SYSTEMS, DEVICES, AND METHODS FOR AUTHENTICATION IN AN ANALYTE MONITORING ENVIRONMENT
First Claim
Patent Images
1. A method of authentication in an in vivo analyte monitoring system, comprising:
- receiving, by a reader device, an identifier from a sensor control device over a local wireless communication path, wherein the sensor control device comprises a sensor and analyte monitoring circuitry, and wherein the sensor is adapted to be inserted into a body of a user;
sending the identifier from the reader device over an internet to a trusted computer system having a stored registration database; and
receiving, by the reader device, an authentication result from the trusted computer system over the internet, wherein the authentication result indicates whether the sensor control device is or is not authorized to operate with the reader device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, devices, and methods are provided that allow the authentication of devices within analyte monitoring systems. The analyte monitoring systems can be in vivo systems and can include a sensor control device with a sensor and accompanying circuitry, as well as a reader device for communicating with the sensor control device. The analyte monitoring systems can interface with a trusted computer system located at a remote site. Numerous techniques of authentication are disclosed that can enable the detection of counterfeit components, such as a counterfeit sensor control device.
-
Citations
20 Claims
-
1. A method of authentication in an in vivo analyte monitoring system, comprising:
-
receiving, by a reader device, an identifier from a sensor control device over a local wireless communication path, wherein the sensor control device comprises a sensor and analyte monitoring circuitry, and wherein the sensor is adapted to be inserted into a body of a user; sending the identifier from the reader device over an internet to a trusted computer system having a stored registration database; and receiving, by the reader device, an authentication result from the trusted computer system over the internet, wherein the authentication result indicates whether the sensor control device is or is not authorized to operate with the reader device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification