system to in the future also make such accurate and proper evaluations. Examples of implementations of R can be, Support Vector Regression, Random Forest, Logistic Regression, Neural networks, Recurrent neural networks, LSTMs, etc.
[049] Calculation of the prior determination of the probability of cheating is preferably related to one or more of Age, Gender, Race, on any additional attribute found to be related to likelihood of cheating. These additional attributes may be determined in accordance with analysis of prior data related to medication administration and determined cheating. Data may furthermore be collected from one or more patient populations related to therapeutic area, response to medications, co-morbidities, other demographic information, and the like. Such data may also be provided by one or more healthcare providers, sites in clinical trials, or other available databases of information.
[050] The system may provide one or more prompts to a patient related to measurement of any of the elements shown in Figures 3 or 4. Prompts may be selectively provided to the patient, so that certain prompts encourage proper administration by the user, while other prompts may be withheld so that actions may be monitored without alerting the patient that their activity is under scrutiny.
[051] Mechanisms for measuring the elements in Figures 3 or 4 may be provided in an interactive manner as well. For example, if a patient is suspected of not properly administering their medication, the system may react adaptively to the actions of the patient, and for example, ask the patient to pull open their cheek or adjust the position of their open mouth to allow the camera to have a better view of the inside of the mouth of the patient to allow for a better chance to see if a pill is still positioned within the mouth of the patient. The system may further employ one or more 3D cameras, infrared cameras, or other cameras designed for a particular purpose in order to improve the quality of images and the ability to see, for example, distortion of the cheek of a patient attempting to hide a medication pill. The system may employ these additional video capture techniques, and may further provide feedback to the patient during medication administration, such as by requesting, for example, that the device be brought closer to the mouth of the patient to provide a better view thereof, by looking at one or more predetermine micro-expressions indicative of swallowing, attempts to hide the medication, pill, removal of the medication pill and the like. Audio recognition may also be used, either alone or in conjunction with the video capture, to further allow review of the system to, for example, listen for the sound of pills being spit out. Video capture may be performed at very high speed, allowing for subsequent higher temporal resolution review of elements of medication administration. Video element may also be amplified to allow for easier distinction of medication adherence issues. Additionally, the system may compare captured video information to previously captured video to look for anomalies, i.e. differences from standard performance of medication administration, or similarities to administration actions designated to be suspicious.
[052] The system may further present one or more questions, or other information to the patient in response to a recognition of potentially suspicious activity, and gauge a response. The response can be considered for not only content, but also for status of the user when responding. Thus, it is possible to judge whether the user appears to be nervous and stressed or calm when answering the question, for example. Other issues, such a slurring speech, speeding up or slowing down when speaking may also be correlated with the responses from the user and ultimately correlating with an actual determination of whether the user is properly administering the medication, or is cheating/performing suspicious activity.
[053] Users may be associated with a score indicative of medication adherence, likelihood of future proper medication adherence or the like. Through such a scoring system, it is possible to easily categorize and manage users so that similarly-scored users can be provided with similar intervention, follow up and scrutiny.
[054] Deep learning and other supervised or unsupervised learning techniques may be employed to improve the responsiveness of the system, and to extract patterns that may be predictive of future action on the part of users. Thus, such expert systems may review input data in an automated fashion, and provide correlations between the data that are predictive in the future moving forward.
[055] In a further embodiment, it is possible to provide a unique serialization of medication so that the system may confirm that each and every dose is correct. Thus, each bottle, or each dose, may be imprinted with a unique identifying barcode, QR code, data matrix code, or other code that allows for a reader to determine an identity based upon a visual capture of the code. Codes may be assigned to define categories of pills, individual groups of doses, or individual pills, and may further be customized to allow for the assignment of a particular pill to be correlated with a single individual. Thus, facial recognition results may be combined with QR code results from a bottle or pill to confirm that the correct pill is being taken by the corresponding correct person.
[056] According to another aspect, once the analyses noted above have been performed, in order to encourage the system to learn more about human behavior, measurements of actual drug levels, for example, may be determined and fed back into the system. Therefore, by way of example, if during monitoring, the system finds a particular patient who have caused one or more of the elements for suspicious activity to have been recognized, subsequent to this process, the system may determine actual drug levels in the blood of the patients. This is an accurate depiction of whether the patient has ingested the medication, at least on the few days before the blood was drawn (depending on half-life of drug). Thus, it is possible to correlate recognition of suspicious activity elements (or other elements) with actual drug blood levels. The system may recognize patterns or groups of elements that correlate with lack of drug in the blood, and then use the pattems or groups of elements in the future to better predict the likely failure to properly administer medication. Furthermore, as additional information becomes available, such as in a clinical trial where it might be years before knowledge of actual medication blood levels may be determined, data may be reprocessed to determine any correlations between any one or more of the monitored elements and actual drug levels.
[057] Therefore, in accordance with the present disclosure, a method and apparatus are provided that allow for the automated confirmation of adherence to administration protocol for medication, and provide for a most sophisticated method for confirming and studying methods of administration of such prescription medication. The system described in this disclosure can monitor suspicious activity, cheating, and other elements in order to insure proper administration, and can learn to improve its performance based upon actual use of the system by patients.
[058] Figure 6 illustrates an information capture and analysis system that includes a remote information capture apparatus 1000, a communication system 2000, and a remote data and computing device 3000. The information capture and analysis system is adapted to allow for the capture and processing of information in order to implement the system and method in accordance with the present disclosure. The information capture apparatus 1000 communicates with a remote data and computing device 3000 via a communication system 2000 (e.g., the Internet, Wi-Fi, LAN, WAN, Bluetooth, or other communication system). Via the communication system 2000, information captured by apparatus 1000 may be transmitted to remote data and computing device 3000, and analysis information or other instructions may be provided from remote data and computing device 3000 to apparatus 1000. It is further contemplated that a plurality of such information capture apparatuses 1000 may be coordinated to monitor a larger space than a space that can be covered by a single such apparatus. Thus, the apparatuses can be made aware of the presence of the other apparatuses, and may operate by transmitting all information to one of the apparatuses 1000, or these apparatuses may each independently communicate with remote data and computing location, which is adapted to piece together the various information received from the plurality of devices 1000.
[059] Figure 7 shows a more detailed view of an example embodiment of remote information capture apparatus 1000 and remote data and computing device 3000 of the information capture and analysis system of FIG. 6. As shown in Figure 7, the apparatus 1000 comprises an information capture device 1110 for capturing video and audio data as desired. A motion detector 1115 or other appropriate trigger device may be provided associated with capture device 1110 to allow for the initiation and completion of data capture. Information capture device 1110 may comprise a visual data capture device, such as a visual camera, or may be provided with an infrared, night vision, or other appropriate information capture device. A storage location 1120 is further provided for storing captured information, and a processor 1130 is provided to control such capture and storage, as well as other functions associated with the operation of remote information capture apparatus 1000. An analysis module 1135 is provided in accordance with processor 1130 to perform a portion of analysis of any captured information at the remote information capture apparatus 1000. Apparatus 1000 is further provided with a display 1140, and a data transmission and receipt system 1150 and 1160 for displaying information, and for communicating with remote data and computing device 3000. In some embodiments, display 1140 may be used, along with an audio speaker, if desired, to provide one or more interview questions in accordance with an automated interview process. In such a situation, information capture device 1110 would then capture video and audio information provided by a user in response to the automated interview process.
[060] The remote data and computing device 3000 comprises system management functions 3030, and a transmission and reception system 3050 and 3060 for communicating with apparatus 1000. Transmission and reception system 3050 and 3060 may further comprise various GPS modules so that a location of the device can be determined at any time, and may further allow for a message to be sent to one or more individual apparatuses, broadcast to all apparatuses in a particular trial, or being used for administration of a particular prescription regimen, of broadcast to all available apparatuses.
[061] In accordance with an embodiment of the disclosure, apparatus 1000 is adapted to be part of a system that monitors user (patient) medication administration, and determined that the correct user is administering the correct medication at the correct time. Users of apparatus 1000 in accordance with this system give administrators a tangible and concrete manner in which to review activities and collected information related to proper medication administration. Apparatus 1000 of the disclosure is adapted to receive medication protocol and instructions for medication administration, or the like for patients from remote data and computing device 3000 and provide these instructions to patients to guide them in administering their medication. Such instructions may comprise written, audio or audio/video instructions for guiding a user to perform one or more medication administration activities, such as showing a face of the user, showing a pill to be ingested, or confirming that the medication has been properly ingested, and therefore confirming whether a user is adhering to a prescribed medication protocol. The video instructions can be provided either by a real person or by an animated cartoon character (avatar), or the like, and are designed to be interactive in nature. [062] It will thus be seen that the objects set forth above, among those made apparent from the preceding description, are efficiently attained and, because certain changes may be made in carrying out the above method and in the construction(s) set forth without departing from the spirit and scope of the subject matter described in this disclosure, it is intended that all matter contained in the above description and shown in the accompanying drawings shall be interpreted as illustrative and not in a limiting sense.
[063] It is also to be understood that this description is intended to cover all of the generic and specific features of the subject matter described in this disclosure herein described and all statements of the scope of the subject matter described in this disclosure which, as a matter of language, might be said to fall there between.
[064] Embodiments of the subject matter and the functional operations, for example, the computer system in Figure 6 and Figure 7 and the methods described in the detail above with reference to Figures 1-5, can be implemented in digital electronic circuitry, in tangibly- embodied computer software or firmware, in computer hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer programs, i.e., one or more modules of computer program instructions encoded on a tangible non-transitory program carrier for execution by, or to control the operation of, data processing apparatus. The computer storage medium can be a machine-readable storage device, a machine-readable storage substrate, a random or serial access memory device, or a combination of one or more of them.
[065] The term "data processing apparatus" refers to data processing hardware and encompasses all kinds of apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers. The apparatus can also be or further include special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit). The apparatus can optionally include, in addition to hardware, code that creates an execution environment for computer programs, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them.
[066] A computer program, which may also be referred to or described as a program, software, a software application, a module, a software module, a script, or code, can be written in any form of programming language, including compiled or interpreted languages, or declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program may, but need not, correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data, e.g., one or more scripts stored in a markup language document, in a single file dedicated to the program in question, or in multiple coordinated files, e.g., files that store one or more modules, sub-programs, or portions of code. A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a data communication network.
[067] The processes and logic flows described in this specification can be performed by one or more programmable computers executing one or more computer programs to perform functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
[068] Computers suitable for the execution of a computer program include, by way of example, can be based on general or special purpose microprocessors or both, or any other kind of central processing unit. Generally, a central processing unit will receive instructions and data from a read-only memory or a random access memory or both. The essential elements of a computer are a central processing unit for performing or executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. However, a computer need not have such devices. Moreover, a computer can be embedded in another device, e.g., a mobile telephone, a personal digital assistant (PDA), a mobile audio or video player, a game console, a Global Positioning System (GPS) receiver, or a portable storage device, e.g., a universal serial bus (USB) flash drive, to name just a few.
[069] Computer-readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
[070] To provide for interaction with a user, embodiments of the subject matter described in this specification can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input. In addition, a computer can interact with a user by sending documents to and receiving documents from a device that is used by the user; for example, by sending web pages to a web browser on a user's device in response to requests received from the web browser.
[071] Embodiments of the subject matter described in this specification can be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface or a web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (LAN) and a wide area network (WAN), e.g., the Internet.
[072] The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. In some embodiments, a server transmits data, e.g., an HTML page, to a user device, e.g., for purposes of displaying data to and receiving user input from a user interacting with the user device, which acts as a client. Data generated at the user device, e.g., a result of the user interaction, can be received from the user device at the server.
[073] While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any subject matter described in this disclosure or on the scope of what may be claimed, but rather as descriptions of features that may be specific to particular embodiments of the subject matter described in this disclosure. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
[074] Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system modules and components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
[075] Particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. For example, the actions recited in the claims can be performed in a different order and still achieve desirable results. As one example, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous.

Claims

1. A system comprising one or more computers in one or more locations and one or more storage devices storing instructions that, when executed by one or more computers, cause the one or more computers to perform operations comprising:
capturing one or more video sequences of a user administering a medication by a video capture device;
analyzing the captured one or more video sequences to determine one or more indications of a suspicious activity of the user; and
adaptively performing a follow-up operation in response to a determination of one or more indications of a suspicious activity of the user.
2. The system of claim 1, wherein capturing the one or more video sequences of the user comprises:
determining an identity of the user using one or more of the following methods: facial recognition, biometric recognition, password entry, or voice recognition;
prompting the user to perform one or more predetermined actions to administer the medication; and
capturing the video sequence of the user performing the one or more predetermine actions.
3. The system of claim 1, wherein analyzing the one or more captured video sequences comprises:
determining that the medication is the correct medication prescribed for the user based on one or more of text, a machine-readable code, or a unique identifier associated with the medication.
4. The system of claim 1, wherein analyzing the captured video sequences comprises: determining whether a sequence of user movements depicted in the video match a predefined movement sequence using an image processing technique.
5. The system of claim 1, wherein determining one or more indications of a suspicious activity comprises determining one or more of the following: 1) the user's hand is at the mouth during or after the medication is placed in mouth, (2) the mouth is not visible during or after the medication is placed in the mouth, 3) the user is spitting out the medication, 4) the user is not swallowing the medication, 5) the user has a closed mouth between the time when the user empties the mouth after drinking the medication and the time when the under tongue area of the user is checked by the system, 6) the time period between the time when the medication is in the mouth and the time when the user empties the mouth after drinking the medication is less than a predefined amount of time, or 7) a motion indicating that the user has placed the medication in their cheek.
6. The system of claim 1, wherein determining one or more indications of a suspicious activity comprises determining one or more of the following: 1) one or more frames in at least one of the video sequences are too bright or too dark, or 2) at least one of the video sequences has missing frames.
7. The system of claim 1, wherein adaptively performing a follow-up operation comprises:
causing a display of a warning message to the user, the warning message indicating that one or more indications of a suspicious activity have been determined.
8. The system of claim 1, wherein adaptively performing a follow-up operation comprises:
causing a presentation of one or more follow-up questions to the user; and evaluating the behavior of the user when responding to the one or more questions to determine whether the user is cheating.
9. The system of claim 1, wherein the one or more video sequences are captured by an image capturing device, and wherein adaptively performing a follow-up operation comprises: requesting the user to adjust the position of the mouth or to bring the image capturing device closer to the mouth to provide a better view of the mouth.
10. The system of claim 1 , wherein adaptively performing a follow up operation comprises:
notifying a healthcare provider that one or more indications of a suspicious activity of the user have been determined.
1 1. A computer-implemented method comprising:
capturing one or more video sequences of a user administering a medication by a video capture device;
analyzing the captured one or more video sequences to determine one or more indications of a suspicious activity of the user; and
adaptively performing a follow-up operation in response to a determination of one or more indications of a suspicious activity of the user.
12. The method of claim 1, wherein capturing the one or more video sequences of the user comprises:
determining an identity of the user using one or more of the following methods: facial recognition, biometric recognition, password entry, or voice recognition;
prompting the user to perform one or more predetermined actions to administer the medication; and
capturing the video sequence of the user performing the one or more predetermine actions.
13. The method of claim 1, wherein analyzing the one or more captured video sequences comprises:
determining that the medication is the correct medication prescribed for the user based on one or more of text, a machine-readable code, or a unique identifier associated with the medication.
14. The method of claim 1, wherein analyzing the captured video sequences comprises: determining whether a sequence of user movements depicted in the video match a predefined movement sequence using an image processing technique.
15. The method of claim 1, wherein determining one or more indications of a suspicious activity comprises determining one or more of the following: 1) the user's hand is at the mouth during or after the medication is placed in mouth, (2) the mouth is not visible during or after the medication is placed in the mouth, 3) the user is spitting out the medication, 4) the user is not swallowing the medication, 5) the user has a closed mouth between the time when the user empties the mouth after drinking the medication and the time when the under tongue area of the user is checked by the system, 6) the time period between the time when the medication is in the mouth and the time when the user empties the mouth after drinking the medication is less than a predefined amount of time, or 7) a motion indicating that the user has placed the medication in their cheek.
16. The method of claim 1, wherein adaptively performing a follow-up operation comprises:
causing a display of a warning message to the user, the warning message indicating that one or more indications of a suspicious activity have been determined.
17. The method of claim 1, wherein adaptively performing a follow-up operation comprises:
causing a presentation of one or more follow-up questions to the user; and evaluating the behavior of the user when responding to the one or more questions to determine whether the user is cheating.
18. The method of claim 1, wherein the one or more video sequences are captured by an image capturing device, and wherein adaptively performing a follow-up operation comprises: requesting the user to adjust the position of the mouth or to bring the image capturing device closer to the mouth to provide a better view of the mouth.
19. The method of claim 1 , wherein adaptively performing a follow up operation comprises:
notifying a healthcare provider that one or more indications of a suspicious activity of the user have been determined.
20. One or more non-transitory computer-readable media storing instructions that, when executed by one or more computers, cause the one or more computers to perform operations comprising:
capturing one or more video sequences of a user administering a medication by a video capture device;
analyzing the captured one or more video sequences to determine one or more indications of a suspicious activity of the user; and
adaptively performing a follow-up operation in response to a determination of one or more indications of a suspicious activity of the user.
PCT/US2018/051669 2017-09-19 2018-09-19 Apparatus and method for recognition of suspicious activities WO2019060367A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP18858751.3A EP3685390A4 (en) 2017-09-19 2018-09-19 Apparatus and method for recognition of suspicious activities
AU2018335288A AU2018335288B2 (en) 2017-09-19 2018-09-19 Apparatus and method for recognition of suspicious activities

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201762560528P 2017-09-19 2017-09-19
US62/560,528 2017-09-19

Publications (1)

Publication Number Publication Date
WO2019060367A1 true WO2019060367A1 (en) 2019-03-28

Family

ID=65720490

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2018/051669 WO2019060367A1 (en) 2017-09-19 2018-09-19 Apparatus and method for recognition of suspicious activities

Country Status (4)

Country Link
US (1) US11170484B2 (en)
EP (1) EP3685390A4 (en)
AU (1) AU2018335288B2 (en)
WO (1) WO2019060367A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11335466B2 (en) * 2019-02-15 2022-05-17 Tencent America LLC Method for determining disease symptom relations using acceptance and rejection of random samples
US11081220B2 (en) * 2018-02-02 2021-08-03 Carefusion 303, Inc. System and method for dispensing medication
CN110490106B (en) * 2019-08-06 2022-05-03 万翼科技有限公司 Information management method and related equipment
CN111601080B (en) * 2020-05-12 2021-08-10 湖北君赞智能科技有限公司 Video management system for community security monitoring video storage
CN111950466B (en) * 2020-08-13 2021-05-18 北京福通互联科技集团有限公司 Bottled liquor detection method and detection device based on trajectory cascade algorithm
WO2022154847A1 (en) 2021-01-12 2022-07-21 Emed Labs, Llc Health testing and diagnostics platform
US11521726B2 (en) * 2021-01-28 2022-12-06 Sonara Health, Inc. System and method for monitoring drug delivery
US11615888B2 (en) 2021-03-23 2023-03-28 Emed Labs, Llc Remote diagnostic testing and treatment
US20230169883A1 (en) * 2021-12-01 2023-06-01 Serotonin, Inc. Method for detecting and affirming intent to consume a supplement
CN115115843B (en) * 2022-06-02 2023-08-22 马上消费金融股份有限公司 Data processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080201174A1 (en) * 2005-08-29 2008-08-21 Narayanan Ramasubramanian Personalized medical adherence management system
US20140184772A1 (en) * 2010-05-06 2014-07-03 AI Cure Technologies, Inc. Apparatus and Method for Recognition of Suspicious Activities
US20140376876A1 (en) * 2010-08-26 2014-12-25 Blast Motion, Inc. Motion event recognition and video synchronization system and method
US9679113B2 (en) * 2014-06-11 2017-06-13 Aic Innovations Group, Inc. Medication adherence monitoring system and method

Family Cites Families (129)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3814845A (en) 1973-03-01 1974-06-04 Bell Telephone Labor Inc Object positioning
US5065447A (en) 1989-07-05 1991-11-12 Iterated Systems, Inc. Method and apparatus for processing digital data
US5544649A (en) 1992-03-25 1996-08-13 Cardiomedix, Inc. Ambulatory patient health monitoring techniques utilizing interactive visual communication
US5441047A (en) 1992-03-25 1995-08-15 David; Daniel Ambulatory patient health monitoring techniques utilizing interactive visual communication
US6283761B1 (en) 1992-09-08 2001-09-04 Raymond Anthony Joao Apparatus and method for processing and/or for providing healthcare information and/or healthcare-related information
US20010011224A1 (en) 1995-06-07 2001-08-02 Stephen James Brown Modular microprocessor-based health monitoring system
KR970000683B1 (en) 1993-05-31 1997-01-16 삼성전자 주식회사 Resolution adaptive video compression/decompression method and apparatus
US5752621A (en) 1995-03-20 1998-05-19 Eigen Technology Inc. Smart automatic medication dispenser
US5911132A (en) 1995-04-26 1999-06-08 Lucent Technologies Inc. Method using central epidemiological database
US5619991A (en) 1995-04-26 1997-04-15 Lucent Technologies Inc. Delivery of medical services using electronic data communications
US5961446A (en) 1995-10-06 1999-10-05 Tevital Incorporated Patient terminal for home health care system
US8092224B2 (en) 1995-11-22 2012-01-10 James A. Jorasch Systems and methods for improved health care compliance
US5646912A (en) 1996-01-25 1997-07-08 Cousin; Damon S. Medication compliance, co-ordination and dispensing system
US7370797B1 (en) 1996-05-31 2008-05-13 Scott Lindsay Sullivan Pill printing and identification
US5810747A (en) 1996-08-21 1998-09-22 Interactive Remote Site Technology, Inc. Remote site medical intervention system
GB9626825D0 (en) 1996-12-24 1997-02-12 Crampton Stephen J Avatar kiosk
GB9704843D0 (en) 1997-03-08 1997-04-23 Murphy Graham F Apparatus
US6535637B1 (en) 1997-04-04 2003-03-18 Esco Electronics, Inc. Pharmaceutical pill recognition and verification system
US6233428B1 (en) 1997-09-17 2001-05-15 Bruce Fryer System and method for distribution of child care training materials and remote monitoring of child care centers
JPH11155142A (en) 1997-11-19 1999-06-08 Mitsubishi Electric Corp Medical treatment support system
US6421650B1 (en) 1998-03-04 2002-07-16 Goetech Llc Medication monitoring system and apparatus
US6045501A (en) 1998-08-28 2000-04-04 Celgene Corporation Methods for delivering a drug to a patient while preventing the exposure of a foetus or other contraindicated individual to the drug
US6484144B2 (en) 1999-03-23 2002-11-19 Dental Medicine International L.L.C. Method and system for healthcare treatment planning and assessment
US6607485B2 (en) 1999-06-03 2003-08-19 Cardiac Intelligence Corporation Computer readable storage medium containing code for automated collection and analysis of patient information retrieved from an implantable medical device for remote patient care
US7256708B2 (en) 1999-06-23 2007-08-14 Visicu, Inc. Telecommunications network for remote patient monitoring
EP1085366B1 (en) 1999-09-14 2004-09-15 Kabushiki Kaisha Toshiba Face image photographing apparatus and face image photographing method
US6294999B1 (en) 1999-12-29 2001-09-25 Becton, Dickinson And Company Systems and methods for monitoring patient compliance with medication regimens
US6988075B1 (en) 2000-03-15 2006-01-17 Hacker L Leonard Patient-controlled medical information system and method
US20010056358A1 (en) 2000-03-24 2001-12-27 Bridge Medical, Inc., Method and apparatus for providing medication administration warnings
US6542902B2 (en) 2000-03-24 2003-04-01 Bridge Medical, Inc. Method and apparatus for displaying medication information
GB0014059D0 (en) 2000-06-09 2000-08-02 Chumas Paul D Method and apparatus
ES2435248T3 (en) 2000-07-05 2013-12-17 Smart Technologies Ulc Touch system and camera-based method
US6795068B1 (en) 2000-07-21 2004-09-21 Sony Computer Entertainment Inc. Prop input device and method for mapping an object from a two-dimensional camera image to a three-dimensional space for controlling action in a game program
US20020026330A1 (en) 2000-08-23 2002-02-28 Klein Edward E. System and method for patient medication management and compliance using a portable computing device
US7448544B1 (en) 2000-11-16 2008-11-11 Gsl Solutions, Inc. Tracking system for individual detection of prescription orders contained within a bulk container
WO2002049344A1 (en) 2000-12-15 2002-06-20 Leonard Reiffel Imaged coded data source tracking product
JP3308972B1 (en) 2001-01-16 2002-07-29 有限会社セルフセキュリティ Medication confirmation support device
US20070118389A1 (en) 2001-03-09 2007-05-24 Shipon Jacob A Integrated teleconferencing system
US6611206B2 (en) 2001-03-15 2003-08-26 Koninklijke Philips Electronics N.V. Automatic system for monitoring independent person requiring occasional assistance
US8065180B2 (en) 2001-04-02 2011-11-22 invivodata®, Inc. System for clinical trial subject compliance
US7415447B2 (en) 2001-04-02 2008-08-19 Invivodata, Inc. Apparatus and method for prediction and management of participant compliance in clinical research
US6879970B2 (en) 2001-04-02 2005-04-12 Invivodata, Inc. Apparatus and method for prediction and management of subject compliance in clinical research
US7395214B2 (en) 2001-05-11 2008-07-01 Craig P Shillingburg Apparatus, device and method for prescribing, administering and monitoring a treatment regimen for a patient
WO2003048919A1 (en) 2001-11-30 2003-06-12 Becton, Dickinson And Company Medication adherence system
US7317967B2 (en) 2001-12-31 2008-01-08 B. Braun Medical Inc. Apparatus and method for transferring data to a pharmaceutical compounding system
US7340077B2 (en) 2002-02-15 2008-03-04 Canesta, Inc. Gesture recognition system using depth perceptive sensors
DE10210050A1 (en) 2002-03-07 2003-12-04 Siemens Ag Method and device for repetitive relative positioning of a patient
US7369685B2 (en) 2002-04-05 2008-05-06 Identix Corporation Vision-based operating method and system
US7908155B2 (en) 2002-04-12 2011-03-15 Becton, Dickinson And Company System for collecting, storing, presenting and analyzing immunization data having remote stations in communication with a vaccine and disease database over a network
AU2003273605A1 (en) 2002-06-11 2003-12-22 Matos, Jeffrey A System for cardiac resuscitation
US7844361B2 (en) 2002-09-26 2010-11-30 Stratamed Labs, Inc. Prescription drug compliance monitoring system
US7774075B2 (en) 2002-11-06 2010-08-10 Lin Julius J Y Audio-visual three-dimensional input/output
KR100503039B1 (en) 2002-11-25 2005-07-22 삼성테크윈 주식회사 Method to control operation of digital camera for user to easily take an identification photograph
US7002476B2 (en) 2003-01-30 2006-02-21 Leap Of Faith Technologies, Inc. Medication compliance system
US20040168951A1 (en) 2003-02-27 2004-09-02 Mackie Robert W. Method and system for self administration of medications
WO2004103232A1 (en) 2003-05-15 2004-12-02 Apothecus Pharmaceutical Corp. Dissolvable vaginal deodorizing films and methods of vaginal deodorizing utilizing pliable dissolvable film
US7769465B2 (en) 2003-06-11 2010-08-03 Matos Jeffrey A System for cardiac resuscitation
EP1661595B1 (en) 2003-08-14 2019-04-10 Teijin Pharma Limited Oxygen enrichment device
US7304228B2 (en) 2003-11-10 2007-12-04 Iowa State University Research Foundation, Inc. Creating realtime data-driven music using context sensitive grammars and fractal algorithms
US7657443B2 (en) 2003-12-19 2010-02-02 Carefusion 303, Inc. Intravenous medication harm index system
US20050144150A1 (en) 2003-12-30 2005-06-30 Shankar Ramamurthy Remote process capture, identification, cataloging and modeling
US8095379B2 (en) 2003-12-30 2012-01-10 Cerner Innovation, Inc. System and method for preemptive determination of the potential for an atypical clinical event related to the administering of medication
US7447333B1 (en) 2004-01-22 2008-11-04 Siemens Corporate Research, Inc. Video and audio monitoring for syndromic surveillance for infectious diseases
US20070118054A1 (en) 2005-11-01 2007-05-24 Earlysense Ltd. Methods and systems for monitoring patients for clinical episodes
JP4483334B2 (en) 2004-02-18 2010-06-16 富士ゼロックス株式会社 Image processing device
US20050182664A1 (en) 2004-02-18 2005-08-18 Klaus Abraham-Fuchs Method of monitoring patient participation in a clinical study
DE102004013814A1 (en) 2004-03-20 2005-10-13 B. Braun Medizintechnologie Gmbh A method of allowing operator input on a medical device
US7761311B2 (en) 2004-03-23 2010-07-20 Board Of Regents, The University Of Texas System Pharmaceutical treatment effectiveness analysis computer system and methods
GB2412831A (en) 2004-03-30 2005-10-05 Univ Newcastle Highlighting important information by blurring less important information
US7627142B2 (en) 2004-04-02 2009-12-01 K-Nfb Reading Technology, Inc. Gesture processing with low resolution images with high resolution processing for optical character recognition for a reading machine
WO2005117697A2 (en) 2004-05-28 2005-12-15 Narayanan Ramasubramanian Unified indigestion package and process for patient compliance with prescribed medication regimen
US8335694B2 (en) 2004-07-09 2012-12-18 Bruce Reiner Gesture-based communication and reporting system
US7562121B2 (en) 2004-08-04 2009-07-14 Kimberco, Inc. Computer-automated system and method of assessing the orientation, awareness and responses of a person with reduced capacity
US7355594B2 (en) 2004-09-30 2008-04-08 Symbol Technologies, Inc. Optical touch screen arrangement
CN101072535A (en) 2004-10-29 2007-11-14 杨章民 Body health state monitoring and analysing and automatic feedback method and related garment system
US7912733B2 (en) 2005-05-04 2011-03-22 Board Of Regents, The University Of Texas System System, method and program product for delivering medical services from a remote location
US7616111B2 (en) 2005-06-20 2009-11-10 Carestream Health, Inc. System to monitor the ingestion of medicines
US7782189B2 (en) 2005-06-20 2010-08-24 Carestream Health, Inc. System to monitor the ingestion of medicines
US20070016443A1 (en) 2005-07-13 2007-01-18 Vitality, Inc. Medication compliance systems, methods and devices with configurable and adaptable escalation engine
GB2428927A (en) 2005-08-05 2007-02-07 Hewlett Packard Development Co Accurate positioning of a time lapse camera
US7881537B2 (en) 2006-01-31 2011-02-01 Honeywell International Inc. Automated activity detection using supervised learning
US20070194034A1 (en) 2006-02-17 2007-08-23 Vasilios Vasiadis Device for printing pills, tablets or caplets in a precise manner
CA2647816A1 (en) 2006-03-28 2007-11-08 Hospira, Inc. Medication administration and management system and method
WO2007131043A2 (en) 2006-05-02 2007-11-15 Ultradots, Inc. Authenticating and identifying objects using markings formed with correlated random patterns
WO2007129319A2 (en) 2006-05-06 2007-11-15 Irody Inc System and method for real time management of a drug regimen
US7558622B2 (en) 2006-05-24 2009-07-07 Bao Tran Mesh network stroke monitoring appliance
US7539533B2 (en) 2006-05-16 2009-05-26 Bao Tran Mesh network monitoring appliance
US8727208B2 (en) 2006-06-30 2014-05-20 Intel-Ge Care Innovations Llc Method for identifying pills via an optical device
BRPI0714294A2 (en) 2006-07-12 2013-03-12 Arbitron Inc Methods and systems for acknowledgment of receipt and incentives
US8044778B2 (en) 2007-07-12 2011-10-25 Henry Schein, Inc. Injection device and case with reporting ability
US7698002B2 (en) 2006-09-29 2010-04-13 Nellcor Puritan Bennett Llc Systems and methods for user interface and identification in a medical device
US7769345B2 (en) 2006-09-29 2010-08-03 Sony Ericsson Mobile Communications Ab Device and method for guiding a user to a communication position
US7983933B2 (en) 2006-12-06 2011-07-19 Microsoft Corporation Patient monitoring via image capture
US7770136B2 (en) 2007-01-24 2010-08-03 Microsoft Corporation Gesture recognition interactive feedback
US20100092093A1 (en) 2007-02-13 2010-04-15 Olympus Corporation Feature matching method
US7945461B2 (en) 2007-02-15 2011-05-17 Vivonex, L.L.C. Prescription compliance monitoring system
US20100255598A1 (en) 2007-02-22 2010-10-07 Melker Richard J Medication Adherence Monitoring System
DE102007009652A1 (en) 2007-02-26 2008-09-04 Körber Ag Dummy device for patient-based medication using medicinal or pharmaceutical or dietary supplement products for patient, is true-to-original visual reproduction of real packaging section having actual products
US7956727B2 (en) 2007-03-22 2011-06-07 Carespeak Communications, Inc. Methods and systems for medication management
US20080303638A1 (en) 2007-03-24 2008-12-11 Hap Nguyen Portable patient devices, systems, and methods for providing patient aid and preventing medical errors, for monitoring patient use of ingestible medications, and for preventing distribution of counterfeit drugs
US20090062624A1 (en) * 2007-04-26 2009-03-05 Thomas Neville Methods and systems of delivering a probability of a medical condition
ES2438976T3 (en) 2007-05-11 2014-01-21 Saab Ab Device and procedure for a vision apparatus
US8154583B2 (en) 2007-05-31 2012-04-10 Eastman Kodak Company Eye gazing imaging for video communications
WO2009005781A1 (en) 2007-07-02 2009-01-08 Dave Young System and method for clinical trial investigator meeting delivery and training, including dynamic media enrichment
US20090012818A1 (en) 2007-07-06 2009-01-08 Valence Broadband, Inc. Dispensing medication and verifying proper medication use
US20090043633A1 (en) 2007-08-07 2009-02-12 Walgreen Co. Pharmacy task list generator
US8538775B2 (en) 2007-08-16 2013-09-17 Qualcomm Incorporated Mobile wireless medication management system
US8002174B2 (en) 2007-12-21 2011-08-23 Becton, Dickinson And Company Medication administration tracking
US20090217194A1 (en) 2008-02-24 2009-08-27 Neil Martin Intelligent Dashboards
US20100057646A1 (en) 2008-02-24 2010-03-04 Martin Neil A Intelligent Dashboards With Heuristic Learning
JP2009237619A (en) 2008-03-25 2009-10-15 Seiko Epson Corp Detection of face area and organ area in image
JP4840413B2 (en) 2008-07-02 2011-12-21 ソニー株式会社 Information display method, information processing apparatus, and information display program
US8146020B2 (en) 2008-07-24 2012-03-27 Qualcomm Incorporated Enhanced detection of circular engagement gesture
US20100042430A1 (en) 2008-08-12 2010-02-18 Irody Inc System and method for collecting and authenticating medication consumption
US20100262436A1 (en) 2009-04-11 2010-10-14 Chen Ying-Yu Medical information system for cost-effective management of health care
US8292832B2 (en) 2009-07-27 2012-10-23 Anthony Vallone Event-based health activity tracking with icon-based user interface
US11562323B2 (en) * 2009-10-01 2023-01-24 DecisionQ Corporation Application of bayesian networks to patient screening and treatment
US20110119073A1 (en) 2009-11-18 2011-05-19 Al Cure Technologies LLC Method and Apparatus for Verification of Medication Administration Adherence
US20110153360A1 (en) 2009-12-23 2011-06-23 Al Cure Technologies LLC Method and Apparatus for Verification of Clinical Trial Adherence
US9293060B2 (en) 2010-05-06 2016-03-22 Ai Cure Technologies Llc Apparatus and method for recognition of patient activities when obtaining protocol adherence data
US20120316897A1 (en) * 2011-06-10 2012-12-13 AI Cure Technologies, Inc. Method and Apparatus for Monitoring Medication Adherence
EP2502199A4 (en) 2009-11-18 2015-08-26 Ai Cure Technologies Llc Method and apparatus for verification of medication administration adherence
US20110161109A1 (en) 2009-12-31 2011-06-30 Mckesson Financial Holdings Limited Systems and methods for providing adherence-based messages and benefits
US20110195520A1 (en) 2010-02-11 2011-08-11 Ameritox, Ltd. Methods of normalizing measured drug concentrations and testing for non-compliance with a drug treatment regimen
US9875666B2 (en) 2010-05-06 2018-01-23 Aic Innovations Group, Inc. Apparatus and method for recognition of patient activities
EP2619724A2 (en) 2010-09-23 2013-07-31 Stryker Corporation Video monitoring system
JP2013539790A (en) * 2010-10-12 2013-10-28 ザ ジョンズ ホプキンス ユニバーシティ Antitussive composition comprising memantine
US10558845B2 (en) 2011-08-21 2020-02-11 Aic Innovations Group, Inc. Apparatus and method for determination of medication location
CN105120827B (en) 2013-03-14 2019-10-15 艾治疗技术公司 The device and method distinguished for suspicious activity

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080201174A1 (en) * 2005-08-29 2008-08-21 Narayanan Ramasubramanian Personalized medical adherence management system
US20140184772A1 (en) * 2010-05-06 2014-07-03 AI Cure Technologies, Inc. Apparatus and Method for Recognition of Suspicious Activities
US20140376876A1 (en) * 2010-08-26 2014-12-25 Blast Motion, Inc. Motion event recognition and video synchronization system and method
US9679113B2 (en) * 2014-06-11 2017-06-13 Aic Innovations Group, Inc. Medication adherence monitoring system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3685390A4

Also Published As

Publication number Publication date
US20190087951A1 (en) 2019-03-21
AU2018335288B2 (en) 2023-08-10
US11170484B2 (en) 2021-11-09
EP3685390A4 (en) 2020-10-21
EP3685390A1 (en) 2020-07-29
AU2018335288A1 (en) 2020-04-09

Similar Documents

Publication Publication Date Title
AU2018335288B2 (en) Apparatus and method for recognition of suspicious activities
US11417422B2 (en) Medication adherence monitoring system and method
US11200965B2 (en) Apparatus and method for recognition of medication administration indicator
US20190058848A1 (en) Apparatus and Method for Recognition of Suspicious Activities
US20190027238A1 (en) Method and apparatus for monitoring medication adherence
AU2014236592B2 (en) Apparatus and method for recognition of suspicious activties
US11670100B2 (en) Method and apparatus for recognition of patient activity
WO2022165470A1 (en) System and method for monitoring drug delivery

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018335288

Country of ref document: AU

Date of ref document: 20180919

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2018858751

Country of ref document: EP

Effective date: 20200420