US20160302210A1 - Communication hub and repeaters - Google Patents
Communication hub and repeaters Download PDFInfo
- Publication number
- US20160302210A1 US20160302210A1 US14/961,735 US201514961735A US2016302210A1 US 20160302210 A1 US20160302210 A1 US 20160302210A1 US 201514961735 A US201514961735 A US 201514961735A US 2016302210 A1 US2016302210 A1 US 2016302210A1
- Authority
- US
- United States
- Prior art keywords
- data
- communication data
- communication
- source device
- hub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- H04W72/085—
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S1/00—Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmitters; Receivers co-operating therewith
- G01S1/02—Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmitters; Receivers co-operating therewith using radio waves
- G01S1/68—Marker, boundary, call-sign, or like beacons transmitting signals not carrying directional information
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/0205—Details
- G01S5/0226—Transmitters
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/08—Position of single direction-finder fixed by determining direction of a plurality of spaced sources of known location
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/14—Determining absolute distances from a plurality of spaced points of known location
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H04W72/10—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/54—Allocation or scheduling criteria for wireless resources based on quality criteria
- H04W72/542—Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/56—Allocation or scheduling criteria for wireless resources based on priority criteria
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/12—Access restriction or access information delivery, e.g. discovery data delivery using downlink control channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
Definitions
- Asset management systems may be systems used to manage the entire or part of the lifecycle of an asset.
- An entity may identify assets as objects of value to the entity.
- Assets may be tangible objects, such as buildings, hardware, devices, etc., or may be intangible objects such as software, information, intellectual property, etc.
- Asset management systems may help an entity design, deploy, operate, maintain, track, upgrade, and/or dispose of assets.
- an entity may use an asset tracking system to identify, track the movement of, and/or manage the entity's assets.
- FIG. 1A illustrates a communication flow of asset and management information in a medical management system (MMS) according to various embodiments.
- MMS medical management system
- FIG. 1B illustrates an asset management system, according to one embodiment.
- FIG. 2 illustrates a method of analyzing and re-transmitting communication data, according to one embodiment.
- FIG. 3 illustrates a method of delaying the re-transmitting of communication data, according to one embodiment.
- FIG. 4 illustrates a method of delaying the re-transmitting of communication data, according to another embodiment.
- FIG. 5 illustrates a method of transmitting a response in view of the communication data, according to one embodiment.
- FIG. 6 illustrates a method of authorizing a source device in view of indication the source device is within a specified distance, according to one embodiment.
- FIG. 7 illustrates a method of authorizing a source device in view of a device density threshold, according to one embodiment.
- FIG. 8 illustrates a method of authorizing a source device in view of indication the source device is predefined as an approved device, according to one embodiment.
- FIG. 9 illustrates a method of determining whether to re-transmit the communication data in view of a specified level of corrupted data, according to one embodiment.
- FIG. 10 illustrates a block diagram of a machine, according to one embodiment.
- a communication network such as an enterprise network for a large-scale enterprise, may provide numerous connectivity and management challenges.
- new communication networks may be installed without or limited benefit of leveraging existing communication networks.
- many environments use secure networks and do not allow access by third parties.
- the third party may need a separate network to communicate the third-party information.
- an asset management system may be used to track and manage the assets of an enterprise. Without access to the enterprise's networks, communication of asset management information may be difficult.
- the nodes of a communication network may be numerous, disparate, and/or transmit data using different wireless and wired communication protocols.
- Data from numerous and disparate nodes may need to be aggregated, managed, analyzed, transformed, and/or re-transmitted. Often the data may need to be re-transmitted to a server to perform operations, such as computationally intensive analysis.
- a wired connection to a server such as an off-site server, may not be available in some environments.
- a wireless communication such as a cellular communication, may be used to re-transmit data to the server. Low data transfer rates and the cost of data transmission over cellular may be prohibitive.
- the present disclosure addresses the above-mentioned and other deficiencies by using a communication hub to receive communication data from a plurality of communication channels, authorize a source device having transmitted the communication data, determine whether to re-transmit the communication data to a destination device based on one or more factors, transform the format of the communication data, and re-transmit the communication data.
- the communication hub may be used in an asset management system and provide a separate network that runs in parallel with an enterprise's network without using or intruding on the enterprise's network.
- Communication data may refer to information communicated in an information signal to and/or from a communication hub.
- the communication data may be digital data and/or analog data.
- communication data may be in the form of a data packet.
- a data packet may refer to a formatted unit of data containing in the form of one or more identifiers.
- the sequencing information, the length of the payload, source and destination addresses, etc. may each be considered identifiers.
- the user data of the data packet may include one or more identifiers.
- the user data may include company identifiers, source device identifiers, approved device identifiers, signal strength identifiers (e.g., received signal strength indicator (RSSI), property identifiers, parameter identifiers, parameter value identifiers, identifiers of other manufacturing specific data (e.g., manufacturer identifier), wireless broadcast identifiers (e.g., advertisement indicator identifier), location identifiers, beacon identifiers (e.g., a major identifier (ID) and/or minor identifiers (ID)), battery identifiers, etc.
- RSSI received signal strength indicator
- ID major identifier
- ID major identifier
- ID minor identifiers
- battery identifiers etc. Examples of identifiers are provided for purposes of illustration, rather than limitation. It should be appreciated that different identifiers may be available.
- the communication data includes data received from devices, such an asset or asset tag device, at a communication hub and/or data re-transmitted from the communication hub.
- a communication channel may refer to a transmission medium (or a path provided by a transmission medium) used to convey an information signal, such as communication data.
- the communication channel may include software and/or hardware capable of sending and/or receiving the information signal in a particular communication protocol.
- Each communication channel may be a transmission medium for one or more different communication protocols (wired and/or wireless communication protocols).
- a communication channel may be a wired communication channel or a wireless communication channel.
- a wired communication channel (e.g., Ethernet) may be used to transmit and/or receive communication data.
- a wireless communication channel may be used to transmit and/or receive communication data conforming to a wireless communication protocol.
- the wireless communication protocol may conform to a low energy wireless personal area network (PAN) standard and/or a wireless local area network (WLAN) standard.
- PAN personal area network
- WLAN wireless local area network
- a communication channel may include a network interface device, such as a dongle using the Bluetooth® technology, developed by the Bluetooth Special Interest Group (SIG).
- the Bluetooth® dongle may receive and/or transmit an information signal conforming to the Bluetooth® standard.
- the communication channel may also have additional hardware and software capable of processing the wired or wireless signals.
- the network interface device can operate using other personal area network (PAN) technologies, such as the Zigbee® technology.
- PAN personal area network
- a communication hub receives data from a source device over a first channel.
- the communication hub may receive communication data from an asset, such as a medical cart communicating via a wireless communication protocol, such as a protocol using the Wi-Fi® technology.
- a wireless communication protocol such as a protocol using the Wi-Fi® technology.
- other wireless communication protocols or wireless technologies may be used, including other wireless local area network (WLAN) technologies, PAN technologies, or the like.
- the communication hub may authorize the source device to use the communication hub to send communication data to a server computer system based on an indication that the source device is within specified distance from the hub.
- the communication hub may examine communication data for identifiers, such as a received signal strength indicator (RSSI), to determine whether the asset is within a specified distance.
- RSSI received signal strength indicator
- the communication hub may authorize the source device in view of an indication the source device is predefined as an approved device. For example, the communication hub may examine communication data for identifiers, such as a company identifier, and compare the one or more identifiers to identifiers from predefined approved devices. The communication hub may determine to not re-transmit the communication data if the source device is not authorized or the communication data is corrupted. The communication may determine to re-transmit the communication data to a destination device, such as a server, over another wireless communication channel, such as a cellular channel. The data may be transformed from one format to another format.
- identifiers such as a company identifier
- the communication hub may determine to not re-transmit the communication data if the source device is not authorized or the communication data is corrupted.
- the communication may determine to re-transmit the communication data to a destination device, such as a server, over another wireless communication channel, such as a cellular channel.
- the data may be transformed from one format to another
- That communication data may be transformed from a format compliant with a low energy wireless PAN standard (e.g., Bluetooth® format) to an encrypted format compatible with the cellular standard.
- the communication hub may retransmit the re-formatted communication data to the server via the cellular channel of a cellular network, for example.
- the communication hub may authorize the source device in view of a device density threshold associated with the communication hub.
- the device density threshold may be a threshold number of devices able to connect to the communication hub at a particular time.
- the device density threshold may be defined by the communication hub and/or a system administrator.
- a communication hub may analyze the communication data to determine a signal strength indicator, such as the RSSI.
- the communication hub may sort source devices according to the RSSI.
- the communication hub may select a number of source devices, up to the device density threshold, with the highest RSSI.
- the communication hub may filter out source devices with weaker signals and that may be located closer to other communication hubs.
- the communication hug may send a rejection message to the device.
- the rejection message may indicate that to the device that the hub has rejected the device and/or indicate the device may communicate with another hub (such as a hub that is a distance closer to the device).
- communication hub may analyze the data to determine the type of data. For example, the communication data may examine the communication data to determine whether the data contains patient critical information and/or routine information. The communication hub may determine a priority of the communication data based on the type of data, For example, patient critical data may be given a high priority while routine information may be given a low priority. The communication hub may delay the re-transmission of the communication data when the priority is below a specified threshold. For example, communication hub may delay low priority data and not delay high priority data.
- the communication hub may analyze a data size of the communication data. For example, communication hub may determine the data size of the communication data is 500 kilobytes. The communication hub may delay the re-transmission of the communication data when then data size is greater than a specified threshold, for example 1 Gigabyte. In some examples, delaying the communication data may be used to efficiently transmit data in low data rate environments and/or achieve cost efficiency when data transmission rates fluctuate over time (e.g., over the time of day). Delaying the communication data may be further described with respect to FIG. 3 .
- the communication hub may determine whether a response is to be transmitted in view of the communication data.
- a response may be transmitted to an external server.
- a response may be transmitted to the hospital system.
- the communication hub may analyze the communication data to determine a type of data.
- the communication hub may examine the communication data to find identifiers indicating type of data. Using the identifiers, the communication hub may determine whether the type of data is predefined to trigger a response and transmit a response if it is determined that the type of data is to trigger a response.
- a patient may be monitored by an electrocardiogram (EKG) device (e.g., asset). When the patient's heart stops beating the EKG may send a signal to the communication hub reporting that no pulse is detected.
- the communication hub may identify that the signal from an EKG.
- the communication hub may transmit a response, such as an alert to the nursing station to alert the staff that the patient in room X has gone into cardiac arrest.
- EKG electrocardiogram
- communication hubs being used in hospital environments are provided for purposes of illustration, rather than limitation. It should be appreciated that communication hubs, as well as other cooperating devices, may be used in different environments such as disaster relief operations, retail stores, and/or product warehouses.
- FIG. 1A illustrates a communication flow of asset and management information in a medical management system (MMS) 100 according to various embodiments, in addition to aspects of a real-time location system (RTLS) that works with the MMS 100 .
- the communication flow may originate in a location such as a room 110 , and may include beacon devices 102 and data sent from an asset 104 (e.g., a medical cart is shown).
- the asset 104 may be coupled with an asset tag device 105 A or may include an asset tag manager 105 B that runs on the asset 104 to determine a location of the asset 104 .
- An asset tag device 105 A may be an electronic device coupled to an asset or integrated into the asset and used as part of an asset-tracking system (ATS), such as a real-time locating system (RTLS).
- An asset tag device may be a small (e.g., size of a U.S. quarter), resource-constrained (i.e., low processing power, limited memory, and/or limited battery life) device used to transmit data, such as a beacon identifier, to a more powerful central device.
- the central device such as a server computer system (also referred to as server), may make a determination of location of an asset tag device and/or asset in view of the transmitted data.
- An asset tag device may be a wireless device and transmit data using a wireless communication protocol.
- An asset tag device may be a low-power device and/or be battery powered.
- An asset tag device may use a rechargeable battery, such as a lithium-ion rechargeable battery.
- An asset tag device may be coupled to or integrated into an asset in a variety of ways.
- an asset tag device may be a discrete hardware device that is physically fixed to a hard asset.
- An asset tag device may be a hardware device that is integrated into the hardware of an asset.
- a third party device such as a mobile phone, may be converted into an asset tag device by loading the asset tag software (e.g., asset tag manager) and leveraging the hardware of the third party device to perform the functions of the asset tag device.
- the data may flow through a communication hub 106 (or other network device) and arrive at a server 108 (such as a medical database and/or an authentication server).
- the data also, or alternatively, flows through a communications network 115 , where the communications network 115 may include the communication hub 106 .
- the data flow may also flow in the reverse direction from the server 108 and/or the communication hub 106 to the asset 104 , e.g., in response to a request for medical information or records on a patient.
- the data may include asset and/or management data, medical information, patient information, authentication data, and other personal and security-related information and the like.
- the MMS 100 may include multiple assets 104 .
- the beacon devices 102 may be associated with fixed locations and may provide a location identifier (ID) for asset tag device 105 A (or 105 B) to detect, such that the asset tag device 105 A (or 105 B) may determine a current location, which the assets may transmit through the communication hub 106 to the server 108 .
- the beacon device 102 may identify or be associated with any type of location, including a room, a hallway, a common or conference room, and/or a grid location.
- the beacon device 102 may include a circuit board within a housing, the circuit board containing a processor (or discrete logic or controller or microcontroller), memory (non-volatile and/or volatile memory), a battery (or other power source), and a transceiver primarily for transmitting.
- the beacon device 102 may be programmed to transmit a beacon signal containing data to identify the beacon device to other devices, such as to the asset tag device 105 A or to the asset tag manager 105 B running on a host machine of the asset 104 .
- the beacon device 102 may communicate with the asset tag device 105 A and/or the asset tag manager 105 B through a personal area network (PAN), such as, e.g., with Bluetooth® technology developed by the Bluetooth Special Interest Group (SIG).
- PAN personal area network
- the PAN may be created with Bluetooth® low energy (BLE) technology (also developed by Bluetooth SIG) that may be used to track the assets 104 .
- BLE-based beacon may be associated with an asset in the MMS 100 to communicate asset and/or management information of the asset.
- the beacon device 102 may be an active or passive radio frequency identification (RFID) tag that transmits a unique RFID number.
- RFID radio frequency identification
- the RFID number or identifier may be correlated at the server 108 with a certain location such as may have been pre-programmed at the server 108 or within a distributed MMS 100 .
- the asset tag device 105 A and/or the asset tag manager 105 B may be or include an interrogator that interrogates the RFID tag of the beacon device 102 to determine the RFID number or identifier of the beacon device 102 .
- the asset tag device 105 A and/or the asset tag manger 105 B may receive the actively transmitted RFID number of identifier as transmitted by the beacon device 102 .
- the asset tag device 105 A may be implemented in hardware and include a circuit board within a housing as depicted in FIG. 2 , the circuit board containing a processor, memory (non-volatile and/or volatile memory), a battery, and a transceiver.
- the transceiver may be a third-party integrated circuit, such as an RF module, e.g., a Bluetooth® chip, an RFID interrogator and/or receiver or the like.
- the asset tag device may be performed by processing logic comprising hardware, software, firmware or any combination thereof.
- the asset tag manager 105 B may be a software program (including instructions) that may utilize a processor, memory, transceiver and the like of a host machine of the asset 104 , such as the medical cart (all-in-one (AOI)), any medical device in which the asset tag is integrated, or any device when used in non-medical applications.
- AOI all-in-one
- the asset tag device 105 A and/or the assets 104 may be tracked with a real-time location system (RTLS) that determines the location of whatever is tagged (or otherwise tracked by identifying a location of beacon devices 102 in proximity of the assets 104 ).
- the tracked entities may include an asset or equipment, a MSM and/or patient(s), for example.
- the communications hub 106 may be wired or wireless and may direct data between the assets and to (and from) the assets 104 and the server 108 .
- the beacon device may broadcast a location ID to any device located within the room 110 .
- the asset 104 may determine its location.
- the asset 104 may measure a received signal strength indication (RSSI) from the beacon device 102 to determine a location of the device within a radius or area for which the beacon device is designated.
- RSSI received signal strength indication
- the asset 104 may use the received location ID from the beacon device 102 to determine that the asset 104 is located in an identified room.
- the asset 104 may also use the RSSI to determine a location of the asset 104 within the room, such as within a threshold of location accuracy (e.g., within X distance from the beacon device 102 ).
- a room may include multiple beacon devices 102 .
- the asset 104 may receive multiple location IDs from the multiple beacon devices 102 and use the RSSI of the different location IDs to determine the location of the asset 104 within the room.
- the asset 104 may use the RSSI of the different location IDs to triangulate the location of the asset 104 in the room.
- the beacon device 102 may be located at different locations.
- the beacon device 102 may be located in a hallway, in a lobby, in a stairwell, in a room, in a parking lot, and so forth.
- the asset tag device 105 A (or asset tag manager 105 B) determines its location
- the asset tag device 105 A (or asset tag manager 105 B) may communicate asset information (such as location information, asset management information, and so forth) to a closest communication hub 106 .
- the asset tag device 105 A and/or the asset tag manager 105 B can append the location ID to the asset information and communicate the appended asset information to the communication hub 106 .
- the communication hub 106 can analyze the appended information to determine the location of the asset 104 using the location ID and the asset information.
- the communication hub 106 can access a database that defines the locations of different beacon devices with different location IDs.
- the communication hub 106 can compare the received location ID from the asset tag device 105 A and/or the asset tag manager 105 B with the location IDs in the database to find a matching pair of location IDs and associate the defined location of the location ID with the asset 104 .
- the communication hub 106 may be a device (such as a communication plate) mounted to a wall.
- the communication hub 106 may be integrated into a construction of a location.
- the communication hub 106 may be integrated into a floor, ceiling, or wall of a facility, for example.
- the communication hub 106 may be software on the server 108 .
- the communication hub 106 may be located at a different location than the room 110 (such as a central location on the floor where the device is located or a central location in the building where the device is located).
- the communication hub 106 may relay the information to a server 108 .
- the communication hub 106 may receive information from different devices.
- the communication hub 106 may aggregate the data and send the aggregated asset information to the server 108 .
- One advantage of the asset tag device 105 A (or asset tag manager 105 B) determining its location and sending the asset management information to the communication hub 106 may be to enable the beacon device 102 to be small and low energy. For example, because the beacon device 102 broadcasts the location ID, the beacon device 102 may consume a small amount of power (such as a 1-2 mAh per day) and may be powered by a small battery for an extended period of time.
- the asset tag device 105 A may have a separate power supply that may be recharged more easily than the beacon device 102 .
- asset tag device 105 A (or asset tag manager 105 B) communicating the asset information may be that the asset the asset tag device 105 A may select the information of the asset tag device 105 A to be communicated to the communication hub 106 and communicate the information in real-time and directly to the communication hub 106 to reduce communication interference from multiple devices.
- the MMS 100 may track the assets 104 in real-time or substantially real-time.
- the asset 104 may continuously communicate asset and management information to the communication hub 106 .
- the MMS 100 may track the assets on a periodic basis.
- the asset 104 may communicate asset and management information to the communication hub 106 on a periodic basis.
- the communication hub 106 may transmit a request to the asset 104 to communicate the asset and management information.
- the asset 104 may communicate the asset and management information to the communication hub 106 .
- the MMS may include an implementation system to map a facility where assets may be managed, e.g., determine a schematic or layout of the facility.
- the implementation system may include software to determine a schematic or layout of the facility, including rooms, stairway objects, hallway objects, and so forth, based on a digital plan and/or a computer-assisted built plan within the software.
- a user may use a scanner, such as a three-dimensional (3D) scanner and walk around the facility collecting layout information, where the software may use the information from the scanner to determine the layout of the facility.
- 3D three-dimensional
- the software may associate the beacon device 102 and/or the communication hub 106 may be associated with the layout of the facility.
- the beacon devices 102 and/or the communication hubs 106 in a facility may have a unique ID.
- the implementation software may receive input from an input device (such as a mouse, a keyboard, a stylus, a touch screen, and so forth) associating the different unique IDs with locations on the facility layout.
- locations in the facility layout may have unique IDs associated with the location.
- an assistance device such as a scanner or a communication device
- the assistance device may scan or communicate with the beacon device 102 and/or the communication hub 106
- the beacon device 102 and/or the communication hub 106 may be associated with the location ID.
- the assistance device may scan the location for the beacon devices 102 and/or the communication hubs 106 (such as by using by using Bluetooth® scanning) and associate the beacon device 102 and/or the communication hub 106 scanner in the location with a location ID.
- a user may walk into a room with a first location ID, use a tablet with Bluetooth® technology to scan the room for the beacon devices 102 and/or the communication hubs 106 , and the software may associate the beacon devices 102 and/or the communication hubs 106 detected by the tablet with the first location ID.
- the user may repeat this process for multiple locations in the facility.
- the beacon devices 102 may have a predefined number or identifier (ID).
- ID a predefined number or identifier
- the user may use a graphical user interface (GUI) to select which beacon device is located in each room, hallway, conference room and the like.
- GUI graphical user interface
- An advantage of the implementation of the MMS 100 may be to enable integration of the MMS into a preexisting facility, e.g., the MMS may be installed in a preexisting facility and the implementation system may map the preexisting facility.
- Another advantage of the MMS may be that the installation and implementation of the MMS may enable quick and efficient installation as the MMS may be installed and configured for a facility without invasively installing an asset management system.
- Another advantage of the MMS may be that the system may avoid interference by other devices by using the implementation system to determine optimal locations of the beacon devices 102 and/or the communication hubs 106 .
- the asset management system can be used in other contexts, as described with respect to FIG. 1B .
- FIG. 1B illustrates an asset management system 100 , according to one embodiment.
- the asset management system 100 may be at least partially deployed in area 110 .
- Area 110 can include beacon device 102 and beacon device 103 .
- the beacon devices 102 and 103 can be fixed to opposite corners of the room.
- Beacon devices 102 and 103 may transmit wireless broadcast 122 and 123 , respectively, using a wireless communication protocol compatible with asset tag device 105 A.
- the asset tag device 105 A may be coupled to asset 104 .
- Asset 104 may be any asset as described herein.
- the asset tag device 105 A may be integrated into the hospital cart or other medical device, military equipment, business resource, or the like.
- An asset tag device 105 A may be coupled to or integrated into an asset 104 in a variety of ways.
- an asset tag device 105 A may be a discrete hardware device that is physically fixed to a hard asset.
- An asset tag device 105 A may be a hardware device that is integrated into the hardware of an asset.
- a third party device such as a mobile phone, may be converted into an asset tag device 105 A by loading the asset tag software (e.g., asset tag manager 105 B) and leveraging the hardware of the third party device to perform the functions of the asset tag.
- Asset tag may refer to asset tag device 105 A and/or asset tag manager 105 B.
- the asset tag device 105 A includes an asset tag manager 105 B, that is, the processing device of the asset tag device 105 A executes instructions corresponding to the asset tag manger 105 B to perform the functionality describe herein. In other embodiments, the asset tag manager 105 B executes on a processing device of a host device, such as the AIO, or other medical asset. In some embodiments, asset tag manager 105 B may be a software implementation of asset tag device 105 A used to perform one or more functions of the asset tag device 105 A. Asset tag manager 105 B may be executed by a processing device (not shown).
- Area 110 may refer a physical space delineated by the signal coverage of one or more beacon devices. It should be appreciated that an area 110 may be defined by software and correspond to the physical location of the beacon device and associated wireless broadcast. For example, a large room may have multiple areas. Two beacon devices 102 and 103 located at one side of a room may define an area, while two other beacon devices at the other side of a room may define another area. Software may correlate the location of the beacon devices 102 and 103 and signal coverage of the beacon devices 102 and 103 to define an area, such as area 110 . Using two or more beacon devices to define an area may allow an asset management system to improve an accuracy of location determinations of assets.
- beacon device 102 and 103 are illustrated in FIG. 1B as defining area 110 , the number of beacon devices is for purposes of illustration, rather than limitation.
- An area may be defined by one or more beacon devices and may depend on a variety of factors such as available resources or system requirements.
- a broadcast may refer to the transmission of a signal containing data in for example, a data packet.
- a wireless broadcast may be a type of broadcast and may refer to the transmission of a signal containing data without an electrical conductor, for example the transmission of a signal through the air.
- Any device such as beacon device 102 , beacon device 103 , and asset tag device 105 A may transmit a broadcast.
- Any device, such as asset 104 , asset tag device 105 A, asset tag manager 105 B, and/or server 108 may scan and receive a broadcast.
- An asset such as asset 104
- asset 104 may refer to an object of value to the entity.
- Asset 104 may be tangible objects, such as buildings, hardware, devices, etc., or may be intangible objects such as software, information, intellectual property, etc.
- Soft assets may include intangible objects as well as human beings.
- Hard assets may include tangible assets.
- Asset 104 may also broadcast data to hub 106 , as illustrated by wireless broadcast 124 .
- An asset tag device such as asset tag device 105 A, may be an electronic device coupled to an asset, such as asset 104 , and used as part of an asset-tracking system (ATS), such as a real-time locating system (RTLS).
- ATS asset-tracking system
- RTLS real-time locating system
- the asset tag device 105 A may be a small (e.g., size of a U.S. quarter), resource-constrained (i.e., low processing power, limited memory, and/or limited battery life) device used to transmit data, such as a beacon identifier, to a more powerful central device.
- the central device such as a server computer system (also referred to as server 108 ), may make a determination of a location of asset tag device 105 A and/or asset 104 in view of the transmitted data.
- the asset tag device 105 A may be a wireless device and transmit data using a wireless communication protocol.
- the asset tag device 105 A may be a low-power consuming device and/or be battery powered.
- the asset tag device 105 A may use a rechargeable battery, such as a lithium-ion rechargeable battery.
- the asset tag device 105 A may be coupled to or integrated into asset 104 in a variety of ways.
- asset tag device 105 A may be a discrete hardware device that is physically fixed to a hard asset.
- the asset tag device 105 A may be a hardware device that is integrated into the hardware of asset 104 .
- a third party device such as a mobile phone, may be converted into an asset tag device 105 A by loading the asset tag software (e.g., asset tag manager 105 B) and leveraging the hardware of the third party device to perform the functions of the asset tag device 105 A.
- asset tag software e.g., asset tag manager 105 B
- Asset tag device 105 A may be coupled to asset 104 .
- the asset tag device 105 A may communicate with at least the beacon devices 102 and/or 103 , hub 106 , sever 108 , repeater 114 and/or asset 104 .
- the asset tag device 105 A may be coupled to an individual, such as medical personnel in a hospital environment (also referred to as facility).
- the asset tag device 105 A may be attached to an employee identification badge or attached to or integrated into an electronic device, such as a wristband or watch.
- an asset tag manager 105 B may be software integrated into a third party device, such as a mobile phone or tablet. The asset tag manager 105 B may leverage at least part of the hardware and/or software resources of the third party device to perform the functions of an asset tag.
- an asset tag manager 105 B may be compatible with any device, software platform, and/or operating system.
- a beacon device (also referred to as a location identification beacon device), such as beacon device 102 and/or beacon device 103 , may be an electronic device fixed to a known location (and/or marking a fixed location) and used to transmit data in for example, a data packet.
- the data may include a fixed parameter, such as a beacon identifier, which may be used to determine a relative location of a device, the device having received the beacon device's data packet, to the beacon device 102 and/or 103 .
- beacon devices 102 and 103 may be fixed to different corners of a room (e.g., area 101 ), each transmitting a wireless broadcast (e.g., wireless broadcast 122 from beacon device 102 and wireless broadcast 123 from beacon device 103 ).
- Each of the wireless broadcasts may contain a different beacon identifier representative of the different beacon devices.
- the wireless broadcasts 122 and 123 may be received by an asset tag device 105 A.
- the asset tag device 105 A may send the beacon identifiers and the asset tag identifier to a server 108 through hub 106 .
- beacon device 102 and/or 103 may be a small, resource-constrained (i.e., low processing power, limited memory, and/or limited battery life) device used to transmit data, such as a beacon identifier, to asset tag device 105 A.
- Beacon device 102 and/or 103 may be a wireless device transmitting data packets using a wireless communication protocol compatible with asset tag device 105 A.
- the beacon device 102 and/or 103 may be a low-power device and/or battery powered.
- the beacon identifier may be a unique value, such as a number, assigned to the beacon device by a developer and/or used to identify a beacon device.
- the major identifier (2 bytes) and/or minor identifier (2 bytes) may be used as a beacon identifier.
- the major identifier and/or the minor identifier may be a serialized number.
- the beacon identifier may be distinct from the universally unique identifier (UUID).
- beacon device 102 and/or 103 may be an iBeacon®, or other device, such as an active radio frequency identification device (RFID), a passive RFID, an infrared device, a motion sensor, a sonar or sonic device, and/or a near field communication (NFC) device.
- RFID active radio frequency identification
- NFC near field communication
- Bluetooth Low Energy® also referred to as Bluetooth Smart®
- BLE Bluetooth Low Energy®
- Bluetooth Smart® wireless communication protocol conforming to the Bluetooth Low Energy®
- Bluetooth® wireless standard also referred to as Classic Bluetooth®
- ZigBee® wireless standard ZigBee® wireless standard
- Wi-Fi® wireless standard Wi-Fi® wireless standard
- UWB ultra-wideband
- Bluetooth® shall refer to at least Bluetooth® Low Energy and Classic Bluetooth®, unless otherwise noted.
- the wireless communication protocol may a short range wireless communication protocol compatible with short range wireless communications (e.g., approximately 100 m or less) in a short range wireless network.
- the asset tag device 105 A may broadcast wireless broadcast 125 to hub 106 .
- the asset tag device 105 A may broadcast a wireless broadcast to repeater 114 , which in turn broadcasts the wireless broadcast 126 to hub 106 .
- the wireless broadcast 125 may be in a wireless communication protocol, such as Bluetooth®.
- Asset 104 may also broadcast wireless broadcast 124 to hub 106 in the same or different wireless communication protocol.
- the beacon devices 102 and/or 103 (or any other device) may broadcast data to hub 106 .
- Hub 106 may refer to an electronic device that connects communication data from one electronic device to another electronic.
- Hub 106 may include functionality of a conventional network hub, as well as additional functionality.
- hub 106 may receive, filter, analyze, modify, and/or transmit data to and from multiple devices using wireless and/or wired communication and/or a combination thereof.
- Hub 106 may transmit received data to multiple ports, similar to a conventional network hub.
- Hub 106 may perform functions of a network switch and may receive, process, and forward data only to a destination device that needs to receive it (rather than broadcasting the data to each of its ports).
- Hub 106 may also function as a wireless access point (AP) and allow wireless devices to connect using a wireless communication protocol (e.g., Wi-Fi®).
- Hub 106 may provide a hotspot, a physical location offering internet access, over a wireless local area network (WLAN) through the use of another device such as a router to connect to an internet service provider.
- hub 106 may perform access control (e.g., authentication) to control which devices have access to the network.
- Hub 106 may also function as a router to forward data packets between multiple computer networks.
- Hub 106 may perform software defined networking (SDN) functions.
- SDN software defined networking
- hub 106 may function similar to a Dynamic Host Configuration Protocol (DHCP) server that may assign an internet protocol (IP) address to a device (e.g., authenticated device), attempting to use a network, such as a Wi-Fi® network associated with hub 106 .
- IP internet protocol
- An internet protocol (IP) table may be configured to route data from devices within a range of IP addresses to one location and/or through a particular channel and route data from devices within another range of IP addressed to another location and/or through another channel.
- hub 106 may transmit data to computer systems in a local area network (LAN).
- LAN local area network
- Hub module 112 may be a software implementation of hub 106 and perform some or all the functions of hub 106 .
- hub 106 may have one or more communication channels.
- Hub 106 may include corresponding hardware and/or software for each communication channel.
- hub 106 may include several wireless communication channels conforming to a wireless communication protocol of a low energy PAN standard, such as a Bluetooth® channel (i.e., a channel compliant with the Bluetooth® standard able to transmit and/or receive signals), several wireless communication channels conforming to a wireless communication protocol of a WLAN standard, such as a Wi-Fi® protocol and/or wireless communication channels conforming to a different wireless communication protocol, such as a cellular channel (i.e., a channel compliant with a cellular standard able to transmit and/or receive cellular signals).
- Hub 106 may also include wired channels, such as an Ethernet channel.
- Hub 106 may have an interface for each channel capable of transmitting and/or receiving in the communication protocol associated with the channel.
- hub 106 may include one or more separate antennas for each channel and/or one or more integrated antennas.
- Hub 106 may include one or more antennas to receive a wireless communication protocol of a low energy wireless PAN standard, such as an antenna capable to receive Bluetooth® signals, one or more antennas to receive a wireless communication protocol of a WLAN standard, such as an antenna to receive Wi-Fi® signals, a wired Ethernet port, and/or a cellular antenna (e.g., multiple-input and multiple-output (MIMO) antenna).
- a channel may be implemented by a hardware dongle compatible with the particular standard (e.g., a Bluetooth® dongle).
- hub 106 may receive data from multiple source devices such as asset 104 , asset tag device 105 A, repeater 114 , beacon device 102 and 103 , or other devices such as third-party mobile devices.
- a source device may refer to an electronic device at which the received data (e.g., communication data) originated or was created.
- an asset tag device 105 A may send a wireless broadcast to repeater 114 , which in turn transmits the wireless broadcast to hub 106 .
- the asset tag device 105 A may be considered a source device because data in the wireless broadcast originated from the asset tag device 105 A.
- a source device may be the electronic device from which the data was received (e.g., repeater 114 in the previous example).
- Hub 106 may further filter and transform the data, and transmit the modified data through a cellular network and/or wired network (e.g., local area network (LAN)).
- a cellular network e.g., mobile network
- a cellular network may be a wireless network distributed over areas (e.g., cells), each served by at least one fixed-location transceiver (e.g., cell site or base station). Each cell may use a different set of frequencies from neighboring cells to avoid interference and provide bandwidth within each cell.
- the cellular network may use any mobile telecommunications technology such as third generation (e.g., 3GPP LTE), fourth generation (e.g., WiMAX, 4G LTE), and fifth generation (5G) of mobile telecommunications technology.
- third generation e.g., 3GPP LTE
- fourth generation e.g., WiMAX, 4G LTE
- 5G fifth generation
- a cellular communication protocol may be a long range wireless communication protocol used for long range wireless communications in a long-range cellular network.
- hub 106 may receive data in data packets conforming to a wireless communication protocol of a low energy PAN standard (e.g., BLE® protocol) and/or a wireless communication protocol of a WLAN standard (e.g., Wi-Fi® data format protocol) and re-transmit data to the server 108 using cellular communication protocols on a cellular network.
- a wireless communication protocol of a low energy PAN standard e.g., BLE® protocol
- a wireless communication protocol of a WLAN standard e.g., Wi-Fi® data format protocol
- hub 106 may receive data in data packets conforming to the PAN standard and/or WLAN standard and re-transmit data to another local server (not shown) using a wired Ethernet cable (e.g., in a LAN).
- hub 106 may be located at a selected location within a facility, such as on each floor of a hospital environment (e.g., facility). Hub 106 may be located at select locations in the hospital environment so as to provide communication coverage throughout the environment. In one example, hub 106 may be located in high traffic areas or along routes or paths that the asset 104 may frequently move along. In another example, the locations can be predefined locations selected during the construction of an environment. In another example, the locations can be selected to provide a desired coverage area, such as a wing of a hospital environment.
- hub 106 may provide a secure private network for devices (such as server 108 , asset tag device 105 A, or asset 104 ) to communicate with the hub 106 .
- hub 106 may provide a secure wireless area network (WLAN), secure PAN, or Private Wide Area Network (PWAN) to communicate with a device, such as an asset tag device 105 A and/or asset 104 .
- WLAN secure wireless area network
- PWAN Private Wide Area Network
- hub 106 may be a gateway or access point for the asset 104 and/or asset tag device 105 A to access information stored on the server 108 .
- hub 106 maybe a network switch enabling asset 104 to access a secure server, such as electronic medical records (EMRs), hospital information system (HIS) information, or an active directory of a hospital server.
- EMRs electronic medical records
- HIS hospital information system
- the devices in the WLAN may use the Wi-Fi® technology and IEEE 802.11 standards defined by the Wi-Fi Alliance. Alternatively, the devices in the WLAN may use other technologies and standards.
- the devices in the PAN or WPAN may use the Bluetooth® technology and IEEE 802.15 standards defined by the Bluetooth Special Interest Group. Alternatively, the devices in the secure PAN may use other technologies and standards.
- the WAN or PWAN can be used to transmit data over long distances and between different LANs, WLANs, metropolitan area networks (MANs), or other localized computer networking architectures.
- hub 106 may prepare data for transmission to another device, such as server 108 .
- hub 106 may reformat the data that is received into another format.
- the format may refer to the organization of data (e.g., a data format) according to a predefined specification.
- the hub 106 may prepare the data by compressing data in a compression format, securing data in a secure format (e.g., encryption format), changing the data for example, to be compliant with a communication protocol (e.g., Wi-Fi® to Bluetooth®, Bluetooth® v. 1.0 to Bluetooth® v. 2.0), removing data, and/or adding data.
- a communication protocol e.g., Wi-Fi® to Bluetooth®, Bluetooth® v. 1.0 to Bluetooth® v. 2.0
- hub 106 may include a network compliance device configured to run a Health Level 7 (HL7) engine.
- HL7 may refer to a set of international standards for transfer of clinical and administrative data between software applications used by various healthcare providers.
- HL7 may provide a framework for the exchange, integration, sharing and retrieval of data used by healthcare providers.
- the HL7 engine may format information to an HL7 electronic medical record (EMR) standard.
- EMR electronic medical record
- HL7 may provide a framework for the exchange, integration, sharing and retrieval of electronic health information.
- Hub 106 may use a HL7 formatting engine to aggregate data received, format the data to an HL7 standard, and communicate the formatted data to server 108 .
- Asset management system 100 may also include repeaters, such as repeater 114 .
- a repeater such as repeater 114 , may refer to an electronic device that receives a signal and retransmits the signal, often at a higher power.
- a repeater 114 may receive data from asset tag device 105 A and relay the data to hub 106 or another repeater (not shown).
- a repeater 114 may also act as a bridge to receive data formatted in one wireless communication protocol (e.g., BLE®) and re-transmit in another wireless communication protocol (e.g., Wi-Fi®).
- the repeater may be used by a device to tether (e.g., using Bluetooth® and/or Wi-Fi®) to the Internet.
- Repeater 114 may be configured as a network of repeaters, such as nodes in a piconet.
- a piconet may be a wireless personal area network (WPAN) formed by a device (e.g., Bluetooth® compatible device) serving as a master in the piconet and one or more other devices (e.g., other Bluetooth® compatible devices) serving as slaves.
- WPAN wireless personal area network
- a hospital may have multiple repeaters located at different locations in the hospital.
- the repeaters such as repeater 114 , may receive data from asset tag device 105 A, asset 104 , beacon device 102 , and/or beacon device 103 and relay the data to hub 106 .
- Repeater 114 may relay the data directly to the hub 106 or indirectly relay the data to hub 106 via one or more other repeaters.
- each floor or department of a hospital environment may include a hub, such as hub 106 to receive information from one or more repeaters that provide wireless coverage of the floor.
- Repeater 114 may be powered by a batter, powered by an electrical outlet, or powered by any other manner.
- Repeater 114 may be a small form factor device, such as the size of human child's fist.
- Server 108 may be a computing device such as server computer, a desktop computer, or a laptop computer, or a portable computing device such as, but not limited to, mobile telephones, personal digital assistants (PDAs), portable media players, netbooks, tablet computers, portable gaming consoles, portable televisions, electronic book readers, and the like.
- PDAs personal digital assistants
- FIG. 1B a single server (e.g., server 108 ) is illustrated in FIG. 1B , any number of servers may be present in an AMS.
- Server 108 may be a server computer system that is part of an online infrastructure system.
- Examples of an online infrastructure include a cloud computing platform that may allow multiple users from multiple client systems to access different components or computer resources of the cloud computing platform.
- the online infrastructure may provide physical and/or virtual resources, such as access to services, servers, or other such resources, to client systems.
- Examples of services (or functionality) provided by the online infrastructure may include, but are not limited to, access to data stored on storage devices, provisioning of virtual machines, software services, physical servers, etc.
- Server 108 may store, process, and or analyze data received from hub 106 , as well as beacon device 102 and 103 , asset 104 , and asset tag device 105 A.
- the server 108 may use the beacon identifiers and asset tag identifiers to determine the real-time location of an asset (e.g., real-time location system (RTLS)).
- RTLS real-time location system
- server 108 may determine the location of asset 104 from the beacon identifier of beacon device 102 and/or beacon device 103 , and the asset tag identifier. The server 108 may also record a time stamp indicating when the beacon identifiers were received by asset tag device 105 A. Server 108 may store data associating the location of a beacon device in an environment to a specific beacon identifier. Additionally, sever 108 may store additional data mapping an asset tag identifier to an asset. Accordingly, the beacon identifier and asset tag identifier may be correlated, using the mapping data, to a location in an environment. The location may be the area 110 and/or include a location within area 110 where the asset tag device 105 A and associated asset 104 are located (e.g., the middle of area 110 ).
- the server 108 may include an application programming interface (API), such as a representational state transfer (REST) application program interface (API) interface, to enable applications to retrieve and present data, such as asset data and/or management data, to users.
- API application programming interface
- an application may include a user interface with a map of a facility. The application may access the asset data and/or management data and determine the locations of one or more assets in the facility. The application may display the locations of the asset to a user.
- the application may query or search the asset data and/or management data to determine user requested data, such as location information of an asset, usage information of an asset, and so forth.
- server 108 may receive battery data indicating battery usage information and/or battery life information for an asset 104 , asset tag device 105 A, and/or beacon devices 102 and 103 . Server 108 may use the battery data to determine a trend in the amount of time a battery of the device may be used, an estimated remaining battery life, battery errors, when to replace a battery, and so forth.
- asset tag device 105 A may receive a battery identifier in a wireless broadcast from beacon device 102 and 103 .
- asset tag may include the battery identifier of each beacon device and/or a battery identifier for asset tag device 105 A.
- the battery data, including the battery identifiers may be transmitted to hub 106 .
- a battery identifier may include information such as remaining battery life, battery consumption, and/or battery usage rate of an associated device.
- data such as software updates or patches may be communicated from the server 108 to a hub 106 , asset 104 , asset tag device 105 A, and/or beacon devices 102 and 103 .
- FIG. 2 illustrates a method of analyzing and re-transmitting communication data, according to one embodiment.
- the method 200 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof.
- the method 200 may be performed all or in part by hub module 112 .
- Method 200 begins by a processing device executing the method receives communication data from a source device over a channel of a plurality of wireless channels (block 205 ).
- the communication hub 106 may receive a wireless broadcast 124 from asset 104 .
- the wireless broadcast 124 may be formatted according to a wireless communication protocol conforming to the WLAN standard and may be received by hub 106 at a WLAN channel using a WLAN antenna.
- Method 200 continues to block 210 where processing logic authorizes the source device in view of at least one of an indication that the source device is within a specified distance from hub 106 or an indication that the source device is predefined as an approved device.
- hub 106 may only authorize devices from a specific company, a specific type of device, or devices from an approved set of devices to transmit communication data over hub 106 .
- the communication data itself may be used to determine that the source device is an approved device.
- the communication data may be analyzed (e.g., parsed) to locate identifiers indicating an approved or unapproved device.
- hub 106 may manage authorization using a local database. Additional details of authorization are discussed at least in regards to FIGS. 6, 7, and 8 .
- Method 200 continues to block 215 where processing logic determines whether to re-transmit the communication data to the destination device over a second channel of the plurality of wireless channels.
- the communication data is not re-transmitted when the communication data comprises exceeds a threshold level of corrupted data (such as to render the data unreadable) or the source device is unauthorized.
- the channel over which the communication data is re-transmitted e.g., second channel
- hub 106 may receive the communication data on a WLAN channel and re-transmit on a cellular channel.
- the receiving and re-transmitting channels may be the same channel.
- the re-transmitted communication data may be the same or substantially the same (e.g., a majority of the data) as the communication data received by hub 106 .
- processing logic may determine when the communication data is corrupted data by analyzing the communication data (e.g., user data).
- the communication data can include blood type information of a patient, such as information identifying the blood type of the patient at type “O+”
- the corrupted communication data may erroneously indicate that the patient's blood type is “P”.
- the processing logic of the device may determine that “P” is not a possible blood type the patient and determine that the communication data is corrupted.
- the threshold data corruption level may be when any data is corrupted.
- a specified level of corrupted data may refer to a percentage of data that is deemed corrupted.
- a specified level of corrupted data may refer to specific types of data or data from a specific source device that is deemed corrupted.
- corrupted data may be determined by a checksum, such as a calculated checksum. Additional details of determining data is corrupted is discussed at least in regards to FIG. 9 .
- the processing logic may determine not to re-transmit the communication data. For example, only source devices from a specific company may be allowed to re-transmit data using hub 106 . The processing logic may determine devices not from the specific company are unauthorized and may determine not to re-transmit communication data from the unauthorized devices.
- Method 200 continues to block 220 where processing logic transforms a first format of the communication data to a second format.
- the first format may correspond to the first wireless channel and the second format may correspond to the second wireless channel.
- the first and second format may be different formats corresponding to different channels.
- asset tag device 105 A may broadcast a wireless communication signal containing communication data in a communication protocol conforming to the a wireless communication protocol of a low energy wireless personal area network (PAN) standard (e.g., BLE® standard) which is received by hub 106 on a channel capable of receiving the wireless communication protocol (e.g., BLE® channel).
- PAN personal area network
- the hub 106 may transform the communication data to another format by encrypting the data and/or formatting the communication data to be re-transmitted in a cellular communication protocol using a cellular channel. Transforming the format may include compressing the communication data, securing the communication data, changing the communication protocol of the communication data, removing data from the communication data, and/or adding data to the communication data. It should be noted that transforming the data may be performed by processing logic at any time. In one example, the communication data may be transformed at least in part after the communication data has been determined to be re-transmitted. In another example, the communication data may be transformed at least in part prior to determining the communication data is to be re-transmitted or at any time after receiving the communication data.
- Method 200 continues to block 225 where the processing logic re-transmits the communication data in the second format to the destination device over the second channel.
- the communication data may be re-transmitted to server 108 using a cellular communication protocol (also referred to as format compliant with cellular standard) over a cellular network.
- a cellular communication protocol also referred to as format compliant with cellular standard
- FIG. 3 illustrates a method of delaying the re-transmitting of communication data, according to one embodiment.
- the method 300 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof.
- the method 300 may be performed all or in part by hub module 112 .
- Method 300 begins at block 305 where processing logic executing the method analyzes the communication data to determine a type of data.
- a type of data (also referred to as data type) may refer to data itself (e.g., identifiers of the data).
- the processing logic may parse the communication data to locate one or more identifiers.
- the processing logic may parse the communication data to locate a source device identifier indicating a source device having originated the communication data.
- the source device identifier may be a type of data and/or indicate a type of data.
- source device identifier for an EKG device may itself be a type of data.
- the EKG source device identifier may indicate that the communication data includes a type of data, such as heart information data type.
- the identifiers may be used to identify other data types such as parameters (e.g., blood or heart rate) and/or value of parameters (e.g., O-type blood or 80 beats per minute).
- Data type identifiers may include identifiers, such as a source device identifier, a parameter identifier, a parameter value identifier, etc., or a combination thereof. Examples of data type identifiers are used for purposes of illustration, rather than limitation. It should be appreciated that any number of identifiers may be used to analyze data type.
- Method 300 continues to block 310 where processing logic calculates a priority of the communication data based on the analyzing of block 305 .
- a priority may be a numerical value such as 1 through 10, where 1 indicates the lowest priority and 10 indicates a highest priority.
- a priority may be a priority level such as, low priority, medium priority, high priority, and/or emergency (or critical) priority.
- the priority level may be predetermined for certain data types.
- the priority level may be based on a priority algorithm, such as weighting the source device and certain data types to calculate a priority level of the data. For example, communication data from a source device such as mobile device may be predetermined as a low priority while communication data from an EKG device may be a high priority. In another example, different data types from a source machine may have different priorities. Communication data from an EKG device with normal readings may have a low priority, but communication data from same EKG device with irregular readings may have a high priority. It should be noted that the examples of calculating priority are for purposes of illustration, and not for
- Method 300 continues to block 315 where processing logic delays the re-transmission of the communication data when the priority is below a threshold.
- the specified threshold may be specified by a developer or administrator.
- the threshold may correspond to the priority as discussed above with respect to block 310 .
- the specified threshold may be a numerical value, such as 7, corresponding to the priority scale, such as 1 through 10, as discussed above.
- the specified threshold may be set at greater than equal to high priority.
- the processing logic may delay transmission for communication data with a calculated priority of 7 and above, or high priority and above.
- the amount of delay may be specified by a developer or administrator. The delay may for minutes, hours, days, for example. The delay may be for a period till processing logic determines the communication data may be re-transmitted. The amount of delay may be determined in view of managing transmission data rates and/or cost of transmitting data.
- FIG. 4 illustrates a method of delaying the re-transmitting of communication data, according to another embodiment.
- the method 400 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof.
- the method 400 may be performed all or in part by hub module 112 .
- Method 400 begins at block 405 where processing logic executing the method analyzes the data size of the communication data.
- the data size may be measured in a number of bytes.
- data size may be measured as a number of data packets. Examples of data size are used for purposes of illustration, rather than limitation. It should be appreciated that numerous units of data size may be available.
- processing logic may analyze the data size of the communication data as 500 kilobytes.
- Method 400 continues to block 410 where processing logic may delay the re-transmission of the communication data when the data size is greater than a specified threshold.
- the specified threshold may be specified by a developer or administrator.
- the specified threshold may correspond to the units of data size discussed above. For example, the threshold may be set at 1 gigabyte or 10 k data packets.
- the amount of delay may be specified by a developer or administrator. The delay may for minutes, hours, days, for example. The delay may be for a period till processing logic determines the communication data may be re-transmitted. The amount of delay may be determined in view of managing transmission data rates and/or cost of transmitting data.
- FIG. 5 illustrates a method of transmitting a response in view of the communication data, according to one embodiment.
- the method 500 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof.
- the method 500 may be performed all or in part by hub module 112 .
- Method 500 begins at block 505 where processing logic executing the method analyzes the communication data to determine a type of data.
- Block 505 may be performed in a similar manner as block 305 of method 300 described above with reference to FIG. 3 .
- Method 500 continues to block 510 where processing logic determines whether the data type is predefined to trigger the communication hub to transmit a response.
- processing logic may compare the data type identified in block 505 with predefined data types predefined as having an associated response. If the data type of the communication data matches the predefined data type, processing logic may determine to transmit a response. If the data type of the communication data does not match the predefined data type, processing logic may determine not to transmit a response. Transmitting the response may be in addition to or in lieu of re-transmitting the communication data.
- a developer or administrator may predefine certain data types to trigger a response from the communication hub. The response may be sent to a destination device and/or a device other than the server.
- a response may be any type of information signal containing data.
- the response may be a response to the communication data and include the same information and/or information different from the communication data.
- Method 500 continues to block 515 where processing logic transmits the response when the type of data is determined to trigger the response.
- the communication device may receive communication data from an EKG indicating no heart rate.
- Processing logic may identify the data type indicating no heart rate from an EKG.
- Communication data from an EKG (or specific data from an EKG) may be predefined to trigger the communication hub to transmit a response.
- Processing logic may transmit an alert response to a nearest nursing station to make staff aware of the situation.
- the data may be directed to the internal hospital system if it is a certain data type (such as patient information) and directed to the third party server when it is another data type (such as battery information).
- FIG. 6 illustrates a method of authorizing a source device in view of an indication that a source device is within a specified distance, according to one embodiment.
- the method 600 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof.
- the method 600 may be performed all or in part by hub module 112 .
- Distance may refer to an actual measurable distance (and/or direction) or may refer to a relative distance of one source device from hub 106 relative to the distance of another source device from hub 106 (e.g., one source device is closer to the hub 106 than the other source device).
- the actual distance e.g., any source device within a 10 ft radius
- relative distance 10 closest source devices
- the indication that of the source device is within a specified distance may be signal strength, such as RSSI.
- RSSI may be a measurement of the power present in the received wireless broadcast at a receiving device (e.g., hub 106 ).
- RSSI may serve as an indirect indication of a specific and/or relative distance of a source device from hub 106 .
- Hub 106 may include the functionality (hardware and/or software) to measure the RSSI of wireless broadcasts.
- Method 600 begins at block 605 , where processing logic executing the method analyzes the communication to determine an RSSI. Analyzing the communication data to determine an RSSI may be performed in a similar manner as block 305 of method 300 described above with reference to FIG. 3 and block 505 of method 500 described above with reference to FIG. 5 . In one example, analyzing includes parsing the communication data to locate an RSSI.
- the communication data may have been wirelessly transmitted by the source device. It should be appreciated that a receiving device, such as a hub, may have the functionality to measure the RSSI of the received wireless broadcast. It should also be appreciated the RSSI may be included in the communication data by the receiving device.
- the communication data may include an RSSI identifier indicating an RSSI value of the received wireless broadcast.
- Method 600 continues at block 610 where processing logic compares a received signal strength indicator (RSSI) of the wireless broadcast to an RSSI threshold.
- RSSI received signal strength indicator
- the RSSI threshold may be a numerical threshold.
- the RSSI threshold may be set by an administrator and/or developer. For example, the RSSI threshold may be set to ⁇ 110 dBm, or any other value.
- the RSSI threshold may also include a number of devices having a highest RSSI.
- the RSSI threshold may specify X number of source devices (e.g., 10 devices) having the highest RSSI (e.g., top 10 devices based on RSSI).
- the RSSI threshold may also include a number of devices having a highest RSSI and exceed a numerical RSSI threshold (e.g., the top 10 devices based on RSSI and exceeding the RSSI value of ⁇ 110 dBm).
- received wireless broadcasts with RSSI below the RSSI threshold may be from source devices from outside an area of interest.
- Method 600 continues to block 615 , where processing logic determines the source device is authorized when the RSSI is greater than or equal to the RSSI threshold or unauthorized when the RSSI is less than the RSSI threshold. For example, if the RSSI threshold is set to ⁇ 110 dBm, all source devices with an RSSI exceeding or equal to ⁇ 110 dBm are authorized, while all source devices with an RSSI below ⁇ 110 dBm are unauthorized. In another example, processing logic determines all source devices with RSSI below ⁇ 110 dBm are unauthorized, but determines only the top 10 source devices with the highest RSSI and have an RSSI above or equal to ⁇ 110 dBm are authorized.
- FIG. 7 illustrates a method of authorizing a source device in view of a device density threshold, according to one embodiment.
- the method 700 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof.
- the method 700 may be performed all or in part by hub module 112 .
- authorizing the source device in view of a device density threshold associated with the communication hub may be performed in a similar manner as authorizing the source device in view of an indication the source device is within a specified distance from the hub, and described above with respect to FIG. 6 .
- Device density threshold may refer to the number of devices able to communicate (e.g. send communication data to) with hub 106 at any given instance.
- Device density threshold may be a number of devices, for example 10 devices.
- Device density threshold may refer to a number of devices of one type (e.g., 10 asset tags) and another number of devices of another type (e.g., 5 mobile devices.
- Each channel may have a device density threshold.
- the device density threshold may be specified by the manufactures and based on hardware constraints and/or be an arbitrary number of devices determined for example, by an administrator.
- processing logic may analyze the communication data to determine the RSSI and compare the RSSI to an RSSI threshold.
- the RSSI threshold may be set to the device density threshold (e.g., a number of devices able to communication with hub 106 ) having a highest RSSI.
- the RSSI threshold may specify X number of source devices (e.g., 10 devices) having the highest RSSI (e.g., top 10 devices based on RSSI).
- Processing logic determines the source device is authorized when the RSSI is greater than or equal to the RSSI threshold or unauthorized when the RSSI is less than the RSSI threshold.
- authorizing the source device in view of the device density threshold may be implemented in different ways. For example, hub 106 may choose the first X devices as authorized, X equaling the device density threshold. Additionally, hub 106 may prioritize certain source devices over other source devices when determining which device to authorize in view of the device density threshold.
- FIG. 8 illustrates a method of authorizing a source device in view of indication the source device is predefined as an approved device, according to one embodiment.
- the method 800 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof.
- the method 800 may be performed all or in part by hub module 112 .
- Method 800 begins at block 805 where processing logic performing the method analyzes the communication data to determine a source device identifier.
- Block 805 may be performed in a similar manner as block 305 of method 300 with respect to FIG. 3 and block 505 of method 500 with respect to FIG. 5 , and block 605 of method 600 with respect to FIG. 6 .
- processing logic may parse the communication data for a source device identifier.
- communication data may include multiple identifiers, such as company identifiers, source device identifiers, identifiers of other manufacturing specific data (e.g., manufacturer identifier), etc. Any identifier or a combination of identifiers may be used as a source device identifier.
- the company identifier and/or manufacturing identifier may be used as a source device identifier.
- the source device identifier may include information to determine the source device is not approved, which may or may not be enough information to determine the actual source device.
- Method 800 continues to block 810 where processing logic compares the source device identifier with approved source device identifiers.
- the approved source device identifiers may be identifiers from source devices approved by for example, a developer and/or administrator.
- Method 800 continues to block 815 where processing logic determines the source device is authorized when the source device identifier matches the approved source device identifiers or unauthorized when the source device identifier does not match the approved source device identifiers.
- processing logic may analyze the communication to determine a source device identifier by parsing the communication to look for a company identifier and/or a manufacturing identifier.
- processing logic may determine the communication data is from an unapproved device, and not authorized.
- processing logic may determine that the communication data is from an approved source device, and authorized. It should be appreciated than any identifier or combination of identifiers may be used as an indication that a wireless broadcast is from an approved source device.
- FIG. 9 illustrates a method of determining whether to re-transmit the communication data in view of a specified level of corrupted data, according to one embodiment.
- the method 900 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof.
- the method 900 may be performed all or in part by hub module 112 .
- a specified level of corrupted data may refer data deemed corrupted, such as specific types of data or data from a specific source device.
- Method 900 begins at block 905 where processing logic performing the method analyzes the communication data to determine a source device identifier and a parameter value.
- the analyzing of block 905 may be performed in a similar manner as described in block 305 of method 300 with respect to FIG. 3 , block 505 of method 500 with respect to FIG. 5 , block 605 of method 600 with respect to FIG. 6 , and block 805 of method 800 with respect to FIG. 8 .
- processing logic may analyze the communication data to determine a source device identifier and a parameter value (e.g., parameter value identifier) by parsing the communication data for the source device identifier and the parameter value.
- the parameter value may be a numerical value of a parameter (e.g., parameter identifier). For example, a parameter value of 98° F. may be the parameter value for a temperature parameter.
- the parameter value may be a property of a parameter (e.g., O-type blood for the parameter, blood type).
- Method 900 continues to block 910 where processing logic identifies the source device in view of the source device identifier.
- the source device identifier may indicate that the communication data is from an EKG device.
- Method 900 continues to block 915 where processing logic compares the parameter value to a parameter set predefined for the source device. For example, if the device identifier indicates that the communication data is from a thermometer. An administrator or developer may predefine the parameter set for the thermometer as ranging from 90° F. to 110° F. The parameter set may be numerical, if applicable. The parameter set may be a set of non-numerical values (e.g., blood types, such as O, A, etc.). If the parameter value is within the predefined parameter set, processing logic may determine to re-transmit the communication data. If the parameter value is outside the predefined parameter set, processing logic may determine not to re-transmit the communication data.
- a parameter set predefined for the source device For example, if the device identifier indicates that the communication data is from a thermometer. An administrator or developer may predefine the parameter set for the thermometer as ranging from 90° F. to 110° F. The parameter set may be numerical, if applicable. The parameter set may be
- Method 900 continues to block 920 where processing logic prevents the re-transmission of the communication data when the parameter value is outside the parameter set.
- processing logic may identify the parameter value (i.e., temperature) from the source device (e.g., thermometer) as 200° F., which is outside the parameter set of 90° F. to 110° F. Accordingly, processing logic may prevent the re-transmission of the communication data from the thermometer.
- the source device e.g., thermometer
- FIG. 10 illustrates a diagrammatic representation of a machine in the exemplary form of a computer system 1000 within which a set of instructions for causing the machine to perform any one or more of the methodologies discussed herein, may be executed.
- the machine may be connected (e.g., networked) to other machines in a LAN, an intranet, an extranet, or the Internet.
- the machine may operate in the capacity of a server or a client machine in a client-server network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
- the machine may be a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a server, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
- PC personal computer
- PDA Personal Digital Assistant
- STB set-top box
- WPA Personal Digital Assistant
- a cellular telephone a web appliance
- server a server
- network router switch or bridge
- the exemplary computer system 1000 includes a processing device (processor) 1002 , a main memory 1004 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM), etc.), a static memory 1006 (e.g., flash memory, static random access memory (SRAM), etc.), and a data storage device 1018 , which communicate with each other via a bus 1030 .
- a processing device e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM), etc.
- DRAM dynamic random access memory
- SDRAM synchronous DRAM
- RDRAM Rambus DRAM
- static memory e.g., flash memory, static random access memory (SRAM), etc.
- SRAM static random access memory
- Processing device 1002 represents one or more general-purpose processing devices such as a microprocessor, central processing unit, microcontroller, or the like. More particularly, the processing device 1002 may be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or a processor implementing other instruction sets or processors implementing a combination of instruction sets.
- the processing device 1002 may also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like.
- the processing device 1002 is configured to execute instructions 1026 for performing the operations and steps discussed herein.
- the computer system 1000 may further include a network interface device 1022 .
- the computer system 1000 also may include a video display unit 1008 (e.g., a liquid crystal display (LCD), a cathode ray tube (CRT), or a touch screen), an alphanumeric input device 1010 (e.g., a keyboard), a cursor control device 1014 (e.g., a mouse), and a signal generation device 1016 (e.g., a speaker).
- a video display unit 1008 e.g., a liquid crystal display (LCD), a cathode ray tube (CRT), or a touch screen
- an alphanumeric input device 1010 e.g., a keyboard
- a cursor control device 1014 e.g., a mouse
- a signal generation device 1016 e.g., a speaker
- the data storage device 1018 may include a machine-readable storage medium 1024 on which is stored one or more sets of instructions (e.g., software including hub module 112 ) embodying any one or more of the methodologies or functions described herein.
- the instructions may also reside, completely or at least partially, within the main memory 1004 and/or within the processing device 1002 during execution thereof by the computer system 1000 , the main memory 1004 and the processing device 1002 also constituting computer-readable storage media.
- the instructions may further be transmitted or received over a network 1020 via the network interface device 1034 .
- machine-readable storage medium 1024 is shown in an exemplary implementation to be a single medium, the term “computer-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
- the term “computer-readable storage medium” can also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure.
- the term “computer-readable storage medium” can accordingly be taken to include, but not be limited to, solid-state memories, optical media, and magnetic media.
- the disclosure also relates to an apparatus for performing the operations herein.
- This apparatus may be specially constructed for the required purposes, or it may include a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer.
- a computer program may be stored in a computer readable storage medium, such as, but not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions.
- example or “exemplary” are used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “example” or “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs. Rather, use of the words “example” or “exemplary” is intended to present concepts in a concrete fashion.
- the term “or” is intended to mean an inclusive “or” rather than an exclusive “or”. That is, unless specified otherwise, or clear from context, “X includes A or B” is intended to mean any of the natural inclusive permutations.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Quality & Reliability (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Epidemiology (AREA)
- Operations Research (AREA)
- Medical Informatics (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Biomedical Technology (AREA)
- Position Fixing By Use Of Radio Waves (AREA)
- Medical Treatment And Welfare Office Work (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- This application claims the benefit of U.S. Provisional Application No. 62/146,084 filed on Apr. 10, 2015, the contents of which are hereby incorporated by reference herein.
- Asset management systems may be systems used to manage the entire or part of the lifecycle of an asset. An entity may identify assets as objects of value to the entity. Assets may be tangible objects, such as buildings, hardware, devices, etc., or may be intangible objects such as software, information, intellectual property, etc. Asset management systems may help an entity design, deploy, operate, maintain, track, upgrade, and/or dispose of assets. As part of asset management, an entity may use an asset tracking system to identify, track the movement of, and/or manage the entity's assets.
- The present disclosure is illustrated by way of example, and not by limitation, in the figure of the accompanying drawings.
-
FIG. 1A illustrates a communication flow of asset and management information in a medical management system (MMS) according to various embodiments. -
FIG. 1B illustrates an asset management system, according to one embodiment. -
FIG. 2 illustrates a method of analyzing and re-transmitting communication data, according to one embodiment. -
FIG. 3 illustrates a method of delaying the re-transmitting of communication data, according to one embodiment. -
FIG. 4 illustrates a method of delaying the re-transmitting of communication data, according to another embodiment. -
FIG. 5 illustrates a method of transmitting a response in view of the communication data, according to one embodiment. -
FIG. 6 illustrates a method of authorizing a source device in view of indication the source device is within a specified distance, according to one embodiment. -
FIG. 7 illustrates a method of authorizing a source device in view of a device density threshold, according to one embodiment. -
FIG. 8 illustrates a method of authorizing a source device in view of indication the source device is predefined as an approved device, according to one embodiment. -
FIG. 9 illustrates a method of determining whether to re-transmit the communication data in view of a specified level of corrupted data, according to one embodiment. -
FIG. 10 illustrates a block diagram of a machine, according to one embodiment. - A communication network, such as an enterprise network for a large-scale enterprise, may provide numerous connectivity and management challenges. In many environments, such as a hospital environment, a military environment, or large corporate environment, new communication networks may be installed without or limited benefit of leveraging existing communication networks. For example, many environments use secure networks and do not allow access by third parties. In such as case, the third party may need a separate network to communicate the third-party information. In another example, an asset management system may be used to track and manage the assets of an enterprise. Without access to the enterprise's networks, communication of asset management information may be difficult. The nodes of a communication network may be numerous, disparate, and/or transmit data using different wireless and wired communication protocols. Data from numerous and disparate nodes may need to be aggregated, managed, analyzed, transformed, and/or re-transmitted. Often the data may need to be re-transmitted to a server to perform operations, such as computationally intensive analysis. A wired connection to a server, such as an off-site server, may not be available in some environments. A wireless communication, such as a cellular communication, may be used to re-transmit data to the server. Low data transfer rates and the cost of data transmission over cellular may be prohibitive.
- The present disclosure addresses the above-mentioned and other deficiencies by using a communication hub to receive communication data from a plurality of communication channels, authorize a source device having transmitted the communication data, determine whether to re-transmit the communication data to a destination device based on one or more factors, transform the format of the communication data, and re-transmit the communication data. The communication hub may be used in an asset management system and provide a separate network that runs in parallel with an enterprise's network without using or intruding on the enterprise's network.
- Communication data (also referred to as data) may refer to information communicated in an information signal to and/or from a communication hub. The communication data may be digital data and/or analog data. In one example, communication data may be in the form of a data packet. A data packet may refer to a formatted unit of data containing in the form of one or more identifiers. For example, (i.e., data the network uses to deliver the user data) the sequencing information, the length of the payload, source and destination addresses, etc., may each be considered identifiers. In another example, the user data of the data packet may include one or more identifiers. The user data may include company identifiers, source device identifiers, approved device identifiers, signal strength identifiers (e.g., received signal strength indicator (RSSI), property identifiers, parameter identifiers, parameter value identifiers, identifiers of other manufacturing specific data (e.g., manufacturer identifier), wireless broadcast identifiers (e.g., advertisement indicator identifier), location identifiers, beacon identifiers (e.g., a major identifier (ID) and/or minor identifiers (ID)), battery identifiers, etc. Examples of identifiers are provided for purposes of illustration, rather than limitation. It should be appreciated that different identifiers may be available. It should be appreciated that some or all of identifiers in a data packet may be prescribed by the particular communication protocol used to transmit the communication data. In one embodiment, the communication data includes data received from devices, such an asset or asset tag device, at a communication hub and/or data re-transmitted from the communication hub.
- A communication channel may refer to a transmission medium (or a path provided by a transmission medium) used to convey an information signal, such as communication data. The communication channel may include software and/or hardware capable of sending and/or receiving the information signal in a particular communication protocol. Each communication channel may be a transmission medium for one or more different communication protocols (wired and/or wireless communication protocols). A communication channel may be a wired communication channel or a wireless communication channel. A wired communication channel (e.g., Ethernet) may be used to transmit and/or receive communication data. A wireless communication channel may be used to transmit and/or receive communication data conforming to a wireless communication protocol. The wireless communication protocol may conform to a low energy wireless personal area network (PAN) standard and/or a wireless local area network (WLAN) standard. For example, a communication channel may include a network interface device, such as a dongle using the Bluetooth® technology, developed by the Bluetooth Special Interest Group (SIG). The Bluetooth® dongle may receive and/or transmit an information signal conforming to the Bluetooth® standard. The communication channel may also have additional hardware and software capable of processing the wired or wireless signals. Alternatively, the network interface device can operate using other personal area network (PAN) technologies, such as the Zigbee® technology.
- In one embodiment, a communication hub receives data from a source device over a first channel. For example, the communication hub may receive communication data from an asset, such as a medical cart communicating via a wireless communication protocol, such as a protocol using the Wi-Fi® technology. Alternatively, other wireless communication protocols or wireless technologies may be used, including other wireless local area network (WLAN) technologies, PAN technologies, or the like. The communication hub may authorize the source device to use the communication hub to send communication data to a server computer system based on an indication that the source device is within specified distance from the hub. For example, the communication hub may examine communication data for identifiers, such as a received signal strength indicator (RSSI), to determine whether the asset is within a specified distance. The communication hub may authorize the source device in view of an indication the source device is predefined as an approved device. For example, the communication hub may examine communication data for identifiers, such as a company identifier, and compare the one or more identifiers to identifiers from predefined approved devices. The communication hub may determine to not re-transmit the communication data if the source device is not authorized or the communication data is corrupted. The communication may determine to re-transmit the communication data to a destination device, such as a server, over another wireless communication channel, such as a cellular channel. The data may be transformed from one format to another format. For example, that communication data may be transformed from a format compliant with a low energy wireless PAN standard (e.g., Bluetooth® format) to an encrypted format compatible with the cellular standard. The communication hub may retransmit the re-formatted communication data to the server via the cellular channel of a cellular network, for example.
- In another embodiment, the communication hub may authorize the source device in view of a device density threshold associated with the communication hub. The device density threshold may be a threshold number of devices able to connect to the communication hub at a particular time. The device density threshold may be defined by the communication hub and/or a system administrator. A communication hub may analyze the communication data to determine a signal strength indicator, such as the RSSI. The communication hub may sort source devices according to the RSSI. The communication hub may select a number of source devices, up to the device density threshold, with the highest RSSI. The communication hub may filter out source devices with weaker signals and that may be located closer to other communication hubs. In one embodiment, the communication hug may send a rejection message to the device. The rejection message may indicate that to the device that the hub has rejected the device and/or indicate the device may communicate with another hub (such as a hub that is a distance closer to the device).
- In another embodiment, prior to re-transmitting the communication data, communication hub may analyze the data to determine the type of data. For example, the communication data may examine the communication data to determine whether the data contains patient critical information and/or routine information. The communication hub may determine a priority of the communication data based on the type of data, For example, patient critical data may be given a high priority while routine information may be given a low priority. The communication hub may delay the re-transmission of the communication data when the priority is below a specified threshold. For example, communication hub may delay low priority data and not delay high priority data.
- In still another embodiment, the communication hub may analyze a data size of the communication data. For example, communication hub may determine the data size of the communication data is 500 kilobytes. The communication hub may delay the re-transmission of the communication data when then data size is greater than a specified threshold, for example 1 Gigabyte. In some examples, delaying the communication data may be used to efficiently transmit data in low data rate environments and/or achieve cost efficiency when data transmission rates fluctuate over time (e.g., over the time of day). Delaying the communication data may be further described with respect to
FIG. 3 . - In another embodiment, the communication hub may determine whether a response is to be transmitted in view of the communication data. In one embodiment, a response may be transmitted to an external server. In another embodiment, a response may be transmitted to the hospital system. The communication hub may analyze the communication data to determine a type of data. The communication hub may examine the communication data to find identifiers indicating type of data. Using the identifiers, the communication hub may determine whether the type of data is predefined to trigger a response and transmit a response if it is determined that the type of data is to trigger a response. For example, a patient may be monitored by an electrocardiogram (EKG) device (e.g., asset). When the patient's heart stops beating the EKG may send a signal to the communication hub reporting that no pulse is detected. The communication hub may identify that the signal from an EKG. In response, the communication hub may transmit a response, such as an alert to the nursing station to alert the staff that the patient in room X has gone into cardiac arrest.
- It should be noted that examples provided of communication hubs being used in hospital environments are provided for purposes of illustration, rather than limitation. It should be appreciated that communication hubs, as well as other cooperating devices, may be used in different environments such as disaster relief operations, retail stores, and/or product warehouses.
-
FIG. 1A illustrates a communication flow of asset and management information in a medical management system (MMS) 100 according to various embodiments, in addition to aspects of a real-time location system (RTLS) that works with theMMS 100. The communication flow may originate in a location such as aroom 110, and may includebeacon devices 102 and data sent from an asset 104 (e.g., a medical cart is shown). Theasset 104 may be coupled with anasset tag device 105A or may include anasset tag manager 105B that runs on theasset 104 to determine a location of theasset 104. Anasset tag device 105A may be an electronic device coupled to an asset or integrated into the asset and used as part of an asset-tracking system (ATS), such as a real-time locating system (RTLS). An asset tag device may be a small (e.g., size of a U.S. quarter), resource-constrained (i.e., low processing power, limited memory, and/or limited battery life) device used to transmit data, such as a beacon identifier, to a more powerful central device. The central device, such as a server computer system (also referred to as server), may make a determination of location of an asset tag device and/or asset in view of the transmitted data. An asset tag device may be a wireless device and transmit data using a wireless communication protocol. An asset tag device may be a low-power device and/or be battery powered. An asset tag device may use a rechargeable battery, such as a lithium-ion rechargeable battery. An asset tag device may be coupled to or integrated into an asset in a variety of ways. For example, an asset tag device may be a discrete hardware device that is physically fixed to a hard asset. An asset tag device may be a hardware device that is integrated into the hardware of an asset. A third party device, such as a mobile phone, may be converted into an asset tag device by loading the asset tag software (e.g., asset tag manager) and leveraging the hardware of the third party device to perform the functions of the asset tag device. - The data (including the location) may flow through a communication hub 106 (or other network device) and arrive at a server 108 (such as a medical database and/or an authentication server). In some embodiments, the data also, or alternatively, flows through a
communications network 115, where thecommunications network 115 may include thecommunication hub 106. The data flow may also flow in the reverse direction from theserver 108 and/or thecommunication hub 106 to theasset 104, e.g., in response to a request for medical information or records on a patient. The data may include asset and/or management data, medical information, patient information, authentication data, and other personal and security-related information and the like. - The
MMS 100 may includemultiple assets 104. Thebeacon devices 102 may be associated with fixed locations and may provide a location identifier (ID) forasset tag device 105A (or 105B) to detect, such that theasset tag device 105A (or 105B) may determine a current location, which the assets may transmit through thecommunication hub 106 to theserver 108. Thebeacon device 102 may identify or be associated with any type of location, including a room, a hallway, a common or conference room, and/or a grid location. - The
beacon device 102 may include a circuit board within a housing, the circuit board containing a processor (or discrete logic or controller or microcontroller), memory (non-volatile and/or volatile memory), a battery (or other power source), and a transceiver primarily for transmitting. Thebeacon device 102 may be programmed to transmit a beacon signal containing data to identify the beacon device to other devices, such as to theasset tag device 105A or to theasset tag manager 105B running on a host machine of theasset 104. - In one example, the
beacon device 102 may communicate with theasset tag device 105A and/or theasset tag manager 105B through a personal area network (PAN), such as, e.g., with Bluetooth® technology developed by the Bluetooth Special Interest Group (SIG). In another example, the PAN may be created with Bluetooth® low energy (BLE) technology (also developed by Bluetooth SIG) that may be used to track theassets 104. For example, a BLE-based beacon may be associated with an asset in theMMS 100 to communicate asset and/or management information of the asset. - In another example, the
beacon device 102 may be an active or passive radio frequency identification (RFID) tag that transmits a unique RFID number. The RFID number or identifier may be correlated at theserver 108 with a certain location such as may have been pre-programmed at theserver 108 or within a distributedMMS 100. In this example, theasset tag device 105A and/or theasset tag manager 105B may be or include an interrogator that interrogates the RFID tag of thebeacon device 102 to determine the RFID number or identifier of thebeacon device 102. When thebeacon device 102 is an active RFID tag, theasset tag device 105A and/or theasset tag manger 105B may receive the actively transmitted RFID number of identifier as transmitted by thebeacon device 102. - The
asset tag device 105A (e.g., a non-integrated asset tag device) may be implemented in hardware and include a circuit board within a housing as depicted inFIG. 2 , the circuit board containing a processor, memory (non-volatile and/or volatile memory), a battery, and a transceiver. The transceiver may be a third-party integrated circuit, such as an RF module, e.g., a Bluetooth® chip, an RFID interrogator and/or receiver or the like. The asset tag device may be performed by processing logic comprising hardware, software, firmware or any combination thereof. - The
asset tag manager 105B (e.g., an integrated asset tag device) may be a software program (including instructions) that may utilize a processor, memory, transceiver and the like of a host machine of theasset 104, such as the medical cart (all-in-one (AOI)), any medical device in which the asset tag is integrated, or any device when used in non-medical applications. - The
asset tag device 105A and/or theassets 104 may be tracked with a real-time location system (RTLS) that determines the location of whatever is tagged (or otherwise tracked by identifying a location ofbeacon devices 102 in proximity of the assets 104). The tracked entities may include an asset or equipment, a MSM and/or patient(s), for example. Thecommunications hub 106 may be wired or wireless and may direct data between the assets and to (and from) theassets 104 and theserver 108. - In one example, the beacon device may broadcast a location ID to any device located within the
room 110. In this example, when theasset 104 receives the location ID from thebeacon device 102, theasset 104 may determine its location. In another example, theasset 104 may measure a received signal strength indication (RSSI) from thebeacon device 102 to determine a location of the device within a radius or area for which the beacon device is designated. - For example, the
asset 104 may use the received location ID from thebeacon device 102 to determine that theasset 104 is located in an identified room. Theasset 104 may also use the RSSI to determine a location of theasset 104 within the room, such as within a threshold of location accuracy (e.g., within X distance from the beacon device 102). In one example, a room may includemultiple beacon devices 102. Theasset 104 may receive multiple location IDs from themultiple beacon devices 102 and use the RSSI of the different location IDs to determine the location of theasset 104 within the room. For example, theasset 104 may use the RSSI of the different location IDs to triangulate the location of theasset 104 in the room. In another example, thebeacon device 102 may be located at different locations. For example, thebeacon device 102 may be located in a hallway, in a lobby, in a stairwell, in a room, in a parking lot, and so forth. When theasset tag device 105A (orasset tag manager 105B) determines its location, theasset tag device 105A (orasset tag manager 105B) may communicate asset information (such as location information, asset management information, and so forth) to aclosest communication hub 106. - In another example, the
asset tag device 105A and/or theasset tag manager 105B can append the location ID to the asset information and communicate the appended asset information to thecommunication hub 106. Thecommunication hub 106 can analyze the appended information to determine the location of theasset 104 using the location ID and the asset information. For example, thecommunication hub 106 can access a database that defines the locations of different beacon devices with different location IDs. Thecommunication hub 106 can compare the received location ID from theasset tag device 105A and/or theasset tag manager 105B with the location IDs in the database to find a matching pair of location IDs and associate the defined location of the location ID with theasset 104. - In one example, the
communication hub 106 may be a device (such as a communication plate) mounted to a wall. In another example, thecommunication hub 106 may be integrated into a construction of a location. For example, thecommunication hub 106 may be integrated into a floor, ceiling, or wall of a facility, for example. In another example, thecommunication hub 106 may be software on theserver 108. - In one example, the
communication hub 106 may be located at a different location than the room 110 (such as a central location on the floor where the device is located or a central location in the building where the device is located). When thecommunication hub 106 receives the asset information from theasset 104, thecommunication hub 106 may relay the information to aserver 108. In one example, thecommunication hub 106 may receive information from different devices. When thecommunication hub 106 receives the information from the different devices, thecommunication hub 106 may aggregate the data and send the aggregated asset information to theserver 108. - One advantage of the
asset tag device 105A (orasset tag manager 105B) determining its location and sending the asset management information to thecommunication hub 106 may be to enable thebeacon device 102 to be small and low energy. For example, because thebeacon device 102 broadcasts the location ID, thebeacon device 102 may consume a small amount of power (such as a 1-2 mAh per day) and may be powered by a small battery for an extended period of time. Theasset tag device 105A may have a separate power supply that may be recharged more easily than thebeacon device 102. Another advantage of theasset tag device 105A (orasset tag manager 105B) communicating the asset information may be that the asset theasset tag device 105A may select the information of theasset tag device 105A to be communicated to thecommunication hub 106 and communicate the information in real-time and directly to thecommunication hub 106 to reduce communication interference from multiple devices. - In one example, the
MMS 100 may track theassets 104 in real-time or substantially real-time. For example, theasset 104 may continuously communicate asset and management information to thecommunication hub 106. - In another example, the
MMS 100 may track the assets on a periodic basis. For example, theasset 104 may communicate asset and management information to thecommunication hub 106 on a periodic basis. In another example, thecommunication hub 106 may transmit a request to theasset 104 to communicate the asset and management information. When theasset 104 receives the request, theasset 104 may communicate the asset and management information to thecommunication hub 106. - In one example, the MMS may include an implementation system to map a facility where assets may be managed, e.g., determine a schematic or layout of the facility. In another example, the implementation system may include software to determine a schematic or layout of the facility, including rooms, stairway objects, hallway objects, and so forth, based on a digital plan and/or a computer-assisted built plan within the software. In another example, a user may use a scanner, such as a three-dimensional (3D) scanner and walk around the facility collecting layout information, where the software may use the information from the scanner to determine the layout of the facility.
- With further reference to
FIG. 1 , when the implementation software has determined a layout of the facility, the software may associate thebeacon device 102 and/or thecommunication hub 106 may be associated with the layout of the facility. For example, thebeacon devices 102 and/or thecommunication hubs 106 in a facility may have a unique ID. When the facility layout is determined, the implementation software may receive input from an input device (such as a mouse, a keyboard, a stylus, a touch screen, and so forth) associating the different unique IDs with locations on the facility layout. - In another example, locations in the facility layout may have unique IDs associated with the location. In this example, an assistance device (such as a scanner or a communication device) may be taken to one or more locations in the facility, where the location ID may be selected, the assistance device may scan or communicate with the
beacon device 102 and/or thecommunication hub 106, and thebeacon device 102 and/or thecommunication hub 106 may be associated with the location ID. In another example, when a device is located at a facility location, the assistance device may scan the location for thebeacon devices 102 and/or the communication hubs 106 (such as by using by using Bluetooth® scanning) and associate thebeacon device 102 and/or thecommunication hub 106 scanner in the location with a location ID. For example, a user may walk into a room with a first location ID, use a tablet with Bluetooth® technology to scan the room for thebeacon devices 102 and/or thecommunication hubs 106, and the software may associate thebeacon devices 102 and/or thecommunication hubs 106 detected by the tablet with the first location ID. The user may repeat this process for multiple locations in the facility. - In yet another example, the
beacon devices 102 may have a predefined number or identifier (ID). When a layout of the building is compiled, the user may use a graphical user interface (GUI) to select which beacon device is located in each room, hallway, conference room and the like. - An advantage of the implementation of the
MMS 100 may be to enable integration of the MMS into a preexisting facility, e.g., the MMS may be installed in a preexisting facility and the implementation system may map the preexisting facility. Another advantage of the MMS may be that the installation and implementation of the MMS may enable quick and efficient installation as the MMS may be installed and configured for a facility without invasively installing an asset management system. Another advantage of the MMS may be that the system may avoid interference by other devices by using the implementation system to determine optimal locations of thebeacon devices 102 and/or thecommunication hubs 106. - The asset management system can be used in other contexts, as described with respect to
FIG. 1B . -
FIG. 1B illustrates anasset management system 100, according to one embodiment. Theasset management system 100 may be at least partially deployed inarea 110.Area 110 can includebeacon device 102 andbeacon device 103. In one example, thebeacon devices Beacon devices wireless broadcast asset tag device 105A. Theasset tag device 105A may be coupled toasset 104.Asset 104 may be any asset as described herein. For example, theasset tag device 105A may be integrated into the hospital cart or other medical device, military equipment, business resource, or the like. Anasset tag device 105A may be coupled to or integrated into anasset 104 in a variety of ways. For example, anasset tag device 105A may be a discrete hardware device that is physically fixed to a hard asset. Anasset tag device 105A may be a hardware device that is integrated into the hardware of an asset. A third party device, such as a mobile phone, may be converted into anasset tag device 105A by loading the asset tag software (e.g.,asset tag manager 105B) and leveraging the hardware of the third party device to perform the functions of the asset tag. Asset tag may refer toasset tag device 105A and/orasset tag manager 105B. - The
asset tag device 105A includes anasset tag manager 105B, that is, the processing device of theasset tag device 105A executes instructions corresponding to theasset tag manger 105B to perform the functionality describe herein. In other embodiments, theasset tag manager 105B executes on a processing device of a host device, such as the AIO, or other medical asset. In some embodiments,asset tag manager 105B may be a software implementation ofasset tag device 105A used to perform one or more functions of theasset tag device 105A.Asset tag manager 105B may be executed by a processing device (not shown). -
Area 110 may refer a physical space delineated by the signal coverage of one or more beacon devices. It should be appreciated that anarea 110 may be defined by software and correspond to the physical location of the beacon device and associated wireless broadcast. For example, a large room may have multiple areas. Twobeacon devices beacon devices beacon devices area 110. Using two or more beacon devices to define an area may allow an asset management system to improve an accuracy of location determinations of assets. It also should be appreciated that while two beacon devices (i.e.,beacon device 102 and 103) are illustrated inFIG. 1B as definingarea 110, the number of beacon devices is for purposes of illustration, rather than limitation. An area may be defined by one or more beacon devices and may depend on a variety of factors such as available resources or system requirements. - A broadcast may refer to the transmission of a signal containing data in for example, a data packet. A wireless broadcast may be a type of broadcast and may refer to the transmission of a signal containing data without an electrical conductor, for example the transmission of a signal through the air. Any device, such as
beacon device 102,beacon device 103, andasset tag device 105A may transmit a broadcast. Any device, such asasset 104,asset tag device 105A,asset tag manager 105B, and/orserver 108 may scan and receive a broadcast. - An asset, such as
asset 104, may refer to an object of value to the entity.Asset 104 may be tangible objects, such as buildings, hardware, devices, etc., or may be intangible objects such as software, information, intellectual property, etc. Soft assets may include intangible objects as well as human beings. Hard assets may include tangible assets.Asset 104 may also broadcast data tohub 106, as illustrated bywireless broadcast 124. - An asset tag device, such as
asset tag device 105A, may be an electronic device coupled to an asset, such asasset 104, and used as part of an asset-tracking system (ATS), such as a real-time locating system (RTLS). In one example, theasset tag device 105A may be a small (e.g., size of a U.S. quarter), resource-constrained (i.e., low processing power, limited memory, and/or limited battery life) device used to transmit data, such as a beacon identifier, to a more powerful central device. The central device, such as a server computer system (also referred to as server 108), may make a determination of a location ofasset tag device 105A and/orasset 104 in view of the transmitted data. In another example, theasset tag device 105A may be a wireless device and transmit data using a wireless communication protocol. In another example, theasset tag device 105A may be a low-power consuming device and/or be battery powered. In another example, theasset tag device 105A may use a rechargeable battery, such as a lithium-ion rechargeable battery. In another example, theasset tag device 105A may be coupled to or integrated intoasset 104 in a variety of ways. For example,asset tag device 105A may be a discrete hardware device that is physically fixed to a hard asset. In another example, theasset tag device 105A may be a hardware device that is integrated into the hardware ofasset 104. A third party device, such as a mobile phone, may be converted into anasset tag device 105A by loading the asset tag software (e.g.,asset tag manager 105B) and leveraging the hardware of the third party device to perform the functions of theasset tag device 105A. -
Asset tag device 105A may be coupled toasset 104. Theasset tag device 105A may communicate with at least thebeacon devices 102 and/or 103,hub 106, sever 108,repeater 114 and/orasset 104. In one example, theasset tag device 105A may be coupled to an individual, such as medical personnel in a hospital environment (also referred to as facility). In another example, theasset tag device 105A may be attached to an employee identification badge or attached to or integrated into an electronic device, such as a wristband or watch. In another example, anasset tag manager 105B may be software integrated into a third party device, such as a mobile phone or tablet. Theasset tag manager 105B may leverage at least part of the hardware and/or software resources of the third party device to perform the functions of an asset tag. In should also be appreciated that anasset tag manager 105B may be compatible with any device, software platform, and/or operating system. - A beacon device (also referred to as a location identification beacon device), such as
beacon device 102 and/orbeacon device 103, may be an electronic device fixed to a known location (and/or marking a fixed location) and used to transmit data in for example, a data packet. The data may include a fixed parameter, such as a beacon identifier, which may be used to determine a relative location of a device, the device having received the beacon device's data packet, to thebeacon device 102 and/or 103. For example, two different beacon devices (e.g.,beacon devices 102 and 103) may be fixed to different corners of a room (e.g., area 101), each transmitting a wireless broadcast (e.g., wireless broadcast 122 frombeacon device 102 and wireless broadcast 123 from beacon device 103). Each of the wireless broadcasts may contain a different beacon identifier representative of the different beacon devices. The wireless broadcasts 122 and 123 may be received by anasset tag device 105A. Theasset tag device 105A may send the beacon identifiers and the asset tag identifier to aserver 108 throughhub 106. Theserver 108 may use the beacon identifiers to identify each beacon device, identify the known location of each beacon device, and determine the relative location of the asset tag to the beacon devices. In another embodiment,beacon device 102 and/or 103 may be a small, resource-constrained (i.e., low processing power, limited memory, and/or limited battery life) device used to transmit data, such as a beacon identifier, toasset tag device 105A.Beacon device 102 and/or 103 may be a wireless device transmitting data packets using a wireless communication protocol compatible withasset tag device 105A. Thebeacon device 102 and/or 103 may be a low-power device and/or battery powered. The beacon identifier may be a unique value, such as a number, assigned to the beacon device by a developer and/or used to identify a beacon device. In one embodiment the major identifier (2 bytes) and/or minor identifier (2 bytes) may be used as a beacon identifier. The major identifier and/or the minor identifier may be a serialized number. The beacon identifier may be distinct from the universally unique identifier (UUID). An example ofbeacon device 102 and/or 103 may be an iBeacon®, or other device, such as an active radio frequency identification device (RFID), a passive RFID, an infrared device, a motion sensor, a sonar or sonic device, and/or a near field communication (NFC) device. - It should be noted that a wireless communication protocol conforming to the Bluetooth Low Energy® (BLE) (also referred to as Bluetooth Smart®) standard is used for purposes of illustration, rather than limitation. It should be appreciated that other wireless communication protocols may be used, such as protocols conforming to the Bluetooth® wireless standard (also referred to as Classic Bluetooth®), ZigBee® wireless standard, Wi-Fi® wireless standard, ultra-wideband (UWB) wireless standard, or other current or future standard. It should be noted that Bluetooth® shall refer to at least Bluetooth® Low Energy and Classic Bluetooth®, unless otherwise noted. It should also be noted that in one embodiment, the wireless communication protocol may a short range wireless communication protocol compatible with short range wireless communications (e.g., approximately 100 m or less) in a short range wireless network.
- In one example, the
asset tag device 105A may broadcast wireless broadcast 125 tohub 106. In another example, theasset tag device 105A may broadcast a wireless broadcast torepeater 114, which in turn broadcasts the wireless broadcast 126 tohub 106. Thewireless broadcast 125 may be in a wireless communication protocol, such as Bluetooth®.Asset 104 may also broadcast wireless broadcast 124 tohub 106 in the same or different wireless communication protocol. Thebeacon devices 102 and/or 103 (or any other device) may broadcast data tohub 106. - Hub 106 (also referred to as a communication hub) may refer to an electronic device that connects communication data from one electronic device to another electronic.
Hub 106 may include functionality of a conventional network hub, as well as additional functionality. For example,hub 106 may receive, filter, analyze, modify, and/or transmit data to and from multiple devices using wireless and/or wired communication and/or a combination thereof.Hub 106 may transmit received data to multiple ports, similar to a conventional network hub.Hub 106 may perform functions of a network switch and may receive, process, and forward data only to a destination device that needs to receive it (rather than broadcasting the data to each of its ports).Hub 106 may also function as a wireless access point (AP) and allow wireless devices to connect using a wireless communication protocol (e.g., Wi-Fi®).Hub 106 may provide a hotspot, a physical location offering internet access, over a wireless local area network (WLAN) through the use of another device such as a router to connect to an internet service provider. Additionally,hub 106 may perform access control (e.g., authentication) to control which devices have access to the network.Hub 106 may also function as a router to forward data packets between multiple computer networks.Hub 106 may perform software defined networking (SDN) functions. For example,hub 106 may function similar to a Dynamic Host Configuration Protocol (DHCP) server that may assign an internet protocol (IP) address to a device (e.g., authenticated device), attempting to use a network, such as a Wi-Fi® network associated withhub 106. An internet protocol (IP) table may be configured to route data from devices within a range of IP addresses to one location and/or through a particular channel and route data from devices within another range of IP addressed to another location and/or through another channel. Although not illustrated inFIG. 1B ,hub 106 may transmit data to computer systems in a local area network (LAN). For example,hub 106 may transmit data to the internal hospital data center.Hub module 112 may be a software implementation ofhub 106 and perform some or all the functions ofhub 106. - In one embodiment,
hub 106 may have one or more communication channels.Hub 106 may include corresponding hardware and/or software for each communication channel. For example,hub 106 may include several wireless communication channels conforming to a wireless communication protocol of a low energy PAN standard, such as a Bluetooth® channel (i.e., a channel compliant with the Bluetooth® standard able to transmit and/or receive signals), several wireless communication channels conforming to a wireless communication protocol of a WLAN standard, such as a Wi-Fi® protocol and/or wireless communication channels conforming to a different wireless communication protocol, such as a cellular channel (i.e., a channel compliant with a cellular standard able to transmit and/or receive cellular signals).Hub 106 may also include wired channels, such as an Ethernet channel.Hub 106 may have an interface for each channel capable of transmitting and/or receiving in the communication protocol associated with the channel. For example,hub 106 may include one or more separate antennas for each channel and/or one or more integrated antennas.Hub 106 may include one or more antennas to receive a wireless communication protocol of a low energy wireless PAN standard, such as an antenna capable to receive Bluetooth® signals, one or more antennas to receive a wireless communication protocol of a WLAN standard, such as an antenna to receive Wi-Fi® signals, a wired Ethernet port, and/or a cellular antenna (e.g., multiple-input and multiple-output (MIMO) antenna). A channel may be implemented by a hardware dongle compatible with the particular standard (e.g., a Bluetooth® dongle). - In one embodiment,
hub 106 may receive data from multiple source devices such asasset 104,asset tag device 105A,repeater 114,beacon device asset tag device 105A may send a wireless broadcast torepeater 114, which in turn transmits the wireless broadcast tohub 106. In this example, theasset tag device 105A may be considered a source device because data in the wireless broadcast originated from theasset tag device 105A. In another embodiment, a source device may be the electronic device from which the data was received (e.g.,repeater 114 in the previous example).Hub 106 may further filter and transform the data, and transmit the modified data through a cellular network and/or wired network (e.g., local area network (LAN)). A cellular network (e.g., mobile network) may be a wireless network distributed over areas (e.g., cells), each served by at least one fixed-location transceiver (e.g., cell site or base station). Each cell may use a different set of frequencies from neighboring cells to avoid interference and provide bandwidth within each cell. The cellular network may use any mobile telecommunications technology such as third generation (e.g., 3GPP LTE), fourth generation (e.g., WiMAX, 4G LTE), and fifth generation (5G) of mobile telecommunications technology. A cellular communication protocol may be a long range wireless communication protocol used for long range wireless communications in a long-range cellular network. In one example,hub 106 may receive data in data packets conforming to a wireless communication protocol of a low energy PAN standard (e.g., BLE® protocol) and/or a wireless communication protocol of a WLAN standard (e.g., Wi-Fi® data format protocol) and re-transmit data to theserver 108 using cellular communication protocols on a cellular network. In another example,hub 106 may receive data in data packets conforming to the PAN standard and/or WLAN standard and re-transmit data to another local server (not shown) using a wired Ethernet cable (e.g., in a LAN). - In one embodiment,
hub 106 may be located at a selected location within a facility, such as on each floor of a hospital environment (e.g., facility).Hub 106 may be located at select locations in the hospital environment so as to provide communication coverage throughout the environment. In one example,hub 106 may be located in high traffic areas or along routes or paths that theasset 104 may frequently move along. In another example, the locations can be predefined locations selected during the construction of an environment. In another example, the locations can be selected to provide a desired coverage area, such as a wing of a hospital environment. - In one embodiment,
hub 106 may provide a secure private network for devices (such asserver 108,asset tag device 105A, or asset 104) to communicate with thehub 106. For example,hub 106 may provide a secure wireless area network (WLAN), secure PAN, or Private Wide Area Network (PWAN) to communicate with a device, such as anasset tag device 105A and/orasset 104. In another example,hub 106 may be a gateway or access point for theasset 104 and/orasset tag device 105A to access information stored on theserver 108. For example,hub 106 maybe a networkswitch enabling asset 104 to access a secure server, such as electronic medical records (EMRs), hospital information system (HIS) information, or an active directory of a hospital server. The devices in the WLAN may use the Wi-Fi® technology and IEEE 802.11 standards defined by the Wi-Fi Alliance. Alternatively, the devices in the WLAN may use other technologies and standards. Similarly, the devices in the PAN or WPAN may use the Bluetooth® technology and IEEE 802.15 standards defined by the Bluetooth Special Interest Group. Alternatively, the devices in the secure PAN may use other technologies and standards. The WAN or PWAN can be used to transmit data over long distances and between different LANs, WLANs, metropolitan area networks (MANs), or other localized computer networking architectures. - In one embodiment,
hub 106 may prepare data for transmission to another device, such asserver 108. For example,hub 106 may reformat the data that is received into another format. The format may refer to the organization of data (e.g., a data format) according to a predefined specification. Thehub 106 may prepare the data by compressing data in a compression format, securing data in a secure format (e.g., encryption format), changing the data for example, to be compliant with a communication protocol (e.g., Wi-Fi® to Bluetooth®, Bluetooth® v. 1.0 to Bluetooth® v. 2.0), removing data, and/or adding data. - In another embodiment,
hub 106 may include a network compliance device configured to run a Health Level 7 (HL7) engine. HL7 may refer to a set of international standards for transfer of clinical and administrative data between software applications used by various healthcare providers. HL7 may provide a framework for the exchange, integration, sharing and retrieval of data used by healthcare providers. The HL7 engine may format information to an HL7 electronic medical record (EMR) standard. HL7 may provide a framework for the exchange, integration, sharing and retrieval of electronic health information.Hub 106 may use a HL7 formatting engine to aggregate data received, format the data to an HL7 standard, and communicate the formatted data toserver 108. -
Asset management system 100 may also include repeaters, such asrepeater 114. A repeater, such asrepeater 114, may refer to an electronic device that receives a signal and retransmits the signal, often at a higher power. Arepeater 114 may receive data fromasset tag device 105A and relay the data tohub 106 or another repeater (not shown). Arepeater 114 may also act as a bridge to receive data formatted in one wireless communication protocol (e.g., BLE®) and re-transmit in another wireless communication protocol (e.g., Wi-Fi®). The repeater may be used by a device to tether (e.g., using Bluetooth® and/or Wi-Fi®) to the Internet.Repeater 114 may be configured as a network of repeaters, such as nodes in a piconet. A piconet may be a wireless personal area network (WPAN) formed by a device (e.g., Bluetooth® compatible device) serving as a master in the piconet and one or more other devices (e.g., other Bluetooth® compatible devices) serving as slaves. - In one example, a hospital may have multiple repeaters located at different locations in the hospital. The repeaters, such as
repeater 114, may receive data fromasset tag device 105A,asset 104,beacon device 102, and/orbeacon device 103 and relay the data tohub 106.Repeater 114 may relay the data directly to thehub 106 or indirectly relay the data tohub 106 via one or more other repeaters. In one embodiment, each floor or department of a hospital environment may include a hub, such ashub 106 to receive information from one or more repeaters that provide wireless coverage of the floor.Repeater 114 may be powered by a batter, powered by an electrical outlet, or powered by any other manner.Repeater 114 may be a small form factor device, such as the size of human child's fist. - Server 108 (also referred to as a server computer system) may be a computing device such as server computer, a desktop computer, or a laptop computer, or a portable computing device such as, but not limited to, mobile telephones, personal digital assistants (PDAs), portable media players, netbooks, tablet computers, portable gaming consoles, portable televisions, electronic book readers, and the like. Although a single server (e.g., server 108) is illustrated in
FIG. 1B , any number of servers may be present in an AMS. -
Server 108 may be a server computer system that is part of an online infrastructure system. Examples of an online infrastructure include a cloud computing platform that may allow multiple users from multiple client systems to access different components or computer resources of the cloud computing platform. The online infrastructure may provide physical and/or virtual resources, such as access to services, servers, or other such resources, to client systems. Examples of services (or functionality) provided by the online infrastructure may include, but are not limited to, access to data stored on storage devices, provisioning of virtual machines, software services, physical servers, etc. -
Server 108 may store, process, and or analyze data received fromhub 106, as well asbeacon device asset 104, andasset tag device 105A. In one embodiment, theserver 108 may use the beacon identifiers and asset tag identifiers to determine the real-time location of an asset (e.g., real-time location system (RTLS)). - In one embodiment,
server 108 may determine the location ofasset 104 from the beacon identifier ofbeacon device 102 and/orbeacon device 103, and the asset tag identifier. Theserver 108 may also record a time stamp indicating when the beacon identifiers were received byasset tag device 105A.Server 108 may store data associating the location of a beacon device in an environment to a specific beacon identifier. Additionally, sever 108 may store additional data mapping an asset tag identifier to an asset. Accordingly, the beacon identifier and asset tag identifier may be correlated, using the mapping data, to a location in an environment. The location may be thearea 110 and/or include a location withinarea 110 where theasset tag device 105A and associatedasset 104 are located (e.g., the middle of area 110). - In one embodiment, the
server 108 may include an application programming interface (API), such as a representational state transfer (REST) application program interface (API) interface, to enable applications to retrieve and present data, such as asset data and/or management data, to users. For example, an application may include a user interface with a map of a facility. The application may access the asset data and/or management data and determine the locations of one or more assets in the facility. The application may display the locations of the asset to a user. In another example, the application may query or search the asset data and/or management data to determine user requested data, such as location information of an asset, usage information of an asset, and so forth. - In another embodiment,
server 108 may receive battery data indicating battery usage information and/or battery life information for anasset 104,asset tag device 105A, and/orbeacon devices Server 108 may use the battery data to determine a trend in the amount of time a battery of the device may be used, an estimated remaining battery life, battery errors, when to replace a battery, and so forth. For example,asset tag device 105A may receive a battery identifier in a wireless broadcast frombeacon device asset tag device 105A. The battery data, including the battery identifiers may be transmitted tohub 106. A battery identifier may include information such as remaining battery life, battery consumption, and/or battery usage rate of an associated device. - In another embodiment, data such as software updates or patches may be communicated from the
server 108 to ahub 106,asset 104,asset tag device 105A, and/orbeacon devices - It should be noted that reference may be made to elements of
FIG. 1B in the below specification. -
FIG. 2 illustrates a method of analyzing and re-transmitting communication data, according to one embodiment. Themethod 200 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof. Themethod 200 may be performed all or in part byhub module 112. -
Method 200 begins by a processing device executing the method receives communication data from a source device over a channel of a plurality of wireless channels (block 205). For example, thecommunication hub 106 may receive awireless broadcast 124 fromasset 104. Thewireless broadcast 124 may be formatted according to a wireless communication protocol conforming to the WLAN standard and may be received byhub 106 at a WLAN channel using a WLAN antenna. -
Method 200 continues to block 210 where processing logic authorizes the source device in view of at least one of an indication that the source device is within a specified distance fromhub 106 or an indication that the source device is predefined as an approved device. For example,hub 106 may only authorize devices from a specific company, a specific type of device, or devices from an approved set of devices to transmit communication data overhub 106. In one example, the communication data itself may be used to determine that the source device is an approved device. The communication data may be analyzed (e.g., parsed) to locate identifiers indicating an approved or unapproved device. In another example,hub 106 may manage authorization using a local database. Additional details of authorization are discussed at least in regards toFIGS. 6, 7, and 8 . -
Method 200 continues to block 215 where processing logic determines whether to re-transmit the communication data to the destination device over a second channel of the plurality of wireless channels. The communication data is not re-transmitted when the communication data comprises exceeds a threshold level of corrupted data (such as to render the data unreadable) or the source device is unauthorized. In one example, the channel over which the communication data is re-transmitted (e.g., second channel) may be a different channel than the channel on which the communication data was received (e.g., first channel). For example,hub 106 may receive the communication data on a WLAN channel and re-transmit on a cellular channel. In another example, the receiving and re-transmitting channels may be the same channel. The re-transmitted communication data may be the same or substantially the same (e.g., a majority of the data) as the communication data received byhub 106. - In another example, processing logic may determine when the communication data is corrupted data by analyzing the communication data (e.g., user data). For example, the communication data can include blood type information of a patient, such as information identifying the blood type of the patient at type “O+” However, when the communication data is corrupted, the corrupted communication data may erroneously indicate that the patient's blood type is “P”. The processing logic of the device may determine that “P” is not a possible blood type the patient and determine that the communication data is corrupted. In one embodiment, the threshold data corruption level may be when any data is corrupted. In another embodiment, a specified level of corrupted data may refer to a percentage of data that is deemed corrupted. A specified level of corrupted data may refer to specific types of data or data from a specific source device that is deemed corrupted. In another example, corrupted data may be determined by a checksum, such as a calculated checksum. Additional details of determining data is corrupted is discussed at least in regards to
FIG. 9 . - In another example, when the source device is unauthorized, as discussed with respect to block 210, the processing logic may determine not to re-transmit the communication data. For example, only source devices from a specific company may be allowed to re-transmit
data using hub 106. The processing logic may determine devices not from the specific company are unauthorized and may determine not to re-transmit communication data from the unauthorized devices. -
Method 200 continues to block 220 where processing logic transforms a first format of the communication data to a second format. The first format may correspond to the first wireless channel and the second format may correspond to the second wireless channel. The first and second format may be different formats corresponding to different channels. For example,asset tag device 105A may broadcast a wireless communication signal containing communication data in a communication protocol conforming to the a wireless communication protocol of a low energy wireless personal area network (PAN) standard (e.g., BLE® standard) which is received byhub 106 on a channel capable of receiving the wireless communication protocol (e.g., BLE® channel). Thehub 106 may transform the communication data to another format by encrypting the data and/or formatting the communication data to be re-transmitted in a cellular communication protocol using a cellular channel. Transforming the format may include compressing the communication data, securing the communication data, changing the communication protocol of the communication data, removing data from the communication data, and/or adding data to the communication data. It should be noted that transforming the data may be performed by processing logic at any time. In one example, the communication data may be transformed at least in part after the communication data has been determined to be re-transmitted. In another example, the communication data may be transformed at least in part prior to determining the communication data is to be re-transmitted or at any time after receiving the communication data. -
Method 200 continues to block 225 where the processing logic re-transmits the communication data in the second format to the destination device over the second channel. For example, the communication data may be re-transmitted toserver 108 using a cellular communication protocol (also referred to as format compliant with cellular standard) over a cellular network. -
FIG. 3 illustrates a method of delaying the re-transmitting of communication data, according to one embodiment. Themethod 300 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof. Themethod 300 may be performed all or in part byhub module 112. -
Method 300 begins atblock 305 where processing logic executing the method analyzes the communication data to determine a type of data. A type of data (also referred to as data type) may refer to data itself (e.g., identifiers of the data). The processing logic may parse the communication data to locate one or more identifiers. In one example, the processing logic may parse the communication data to locate a source device identifier indicating a source device having originated the communication data. The source device identifier may be a type of data and/or indicate a type of data. For example, source device identifier for an EKG device may itself be a type of data. In another example, the EKG source device identifier may indicate that the communication data includes a type of data, such as heart information data type. In another example, the identifiers may be used to identify other data types such as parameters (e.g., blood or heart rate) and/or value of parameters (e.g., O-type blood or 80 beats per minute). Data type identifiers may include identifiers, such as a source device identifier, a parameter identifier, a parameter value identifier, etc., or a combination thereof. Examples of data type identifiers are used for purposes of illustration, rather than limitation. It should be appreciated that any number of identifiers may be used to analyze data type. -
Method 300 continues to block 310 where processing logic calculates a priority of the communication data based on the analyzing ofblock 305. A priority may be a numerical value such as 1 through 10, where 1 indicates the lowest priority and 10 indicates a highest priority. A priority may be a priority level such as, low priority, medium priority, high priority, and/or emergency (or critical) priority. The priority level may be predetermined for certain data types. The priority level may be based on a priority algorithm, such as weighting the source device and certain data types to calculate a priority level of the data. For example, communication data from a source device such as mobile device may be predetermined as a low priority while communication data from an EKG device may be a high priority. In another example, different data types from a source machine may have different priorities. Communication data from an EKG device with normal readings may have a low priority, but communication data from same EKG device with irregular readings may have a high priority. It should be noted that the examples of calculating priority are for purposes of illustration, and not for limitation. -
Method 300 continues to block 315 where processing logic delays the re-transmission of the communication data when the priority is below a threshold. The specified threshold may be specified by a developer or administrator. The threshold may correspond to the priority as discussed above with respect to block 310. For example, the specified threshold may be a numerical value, such as 7, corresponding to the priority scale, such as 1 through 10, as discussed above. The specified threshold may be set at greater than equal to high priority. In the above examples, the processing logic may delay transmission for communication data with a calculated priority of 7 and above, or high priority and above. The amount of delay may be specified by a developer or administrator. The delay may for minutes, hours, days, for example. The delay may be for a period till processing logic determines the communication data may be re-transmitted. The amount of delay may be determined in view of managing transmission data rates and/or cost of transmitting data. -
FIG. 4 illustrates a method of delaying the re-transmitting of communication data, according to another embodiment. Themethod 400 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof. Themethod 400 may be performed all or in part byhub module 112. -
Method 400 begins atblock 405 where processing logic executing the method analyzes the data size of the communication data. In one example, the data size may be measured in a number of bytes. In another example, data size may be measured as a number of data packets. Examples of data size are used for purposes of illustration, rather than limitation. It should be appreciated that numerous units of data size may be available. In one example, processing logic may analyze the data size of the communication data as 500 kilobytes. -
Method 400 continues to block 410 where processing logic may delay the re-transmission of the communication data when the data size is greater than a specified threshold. The specified threshold may be specified by a developer or administrator. The specified threshold may correspond to the units of data size discussed above. For example, the threshold may be set at 1 gigabyte or 10 k data packets. The amount of delay may be specified by a developer or administrator. The delay may for minutes, hours, days, for example. The delay may be for a period till processing logic determines the communication data may be re-transmitted. The amount of delay may be determined in view of managing transmission data rates and/or cost of transmitting data. -
FIG. 5 illustrates a method of transmitting a response in view of the communication data, according to one embodiment. Themethod 500 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof. Themethod 500 may be performed all or in part byhub module 112. -
Method 500 begins atblock 505 where processing logic executing the method analyzes the communication data to determine a type of data.Block 505 may be performed in a similar manner asblock 305 ofmethod 300 described above with reference toFIG. 3 . -
Method 500 continues to block 510 where processing logic determines whether the data type is predefined to trigger the communication hub to transmit a response. In one example, processing logic may compare the data type identified inblock 505 with predefined data types predefined as having an associated response. If the data type of the communication data matches the predefined data type, processing logic may determine to transmit a response. If the data type of the communication data does not match the predefined data type, processing logic may determine not to transmit a response. Transmitting the response may be in addition to or in lieu of re-transmitting the communication data. In one example, a developer or administrator may predefine certain data types to trigger a response from the communication hub. The response may be sent to a destination device and/or a device other than the server. A response may be any type of information signal containing data. The response may be a response to the communication data and include the same information and/or information different from the communication data. -
Method 500 continues to block 515 where processing logic transmits the response when the type of data is determined to trigger the response. For example, the communication device may receive communication data from an EKG indicating no heart rate. Processing logic may identify the data type indicating no heart rate from an EKG. Communication data from an EKG (or specific data from an EKG) may be predefined to trigger the communication hub to transmit a response. Processing logic may transmit an alert response to a nearest nursing station to make staff aware of the situation. In some embodiments, the data may be directed to the internal hospital system if it is a certain data type (such as patient information) and directed to the third party server when it is another data type (such as battery information). -
FIG. 6 illustrates a method of authorizing a source device in view of an indication that a source device is within a specified distance, according to one embodiment. Themethod 600 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof. Themethod 600 may be performed all or in part byhub module 112. - Distance may refer to an actual measurable distance (and/or direction) or may refer to a relative distance of one source device from
hub 106 relative to the distance of another source device from hub 106 (e.g., one source device is closer to thehub 106 than the other source device). The actual distance (e.g., any source device within a 10 ft radius) and/or relative distance (10 closest source devices) may be specified by an administrator and/or developer. Relative distance for example may be specified as X number of source devices closest tohub 106. The indication that of the source device is within a specified distance may be signal strength, such as RSSI. RSSI may be a measurement of the power present in the received wireless broadcast at a receiving device (e.g., hub 106). RSSI may serve as an indirect indication of a specific and/or relative distance of a source device fromhub 106.Hub 106 may include the functionality (hardware and/or software) to measure the RSSI of wireless broadcasts. -
Method 600 begins atblock 605, where processing logic executing the method analyzes the communication to determine an RSSI. Analyzing the communication data to determine an RSSI may be performed in a similar manner asblock 305 ofmethod 300 described above with reference toFIG. 3 and block 505 ofmethod 500 described above with reference toFIG. 5 . In one example, analyzing includes parsing the communication data to locate an RSSI. The communication data may have been wirelessly transmitted by the source device. It should be appreciated that a receiving device, such as a hub, may have the functionality to measure the RSSI of the received wireless broadcast. It should also be appreciated the RSSI may be included in the communication data by the receiving device. For example, the communication data may include an RSSI identifier indicating an RSSI value of the received wireless broadcast. -
Method 600 continues atblock 610 where processing logic compares a received signal strength indicator (RSSI) of the wireless broadcast to an RSSI threshold. The RSSI threshold may be a numerical threshold. The RSSI threshold may be set by an administrator and/or developer. For example, the RSSI threshold may be set to −110 dBm, or any other value. The RSSI threshold may also include a number of devices having a highest RSSI. For example, the RSSI threshold may specify X number of source devices (e.g., 10 devices) having the highest RSSI (e.g., top 10 devices based on RSSI). The RSSI threshold may also include a number of devices having a highest RSSI and exceed a numerical RSSI threshold (e.g., the top 10 devices based on RSSI and exceeding the RSSI value of −110 dBm). In one example, received wireless broadcasts with RSSI below the RSSI threshold may be from source devices from outside an area of interest. -
Method 600 continues to block 615, where processing logic determines the source device is authorized when the RSSI is greater than or equal to the RSSI threshold or unauthorized when the RSSI is less than the RSSI threshold. For example, if the RSSI threshold is set to −110 dBm, all source devices with an RSSI exceeding or equal to −110 dBm are authorized, while all source devices with an RSSI below −110 dBm are unauthorized. In another example, processing logic determines all source devices with RSSI below −110 dBm are unauthorized, but determines only the top 10 source devices with the highest RSSI and have an RSSI above or equal to −110 dBm are authorized. -
FIG. 7 illustrates a method of authorizing a source device in view of a device density threshold, according to one embodiment. Themethod 700 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof. Themethod 700 may be performed all or in part byhub module 112. - It should be appreciated that authorizing the source device in view of a device density threshold associated with the communication hub may be performed in a similar manner as authorizing the source device in view of an indication the source device is within a specified distance from the hub, and described above with respect to
FIG. 6 . - Device density threshold may refer to the number of devices able to communicate (e.g. send communication data to) with
hub 106 at any given instance. Device density threshold may be a number of devices, for example 10 devices. Device density threshold may refer to a number of devices of one type (e.g., 10 asset tags) and another number of devices of another type (e.g., 5 mobile devices. Each channel may have a device density threshold. The device density threshold may be specified by the manufactures and based on hardware constraints and/or be an arbitrary number of devices determined for example, by an administrator. - In one example, to authorize the source device in view of a device density threshold, processing logic may analyze the communication data to determine the RSSI and compare the RSSI to an RSSI threshold. In regards to a device density threshold, the RSSI threshold may be set to the device density threshold (e.g., a number of devices able to communication with hub 106) having a highest RSSI. For example, the RSSI threshold may specify X number of source devices (e.g., 10 devices) having the highest RSSI (e.g., top 10 devices based on RSSI). Processing logic determines the source device is authorized when the RSSI is greater than or equal to the RSSI threshold or unauthorized when the RSSI is less than the RSSI threshold.
- It should be appreciated that authorizing the source device in view of the device density threshold may be implemented in different ways. For example,
hub 106 may choose the first X devices as authorized, X equaling the device density threshold. Additionally,hub 106 may prioritize certain source devices over other source devices when determining which device to authorize in view of the device density threshold. -
FIG. 8 illustrates a method of authorizing a source device in view of indication the source device is predefined as an approved device, according to one embodiment. Themethod 800 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof. Themethod 800 may be performed all or in part byhub module 112. -
Method 800 begins atblock 805 where processing logic performing the method analyzes the communication data to determine a source device identifier.Block 805 may be performed in a similar manner asblock 305 ofmethod 300 with respect toFIG. 3 and block 505 ofmethod 500 with respect toFIG. 5 , and block 605 ofmethod 600 with respect toFIG. 6 . For example, processing logic may parse the communication data for a source device identifier. As noted above, communication data may include multiple identifiers, such as company identifiers, source device identifiers, identifiers of other manufacturing specific data (e.g., manufacturer identifier), etc. Any identifier or a combination of identifiers may be used as a source device identifier. For example, the company identifier and/or manufacturing identifier may be used as a source device identifier. It should be noted that the source device identifier may include information to determine the source device is not approved, which may or may not be enough information to determine the actual source device. -
Method 800 continues to block 810 where processing logic compares the source device identifier with approved source device identifiers. The approved source device identifiers may be identifiers from source devices approved by for example, a developer and/or administrator.Method 800 continues to block 815 where processing logic determines the source device is authorized when the source device identifier matches the approved source device identifiers or unauthorized when the source device identifier does not match the approved source device identifiers. - For example, processing logic may analyze the communication to determine a source device identifier by parsing the communication to look for a company identifier and/or a manufacturing identifier. When at least one of the company identifier and manufacturing identifier does not match approved identifiers (i.e., approved source device identifiers), processing logic may determine the communication data is from an unapproved device, and not authorized. When both the company identifier and manufacturing identifier match the corresponding approved identifiers, processing logic may determine that the communication data is from an approved source device, and authorized. It should be appreciated than any identifier or combination of identifiers may be used as an indication that a wireless broadcast is from an approved source device.
-
FIG. 9 illustrates a method of determining whether to re-transmit the communication data in view of a specified level of corrupted data, according to one embodiment. Themethod 900 may be performed by processing logic that comprises hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (such as instructions run on a processing device), or a combination thereof. Themethod 900 may be performed all or in part byhub module 112. As noted above, a specified level of corrupted data may refer data deemed corrupted, such as specific types of data or data from a specific source device. -
Method 900 begins atblock 905 where processing logic performing the method analyzes the communication data to determine a source device identifier and a parameter value. The analyzing ofblock 905 may be performed in a similar manner as described inblock 305 ofmethod 300 with respect toFIG. 3 , block 505 ofmethod 500 with respect toFIG. 5 , block 605 ofmethod 600 with respect toFIG. 6 , and block 805 ofmethod 800 with respect toFIG. 8 . In one example, processing logic may analyze the communication data to determine a source device identifier and a parameter value (e.g., parameter value identifier) by parsing the communication data for the source device identifier and the parameter value. The parameter value may be a numerical value of a parameter (e.g., parameter identifier). For example, a parameter value of 98° F. may be the parameter value for a temperature parameter. The parameter value may be a property of a parameter (e.g., O-type blood for the parameter, blood type). -
Method 900 continues to block 910 where processing logic identifies the source device in view of the source device identifier. For example, the source device identifier may indicate that the communication data is from an EKG device. -
Method 900 continues to block 915 where processing logic compares the parameter value to a parameter set predefined for the source device. For example, if the device identifier indicates that the communication data is from a thermometer. An administrator or developer may predefine the parameter set for the thermometer as ranging from 90° F. to 110° F. The parameter set may be numerical, if applicable. The parameter set may be a set of non-numerical values (e.g., blood types, such as O, A, etc.). If the parameter value is within the predefined parameter set, processing logic may determine to re-transmit the communication data. If the parameter value is outside the predefined parameter set, processing logic may determine not to re-transmit the communication data. -
Method 900 continues to block 920 where processing logic prevents the re-transmission of the communication data when the parameter value is outside the parameter set. Continuing the above example, processing logic may identify the parameter value (i.e., temperature) from the source device (e.g., thermometer) as 200° F., which is outside the parameter set of 90° F. to 110° F. Accordingly, processing logic may prevent the re-transmission of the communication data from the thermometer. -
FIG. 10 illustrates a diagrammatic representation of a machine in the exemplary form of acomputer system 1000 within which a set of instructions for causing the machine to perform any one or more of the methodologies discussed herein, may be executed. In alternative implementations, the machine may be connected (e.g., networked) to other machines in a LAN, an intranet, an extranet, or the Internet. The machine may operate in the capacity of a server or a client machine in a client-server network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The machine may be a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a server, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while only a single machine is illustrated, the term “machine” can also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein. - The
exemplary computer system 1000 includes a processing device (processor) 1002, a main memory 1004 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM), etc.), a static memory 1006 (e.g., flash memory, static random access memory (SRAM), etc.), and adata storage device 1018, which communicate with each other via abus 1030. -
Processing device 1002 represents one or more general-purpose processing devices such as a microprocessor, central processing unit, microcontroller, or the like. More particularly, theprocessing device 1002 may be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or a processor implementing other instruction sets or processors implementing a combination of instruction sets. Theprocessing device 1002 may also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. Theprocessing device 1002 is configured to execute instructions 1026 for performing the operations and steps discussed herein. - The
computer system 1000 may further include anetwork interface device 1022. Thecomputer system 1000 also may include a video display unit 1008 (e.g., a liquid crystal display (LCD), a cathode ray tube (CRT), or a touch screen), an alphanumeric input device 1010 (e.g., a keyboard), a cursor control device 1014 (e.g., a mouse), and a signal generation device 1016 (e.g., a speaker). - The
data storage device 1018 may include a machine-readable storage medium 1024 on which is stored one or more sets of instructions (e.g., software including hub module 112) embodying any one or more of the methodologies or functions described herein. The instructions may also reside, completely or at least partially, within themain memory 1004 and/or within theprocessing device 1002 during execution thereof by thecomputer system 1000, themain memory 1004 and theprocessing device 1002 also constituting computer-readable storage media. The instructions may further be transmitted or received over anetwork 1020 via the network interface device 1034. - While the machine-readable storage medium 1024 is shown in an exemplary implementation to be a single medium, the term “computer-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “computer-readable storage medium” can also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure. The term “computer-readable storage medium” can accordingly be taken to include, but not be limited to, solid-state memories, optical media, and magnetic media.
- In the foregoing description, numerous details are set forth. It can be apparent, however, to one of ordinary skill in the art having the benefit of this disclosure, that the present disclosure may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring the present disclosure.
- Some portions of the detailed description have been presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those that may use physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
- It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “receiving”, “authorizing”, “determining”, “transforming”, “analyzing,” “re-transmitting,” “calculating,” “delaying,” “comparing,” or the like, refer to the actions and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (e.g., electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
- Although the operations of the methods herein are shown and described in a particular order, the order of the operations of each method may be altered so that certain operations may be performed in an inverse order or so that certain operation may be performed, at least in part, concurrently with other operations of the same method and/or different method. In another embodiment, instructions or sub-operations of distinct operations may be in an intermittent and/or alternating manner. The terms “first,” “second,” “third,” “fourth,” etc. as used herein are meant as labels to distinguish among different elements and may not necessarily have an ordinal meaning according to their numerical designation.
- The disclosure also relates to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may include a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions.
- The words “example” or “exemplary” are used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “example” or “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs. Rather, use of the words “example” or “exemplary” is intended to present concepts in a concrete fashion. As used in this application, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or”. That is, unless specified otherwise, or clear from context, “X includes A or B” is intended to mean any of the natural inclusive permutations. That is, if X includes A; X includes B; or X includes both A and B, then “X includes A or B” is satisfied under any of the foregoing instances. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form. Moreover, use of the term “an embodiment” or “one embodiment” or “an implementation” or “one implementation” throughout is not intended to mean the same embodiment or implementation unless described as such.
- Reference throughout this specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, the appearances of the phrase “in one embodiment” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment. In addition, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.”
- It is to be understood that the above description is intended to be illustrative, and not restrictive. Many other implementations can be apparent to those of skill in the art upon reading and understanding the above description. The scope of the disclosure should, therefore, be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
Claims (20)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/961,735 US20160302210A1 (en) | 2015-04-10 | 2015-12-07 | Communication hub and repeaters |
US16/247,749 US10360421B1 (en) | 2015-03-02 | 2019-01-15 | Asset management using an asset tag device |
US16/519,568 US10949633B1 (en) | 2015-03-02 | 2019-07-23 | Asset management using an asset tag device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562146084P | 2015-04-10 | 2015-04-10 | |
US14/961,735 US20160302210A1 (en) | 2015-04-10 | 2015-12-07 | Communication hub and repeaters |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/961,730 Continuation US20160301690A1 (en) | 2015-03-02 | 2015-12-07 | Access control for a hard asset |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/247,749 Continuation US10360421B1 (en) | 2015-03-02 | 2019-01-15 | Asset management using an asset tag device |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160302210A1 true US20160302210A1 (en) | 2016-10-13 |
Family
ID=57111625
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/961,743 Abandoned US20160301691A1 (en) | 2015-04-10 | 2015-12-07 | Layering in user authentication |
US14/961,490 Abandoned US20160299213A1 (en) | 2015-04-10 | 2015-12-07 | Asset tags |
US14/961,730 Abandoned US20160301690A1 (en) | 2015-03-02 | 2015-12-07 | Access control for a hard asset |
US14/961,735 Abandoned US20160302210A1 (en) | 2015-03-02 | 2015-12-07 | Communication hub and repeaters |
US15/271,158 Active US9622025B2 (en) | 2015-04-10 | 2016-09-20 | Asset tags |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/961,743 Abandoned US20160301691A1 (en) | 2015-04-10 | 2015-12-07 | Layering in user authentication |
US14/961,490 Abandoned US20160299213A1 (en) | 2015-04-10 | 2015-12-07 | Asset tags |
US14/961,730 Abandoned US20160301690A1 (en) | 2015-03-02 | 2015-12-07 | Access control for a hard asset |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/271,158 Active US9622025B2 (en) | 2015-04-10 | 2016-09-20 | Asset tags |
Country Status (1)
Country | Link |
---|---|
US (5) | US20160301691A1 (en) |
Cited By (128)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190207857A1 (en) * | 2017-12-28 | 2019-07-04 | Ethicon Llc | Surgical network determination of prioritization of communication, interaction, or processing based on system or device needs |
US10849697B2 (en) | 2017-12-28 | 2020-12-01 | Ethicon Llc | Cloud interface for coupled surgical devices |
US10892899B2 (en) | 2017-12-28 | 2021-01-12 | Ethicon Llc | Self describing data packets generated at an issuing instrument |
US10898622B2 (en) | 2017-12-28 | 2021-01-26 | Ethicon Llc | Surgical evacuation system with a communication circuit for communication between a filter and a smoke evacuation device |
US10932806B2 (en) | 2017-10-30 | 2021-03-02 | Ethicon Llc | Reactive algorithm for surgical system |
US10932872B2 (en) | 2017-12-28 | 2021-03-02 | Ethicon Llc | Cloud-based medical analytics for linking of local usage trends with the resource acquisition behaviors of larger data set |
US10943454B2 (en) | 2017-12-28 | 2021-03-09 | Ethicon Llc | Detection and escalation of security responses of surgical instruments to increasing severity threats |
US10944728B2 (en) | 2017-12-28 | 2021-03-09 | Ethicon Llc | Interactive surgical systems with encrypted communication capabilities |
US10966791B2 (en) | 2017-12-28 | 2021-04-06 | Ethicon Llc | Cloud-based medical analytics for medical facility segmented individualization of instrument function |
US20210104305A1 (en) * | 2016-11-11 | 2021-04-08 | Aceso | Interactive electronic communications and control system |
US10973520B2 (en) | 2018-03-28 | 2021-04-13 | Ethicon Llc | Surgical staple cartridge with firing member driven camming assembly that has an onboard tissue cutting feature |
US10987178B2 (en) | 2017-12-28 | 2021-04-27 | Ethicon Llc | Surgical hub control arrangements |
US11013563B2 (en) | 2017-12-28 | 2021-05-25 | Ethicon Llc | Drive arrangements for robot-assisted surgical platforms |
WO2021103801A1 (en) * | 2019-11-28 | 2021-06-03 | 华为技术有限公司 | Information processing method and related device |
US11026751B2 (en) | 2017-12-28 | 2021-06-08 | Cilag Gmbh International | Display of alignment of staple cartridge to prior linear staple line |
US11026687B2 (en) | 2017-10-30 | 2021-06-08 | Cilag Gmbh International | Clip applier comprising clip advancing systems |
US11056244B2 (en) | 2017-12-28 | 2021-07-06 | Cilag Gmbh International | Automated data scaling, alignment, and organizing based on predefined parameters within surgical networks |
US11051876B2 (en) | 2017-12-28 | 2021-07-06 | Cilag Gmbh International | Surgical evacuation flow paths |
US11058498B2 (en) | 2017-12-28 | 2021-07-13 | Cilag Gmbh International | Cooperative surgical actions for robot-assisted surgical platforms |
US11069012B2 (en) | 2017-12-28 | 2021-07-20 | Cilag Gmbh International | Interactive surgical systems with condition handling of devices and data capabilities |
US11076921B2 (en) | 2017-12-28 | 2021-08-03 | Cilag Gmbh International | Adaptive control program updates for surgical hubs |
US11090047B2 (en) | 2018-03-28 | 2021-08-17 | Cilag Gmbh International | Surgical instrument comprising an adaptive control system |
US11096688B2 (en) | 2018-03-28 | 2021-08-24 | Cilag Gmbh International | Rotary driven firing members with different anvil and channel engagement features |
US11096693B2 (en) | 2017-12-28 | 2021-08-24 | Cilag Gmbh International | Adjustment of staple height of at least one row of staples based on the sensed tissue thickness or force in closing |
US11100631B2 (en) | 2017-12-28 | 2021-08-24 | Cilag Gmbh International | Use of laser light and red-green-blue coloration to determine properties of back scattered light |
US11114195B2 (en) | 2017-12-28 | 2021-09-07 | Cilag Gmbh International | Surgical instrument with a tissue marking assembly |
US11109866B2 (en) | 2017-12-28 | 2021-09-07 | Cilag Gmbh International | Method for circular stapler control algorithm adjustment based on situational awareness |
US11129611B2 (en) | 2018-03-28 | 2021-09-28 | Cilag Gmbh International | Surgical staplers with arrangements for maintaining a firing member thereof in a locked configuration unless a compatible cartridge has been installed therein |
US11132462B2 (en) | 2017-12-28 | 2021-09-28 | Cilag Gmbh International | Data stripping method to interrogate patient records and create anonymized record |
US11147607B2 (en) | 2017-12-28 | 2021-10-19 | Cilag Gmbh International | Bipolar combination device that automatically adjusts pressure based on energy modality |
US11160605B2 (en) | 2017-12-28 | 2021-11-02 | Cilag Gmbh International | Surgical evacuation sensing and motor control |
US11166772B2 (en) | 2017-12-28 | 2021-11-09 | Cilag Gmbh International | Surgical hub coordination of control and communication of operating room devices |
US11179175B2 (en) | 2017-12-28 | 2021-11-23 | Cilag Gmbh International | Controlling an ultrasonic surgical instrument according to tissue location |
US11179204B2 (en) | 2017-12-28 | 2021-11-23 | Cilag Gmbh International | Wireless pairing of a surgical device with another device within a sterile surgical field based on the usage and situational awareness of devices |
US11179208B2 (en) | 2017-12-28 | 2021-11-23 | Cilag Gmbh International | Cloud-based medical analytics for security and authentication trends and reactive measures |
US11202570B2 (en) | 2017-12-28 | 2021-12-21 | Cilag Gmbh International | Communication hub and storage device for storing parameters and status of a surgical device to be shared with cloud based analytics systems |
US11207067B2 (en) | 2018-03-28 | 2021-12-28 | Cilag Gmbh International | Surgical stapling device with separate rotary driven closure and firing systems and firing member that engages both jaws while firing |
US11219453B2 (en) | 2018-03-28 | 2022-01-11 | Cilag Gmbh International | Surgical stapling devices with cartridge compatible closure and firing lockout arrangements |
US11229436B2 (en) | 2017-10-30 | 2022-01-25 | Cilag Gmbh International | Surgical system comprising a surgical tool and a surgical hub |
US11234756B2 (en) | 2017-12-28 | 2022-02-01 | Cilag Gmbh International | Powered surgical tool with predefined adjustable control algorithm for controlling end effector parameter |
US11257589B2 (en) | 2017-12-28 | 2022-02-22 | Cilag Gmbh International | Real-time analysis of comprehensive cost of all instrumentation used in surgery utilizing data fluidity to track instruments through stocking and in-house processes |
US11253315B2 (en) | 2017-12-28 | 2022-02-22 | Cilag Gmbh International | Increasing radio frequency to create pad-less monopolar loop |
US11259830B2 (en) | 2018-03-08 | 2022-03-01 | Cilag Gmbh International | Methods for controlling temperature in ultrasonic device |
US11259807B2 (en) | 2019-02-19 | 2022-03-01 | Cilag Gmbh International | Staple cartridges with cam surfaces configured to engage primary and secondary portions of a lockout of a surgical stapling device |
US11259806B2 (en) | 2018-03-28 | 2022-03-01 | Cilag Gmbh International | Surgical stapling devices with features for blocking advancement of a camming assembly of an incompatible cartridge installed therein |
US11266468B2 (en) | 2017-12-28 | 2022-03-08 | Cilag Gmbh International | Cooperative utilization of data derived from secondary sources by intelligent surgical hubs |
US11273001B2 (en) | 2017-12-28 | 2022-03-15 | Cilag Gmbh International | Surgical hub and modular device response adjustment based on situational awareness |
US11278281B2 (en) | 2017-12-28 | 2022-03-22 | Cilag Gmbh International | Interactive surgical system |
US11278280B2 (en) | 2018-03-28 | 2022-03-22 | Cilag Gmbh International | Surgical instrument comprising a jaw closure lockout |
US11284936B2 (en) | 2017-12-28 | 2022-03-29 | Cilag Gmbh International | Surgical instrument having a flexible electrode |
US11291495B2 (en) | 2017-12-28 | 2022-04-05 | Cilag Gmbh International | Interruption of energy due to inadvertent capacitive coupling |
US11291510B2 (en) | 2017-10-30 | 2022-04-05 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US20220108783A1 (en) * | 2020-10-02 | 2022-04-07 | Ethicon Llc | Surgical hub having variable interconnectivity capabilities |
US11298148B2 (en) | 2018-03-08 | 2022-04-12 | Cilag Gmbh International | Live time tissue classification using electrical parameters |
US11308075B2 (en) | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Surgical network, instrument, and cloud responses based on validation of received dataset and authentication of its source and integrity |
US11304720B2 (en) | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Activation of energy devices |
US11304763B2 (en) | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Image capturing of the areas outside the abdomen to improve placement and control of a surgical device in use |
US11304745B2 (en) | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Surgical evacuation sensing and display |
US11304699B2 (en) | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Method for adaptive control schemes for surgical network control and interaction |
US11311306B2 (en) | 2017-12-28 | 2022-04-26 | Cilag Gmbh International | Surgical systems for detecting end effector tissue distribution irregularities |
US11311342B2 (en) | 2017-10-30 | 2022-04-26 | Cilag Gmbh International | Method for communicating with surgical instrument systems |
US11317915B2 (en) | 2019-02-19 | 2022-05-03 | Cilag Gmbh International | Universal cartridge based key feature that unlocks multiple lockout arrangements in different surgical staplers |
USD950728S1 (en) | 2019-06-25 | 2022-05-03 | Cilag Gmbh International | Surgical staple cartridge |
US11317937B2 (en) | 2018-03-08 | 2022-05-03 | Cilag Gmbh International | Determining the state of an ultrasonic end effector |
US11317919B2 (en) | 2017-10-30 | 2022-05-03 | Cilag Gmbh International | Clip applier comprising a clip crimping system |
US11324557B2 (en) | 2017-12-28 | 2022-05-10 | Cilag Gmbh International | Surgical instrument with a sensing array |
USD952144S1 (en) | 2019-06-25 | 2022-05-17 | Cilag Gmbh International | Surgical staple cartridge retainer with firing system authentication key |
US11337746B2 (en) | 2018-03-08 | 2022-05-24 | Cilag Gmbh International | Smart blade and power pulsing |
US11357503B2 (en) | 2019-02-19 | 2022-06-14 | Cilag Gmbh International | Staple cartridge retainers with frangible retention features and methods of using same |
US11364075B2 (en) | 2017-12-28 | 2022-06-21 | Cilag Gmbh International | Radio frequency energy device for delivering combined electrical signals |
US11369377B2 (en) | 2019-02-19 | 2022-06-28 | Cilag Gmbh International | Surgical stapling assembly with cartridge based retainer configured to unlock a firing lockout |
US11376002B2 (en) | 2017-12-28 | 2022-07-05 | Cilag Gmbh International | Surgical instrument cartridge sensor assemblies |
US11389164B2 (en) | 2017-12-28 | 2022-07-19 | Cilag Gmbh International | Method of using reinforced flexible circuits with multiple sensors to optimize performance of radio frequency devices |
US11410259B2 (en) | 2017-12-28 | 2022-08-09 | Cilag Gmbh International | Adaptive control program updates for surgical devices |
US11419630B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Surgical system distributed processing |
US11424027B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Method for operating surgical instrument systems |
US11423007B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Adjustment of device control programs based on stratified contextual data in addition to the data |
US11419667B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Ultrasonic energy device which varies pressure applied by clamp arm to provide threshold control pressure at a cut progression location |
US11432885B2 (en) | 2017-12-28 | 2022-09-06 | Cilag Gmbh International | Sensing arrangements for robot-assisted surgical platforms |
USD964564S1 (en) | 2019-06-25 | 2022-09-20 | Cilag Gmbh International | Surgical staple cartridge retainer with a closure system authentication key |
US11446052B2 (en) | 2017-12-28 | 2022-09-20 | Cilag Gmbh International | Variation of radio frequency and ultrasonic power level in cooperation with varying clamp arm pressure to achieve predefined heat flux or power applied to tissue |
US11464535B2 (en) | 2017-12-28 | 2022-10-11 | Cilag Gmbh International | Detection of end effector emersion in liquid |
US11464559B2 (en) | 2017-12-28 | 2022-10-11 | Cilag Gmbh International | Estimating state of ultrasonic end effector and control system therefor |
US11464511B2 (en) | 2019-02-19 | 2022-10-11 | Cilag Gmbh International | Surgical staple cartridges with movable authentication key arrangements |
US11471156B2 (en) | 2018-03-28 | 2022-10-18 | Cilag Gmbh International | Surgical stapling devices with improved rotary driven closure systems |
US11504192B2 (en) | 2014-10-30 | 2022-11-22 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US11510741B2 (en) | 2017-10-30 | 2022-11-29 | Cilag Gmbh International | Method for producing a surgical instrument comprising a smart electrical system |
US11529187B2 (en) | 2017-12-28 | 2022-12-20 | Cilag Gmbh International | Surgical evacuation sensor arrangements |
US11540855B2 (en) | 2017-12-28 | 2023-01-03 | Cilag Gmbh International | Controlling activation of an ultrasonic surgical instrument according to the presence of tissue |
US11559308B2 (en) | 2017-12-28 | 2023-01-24 | Cilag Gmbh International | Method for smart energy device infrastructure |
US11559307B2 (en) | 2017-12-28 | 2023-01-24 | Cilag Gmbh International | Method of robotic hub communication, detection, and control |
US11564756B2 (en) | 2017-10-30 | 2023-01-31 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US11571234B2 (en) | 2017-12-28 | 2023-02-07 | Cilag Gmbh International | Temperature control of ultrasonic end effector and control system therefor |
US11576677B2 (en) | 2017-12-28 | 2023-02-14 | Cilag Gmbh International | Method of hub communication, processing, display, and cloud analytics |
US11589932B2 (en) | 2017-12-28 | 2023-02-28 | Cilag Gmbh International | Usage and technique analysis of surgeon / staff performance against a baseline to optimize device utilization and performance for both current and future procedures |
US11589888B2 (en) | 2017-12-28 | 2023-02-28 | Cilag Gmbh International | Method for controlling smart energy devices |
US11596291B2 (en) | 2017-12-28 | 2023-03-07 | Cilag Gmbh International | Method of compressing tissue within a stapling device and simultaneously displaying of the location of the tissue within the jaws |
US11600395B1 (en) | 2019-03-06 | 2023-03-07 | HealthLynked Corp. | Secure patient access via healthcare service provider specific wireless access point |
US11602393B2 (en) | 2017-12-28 | 2023-03-14 | Cilag Gmbh International | Surgical evacuation sensing and generator control |
US11612444B2 (en) | 2017-12-28 | 2023-03-28 | Cilag Gmbh International | Adjustment of a surgical device function based on situational awareness |
US11659023B2 (en) | 2017-12-28 | 2023-05-23 | Cilag Gmbh International | Method of hub communication |
US11666331B2 (en) | 2017-12-28 | 2023-06-06 | Cilag Gmbh International | Systems for detecting proximity of surgical end effector to cancerous tissue |
US11696760B2 (en) | 2017-12-28 | 2023-07-11 | Cilag Gmbh International | Safety systems for smart powered surgical stapling |
US11744604B2 (en) | 2017-12-28 | 2023-09-05 | Cilag Gmbh International | Surgical instrument with a hardware-only control circuit |
US11771487B2 (en) | 2017-12-28 | 2023-10-03 | Cilag Gmbh International | Mechanisms for controlling different electromechanical systems of an electrosurgical instrument |
US11786245B2 (en) | 2017-12-28 | 2023-10-17 | Cilag Gmbh International | Surgical systems with prioritized data transmission capabilities |
US11786251B2 (en) | 2017-12-28 | 2023-10-17 | Cilag Gmbh International | Method for adaptive control schemes for surgical network control and interaction |
US11801098B2 (en) | 2017-10-30 | 2023-10-31 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US11818052B2 (en) | 2017-12-28 | 2023-11-14 | Cilag Gmbh International | Surgical network determination of prioritization of communication, interaction, or processing based on system or device needs |
US11832840B2 (en) | 2017-12-28 | 2023-12-05 | Cilag Gmbh International | Surgical instrument having a flexible circuit |
US11832899B2 (en) | 2017-12-28 | 2023-12-05 | Cilag Gmbh International | Surgical systems with autonomously adjustable control programs |
US11857152B2 (en) | 2017-12-28 | 2024-01-02 | Cilag Gmbh International | Surgical hub spatial awareness to determine devices in operating theater |
US11864728B2 (en) | 2017-12-28 | 2024-01-09 | Cilag Gmbh International | Characterization of tissue irregularities through the use of mono-chromatic light refractivity |
US11871901B2 (en) | 2012-05-20 | 2024-01-16 | Cilag Gmbh International | Method for situational awareness for surgical network or surgical network connected device capable of adjusting function based on a sensed situation or usage |
US11896322B2 (en) | 2017-12-28 | 2024-02-13 | Cilag Gmbh International | Sensing the patient position and contact utilizing the mono-polar return pad electrode to provide situational awareness to the hub |
US11896443B2 (en) | 2017-12-28 | 2024-02-13 | Cilag Gmbh International | Control of a surgical system through a surgical barrier |
US11903601B2 (en) | 2017-12-28 | 2024-02-20 | Cilag Gmbh International | Surgical instrument comprising a plurality of drive systems |
US11911045B2 (en) | 2017-10-30 | 2024-02-27 | Cllag GmbH International | Method for operating a powered articulating multi-clip applier |
US11937769B2 (en) | 2017-12-28 | 2024-03-26 | Cilag Gmbh International | Method of hub communication, processing, storage and display |
US11963683B2 (en) | 2020-10-02 | 2024-04-23 | Cilag Gmbh International | Method for operating tiered operation modes in a surgical system |
US11969216B2 (en) | 2017-12-28 | 2024-04-30 | Cilag Gmbh International | Surgical network recommendations from real time analysis of procedure variables against a baseline highlighting differences from the optimal solution |
US11998193B2 (en) | 2017-12-28 | 2024-06-04 | Cilag Gmbh International | Method for usage of the shroud as an aspect of sensing or controlling a powered surgical device, and a control algorithm to adjust its default operation |
US12029506B2 (en) | 2017-12-28 | 2024-07-09 | Cilag Gmbh International | Method of cloud based data analytics for use with the hub |
US12035890B2 (en) | 2017-12-28 | 2024-07-16 | Cilag Gmbh International | Method of sensing particulate from smoke evacuated from a patient, adjusting the pump speed based on the sensed information, and communicating the functional parameters of the system to the hub |
US12062442B2 (en) | 2017-12-28 | 2024-08-13 | Cilag Gmbh International | Method for operating surgical instrument systems |
US12127729B2 (en) | 2017-12-28 | 2024-10-29 | Cilag Gmbh International | Method for smoke evacuation for surgical hub |
US12133773B2 (en) | 2017-12-28 | 2024-11-05 | Cilag Gmbh International | Surgical hub and modular device response adjustment based on situational awareness |
US12226151B2 (en) | 2017-12-28 | 2025-02-18 | Cilag Gmbh International | Capacitive coupled return path pad with separable array elements |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9858797B2 (en) | 2015-09-22 | 2018-01-02 | International Business Machines Corporation | Tracking information technology (IT) assets |
US10028220B2 (en) | 2015-01-27 | 2018-07-17 | Locix, Inc. | Systems and methods for providing wireless asymmetric network architectures of wireless devices with power management features |
US10504364B2 (en) | 2016-01-05 | 2019-12-10 | Locix, Inc. | Systems and methods for using radio frequency signals and sensors to monitor environments |
US11030902B2 (en) | 2016-01-05 | 2021-06-08 | Locix, Inc. | Systems and methods for using radio frequency signals and sensors to monitor environments |
US10156852B2 (en) * | 2016-01-05 | 2018-12-18 | Locix, Inc. | Systems and methods for using radio frequency signals and sensors to monitor environments |
KR102389576B1 (en) * | 2016-01-08 | 2022-04-22 | 삼성전자주식회사 | Apparatus and method for detecting counterfeit advertiser in wireless communication system |
US10412700B2 (en) * | 2016-05-31 | 2019-09-10 | Infinite Leap Holdings, Llc | Portable-device-locating system that uses room-level motion sensors and RSSI measurements to determine precise room-location |
US10231078B1 (en) * | 2016-05-31 | 2019-03-12 | Infinite Leap, Inc. | Bluetooth low energy (BLE) real-time location system (RTLS) having simple transmitting tags, beacons and bridges, that use a combination of motion detection and RSSI measurements to determine room-location of the tags |
US10390182B2 (en) * | 2016-05-31 | 2019-08-20 | Infinite Leap Holdings, Llc | Real-time location system (RTLS) having tags, beacons and bridges, that uses a combination of motion detection and RSSI measurements to determine room-location of the tags |
US10455350B2 (en) | 2016-07-10 | 2019-10-22 | ZaiNar, Inc. | Method and system for radiolocation asset tracking via a mesh network |
US11213644B2 (en) * | 2016-08-24 | 2022-01-04 | Nihon Kohden Orangemed, Inc. | Multiple control interface for medical ventilator |
US9628962B1 (en) * | 2016-09-16 | 2017-04-18 | International Business Machines Corporation | Using computed travel times to intelligently attenuate beacon transmission |
US20180096179A1 (en) * | 2016-10-05 | 2018-04-05 | International Business Machines Corporation | Medical asset sensing and tracking |
US10136288B2 (en) * | 2016-10-17 | 2018-11-20 | Uber Technologies, Inc. | Determining service provider performance with ranged transmissions |
AU2019203486B2 (en) * | 2016-10-17 | 2019-09-19 | Uber Technologies, Inc. | Determining service provider behavior with ranged transmissions |
US9769166B1 (en) * | 2016-10-19 | 2017-09-19 | International Business Machines Corporation | Wearable sensor based system for person identification |
US11315685B2 (en) * | 2017-01-25 | 2022-04-26 | UCB Biopharma SRL | Method and system for predicting optimal epilepsy treatment regimes |
US10360785B2 (en) * | 2017-04-07 | 2019-07-23 | Sita Information Networking Computing Usa, Inc. | Article tracking system and method |
WO2019112916A2 (en) * | 2017-12-04 | 2019-06-13 | Meosphere Llc | An inventory management systems and method |
US11531081B2 (en) * | 2017-12-07 | 2022-12-20 | Here Global B.V. | Assisted positioning for indoor positioning services |
US20200135335A1 (en) * | 2018-10-29 | 2020-04-30 | Teletracking Technologies, Inc. | Systems and methods for integrating a globally secure communications network with stored medical diagnostics |
US10909788B2 (en) * | 2019-04-12 | 2021-02-02 | Ncr Corporation | Secure zone access control |
US11540354B2 (en) * | 2019-09-30 | 2022-12-27 | Resolution Products, Llc | Gateway with backup power and communications system |
CN112637948B (en) * | 2019-10-09 | 2023-04-14 | 深圳市优必选科技股份有限公司 | Positioning method, system, positioning label and base station |
US11798285B2 (en) * | 2019-11-26 | 2023-10-24 | Ncr Corporation | Frictionless and autonomous activity and behavioral monitoring |
US20220318896A1 (en) * | 2019-12-18 | 2022-10-06 | Wizz Systems, LLC | System and method for loss and liability prevention |
EP3910646A1 (en) * | 2020-05-11 | 2021-11-17 | Fresenius Medical Care Deutschland GmbH | Medical treatment system for identifying and authorising medical staff |
WO2021232347A1 (en) * | 2020-05-21 | 2021-11-25 | Citrix Systems, Inc. | Cross device single sign-on |
US12192197B2 (en) * | 2020-12-04 | 2025-01-07 | TruU, Inc. | Proximity based identity modulation for an identity verification system |
CN116528216A (en) * | 2022-01-20 | 2023-08-01 | 华为技术有限公司 | Communication method, device and system |
US20230379666A1 (en) | 2022-04-20 | 2023-11-23 | ZaiNar, Inc. | System and methods for asset tracking, asset grouping, and error recovery |
US12086762B2 (en) | 2022-07-01 | 2024-09-10 | Qualcomm Incorporated | Scanning for a beacon transmission from a wireless energy charging-capable device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040203748A1 (en) * | 2002-06-27 | 2004-10-14 | Martin Kappes | Location-based access control for wireless local area networks |
US20040223617A1 (en) * | 2003-05-08 | 2004-11-11 | Corcoran Kevin F. | Power line communication device and method of using the same |
US6965777B1 (en) * | 2000-11-16 | 2005-11-15 | Thomas Cast | Method of delivering short messages using a SMPP gateway with standard interface |
US20120018526A1 (en) * | 2009-03-20 | 2012-01-26 | Livia Tiba | Method of creating salt aerosol for breathing by nebulizing an aqueous saline solution |
US20120088500A1 (en) * | 2006-11-30 | 2012-04-12 | Embarq Holdings Company, Llc | System and Method for Extension of Wireless Footprint |
US20130154844A1 (en) * | 2009-05-26 | 2013-06-20 | Intelliserv, Llc | Methods for clock synchronization in wellbore instruments |
Family Cites Families (91)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5805674A (en) * | 1995-01-26 | 1998-09-08 | Anderson, Jr.; Victor C. | Security arrangement and method for controlling access to a protected system |
US6957337B1 (en) * | 1999-08-11 | 2005-10-18 | International Business Machines Corporation | Method and apparatus for secure authorization and identification using biometrics without privacy invasion |
US6988075B1 (en) * | 2000-03-15 | 2006-01-17 | Hacker L Leonard | Patient-controlled medical information system and method |
US7295988B1 (en) * | 2000-05-25 | 2007-11-13 | William Reeves | Computer system for optical scanning, storage, organization, authentication and electronic transmitting and receiving of medical records and patient information, and other sensitive legal documents |
US6976269B1 (en) * | 2000-08-29 | 2005-12-13 | Equinix, Inc. | Internet co-location facility security system |
US6804647B1 (en) * | 2001-03-13 | 2004-10-12 | Nuance Communications | Method and system for on-line unsupervised adaptation in speaker verification |
US20020138598A1 (en) * | 2001-03-22 | 2002-09-26 | International Business Machines Corporation | System and method for automatically and dynamically modifying functions of mobile devices based on positional data |
US20030225596A1 (en) * | 2002-05-31 | 2003-12-04 | Richardson Bill R. | Biometric security for access to a storage device for a healthcare facility |
US20040003081A1 (en) * | 2002-06-26 | 2004-01-01 | Microsoft Corporation | System and method for providing program credentials |
US20050288571A1 (en) * | 2002-08-20 | 2005-12-29 | Welch Allyn, Inc. | Mobile medical workstation |
AU2003291988A1 (en) * | 2002-11-04 | 2004-06-07 | Instrumentarium Corporation | Method and system for integrated processing of automatically collected interaction data |
US7237118B2 (en) * | 2002-12-05 | 2007-06-26 | Microsoft Corporation | Methods and systems for authentication of a user for sub-locations of a network location |
US7013365B2 (en) * | 2003-06-16 | 2006-03-14 | Michael Arnouse | System of secure personal identification, information processing, and precise point of contact location and timing |
US7043754B2 (en) * | 2003-06-12 | 2006-05-09 | Michael Arnouse | Method of secure personal identification, information processing, and precise point of contact location and timing |
US7559081B2 (en) * | 2003-09-18 | 2009-07-07 | Alcatel-Lucent Usa Inc. | Method and apparatus for authenticating a user at an access terminal |
US20050210270A1 (en) * | 2004-03-19 | 2005-09-22 | Ceelox, Inc. | Method for authenticating a user profile for providing user access to restricted information based upon biometric confirmation |
US20050277872A1 (en) * | 2004-05-24 | 2005-12-15 | Colby John E Jr | Apparatus and method for mobile medical services |
US20060026043A1 (en) * | 2004-07-30 | 2006-02-02 | Schneider John K | Medical records system and method |
US7739038B2 (en) * | 2004-12-17 | 2010-06-15 | Information Patterns Llc | Methods and apparatus for geo-collaboration |
EP1708527A1 (en) * | 2005-03-31 | 2006-10-04 | BRITISH TELECOMMUNICATIONS public limited company | Location based authentication |
US7607014B2 (en) * | 2005-06-30 | 2009-10-20 | Hewlett-Packard Development Company, L.P. | Authenticating maintenance access to an electronics unit via wireless communication |
US8275397B2 (en) * | 2005-07-14 | 2012-09-25 | Huston Charles D | GPS based friend location and identification system and method |
JP4645411B2 (en) * | 2005-10-28 | 2011-03-09 | コニカミノルタホールディングス株式会社 | Authentication system, registration system and program |
US20080186138A1 (en) * | 2005-12-09 | 2008-08-07 | Butler Timothy P | Methods and systems of a multiple radio frequency network node rfid tag |
US8947233B2 (en) * | 2005-12-09 | 2015-02-03 | Tego Inc. | Methods and systems of a multiple radio frequency network node RFID tag |
WO2007068002A2 (en) * | 2005-12-09 | 2007-06-14 | Tego Inc. | Multiple radio frequency network node rfid tag |
US8242908B2 (en) * | 2005-12-09 | 2012-08-14 | Tego Inc. | Methods and systems of a multiple radio frequency network node RFID tag |
WO2007089503A2 (en) * | 2006-01-26 | 2007-08-09 | Imprivata, Inc. | Systems and methods for multi-factor authentication |
JP4547629B2 (en) * | 2006-02-10 | 2010-09-22 | ソニー株式会社 | Registration device, registration method, and registration program |
WO2007117606A2 (en) * | 2006-04-07 | 2007-10-18 | Pelago, Inc. | Proximity-based user interaction |
WO2007127338A2 (en) * | 2006-04-27 | 2007-11-08 | Bruce Reiner | Apparatus and method for utilizing biometrics in medical applications |
US20070295807A1 (en) * | 2006-06-27 | 2007-12-27 | Antos Kenneth M | Biometric and geographic location system and method of use |
US7689682B1 (en) * | 2006-08-16 | 2010-03-30 | Resource Consortium Limited | Obtaining lists of nodes of a multi-dimensional network |
EP2053777B1 (en) * | 2006-08-18 | 2016-01-13 | Huawei Technologies Co., Ltd. | A certification method, system, and device |
JP5151102B2 (en) * | 2006-09-14 | 2013-02-27 | ヤマハ株式会社 | Voice authentication apparatus, voice authentication method and program |
EP2084637A2 (en) * | 2006-10-24 | 2009-08-05 | Medapps, Inc. | Systems and methods for adapter-based communication with a medical device |
US20090007248A1 (en) * | 2007-01-18 | 2009-01-01 | Michael Kovaleski | Single sign-on system and method |
JP5012092B2 (en) * | 2007-03-02 | 2012-08-29 | 富士通株式会社 | Biometric authentication device, biometric authentication program, and combined biometric authentication method |
US7868754B2 (en) * | 2007-09-26 | 2011-01-11 | S.I.P. Holdings, Llc | Medical system and tracking device |
US20090097623A1 (en) * | 2007-10-10 | 2009-04-16 | Gowrishankar Bharadwaj | Remote Patient Handset and System for Remote Collection of Bio-Metric Data and Device Control |
US8887307B2 (en) * | 2007-10-12 | 2014-11-11 | Broadcom Corporation | Method and system for using location information acquired from GPS for secure authentication |
JP2009211556A (en) * | 2008-03-05 | 2009-09-17 | Fujitsu Ltd | Biometric authentication apparatus |
US20090300704A1 (en) * | 2008-05-27 | 2009-12-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Presentity Rules for Location Authorization in a Communication System |
US9391779B2 (en) * | 2008-07-28 | 2016-07-12 | International Business Machines Corporation | Reactive biometric single sign-on utility |
US20100071044A1 (en) * | 2008-09-17 | 2010-03-18 | Taussif Khan | Method for tracking location of patients and doctors in a medical office or hospital practice |
JP4933519B2 (en) * | 2008-12-16 | 2012-05-16 | レノボ・シンガポール・プライベート・リミテッド | Computer with biometric authentication device |
US8621554B1 (en) * | 2009-05-01 | 2013-12-31 | Google Inc. | User privacy framework |
US8544751B2 (en) * | 2009-08-03 | 2013-10-01 | Mehrnaz Nicole Jamali | System and method for managing a medical procedure site with a machine readable marking |
US8441367B1 (en) * | 2009-11-10 | 2013-05-14 | Google Inc. | System and method of alerting users based on proximity |
US9595013B2 (en) * | 2009-12-10 | 2017-03-14 | Equinix, Inc. | Delegated and restricted asset-based permissions management for co-location facilities |
US20110288874A1 (en) * | 2010-05-18 | 2011-11-24 | Midamerican Healthcare Inc. | System and Method for Providing Authentication of Medical Data Through Biometric Identifier |
US20120050046A1 (en) * | 2010-09-01 | 2012-03-01 | Harris Corporation | Systems and methods for monitoring physical, biological and chemical characteristics of a person, animal, object and/or surrounding environment |
WO2012073119A2 (en) * | 2010-11-30 | 2012-06-07 | France Telecom | Phr/emr retrieval system based on body part recognition and method of operation thereof |
US20120198570A1 (en) * | 2011-02-01 | 2012-08-02 | Bank Of America Corporation | Geo-Enabled Access Control |
WO2012127577A1 (en) * | 2011-03-18 | 2012-09-27 | 富士通フロンテック株式会社 | Verification device, verification program, and verification method |
JP2014519634A (en) * | 2011-04-28 | 2014-08-14 | インターデイジタル パテント ホールディングス インコーポレイテッド | SSO framework for multiple SSO technologies |
US8676937B2 (en) * | 2011-05-12 | 2014-03-18 | Jeffrey Alan Rapaport | Social-topical adaptive networking (STAN) system allowing for group based contextual transaction offers and acceptances and hot topic watchdogging |
US9177125B2 (en) * | 2011-05-27 | 2015-11-03 | Microsoft Technology Licensing, Llc | Protection from unfamiliar login locations |
US20130173467A1 (en) * | 2011-12-29 | 2013-07-04 | Ebay Inc. | Methods and systems for using a co-located group as an authorization mechanism |
US9626446B2 (en) * | 2012-03-07 | 2017-04-18 | Snap Trends, Inc. | Methods and systems of advertising based on aggregated information of social networks within geographical locations via a network |
US20130262155A1 (en) * | 2012-04-03 | 2013-10-03 | Thomas J. HinKamp | System and method for collection and distibution of medical information |
US8595799B2 (en) * | 2012-04-18 | 2013-11-26 | Hewlett-Packard Development Company, L.P. | Access authorization |
EP2841963A4 (en) * | 2012-04-24 | 2016-05-25 | Iloc Technologies Inc | Apparatus and methods for geolocating an individual with respect to a perimeter |
US8983435B2 (en) * | 2012-10-08 | 2015-03-17 | Wavemarket, Inc. | System and method for providing an alert based on user location |
US20140261058A1 (en) * | 2013-03-15 | 2014-09-18 | Mckesson Automation Inc. | Apparatuses, systems, and methods for anticipating and delivering medications from a central pharmacy to a patient using a track based transport system |
US20140108028A1 (en) * | 2012-10-12 | 2014-04-17 | Mckesson Automation Inc. | Apparatuses, systems, and methods for anticipating and delivering medications from a central pharmacy to a patient in a healthcare facility |
US20140122053A1 (en) * | 2012-10-25 | 2014-05-01 | Mirel Lotan | System and method for providing worldwide real-time personal medical information |
US9589127B2 (en) * | 2013-03-08 | 2017-03-07 | Open Text Sa Ulc | System and method for collaborative authentication |
US9021358B2 (en) * | 2013-03-15 | 2015-04-28 | eagleyemed, Inc. | Multi-site video based computer aided diagnostic and analytical platform |
US20140337053A1 (en) * | 2013-03-15 | 2014-11-13 | Virtual Viewbox, Inc. | "Meaningful-Use"-Compliant, Single Login, Federated Patient Portal System and Methods |
US9378386B1 (en) * | 2013-03-15 | 2016-06-28 | Microstrategy Incorporated | Content sharing technology |
US20140329536A1 (en) * | 2013-05-01 | 2014-11-06 | Qualcomm Incorporated | Synthetic wideband ranging design |
US9366748B2 (en) * | 2013-06-12 | 2016-06-14 | Qualcomm Incorporated | Position location system architecture: peer to peer measurement mode |
WO2014201164A2 (en) * | 2013-06-13 | 2014-12-18 | NaviNet, Inc. | Systems, methods, and environment for identification and processing of medical events |
US20150066916A1 (en) * | 2013-08-27 | 2015-03-05 | Snap Trends, Inc. | Methods and systems of aggregating information of geographical relation networks based on geographical locations of social network communications via a network |
US9477991B2 (en) * | 2013-08-27 | 2016-10-25 | Snap Trends, Inc. | Methods and systems of aggregating information of geographic context regions of social networks based on geographical locations via a network |
US9350717B1 (en) * | 2013-09-23 | 2016-05-24 | Amazon Technologies, Inc. | Location service for user authentication |
US20150113074A1 (en) * | 2013-10-17 | 2015-04-23 | Forever Ventures, LLC | System and method for social introductions |
US20150178846A1 (en) * | 2013-11-19 | 2015-06-25 | Fmr Llc | Deferred Income Annuity Structure Planning Tool Apparatuses, Methods and Systems |
US20150168543A1 (en) * | 2013-12-13 | 2015-06-18 | Qualcomm Incorporated | Positioning system ranging measurement |
US20150169911A1 (en) * | 2013-12-13 | 2015-06-18 | Qualcomm Incorporated | Position location system architecture: filtering position fixes |
US9569605B1 (en) * | 2014-02-12 | 2017-02-14 | Symantec Corporation | Systems and methods for enabling biometric authentication options |
US9560413B2 (en) * | 2014-02-24 | 2017-01-31 | Rovi Guides, Inc. | Systems and methods for notifying a user when activity level exceeds an authorization level |
US9832648B2 (en) * | 2014-03-11 | 2017-11-28 | Alcatel Lucent | Access control of geo-fenced services using co-located witnesses |
US10147102B2 (en) * | 2014-03-31 | 2018-12-04 | Paypal, Inc. | Person/group check-in system |
US9257120B1 (en) * | 2014-07-18 | 2016-02-09 | Google Inc. | Speaker verification using co-location information |
US9330235B2 (en) * | 2014-08-08 | 2016-05-03 | James F. Walton, III | System and method for providing access to electronically stored medical information |
US9818225B2 (en) * | 2014-09-30 | 2017-11-14 | Sony Interactive Entertainment Inc. | Synchronizing multiple head-mounted displays to a unified space and correlating movement of objects in the unified space |
US20160150041A1 (en) * | 2014-11-20 | 2016-05-26 | General Electric Company | Method, system, and program storage device for unified content storage in session-based services |
US20160234651A1 (en) * | 2015-02-05 | 2016-08-11 | Forever Ventures, LLC | System and method for social introductions |
US10701120B2 (en) * | 2015-03-06 | 2020-06-30 | Disney Enterprises, Inc. | Proximity based entitlement sharing |
-
2015
- 2015-12-07 US US14/961,743 patent/US20160301691A1/en not_active Abandoned
- 2015-12-07 US US14/961,490 patent/US20160299213A1/en not_active Abandoned
- 2015-12-07 US US14/961,730 patent/US20160301690A1/en not_active Abandoned
- 2015-12-07 US US14/961,735 patent/US20160302210A1/en not_active Abandoned
-
2016
- 2016-09-20 US US15/271,158 patent/US9622025B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6965777B1 (en) * | 2000-11-16 | 2005-11-15 | Thomas Cast | Method of delivering short messages using a SMPP gateway with standard interface |
US20040203748A1 (en) * | 2002-06-27 | 2004-10-14 | Martin Kappes | Location-based access control for wireless local area networks |
US20040223617A1 (en) * | 2003-05-08 | 2004-11-11 | Corcoran Kevin F. | Power line communication device and method of using the same |
US20120088500A1 (en) * | 2006-11-30 | 2012-04-12 | Embarq Holdings Company, Llc | System and Method for Extension of Wireless Footprint |
US20120018526A1 (en) * | 2009-03-20 | 2012-01-26 | Livia Tiba | Method of creating salt aerosol for breathing by nebulizing an aqueous saline solution |
US20130154844A1 (en) * | 2009-05-26 | 2013-06-20 | Intelliserv, Llc | Methods for clock synchronization in wellbore instruments |
Cited By (235)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11871901B2 (en) | 2012-05-20 | 2024-01-16 | Cilag Gmbh International | Method for situational awareness for surgical network or surgical network connected device capable of adjusting function based on a sensed situation or usage |
US11504192B2 (en) | 2014-10-30 | 2022-11-22 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US11676689B2 (en) * | 2016-11-11 | 2023-06-13 | Aceso | Interactive electronic communications and control system |
US20210104305A1 (en) * | 2016-11-11 | 2021-04-08 | Aceso | Interactive electronic communications and control system |
US11602366B2 (en) | 2017-10-30 | 2023-03-14 | Cilag Gmbh International | Surgical suturing instrument configured to manipulate tissue using mechanical and electrical power |
US11564703B2 (en) | 2017-10-30 | 2023-01-31 | Cilag Gmbh International | Surgical suturing instrument comprising a capture width which is larger than trocar diameter |
US10932806B2 (en) | 2017-10-30 | 2021-03-02 | Ethicon Llc | Reactive algorithm for surgical system |
US11925373B2 (en) | 2017-10-30 | 2024-03-12 | Cilag Gmbh International | Surgical suturing instrument comprising a non-circular needle |
US11819231B2 (en) | 2017-10-30 | 2023-11-21 | Cilag Gmbh International | Adaptive control programs for a surgical system comprising more than one type of cartridge |
US11051836B2 (en) | 2017-10-30 | 2021-07-06 | Cilag Gmbh International | Surgical clip applier comprising an empty clip cartridge lockout |
US10959744B2 (en) | 2017-10-30 | 2021-03-30 | Ethicon Llc | Surgical dissectors and manufacturing techniques |
US11793537B2 (en) | 2017-10-30 | 2023-10-24 | Cilag Gmbh International | Surgical instrument comprising an adaptive electrical system |
US12035983B2 (en) | 2017-10-30 | 2024-07-16 | Cilag Gmbh International | Method for producing a surgical instrument comprising a smart electrical system |
US11759224B2 (en) | 2017-10-30 | 2023-09-19 | Cilag Gmbh International | Surgical instrument systems comprising handle arrangements |
US10980560B2 (en) | 2017-10-30 | 2021-04-20 | Ethicon Llc | Surgical instrument systems comprising feedback mechanisms |
US11696778B2 (en) | 2017-10-30 | 2023-07-11 | Cilag Gmbh International | Surgical dissectors configured to apply mechanical and electrical energy |
US12059218B2 (en) | 2017-10-30 | 2024-08-13 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US11648022B2 (en) | 2017-10-30 | 2023-05-16 | Cilag Gmbh International | Surgical instrument systems comprising battery arrangements |
US11026712B2 (en) | 2017-10-30 | 2021-06-08 | Cilag Gmbh International | Surgical instruments comprising a shifting mechanism |
US11026713B2 (en) | 2017-10-30 | 2021-06-08 | Cilag Gmbh International | Surgical clip applier configured to store clips in a stored state |
US11141160B2 (en) | 2017-10-30 | 2021-10-12 | Cilag Gmbh International | Clip applier comprising a motor controller |
US11026687B2 (en) | 2017-10-30 | 2021-06-08 | Cilag Gmbh International | Clip applier comprising clip advancing systems |
US11911045B2 (en) | 2017-10-30 | 2024-02-27 | Cllag GmbH International | Method for operating a powered articulating multi-clip applier |
US11045197B2 (en) | 2017-10-30 | 2021-06-29 | Cilag Gmbh International | Clip applier comprising a movable clip magazine |
US11801098B2 (en) | 2017-10-30 | 2023-10-31 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US11564756B2 (en) | 2017-10-30 | 2023-01-31 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US11510741B2 (en) | 2017-10-30 | 2022-11-29 | Cilag Gmbh International | Method for producing a surgical instrument comprising a smart electrical system |
US12121255B2 (en) | 2017-10-30 | 2024-10-22 | Cilag Gmbh International | Electrical power output control based on mechanical forces |
US11413042B2 (en) | 2017-10-30 | 2022-08-16 | Cilag Gmbh International | Clip applier comprising a reciprocating clip advancing member |
US11071560B2 (en) | 2017-10-30 | 2021-07-27 | Cilag Gmbh International | Surgical clip applier comprising adaptive control in response to a strain gauge circuit |
US11406390B2 (en) | 2017-10-30 | 2022-08-09 | Cilag Gmbh International | Clip applier comprising interchangeable clip reloads |
US11317919B2 (en) | 2017-10-30 | 2022-05-03 | Cilag Gmbh International | Clip applier comprising a clip crimping system |
US11311342B2 (en) | 2017-10-30 | 2022-04-26 | Cilag Gmbh International | Method for communicating with surgical instrument systems |
US11291465B2 (en) | 2017-10-30 | 2022-04-05 | Cilag Gmbh International | Surgical instruments comprising a lockable end effector socket |
US11291510B2 (en) | 2017-10-30 | 2022-04-05 | Cilag Gmbh International | Method of hub communication with surgical instrument systems |
US11103268B2 (en) | 2017-10-30 | 2021-08-31 | Cilag Gmbh International | Surgical clip applier comprising adaptive firing control |
US11229436B2 (en) | 2017-10-30 | 2022-01-25 | Cilag Gmbh International | Surgical system comprising a surgical tool and a surgical hub |
US11207090B2 (en) | 2017-10-30 | 2021-12-28 | Cilag Gmbh International | Surgical instruments comprising a biased shifting mechanism |
US11109878B2 (en) | 2017-10-30 | 2021-09-07 | Cilag Gmbh International | Surgical clip applier comprising an automatic clip feeding system |
US11123070B2 (en) | 2017-10-30 | 2021-09-21 | Cilag Gmbh International | Clip applier comprising a rotatable clip magazine |
US11129636B2 (en) | 2017-10-30 | 2021-09-28 | Cilag Gmbh International | Surgical instruments comprising an articulation drive that provides for high articulation angles |
US11234756B2 (en) | 2017-12-28 | 2022-02-01 | Cilag Gmbh International | Powered surgical tool with predefined adjustable control algorithm for controlling end effector parameter |
US11890065B2 (en) | 2017-12-28 | 2024-02-06 | Cilag Gmbh International | Surgical system to limit displacement |
US12256995B2 (en) | 2017-12-28 | 2025-03-25 | Cilag Gmbh International | Surgical network recommendations from real time analysis of procedure variables against a baseline highlighting differences from the optimal solution |
US11147607B2 (en) | 2017-12-28 | 2021-10-19 | Cilag Gmbh International | Bipolar combination device that automatically adjusts pressure based on energy modality |
US11160605B2 (en) | 2017-12-28 | 2021-11-02 | Cilag Gmbh International | Surgical evacuation sensing and motor control |
US11166772B2 (en) | 2017-12-28 | 2021-11-09 | Cilag Gmbh International | Surgical hub coordination of control and communication of operating room devices |
US12239320B2 (en) | 2017-12-28 | 2025-03-04 | Cilag Gmbh International | Method of using reinforced flexible circuits with multiple sensors to optimize performance of radio frequency devices |
US11179175B2 (en) | 2017-12-28 | 2021-11-23 | Cilag Gmbh International | Controlling an ultrasonic surgical instrument according to tissue location |
US11179204B2 (en) | 2017-12-28 | 2021-11-23 | Cilag Gmbh International | Wireless pairing of a surgical device with another device within a sterile surgical field based on the usage and situational awareness of devices |
US11179208B2 (en) | 2017-12-28 | 2021-11-23 | Cilag Gmbh International | Cloud-based medical analytics for security and authentication trends and reactive measures |
US12232729B2 (en) | 2017-12-28 | 2025-02-25 | Cilag Gmbh International | Systems for detecting proximity of surgical end effector to cancerous tissue |
US11202570B2 (en) | 2017-12-28 | 2021-12-21 | Cilag Gmbh International | Communication hub and storage device for storing parameters and status of a surgical device to be shared with cloud based analytics systems |
US12226151B2 (en) | 2017-12-28 | 2025-02-18 | Cilag Gmbh International | Capacitive coupled return path pad with separable array elements |
US11109866B2 (en) | 2017-12-28 | 2021-09-07 | Cilag Gmbh International | Method for circular stapler control algorithm adjustment based on situational awareness |
US12226166B2 (en) | 2017-12-28 | 2025-02-18 | Cilag Gmbh International | Surgical instrument with a sensing array |
US11213359B2 (en) | 2017-12-28 | 2022-01-04 | Cilag Gmbh International | Controllers for robot-assisted surgical platforms |
US12207817B2 (en) | 2017-12-28 | 2025-01-28 | Cilag Gmbh International | Safety systems for smart powered surgical stapling |
US11114195B2 (en) | 2017-12-28 | 2021-09-07 | Cilag Gmbh International | Surgical instrument with a tissue marking assembly |
US20190207857A1 (en) * | 2017-12-28 | 2019-07-04 | Ethicon Llc | Surgical network determination of prioritization of communication, interaction, or processing based on system or device needs |
US11257589B2 (en) | 2017-12-28 | 2022-02-22 | Cilag Gmbh International | Real-time analysis of comprehensive cost of all instrumentation used in surgery utilizing data fluidity to track instruments through stocking and in-house processes |
US11253315B2 (en) | 2017-12-28 | 2022-02-22 | Cilag Gmbh International | Increasing radio frequency to create pad-less monopolar loop |
US12193636B2 (en) | 2017-12-28 | 2025-01-14 | Cilag Gmbh International | Characterization of tissue irregularities through the use of mono-chromatic light refractivity |
US12193766B2 (en) | 2017-12-28 | 2025-01-14 | Cilag Gmbh International | Situationally aware surgical system configured for use during a surgical procedure |
US12144518B2 (en) | 2017-12-28 | 2024-11-19 | Cilag Gmbh International | Surgical systems for detecting end effector tissue distribution irregularities |
US11266468B2 (en) | 2017-12-28 | 2022-03-08 | Cilag Gmbh International | Cooperative utilization of data derived from secondary sources by intelligent surgical hubs |
US11273001B2 (en) | 2017-12-28 | 2022-03-15 | Cilag Gmbh International | Surgical hub and modular device response adjustment based on situational awareness |
US12137991B2 (en) | 2017-12-28 | 2024-11-12 | Cilag Gmbh International | Display arrangements for robot-assisted surgical platforms |
US11278281B2 (en) | 2017-12-28 | 2022-03-22 | Cilag Gmbh International | Interactive surgical system |
US12133660B2 (en) | 2017-12-28 | 2024-11-05 | Cilag Gmbh International | Controlling a temperature of an ultrasonic electromechanical blade according to frequency |
US11284936B2 (en) | 2017-12-28 | 2022-03-29 | Cilag Gmbh International | Surgical instrument having a flexible electrode |
US11291495B2 (en) | 2017-12-28 | 2022-04-05 | Cilag Gmbh International | Interruption of energy due to inadvertent capacitive coupling |
US12133773B2 (en) | 2017-12-28 | 2024-11-05 | Cilag Gmbh International | Surgical hub and modular device response adjustment based on situational awareness |
US12133709B2 (en) | 2017-12-28 | 2024-11-05 | Cilag Gmbh International | Communication hub and storage device for storing parameters and status of a surgical device to be shared with cloud based analytics systems |
US11100631B2 (en) | 2017-12-28 | 2021-08-24 | Cilag Gmbh International | Use of laser light and red-green-blue coloration to determine properties of back scattered light |
US11096693B2 (en) | 2017-12-28 | 2021-08-24 | Cilag Gmbh International | Adjustment of staple height of at least one row of staples based on the sensed tissue thickness or force in closing |
US12127729B2 (en) | 2017-12-28 | 2024-10-29 | Cilag Gmbh International | Method for smoke evacuation for surgical hub |
CN111819633A (en) * | 2017-12-28 | 2020-10-23 | 爱惜康有限责任公司 | Surgical network determination of prioritization of communications, interactions or processing based on system or device requirements |
US12096916B2 (en) | 2017-12-28 | 2024-09-24 | Cilag Gmbh International | Method of sensing particulate from smoke evacuated from a patient, adjusting the pump speed based on the sensed information, and communicating the functional parameters of the system to the hub |
US12096985B2 (en) | 2017-12-28 | 2024-09-24 | Cilag Gmbh International | Surgical network recommendations from real time analysis of procedure variables against a baseline highlighting differences from the optimal solution |
US11308075B2 (en) | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Surgical network, instrument, and cloud responses based on validation of received dataset and authentication of its source and integrity |
US11304720B2 (en) | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Activation of energy devices |
US11304763B2 (en) | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Image capturing of the areas outside the abdomen to improve placement and control of a surgical device in use |
US11304745B2 (en) | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Surgical evacuation sensing and display |
US11304699B2 (en) | 2017-12-28 | 2022-04-19 | Cilag Gmbh International | Method for adaptive control schemes for surgical network control and interaction |
US11311306B2 (en) | 2017-12-28 | 2022-04-26 | Cilag Gmbh International | Surgical systems for detecting end effector tissue distribution irregularities |
US12076010B2 (en) | 2017-12-28 | 2024-09-03 | Cilag Gmbh International | Surgical instrument cartridge sensor assemblies |
US12059169B2 (en) | 2017-12-28 | 2024-08-13 | Cilag Gmbh International | Controlling an ultrasonic surgical instrument according to tissue location |
US12059124B2 (en) | 2017-12-28 | 2024-08-13 | Cilag Gmbh International | Surgical hub spatial awareness to determine devices in operating theater |
US10849697B2 (en) | 2017-12-28 | 2020-12-01 | Ethicon Llc | Cloud interface for coupled surgical devices |
US12062442B2 (en) | 2017-12-28 | 2024-08-13 | Cilag Gmbh International | Method for operating surgical instrument systems |
US11324557B2 (en) | 2017-12-28 | 2022-05-10 | Cilag Gmbh International | Surgical instrument with a sensing array |
US12053159B2 (en) | 2017-12-28 | 2024-08-06 | Cilag Gmbh International | Method of sensing particulate from smoke evacuated from a patient, adjusting the pump speed based on the sensed information, and communicating the functional parameters of the system to the hub |
US12048496B2 (en) | 2017-12-28 | 2024-07-30 | Cilag Gmbh International | Adaptive control program updates for surgical hubs |
US12042207B2 (en) | 2017-12-28 | 2024-07-23 | Cilag Gmbh International | Estimating state of ultrasonic end effector and control system therefor |
US10892995B2 (en) * | 2017-12-28 | 2021-01-12 | Ethicon Llc | Surgical network determination of prioritization of communication, interaction, or processing based on system or device needs |
US12035890B2 (en) | 2017-12-28 | 2024-07-16 | Cilag Gmbh International | Method of sensing particulate from smoke evacuated from a patient, adjusting the pump speed based on the sensed information, and communicating the functional parameters of the system to the hub |
US12029506B2 (en) | 2017-12-28 | 2024-07-09 | Cilag Gmbh International | Method of cloud based data analytics for use with the hub |
US11364075B2 (en) | 2017-12-28 | 2022-06-21 | Cilag Gmbh International | Radio frequency energy device for delivering combined electrical signals |
US12009095B2 (en) | 2017-12-28 | 2024-06-11 | Cilag Gmbh International | Real-time analysis of comprehensive cost of all instrumentation used in surgery utilizing data fluidity to track instruments through stocking and in-house processes |
US11376002B2 (en) | 2017-12-28 | 2022-07-05 | Cilag Gmbh International | Surgical instrument cartridge sensor assemblies |
US11382697B2 (en) | 2017-12-28 | 2022-07-12 | Cilag Gmbh International | Surgical instruments comprising button circuits |
US11389164B2 (en) | 2017-12-28 | 2022-07-19 | Cilag Gmbh International | Method of using reinforced flexible circuits with multiple sensors to optimize performance of radio frequency devices |
US11998193B2 (en) | 2017-12-28 | 2024-06-04 | Cilag Gmbh International | Method for usage of the shroud as an aspect of sensing or controlling a powered surgical device, and a control algorithm to adjust its default operation |
US11969142B2 (en) | 2017-12-28 | 2024-04-30 | Cilag Gmbh International | Method of compressing tissue within a stapling device and simultaneously displaying the location of the tissue within the jaws |
US11076921B2 (en) | 2017-12-28 | 2021-08-03 | Cilag Gmbh International | Adaptive control program updates for surgical hubs |
US11969216B2 (en) | 2017-12-28 | 2024-04-30 | Cilag Gmbh International | Surgical network recommendations from real time analysis of procedure variables against a baseline highlighting differences from the optimal solution |
US11410259B2 (en) | 2017-12-28 | 2022-08-09 | Cilag Gmbh International | Adaptive control program updates for surgical devices |
US11069012B2 (en) | 2017-12-28 | 2021-07-20 | Cilag Gmbh International | Interactive surgical systems with condition handling of devices and data capabilities |
US11419630B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Surgical system distributed processing |
US11424027B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Method for operating surgical instrument systems |
US11423007B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Adjustment of device control programs based on stratified contextual data in addition to the data |
US11419667B2 (en) | 2017-12-28 | 2022-08-23 | Cilag Gmbh International | Ultrasonic energy device which varies pressure applied by clamp arm to provide threshold control pressure at a cut progression location |
US11432885B2 (en) | 2017-12-28 | 2022-09-06 | Cilag Gmbh International | Sensing arrangements for robot-assisted surgical platforms |
US11937769B2 (en) | 2017-12-28 | 2024-03-26 | Cilag Gmbh International | Method of hub communication, processing, storage and display |
US11446052B2 (en) | 2017-12-28 | 2022-09-20 | Cilag Gmbh International | Variation of radio frequency and ultrasonic power level in cooperation with varying clamp arm pressure to achieve predefined heat flux or power applied to tissue |
US11931110B2 (en) | 2017-12-28 | 2024-03-19 | Cilag Gmbh International | Surgical instrument comprising a control system that uses input from a strain gage circuit |
US11464535B2 (en) | 2017-12-28 | 2022-10-11 | Cilag Gmbh International | Detection of end effector emersion in liquid |
US11464559B2 (en) | 2017-12-28 | 2022-10-11 | Cilag Gmbh International | Estimating state of ultrasonic end effector and control system therefor |
US10892899B2 (en) | 2017-12-28 | 2021-01-12 | Ethicon Llc | Self describing data packets generated at an issuing instrument |
US11918302B2 (en) | 2017-12-28 | 2024-03-05 | Cilag Gmbh International | Sterile field interactive control displays |
US10898622B2 (en) | 2017-12-28 | 2021-01-26 | Ethicon Llc | Surgical evacuation system with a communication circuit for communication between a filter and a smoke evacuation device |
US11058498B2 (en) | 2017-12-28 | 2021-07-13 | Cilag Gmbh International | Cooperative surgical actions for robot-assisted surgical platforms |
US11051876B2 (en) | 2017-12-28 | 2021-07-06 | Cilag Gmbh International | Surgical evacuation flow paths |
US11903587B2 (en) | 2017-12-28 | 2024-02-20 | Cilag Gmbh International | Adjustment to the surgical stapling control based on situational awareness |
US11529187B2 (en) | 2017-12-28 | 2022-12-20 | Cilag Gmbh International | Surgical evacuation sensor arrangements |
US11903601B2 (en) | 2017-12-28 | 2024-02-20 | Cilag Gmbh International | Surgical instrument comprising a plurality of drive systems |
US11540855B2 (en) | 2017-12-28 | 2023-01-03 | Cilag Gmbh International | Controlling activation of an ultrasonic surgical instrument according to the presence of tissue |
US11559308B2 (en) | 2017-12-28 | 2023-01-24 | Cilag Gmbh International | Method for smart energy device infrastructure |
US11559307B2 (en) | 2017-12-28 | 2023-01-24 | Cilag Gmbh International | Method of robotic hub communication, detection, and control |
US11056244B2 (en) | 2017-12-28 | 2021-07-06 | Cilag Gmbh International | Automated data scaling, alignment, and organizing based on predefined parameters within surgical networks |
US11045591B2 (en) | 2017-12-28 | 2021-06-29 | Cilag Gmbh International | Dual in-series large and small droplet filters |
US11571234B2 (en) | 2017-12-28 | 2023-02-07 | Cilag Gmbh International | Temperature control of ultrasonic end effector and control system therefor |
US11576677B2 (en) | 2017-12-28 | 2023-02-14 | Cilag Gmbh International | Method of hub communication, processing, display, and cloud analytics |
US11589932B2 (en) | 2017-12-28 | 2023-02-28 | Cilag Gmbh International | Usage and technique analysis of surgeon / staff performance against a baseline to optimize device utilization and performance for both current and future procedures |
US11896443B2 (en) | 2017-12-28 | 2024-02-13 | Cilag Gmbh International | Control of a surgical system through a surgical barrier |
US11896322B2 (en) | 2017-12-28 | 2024-02-13 | Cilag Gmbh International | Sensing the patient position and contact utilizing the mono-polar return pad electrode to provide situational awareness to the hub |
US11589888B2 (en) | 2017-12-28 | 2023-02-28 | Cilag Gmbh International | Method for controlling smart energy devices |
US11601371B2 (en) | 2017-12-28 | 2023-03-07 | Cilag Gmbh International | Surgical network determination of prioritization of communication, interaction, or processing based on system or device needs |
US11596291B2 (en) | 2017-12-28 | 2023-03-07 | Cilag Gmbh International | Method of compressing tissue within a stapling device and simultaneously displaying of the location of the tissue within the jaws |
US11132462B2 (en) | 2017-12-28 | 2021-09-28 | Cilag Gmbh International | Data stripping method to interrogate patient records and create anonymized record |
US11602393B2 (en) | 2017-12-28 | 2023-03-14 | Cilag Gmbh International | Surgical evacuation sensing and generator control |
US11026751B2 (en) | 2017-12-28 | 2021-06-08 | Cilag Gmbh International | Display of alignment of staple cartridge to prior linear staple line |
US11612444B2 (en) | 2017-12-28 | 2023-03-28 | Cilag Gmbh International | Adjustment of a surgical device function based on situational awareness |
US11612408B2 (en) | 2017-12-28 | 2023-03-28 | Cilag Gmbh International | Determining tissue composition via an ultrasonic system |
US10932872B2 (en) | 2017-12-28 | 2021-03-02 | Ethicon Llc | Cloud-based medical analytics for linking of local usage trends with the resource acquisition behaviors of larger data set |
US11633237B2 (en) | 2017-12-28 | 2023-04-25 | Cilag Gmbh International | Usage and technique analysis of surgeon / staff performance against a baseline to optimize device utilization and performance for both current and future procedures |
US11864845B2 (en) | 2017-12-28 | 2024-01-09 | Cilag Gmbh International | Sterile field interactive control displays |
US11659023B2 (en) | 2017-12-28 | 2023-05-23 | Cilag Gmbh International | Method of hub communication |
US11666331B2 (en) | 2017-12-28 | 2023-06-06 | Cilag Gmbh International | Systems for detecting proximity of surgical end effector to cancerous tissue |
US11013563B2 (en) | 2017-12-28 | 2021-05-25 | Ethicon Llc | Drive arrangements for robot-assisted surgical platforms |
US11672605B2 (en) | 2017-12-28 | 2023-06-13 | Cilag Gmbh International | Sterile field interactive control displays |
US11678881B2 (en) | 2017-12-28 | 2023-06-20 | Cilag Gmbh International | Spatial awareness of surgical hubs in operating rooms |
US11864728B2 (en) | 2017-12-28 | 2024-01-09 | Cilag Gmbh International | Characterization of tissue irregularities through the use of mono-chromatic light refractivity |
US11857152B2 (en) | 2017-12-28 | 2024-01-02 | Cilag Gmbh International | Surgical hub spatial awareness to determine devices in operating theater |
US11696760B2 (en) | 2017-12-28 | 2023-07-11 | Cilag Gmbh International | Safety systems for smart powered surgical stapling |
US10987178B2 (en) | 2017-12-28 | 2021-04-27 | Ethicon Llc | Surgical hub control arrangements |
US11844579B2 (en) | 2017-12-28 | 2023-12-19 | Cilag Gmbh International | Adjustments based on airborne particle properties |
US11832899B2 (en) | 2017-12-28 | 2023-12-05 | Cilag Gmbh International | Surgical systems with autonomously adjustable control programs |
US11701185B2 (en) | 2017-12-28 | 2023-07-18 | Cilag Gmbh International | Wireless pairing of a surgical device with another device within a sterile surgical field based on the usage and situational awareness of devices |
US11832840B2 (en) | 2017-12-28 | 2023-12-05 | Cilag Gmbh International | Surgical instrument having a flexible circuit |
US11712303B2 (en) | 2017-12-28 | 2023-08-01 | Cilag Gmbh International | Surgical instrument comprising a control circuit |
US11737668B2 (en) | 2017-12-28 | 2023-08-29 | Cilag Gmbh International | Communication hub and storage device for storing parameters and status of a surgical device to be shared with cloud based analytics systems |
US11744604B2 (en) | 2017-12-28 | 2023-09-05 | Cilag Gmbh International | Surgical instrument with a hardware-only control circuit |
US11751958B2 (en) | 2017-12-28 | 2023-09-12 | Cilag Gmbh International | Surgical hub coordination of control and communication of operating room devices |
US10943454B2 (en) | 2017-12-28 | 2021-03-09 | Ethicon Llc | Detection and escalation of security responses of surgical instruments to increasing severity threats |
US11818052B2 (en) | 2017-12-28 | 2023-11-14 | Cilag Gmbh International | Surgical network determination of prioritization of communication, interaction, or processing based on system or device needs |
US11771487B2 (en) | 2017-12-28 | 2023-10-03 | Cilag Gmbh International | Mechanisms for controlling different electromechanical systems of an electrosurgical instrument |
US11775682B2 (en) | 2017-12-28 | 2023-10-03 | Cilag Gmbh International | Data stripping method to interrogate patient records and create anonymized record |
US11779337B2 (en) | 2017-12-28 | 2023-10-10 | Cilag Gmbh International | Method of using reinforced flexible circuits with multiple sensors to optimize performance of radio frequency devices |
US11786245B2 (en) | 2017-12-28 | 2023-10-17 | Cilag Gmbh International | Surgical systems with prioritized data transmission capabilities |
US11786251B2 (en) | 2017-12-28 | 2023-10-17 | Cilag Gmbh International | Method for adaptive control schemes for surgical network control and interaction |
US10966791B2 (en) | 2017-12-28 | 2021-04-06 | Ethicon Llc | Cloud-based medical analytics for medical facility segmented individualization of instrument function |
US10944728B2 (en) | 2017-12-28 | 2021-03-09 | Ethicon Llc | Interactive surgical systems with encrypted communication capabilities |
US12121256B2 (en) | 2018-03-08 | 2024-10-22 | Cilag Gmbh International | Methods for controlling temperature in ultrasonic device |
US11617597B2 (en) | 2018-03-08 | 2023-04-04 | Cilag Gmbh International | Application of smart ultrasonic blade technology |
US11317937B2 (en) | 2018-03-08 | 2022-05-03 | Cilag Gmbh International | Determining the state of an ultrasonic end effector |
US11707293B2 (en) | 2018-03-08 | 2023-07-25 | Cilag Gmbh International | Ultrasonic sealing algorithm with temperature control |
US11701162B2 (en) | 2018-03-08 | 2023-07-18 | Cilag Gmbh International | Smart blade application for reusable and disposable devices |
US11839396B2 (en) | 2018-03-08 | 2023-12-12 | Cilag Gmbh International | Fine dissection mode for tissue classification |
US11844545B2 (en) | 2018-03-08 | 2023-12-19 | Cilag Gmbh International | Calcified vessel identification |
US11701139B2 (en) | 2018-03-08 | 2023-07-18 | Cilag Gmbh International | Methods for controlling temperature in ultrasonic device |
US11678927B2 (en) | 2018-03-08 | 2023-06-20 | Cilag Gmbh International | Detection of large vessels during parenchymal dissection using a smart blade |
US11678901B2 (en) | 2018-03-08 | 2023-06-20 | Cilag Gmbh International | Vessel sensing for adaptive advanced hemostasis |
US11298148B2 (en) | 2018-03-08 | 2022-04-12 | Cilag Gmbh International | Live time tissue classification using electrical parameters |
US11457944B2 (en) | 2018-03-08 | 2022-10-04 | Cilag Gmbh International | Adaptive advanced tissue treatment pad saver mode |
US11337746B2 (en) | 2018-03-08 | 2022-05-24 | Cilag Gmbh International | Smart blade and power pulsing |
US11589915B2 (en) | 2018-03-08 | 2023-02-28 | Cilag Gmbh International | In-the-jaw classifier based on a model |
US11344326B2 (en) | 2018-03-08 | 2022-05-31 | Cilag Gmbh International | Smart blade technology to control blade instability |
US11534196B2 (en) | 2018-03-08 | 2022-12-27 | Cilag Gmbh International | Using spectroscopy to determine device use state in combo instrument |
US11986233B2 (en) | 2018-03-08 | 2024-05-21 | Cilag Gmbh International | Adjustment of complex impedance to compensate for lost power in an articulating ultrasonic device |
US11389188B2 (en) | 2018-03-08 | 2022-07-19 | Cilag Gmbh International | Start temperature of blade |
US11399858B2 (en) | 2018-03-08 | 2022-08-02 | Cilag Gmbh International | Application of smart blade technology |
US11259830B2 (en) | 2018-03-08 | 2022-03-01 | Cilag Gmbh International | Methods for controlling temperature in ultrasonic device |
US11464532B2 (en) | 2018-03-08 | 2022-10-11 | Cilag Gmbh International | Methods for estimating and controlling state of ultrasonic end effector |
US11219453B2 (en) | 2018-03-28 | 2022-01-11 | Cilag Gmbh International | Surgical stapling devices with cartridge compatible closure and firing lockout arrangements |
US11931027B2 (en) | 2018-03-28 | 2024-03-19 | Cilag Gmbh Interntional | Surgical instrument comprising an adaptive control system |
US11937817B2 (en) | 2018-03-28 | 2024-03-26 | Cilag Gmbh International | Surgical instruments with asymmetric jaw arrangements and separate closure and firing systems |
US11090047B2 (en) | 2018-03-28 | 2021-08-17 | Cilag Gmbh International | Surgical instrument comprising an adaptive control system |
US11259806B2 (en) | 2018-03-28 | 2022-03-01 | Cilag Gmbh International | Surgical stapling devices with features for blocking advancement of a camming assembly of an incompatible cartridge installed therein |
US11406382B2 (en) | 2018-03-28 | 2022-08-09 | Cilag Gmbh International | Staple cartridge comprising a lockout key configured to lift a firing member |
US11213294B2 (en) | 2018-03-28 | 2022-01-04 | Cilag Gmbh International | Surgical instrument comprising co-operating lockout features |
US11986185B2 (en) | 2018-03-28 | 2024-05-21 | Cilag Gmbh International | Methods for controlling a surgical stapler |
US11278280B2 (en) | 2018-03-28 | 2022-03-22 | Cilag Gmbh International | Surgical instrument comprising a jaw closure lockout |
US11471156B2 (en) | 2018-03-28 | 2022-10-18 | Cilag Gmbh International | Surgical stapling devices with improved rotary driven closure systems |
US10973520B2 (en) | 2018-03-28 | 2021-04-13 | Ethicon Llc | Surgical staple cartridge with firing member driven camming assembly that has an onboard tissue cutting feature |
US11207067B2 (en) | 2018-03-28 | 2021-12-28 | Cilag Gmbh International | Surgical stapling device with separate rotary driven closure and firing systems and firing member that engages both jaws while firing |
US11589865B2 (en) | 2018-03-28 | 2023-02-28 | Cilag Gmbh International | Methods for controlling a powered surgical stapler that has separate rotary closure and firing systems |
US11197668B2 (en) | 2018-03-28 | 2021-12-14 | Cilag Gmbh International | Surgical stapling assembly comprising a lockout and an exterior access orifice to permit artificial unlocking of the lockout |
US11166716B2 (en) | 2018-03-28 | 2021-11-09 | Cilag Gmbh International | Stapling instrument comprising a deactivatable lockout |
US11096688B2 (en) | 2018-03-28 | 2021-08-24 | Cilag Gmbh International | Rotary driven firing members with different anvil and channel engagement features |
US11129611B2 (en) | 2018-03-28 | 2021-09-28 | Cilag Gmbh International | Surgical staplers with arrangements for maintaining a firing member thereof in a locked configuration unless a compatible cartridge has been installed therein |
US11751872B2 (en) | 2019-02-19 | 2023-09-12 | Cilag Gmbh International | Insertable deactivator element for surgical stapler lockouts |
US11291445B2 (en) | 2019-02-19 | 2022-04-05 | Cilag Gmbh International | Surgical staple cartridges with integral authentication keys |
US11517309B2 (en) | 2019-02-19 | 2022-12-06 | Cilag Gmbh International | Staple cartridge retainer with retractable authentication key |
US11317915B2 (en) | 2019-02-19 | 2022-05-03 | Cilag Gmbh International | Universal cartridge based key feature that unlocks multiple lockout arrangements in different surgical staplers |
US11331101B2 (en) | 2019-02-19 | 2022-05-17 | Cilag Gmbh International | Deactivator element for defeating surgical stapling device lockouts |
US11298129B2 (en) | 2019-02-19 | 2022-04-12 | Cilag Gmbh International | Method for providing an authentication lockout in a surgical stapler with a replaceable cartridge |
US11369377B2 (en) | 2019-02-19 | 2022-06-28 | Cilag Gmbh International | Surgical stapling assembly with cartridge based retainer configured to unlock a firing lockout |
US11298130B2 (en) | 2019-02-19 | 2022-04-12 | Cilag Gmbh International | Staple cartridge retainer with frangible authentication key |
US11331100B2 (en) | 2019-02-19 | 2022-05-17 | Cilag Gmbh International | Staple cartridge retainer system with authentication keys |
US11464511B2 (en) | 2019-02-19 | 2022-10-11 | Cilag Gmbh International | Surgical staple cartridges with movable authentication key arrangements |
US11291444B2 (en) | 2019-02-19 | 2022-04-05 | Cilag Gmbh International | Surgical stapling assembly with cartridge based retainer configured to unlock a closure lockout |
US11925350B2 (en) | 2019-02-19 | 2024-03-12 | Cilag Gmbh International | Method for providing an authentication lockout in a surgical stapler with a replaceable cartridge |
US11357503B2 (en) | 2019-02-19 | 2022-06-14 | Cilag Gmbh International | Staple cartridge retainers with frangible retention features and methods of using same |
US11272931B2 (en) | 2019-02-19 | 2022-03-15 | Cilag Gmbh International | Dual cam cartridge based feature for unlocking a surgical stapler lockout |
US11259807B2 (en) | 2019-02-19 | 2022-03-01 | Cilag Gmbh International | Staple cartridges with cam surfaces configured to engage primary and secondary portions of a lockout of a surgical stapling device |
US11600395B1 (en) | 2019-03-06 | 2023-03-07 | HealthLynked Corp. | Secure patient access via healthcare service provider specific wireless access point |
USD964564S1 (en) | 2019-06-25 | 2022-09-20 | Cilag Gmbh International | Surgical staple cartridge retainer with a closure system authentication key |
USD952144S1 (en) | 2019-06-25 | 2022-05-17 | Cilag Gmbh International | Surgical staple cartridge retainer with firing system authentication key |
USD950728S1 (en) | 2019-06-25 | 2022-05-03 | Cilag Gmbh International | Surgical staple cartridge |
WO2021103801A1 (en) * | 2019-11-28 | 2021-06-03 | 华为技术有限公司 | Information processing method and related device |
US11963683B2 (en) | 2020-10-02 | 2024-04-23 | Cilag Gmbh International | Method for operating tiered operation modes in a surgical system |
US20220108783A1 (en) * | 2020-10-02 | 2022-04-07 | Ethicon Llc | Surgical hub having variable interconnectivity capabilities |
US11830602B2 (en) * | 2020-10-02 | 2023-11-28 | Cilag Gmbh International | Surgical hub having variable interconnectivity capabilities |
Also Published As
Publication number | Publication date |
---|---|
US20170013398A1 (en) | 2017-01-12 |
US20160299213A1 (en) | 2016-10-13 |
US9622025B2 (en) | 2017-04-11 |
US20160301691A1 (en) | 2016-10-13 |
US20160301690A1 (en) | 2016-10-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20160302210A1 (en) | Communication hub and repeaters | |
US10949633B1 (en) | Asset management using an asset tag device | |
Gia et al. | Fog computing approach for mobility support in internet-of-things systems | |
Joshi et al. | Cognitive radio wireless sensor networks: applications, challenges and research trends | |
Lin et al. | Enabling cyber physical systems with wireless sensor networking technologies | |
Huang et al. | Energy-efficient monitoring in software defined wireless sensor networks using reinforcement learning: A prototype | |
Yang | Wireless sensor networks | |
Mukherjee et al. | FogIoHT: A weighted majority game theory based energy-efficient delay-sensitive fog network for internet of health things | |
US9980205B2 (en) | Locating physical assets via near field communication nodes | |
KR20200079252A (en) | Method and system for locating wireless electronic devices | |
US11304254B2 (en) | Controlling motion topology in a standardized wireless communication network | |
US10210356B2 (en) | Multi signal diffusion integrated system and method | |
CN105849745A (en) | Localization scheme using ultrasound signatures emitted from entrusted device | |
CN104854472A (en) | Position location system architecture: messaging and ranging links | |
US20190261433A1 (en) | Software architecture for iot device collector | |
US10721162B2 (en) | Routing data through distributed communications network | |
EP4029296B1 (en) | Passive sensor tracking with existing infrastructure | |
kumar et al. | A review of energy-efficient secured routing algorithm for IoT-Enabled smart agricultural systems | |
US11122412B2 (en) | Device discovery | |
Guo et al. | Novel energy-efficient miner monitoring system with duty-cycled wireless sensor networks | |
Qu et al. | An energy efficient anchor-free localization algorithm for no-identity wireless sensor networks | |
KR100908731B1 (en) | Ubiquitous Sensor Network System and PIA Identification Method Using the Same | |
Aboelela et al. | Design and Implementation of a Wireless Sensor Network Based Scalable Monitoring System (WiSe-SMS). | |
Nozari et al. | CrowdWatch: Privacy-Preserving Monitoring Leveraging Wi-Fi Multiple Access Information | |
Varshney | Health Monitoring using Infrastructure-oriented |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RIVERSIDE FUND V, L.P., MASSACHUSETTS Free format text: SECURITY INTEREST;ASSIGNOR:ENOVATE MEDICAL, LLC;REEL/FRAME:043201/0595 Effective date: 20170707 Owner name: RIVERSIDE OFFSHORE STINGER BLOCKER CORP., MASSACHU Free format text: SECURITY INTEREST;ASSIGNOR:ENOVATE MEDICAL, LLC;REEL/FRAME:043201/0595 Effective date: 20170707 |
|
AS | Assignment |
Owner name: FIFTH THIRD BANK, AS AGENT, OHIO Free format text: SECURITY AGREEMENT;ASSIGNOR:ENOVATE MEDICAL, LLC;REEL/FRAME:043434/0828 Effective date: 20170707 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: ENOVATE MEDICAL, LLC, TENNESSEE Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:ALLY BANK;REEL/FRAME:065408/0093 Effective date: 20231030 |