WO2023246593A1 - 用于持续监测系统的数据传输方法及系统 - Google Patents

用于持续监测系统的数据传输方法及系统 Download PDF

Info

Publication number
WO2023246593A1
WO2023246593A1 PCT/CN2023/100228 CN2023100228W WO2023246593A1 WO 2023246593 A1 WO2023246593 A1 WO 2023246593A1 CN 2023100228 W CN2023100228 W CN 2023100228W WO 2023246593 A1 WO2023246593 A1 WO 2023246593A1
Authority
WO
WIPO (PCT)
Prior art keywords
mode
communication path
role
instruction
continuous monitoring
Prior art date
Application number
PCT/CN2023/100228
Other languages
English (en)
French (fr)
Inventor
韩洋
Original Assignee
苏州百孝医疗科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏州百孝医疗科技有限公司 filed Critical 苏州百孝医疗科技有限公司
Publication of WO2023246593A1 publication Critical patent/WO2023246593A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0023Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the signalling
    • H04L1/0025Transmission of mode-switching indication
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N27/00Investigating or analysing materials by the use of electric, electrochemical, or magnetic means
    • G01N27/26Investigating or analysing materials by the use of electric, electrochemical, or magnetic means by investigating electrochemical variables; by using electrolysis or electrophoresis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/108Source integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • H04W28/12Flow control between communication endpoints using signalling between network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal

Definitions

  • the present application relates to the technical field of continuous monitoring of analytes, for example, to a data transmission method and system for a continuous monitoring system.
  • Analyte continuous monitoring systems such as glucose monitoring systems for both continuous and discrete monitoring systems, typically include a small, lightweight, battery-powered and microprocessor-controlled system configured to monitor a signal proportional to glucose levels and Radio frequency signals are sent to transmit the collected data.
  • Analyte sensors can collect information about the user's analyte levels. After collecting data, analyte sensors can transfer analyte levels to more powerful devices for data collection and analysis.
  • the transmitter unit is configured to transmit the analyte level detected by the analyte sensor to the receiver/monitor unit via a wireless communication link, such as a Radio Frequency (RF) communication link.
  • RF Radio Frequency
  • Wireless communication is more convenient and allows communication without involving a physical connection to another device.
  • the challenge in communicating such data is to prevent interception by third parties, which may be required in some medical devices.
  • Data security may be required in some medical devices, where intercepted data can include private details and other sensitive information about the user's health or medical history, and, furthermore, be tampered with or otherwise modified. Intercepted data or device operation may result in incorrect information being provided to the user.
  • the transmitter unit In traditional continuous monitoring systems, the transmitter unit generally uses a single communication path to continuously broadcast signals. The broadcast signal is received by the corresponding receiver/monitor unit. However, during the transmission process of the broadcast signal, it may be intercepted or blocked. The risk of cracking, the security performance of a single communication path needs to be improved.
  • This application provides a data transmission method and system for a continuous monitoring system, which improves security and reliability through a verification method of dual communication paths.
  • the present application provides a data transmission method for a continuous monitoring system.
  • the continuous monitoring system includes a first device and at least one second device.
  • a third device is established between the first device and the second device.
  • a communication path and a second communication path; the data transmission method includes:
  • the first device In response to the first device being in the first mode, the first device is switched to the second mode based on the received second instruction; wherein the first instruction and the second instruction are respectively issued by the first character and Transmitted through the first communication path, the first instruction and the second instruction respectively include information verified by the first device;
  • the third instruction is issued by the first character and transmitted through the first communication path; the three instructions include information verified by the first device;
  • the first mode is set to: allow data transmission between any trusted second device and the first device through the second communication path;
  • the second mode is set to: do not allow data transmission between the second device and the first device through the second communication path;
  • the third mode is set to: allow data transmission between a second device that meets the preset conditions and is trusted and the first device through the second communication path;
  • the first role is an individual or organization with the right to decide on mode switching.
  • the generation and allocation of the first role are pre-assigned by an administrator.
  • the administrator is an individual or organization with the right to use the first device; after assignment
  • the second device logged in by the first role stores role information; the role information includes the identity information of the first role, the ID of the second device bound to the first role, and the ID of the second device that is related to the first role.
  • the first role is associated with the first device through the first communication path, and at the same time, at most one first role is allowed to be associated with the first device;
  • the associated The process includes: the first character transmits the character information to the first device using the first communication path, and when the first device confirms that the received information has identification information associated with the first character, it stores the identity information of the first character and the first character.
  • the ID of the second device bound to a role;
  • the The doctor corresponding to the user acts as the first role and enters the role information of the first role into the first device worn by the user.
  • the first role sends a third The second instruction is that the data of the continuous monitoring system is not allowed to be transmitted within the time period of leaving the first ward, so that the first device worn by the user is in a safe mode and no second device is allowed to obtain the first Data of the device;
  • the first character issues a first instruction or a third instruction, causing the first device worn by the user to be in public mode or restricted mode, and the trusted Any second device or a second device that meets preset conditions and is trusted obtains the data of the time period leaving the first ward from the first device through the second communication path; in the limited mode, only the first device is allowed to A trusted second device and a first device in a ward transmit data through the second communication path.
  • the application also provides a data transmission system for a continuous monitoring system.
  • the continuous monitoring system includes a first device and at least one second device. A first communication is established between the first device and the second device. path, the second communication path; the data transmission system includes:
  • a first switching module configured to switch the first device to the first mode based on the received first instruction in response to the first device being in the second mode
  • the second conversion module is configured to, in response to the first device being in the first mode, switch the first device to the second mode based on the received second instruction; wherein the first instruction, the second instruction Issued by the first role and transmitted through the first communication path, the first instruction and the second instruction respectively include information verified by the first device;
  • the third instruction is issued by the first character and transmitted through the first communication path; the three instructions include information verified by the first device;
  • the first mode is set to: allow data transmission between any trusted second device and the first device through the second communication path;
  • the second mode is set to: do not allow data transmission between the second device and the first device through the second communication path;
  • the third mode is: a limited mode that allows data transmission between a second device that meets preset conditions and is trusted and a first device through the second communication path;
  • the first role is an individual or organization with the right to decide on mode switching.
  • the generation and allocation of the first role are pre-assigned by an administrator.
  • the administrator is an individual or organization with the right to use the first device; after assignment
  • the second device logged in by the first role stores role information; the role information includes the identity information of the first role, the ID of the second device bound to the first role, and the ID of the second device that is related to the first role.
  • the first role is associated with the first device through the first communication path, and at the same time, at most one first role is allowed to be associated with the first device;
  • the associated The process includes: the first character transmits the character information to the first device using the first communication path, and when the first device confirms that the received information has identification information associated with the first character, it stores the identity information of the first character and the first character.
  • the ID of the second device bound to a role;
  • the doctor corresponding to the user is used as the first role, and the role information of the first role is entered into the first device worn by the user.
  • the first role issues a second instruction, and the data of the continuous monitoring system is not allowed to be spread within the time period of leaving the first ward, so that The first device worn by the user is in safe mode and does not allow any second device to obtain the data of the first device; when the user returns to the first ward, the first character issues a first instruction or
  • the third instruction is to put the first device worn by the user in public mode or limited mode, and leave the first device through the second communication path by a trusted second device or a trusted second device that meets the preset conditions.
  • the data of the time period of the zone is obtained from the first device; in the restricted mode, only trusted second devices in the first ward are allowed to transmit data with the first device through the second communication path.
  • This application also provides a continuous monitoring system including:
  • a sensor configured to obtain an analyte concentration
  • a first device configured to emit said analyte concentration
  • Mobile computing device including:
  • a second device configured to receive the analyte concentration
  • a memory configured to store data comprising said analyte concentration
  • processor configured to process said data, and a software application, said processor comprising instructions stored in said memory, said instructions when executed by said processor implementing said system for continuous monitoring data transmission method.
  • the application also provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor.
  • the processor executes the program, the data for continuous monitoring of the system is implemented. Transmission method.
  • the present application also provides a non-transitory computer-readable storage medium on which a computer program is stored.
  • the computer program is executed by a processor, the data transmission method for a continuous monitoring system is implemented.
  • Figure 1 is a schematic diagram of an implementation environment involved in the embodiment of the present application.
  • FIG. 2 is one of the flow diagrams of the data transmission method for the continuous monitoring system provided by this application.
  • FIG. 3 is a schematic diagram of the continuous monitoring system provided by this application.
  • Figure 4 is the second schematic flow chart of the data transmission method for the continuous monitoring system provided by this application.
  • Figure 5 is a schematic diagram of a data transmission system for a continuous monitoring system provided by this application.
  • Figure 6 is a schematic structural diagram of an electronic device provided by this application.
  • FIG. 1 shows a schematic structural diagram of an implementation environment involved in the embodiment of the present application.
  • the implementation environment includes: the electronic device 100 and the receiving device 200, and/or the server 300.
  • the electronic device 100 may be a device in a continuous monitoring system that has the function of acquiring and processing the analyte concentration.
  • the continuous monitoring system is configured to continuously monitor the analyte concentration of the user.
  • Continuous monitoring systems can be configured with analyte sensors.
  • Continuous monitoring systems can continuously generate dynamic and continuous electrical signals based on detected analytes.
  • the electronic device usually includes a housing and a printed circuit encapsulated in the housing to transmit electrical signals from the sensor to the electronic device 100 .
  • the receiving device 200 may be a device with data processing capabilities included in the continuous monitoring system, and the receiving device may be a mobile phone, a tablet computer, an e-book reader, a laptop computer, a desktop computer, etc.
  • the receiving device may be installed with an application client, or a browser may be installed, and the web client of the application may be accessed through the browser.
  • the receiving device 200 may be used to interact with the electronic device 100 to provide services related to this application.
  • the server 300 may be a local or remote server, a server cluster composed of multiple servers, or a cloud computing service center.
  • the server 300 may be used to interact with the electronic device 100 or the receiving device 200 to provide services related to this application.
  • the server 300 is a server corresponding to the client, and the two can be combined to implement various functions provided by the client.
  • the receiving device 200 and the electronic device 100 can be connected through a wireless network or a wired network to realize data transmission; the receiving device 200 and the electronic device 100 can also be connected to the server 300 through a wireless network or a wired network to realize data transmission.
  • the analytes in this application can be blood sugar, blood ketones, ethanol, lactic acid, creatinine (analytes related to kidney function), uric acid, causing heart failure (Brain Natriuretic Peptide, BNP) Analytes, various infection source analytes (such as C-reactive protein, procalcitonin, serum amyloid A, interleukin 6, etc.), etc.
  • the continuous glucose monitoring (CGM) system of blood glucose concentration is used as an example for explanation.
  • the calibration and monitoring methods of other analytes are the same as blood glucose.
  • a continuous dynamic glucose monitoring system configured to continuously monitor a user's blood glucose.
  • the continuous monitoring system includes a first device and at least one second device, and a third device is established between the first device and the second device.
  • a communication path and a second communication path; the data transmission method includes:
  • the first device may be the electronic device 100, and the second device may be the receiving device 200 or a server.
  • the first device In response to the first device being in the first mode, switch the first device to the second mode based on the received second instruction.
  • the first instruction and the second instruction are respectively issued by the first character and transmitted through the first communication path, and the first instruction and the second instruction respectively include information verified by the first device.
  • the first mode is set to allow data transmission between any trusted second device and the first device through the second communication path.
  • the execution sequence of S1 and S2 can be adjusted according to actual needs, and S1 or S2 is automatically and selectively executed based on the current mode of the first device and the received instructions.
  • the second mode is set to not allow data transmission between the second device and the first device through the second communication path.
  • the first instruction issued by the first role and transmitted through the first communication path can be used to switch the first device from the second mode to the first mode; when not When the second device needs to obtain the data of the first device, or the data of the first device needs to be kept secret, the second instruction issued by the first character and transmitted through the first communication path can also be used to realize the first device Switch from the first mode to the second mode.
  • any trusted second device and the first device are allowed to transmit data through the second communication path; for example, the electronic device 100 can continuously send the monitored analysis at a certain time interval through the second communication path. concentration to the trusted second device receiving device 200.
  • the second device and the first device are not allowed to transmit data through the second communication path; at this time, the electronic device 100 cannot send data through the second communication path.
  • the second mode is more secure for data and is suitable for some scenarios where data needs to be kept confidential.
  • the first role can use the first communication path to issue relevant instructions for switching modes at any time based on actual scenarios, ensuring flexibility, operability, and convenience in obtaining the analyte concentration.
  • the electronic device 100 awakened from the safe mode awakens the communication function of the second communication path, allowing the trusted receiving device 200 within the communication range to pass the second instruction.
  • the communication path discovers and connects electronic devices 100 .
  • the first command and the second command respectively include information that has passed the verification of the first device, ensuring that both the first command and the second command have passed the verification and are issued by the first character; in the first mode, only Allows any trusted second device to transmit data to the first device.
  • the dual communication path and the verification method combined with user role information reduce the risk of being compromised. The risk of cracking improves the security and reliability of data and enhances the user experience.
  • the second device and the first device are not allowed to transmit data through the second communication path, which can reduce the communication power consumption of the first device and the second device and save the power of the first device and the second device.
  • the continuous monitoring system of the present application is described below with reference to Figure 3.
  • the system includes an electronic device 100 and a receiving device 200.
  • the electronic device 100 and the receiving device 200 can be established through a first communication unit and a second communication unit respectively. There is a second communication path; a first communication path is established through the third communication unit and the fourth communication unit; the electronic device 100 also includes a sampling circuit for collecting the analyte concentration, a memory for storing data, and a memory for processing the data;
  • the processor that controls the electronic device 100 and the receiving device 200 also include a microcontroller unit (Microcontroller Unit, MCU) for processing data and controlling.
  • MCU microcontroller Unit
  • the execution subject may be the processor in the electronic device 100.
  • the first communication path established through the third communication unit and the fourth communication unit can work normally, and the working mode can be switched at any time through instructions transmitted by the first line communication path.
  • the first communication unit In the second mode, the first communication unit is inoperative, and the second communication path established through the first communication unit is also locked and inoperative, and cannot be connected to the second device through the first communication unit.
  • the electronic device 100 switches from other modes to the second mode, the first communication unit switches from the open state to the closed state; the first communication unit in the closed state does not consume energy and does not send out broadcasts. That is, at this time, the first communication unit The identity information of a communication unit is hidden.
  • the second communication unit of the second device cannot find the electronic device 100 through the first communication unit.
  • the data in the electronic device 100 is in safe Full status.
  • the data transmission method further includes:
  • the third instruction is issued by the first character and transmitted through the first communication path; the three instructions include information verified by the first device.
  • the third mode is set to allow data transmission between the second device and the first device that meet the preset conditions and are trusted through the second communication path.
  • a third instruction issued by the first role and transmitted through the first communication path can be used to realize that the first device is sent by the first device. mode or second mode to switch to the third mode; when the first device is in the third mode, when any trusted second device needs to obtain the data of the first device, the first role can be used to issue and pass the
  • the first command transmitted by the first communication path enables the first device to switch from the third mode to the first mode; it can also be used when the second device does not need to obtain the data of the first device or the data of the first device needs to be kept confidential.
  • the second instruction issued by the first character and transmitted through the first communication path enables the first device to switch from the third mode to the second mode.
  • the electronic device 100 checks the identification number (Identity Document, ID) of the receiving device 200. If it is the ID of the receiving device 200 entered by a non-first role, The electronic device 100 will actively disconnect communication with its second communication path.
  • the electronic device 100 in the restricted mode only allows the receiving device 200 entered by the first character to communicate with the electronic device 100 through the second communication path.
  • the electronic device 100 rejects subsequent communications.
  • the electronic device 100 awakened from the safe mode awakens the function of the second communication path, allowing the trusted receiving device 200 that meets the preset conditions to pass through.
  • the second communication path discovers and connects the electronic device 100 .
  • the first instruction can cause the electronic device 100 to switch from the safe mode or the restricted mode to the public mode.
  • the second instruction can cause the electronic device 100 to switch from the restricted mode or the public mode to the safe mode.
  • the third instruction can cause the electronic device 100 to switch from the safe mode or the public mode.
  • Public mode switches to restricted mode; public mode, safe mode, and restricted mode can be switched between each other through each command.
  • meeting the preset conditions includes being within a preset area, and/or being within a preset quantity, and/or being within a specified device range.
  • the information of the third instruction includes at least one of the preset area range, the preset quantity range, and the designated device range.
  • the preset area range can be limited to within 5 meters around the electronic device 100 or in a specific room area, and the preset number range can be 3. If there are more than 3 receiving devices 200 connected to an electronic device 100, Other receiving devices 200 are not allowed to continue connecting, and the specified device range may be devices containing the ID identification of the receiving device 200 entered by the first role.
  • the preset area range, preset quantity range, and designated device range are entered or removed by the first role and stored in the memory of the first device; the entry or removal The method includes: performing an entry or removal operation on the second device associated with the first role, the operation being transmitted through the first communication path and updating the content in the memory.
  • the first role is associated with the first device through the first communication path
  • the first role is a person or organization that has the right to decide on mode switching.
  • the generation and allocation of the first role can be pre-assigned by an administrator (an individual or organization with the right to use the electronic device 100), or it can be manually assigned.
  • the receiving device 200 logged in by the first role will store information with the identity of the first role; the information may also include the identity information of the first role, the ID identification of the receiving device 200 bound to the first role, the receiving The device 200 has identification information associated with the first role; the first role uses the first communication path to transmit the information to the electronic device 100, and the electronic device 100 confirms that the received information has identification information associated with the first role. , storing the identity information of the first role and the ID identification of the receiving device 200 bound to the first role.
  • the data transmission method further includes:
  • a second character is allowed to establish association with the first device through the first communication path.
  • An electronic device 100 is only allowed to have one first role and the receiving device 200 associated with the first role at the same time.
  • the first role and the first role are required.
  • the device is disassociated. After the disassociation, the second role is allowed to establish association with the first device through the first communication path.
  • the second role after the association can be regarded as a new first role, with permissions such as mode switching. .
  • the data transmission method further includes:
  • the data of the first device in the second mode is sent to the trusted second device through the second communication path.
  • the electronic device 100 can pass the missing analyte concentration in the receiving device 200 during the safe mode time period through the second communication path at certain time intervals according to the needs of the receiving device 200 Sent to the trusted receiving device 200.
  • the data transmission method further includes:
  • the data when the first device is in the second mode is sent to a trusted second device that meets the preset conditions through the second communication path.
  • the electronic device 100 can pass the missing analyte concentration in the receiving device 200 during the safe mode time period through the second communication path at certain time intervals according to the needs of the receiving device 200 Sent to a trusted receiving device 200 that meets the preset conditions.
  • the trusted second device is configured as a second device verified by:
  • the first device After the first device and the second device establish a connection through the second communication path, the first device receives and verifies the context information of the second device;
  • the verification process in the first mode may include: after the receiving device 200 connects to the electronic device 100 through the second communication path, the context information of the receiving device 200 is converted and sent to the electronic device 100, and the electronic device 100 confirms the conversion.
  • the electronic device 100 replies to the receiving device 200 and maintains the connection.
  • the electronic device 100 sends the data to the receiving device 200 through the second communication path, and the data is displayed by the receiving device 200 .
  • the electronic device 100 When the electronic device 100 confirms that the converted context information is incorrect and/or does not receive the converted context information within the first time period, it actively disconnects from the receiving device 200; the starting moment of the first time period is receiving The device 200 establishes a communication connection through the second communication path, and the end time is a customized safety time, for example, the first time period is 10 seconds.
  • the conversion method can be pre-programmed and stored in the software of the receiving device 200; this method can ensure that the trusted receiving device 200 can connect, while preventing other untrusted receiving devices 200 with receiving functions from connecting with the electronic device 100 Communication on the second communication path is established.
  • contextual information may include a unique device identifier, an identifier associated with a communication protocol (e.g., a Bluetooth identifier), an identifier associated with the analyte sensor's network and/or communication hardware (e.g., media access control address), or other suitable identifier.
  • a communication protocol e.g., a Bluetooth identifier
  • an identifier associated with the analyte sensor's network and/or communication hardware e.g., media access control address
  • electronic device 100 provides receiving device 200 with a valid certificate or token that has been similarly digitally signed using a key associated with the appropriate manufacturer or operator.
  • Each certificate or token may include a public key uniquely paired with a private key known to the device providing the certificate or token. Private keys can also be established by the appropriate manufacturer or operator of the system that is continuously monitored. Once a verified certificate or token is received, the device providing the certificate or token can also prove that it controls the private key. This information Can be used to generate a shared symmetric authentication key that can be used for subsequent authentication and encryption.
  • the context information may also be a key generated by the electronic device 100 during the production process, printed on the packaging, or obtained through communication means such as near field communication.
  • the first communication path is established based on the first communication protocol; and/or the first communication path is a discontinuous communication path.
  • the communication method adopted by the first communication protocol includes near field communication.
  • the first communication path is used for information verification of the role, the receiving device bound to the role, and for issuing mode switching instructions. It does not need to work continuously and can be a communication path that works non-continuously.
  • Near field communication is a very safe and fast communication method with the characteristics of low cost, high bandwidth and low energy consumption. Near field communication actually consumes very little power, especially when data is not being transmitted, and is basically negligible.
  • the second communication path is established based on the second communication protocol; and/or the second communication path is a continuous communication path.
  • the communication method adopted by the second communication path includes one of Bluetooth, wireless communication technology (Wi-Fi), and radio frequency communication. Bluetooth, Wi-Fi, and radio frequency communications can continuously transmit data, but there may be problems with high power consumption. Especially in order to respond to connection requests in a timely manner, polling access during the waiting process is very energy-consuming, and the second communication path requires continuous power supply. Power supply and can work continuously.
  • the second communication path is used to verify the context information of the receiving device, and can continuously obtain the analyte concentration after the verification is successful, so it is preferably a continuous communication path.
  • the second mode is set to hide the identity information of the first communication unit on the first device side, and the first communication unit is used to establish the second communication path.
  • the electronic device 100 After entering the second mode, the electronic device 100 closes the second communication path and can no longer be discovered and connected by any receiving device 200 through the second communication path.
  • the locked electronic device 100 only allows the receiving device 200 of the first role to communicate with the electronic device 100 through the first communication path.
  • the electronic device 100 rejects subsequent communications. At this time, the electronic device 100 continues to obtain electrical signals from the sampling circuit and store them.
  • the doctor can enter his or her role information into the electronic device 100 worn by the user as the first role.
  • the doctor can use the associated receiving device 200 issues a second instruction to put the user's first device in safe mode. At this time, the second device is not allowed to obtain the data of the first device.
  • the user's electronic device 100 cannot be discovered and connected by other receiving devices 200; when the user returns to the first ward, the doctor issues a first instruction or a third instruction to It is unlocked and the data for the time period leaving the first ward is obtained from the electronic device 100 by the receiving device 200 through the second communication path.
  • the doctor in the first ward can erase the first role information in the user's electronic device 100 through the first communication path, and re-enter and create it by other doctors. Secondary role information.
  • the data transmission method further includes:
  • the first device is coupled to the sensor and electrical signals transmitted by the sensor associated with the analyte concentration are collected.
  • the electrical signal is obtained after an electrochemical reaction occurs between the sensor and a specific solution; the specific solution is the solution in which the sensor is located.
  • the specific solution may be blood, interstitial fluid or other solutions in the user's body.
  • a first device is configured to collect an electrical signal transmitted by the sensor and associated with the analyte concentration.
  • the data transmission system for the continuous monitoring system provided by the present application is described below.
  • the data transmission system for the continuous monitoring system described below and the data transmission method for the continuous monitoring system described above can correspond to each other.
  • the continuous monitoring system includes a first device and at least one second device, and a first communication path and a second communication path are established between the first device and the second device;
  • the data transmission system includes:
  • the first conversion module 10 is configured to, in response to the first device being in the second mode, switch the first device to the first mode based on the received first instruction;
  • the second conversion module 20 is configured to, in response to the first device being in the first mode, switch the first device to the second mode based on the received second instruction; wherein the first instruction, the second Instructions are respectively issued by the first role and transmitted through the first communication path, and the first instruction and the second instruction respectively include information verified by the first device;
  • the first mode is set to: allow data transmission between any trusted second device and the first device through the second communication path;
  • the second mode is set to not allow data transmission between the second device and the first device through the second communication path.
  • the first instruction issued by the first role and transmitted through the first communication path can be used to switch the first device from the second mode to the first mode; when not When the second device needs to obtain the data of the first device, or the data of the first device needs to be kept confidential, the second instruction issued by the first character and transmitted through the first communication path can also be used to realize the first mode of the first device. Switch to second mode.
  • any trusted second device and the first device are allowed to transmit data through the second communication path; for example, the electronic device 100 can continuously send the monitored analysis at a certain time interval through the second communication path. concentration to the trusted second device receiving device 200.
  • the second device and the first device are not allowed to transmit data through the second communication path; at this time, the electronic device 100 cannot send data through the second communication path.
  • the second mode is more secure for data and is suitable for some scenarios where data needs to be kept confidential.
  • the first role can use the first communication path to issue relevant instructions for switching modes at any time based on actual scenarios, ensuring flexibility, operability, and convenience in obtaining the analyte concentration.
  • the electronic device 100 awakened from the safe mode awakens the function of the second communication path, allowing the trusted receiving device 200 within the communication range to communicate through the second Path discovery and connection of electronic devices 100.
  • the first command and the second command respectively include information that has passed the verification of the first device, ensuring that both the first command and the second command have passed the verification and are issued by the first character; in the first mode, only Allows any trusted second device to transmit data to the first device.
  • the dual communication path and the verification method combined with user role information reduce the risk of being compromised. The risk of cracking improves the security and reliability of data and enhances the user experience.
  • the second device and the first device are not allowed to transmit data through the second communication path, which can reduce the communication power consumption of the first device and the second device and save the power of the first device and the second device.
  • the data transmission system further includes:
  • a third conversion module configured to, in response to the first device being in the first mode or the second mode, switch the first device to a third mode (limited mode) based on the received third instruction;
  • the fourth conversion module is configured to, in response to the first device being in the third mode, configure the fifth conversion module to switch a device to the first mode based on the received first instruction; or, based on the received first instruction;
  • the second instruction is to switch the first device to the second mode;
  • the third instruction is issued by the first character and transmitted through the first communication path; the three instructions include information verified by the first device.
  • the third mode is set to allow data transmission between the second device and the first device that meet the preset conditions and are trusted through the second communication path.
  • a third instruction issued by the first role and transmitted through the first communication path can be used to realize that the first device is sent by the first device. mode or the second mode to switch to the third mode; when the first device is in the third mode, when any trusted second device needs to obtain the data of the first device, the first role can be used to issue and pass the The first command transmitted by the first communication path realizes switching of the first device from the third mode to the first mode. mode; when the second device does not need to obtain the data of the first device, or the data of the first device needs to be kept confidential, the second instruction issued by the first role and transmitted through the first communication path can also be used to realize the first device Switch from the third mode to the second mode.
  • the electronic device 100 checks the ID of the receiving device 200. If it is the ID of the receiving device 200 that is not entered by the first role, the electronic device 100 will actively disconnect from it. communication via the second communication path.
  • the electronic device 100 in the restricted mode only allows the receiving device 200 entered by the first character to communicate with the electronic device 100 through the second communication path. When other devices communicate through the second communication path, if the information sent is not the information entered by the first character Or when no information associated with the first role is sent, the electronic device 100 rejects subsequent communications.
  • the electronic device 100 awakened from the safe mode awakens the function of the second communication path, allowing the trusted receiving device 200 that meets the preset conditions to pass through.
  • the second communication path discovers and connects the electronic device 100 .
  • the first instruction can cause the electronic device 100 to switch from the safe mode or the restricted mode to the public mode.
  • the second instruction can cause the electronic device 100 to switch from the restricted mode or the public mode to the safe mode.
  • the third instruction can cause the electronic device 100 to switch from the safe mode or the public mode.
  • Public mode switches to restricted mode; public mode, safe mode, and restricted mode can be switched to each other through each command.
  • meeting the preset conditions includes being within a preset area, and/or being within a preset quantity, and/or being within a designated device.
  • the information of the third instruction includes at least one of the preset area range, the preset quantity range, and the designated device range.
  • the preset area range, preset quantity range, and designated device range are entered or removed by the first role and stored in the memory of the first device; the entry or removal The method includes: performing an entry or removal operation on the second device associated with the first role, the operation being transmitted through the first communication path and updating the content in the memory.
  • the first role is associated with the first device through the first communication path
  • a second character is allowed to establish association with the first device through the first communication path.
  • An electronic device 100 is only allowed to have one first role and the receiving device 200 associated with the first role at the same time.
  • the first role and the first role are required.
  • the device disassociates. After the disassociation, the second role is allowed to establish association with the first device through the first communication path.
  • the second role after the association can be regarded as a new third role.
  • the data transmission system further includes a first data transmission module.
  • the first data transmission module is configured to send the data of the first device in the second mode to the trusted second device through the second communication path after the first device switches from the second mode to the first mode. .
  • the electronic device 100 can pass the missing analyte concentration in the receiving device 200 during the safe mode time period through the second communication path at certain time intervals according to the needs of the receiving device 200 Sent to the trusted receiving device 200.
  • the data transmission system further includes a second data transmission module.
  • the second data transmission module is configured to, after the first device switches from the second mode to the third mode, send the data when the first device is in the second mode through the second communication path to a trusted device that meets the preset conditions and is trusted. Ren's second device.
  • the electronic device 100 can pass the missing analyte concentration in the receiving device 200 during the safe mode time period through the second communication path at certain time intervals according to the needs of the receiving device 200 Sent to a trusted receiving device 200 that meets the preset conditions.
  • the trusted second device is configured as a second device verified in the following manner: after the first device and the second device establish a connection through the second communication path, the first device Receive and verify the context information of the second device; use the verified second device as a trusted second device.
  • the verification process in the first mode may include: after the receiving device 200 connects to the electronic device 100 through the second communication path, the context information of the receiving device 200 is converted and sent to the electronic device 100, and the electronic device 100 confirms the conversion.
  • the electronic device 100 replies to the receiving device 200 and maintains the connection.
  • the electronic device 100 sends the data to the receiving device 200 through the second communication path, and the data is displayed by the receiving device 200 .
  • the electronic device 100 confirms that the converted context information is incorrect and/or does not receive the converted context information within the first period of time, it actively disconnects from the receiving device 200 .
  • the first communication path is established based on the first communication protocol; and/or the first communication path is a discontinuous communication path.
  • the communication method adopted by the first communication protocol includes near field communication.
  • Near field communication is a very safe and fast communication method with the characteristics of low cost, high bandwidth and low energy consumption. Near field communication actually consumes very little power, especially when data is not being transmitted, and is basically negligible.
  • the second communication path is established based on the second communication protocol; and/or the second communication path is a continuous communication path.
  • the communication method adopted by the second communication path includes one of Bluetooth, Wi-Fi, and radio frequency communication. Bluetooth, Wi-Fi, and radio frequency communications can continuously transmit data, but there may be problems with high power consumption. Especially in order to respond to connection requests in a timely manner, polling access during the waiting process is very energy-consuming, and the second communication path requires continuous power supply. Power supply and can work continuously.
  • the second mode is set to hide the identity information of the first communication unit on the first device side, and the first communication unit is used to establish the second communication path.
  • the electronic device 100 After entering the second mode, the electronic device 100 closes the second communication path and can no longer be discovered and connected by any receiving device 200 through the second communication path. After locking, the electronic device 100 only allows the receiving device 200 of the first role to communicate with the electronic device 100 through the first communication path. When other devices communicate through the first communication path, if the information sent is not the information of the first character or does not send the first When receiving the character information, the electronic device 100 refuses subsequent communications. At this time, the electronic device 100 continues to obtain electrical signals from the sampling circuit and store them.
  • the data transmission system further includes:
  • At least one sensor configured to measure analyte concentration
  • the first device is coupled to the sensor and electrical signals transmitted by the sensor associated with the analyte concentration are collected.
  • This application also provides a continuous monitoring system including:
  • a sensor configured to obtain an analyte concentration
  • a first device configured to emit said analyte concentration
  • Mobile computing devices including:
  • a second device configured to receive the analyte concentration
  • a memory configured to store data comprising said analyte concentration
  • a processor configured to process said data
  • a software application comprising instructions stored in said memory that when executed by said processor effectuates said transmission of data for a continuous monitoring system Method steps.
  • FIG. 6 illustrates a schematic diagram of the physical structure of an electronic device.
  • the electronic device may include: a processor (processor) 610, a communications interface (Communications Interface) 620, a memory (memory) 630, and a communication bus 640, where the processor 610, The communication interface 620 and the memory 630 complete communication with each other through the communication bus 640.
  • the processor 610 can call the logical instructions in the memory 630 to execute the data transmission methods provided by the above methods for the continuous monitoring system.
  • the continuous monitoring system includes: A first device and at least one second device, a first communication path and a second communication path are established between the first device and the second device; the data transmission method includes:
  • the first device In response to the first device being in the first mode, switch the first device to the second mode based on the received second instruction.
  • the first instruction and the second instruction are respectively issued by the first character and transmitted through the first communication path, and the first instruction and the second instruction respectively include information verified by the first device.
  • the first mode is set to allow data transmission between any trusted second device and the first device through the second communication path.
  • the second mode is set to not allow data transmission between the second device and the first device through the second communication path.
  • the above-mentioned logical instructions in the memory 630 can be implemented in the form of software functional units and can be stored in a computer-readable storage medium when sold or used as an independent product.
  • the technical solution of the present application is essentially or contributes to the relevant technology or part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including multiple The instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code. .
  • the present application also provides a computer program product.
  • the computer program product includes a computer program stored on a non-transitory computer-readable storage medium.
  • the computer program includes program instructions. When the program instructions are read by a computer, When executed, the computer can execute the data transmission method for the continuous monitoring system provided by each of the above methods.
  • the continuous monitoring system includes a first device and at least one second device. The first device and the second device A first communication path and a second communication path are established between them; the data transmission method includes:
  • the first device In response to the first device being in the first mode, switch the first device to the second mode based on the received second instruction.
  • the first instruction and the second instruction are respectively issued by the first character and transmitted through the first communication path, and the first instruction and the second instruction respectively include information verified by the first device.
  • the first mode is set to allow data transmission between any trusted second device and the first device through the second communication path.
  • the second mode is set to not allow data transmission between the second device and the first device through the second communication path.
  • the present application also provides a non-transitory computer-readable storage medium on which a computer program is stored.
  • the computer program is implemented when executed by the processor to perform the data provided by the above methods for continuous monitoring of the system.
  • the steps of the transmission method, the continuous monitoring system includes a first device and at least one second device, a first communication path and a second communication path are established between the first device and the second device;
  • the data transmission Methods include:
  • the first device In response to the first device being in the first mode, switch the first device to the second mode based on the received second instruction.
  • the first instruction and the second instruction are respectively issued by the first character and transmitted through the first communication path, and the first instruction and the second instruction respectively include information verified by the first device.
  • the first mode is set to allow data transmission between any trusted second device and the first device through the second communication path.
  • the second mode is set to not allow data transmission between the second device and the first device through the second communication path.
  • the first command issued by the first character and transmitted through the first communication path can be used to switch the first device from the second mode to the first mode; the first command can also be issued by the first character and transmitted through the first communication path.
  • the second instruction transmitted by the communication path realizes switching of the first device from the first mode to the second mode. In the first mode, any trusted second device and the first device are allowed to transmit data through the second communication path; in the second mode, the second device and the first device are not allowed to transmit data through the second communication path; Compared with the first mode, the second mode is more secure for data and is suitable for some scenarios where data needs to be kept confidential.
  • the first role can use the first communication path to issue relevant instructions for switching modes at any time based on actual scenarios, ensuring flexibility, operability, and convenience in obtaining the analyte concentration.
  • the first command and the second command respectively include information that has passed the verification of the first device, ensuring that both the first command and the second command have passed the verification and are issued by the first character; in the first mode Under this condition, only any trusted second device is allowed to transmit data with the first device.
  • the path verification and data transmission method reduces the risk of being cracked, improves data security and reliability, and enhances the user experience through dual communication paths and verification methods combined with user role information.
  • the second device and the first device are not allowed to transmit data through the second communication path, which can reduce the communication power consumption of the first device and the second device and save the power of the first device and the second device. .
  • the device embodiments described above are only illustrative.
  • the units described as separate components may or may not be physically separated.
  • the components shown as units may or may not be physical units, that is, they may be located at One location, or it can be distributed across multiple network units. Some or all of the modules can be selected according to actual needs to achieve the objectives of the technical solutions of each embodiment of the present application. Persons of ordinary skill in the art can understand and implement the method without any creative effort.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Chemical & Material Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Molecular Biology (AREA)
  • Quality & Reliability (AREA)
  • Chemical Kinetics & Catalysis (AREA)
  • Electrochemistry (AREA)
  • Physics & Mathematics (AREA)
  • Analytical Chemistry (AREA)
  • Biochemistry (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Immunology (AREA)
  • Pathology (AREA)
  • Alarm Systems (AREA)

Abstract

一种用于持续监测系统的数据传输方法及系统,所述持续监测系统包括第一设备和至少一个第二设备;该方法包括:当第一设备处于第二模式时,基于所接收的第一指令,将第一设备切换至第一模式;当第一设备处于第一模式时,基于所接收的第二指令,将第一设备切换至第二模式;第一指令、第二指令分别由第一角色发出并通过第一通信路径传输,第一指令、第二指令分别包括通过第一设备校验的信息;第一模式设置为:允许任意一个受信任的第二设备与第一设备通过第二通信路径进行数据传输;第二模式设置为:不允许第二设备与第一设备通过第二通信路径进行数据传输。

Description

用于持续监测系统的数据传输方法及系统
本申请要求在2022年06月21日提交中国专利局、申请号为202210704821.8的中国专利申请的优先权,该申请的全部内容通过引用结合在本申请中。
技术领域
本申请涉及分析物持续监测技术领域,例如涉及一种用于持续监测系统的数据传输方法及系统。
背景技术
分析物持续监测系统,例如连续和离散监测系统的葡萄糖监测系统,通常为一个包括一个小型、轻便的电池供电和微处理器控制的系统,该系统配置为监测与葡萄糖水平成比例的信号,并发送射频信号以传输收集到的数据。
分析物传感器可以收集有关用户的分析物水平。收集数据后,分析物传感器可以将分析物水平转移到更强大的设备以进行数据收集和分析。例如,发射器单元被配置为通过诸如射频(RadioFrequency,RF)通信链路的无线通信链路将由分析物传感器检测到的分析物水平发射到接收器/监测器单元。接收器/监测器单元对接收到的分析物水平进行数据分析,以生成与监测到的分析物水平有关的信息。
采用无线通信的方式更方便允许通信而不涉及到与另一个设备的物理连接。沟通此类数据的挑战是防止第三方拦截,在一些医疗设备中可能需要数据安全性,其中截获数据可以包括有关用户的健康或病史的私人细节和其他敏感信息,此外,篡改或以其他方式修改截取的数据或设备的操作可能会导致向用户提供不正确的信息。传统的持续监测系统中,发射器单元一般采用单一的通信路径进行持续的广播信号,该广播信号由相应的接收器/监测器单元接收,然而在广播信号传输过程中,可能存在被拦截或被破解的风险,单一的通信路径在安全性能方面还有待提高。
发明内容
本申请提供一种用于持续监测系统的数据传输方法及系统,通过双重通信路径的校验方式,提高了安全性和可靠性。
本申请提供一种用于持续监测系统的数据传输方法,所述持续监测系统包括第一设备和至少一个第二设备,所述第一设备与所述第二设备之间建立有第 一通信路径、第二通信路径;所述数据传输方法包括:
响应于所述第一设备处于第二模式,基于所接收的第一指令,将所述第一设备切换至第一模式;
响应于所述第一设备处于第一模式,基于所接收的第二指令,将所述第一设备切换至第二模式;其中,所述第一指令、第二指令分别由第一角色发出并通过所述第一通信路径传输,所述第一指令、第二指令分别包括通过所述第一设备校验的信息;
响应于所述第一设备处于第一模式或第二模式,基于所接收的第三指令,将所述第一设备切换至第三模式;
响应于所述第一设备处于第三模式,基于所接收的第一指令,将所述第一设备切换至第一模式;或,基于所接收的第二指令,将所述第一设备切换至第二模式;
其中,所述第三指令由第一角色发出并通过所述第一通信路径传输;所述三指令包括通过所述第一设备校验的信息;
所述第一模式设置为:允许任意一个受信任的第二设备与第一设备通过所述第二通信路径进行数据传输;
所述第二模式设置为:不允许第二设备与第一设备通过所述第二通信路径进行数据传输;
所述第三模式设置为:允许符合预设条件且受信任的第二设备与第一设备通过所述第二通信路径进行数据传输;
所述第一角色为具有模式切换决定权的个人或组织,所述第一角色的产生和分配由管理员预先进行分配,所述管理员为具有第一设备使用权的个人或组织;分配后第一角色登录的第二设备存储有角色信息;所述角色信息包括第一角色的身份信息、第一角色所绑定第二设备的ID标识、所述第二设备上具有的与第一角色关联的标志信息;所述第一角色通过所述第一通信路径与所述第一设备建立关联,同一时间下,允许至多一个第一角色与所述第一设备建立关联;所述建立关联的过程包括:第一角色使用第一通信路径将所述角色信息传输至第一设备,第一设备确认接收到的信息具有与第一角色关联的标志信息时,存储第一角色的身份信息和第一角色所绑定第二设备的ID标识;
当用户在第一病区使用所述持续监测系统进行监测分析物浓度时,将所述 用户对应的医生作为第一角色,将所述第一角色的角色信息录入所述用户佩戴的第一设备中,当所述用户离开所述第一病区后,由所述第一角色发出第二指令,所述持续监测系统的数据不允许在离开所述第一病区的时间段内传播,使所述用户佩戴的第一设备处于安全模式、且不允许任何第二设备获取到第一设备的数据;当所述用户回到第一病区时,由所述第一角色发出第一指令或第三指令,使所述用户佩戴的第一设备处于公共模式或限定模式、并由受信任的第二设备或符合预设条件且受信任的第二设备通过第二通信路径将离开第一病区的时间段的数据从第一设备获得;在所述限定模式下,仅允许在第一病区内、且受信任的第二设备与第一设备通过所述第二通信路径进行数据传输。
本申请还提供一种用于持续监测系统的数据传输系统,所述持续监测系统包括第一设备和至少一个第二设备,所述第一设备与所述第二设备之间建立有第一通信路径、第二通信路径;所述数据传输系统包括:
第一转换模块,设置为响应于所述第一设备处于第二模式,基于所接收的第一指令,将所述第一设备切换至第一模式;
第二转换模块,设置为响应于所述第一设备处于第一模式,基于所接收的第二指令,将所述第一设备切换至第二模式;其中,所述第一指令、第二指令分别由第一角色发出并通过所述第一通信路径传输,所述第一指令、第二指令分别包括通过所述第一设备校验的信息;
响应于所述第一设备处于第一模式或第二模式,基于所接收的第三指令,将所述第一设备切换至第三模式;
响应于所述第一设备处于第三模式,基于所接收的第一指令,将所述第一设备切换至第一模式;或,基于所接收的第二指令,将所述第一设备切换至第二模式;
其中,所述第三指令由第一角色发出并通过所述第一通信路径传输;所述三指令包括通过所述第一设备校验的信息;
所述第一模式设置为:允许任意一个受信任的第二设备与第一设备通过所述第二通信路径进行数据传输;
所述第二模式设置为:不允许第二设备与第一设备通过所述第二通信路径进行数据传输;
所述第三模式为:允许符合预设条件且受信任的第二设备与第一设备通过所述第二通信路径进行数据传输的限定模式;
所述第一角色为具有模式切换决定权的个人或组织,所述第一角色的产生和分配由管理员预先进行分配,所述管理员为具有第一设备使用权的个人或组织;分配后第一角色登录的第二设备存储有角色信息;所述角色信息包括第一角色的身份信息、第一角色所绑定第二设备的ID标识、所述第二设备上具有的与第一角色关联的标志信息;所述第一角色通过所述第一通信路径与所述第一设备建立关联,同一时间下,允许至多一个第一角色与所述第一设备建立关联;所述建立关联的过程包括:第一角色使用第一通信路径将所述角色信息传输至第一设备,第一设备确认接收到的信息具有与第一角色关联的标志信息时,存储第一角色的身份信息和第一角色所绑定第二设备的ID标识;
当用户在第一病区使用所述持续监测系统进行监测分析物浓度时,将所述用户对应的医生作为第一角色,将所述第一角色的角色信息录入所述用户佩戴的第一设备中,当所述用户离开所述第一病区后,由所述第一角色发出第二指令,所述持续监测系统的数据不允许在离开所述第一病区的时间段内传播,使所述用户佩戴的第一设备处于安全模式、且不允许任何第二设备获取到第一设备的数据;当所述用户回到第一病区时,由所述第一角色发出第一指令或第三指令,使所述用户佩戴的第一设备处于公共模式或限定模式、并由受信任的第二设备或符合预设条件且受信任的第二设备通过第二通信路径将离开第一病区的时间段的数据从第一设备获得;在所述限定模式下,仅允许在第一病区内、且受信任的第二设备与第一设备通过所述第二通信路径进行数据传输。
本申请还提供一种持续监测系统,包括:
传感器,被配置成获取分析物浓度;
第一设备,被设置为发射所述分析物浓度;
以及
移动计算装置,其包括:
第二设备,被配置成接收分析物浓度;
存储器,被设置为存储包含所述分析物浓度的数据;
处理器,被设置为处理所述数据,以及软件应用程序,所述处理器包含存储于所述存储器中的指令,所述指令当由所述处理器执行时实现所述的用于持续监测系统的数据传输方法。
本申请还提供一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现所述的用于持续监测系统的数据传输方法。
本申请还提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现所述的用于持续监测系统的数据传输方法。
附图说明
图1是本申请实施例所涉及的一种实施环境的示意图。
图2是本申请提供的用于持续监测系统的数据传输方法的流程示意图之一。
图3是本申请提供的持续监测系统的示意图。
图4是本申请提供的用于持续监测系统的数据传输方法的流程示意图之二。
图5是本申请提供的用于持续监测系统的数据传输系统的示意图。
图6是本申请提供的电子设备的结构示意图。
具体实施方式
为以下结合附图及各种示例性实施例来对本申请的方案做阐述。
请参考图1,其示出了本申请实施例所涉及的一种实施环境的结构示意图。该实施环境包括:电子设备100和接收设备200,和/或服务器300。
电子设备100可以是持续监测系统中的一种具备获取并处理分析物浓度功能的设备,持续监测系统被配置为连续监测用户的分析物浓度。持续监测系统可以配置有分析物传感器。持续监测系统可以连续地基于检测到的分析物产生动态连续的电信号。电子设备通常包括外壳和封装在外壳中的印刷电路,为实现将传感器的电信号传输到电子设备100。通过持续监测分析物浓度,持续监测系统允许用户对其治疗做出更好的知情决策。
接收设备200可以是持续监测系统中包含的具备数据处理能力的设备,接收设备可以如手机、平板电脑、电子书阅读器、膝上型便携计算机和台式计算机等等。接收设备中可以安装有应用程序用户端,或者安装有浏览器,通过浏览器访问应用程序的网页用户端。接收设备200可用于与电子设备100交互提供本申请相关业务。
服务器300可以是一台近端或远端服务器,或者由多台服务器组成的服务器集群,或者是一个云计算服务中心。当接收设备200和服务器300同时处理 本申请相关业务时,服务器300可用于与电子设备100或接收设备200交互提供本申请相关业务。服务器300是与用户端对应的服务器,两者可以结合实现用户端提供的各项功能。
接收设备200与电子设备100之间可以通过无线网络或者有线网络相连实现数据传输;接收设备200与电子设备100之间也可以通过分别与服务器300通过无线网络或者有线网络相连实现数据传输。
需要说明的是,本申请中的分析物可以是血糖、血酮,乙醇,乳酸,肌酐(与肾功能相关的分析物),尿酸,引起心衰(脑钠肽(Brain Natriuretic Peptide,BNP))的分析物,各种感染源分析物(如C反应蛋白、降钙素原、血清淀粉样蛋白A、白介素6等),等等。以下部分实施例中,以血糖浓度的连续动态血糖监测(Continuous Glucose Monitoring,CGM)系统作为示例进行说明,其他分析物的校准、监测方式同血糖。连续动态血糖监测系统,被配置为连续监测用户的血糖。
下面结合图2描述本申请的用于持续监测系统的数据传输方法,所述持续监测系统包括第一设备和至少一个第二设备,所述第一设备与所述第二设备之间建立有第一通信路径、第二通信路径;所述数据传输方法包括:
S1、响应于所述第一设备处于第二模式(可称为安全模式),基于所接收的第一指令,将所述第一设备切换至第一模式(可称为公共模式)。
第一设备可以是电子设备100,第二设备可以是接收设备200或服务器。
S2、响应于所述第一设备处于第一模式,基于所接收的第二指令,将所述第一设备切换至第二模式。其中,所述第一指令、第二指令分别由第一角色发出并通过所述第一通信路径传输,所述第一指令、第二指令分别包括通过所述第一设备校验的信息。
所述第一模式设置为:允许任意一个受信任的第二设备与第一设备通过所述第二通信路径进行数据传输。
S1和S2的执行前后顺序可以根据实际需求进行调整,基于第一设备当前所处于的模式、所接收的指令,自动选择性地执行S1或S2。
所述第二模式设置为:不允许第二设备与第一设备通过所述第二通信路径进行数据传输。
当需要第二设备可获取第一设备的数据时,可以利用第一角色发出并通过所述第一通信路径传输的第一指令,实现第一设备由第二模式切换至第一模式;当不需要第二设备获取第一设备的数据、或第一设备的数据需要保密时,也可以利用第一角色发出并通过所述第一通信路径传输的第二指令,实现第一设备 由第一模式切换至第二模式。
第一模式下,允许任意一个受信任的第二设备与第一设备通过第二通信路径进行数据传输;例如,电子设备100可以通过第二通信路径、以一定的时间间隔持续发送所监测的分析物浓度至受信任的第二设备接收设备200。
第二模式下,不允许第二设备与第一设备通过第二通信路径进行数据传输;此时,电子设备100无法通过第二通信路径发送数据。第二模式相较于第一模式,数据更为安全,适用于一些需要对数据进行保密的场景。第一角色可以根据实际场景,利用第一通信路径随时发出切换模式的相关指令,确保了获取分析物浓度的灵活性、可操作性和便利性。当第一角色通过第一通信路径连接电子设备100并发送第二指令后,从安全模式唤醒的电子设备100唤醒第二通信路径的通信功能,允许通信范围内受信任的接收设备200通过第二通信路径发现并连接电子设备100。
第一指令、第二指令分别包括通过所述第一设备校验的信息,确保了第一指令、第二指令均是通过校验、且由第一角色发出的;在第一模式下,仅允许任意一个受信任的第二设备与第一设备进行数据传输,相较于单一的通信路径验证并传输数据的方式,通过双重的通信路径、并结合用户角色信息的校验方式,降低了被破解的风险,提高了数据的安全性和可靠性,提升了用户的体验感。第二模式下,不允许第二设备与第一设备通过第二通信路径进行数据传输,能够降低第一设备、第二设备的通信功耗,节省第一设备和第二设备的电能。
下面结合图3描述本申请的持续监测系统,该系统包括电子设备100和接收设备200,其中,所述电子设备100与接收设备200之间,分别可以通过第一通信单元、第二通信单元建立有第二通信路径;通过第三通信单元、第四通信单元建立有第一通信路径;电子设备100还包含用于采集分析物浓度的采样电路、用于存储数据的存储器以及用于处理数据以及控制该电子设备100的处理器,接收设备200还包括用于处理数据以及控制的微控制单元(Microcontroller Unit,MCU)。S1至S2中,执行主体可以是电子设备100中的处理器。在第一模式或第二模式下,通过第三通信单元、第四通信单元建立的第一通信路径都是可正常工作的,随时可以通过第一线通信路径传输的指令,切换工作模式。在第二模式下,第一通信单元是不工作的,通过第一通信单元建立的第二通信路径也是被锁定、不工作的,并无法通过第一通信单元与第二设备进行连接。当电子设备100由其他的模式切换为第二模式,第一通信单元由打开状态切换为关闭状态;关闭状态的第一通信单元不产生能耗,且不对外发出广播,也就是此时,第一通信单元的身份信息被隐藏,此时,第二设备的第二通信单元无法通过第一通信单元找到该电子设备100。此时,电子设备100中的数据处于安 全状态。
如图4所示,一个实施例中,所述数据传输方法还包括:
响应于所述第一设备处于第一模式或第二模式,基于所接收的第三指令,将所述第一设备切换至第三模式(限定模式);
响应于所述第一设备处于第三模式,基于所接收的第一指令,将所述第一设备切换至第一模式;或,基于所接收的第二指令,将所述第一设备切换至第二模式;
其中,所述第三指令由第一角色发出并通过所述第一通信路径传输;所述三指令包括通过所述第一设备校验的信息。
所述第三模式设置为:允许符合预设条件且受信任的第二设备与第一设备通过所述第二通信路径进行数据传输。
当需要一些符合预设条件且受信任的第二设备可获取第一设备的数据时,可以利用第一角色发出并通过所述第一通信路径传输的第三指令,实现第一设备由第一模式或第二模式切换至第三模式;在第一设备处于第三模式时,当需要任一个受信任的第二设备可获取第一设备的数据时,可以利用第一角色发出并通过所述第一通信路径传输的第一指令,实现第一设备由第三模式切换至第一模式;当不需要第二设备获取第一设备的数据、或第一设备的数据需要保密时,也可以利用第一角色发出并通过所述第一通信路径传输的第二指令,实现第一设备由第三模式切换至第二模式。
限定模式中,电子设备100在与接收设备200通过第二通信路径连接时,检查接收设备200的身份标识号(Identity Document,ID)标识,如果是非第一角色录入的接收设备200的ID标识,电子设备100将主动断开与其的第二通信路径的通信。限定模式下的电子设备100只允许第一角色录入的接收设备200与电子设备100通过第二通信路径进行通信,其他设备通过第二通信路径通信时,若发送的信息不是第一角色录入的信息或没有发送与第一角色关联的信息时,电子设备100拒绝后续的通信。
当第一角色通过第一通信路径连接电子设备100并发送第三指令后,从安全模式唤醒的电子设备100唤醒第二通信路径的功能,允许符合预设条件、且受信任的接收设备200通过第二通信路径发现并连接电子设备100。
第一指令可以使电子设备100从安全模式或限定模式切换到公共模式,第二指令可以使电子设备100从限定模式或公共模式切换到安全模式,第三指令可以使电子设备100从安全模式或公共模式切换到限定模式;公共模式、安全模式、限定模式这三种模式之间可以通过各个指令进行两两相互切换。
在一个实施例中,所述符合预设条件包括在预设区域范围内,和/或,在预设数量范围内,和/或,在指定设备范围内。所述第三指令的信息中包含所述预设区域范围、预设数量范围、指定设备范围中的至少一种。例如,预设区域范围可以限定在电子设备100的周围5米以内或在某一个特定房间区域,预设数量范围可以是3个,如果连接到一个电子设备100的接收设备200超过3个,就不允许其他接收设备200继续连接,指定设备范围可以是含有第一角色录入的接收设备200的ID标识的设备。
在一个实施例中,所述预设区域范围、预设数量范围、指定设备范围由所述第一角色录入或移除、并存储在所述第一设备中的存储器;所述录入或移除的方式包括:在与所述第一角色相关联的第二设备上进行录入或移除操作,所述操作通过所述第一通信路径传输、并实现对所述存储器中的内容进行更新。
在一个实施例中,所述第一角色通过所述第一通信路径与所述第一设备建立关联;
和/或,同一时间下,允许至多一个第一角色与所述第一设备建立关联。
所述第一角色为具有模式切换决定权的个人或组织,所述第一角色的产生和分配可以由管理员(具有电子设备100使用权的个人或组织)预先进行分配,可以是人为手动分配;分配后第一角色登录的接收设备200将存储具有第一角色的身份的信息;所述信息还可以包括第一角色的身份信息、第一角色所绑定接收设备200的ID标识、该接收设备200上具有的与第一角色关联的标志信息;第一角色使用第一通信路径将所述信息传输至电子设备100,电子设备100确认接收到的信息具有与第一角色关联的标志信息时,存储第一角色的身份信息、第一角色所绑定接收设备200的ID标识。
在一个实施例中,所述数据传输方法还包括:
在所述第一角色通过所述第一通信路径与所述第一设备解除关联之后,允许第二角色通过所述第一通信路径与所述第一设备建立关联。
一个电子设备100同一个时间只允许存在一个第一角色及第一角色所关联的接收设备200,更新或更换第一角色或第一角色所关联的接收设备200时,需要第一角色与第一设备解除关联,在解除关联之后,允许第二角色通过所述第一通信路径与所述第一设备建立关联,建立关联后的第二角色可以视为新的第一角色,具有模式切换等权限。
在一个实施例中,所述数据传输方法还包括:
当所述第一设备由第二模式切换至第一模式之后,将所述第一设备处于第二模式下的数据通过第二通信路径发送至受信任的第二设备。
第一设备由第二模式切换至第一模式之后,电子设备100可以根据接收设备200的需要,将安全模式时间段内接收设备200中缺失的分析物浓度以一定的时间间隔通过第二通信路径发送到受信任的接收设备200中。
在一个实施例中,所述数据传输方法还包括:
当所述第一设备由第二模式切换至第三模式之后,将所述第一设备处于第二模式时的数据通过第二通信路径发送至符合预设条件且受信任的第二设备。
第一设备由第二模式切换至第三模式之后,电子设备100可以根据接收设备200的需要,将安全模式时间段内接收设备200中缺失的分析物浓度以一定的时间间隔通过第二通信路径发送到符合预设条件且受信任的接收设备200中。
在一个实施例中,所述受信任的第二设备设置为通过以下方式验证的第二设备:
当所述第一设备与第二设备通过第二通信路径建立连接之后,由所述第一设备接收并验证所述第二设备的上下文信息;
将通过验证的第二设备作为受信任的第二设备。
示例性的,在第一模式下的验证过程可以包括:接收设备200通过第二通信路径连接电子设备100后,将接收设备200的上下文信息转化后发送至电子设备100,电子设备100确认转化后的上下文信息为正确时,回复接收设备200并保持连接,连接建立成功后,电子设备100通过第二通信路径将数据发送至接收设备200中,并由接收设备200显示。电子设备100确认转化后的上下文信息为错误和/或第一时间段内没有收到转化后的上下文信息时,主动与接收设备200断开连接;所述第一时间段的起始时刻为接收设备200通过第二通信路径建立通信连接,结束时刻为自定义的安全时间,例如,第一时间段为10秒。所述转化的方法可以为预先编程的存储在接收设备200的软件中;此方法可以确保受信任的接收设备200可以连接,同时防止其他具有接收功能的不受信任的接收设备200与电子设备100建立第二通信路径的通信。
在一实施例中,上下文信息可以包括唯一设备标识符、与通信协议相关联的标识符(例如,蓝牙标识符)、与分析物传感器的网络和/或通信硬件相关联的标识符(例如,媒体访问控制地址),或其他合适的标识符。
类似地,电子设备100向接收设备200提供有效的证书或令牌,该证书或令牌已经使用与适当的制造商或运营商相关联的密钥进行了类似的数字签名。每个证书或令牌可以包括与提供证书或令牌的设备已知的私钥唯一配对的公钥。私钥也可以由持续监测系统的适当制造商或运营商建立。一旦收到经过验证的证书或令牌,提供证书或令牌的设备也可以证明它可以控制私钥。该信息 可用于生成共享对称身份验证密钥,该密钥可用于后续身份验证和加密。所述上下文信息也可以为电子设备100在生产过程中生成的密钥,印刷在包装上或通过近场通信等通信手段获取。
在一个实施例中,第一通信路径是基于第一通信协议建立的;和/或,所述第一通信路径为非连续工作的通信路径。所述第一通信协议采用的通信方式包括近场通信。第一通信路径是用于角色、与角色绑定的接收设备的信息验证、以及发出模式切换的指令,不需要连续工作,可以为非连续工作的通信路径。
近场通信是一种十分安全快捷的通信方式,具有成本低、带宽高、能耗低等特点。近场通信实际上对于电量的消耗非常低,尤其是在不传输数据时,基本上是可以忽略不计的。
在一个实施例中,第二通信路径是基于第二通信协议建立的;和/或,所述第二通信路径为可连续的通信路径。所述第二通信路径采用的通信方式包括蓝牙、无线通信技术(Wi-Fi)、射频通信中的一种。蓝牙、Wi-Fi、射频通信能够连续的传输数据,但可能存在功耗高的问题,尤其是为了及时响应连接请求,在等待过程中的轮询访问十分耗能,第二通信路径需要电源不断供电、可连续工作。第二通信路径用于验证接收设备的上下文信息,并在验证成功后可连续的获取分析物浓度,因此优选为可连续的通信路径。
在一个实施例中,所述第二模式设置为:将所述第一设备端的第一通信单元的身份信息隐藏,所述第一通信单元用于建立所述第二通信路径。
进入第二模式后,电子设备100关闭第二通信路径,不再可以被任何的接收设备200通过第二通信路径发现并连接。锁定后的电子设备100只允许第一角色的接收设备200与电子设备100通过第一通信路径进行通信,其他设备通过第一通信路径通信时若发送的信息不是第一角色的信息或没有发送第一角色的信息时,电子设备100拒绝后续的通信。此时,电子设备100继续从采样电路中获取电信号并存储。
在一个实施例中,用户在第一病区使用分析物传感器连续的监测分析物浓度时,出于安全的考虑,医生可以将自己的角色信息录入用户佩戴的电子设备100中作为第一角色,当用户离开第一病区后,若是数据不允许在离开第一病区的时间段内传播(离开病区后不希望用户自行或其他人获得并查看数据),医生可以通过其关联的接收设备200发出第二指令,使用户的第一设备处于安全模式,此时,不允许第二设备获取到第一设备的数据。
用户在第一病区外的时间段内,用户的电子设备100无法被其他接收设备200发现并连接;当用户回到第一病区时,由医生发出第一指令或第三指令,对 其解锁并由接收设备200通过第二通信路径将离开第一病区的时间段的数据从电子设备100获得。
当用户从第一病区转移至第二病区后,由第一病区的医生,可以通过第一通信路径擦除用户电子设备100中的第一角色信息,由其他的医生重新录入并创建第二角色信息。
在一个实施例中,所述数据传输方法还包括:
利用至少一个传感器测量分析物浓度;
将所述第一设备耦合到所述传感器上,采集所述传感器传输的与所述分析物浓度关联的电信号。所述电信号为所述传感器与特定溶液之间产生电化学反应后所获得的;所述特定溶液为所述传感器所处于的溶液。特定溶液可以是用户体内的血液、组织间液或其他的溶液等。第一设备用于采集所述传感器传输的与所述分析物浓度关联的电信号。
参见图5,下面对本申请提供的用于持续监测系统的数据传输系统进行描述,下文描述的用于持续监测系统的数据传输系统与上文描述的用于持续监测系统的数据传输方法可相互对应参照,所述持续监测系统包括第一设备和至少一个第二设备,所述第一设备与所述第二设备之间建立有第一通信路径、第二通信路径;所述数据传输系统包括:
第一转换模块10,设置为响应于所述第一设备处于第二模式,基于所接收的第一指令,将所述第一设备切换至第一模式;
第二转换模块20,设置为响应于所述第一设备处于第一模式,基于所接收的第二指令,将所述第一设备切换至第二模式;其中,所述第一指令、第二指令分别由第一角色发出并通过所述第一通信路径传输,所述第一指令、第二指令分别包括通过所述第一设备校验的信息;
所述第一模式设置为:允许任意一个受信任的第二设备与第一设备通过所述第二通信路径进行数据传输;
所述第二模式设置为:不允许第二设备与第一设备通过所述第二通信路径进行数据传输。
当需要第二设备可获取第一设备的数据时,可以利用第一角色发出并通过所述第一通信路径传输的第一指令,实现第一设备由第二模式切换至第一模式;当不需要第二设备获取第一设备的数据、或第一设备的数据需要保密时,也可以利用第一角色发出并通过所述第一通信路径传输的第二指令,实现第一设备由第一模式切换至第二模式。
第一模式下,允许任意一个受信任的第二设备与第一设备通过第二通信路径进行数据传输;例如,电子设备100可以通过第二通信路径、以一定的时间间隔持续发送所监测的分析物浓度至受信任的第二设备接收设备200。
第二模式下,不允许第二设备与第一设备通过第二通信路径进行数据传输;此时,电子设备100无法通过第二通信路径发送数据。第二模式相较于第一模式,数据更为安全,适用于一些需要对数据进行保密的场景。第一角色可以根据实际场景,利用第一通信路径随时发出切换模式的相关指令,确保了获取分析物浓度的灵活性、可操作性和便利性。当第一角色通过第一通信路径连接电子设备100并发送第二指令后,从安全模式唤醒的电子设备100唤醒第二通信路径的功能,允许通信范围内受信任的接收设备200通过第二通信路径发现并连接电子设备100。
第一指令、第二指令分别包括通过所述第一设备校验的信息,确保了第一指令、第二指令均是通过校验、且由第一角色发出的;在第一模式下,仅允许任意一个受信任的第二设备与第一设备进行数据传输,相较于单一的通信路径验证并传输数据的方式,通过双重的通信路径、并结合用户角色信息的校验方式,降低了被破解的风险,提高了数据的安全性和可靠性,提升了用户的体验感。第二模式下,不允许第二设备与第一设备通过第二通信路径进行数据传输,能够降低第一设备、第二设备的通信功耗,节省第一设备和第二设备的电能。
一个实施例中,所述数据传输系统还包括:
第三转换模块,设置为响应于所述第一设备处于第一模式或第二模式,基于所接收的第三指令,将所述第一设备切换至第三模式(限定模式);
第四转换模块,设置为响应于所述第一设备处于第三模式,基于所接收的第一指令,将所述第五转换模块,设置为一设备切换至第一模式;或,基于所接收的第二指令,将所述第一设备切换至第二模式;
其中,所述第三指令由第一角色发出并通过所述第一通信路径传输;所述三指令包括通过所述第一设备校验的信息。
所述第三模式设置为:允许符合预设条件且受信任的第二设备与第一设备通过所述第二通信路径进行数据传输。
当需要一些符合预设条件且受信任的第二设备可获取第一设备的数据时,可以利用第一角色发出并通过所述第一通信路径传输的第三指令,实现第一设备由第一模式或第二模式切换至第三模式;在第一设备处于第三模式时,当需要任一受信任的第二设备可获取第一设备的数据时,可以利用第一角色发出并通过所述第一通信路径传输的第一指令,实现第一设备由第三模式切换至第一 模式;当不需要第二设备获取第一设备的数据、或第一设备的数据需要保密时,也可以利用第一角色发出并通过所述第一通信路径传输的第二指令,实现第一设备由第三模式切换至第二模式。
限定模式中,电子设备100在与接收设备200通过第二通信路径连接时,检查接收设备200的ID标识,如果是非第一角色录入的接收设备200的ID标识,电子设备100将主动断开与其的第二通信路径的通信。限定模式下的电子设备100只允许第一角色录入的接收设备200与电子设备100通过第二通信路径进行通信,其他设备通过第二通信路径通信时,若发送的信息不是第一角色录入的信息或没有发送与第一角色关联的信息时,电子设备100拒绝后续的通信。
当第一角色通过第一通信路径连接电子设备100并发送第三指令后,从安全模式唤醒的电子设备100唤醒第二通信路径的功能,允许符合预设条件、且受信任的接收设备200通过第二通信路径发现并连接电子设备100。
第一指令可以使电子设备100从安全模式或限定模式切换到公共模式,第二指令可以使电子设备100从限定模式或公共模式切换到安全模式,第三指令可以使电子设备100从安全模式或公共模式切换到限定模式;公共模式、安全模式、限定模式这三种模式之间可以通过各个指令进行两两相互切换。
在一个实施例中,所述符合预设条件包括在预设区域范围内,和/或,在预设数量范围内,和/或,在指定设备范围内。所述第三指令的信息中包含所述预设区域范围、预设数量范围、指定设备范围中的至少一种。
在一个实施例中,所述预设区域范围、预设数量范围、指定设备范围由所述第一角色录入或移除、并存储在所述第一设备中的存储器;所述录入或移除的方式包括:在与所述第一角色相关联的第二设备上进行录入或移除操作,所述操作通过所述第一通信路径传输、并实现对所述存储器中的内容进行更新。
在一个实施例中,所述第一角色通过所述第一通信路径与所述第一设备建立关联;
和/或,同一时间下,允许至多一个第一角色与所述第一设备建立关联。
在一个实施例中,在所述第一角色通过所述第一通信路径与所述第一设备解除关联之后,允许第二角色通过所述第一通信路径与所述第一设备建立关联。
一个电子设备100同一个时间只允许存在一个第一角色及第一角色所关联的接收设备200,更新或更换第一角色或第一角色所关联的接收设备200时,需要第一角色与第一设备解除关联,在解除关联之后,允许第二角色通过所述第一通信路径与所述第一设备建立关联,建立关联后的第二角色可以视为新的第 一角色,具有模式切换等权限。
在一个实施例中,所述数据传输系统还包括第一数据传输模块。
第一数据传输模块设置为当所述第一设备由第二模式切换至第一模式之后,将所述第一设备处于第二模式下的数据通过第二通信路径发送至受信任的第二设备。
第一设备由第二模式切换至第一模式之后,电子设备100可以根据接收设备200的需要,将安全模式时间段内接收设备200中缺失的分析物浓度以一定的时间间隔通过第二通信路径发送到受信任的接收设备200中。
在一个实施例中,所述数据传输系统还包括第二数据传输模块。
第二数据传输模块设置为当所述第一设备由第二模式切换至第三模式之后,将所述第一设备处于第二模式时的数据通过第二通信路径发送至符合预设条件且受信任的第二设备。
第一设备由第二模式切换至第三模式之后,电子设备100可以根据接收设备200的需要,将安全模式时间段内接收设备200中缺失的分析物浓度以一定的时间间隔通过第二通信路径发送到符合预设条件且受信任的接收设备200中。
在一个实施例中,所述受信任的第二设备设置为通过以下方式验证的第二设备:当所述第一设备与第二设备通过第二通信路径建立连接之后,由所述第一设备接收并验证所述第二设备的上下文信息;将通过验证的第二设备作为受信任的第二设备。
示例性的,在第一模式下的验证过程可以包括:接收设备200通过第二通信路径连接电子设备100后,将接收设备200的上下文信息转化后发送至电子设备100,电子设备100确认转化后的上下文信息为正确时,回复接收设备200并保持连接,连接建立成功后,电子设备100通过第二通信路径将数据发送至接收设备200中,并由接收设备200显示。电子设备100确认转化后的上下文信息为错误和/或第一时间段内没有收到转化后的上下文信息时,主动与接收设备200断开连接。
在一个实施例中,第一通信路径是基于第一通信协议建立的;和/或,所述第一通信路径为非连续工作的通信路径。所述第一通信协议采用的通信方式包括近场通信。
近场通信是一种十分安全快捷的通信方式,具有成本低、带宽高、能耗低等特点。近场通信实际上对于电量的消耗非常低,尤其是在不传输数据时,基本上是可以忽略不计的。
在一个实施例中,第二通信路径是基于第二通信协议建立的;和/或,所述第二通信路径为可连续的通信路径。所述第二通信路径采用的通信方式包括蓝牙、Wi-Fi、射频通信中的一种。蓝牙、Wi-Fi、射频通信能够连续的传输数据,但可能存在功耗高的问题,尤其是为了及时响应连接请求,在等待过程中的轮询访问十分耗能,第二通信路径需要电源不断供电、可连续工作。
在一个实施例中,所述第二模式设置为:将所述第一设备端的第一通信单元的身份信息隐藏,所述第一通信单元用于建立所述第二通信路径。
进入第二模式后,电子设备100关闭第二通信路径,不再可以被任何的接收设备200通过第二通信路径发现并连接。锁定后电子设备100只允许第一角色的接收设备200与电子设备100通过第一通信路径进行通信,其他设备通过第一通信路径通信时若发送的信息不是第一角色的信息或没有发送第一角色的信息时,电子设备100拒绝后续的通信。此时,电子设备100继续从采样电路中获取电信号并存储。
在一个实施例中,所述数据传输系统还包括:
至少一个传感器,设置为测量分析物浓度;
将所述第一设备耦合到所述传感器上,采集所述传感器传输的与所述分析物浓度关联的电信号。
本申请还提供一种持续监测系统,包括:
传感器,被配置成获取分析物浓度;
第一设备,被设置为发射所述分析物浓度;
以及
移动计算装置,包括:
第二设备,被配置成接收分析物浓度;
存储器,被设置为存储包含所述分析物浓度的数据;
处理器,被设置为处理所述数据,以及软件应用程序,其包含存储于所述存储器中的指令,所述指令当由所述处理器执行时实现所述的用于持续监测系统的数据传输方法的步骤。
图6示例了一种电子设备的实体结构示意图,该电子设备可以包括:处理器(processor)610、通信接口(Communications Interface)620、存储器(memory)630和通信总线640,其中,处理器610,通信接口620,存储器630通过通信总线640完成相互间的通信。处理器610可以调用存储器630中的逻辑指令,以执行上述各方法提供的用于持续监测系统的数据传输方法,所述持续监测系统包括 第一设备和至少一个第二设备,所述第一设备与所述第二设备之间建立有第一通信路径、第二通信路径;所述数据传输方法包括:
S1、响应于所述第一设备处于第二模式,基于所接收的第一指令,将所述第一设备切换至第一模式。
S2、响应于所述第一设备处于第一模式,基于所接收的第二指令,将所述第一设备切换至第二模式。其中,所述第一指令、第二指令分别由第一角色发出并通过所述第一通信路径传输,所述第一指令、第二指令分别包括通过所述第一设备校验的信息。
所述第一模式设置为:允许任意一个受信任的第二设备与第一设备通过所述第二通信路径进行数据传输。
所述第二模式设置为:不允许第二设备与第一设备通过所述第二通信路径进行数据传输。
此外,上述的存储器630中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对相关技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括多条指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
另一方面,本申请还提供一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,计算机能够执行上述各方法所提供的用于持续监测系统的数据传输方法,所述持续监测系统包括第一设备和至少一个第二设备,所述第一设备与所述第二设备之间建立有第一通信路径、第二通信路径;所述数据传输方法包括:
S1、响应于所述第一设备处于第二模式,基于所接收的第一指令,将所述第一设备切换至第一模式。
S2、响应于所述第一设备处于第一模式,基于所接收的第二指令,将所述第一设备切换至第二模式。其中,所述第一指令、第二指令分别由第一角色发出并通过所述第一通信路径传输,所述第一指令、第二指令分别包括通过所述第一设备校验的信息。
所述第一模式设置为:允许任意一个受信任的第二设备与第一设备通过所述第二通信路径进行数据传输。
所述第二模式设置为:不允许第二设备与第一设备通过所述第二通信路径进行数据传输。
又一方面,本申请还提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现以执行上述各方法所提供的用于持续监测系统的数据传输方法的步骤,所述持续监测系统包括第一设备和至少一个第二设备,所述第一设备与所述第二设备之间建立有第一通信路径、第二通信路径;所述数据传输方法包括:
S1、响应于所述第一设备处于第二模式,基于所接收的第一指令,将所述第一设备切换至第一模式。
S2、响应于所述第一设备处于第一模式,基于所接收的第二指令,将所述第一设备切换至第二模式。其中,所述第一指令、第二指令分别由第一角色发出并通过所述第一通信路径传输,所述第一指令、第二指令分别包括通过所述第一设备校验的信息。
所述第一模式设置为:允许任意一个受信任的第二设备与第一设备通过所述第二通信路径进行数据传输。
所述第二模式设置为:不允许第二设备与第一设备通过所述第二通信路径进行数据传输。
与相关技术相比,本申请公开的方案具有如下优势:
(1)可以利用第一角色发出并通过所述第一通信路径传输的第一指令,实现第一设备由第二模式切换至第一模式;也可以利用第一角色发出并通过所述第一通信路径传输的第二指令,实现第一设备由第一模式切换至第二模式。第一模式下,允许任意一个受信任的第二设备与第一设备通过第二通信路径进行数据传输;第二模式下,不允许第二设备与第一设备通过第二通信路径进行数据传输;第二模式相较于第一模式,数据更为安全,适用于一些需要对数据进行保密的场景。第一角色可以根据实际场景,利用第一通信路径随时发出切换模式的相关指令,确保了获取分析物浓度的灵活性、可操作性和便利性。
(2)第一指令、第二指令分别包括通过所述第一设备校验的信息,确保了第一指令、第二指令均是通过校验、且由第一角色发出的;在第一模式下,仅允许任意一个受信任的第二设备与第一设备进行数据传输,相较于单一的通信 路径验证并传输数据的方式,通过双重的通信路径、并结合用户角色信息的校验方式,降低了被破解的风险,提高了数据的安全性和可靠性,提升了用户的体验感。
(3)第二模式下,不允许第二设备与第一设备通过第二通信路径进行数据传输,能够降低第一设备、第二设备的通信功耗,节省第一设备和第二设备的电能。
以上所描述的装置实施例仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本申请各实施方式技术方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。

Claims (15)

  1. 一种用于持续监测系统的数据传输方法,所述持续监测系统包括第一设备和至少一个第二设备,所述第一设备为所述持续监测系统中的一种具备获取并处理分析物浓度功能的设备,第二设备为所述持续监测系统中包含的具备数据处理能力的设备,其中,所述第一设备与所述第二设备之间建立有第一通信路径、第二通信路径;所述数据传输方法包括:
    响应于所述第一设备处于第二模式,基于所接收的第一指令,将所述第一设备切换至第一模式;
    响应于所述第一设备处于第一模式,基于所接收的第二指令,将所述第一设备切换至第二模式;其中,所述第一指令、第二指令分别由第一角色发出并通过所述第一通信路径传输,所述第一指令、第二指令分别包括通过所述第一设备校验的信息;
    响应于所述第一设备处于第一模式或第二模式,基于所接收的第三指令,将所述第一设备切换至第三模式;
    响应于所述第一设备处于第三模式,基于所接收的第一指令,将所述第一设备切换至第一模式;或,基于所接收的第二指令,将所述第一设备切换至第二模式;
    其中,所述第三指令由第一角色发出并通过所述第一通信路径传输;所述三指令包括通过所述第一设备校验的信息;
    所述第一模式为:允许任意一个受信任的第二设备与第一设备通过所述第二通信路径进行数据传输的公共模式;
    所述第二模式为:不允许第二设备与第一设备通过所述第二通信路径进行数据传输的安全模式;
    所述第三模式为:允许符合预设条件且受信任的第二设备与第一设备通过所述第二通信路径进行数据传输的限定模式;
    所述符合预设条件包括在预设区域范围内;所述预设区域范围由所述第一角色录入或移除、并存储在所述第一设备中的存储器;
    所述第一角色为具有模式切换决定权的个人或组织,所述第一角色的产生和分配由管理员预先进行分配,所述管理员为具有第一设备使用权的个人或组织;分配后第一角色登录的第二设备存储有角色信息;所述角色信息包括第一角色的身份信息、第一角色所绑定第二设备的身份标识号ID标识、所述第二设备上具有的与第一角色关联的标志信息;所述第一角色通过所述第一通信路径与所述第一设备建立关联,同一时间下,允许至多一个第一角色与所述第一设 备建立关联;所述建立关联的过程包括:第一角色使用第一通信路径将所述角色信息传输至第一设备,第一设备确认接收到的信息具有与第一角色关联的标志信息时,存储第一角色的身份信息和第一角色所绑定第二设备的ID标识;
    当用户在第一病区使用所述持续监测系统进行监测分析物浓度时,将所述用户对应的医生作为第一角色,将所述第一角色的角色信息录入所述用户佩戴的第一设备中,当所述用户离开所述第一病区后,由所述第一角色发出第二指令,所述持续监测系统的数据不允许在离开所述第一病区的时间段内传播,使所述用户佩戴的第一设备处于安全模式、且不允许任何第二设备获取到第一设备的数据;当所述用户回到第一病区时,由所述第一角色发出第一指令或第三指令,使所述用户佩戴的第一设备处于公共模式或限定模式、并由受信任的第二设备或符合预设条件且受信任的第二设备通过第二通信路径将离开第一病区的时间段的数据从第一设备获得;在所述限定模式下,仅允许在第一病区内、且受信任的第二设备与第一设备通过所述第二通信路径进行数据传输。
  2. 根据权利要求1所述的用于持续监测系统的数据传输方法,其中,所述第三指令的信息中包含所述预设区域范围。
  3. 根据权利要求2所述的用于持续监测系统的数据传输方法,其中,所述录入或移除的方式包括:在与所述第一角色相关联的第二设备上进行录入或移除操作,所述操作通过所述第一通信路径传输、并实现对所述存储器中的内容进行更新。
  4. 根据权利要求1所述的用于持续监测系统的数据传输方法,还包括:
    在所述第一角色通过所述第一通信路径与所述第一设备解除关联之后,允许第二角色通过所述第一通信路径与所述第一设备建立关联。
  5. 根据权利要求1所述的用于持续监测系统的数据传输方法,其中,所述受信任的第二设备设置为通过以下方式验证的第二设备:
    当所述第一设备与第二设备通过第二通信路径建立连接之后,由所述第一设备接收并验证所述第二设备的上下文信息;
    将通过验证的第二设备作为受信任的第二设备。
  6. 根据权利要求1所述的用于持续监测系统的数据传输方法,其中,所述第一通信路径是基于第一通信协议建立的。
  7. 根据权利要求1或6所述的用于持续监测系统的数据传输方法,其中,所述第一通信路径为非连续工作的通信路径。
  8. 根据权利要求1所述的用于持续监测系统的数据传输方法,其中,所述 第二通信路径是基于第二通信协议建立的。
  9. 根据权利要求1或8所述的用于持续监测系统的数据传输方法,其中,所述第二通信路径为可连续的通信路径。
  10. 根据权利要求1所述的用于持续监测系统的数据传输方法,其中,所述第二模式设置为:将所述第一设备端的第一通信单元的身份信息隐藏,所述第一通信单元用于建立所述第二通信路径。
  11. 根据权利要求1所述的用于持续监测系统的数据传输方法,还包括:
    利用至少一个传感器测量分析物浓度;
    将所述第一设备耦合到所述传感器上,采集所述传感器传输的与所述分析物浓度关联的电信号。
  12. 一种用于持续监测系统的数据传输系统,所述持续监测系统包括第一设备和至少一个第二设备,所述第一设备为所述持续监测系统中的一种具备获取并处理分析物浓度功能的设备,第二设备为所述持续监测系统中包含的具备数据处理能力的设备,所述第一设备与所述第二设备之间建立有第一通信路径、第二通信路径;所述数据传输系统还包括:
    第一转换模块,设置为响应于所述第一设备处于第二模式,基于所接收的第一指令,将所述第一设备切换至第一模式;
    第二转换模块,设置为响应于所述第一设备处于第一模式,基于所接收的第二指令,将所述第一设备切换至第二模式;其中,所述第一指令、第二指令分别由第一角色发出并通过所述第一通信路径传输,所述第一指令、第二指令分别包括通过所述第一设备校验的信息;
    响应于所述第一设备处于第一模式或第二模式,基于所接收的第三指令,将所述第一设备切换至第三模式;
    响应于所述第一设备处于第三模式,基于所接收的第一指令,将所述第一设备切换至第一模式;或,基于所接收的第二指令,将所述第一设备切换至第二模式;
    其中,所述第三指令由第一角色发出并通过所述第一通信路径传输;所述三指令包括通过所述第一设备校验的信息;
    所述第一模式为:允许任意一个受信任的第二设备与第一设备通过所述第二通信路径进行数据传输的公共模式;
    所述第二模式为:不允许第二设备与第一设备通过所述第二通信路径进行数据传输的安全模式;
    所述第三模式为:允许符合预设条件且受信任的第二设备与第一设备通过所述第二通信路径进行数据传输的限定模式;
    所述第一角色为具有模式切换决定权的个人或组织,所述第一角色的产生和分配由管理员预先进行分配,所述管理员为具有第一设备使用权的个人或组织;分配后第一角色登录的第二设备存储有角色信息;所述角色信息包括第一角色的身份信息、第一角色所绑定第二设备的ID标识、所述第二设备上具有的与第一角色关联的标志信息;所述第一角色通过所述第一通信路径与所述第一设备建立关联,同一时间下,允许至多一个第一角色与所述第一设备建立关联;所述建立关联的过程包括:第一角色使用第一通信路径将所述角色信息传输至第一设备,第一设备确认接收到的信息具有与第一角色关联的标志信息时,存储第一角色的身份信息和第一角色所绑定第二设备的ID标识;
    当用户在第一病区使用所述持续监测系统进行监测分析物浓度时,将所述用户对应的医生作为第一角色,将所述第一角色的角色信息录入所述用户佩戴的第一设备中,当所述用户离开所述第一病区后,由所述第一角色发出第二指令,所述持续监测系统的数据不允许在离开所述第一病区的时间段内传播,使所述用户佩戴的第一设备处于安全模式、且不允许任何第二设备获取到第一设备的数据;当所述用户回到第一病区时,由所述第一角色发出第一指令或第三指令,使所述用户佩戴的第一设备处于公共模式或限定模式、并由受信任的第二设备或符合预设条件且受信任的第二设备通过第二通信路径将离开第一病区的时间段的数据从第一设备获得;在所述限定模式下,仅允许在第一病区内、且受信任的第二设备与第一设备通过所述第二通信路径进行数据传输。
  13. 一种持续监测系统,包括:
    传感器,被配置成获取分析物浓度;
    第一设备,被设置为发射所述分析物浓度;
    以及
    移动计算装置,包括:
    第二设备,被配置成接收分析物浓度;
    存储器,被设置为存储包含所述分析物浓度的数据;
    处理器,被设置为处理所述数据,以及软件应用程序,所述处理器包含存储于所述存储器中的指令,所述指令当由所述处理器执行时实现如权利要求1至11任一项所述的用于持续监测系统的数据传输方法。
  14. 一种第一设备,包括存储器、处理器及存储在存储器上并可在处理器 上运行的计算机程序,所述处理器执行所述程序时实现如权利要求1至11任一项所述的用于持续监测系统的数据传输方法。
  15. 一种非暂态计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至11任一项所述的用于持续监测系统的数据传输方法。
PCT/CN2023/100228 2022-06-21 2023-06-14 用于持续监测系统的数据传输方法及系统 WO2023246593A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210704821.8 2022-06-21
CN202210704821.8A CN114785461B (zh) 2022-06-21 2022-06-21 用于持续监测系统的数据传输方法及系统

Publications (1)

Publication Number Publication Date
WO2023246593A1 true WO2023246593A1 (zh) 2023-12-28

Family

ID=82421035

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/100228 WO2023246593A1 (zh) 2022-06-21 2023-06-14 用于持续监测系统的数据传输方法及系统

Country Status (2)

Country Link
CN (1) CN114785461B (zh)
WO (1) WO2023246593A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114785461B (zh) * 2022-06-21 2022-10-14 苏州百孝医疗科技有限公司 用于持续监测系统的数据传输方法及系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160331232A1 (en) * 2015-05-14 2016-11-17 Abbott Diabetes Care Inc. Systems, devices, and methods for monitoring medical devices
WO2018121234A1 (zh) * 2016-12-30 2018-07-05 珠海赛纳打印科技股份有限公司 建立通信连接的方法、设备及系统
US10831877B1 (en) * 2018-03-05 2020-11-10 Architecture Technology Corporation Systems and methods for implementing multiple personas in a computing system
CN114363853A (zh) * 2022-03-17 2022-04-15 苏州百孝医疗科技有限公司 通信方法及装置、电子设备及可读存储介质
CN114374946A (zh) * 2022-03-17 2022-04-19 苏州百孝医疗科技有限公司 用于分析物浓度数据监测系统的通信方法及装置
CN114785461A (zh) * 2022-06-21 2022-07-22 苏州百孝医疗科技有限公司 用于持续监测系统的数据传输方法及系统

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9623179B2 (en) * 2012-08-30 2017-04-18 Medtronic Minimed, Inc. Safeguarding techniques for a closed-loop insulin infusion system
US9872641B2 (en) * 2012-11-29 2018-01-23 Abbott Diabetes Care Inc. Methods, devices, and systems related to analyte monitoring
CN104661242A (zh) * 2015-02-06 2015-05-27 大唐移动通信设备有限公司 一种数据传输模式的切换方法及装置
CN111381010A (zh) * 2018-12-29 2020-07-07 深圳市广和通无线股份有限公司 监测系统
CN113259050B (zh) * 2020-02-10 2023-02-07 华为技术有限公司 一种数据传输方法、装置和系统
CN112702740B (zh) * 2020-12-24 2023-04-07 国网浙江省电力有限公司经济技术研究院 一种LoRa物联网系统的数据安全传输方法
CN112685236A (zh) * 2020-12-31 2021-04-20 科华恒盛股份有限公司 数据管理系统的双机互备方法及系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160331232A1 (en) * 2015-05-14 2016-11-17 Abbott Diabetes Care Inc. Systems, devices, and methods for monitoring medical devices
WO2018121234A1 (zh) * 2016-12-30 2018-07-05 珠海赛纳打印科技股份有限公司 建立通信连接的方法、设备及系统
US10831877B1 (en) * 2018-03-05 2020-11-10 Architecture Technology Corporation Systems and methods for implementing multiple personas in a computing system
CN114363853A (zh) * 2022-03-17 2022-04-15 苏州百孝医疗科技有限公司 通信方法及装置、电子设备及可读存储介质
CN114374946A (zh) * 2022-03-17 2022-04-19 苏州百孝医疗科技有限公司 用于分析物浓度数据监测系统的通信方法及装置
CN114785461A (zh) * 2022-06-21 2022-07-22 苏州百孝医疗科技有限公司 用于持续监测系统的数据传输方法及系统

Also Published As

Publication number Publication date
CN114785461B (zh) 2022-10-14
CN114785461A (zh) 2022-07-22

Similar Documents

Publication Publication Date Title
JP7069719B2 (ja) 機器の管理における臨床データの受け渡し及びデータ共有のためのシステム
EP2684334B1 (en) Systems, methods and analyzers for establishing a secure wireless network in point of care testing
CN107004045B (zh) 用于建立到可穿戴eeg监测模块的网络连接的方法和系统
WO2023246593A1 (zh) 用于持续监测系统的数据传输方法及系统
EP2102775B1 (en) Intelligent discovery of medical devices by a programming system
AU2019200874A1 (en) Operation communication system
US20130145420A1 (en) Secure authentication using mobile device
WO2012148562A1 (en) Systems, methods and analyzers for establishing a secure wireless network in point of care testing
CN103870704A (zh) 基于多用户身份识别的生理参数检测装置和健康服务系统
KR20110097922A (ko) 신체 결합 통신에 기초한 이용자 아이덴티피케이션
WO2023174179A1 (zh) 通信方法、装置、电子设备及可读存储介质
CN107222373A (zh) 智能家居的控制方法、系统、终端、fido服务器及安全设备
CN108289616B (zh) 使用人体通信发送/接收健康信息的方法和装置
WO2023174180A1 (zh) 用于分析物浓度数据监测系统的通信方法及装置
CN116458124A (zh) 装置与通信网关的自动配对
CN111989723B (zh) 共享系统
WO2018027335A1 (zh) 一种待机方法、解除终端锁定的方法、通信方法及系统
CN114600104A (zh) 通过生物特征数据授予临时远程访问权限的方法和设备
EP4005630A1 (en) Secure communications between an implantable biomedical device and authorized parties over the internet
CN105897810A (zh) 数据发送、分析方法及装置、终端、监测设备及服务器
US11252560B1 (en) Secure communications between an implantable biomedical device and authorized parties over the internet
CN112367411A (zh) 一种智能poct检测设备及其管理方法
WO2020242088A1 (ko) 통증 데이터 로거 장치
US11227040B1 (en) User authentication via galvanic skin response
US20230328054A1 (en) Autonomous control and secure communications system and methods for sensors

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23826242

Country of ref document: EP

Kind code of ref document: A1