System and method for secure relayed communications from an implantable medical device
First Claim
1. A communication device, comprising:
- a wireless network digital communication transceiver, configured to communicate with another wireless digital communication transceiver through a multi-hop mesh network comprising at least one untrusted intermediate node, according to a multi-hop mesh networking communication protocol;
an external interface, configured to at least one of receive information from a sensor, and to generate a control signal for an output device; and
at least one automated processor, configured to;
receive an identification of a remote server through the wireless network digital communication transceiver, the identification being automatically securely and reliably transmitted from an authenticated source through the at least one untrusted intermediate node;
updating the identification of the remote server, after receipt of the identification using secure and reliable communications through the at least one untrusted intermediate node;
check the remote server against a remotely-hosted certificate revocation list, using secure and reliable communications through the at least one untrusted intermediate node;
perform a secure and reliable key exchange with the remote server if a certificate of the remote server is not on the certificate revocation list, through the at least one untrusted intermediate node, secure from interception key information by the at least one untrusted intermediate node; and
establish an encrypted communication channel based on the secure and reliable key exchange with the remote server by communications through both the wireless network digital communication transceiver and the at least one untrusted intermediate node; and
communicate information between the encrypted communication channel and the external interface secure from interception and secure from undetected message modification by the at least one untrusted intermediate node.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for supporting encrypted communications with a medical device, such as an implantable device, through a relay device to a remote server, and may employ cloud computing technologies. An implantable medical device is generally constrained to employ a low power transceiver, which supports short distance digital communications. A relay device, such as a smartphone or WiFi access point, acts as a conduit for the communications to the internet or other network, which need not be private or secure. The medical device supports encrypted secure communications, such as a virtual private network technology. The medical device negotiates a secure channel through a smartphone or router, for example, which provides application support for the communication, but may be isolated from the content.
1411 Citations
20 Claims
-
1. A communication device, comprising:
-
a wireless network digital communication transceiver, configured to communicate with another wireless digital communication transceiver through a multi-hop mesh network comprising at least one untrusted intermediate node, according to a multi-hop mesh networking communication protocol; an external interface, configured to at least one of receive information from a sensor, and to generate a control signal for an output device; and at least one automated processor, configured to; receive an identification of a remote server through the wireless network digital communication transceiver, the identification being automatically securely and reliably transmitted from an authenticated source through the at least one untrusted intermediate node; updating the identification of the remote server, after receipt of the identification using secure and reliable communications through the at least one untrusted intermediate node; check the remote server against a remotely-hosted certificate revocation list, using secure and reliable communications through the at least one untrusted intermediate node; perform a secure and reliable key exchange with the remote server if a certificate of the remote server is not on the certificate revocation list, through the at least one untrusted intermediate node, secure from interception key information by the at least one untrusted intermediate node; and establish an encrypted communication channel based on the secure and reliable key exchange with the remote server by communications through both the wireless network digital communication transceiver and the at least one untrusted intermediate node; and communicate information between the encrypted communication channel and the external interface secure from interception and secure from undetected message modification by the at least one untrusted intermediate node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A communication method, for controlling a communication device comprising:
-
a wireless network digital communication transceiver communicating with another wireless digital communication transceiver through a multi-hop mesh network comprising at least one untrusted intermediate node, according to a multi-hop mesh networking communication protocol; an external interface for at least one of receiving information from a sensor, and generating a control signal for an output device; and at least one automated processor, the method comprising; checking an identification of a remote endpoint for communications against a certificate revocation list; performing a key exchange with the identified remote endpoint, if the identified remote endpoint is not the on the certificate revocation list, through the at least one untrusted intermediate node; establishing an encrypted communication channel based on the key exchange with the remote endpoint by communications through the wireless network digital communication transceiver and the at least one untrusted intermediate node; and communicating information between the encrypted communication channel and the external interface, the receipt of identification, the check against the certificate revocation list, and the communicated information each using communications secure from undetected message modification by the at least one untrusted intermediate node, and the key exchange, and the communicated information each being secure from interception of key information by the at least one untrusted intermediate node. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A non-transitory computer readable medium storing instructions for control of at least one automated processor of a communication device comprising a wireless network digital communication transceiver communicating with another wireless digital communication transceiver through a multi-hop mesh network comprising at least one untrusted intermediate node, according to a multi-hop mesh networking communication protocol, and an external interface at least one of receiving information from a sensor, and generating a control signal for an output device,
the instructions comprising: -
instructions for checking an identification of a remote endpoint for communications against a certificate revocation list; instructions for performing a key exchange with the identified remote endpoint, if the identity of the remote endpoint is not on the certificate revocation list, through the at least one untrusted intermediate node; instructions for establishing an encrypted communication channel based on the key exchange with the remote endpoint by communications through the wireless network digital communication transceiver and the at least one untrusted intermediate node; and instructions for communicating information between the encrypted communication channel and the external interface, wherein the instructions for the receipt of identification, the instructions for the check against the certificate revocation list, and the instructions for the communicating of information each define communications secure from undetected message modification by the at least one untrusted intermediate node, and wherein the instructions for performing the key exchange, and the instructions for communicating of information each define communications secure from interception of key information by the at least one untrusted intermediate node. - View Dependent Claims (20)
-
Specification