System and method for communicating over a network with a medical device
First Claim
Patent Images
1. A system, comprising:
- a medical system operative to monitor a patient and comprises at least one medical device; and
a computing system embedded in the medical system, said computing system operative to receive commands over a network from a node external to the medical system, and operative to respond to at least some of said commands by generating, and sending over said network, email messages that include data obtained from monitoring the patient;
wherein three layers of ASCII based security based measures are used to communicate over the network;
the first layer relating to cryptographic hash functions;
the second level relating to data blocking and stuffing;
the third level relating to private-key stream ciphering.
1 Assignment
0 Petitions
Accused Products
Abstract
A medical device is provided that performs a requested action. The requested action may be communicated, for example, to the medical device via email messages. After performing the requested action, a response that is dependent upon the requested action is generated. The generated response is then sent on a network from the medical device as an email message.
229 Citations
23 Claims
-
1. A system, comprising:
-
a medical system operative to monitor a patient and comprises at least one medical device; and a computing system embedded in the medical system, said computing system operative to receive commands over a network from a node external to the medical system, and operative to respond to at least some of said commands by generating, and sending over said network, email messages that include data obtained from monitoring the patient; wherein three layers of ASCII based security based measures are used to communicate over the network;
the first layer relating to cryptographic hash functions;
the second level relating to data blocking and stuffing;
the third level relating to private-key stream ciphering. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method performed by a medical device, the method comprising:
by execution of instructions by the medical device; performing a requested action; generating a response dependent upon the requested action; and sending the generated response on a network from the medical device as an email message; wherein three layers of ASCII based security based measures are used to communicate over the network;
the first layer relating to cryptographic hash functions;
the second level relating to data blocking and stuffing;
the third level relating to private-key stream ciphering.- View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
16. A computer-implemented method of communicating with a medical device over a network, the method comprising:
-
receiving over the network from an email server, by the medical device, a request to perform an action; and performing, by the medical device, the requested action; wherein the request is received as an email message, and the medical device comprises computer hardware; and wherein three layers of ASCII based security based measures are used to communicate over the network;
the first layer relating to cryptographic hash functions;
the second level relating to data blocking and stuffing;
the third level relating to private-key stream ciphering. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A server system configured to communicate with a medical system over a network, the server system comprising:
-
a data storage system configured to store medical data received from the medical system, the medical system comprising at least one medical device; and a server programmed via executable instructions to; send an email request message over the network to an email server, the request message requesting the medical system to perform an action; receive a response from the email server dependent upon the requested action, the response including medical data collected by the medical system; and store the medical data in the data storage system; wherein the response is received as an email message and the server comprises computer hardware; and wherein three layers of ASCII based security based measures are used to communicate over the network;
the first layer relating to cryptographic hash functions;
the second level relating to data blocking and stuffing;
the third level relating to private-key stream ciphering.
-
Specification