专利摘要:
summary “patient care system and method” is a patient care system that includes obtaining, consolidating, distributing, storing, and displaying medical data using mobile phone platforms and non-software and hardware modules. owners. The system includes capture devices, capture devices, network devices, storage and cloud computing, and presentation devices. Pickup devices are connected to pickup devices via wired or wireless connections. Capture acquisition devices can be used at the caregiver's facility and in an outpatient patient environment and can connect to the cloud via cell phone networks (3g / 4g). Clinical data is sent in encrypted messages that have only the header encoded using a standard scripting language such as lua. Presentation devices include computers, tablet computers, cell phones, and wall-mounted displays that can be located anywhere, making caregivers more accessible to patient data.
公开号:BR112015007258A2
申请号:R112015007258
申请日:2013-10-02
公开日:2019-12-17
发明作者:Dundon James;M Owen James;Jay Gilman Jeffrey;Scott Jensen Patrick;Hays Roy;Hill Tim
申请人:Spacelabs Healthcare Llc;
IPC主号:
专利说明:

SYSTEM AND METHOD TO PROVIDE PATIENT CARE
FIELD [001] The present specification refers to medical systems. More particularly, this specification describes a distributed patient monitoring system and method to provide patient care that enables cell phone networks, cloud-based services, consumer electronic devices and connectivity to existing standard networks to acquire , consolidate, analyze, distribute, store and display medical data.
BACKGROUND [002] Standard systems for providing patient care generally employed in hospital settings include modules for acquiring, consolidating, distributing, storing and displaying medical patient data. Such modules comprise several hardware components that run numerous software programs, usually connected to an information network. The systems currently available to provide patient care use proprietary hardware, thereby limiting options for expansion and restricting the use of the systems. In most cases, the systems allow only specific application software that has been designed according to the system's execution requirements. In addition, due to periodic updates, hospital environments often have multiple versions of both hardware and software in operation on their systems. Therefore, these systems tend to be like closed boxes that can be customized only to a certain extent. As technology advances, hospitals
2/72 encounter growing difficulties that integrate new functionality with existing systems. Typically, an on-site information technology (IT) team is required to perform manual troubleshooting and updates.
[003] Current systems for providing patient care include networks that use traditional communication protocols that need to strictly define the format, schemes and encoding of messages that comprise the protocol. These definitions form a contract between an information transmitter and an information receiver in the system and are typically in the form of either strict bit-level encodings or higher-level encodings, such as Extensible Markup Language (XML). Bit-level encoding involves a precise template of each bit and byte of each message at the binary level and, therefore, strictly defines the exact content and format of all messages in the protocol. The TCP / IP protocol used on the internet is an example of bit-level encryption. XML encoding uses a specific protocol scheme to layer the necessary rules on top of a standardized format (XML) to define the message template. The hypertext markup language (HTML) web page pattern is an example of XML encoding.
[004] Both types of encoding require that the transmitter and the receiver agree on the same protocol. A receiver that expects XML data would be unable to process binary data from a transmitter and vice versa. Therefore, changes and improvements to the protocol need to be made step by step, in which the
3/72 transmitter and receiver are updated simultaneously. Current systems are often deployed widely, making such simultaneous updates impractical and resulting in protocols that become stuck with little evolution.
[005] In addition, the transmission of information through a standard protocol involves several conversion steps. The transmitter needs to encode data before sending it and the receiver needs to decode the data to retrieve it. Continuous encoding and decoding of data can be complex and can significantly increase the load. Making changes to the underlying protocol typically requires new work from both the encoding and decoding stages, leading also to increased costs.
[006] Communication protocols in typical networks come in two basic types: connection-oriented and connectionless. Connection-oriented protocols require a handshake procedure between the two communicating parties before data exchange can take place, while connectionless protocols allow data exchange without a previous installation or handshake.
[007] The protection of communications is typically carried out with encryption, and all extinct forms of encryption require that parties in communication have shared secrets, typically in the form of keys, which allow them to encrypt and decrypt messages. Although there are many sets of procedures for sharing keys, they all involve the use of a connection-oriented protocol so that keys
4/72 can be changed during installation of the connection. In addition, each individual connection must specify a unique set of secrets. Therefore, if a first agent is communicating with 100 other agents, each individual conversation involves an individual encrypted connection, requiring the first agent to manage 100 simultaneous connections and associated keys. As such, in systems where many agents talk to many others, the total number of connections increases exponentially. This will increase costs and slow down the system.
[008] To overcome this, many systems use a single central exchange that routes communications between agents. The total number of connections is then equal to the number of agents since each agent has to connect only with the shared central exchange. However, unless the exchange is trusted, agents still need to maintain individual encryption key pairs for each pair of communication agents. Therefore, agents still need to connect the key exchange.
[009] The messages sent between the transmitters and the receivers will vary in importance and priority from the trivial to the critical. Since it is generally extremely difficult or impossible to guarantee delivery of a given message, it is often useful for the recipient of a message to acknowledge receipt of the data sender. Since this receiving generation consumes the network bandwidth (at least one new new message is generated by the receiver for each message received), it is often reserved for messages of the highest importance.
5/72 [010] As with message encoding, traditional communication protocols form a contract between transmitters and receivers and need to have strictly defined rules for the specification that receivers generate and send a delivery receipt. Typically, the protocol will specify a field or a frequency of fields that need to be decoded to determine whether a receipt message should be generated. Additional fields define the format of the receiving message and the sender's network address. In order for a traditional network system to ensure receipt generation effectively, all agents on the network must be running compatible versions of the protocol so that incoming message requests, format descriptions and address designations are all in compatible formats.
[011] In addition, the generation of traditional message receipt is very restrictive in that the format of the return receipt is determined by the functionality encoded in the receiver software piles. If a complex sequence of actions is desired upon receipt of a particular class of messages, it must be encoded in the software stack of each network agent.
[012] For example, a class of critical messages requires that not only a standard receipt be generated (a message returned to the sender), but also that a notification of receipt of a secondary message be sent to the data log server (which accompanies all high priority message receipts). In
6/72 a traditional system, this behavior should be compiled in the message protocol so that additional optional data fields (secondary receipt notification enabled, secondary notification server address, specified behavior if a secondary server is not available, etc.) were used for implantation. This is a complex response upon receiving a message that is difficult to encode in a traditional protocol. The effect is to increase the size of all messages and make the protocol progressively more complex, slower and more difficult to use and maintain.
[013] With each new behavior that is encoded in the protocol in this way, the stacks of network software on all network agents grow in complexity and memory consumption and become less efficient. In addition, such a feature cannot be used until all network agents are running a compatible version of the protocol that supports the feature.
[014] When sending messages, typical networks also rely on a variety of protocols to determine the optimal route for data packets. These protocols determine the ideal trajectory between endpoints using static cost metrics. Most are based on Dijkstra's algorithm, a graph search algorithm that solves the trajectory problem
shorter in single source for a chart with costs in trajectory in margin not negative, for to determine The trajectory more short in between two vertices. Each link is
assigned a cost based on a specific attribute, which is usually the available bandwidth.
7/72 [015] The Shortest Open Path Trajectory (OSPF) routing protocol is a common example of a route determination protocol. Although other attributes are available, OSPF is commonly configured to assign each available network link a cost of 10 A 8 / bandwidth. A link of 100 Mbit / s of land bandwidth at a cost of 1 and a link of 10 Mbit / s of land at a cost of 10. In selecting a path between two networks, OSPF would choose the path with the lowest cost.
[016] The Extended Structure Protocol (STP), a link layer protocol, also selects ideal trajectories for a network based on the available interface bandwidth using a standard cost table. For STP, 10 Mbit / s is given a cost of 100, although 100 Mbit / s is given a cost of 19. The sum of all links in each path is used to determine the cost of
trajectory, with the trajectory cost more low chosen for communications on that network. [017] In these protocols, the cust the of trajectory is determined according to the speed link negotiated for each interface. At the however, The velocity in streaming real Can be impacted in time real per congestion network, noun— > wrong package and delay in
queuing. These properties change dynamically and are not considered when the ideal trajectory is computed using static cost metrics.
[018] Typical networks use several protocols to transfer data from one or many transmitters to many other receivers. Transferring data from one or many senders simultaneously to multiple recipients is
8/72 multicast call. Protocol independent multicast (PIM) is a group of protocols that do not include their own topology discovery mechanism but use routing information provided by other protocols. The internet group management protocol (IGMP) is used by hosts and routers on networks to establish multicast group associations. During the operation of a typical network that uses IGMP, a device needs to synchronize state again, or reestablish connection, with a host or router whenever the device is roaming. Maintaining state across routers while roaming requires the system to retain session or device status information during multiple requests. This slows down the system and increases the need for additional memory storage.
[019] Many of the transmitters and receivers that transfer messages on typical networks are mobile devices. These devices often have a limited power budget for data transmission. They are powered, in general, by batteries and it is not uncommon for radio transmission (bluetooth, 802.11 wireless, 3G, 4G, LTE, etc.) to use a large percentage of the available power and the total energy in the battery. This problem is particularly acute if the device is continuously sending data as seen on mobile devices used as part of a medical monitoring system.
[020] Another problem encountered during the broadcast
9/72 selective on mobile networks occurs when duplicate messages are sent by a transmitter. When sending messages using radio frequency transmission (RF) as described above, systems are limited in the amount of data they can transfer by the amount of available bandwidth and battery power of mobile devices. Requiring more bandwidth for RF interconnections is associated with an increase in overall system cost. Duplicate messaging not only consumes more bandwidth but also results in unnecessary battery drain on mobile devices.
[021] During the alarm, traditional systems for providing patient care are typically configured to announce alarms first on the device connected to the patient. The alarms that are generated by the device connected to the patient are often replicated and displayed on remote physical devices such as on a central workstation. A central workstation is a grid display typically used by a single caregiver to observe the situation of multiple patients. In addition, mobile alarm devices can be worn by caregivers as they move through the treatment center. These devices have the ability to notify the caregiver if one of the patients has an alarm event.
[022]
These alarm approaches all provide a programmed response to an alarm condition that typically follows the path of: 1) sounding an alarm on the device connected to the patient; 2) sound an alarm on the central or remote display; 3) notify the caregiver of the alarm; and, 4)
10/72 if the caregiver does not respond, then notify another caregiver based on the predefined escalation until a caregiver responds. Although effective, traditional alarm schemes do not take into account the physical location of the patient or the closest caregiver, which can lead to delays in the alarm response.
[023] Alarm fatigue is another problem encountered by caregivers using traditional patient care systems. When a patient monitor detects a condition for which it should create an alarm, it will create notifications for the caregiver, such as a loud repeatable tone, an indicator that flashes on the device or on the display, a text message describing the alarm, etc. After a caregiver responds to numerous alarms for many different patients during a shift, the caregiver may become desensitized to alarm tones. This can lead to harm to the patient if important alarms are ignored or disabled inappropriately by the caregiver. Existing patient monitoring systems attempt to minimize alarm fatigue by allowing caregivers to silence alarms during certain situations. Silencing an alarm does not turn off the alarm, instead, however, it typically turns off the audio alarm tones for a period of time so that the caregiver is not distracted while treating the patient.
[024] Alarm silence is a way to silence that turns off audio alarms for a period of time. Alarm acknowledgment (continuous alarm) reduces the intensity of the alarm notification for the duration of the
11/72 alarm situation. If at any time the alarm condition disappears, the alarm acknowledgment status is released and a new alarm of the same type would cause the total alarm behavior to occur again. For example, for an alarm condition such as atrial fibrillation (which is typically not life threatening and can continue for extended periods of time), the alarm acknowledgment behavior can be to end flashing alarms and end audible alarms however, it still indicates that the alarm is occurring in the parameter zone along with an icon that indicates that the caregiver has recognized the alarm condition. This state would persist until the alarm was reset or until the condition was resolved. If the patient left atrial fibrillation for at least a minimum specified period of time and then reentered, the appropriate total alarm for atrial fibrillation would begin again.
[025] Alarm acknowledgment (alarm locked) is for sufficiently important alarm situations that, if they occur, then a caregiver needs to be informed. If a locked alarm occurs, then the patient monitor will continue to sound the alarm even after the alarm condition is no longer present until a caregiver recognizes that the alarm has been observed. Once acknowledged, the alarm will turn off if the condition is no longer present. Although these alarm silencing schemes are effective, they can be improved to be better distributed and oriented towards a caregiver team approach.
12/72 [026] In addition, current systems are generally fixed and cannot be used to provide patient care once a patient has been taken out of a hospital setting. Such systems do not provide a method for patients and their caregivers to connect with doctors and healthcare professionals once a patient has been discharged but still needs medical attention.
[027] Therefore, what is required is a flexible and robust system to provide patient care that is not limited to the use of proprietary technology. The new system must be flexible enough to provide support for several years without the need to replace the base modules. The system should also require little technical knowledge on the spot. Such a system would operate using the principle of software-as-a-service (SaaS), in which caregivers, patients and families access programs and data stored in a cloud. The cloud provides the system's storage and computing requirements, shifting usage over to fat customers where programs and data are stored locally. Cloud computing will lower costs and increase system flexibility.
[028] A system is also needed in which the message encoding is administered in a more cost-effective and more efficient manner. Specifically, what is needed is a flexible encoding protocol that simplifies those encoding and decoding steps and allows for system improvements without requiring simultaneous updates of system components. Such a coding protocol would also simplify the inclusion of executable programs in the
13/72 message transmission, such as delivery receipt programs.
[02 9] In addition, there is a need for a connectionless exchange to send encrypted messages between two parties without requiring those parties to negotiate keys or other secrets before the message is exchanged. What is needed is a central trusted exchange for the transmission of connectionless messages across the network.
[030] What is also needed is a message routing protocol that will consider real-time network usage, such as congestion, packet loss and queuing delay, when determining the fastest route.
[031] It is also necessary a system with the efficient multicast capability in which devices can roam without the need to synchronize again with routers, maintaining the operation of the stateless router. Such a system would reduce battery consumption on devices and decrease network demands. In addition, a system is necessary to minimize the consumption of mobile device battery and bandwidth, reducing the incidence of sending duplicate messages.
[032] What is also needed is a method of controlling the flow of messages on a network to minimize power consumption at the transmitter. Wireless devices are generally more efficient when transmitting a single block of data of a certain number of bytes than if the same bytes are transmitted as multiple smaller blocks of data. So what is needed is a method of sending multiple messages together in a single block instead of
14/72 of multiple smaller messages.
[033] There is a need for alarm priority routing based on the location and presence information of both the patient and caregivers. It is also necessary, it is a method for silencing the alarm that considers a distributed team of caregivers.
[034] There is also a need for a system in which individual hardware modules are small and mobile enough to allow transfer across hospital departments and to be sent home with patients for a limited time after discharge.
[035] There is a need for a system in which individual hardware modules are configurable to interface with different type of patient sensors to provide appropriate care for the patient from the hospital environment to the outpatient setting.
[036] What is also needed is a system that provides ubiquitous patient surveillance by allowing patients, their families and caregivers to connect in a safe and reliable manner. There is also a need for a system to provide patient care that supports the use of third party solutions, adapting the system to receive patient physiological data from third party devices and other information generated from data analysis, encouraging , thus, innovation.
SUMMARY [037] This specification is directed towards a system to provide patient care comprising: a first computing device that has a volatile or non-volatile first computer readable medium
15/72 volatile, which does not include means for transmission to transmit waves, in which said first means comprises: a first plurality of programmatic instructions, in which, when executed by said first computing device, said first plurality of programmatic instructions: encrypts, using a standard scripting language, an executable program and fixes said encrypted program to the header of a message; and transmitting said message from the first computing device to a second computing device via a wireless connection; a second computing device having a second volatile or non-volatile computer readable medium, which does not include means for transmitting waves, in which said second medium comprises: a second plurality of programmatic instructions, in which, when executed by the second computing device, said second plurality of programmatic instructions: receiving said message from said first computing device; determines, from said message, at least one target computing device intended to receive said message; and, transmitting said message from said second computing device to said at least one target computing device via a wireless connection; and, at least one target computing device that has a third volatile or non-volatile computer readable medium, which does not include means for transmission to transmit waves, wherein said third medium comprises: a third plurality of programmatic instructions, wherein , when executed by the third computing device, said third
Plurality of programmatic instructions: receives said message from said second computing device; decrypts said executable program; and, executes said executable program and thus receives said message; wherein said second computing device is a cloud-based computing device.
[038] This specification is also directed towards a system to provide patient care that comprises: at least one capture device configured to detect and report at least one physiological parameter of a patient; at least one procurement device coupled to said at least one procurement device wherein said procurement device receives electronic patient data from said at least one procurement device and includes memory with the ability to store said patient data; at least one network device coupled to said at least one retrieval device in which said network device is configured to receive said patient data from said retrieval device; a network for providing cloud computing where said at least one network device is coupled to said network and wherein said network includes a database for storing said patient data so that said patient data is accessible over all network devices; and, at least one presentation device coupled to said network in which said presentation device is configured to access said patient data and display said patient data in a graphical user interface, in which the transmission of said patient data electronic patient throughout said
17/72 network includes encrypting said patient data
coding one program executable with use in an language of script -standard and setting said program to an message that includes the sayings patient data • [03 9] In an modality, the device in network is
located close to the patient. In another modality, the network device is located far from the patient.
[040] In one embodiment, the capturing device is coupled to said at least one retrieval device by means of a wired connection. In another modality, the
device in capture is coupled to said fur any less one device in obtaining by middle of a wireless connection.[041] In a modality, both the said fur any less one device in capture how much said fur any less one
retrieval device can connect to the network via a 3G / 4G connection.
[042] In one embodiment, the default scripting language is Lua.
[043] In one embodiment, the presentation device comprises any of a traditional PC, tablet-type computer, smart phone or wall-mounted display.
[044] In one embodiment, the retrieval device also functions as a display device.
[045] In one embodiment, the retrieval device duplicates and stores all clinical data for said patient in said memory and functions as an independent monitor in the event of a system failure.
[046] In one embodiment, the retrieval device is a fixed device in a caregiver facility. In another
18/72 modality, the retrieval device is a mobile device that remains with said patient upon discharge and for outpatient care.
[047] In one embodiment, the system for providing patient care additionally includes a cost-based routing algorithm that calculates the most efficient message route by directly measuring current network performance during actual use.
[048] In one embodiment, the system for providing patient care additionally includes an alarm routing protocol that routes the alarm priority based on the location and presence information of both said patient and caregiver. In one modality, a caregiver can silence or reduce the volume of an alarm
audible for all the assigned devices to said patient.[049] In a modality, the system for to provide care in patient includes additionally one exchange of message entrusted central that establishes a link
encrypted once per device between the ring and each message transmitter and receiver. In one mode, the central message exchange accumulates non-urgent messages to be sent periodically. In one embodiment, the message transmitter is configured to send each message only once and said central message exchange is configured to duplicate and send each message to multiple recipients based on a signature list included in a header for said message.
[050] This specification is also aimed at a method for providing health care.
19/72 patient comprising the following steps: providing a patient care system comprising: at least one capture device configured to detect and report at least one physiological parameter of a patient; at least one procurement device coupled to said at least one procurement device wherein said procurement device receives electronic patient data from said at least one procurement device and includes memory with the ability to store said patient data; at least one network device coupled to said at least one retrieval device in which said network device is configured to receive said patient data from said retrieval device; a network for providing cloud computing in which said at least one network device is coupled to said network and wherein said network includes a database to store said patient data so that said patient data is accessible over all network devices; and, at least one presentation device coupled to said network in which said presentation device is configured to access said patient data and display said patient data on a graphical user interface, detecting and reporting said at least one patient apparatus physiological parameter with the use of said at least one capture device; transmitting electronic data representative of said at least one physiological parameter apparatus to said obtaining device; encrypt said patient data by coding an executable program using a standard scripting language and attaching said program to a message that includes the
20/72 said patient data; transmitting said encrypted data to said network device; storing said data on said network using cloud computing; access, decrypt and display said data using said presentation device.
[051] The aforementioned modalities and other modalities of this specification will be described in more depth in the drawings and in the detailed description provided below.
BRIEF DESCRIPTION OF THE DRAWINGS [052] These and other features and advantages of the present invention will be further verified, as they are better understood by reference to the detailed description when considered in combination with the accompanying drawings, in which:
Figure IA is a diagram illustrating a workflow modality of the medical data information system in this specification;
Figure 1B illustrates a situation in use exemplary of the present invention in a unity in intensive care (ICU) of a hospital; Figure 1C illustrates a situation in use example of the present system report descriptive
in a general hospital ward;
The figure 1D illustrates a situation of use example of gift system report descriptive
in a home situation;
Figure 2 is a block diagram that illustrates an exemplary physical topography of a modality of the medical data information system of the present
21/72 descriptive report;
Figure 3 is a block diagram that illustrates the software architecture of a modality of the system portal application;
Figure 4 is a flow chart that illustrates the steps involved in the initialization of a retrieval device in the medical data information system of the present specification;
Figure 5 is a flowchart that illustrates a modality of the steps involved in an example message exchange between two applications; and, Figure 6 is a flowchart illustrating a message flow modality from a pair of applications in the medical data information system of this specification.
DETAILED DESCRIPTION [053] The present specification is aimed at a system to provide patient care by obtaining, consolidating, distributing, storing and displaying medical data using cell platforms and hardware and information modules. non-proprietary software. In one embodiment, the systems in this specification are deployed with the following usage: two or more computers or computing devices, in which computers or computing devices execute at least a plurality of programmatic instructions; a means for transferring data between said computing devices; and, at least one protocol designed to facilitate the transfer of data between said computing devices.
22/72 [054] In addition, a person of ordinary skill in the art would note that the features described in the present application can operate on any computing platform including, but not limited to: a laptop or tablet computer; personal computer; personal digital assistant; cell phone; server; integrated processor; digital signal processor (DSP) chip or a specialized imaging device capable of executing instructions or program code.
[055] It should also be noted that the platform provides the functions described in this application by executing a plurality of programmatic instructions, which are stored in one or more non-volatile memories, with the use of one or more processors and presents and / or receives data through transceivers in data communication with one or more wired or wireless networks.
[056] It should also be noted that each device has wireless and / or wired receivers and transmitters capable of sending and transmitting data, at least one processor capable of processing programmatic instructions, memory capable of storing programmatic instructions , and software consisting of a plurality of programmatic instructions for carrying out the processes described in this document. In addition, programmatic code can be compiled (either precompiled or compiled at the right time) into a single application that runs on a single computer, or distributed among several different computers that operate locally or remotely with each other.
23/72 [057] The system of the present specification provides one or more capture devices that collect psychological data from the patient and transmit the captured data to a retrieval device that then sends the data to the cloud, interconnecting the components of the system. The cloud consolidates the data and then distributes the data to one or more display or presentation devices.
[058] The system allows third parties to innovate and develop applications, thereby leveraging new technologies quickly. In addition, the present system is easy to install, to select problems and provides service and does not require special hardware, communication network, or IT staff. In addition, the system has the capacity to operate in a non-robust network infrastructure and has the capacity to operate in a backward-safe mode. In addition, the system for providing patient care comprises a patient monitoring module that can be attached to the patient and can be taken with the patient upon discharge from a hospital and for outpatient care.
[059] In one embodiment, the system uses a communications protocol in which, when sending a message, a transmitter includes a small computer program written in an industry-standard scripting language. When a receiver receives the message, it executes the program, making the message data usable. This eliminates the need to strictly encode the message itself and provides considerably enhanced flexibility in
24/72 message. In one embodiment, the scripting language is Lua. In one embodiment, a transmitter has the ability to additionally create its own return confirmation by inserting an executable delivery confirmation code in the included program. The receiver will execute the code and send delivery confirmation upon receipt of the original message.
[060] In one embodiment, the system includes a message exchange that uses a cost-based routing algorithm that calculates the most efficient message route using multiple factors including direct measurement of current network performance during use real.
[061] In one mode, the system provides connectionless exchange of encrypted messages eliminating the need for transmitters and receivers to negotiate keys or other secrets prior to message transfer. This is accomplished by providing a central trusted message exchange that establishes an encrypted link once per device between the exchange and each transmitter and receiver.
[062] In one embodiment, the system provides a mechanism for accumulating non-urgent messages to be sent periodically instead of continuously, thereby conserving battery power from mobile devices and using bandwidth. In addition, the system dictates that messages destined for multiple recipients are sent only once by a transmitter. Each message includes a complete signature list within its header with all recipients. The system router then duplicates the message and sends the same and each
25/72 container. This also helps to reduce battery consumption and overall bandwidth usage.
[063] In one mode, the system routes the alarm priority based on the location and presence information of both the patient and the caregiver. Alarms are probed both at the location of the responsible caregiver and at the location of at least one caregiver closest to the patient, or a caregiver designated to provide the best care based on the specific type of alarm.
[064] In one embodiment, the system allows caregivers to suppress an alarm that results in audible alarms that are silenced or reduced in volume for all devices assigned to a particular patient.
[065] The present invention is directed to multiple modalities. The following disclosure is provided in order to enable a person who has common skill in the art to put the invention into practice. The language used in this specification should not be interpreted as a general denial of any specific modality or used to limit claims beyond the meaning of the terms used in them. The general principles defined in this document can be applied to other modalities and applications without departing from the spirit and scope of the invention. In addition, the terminology and phraseology used are intended to describe exemplary modalities and should not be limiting. Therefore, the present invention must comply with the broader scope that encompasses numerous alternatives, modifications and equivalents consistent with the revealed principles and resources. For the purpose of clarification, the details
26/72 in relation to the technical material that is known in the technical fields in relation to the invention have not been described in detail so as not to necessarily obscure the present invention.
SYSTEM OVERVIEW [066] Figure IA is a diagram illustrating a workflow modality 100 of the medical data information system in this specification. Step 102 represents obtaining medical data by means of capture devices 113 which, in various modalities, include commercial sensors in circulation (COTS), legacy devices (for input only), and third party devices. In several modalities, the system comprises a plurality of call and use applications made available by one or more application providers. The system includes at least one pickup device 113, at least one pickup device 112, a GHC / cloud network device 114 and presentation / display devices 116. In one embodiment, at least one pickup device 113 can be connected to at least one catch device 112 via wired or wireless connections. The capture devices 113 can be used with a retrieval device 112 in an outpatient environment and, in one embodiment, can be connected to the cloud via cellular networks (3G / 4G). In one embodiment, the procurement device 112 provides a medical information platform that comprises an ecosystem, interface programming interfaces (APIs), models, etc., to enable the development of any application, device or
27/72 service in the health care domain. In one embodiment, the procurement device 112 supports both open source and proprietary products. Since 112 procurement devices are built in accordance with the United States Health Insurance Portability and Liability Act (HIPAA), the platform's independence from healthcare-related applications is provided. In one embodiment, a plurality of APIs are provided to enable synchronization of a medical device, as well as the development of medical software with the obtaining device 112. In several embodiments, the obtaining device 112 receives data from a plurality of sources input parameters from third parties and medical devices such as ventilators, IV pumps, patient parameter capture devices, etc. The retrieval device connects to a GHC network device that connects to the cloud 114. In one embodiment, the retrieval device 112 is also capable of operating as a display device. Therefore, the retrieval device 112 enables the system to function as a patient monitoring system and, at the same time, to potentiate in time a plurality of third party applications.
[067] In one embodiment, the retrieval device is capable of providing a second technology communication (ie, cellular technology, such as 3G / 4G) that provides an alarm message to caregivers. In another embodiment, the retrieval device has a visual indicator (such as a light indicator) or a
28/72 audio that provides critical alarm information only, such as patient identification number or bed number and type of alarm (heart rate, breathing, etc.).
[068] The data obtained are consolidated and distributed in step 104 by cloud 114. In one mode, the cloud is virtual and includes all domains. In other modalities, the cloud is colocalized and includes one or more domains. The cloud 114 provides the processing power for the algorithms that work on the retrieval devices 112, thereby acting as a local hub. The use of an existing cell-based platform makes it possible to leverage consumer technology, thereby reducing the cost of manufacturing / developing a separate parameter consolidation platform. In various modalities, the cloud 114 allows mobile devices to be connected to patients and operate as patient monitors within a hospital environment. In one embodiment, cloud 114 also allows mobile devices to be used by nurses and doctors to monitor and care for patients in non-hospital settings. In another modality, cloud 114 enables mobile devices to connect patients at home to caregivers through a plurality of applications and medical devices, specifically, capture devices. In yet another modality, the cloud 114 enables mobile devices to connect loved ones in retirement homes to caregivers.
[069] In several modalities, the cloud 114 allows the system to operate efficiently even when networks
The underlying 29/72 are not working properly. In addition, cloud 114 can operate on any existing network infrastructure and does not require any specific or proprietary hardware / software to be installed for operation. The system is designed to operate in a safe mode where at least one patient monitoring device is operational in the event of a network failure. In the safe mode of operation, at least alarms that are local to a patient would operate even if central monitoring is not available. If the connection to the GHC or the network is not operational, the retrieval device and, optionally, the GHC, are able to analyze and store psychological patient data and to provide an alarm message at the patient's location. The device stores the data and, when the network operation is stored again, the data is transmitted to the GHC cloud. The stored information can be the continuous patient psychological signals or the message packages generated to alarm and other information. The retrieval device can also be adapted to receive and display complete patient psychological data.
[070] In various modalities, cloud 114 comprises data obtained from one or more hospitals or medical centers stored remotely from each of the hospitals or medical centers. Storing patient data in the cloud 114 eliminates processing delays associated with a regular database management system installed in an organization. As a result, cloud 114 allows third-party consultants as well as remotely located caregivers to analyze data
30/72 stored in it. The cloud also enables third-party applications to analyze data stored in cloud 114, allowing the processing of physiological data and other patient data from multiple sources. In addition, cloud 114 enables remote patient screening. This feature can provide immense use in arenas of military conflict and disaster areas, as well as in emerging and developing markets.
[071] After distribution, the data are presented in step 106 on display devices 116 including, in various modalities, traditional PCs, tablet computers, smart phones and wall-mounted displays. In various embodiments, medical data can be displayed on any display device available on the system infrastructure 100. The system does not limit the data display to proprietary display devices. The system also allows simultaneous presentation of patient data to multiple multiple devices located in a plurality of locations.
[072] In one embodiment, the system of the present specification provides a plurality of cloud-based services, such as: Patient Resolver, Device Resolver, Policy Mechanism, Orchestration and Management. For example, a patient solution or device solving service determines the caregiver and / or a medical professional who is closest to a patient in need of medical care. In several modalities, the patient solver service includes resources, such as a patient catalog, patient identification map
31/72
patient r management of PHI and ! map in section. 0 service solver device comprises resources, such as management device and catalog in section. 0 engine service Politics comprises resources r such as distribution, ' 'politics in safety, Control of access and increase in alarm. 0 service in orchestration comprises resourcessuch as, streams in work and ' flows of Dice. 0 service in
management comprises features such as domain management, configuration, update management. A central panel makes it possible for a healthcare provider to configure the patient to resolve, the device to resolve and the Policy mechanism based on specific organization policies across all of the organization's facilities. The central panel ensures that all devices are in compliance with policies and establishes a uniform standard of care for patients. Cloud-based services provide intelligent mapping of patient alarm information to the appropriate caregiver based on location, proximity, availability and skill set.
[073] In one embodiment, the system of the present specification provides a plurality of web applications, such as: health system seven (bidirectional) communications port (HL7), patient and family applications, caregiver applications, applications archiving and printing, and administration and dashboard applications.
[074] In step 102, retrieval devices 112 are actively obtaining clinical data from the patient. Beyond
In addition, the retrieval devices 112 function as a setback for both alarms and the data display, in the event of a system failure in general. The inclusion of retrieval devices 112 as a built-in reinforcement helps to lower system costs and minimize system complexity. The functions of cloud 114 in step 104 include, but are not limited to, device and service discovery, data distribution and storage, security and policy control, patient care reporting and metrics and system workflow . The cloud system makes it possible to license devices, applications and resources from the cloud (market) and then measure and subsequently log on to the use of devices and applications as they are used. Examples include the number of types of parameters linked to specific patients and for what period of time, the number of active devices on the network and the number of times that a particular resource is used. Knowledge of the actual use of devices, applications and resources enables new and unique billing models. Examples can include payment for use for a specific analysis, scalable billing based on the number of patients monitored by the system, scalable billing based on the patient's acuity level (ie, number of parameters that are monitored). OS Traditional patient monitoring systems are sold as capital equipment items. The capacity of the cloud system moves purchases of capital equipment to a service model. The display devices 116 included in step 106 provide the
33/72 clinical data display, alarm expression and general patient supervision. In addition, in one embodiment, each display device 116 includes a graphical user interface (GUI) to allow caregivers to perform administrative duties.
[075] In one embodiment, the retrieval devices 112 are located both at the caregiver's facility and at the patient's residence and are extensible to cause imports of devices from independent hardware vendor (IHV) and foreign system. In one embodiment, the GHC network device is located at the caregiver's facility and is extensible to accommodate applications from independent software vendors (ISV) and foreign system interfaces. In one embodiment, the display devices 116 can be located anywhere and are extensible to accommodate ISV applications.
[076] Figure 1B illustrates a situation of exemplary use of the present invention in an intensive care unit (ICU) 101 in a hospital. A procurement device 112 capable of detecting a plurality of parameters by means of acquisition devices 113 is used to measure and collect patient data. The monitor displays on the bedside 122 are coupled to the retrieval device 112 via an Ethernet connection to display vital vital patient statistics. The retrieval device 112 is also coupled to a plurality of patient monitors, such as a nurse monitor 124, an exclusive monitor display outside the patient's room 126, a
34/72 incident command system (ICS) 128 and a central station monitor 129. The retrieval device 112 and the plurality of displays are coupled to the cloud 114 provided by the present specification. The cloud 114 is, in turn, coupled to a data storage platform 144 for storing patient related data. Cloud 114 enables caregivers 152 to access patient records through a mobile display device 116 and also enables patient family 154 to monitor the patient's situation through a mobile display device 116 over a long location. a hospital environment. Cloud 114 also enables combinatorial analysis of multiple psychological parameters collected over time. This includes sensor devices developed as part of the system and third-party sensor devices.
[077] Figure 1C illustrates a situation of exemplary use of the system in this specification in a general ward 103 of a hospital. A retrieval device 112 is used as a parameter consolidation platform that receives the patient's medical data, such as heart rate (HR), respiratory rate, etc. In the depicted mode, the retrieval device 112 also acts as the patient's bedside monitor. Obtaining device 112 is coupled to cloud 114 provided by the system of this specification. The cloud 114 is, in turn, coupled to a data storage platform 144 to store patient related data. In addition, cloud 114 is attached to a surveillance unit 136 to display the
35/72 vital statistics of all patients admitted to the general ward. Cloud 114 enables caregivers 152 to access patient records via a mobile display device 116 and also enable patient family 154 to monitor patient status via mobile display device 116 in a remote location of a hospital environment. The cloud system allows the family to access patient care information and review patient care history, workflow, confirm that they receive updates on discharge instructions and billing review, thereby potentially reducing care errors to the patient.
[078] Figure 1D illustrates a situation of exemplary use of the system in this specification in a household situation 105. A mobile retrieval device 112, such as a cell phone or other separate device, is installed in the patient's home for use as a parameter consolidation platform that receives patient medical data, such as heart rate (HR), respiratory rate, glucose level, etc. The retrieval device 112 also acts as a monitoring dock for the patient's residence. Obtaining device 112 is coupled to cloud 114 provided by the system of this specification. Cloud 114 is, in turn, coupled to a data storage platform 144 for storing patient related data. Cloud 114 is in turn coupled to a plurality of monitors, such as a nurse monitor 124, an ICS monitor 128, and a monitor monitor.
36/72 central station 129 to display vital patient statistics in real time. Cloud 114 enables caregivers 152 to access patient records and monitor patient health via a mobile display device 116 and also enable patient family 154 to monitor the status of patient status through a display device mobile 116 in a location away from a hospital environment.
SYSTEM TOPOGRAPHY [07 9] Figure 2 is a block diagram that illustrates an exemplary physical topography of a modality of the
system of information in medical data 200 of the present report descriptive. In an modality, the system 200 includes devicesin capture / obtaining 212
(corresponding to the capture device 112 and / or the retrieval device 113 of Figure IA) for obtaining patient data and display devices 216 (corresponding to the display device 116 of Figure IA) for the presentation of patient data. In another embodiment, system 200 includes devices capable of both obtaining data and presenting data. A traditional patient monitor can function as both a retrieval device and a presentation device. System 200 also includes a cloud 214 comprising a plurality of global health connectors (GHC) 213, 215 that are responsible for consolidating and distributing patient data. A GHC is a network hardware device with integrated software that connects to the network. In one embodiment, system 200 includes both GHCs 215 that are colocalized within the installation of the
37/72 caregiver, for example, a hospital 220, as the GHCs 213 that are located within the cloud 214. The GHCs 213, 215 act to contact the retrieval devices 212 and the display devices 216 of the system 200. In one embodiment, the retrieval devices 212 and the display devices 216 are connected via a new media or message exchange switching fabric. Cloud 214 connects all GHCs 213, 215 as pairs on a redundant routable main support and connects all capture devices 212 and display devices 216 to establish global patient surveillance. In other words, all patient data is gathered and distributed by the cloud so that, at all times and given the appropriate access, any display device can present data to any patient through the system.
[080] As seen in Figure 2, the capture devices 212 can be located without a hospital 220, a clinic 222 and at the patient's residence 224. The display devices can be located in a hospital 220, a clinic 222 and with caregivers 226. Capture devices 212 and display devices 216 in hospitals 220 and clinics 222 are connected via hospital networks 230 and clinic networks 232 respectively and all devices are interconnected via cloud 214 via internet 234.
[081] In one embodiment, the capture devices are called retrieval device systems and include any device that retrieves and publishes data in a system section format. Such devices include,
38/72 but without limitation, traditional fixed bedside monitors, wearable devices with small form factors, and virtual devices, such as, recorded digital data and imports from foreign systems. The flow of information begins with the sensor providing raw data to the system acquisition device. A driver application on the retrieval device processes the data in raw form into parameter data. The parameter data is then published by the retrieval device in the system section format and uploaded to the network. The system session format is a form of parameter data recognized by the cloud that is distributed to the display devices.
[082] In one embodiment, a single system retrieval device is assigned to a single patient and there is no sharing of retrieval devices by patients. Multiple sensors and parameters are grouped by the single acquisition device in a single session for a single single patient. In one embodiment, a retrieval device has a local memory repository for at least 5 days of patient data. Locally stored data is an exact replica of data uploaded to the cloud and is published using a replication model. In one embodiment, the system includes replication of transitive data pair by pair. A majority of significant databases within the network are replicated across multiple locations using a pairwise model. The peer-to-peer model automatically manages transitive replication and selective replication based on a cost / benefit heuristic. Local memory provides
39/72 data history and a backup if a general system failure occurs.
[083] In one embodiment, display devices are referred to as system display devices and include any devices that display data and optionally include alarms. Such devices include, but are not limited to, traditional PCs, tablet computers, smart phones and wall monitors. Presentation devices are browser-based, supporting an environment to work from anywhere. In one embodiment, the system display devices include a GUI and provide healthcare professional workstation functionality. For example, in various modalities, the presentation device GUI provides alarm management and suppression, patient management (admission / release), patient / session association and data analysis functionality. In one embodiment, all presentation devices include a common user interface with hypertext markup language 5 (HTML5) as the interface foundation.
[084] Referring again to Figure 2, system cloud 214 includes both colocalized global health connectors (GHCs) 215 and cloud GHCs 213, all connected to form the primary system cloud support. Each colocalized GHC 215 is a small network device that is plugged in, activated and used in the healthcare professional's environment. In one embodiment, approximately 200 to 500 beds are allocated to each colocalized GHC. The 213 cloud GHCs guarantee the global reach of the main support and, in one modality, approximately 500,000
40/72 beds are allocated to each GHC group in the cloud (8 GHCs in the cloud). System cloud 214 hosts the message exchange directory. In one embodiment, all GHCs 213, 215 are peers and all retrieval devices 212 and display devices 216 can connect to any GHC 213, 215. Each GHC 213, 215 consolidates session data from retrieval devices 212 and distributes data to 216 display devices. The system cloud includes domain catalogs organized by accounts, patients and assets. In addition, in one embodiment, GHCs are completely replicated for true failover redundancy.
[085] In one embodiment, the system cloud includes at least one system cloud domain and a plurality of system cloud departments. A domain is the top layer logically isolated from the system cloud and provides no cross-domain access. The domain typically corresponds to a hospital and is scalable from 10 beds to more than 1,000 beds with costs corresponding to the number of beds. All day-to-day functions of the information system occur in the domain. Each domain user perspective is the entire world of the system. In other words, each user is unique and isolated and, if given the appropriate access, can see all other users within the same domain. All GHCs, procurement devices and presentation devices belong to a domain. In one embodiment, an external device can be used in a domain, but it must first be authorized to function in that domain. The system cloud domain contains all hospital data, including, but not limited to,
41/72 limitation, accounts for all healthcare professionals, protected patient health information (PHI), patient session data, asset records, system cloud department information and presets that define the required parameter definitions for hospital.
[086] Each system cloud department represents a division within a domain and works to assist in workflows. Each department typically corresponds to a hospital unit and is considered a smooth division, with almost no restrictions on cross-department access. Healthcare professionals, patients and devices all have a department of residence so that healthcare professionals can quickly focus on patients in their department. Most departments are not restrictive and there is no imposition on the system so that healthcare professionals can switch departments as desired. All devices inherit a department at startup that is determined by the healthcare provider's department that initiates a session. In one mode, certain departments are restricted and require prior authorization before being accessed by a health professional for the first time. For example, health professionals would not be able to access a psychiatric care department without first obtaining authorization. Each department additionally tracks billing events for budget.
[087] In one embodiment, the system cloud additionally includes a system cloud organization that is used for consolidated billing for multiple
42/72 domains.
SYSTEM SECURITY [088] Each domain of the medical data information system in this specification is designated as a walled garden. Each domain will include strictly restricted access, but once inside, a user will have the ability to move around freely. System security is built as a permissive model with logging and generalized auditing of all activities. Unusual requests in the system will be dealt with in a glass break scenario. For example, in one mode, users who request unusual access will be presented with a question like are you sure followed by an audit notice before proceeding. Although the system provides broad access for users, some restrictions are still in place when necessary. For example, a nurse does not have the ability to delete all accounts. The security of the medical data information system in this specification is designed so that it can never prevent a healthcare professional from providing patient care. As such, the system will not depend on IT security, encryption,
private networks (VPN) or platform in system operational (OS) • [089] It will be required that the professionals in health and administrators have accounts with credentials in password and
username to access the system through the retrieval devices, presentation devices and the internet. In one modality, patients and relatives will have limited special access via the internet and not
43/72 will require accounts. In one mode, users with accounts are also provided with a PIN as short credentials. The PIN is intended for use when it is inappropriate to enter full credentials, such as on a numeric keypad. The PIN is connected directly to a designated role and is used to switch accounts when multiple users have logged on to a get-to-present device. In addition, PINs are stored in intermediate provisioning storage on all
devices for emergency access when the network is dead.[090] A each account is designated a group of papers allowed. Each paper define a set appointed from
permissions set by the administration. A user chooses a role and, therefore, permissions during login. In one embodiment, the roles also specify the list of allowed applications. Roles can only be changed by ending the session and then starting the session again. Multiple logins to a single system device must all share the same role. The permissions assigned to each role include, but are not limited to, accessing PHI, admitting a patient, and viewing data. Each account is granted permission only by being assigned a role. In other words, there is no account level right. An active directory federation maps directory groups to roles, allowing a majority of account management to be performed in the active directory.
[091] All data, including messages and network traffic, is encrypted using the
44/72 advanced encryption 256 (AES-256). In addition, all system devices are validated before being connected to the system cloud. In one embodiment, the decryption point is at the device message exchange connection point, as the device OS is not considered reliable by the system. To prevent unwanted access to sensitive information, PHI data is segregated from clinical data or sessions in separate encrypted databases. Unauthorized access to a single database will not compromise HIPAA-protected PHI. The system includes robust key management and key security where the primary keys are locked in vaults that are keyed to credentials. Safes in temporary supply storage allow login even when the network is down. The cloud and local networks use the same encryption and cloud backups are also encrypted.
[092] In an emergency due to network failures, attack by a software virus or other sources, the system can disconnect the connection to the GHC and operate as a standalone device to obtain and present physiological data with a local alarm message system .
[093] The system uses Lua encoding and virtual machines (VM) as shown in Figure 3 to achieve a closed system for reliable security and a portable system that can be extended by third parties. The VM creates an isolated application in which, if the malicious input software is connected to the system via the obtaining device, the software is contained to the virtual machine isolated from the system hardware and software. In the event of an attack, the system
45/72 turns off the VM while the system can continue to operate for the other patient monitoring applications.
SYSTEM APPLICATIONS [094] All devices in the medical data information system in this specification report work in a system portal application that is the base software stack for the system. Each OS platform (PC, Mac, iOS, Android) has a specific portal application built for that OS that is delivered to the device through OS-specific means (for example, iTunes). The system portal application is packaged as a monolithic binary for each target OS platform. Simply running the system portal application makes the device a system fetch device, system presentation device, or both. The system portal application is also used on GHCs and web servers.
[095] Device enrollment is required before the system portal application can be used. Enrollment creates an asset record in the system domain for a combination of the device and the system portal application. The application also designates a domain messaging connection ID for addressing messages and designates keys and security deposit boxes for encrypted local storage. Registration can be done offline or directly on the device, if allowed. External devices are allowed, but require registration to ensure that the device is not polluted.
[0 96] Figure 3 is a block diagram that illustrates the
46/72 software architecture 300 of a system portal application modality. The portal application is a monolithic application loaded as an OS process. The portal application includes a portal application base 310 that instantiates multiple integrated clinical engine blocks 320 to host system applications as needed.
[097] Base 310 contains an OS abstraction layer (OSAL) 311 that isolates the 305 operating system idiosyncrasy portal application and handles startup, storage and other OS interfaces. OSAL 311 is the only part of the portal application that is specific to OS, maximizing code reuse. Base 310 also includes a plurality of 312 libraries that provide functional support for executable applications written, in one modality, in the Lua programming language. The 312 libraries include security / encryption, standard query language lite (SQLite), zlib, interface user experience / user experience (UI / UX) and other mixed libraries. A person of ordinary skill in the art will recognize that Lua is a lightweight, crafted platform programming language designated as a relatively simple scripting language with extensible semantics. Also included in base 310 is a Lua 313 engine for executing Lua application code on integrated clinical engine blocks 320. The Lua 313 engine also manages a grouping of Lua 314 parts for shared code blocks. Base 310 also contains an integrated clinical engine block manager and a data exchange protocol stack
47/72 messages complete 315. The portal application base 310 essentially functions as a sophisticated Lua host and contains no active code.
[098] Each 320 integrated clinical engine block functions as a site used to run system applications. The system acquisition devices and system presentation devices each represent a single integrated clinical mechanism block 320. Web servers instantiate one block per active web connection with special handling of connection point IDs via one grouping of IDs per server. Each block 320 contains its own messaging connection point 321 so that each block is viewed by the cloud as a system device. In addition, each block has its own TCP / IP connection, login and permissions. Each block 320 additionally contains a plurality of individual Lua applications 322, including boot and system applications, which are run by the Lua engine 313 of the portal application base 310. Base 310 maintains a thread pool for running Lua applications 322 in blocks 320. Threads are dispatched to Lua instances as needed. Lua 322 applications are triggered by event. All non-Lua code is identical across all system portal applications.
[099] 0 app in boot Moon is switched on to app of portal in system and define the type in device (obtaining or presentation) 0 application in startup is the only app Sent inside of torque of app in portal and its only occupation is
48/72 start a session to the cloud and load the system application. The system application contains the real functionality of the portal application and serves to load Lua applications as desired.
[100] Lua applications are sold in an online market and stored as assets. All applications are delivered to the portal application on the device, loaded on the fly (JIT) and executed via messaging. Lua application updates are placed in the asset catalog and decoupled from the most tedious portal application updates.
[101] Figure 4 is a flow chart that illustrates the steps involved in starting a retrieval device in the medical data information system of this specification. In step 402, a preloaded startup application loads the appropriate get device system application. Then, in step 404, the procurement device system application initializes the device by logging for appropriate sensor detection and asset loading events. A new sensor is connected at step 40 6 and the system application receives a connected sensor event, causing the system application to query the sensor for identification to determine the sensor class and type. The system application also queries the asset catalog in the domain for the corresponding application driver, and then loads the catalog driver or uses a provisioning buffer. The new driver connects to the sensor in step 408, initializing the preset definitions and registering the parameter in the
49/72 directory. In step 410, the parameter data is recorded locally and available for signature. This comprises the ability to turn on and use where the system automatically detects the type of sensor device and configures that device to interface with the acquisition device, system alarms and display of physiological data.
MESSAGE EXCHANGE PROTOCOL [102] The system for providing patient care in this specification uses a single protocol to encode the information to be transmitted across the network. When messages are sent using the system message exchange protocol, a transmitter sends the message with a small computer program that uses an industry-standard scripting language. In one embodiment, the scripting language is Lua. When the receiver receives the message, it executes the contained program and, as a result of the execution, receives the desired data. The execution of the message naturally yields data that has already been completely decoded and is ready to be consumed by the receiver without any additional processing required. The message exchange protocol standardizes the execution of the message at the receiver instead of standardizing the actual content of the message. Operating in such a way, the message exchange protocol alters the contract between the transmitter and the receiver to define the content of a message to define the result of the execution of a message.
[103] The message exchange protocol provides greater flexibility in encoding messages by allowing the
50/72 transmitter create any program you want when sending a message, as long as the final execution of the program yields the expected data. In addition, new message encapsulations can be developed without the receiver having to be aware of them, thus avoiding the problem of the transmitter and receiver having to be updated simultaneously. The message exchange also eliminates the decryption overhead by providing final data in
a usable form once what the program contained was executed. [10 4] In a modality, the message exchange is an central exchange trustworthy what establishes a link
encrypted between itself and each transmitter and receiver. The link between the exchange of messages and each individual transmitter and receiver needs to be established only once per transmitter and receiver. A transmitter locally encrypts a message to send a key at once (OTK). The sender then sends the message encrypted with the OTK using keys exchanged with the message exchange. Since the exchange of messages is a reliable exchange, it knows the keys of both parties and will perform the decryption of the OTK and then perform new encryption on the receiver. The message exchange then sends the re-encrypted OTK, along with the message to the recipient. In one embodiment, the described protocol can be used through multiple exchanges at different locations. The message exchange only has to decrypt and encrypt the OTK and can pass through the message as such, resulting in less overhead in the exchange. The exchange is without connection in which the transmitter and the
51/72 receiver never need to exchange keys between each other. The key exchange is done in and through the reliable message exchange and only needs to be established once per transmitter or receiver. Message keys are encapsulated through the reliable message exchange mesh (point-to-point), without the need to establish endpoint connections, resulting in the most effective message transfer.
[105] In one mode, the transmitter embeds its list of recipients in the message header and sends it for exchange. The exchange of messages replicates the recipient list and then transfers the message to all intended recipients. The exchange of messages handles the entire message distribution, requiring that the sender only send the message once regardless of the number of recipients. This allows the transmitter to reduce power consumption. In addition, since the recipient list is included in the header of each message, the router operation has the ability to remain stateless. Therefore, when a device is mobile and moves to a new GHC, the device simply continues to send data to the new GHC without the need to resynchronize. The list of signatures is already fixed on each message.
[106] Since the transmitter code is working on the receiver, it is possible for the contained program to take any legal action in the receiver's execution space. In one embodiment, the generation of a return confirmation is performed by the transmitter that sends an exchange message that includes the formation and generation of a return confirmation.
52/72 return to the original sender of the data as a part of the code contained in the message. When the receiver executes the script, another exchange message is formed by the receiver and sent to the original data sender. In another embodiment, a collection of return confirmations is also sent to a data collection server. In this modality, the script program sent by the transmitter
includes a program in generation confirmation in return directed to the transmitter and another program in generation confirmation return directed to the server data collection.[107] Therefore, with the use of a language in script
like Lua, any message in the messaging system has the ability to generate its own delivery confirmation. This allows higher-level protocols to describe their own delivery validation semantics without requiring additional support from the message exchange fabric. A return acknowledgment is just one example of how exchange messages can be used to encode complex behavior at the receiver that does not require a tightly maintained protocol between the transmitter and the receiver.
[108] The system message exchange protocol handles all communications between individual devices and between devices and GHCs in the system. The exchange uses TCP / IPv4 or TCP / IPv6 and DHCP with no other network provisioning required. The exchange of messages always monitors and comprises a simple single connection topology. Each device maintains a single TCP / IP connection to a GHC. GHCs interconnect with each other to form
53/72 a switching loop so that the device-to-device messaging system has no connection and status information. All firewall connections are dispatched without any open ports required. The simple topology results in a high performance system with low latency and instant switching.
[109] Each integrated clinical engine block in each system portal application functions as a connection point that hosts the actual TCP / IP connection to a GHC. Disconnect / reconnect and subnet migration are transparent to other applications. The connection point identification is established when the device and the portal application are registered with the system. Typically, a single device includes a portal application with an integrated clinical engine block so that there is a single connection to the system. The connection point handles all messages for all applications in each integrated clinical engine block.
[110] Message endpoints are always applications. A single endpoint includes the domain ID, connection point ID and application ID. Therefore, each integrated clinical engine block can have only one instance of an application run. In one embodiment, a special case exists for domain catalogs that are always at a local GHC. Well-known services are mapped to reserved polymorphic connection point IDs. In one mode, applications can register services with the GHC where the service is a global ID that implies message sequence and content.
[111] Figure 5 is a flow chart that illustrates a
54/72 modality of the steps involved in an example message exchange between two applications. Within the integrated clinical engine block 1 530, the APP1 535 application creates a message for the APP4 565 application and sends the message to your CPI 532 messaging connection point in step 505. The APP1 535 application is the first endpoint EP1 and application APP4 565 is the second endpoint EP2 of message exchange. The target application APP4 565 is addressed at the second endpoint EP2 of the message exchange connection point CP2 562 within the integrated clinical engine block 2 560. The message exchange stack at CPI 532 segments the message and, in step 510, sends the message segments to GHC1 540. GHC1 540 checks the directory and finds CP2 562 in GHC2 550. In step 515, GHC1 540 sends the message segments to GHC2 550. GHC2 550 receives the message segments and sends them directly to CP2 562 in step 520. The message exchange stack at CP2 562 receives the segments and remounts the message. In step 525, CP2 562 sends the message to the target application APP4 565. Also illustrated in Figure 5 are the application APP2 537 on the integrated circuit mechanism block 1 530 and the application APP3 567 on the integrated circuit block 2 560 representing additional message exchange endpoints via CPI 532 and CP2 562.
[112] All messages are segmented, compressed and encrypted for transmission. All messages are handled at each end by the connection points. GHCs simply switch opaque data. Sending smaller message segments allows for more switching
55/72 effective on GHCs and prevents large low priority messages from blocking higher priority messages. The segments are sent from a first endpoint, through at least one GHC, and then to a second endpoint. Only segment headers are encrypted and decrypted as segments jump from one GHC to another. The segments are blocked together for optimal network framing and are marked with a target GHC to make jump routing faster.
[113] In one embodiment, the GHCs that route the message exchange segments use a cost-based routing algorithm that calculates and chooses the best and fastest route using weighted metrics. Metrics are automatically calculated by directly measuring link performance during actual use. No initial definition or adjustment is necessary. The routing protocol reacts dynamically to the underlying network congestion, interruptions and changes to avoid unnecessary cloud costs while also preserving a complete cloud fallback in the event of a network failure. During operation, GHCs exchange routing cost metrics to automate automatic traffic balancing. Reacting to direct measurements of actual link performance, the system effectively routes segments while minimizing bandwidth usage.
[114] In one embodiment, the system for providing patient care in this descriptive report gathers the data in messages of reasonable size to minimize the energy used to transmit a given volume of data. The gathering of data together in messages
Larger 56/72 results in an increased delay between when a message is created and when it is sent to the receiver, but requires less power from the transmitter. Since many transmitters in a hospital environment can be mobile devices, gathering messages serves to extend battery life. Examples of data obtained continuously by transmission devices include ECG, blood pressure and pulse oximetry waveforms. In a non-emergency situation, this data can be gathered and sent together to conserve energy. Urgent messages, such as clinical life-threatening alarms or critical system messages, will be sent individually and immediately.
[115] As messages are generated by system applications, they are queued at the control point (NCP). Part of the queuing process includes determining the message priority. For example, in one mode, messages are labeled system, urgent, high, medium and low priority with the highest priority messages sent first. Bandwidth reservation prevents deprivation of the low priority message. Non-urgent messages from a specific application are always sent in order with urgent and high priority messages causing the release of temporary IP storage. In one embodiment, a background option defers the lowest priority messages until the system sends the next group of messages collected. Each instance in which the system sends a group of messages gathered is called a heartbeat system. In one mode, the pulse occurs in
57/72 a lower frequency (0.5 to 10 Hz).
[116] In one embodiment, the system implements a publication and subscription mechanism (Pub / Sub) that ensures that the data intended for use by multiple subscribers or receivers will be produced by the source or transmitter device only once. For example, it is not uncommon for a mobile monitoring device used in the system to have multiple consumers of the data obtained from the device. A typical mobile monitor may be generating alarms and vital signs that are used by multiple healthcare professionals (nurse, supervisory nurse, doctor), all of whom may be monitoring the same patient on different devices (some of which may be mobile). In addition, vital signs and real-time waveforms and trends can be continuously displayed on central or bedside monitors that are connected directly to the network.
[117] In this example, each healthcare professional's device (and units directly connected) have active signatures on the data being produced by the mobile monitor. In this case, the mobile monitor transmits the monitoring data once from the device to the nearest GHC. The message that is transmitted will include the addresses of all recipients of data from the
device. The GHC will interpret the address list and guarantee the duplicate data be sent to all the recipients. [118] 0 CP on the device source will monitor all at subscriptions active for Dice and will ensure what at information routing for each subscriber are
58/72
included in pack of single messages what is sent to GHC. When the data are received fur GHC, will create new messages that are linked The each one From devices subscribers . It should note that the duplication From
data at that point is no longer expensive due to the fact that the GHC is a connected device powered directly by the wall with a fast network connection.
[119] The message exchange protocol is optimized for low power devices. In one embodiment, output flow control is optional as it is not required on devices that are not limited by power. The background option decreases traffic and optimizes the use of WiFi radio by sending messages in sequence. In addition, publication / subscription data (Pub / Sub) is sent only once from a device. Reducing total WiFi traffic improves device battery life and reduces network load. The heartbeat manages alerts when a connection goes down and also sends updates on status, metrics, list of bays, and location / presence.
[120] Figure 6 is a flowchart that illustrates a mode of message flow from a pair of applications in the medical data information system of this specification. In step 605, the APP1 630 application and the APP2 640 application each send a message to the message exchange connection / stacking point 650 for delivery to another application (not shown). 652 message exchange compresses and encrypts each message individually using a key
Derivative 59/72. The message exchange 652 then segments each message and encapsulates the segments. In step 610, message exchange 652 sends the encapsulated segments to connection point queue 653. The message segments are then prioritized and messages in the background are retained until the next heartbeat. The segment headers are encrypted and the segments are concatenated together. In step 615, the concatenated segments are sent to the OS 660 TCP / IP stack. From there, the segments are sent to the 670 network in step 620 and to the connected GHC for routing.
[121] Publication / subscription (Pub / Sub) is a service contract administered at the connection point on the integrated clinical engine block and is therefore shared by all applications. The connection point manages the tracking of subscriber lists and expands the publication message with a list of subscriber ends. The connection point sends the message segments only once to a GHC with the subscriber list. The GHC then forks segments as needed to reach all subscribers. This routing of message segments minimizes network traffic and battery drain at the publisher. When necessary, the subscriber must reinstate subscriptions as the publisher does not renew subscriptions. The subscriber must re-subscribe if the publisher disappears to avoid abandoned subscriptions.
[122] The message exchange directory is an in-memory database maintained by each GHC and is reinforced by SQLite to expand to a level of millions of subscriptions. In one embodiment, the directory is replicated across all
60/72 the GHCs in a domain contained in 2 to 5 seconds. The replication activator (dirty flag) is superimposed on a heartbeat. In one embodiment, the directory includes a report on all devices, ends, and services and also maintains device locations. Determining a device location can assist a caregiver in finding a patient. In one embodiment, the last known location is also renewed for the asset catalog when a device is emptied. The directory is also extensible for third-party device discovery.
[123] In one embodiment, most messages sent through the exchange are sent as Lua source code. The use of Lua is secure as control over the network and the portal application is maintained. Lua font encoding provides simple message decoding. For example, in a modality, a user can use the loadString () method in the message content to obtain values. In addition, Lua source coding enables a faster system, as the Lua analyzer is optimized for data sets (> 300 / sec. On a tablet computer). The use of Lua source code changes the message service contract paradigm by eliminating fixed rigid messages and basing the contract on the effect of the message upon confirmation and execution. Return confirmations for messages are generated by adding code to the message.
DATA ON CLINICS AND PATIENT SESSIONS [124] In the medical data information system of the
61/72 In this specification, a patient session is an environment for all clinical data gathered from the patient. Each session is created by the system retrieval device when collecting patient data. In addition, each session is identified by device using a globally unique identifier (GUID). The sessions are cumulatively immutable as they can only be attached. In one mode, each session is divided into one-hour strips to avoid fluctuating sessions. The sessions themselves are anonymous, with no protected health information (PHI). The data in each session is definitive, including all data, and can be reproduced in a similar way to the content of a digital video recorder. In addition, in one mode, each session includes all clinical data and alarms, changes in definitions, and a report of who made the changes.
[125] In one embodiment, the sessions originated in the system acquisition devices and are stored and distributed in the GHCs. GHCs collect all session strips using a replication protocol. The replication delay is typically only a few seconds so that retrospective data is readily available for analysis. In one embodiment, cloud GHCs collect only session strips on demand.
[126] The patient's association with a session is separate from a session length. A new session can be created for a patient without having to admit and the association can be made at the beginning, during, or after the session. Bread crumbs, like voice notes, help with session association. In one embodiment, the annotations
62/72 against a time interval are maintained in the patient report. In one embodiment, the notes can be manual or synthetic (for example, created from alarms). In terms of session archiving and storage, in one mode, after a basic retention period, a session can be trimmed. In one embodiment, trimming a session involves discarding un alarmed and unnotated waveform data. A trimmed session is migrated to the cloud and discarded from the GHCs. By moving trimmed sessions to the cloud, the system provides essentially infinite storage depending on how long the customer decides to pay for storage.
ALARM ROUTING AND ALARM SUPPRESSION [127] In one embodiment, the system for providing patient care in this specification describes an alarm routing priority method based on the location and presence information of both the patient and caregivers. In one embodiment, the alarm routing priority method is similar to that disclosed in US Patent Application 13 / 300,434, entitled System and Method for Transfer of Primary Alarm Notification on Pacient Monitoring Systems, filed on November 18, 2011 and assigned to the applicant of the present invention, which is incorporated in this document for reference in its entirety.
[128] In one embodiment, the system in the present specification will route primary alarms to the nearest available response, thus minimizing the time taken between the alarm and the response from the caregiver. In an exemplary modality, a first
63/72 caregiver is designated as a responsible operator for a patient (is directly responsible for said patient). The first caregiver assigns his mobile alarm display device to receive alarms for the patient. A crucial alarm for the patient announces on the mobile device. The first caregiver looks at the display on the mobile device and determines that the patient is still in bed, whereas a second caregiver (operator) is already beside the patient's bed. The first caregiver presses the name of the second caregiver on the display of the mobile device and is immediately placed into two-way voice communication with the second caregiver in order to assess the situation.
[129] In another exemplary modality, a telemetry patient leaves the unit to walk. When out of the unit, the patient has a cardiac arrest and collapses. A telemetry monitor used by the patient gives off a high priority alarm. The system of the present specification, based on knowledge of the patient's physical location, alerts the responsible operator of the patient in the general telemetry ward and two additional operators closer to the patient's current location for assistance. The system additionally puts all three caregivers in communication via their mobile devices until the situation is resolved.
[130] In another modality, the system includes a device alert in which specific alarms are delivered to portable devices carried by pre-selected caregivers. For example, the system can send an alert to a PDA of the doctor or nurse in the ICU / UCO. A group of
64/72 pre-selected distributed caregivers will receive the priority alarm. This selective notification means that not everyone on the network receives the alarm. For example, if a caregiver is in room 5, then the system can raise alarms for that caregiver. Caregiver location notification can also be specified for a particular skill set. In one mode, there is a master dispatcher who is notified of all alerts to ensure a response. Targeting and assigning an alert and assigning to selected caregivers enhances the efficiency of the system's response by ensuring that the most appropriate caregiver will receive the first alert.
[131] In one embodiment, the system for providing patient care in this specification also provides a method guided by a caregiver team and distributed to manage alarms. The method provided silences or suppressed alarms. When an alarm condition is detected by a device connected to a patient, the system will notify the appropriate caregivers to the patient that the alarm condition is occurring. Any operator who receives the alarm message with the appropriate rights to do so can suppress the alarm. Suppressing alarms by an operator puts all devices that currently display alarm information in a suppressed state that can either silence the device or behave like a traditional alarm acknowledgment operation. The suppression operation indicates to other operators that the alarm condition has been observed and that an authorized operator is taking appropriate action.
65/72 [132] In one embodiment, a state suppressed by alarms applies all retrieval devices associated with a patient and will persist until a time-out period expires or a new alarm condition with a higher priority than what has been deleted is detected. Should any of these conditions occur, the alarm suppressed state is cleared and all alarm display devices display the complete alarm signals as appropriate for the present set of alarm conditions.
[133] In one embodiment, initiating a suppression while already in an alarm suppressed state will reset the timeout and restart the alarm suppressed property based on the set of alarm conditions currently present. In one mode, any operator has the ability to cancel a state suppressed by alarms and return all alarm display devices to full alarm functionality.
OPTIONAL RESOURCES [134] In several modalities, the system for providing patient care in this specification includes additionally any feature or combination of the following optional features.
[135] In one embodiment, the system's display devices have the ability to provide logarithmic display of waveforms. Through logarithmic compression of the time scale at the far right and left edges in a waveform display, the system points out to the user that additional data is available. A caregiver can pass through these areas to
66/72 move the data to focus on the central part of the waveform. A caregiver can also switch to a linear data view after locating a section of the waveform that the caregiver would like to review in more detail.
[136] In one embodiment, system devices include voice alarms in addition to clinking alarm nodes. For example, speech synthesis added on a headset used by caregivers provides additional alarm details including cause of alarm, patient location (eg, room, surgical, etc.) and the patient's name.
[137] In one embodiment, system devices provide outpatient regimens for patients on discharge or for outpatients. When patients take a monitoring device home to the outpatient, the device is able to provide additional assistance for care including readable instructions for outpatients who traditionally are given orally at hospital discharge, drug regimens, including calendar reminders. built-in, the ability to scan quick response codes (QR) on prescription medication to check medication regimens and other similar tasks.
[138] In one embodiment, QR codes are used to assist with location services. In addition to advanced technologies like Wi-Fi triangulation and proximity field communication (NFC), simply printing and then pasting QR codes on doors provides an awareness of an inexpensive location method that is particularly applicable to emerging markets. At
67/72 cameras on caregiver devices are used to set the code and provide location awareness.
[139] In one embodiment, the system includes smart displays on walls to provide both patient information and entertainment for patients and families. Display devices in a patient's room act as entertainment hubs when caregivers are not present, but automatically switch to provide patient care information as soon as a caregiver enters the room. In one embodiment, the system provides a dual display configuration as described in US Patent Application 13 / 052,883, entitled MultiDisplay Bedside Monitoring System, filed on March 21, 2011 and assigned to the applicant of the present invention, which is incorporated into the this document in its entirety.
[140] The system provides a dual display monitor that can be adjusted on a patient's bedside to provide aggregate patient-related information across vital patient statistics in real time. One of the displays continuously shows patient information in relative time, while the other is used to display information such as when drugs were delivered, slow lab results in reference to vital signs and provides access to other remote hospital applications, typically, accessible only through separate data terminals. The dual display monitor is connected to the hospital and information system and is capable of displaying local software applications and remote software applications via remote display software, such as software
68/72 provided by Citrix ™. In addition, the dual display monitor can be connected to a central display configuration that can include up to four additional displays. These additional displays can be used to monitor more patients, additional display and / or host data and other applications.
[141] Additionally, in additional modalities, the local and remote software applications accessed on the dual display monitor also comprise applications in addition to those newly listed to provide patient monitoring functionality. For example, such software can be an entertainment application; internet or any other network connectivity application; or a patient education app or an email or video conference app or any other value-added app that would be advantageously evident to those of ordinary skill in the art.
[142] In one mode, the dual display monitor can be enabled in both patient and caregiver mode. In patient mode, clinical settings cannot be changed, but a controlled list of approved software applications, such as entertainment or patient education, can be performed. The monitor is in patient mode unless a caregiver is in the room. So, for example, when the patient is in the unattended room, the monitor would typically be in patient mode. The mode can be changed remotely by a caregiver. To switch to a caregiver mode, the monitor is enabled to take a credential, password or an RFID seal. In one mode, it is
69/72 context-sensitive disabling or minimization is possible or patiently. Thus, in the event of a change in clinical status [for example, a certain class of alarm (high priority)], the patient's application is disabled or minimized until it is cleared by a caregiver. Ideally, this would be configurable by the caregiver by the type of alarm or class of alarm.
[143] In one embodiment, the system provides a cascade of call-and-use algorithms that intensify and streamline data grouping among devices. When a sensor is connected to a device, it triggers a load of the appropriate driver application. This driver, in turn, publishes the clinical data of the device. This data is shaped like a virtual sensor that causes another driver application to load and process the data, thereby causing a cascade of driver loads as needed. This allows smart alarm drivers to load and group data from multiple devices.
[144] In one embodiment, the system enables the flow of medical data in a self-assembling cascade by describing the medical data algorithm as a functional block with defined inputs and outputs. When a particular output is desired, the set of blocks can self-assemble using metadata to connect inputs and outputs in a reverse cascade (provided by the consumer). This is applicable for both real-time data and retrospective analysis. In addition, the set of available outputs is easily computed from the available raw outputs and the permutations of algorithms.
70/72 [145] In one embodiment, a system device can perform a self-test to determine whether it is capable of acting as an alarm display device. In various modalities, not all system devices will be able to act as an alarm display device. The limitations may be on the devices' ability to generate audible tones loud enough or to visually display messages large enough to meet usability requirements. A self-test is performed by an application installed on the device and the results are used by the system to determine whether the device is capable of acting as an alarm display device.
[146] In one embodiment, the system provides a means to aggregate and store patient data in a single file so that it can be accessed by any caregiver at any time during the patient's stay in the hospital. In one embodiment, the medium includes a single PC-based device capable of displaying data for up to 64 patients in a remote real-time view. The device can also be coupled with four additional devices to enhance viewing.
[147] The device includes a robust user interface to present patient data retrospectively. The device functions as a centralized remote station to view all patient data as if the data were integrated with the device. Caregivers can view clinical data from any location and at any time.
71/72 [148] In addition, in one embodiment, the device allows patient association and identification in the form of a patient record manager and a session tracker. With conventional patient monitoring systems, data storage is centralized on the device, where it must be centralized on the patient. As such, patient data may still reside on the device in the room, even after the patient has been discharged. In addition, with conventional systems, medical record (MR) numbers and identification numbers can be confused. Incorporating a patient record manager and a session tracker, a new session is initiated to undergo reassociation when the data flow stops. Each patient is assigned an electronic serial number. Therefore, when a patient is disconnected from a monitoring device and reconnected to another monitoring device, the patient is reassigned to the new device. In one embodiment, sessions can be incorporated so that all patient data from the various devices can be viewed in total.
[149] Patients can be associated with different monitoring devices using a number of association methods. In various modalities, they include automatic retinal scanning, biometric patient identification and sensor based identification. For example, the association can be accomplished by collecting and analyzing a DNA sample, analyzing a fingerprint, or through another non-invasive procedure. Each association method identifies the patient and coordinates the device and
72/72 the data records from the device with that patient. Once established, an association between a specific device and a single patient is always present and there is never any problem in establishing a duplicate association. This also avoids the problem of losing a device-patient association that occurs when an RFID bracelet is broken.
[150] In another embodiment, each patient is associated with a device by a security tag or cord that is passed between caregivers and would need to be notified at any given time during the patient's care.
[151] In one embodiment, the system also enables the association between a caregiver device and patient data. Each caregiver can customize the display on the handheld device based on what that person wants. The above examples are merely illustrative of the many applications of the system of the present invention. Although only certain embodiments of the present invention have been described in this document, it is to be understood that the present invention can be incorporated in many other specific forms without departing from the spirit or scope or scope of the invention. Therefore, the present examples and modalities are to be considered as illustrative and not restrictive, and the invention can be modified within the scope of the appended claims.
权利要求:
Claims (7)
[1]
1) receives said message from said second computing device;
1) receives said message from said first computing device;
1. encrypts, using a standard scripting language, an executable program and attaches said encrypted program to the header of a message; and
1. System for providing patient care characterized by the fact that it comprises:
The. a first computing device that has a first volatile or non-volatile computer readable medium, without including transmission means for transmitting waves, wherein said first means comprises:
i. a first plurality of programmatic instructions, in which, when executed by said first computing device, said first plurality of programmatic instructions:
[2]
2. System for providing patient care characterized by the fact that it comprises:
The. at least one capture device configured to detect and report at least one patient's physiological parameter;
B. at least one procurement device coupled to said at least one procurement device, wherein said procurement device receives electronic patient data from said at least one procurement device and includes memory capable of storing said patient data ;
2) decrypts said executable program; and
2/7
2) determines, from said message, at least one target computing device intended to receive said message; and
2. transmits said message from the first computing device to a second computing device via a wireless connection;
B. a second computing device having a second volatile or non-volatile computer readable medium, without including transmission means for transmitting waves, wherein said second medium comprises:
i. a second plurality of programmatic instructions, in which, when executed by the second computing device, said second plurality of programmatic instructions:
[3]
3/7
ç. at least one network device coupled to said at least one retrieval device in which said network device is configured to receive said patient data from said retrieval device;
d. a network for providing cloud computing in which said at least one network device is coupled to said network and wherein said network includes a database for storing said patient data so that said patient data is accessible through all network devices; and
and. at least one display device coupled to said network, wherein said display device is configured to access said patient data and display said patient data on a graphical user interface;
in which the transmission of said electronic patient data through said network includes encrypting said patient data by coding an executable program using a scripting language
standard and annexing said program to an message what includes said patient data. 3. System to provide care in patient, in wake up with claim 2, characterized by the fact in
that said network device is located close to the patient.
3) executes said executable program and, in this way, receives said message;
wherein said second computing device is a cloud-based computing device.
3) transmitting said message from said second computing device to said at least one target computing device via a wireless connection; and
ç. at least one target computing device that has a third volatile or non-volatile computer readable medium, without including transmission means for transmitting waves, wherein said third medium comprises:
i. a third plurality of programmatic instructions, in which, when executed by the third computing device, said third plurality of programmatic instructions:
[4]
4 / Ί said at least one device for obtaining via a wired connection.
4. System for providing patient care according to claim 2, characterized in that said network device is located far from the patient.
[5]
5/7 system.
12. System for providing patient care according to claim 2, characterized in that said obtaining device is a fixed device in the caregiver's facilities.
13. System for providing patient care according to claim 2, characterized in that said obtaining device is a mobile device that remains with said patient upon discharge and for outpatient.
14. System for providing patient care according to claim 2, characterized by the fact that it additionally includes a cost-based routing algorithm that calculates the most effective message route by directly measuring the current network performance during the actual use.
15. System for providing patient care, according to claim 2, characterized by the fact that it additionally includes an alarm routing protocol that generates an alarm priority route based on the location and presence information of both said patient and patient. a caregiver.
16. System for to provide care of patient, in wake up with claim 2, featured by the fact in that a caregiver can silence or reduce the volume of one alarm audible for all the devices assigned to said patient. 17. System for to provide care of patient, in
according to claim 2, characterized by the fact that it additionally includes a central message exchange
5. System for providing patient care, according to claim 2, characterized by the fact that said at least one collection device is coupled
[6]
6 / Ί reliable that establishes an encrypted link once per device between the exchange and each message transmitter and receiver.
18. System for providing patient care, according to claim 17, characterized by the fact that said central message exchange accumulates non-urgent messages that must be sent periodically.
19. System for providing patient care according to claim 17, characterized in that said message transmitter is configured to send each message only once and said central message exchange is configured to duplicate and send each message to multiple recipients based on a list of signatures included in a header of said message.
20. Method for providing patient care characterized by the fact that it comprises the following steps:
The. provide a patient care system that comprises:
i. at least one capture device configured to detect and report at least one patient's physiological parameter;
ii. at least one retrieval device coupled to said at least one retrieval device, said retrieval device receiving electronic patient data from said at least one retrieval device and includes memory capable of storing said patient data ;
iii. at least one network device coupled to said at least one retrieval device, the
6. System for providing patient care according to claim 2, characterized in that said at least one pickup device is coupled to said at least one pickup device by means of a wireless connection.
System for providing patient care according to claim 2, characterized in that said at least one pickup device and said at least one pickup device can be connected to the network via a 3G connection / 4G.
8. System for providing patient care according to claim 2, characterized by the fact that the standard scripting language is Lua.
9. System for providing patient care according to claim 2, characterized by the fact that said presentation device comprises any one of a traditional PC, tablet-type computer, smart phone (smartphone), or wall-mounted display .
10. System for providing patient care according to claim 2, characterized in that said obtaining device also functions as a presentation device.
11. System for providing patient care, according to claim 2, characterized by the fact that said retrieval device duplicates and stores all clinical data for said patient in said memory and functions as a stand-alone monitor in the event of failure in
[7]
7/7 said network device is configured to receive said patient data from said obtaining device;
iv. a network for providing cloud computing, said at least one network device being coupled to said network, and wherein said network includes a database for storing said patient data so that said patient data are accessible through all network devices; and
v. at least one display device coupled to said network, said display device being configured to access said patient data and display said patient data in a graphical user interface;
B. detecting and reporting said at least one patient's physiological parameter using said at least one capture device;
ç. transmitting electronic data representative of said at least one physiological parameter to said obtaining device;
d. encrypt said patient data by coding an executable program using a standard scripting language and attach said program to a message that includes said patient data;
and. transmitting said encrypted data to said network device;
f. storing said data on said network using cloud computing;
g. access, decrypt and display said data using said presentation device.
类似技术:
公开号 | 公开日 | 专利标题
AU2013327128B2|2017-02-02|System and method for providing patient care
Thota et al.2018|Centralized fog computing security platform for IoT and cloud in healthcare system
US8694600B2|2014-04-08|Remote monitoring systems for monitoring medical devices via wireless communication networks
JP2010015562A|2010-01-21|Web-based access to clinical record
KR20140105011A|2014-08-29|Remote monitoring systems and methods for medical devices
CN105229653B|2018-07-06|For the application license of the integrated system of Medical Devices
Gomes et al.2017|A comprehensive and scalable middleware for ambient assisted living based on cloud computing and internet of things
Aileni et al.2020|IoMT: A blockchain perspective
Yadav et al.2018|Development and analysis of IoT framework for healthcare application
Lo'ai et al.2018|An integrated cloud based healthcare system
Lloret et al.2016|Providing security and fault tolerance in P2P connections between clouds for mHealth services
US20190121943A1|2019-04-25|Crypto-based ACL for Patient Treatment And Follow-Up Care
Estudillo-Valderrama et al.2014|A distributed approach to alarm management in chronic kidney disease
Li et al.2017|CareNet: Building regulation-compliant home-based healthcare services with software-defined infrastructure
Weider et al.2011|A SOA service governance approach to u-healthcare system with mobility capability
US20190066837A1|2019-02-28|Connectivity infrastructure for a telehealth platform
US20200203025A1|2020-06-25|Connectivity infrastructure for a telehealth platform with third-party web services
Ahmed et al.2018|Virtual Hospitals: Integration of Telemedicine, Healthcare Services, and Cloud Computing
Kliem et al.2016|A reconfigurable middleware for on-demand integration of medical devices
Khayat2018|Healthcare Monitoring System Security Platform Using Software Defined Networking Paradigm
Farzaneh et al.2016|Authentication in health care application using wireless medical sensor network: A survey
Trossen et al.2010|Information-centric pervasive healthcare platforms
Mirembe2006|Design of a secure framework for the implementation of telemedicine, eHealth, and wellness services
Stephen et al.2021|Internet of Things |: The Standard Protocol Suite for Communication Networks
Amusan et al.2018|Development of a Medical Tele-Management System for Post-Discharge Patients of Chronic Diseases in Resource-Constrained Settings
同族专利:
公开号 | 公开日
GB2524663A|2015-09-30|
US20140142963A1|2014-05-22|
CA2887029A1|2014-04-10|
JP2016502693A|2016-01-28|
AU2013327128B2|2017-02-02|
EP2903506A1|2015-08-12|
GB201505047D0|2015-05-06|
MX2015004253A|2015-08-10|
KR20150067289A|2015-06-17|
WO2014055660A1|2014-04-10|
AU2013327128A1|2015-04-23|
IN2015DN02456A|2015-09-04|
EP2903506A4|2017-01-04|
CN104822310A|2015-08-05|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US6868495B1|1996-09-12|2005-03-15|Open Security Solutions, Llc|One-time pad Encryption key Distribution|
JP4729153B2|1999-08-17|2011-07-20|株式会社アドバンテスト|Measuring instrument control adapter, measuring system, measuring instrument control method, and recording medium|
JP2005501576A|2001-05-07|2005-01-20|カーディオセーフ・インターナショナル・アクチェンゲゼルシャフト|Patient monitoring configuration|
CN101057244B|2004-11-12|2016-12-28|皇家飞利浦电子股份有限公司|Armarium and the auto-associating of patient and the real-time method generating patient record|
US7974924B2|2006-07-19|2011-07-05|Mvisum, Inc.|Medical data encryption for communication over a vulnerable system|
RU2470577C2|2006-07-28|2012-12-27|Конинклейке Филипс Электроникс, Н.В.|Automatic transmission and identification of monitoring data with hierarchical infrastructure of key control|
US7930543B2|2006-08-18|2011-04-19|Medtronic, Inc.|Secure telemetric link|
US7907938B2|2006-08-31|2011-03-15|Alcatel-Lucent Usa Inc.|Apparatus and method for data transmission in a wireless communications network|
US7945457B2|2007-04-09|2011-05-17|Siemens Medical Solutions Usa, Inc.|Distributed system for monitoring patient video, audio and medical parameter data|
US20090099480A1|2007-05-24|2009-04-16|Peter Salgo|System and method for patient monitoring|
US8600777B2|2008-08-28|2013-12-03|I.M.D. Soft Ltd.|Monitoring patient conditions|
US9095274B2|2008-08-31|2015-08-04|Empire Technology Development Llc|Real time medical data analysis system|
US20100324936A1|2009-04-22|2010-12-23|Suresh-Kumar Venkata Vishnubhatla|Pharmacy management and administration with bedside real-time medical event data collection|
WO2010126797A1|2009-04-29|2010-11-04|Onemednet Corporation|Methods, systems, and devices for managing medical images and records|
US8405502B2|2009-06-10|2013-03-26|Qualcomm Incorporated|Identification and connectivity gateway wristband for hospital and medical applications|
CN201708829U|2010-07-02|2011-01-12|海南义利达高新技术实业有限公司|Medical online monitoring system|
US8615413B2|2010-08-13|2013-12-24|John Henry McKee|Integrated electronic patient health care and billing coordination system|
US9717412B2|2010-11-05|2017-08-01|Gary And Mary West Health Institute|Wireless fetal monitoring system|
US8688827B2|2011-02-10|2014-04-01|Xvd Technology Holdings Limited|Overlay network|
CN102184312B|2011-03-15|2013-07-31|温州医学院眼视光研究院|Internet-of-things based medical management monitoring system|
CN102567624A|2011-12-07|2012-07-11|南京毗邻医疗科技有限公司|Individual intelligent medical service system on basis of diagnosis and treatment templates and illness state templates|US20080221930A1|2007-03-09|2008-09-11|Spacelabs Medical, Inc.|Health data collection tool|
US9604020B2|2009-10-16|2017-03-28|Spacelabs Healthcare Llc|Integrated, extendable anesthesia system|
WO2011046636A1|2009-10-16|2011-04-21|Spacelabs Healthcare, Llc|Light enhanced flow tube|
WO2011119512A1|2010-03-21|2011-09-29|Spacelabs Healthcare, Llc|Multi-display bedside monitoring system|
WO2012068567A1|2010-11-19|2012-05-24|Spacelabs Healthcare, Llc|Dual serial bus interface|
US9629566B2|2011-03-11|2017-04-25|Spacelabs Healthcare Llc|Methods and systems to determine multi-parameter managed alarm hierarchy during patient monitoring|
US9507642B2|2012-12-04|2016-11-29|Xerox Corporation|Method and systems for sub-allocating computational resources|
US10987026B2|2013-05-30|2021-04-27|Spacelabs Healthcare Llc|Capnography module with automatic switching between mainstream and sidestream monitoring|
US9304761B2|2013-06-12|2016-04-05|Nuesoft Technologies, Inc.|System and method for collaborative programming of data entry workflows between system developers, end users, and third party developers|
US9467450B2|2013-08-21|2016-10-11|Medtronic, Inc.|Data driven schema for patient data exchange system|
US9962485B2|2013-12-30|2018-05-08|Cerner Innovation, Inc.|Automatically disassociating medical devices from patients|
US11132173B1|2014-02-20|2021-09-28|Amazon Technologies, Inc.|Network scheduling of stimulus-based actions|
WO2015143238A1|2014-03-19|2015-09-24|IntelaTrak, Inc.|Information management system and method|
WO2015175578A1|2014-05-12|2015-11-19|Michael Shen|Directing treatment of cardiovascular events by non-specialty caregivers|
USD745167S1|2014-05-26|2015-12-08|Shenzhen Mindray Bio-Medical Electronic Co., Ltd.|Telemetry monitor|
CN104000562A|2014-06-09|2014-08-27|深圳市中兴移动通信有限公司|Health reminding system, health reminding method and health reminding device|
WO2015192129A2|2014-06-13|2015-12-17|Hallwachs Joachim H|System and method for automated deployment and operation of remote measurement and process control solutions|
US20160006793A1|2014-07-04|2016-01-07|Boe Technology Group Co., Ltd.|Osd subject file obtaining and providing method and device, updating system|
US9538959B2|2014-08-03|2017-01-10|Morpheus, Llc|System and method for human monitoring|
DE102014113137A1|2014-09-11|2016-03-17|Nogs Gmbh|Communication between network nodes using scripts|
WO2016070127A1|2014-10-30|2016-05-06|Be-Bound Inc.|Asynchronous application data access system and method|
US10909312B1|2014-12-05|2021-02-02|MEI Research, Ltd.|Configuration and deployment of extensible templates|
DE102015102942A1|2015-03-02|2016-09-08|Matthias Mauser|Method and device for monitoring persons in a stationary facility|
EP3273844A1|2015-03-27|2018-01-31|Koninklijke Philips N.V.|Multiple independent audio spheres for patient monitor|
US11259758B2|2015-03-30|2022-03-01|Avaya, Inc.|Enhanced communication with an application service provider based on medical telemetry collected by a user device|
US20160321415A1|2015-04-29|2016-11-03|Patrick Leonard|System for understanding health-related communications between patients and providers|
US20180018966A1|2015-04-29|2018-01-18|Listen.MD, Inc.|System for understanding health-related communications between patients and providers|
CN107548548B|2015-05-12|2021-09-14|德克斯康公司|Distributed system architecture for continuous glucose monitoring|
US10185513B1|2015-06-05|2019-01-22|Life365, Inc.|Device configured for dynamic software change|
US20170011191A1|2015-07-08|2017-01-12|General Electric Company|Portable device communicating with patient monitoring device|
US9727697B1|2016-04-19|2017-08-08|Honeywell International Inc.|System and approach for integration of parameters from wearable cloud connected access control devices|
US11116403B2|2016-08-16|2021-09-14|Koninklijke Philips N.V.|Method, apparatus and system for tailoring at least one subsequent communication to a user|
CN106394021B|2016-08-29|2019-02-22|合肥菲力姆科技有限公司|Medical film on-demand printing control device|
US10555258B2|2017-03-13|2020-02-04|At&T Intellectual Property I, L.P.|User-centric ecosystem for heterogeneous connected devices|
CN107147638A|2017-05-06|2017-09-08|深圳市前海安测信息技术有限公司|The medical data Transmission system and method for dynamic encryption|
CN109119169A|2017-06-26|2019-01-01|深圳市理邦精密仪器股份有限公司|The display methods and system of monitoring data|
US10957445B2|2017-10-05|2021-03-23|Hill-Rom Services, Inc.|Caregiver and staff information system|
US11020003B2|2017-11-07|2021-06-01|Foneclay, Inc.|Patient monitoring and communication system|
US20190206570A1|2018-01-03|2019-07-04|Talis Clinical LLC|Remote View Playback Tool|
US20190340246A1|2018-05-02|2019-11-07|Language Scientific, Inc.|Systems and methods for producing reliable translation in near real-time|
US10264122B1|2018-05-31|2019-04-16|RapdiDeploy, Inc.|Emergency data gateway device|
US11200987B2|2020-04-10|2021-12-14|Ix Innovation Llc|Virtual telemedicine mechanism|
法律状态:
2018-11-21| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]|
2019-12-24| B15I| Others concerning applications: loss of priority|Free format text: PERDA DA PRIORIDADE US 61/709,883, DE 04/10/2012, POR AUSENCIA DE CUMPRIMENTO DA EXIGENCIA PUBLICADA NA RPI NO 2538, DE 27/08/2019. |
2020-08-18| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]|
2020-12-08| B11B| Dismissal acc. art. 36, par 1 of ipl - no reply within 90 days to fullfil the necessary requirements|
2021-10-13| B350| Update of information on the portal [chapter 15.35 patent gazette]|
优先权:
申请号 | 申请日 | 专利标题
US201261709883P| true| 2012-10-04|2012-10-04|
PCT/US2013/063087|WO2014055660A1|2012-10-04|2013-10-02|System and method for providing patient care|
[返回顶部]