摘要:
Systems, devices, and methods are provided for the management of multiple sensor control devices and/or multiple reader devices in an in vivo analyte monitoring environment, and also for resolving conflicts when merging data collected by different reader devices.
摘要:
Methods, systems, and devices for authenticated wireless protocol pairing are provided. Authenticated wireless protocol pairing may include detecting an analyte sample; determining an analyte concentration associated with the detected analyte sample; generating an unauthenticated pairing with an external device by initiating a pairing procedure of a wireless protocol stack with the external device, and on a condition that the wireless protocol stack issues a pairing message, suppressing the pairing message; preventing communication based on the unauthenticated pairing with the external device; generating an authenticated pairing based on the unauthenticated pairing by displaying a pairing authentication message, and in response to user input indicating that the unauthenticated pairing is an authenticated pairing, converting the unauthenticated pairing to an authenticated pairing; and transmitting an indication of the analyte concentration to the external device.
摘要:
Systems, devices, and methods are provided for the control of interfacing between applications that facilitate the monitoring of diabetes running on a mobile device, including the authentication of a third party user interface application by a sensor interface application. Control of the display of current analyte levels and critical events is also provided.
摘要:
Systems, devices, and methods are provided that allow the authentication of devices within analyte monitoring systems. The analyte monitoring systems can be in vivo systems and can include a sensor control device with a sensor and accompanying circuitry, as well as a reader device for communicating with the sensor control device. The analyte monitoring systems can interface with a trusted computer system located at a remote site. Numerous techniques of authentication are disclosed that can enable the detection of counterfeit components, such as a counterfeit sensor control device.