SYSTEM AND METHOD FOR OPERATING AN IMPLANTABLE PULSE GENERATOR FOR NEUROMODULATION

    公开(公告)号:US20220203107A1

    公开(公告)日:2022-06-30

    申请号:US17501741

    申请日:2021-10-14

    Abstract: A system and method for operating an implanted medical device (IMD) based on a waveform player. In one arrangement, the IMD may comprise a first module operative to effectuate a communication interface with an external device for receiving a plurality of program records for storage in a persistent memory, the program records each comprising a plurality of pulse definitions and a plurality of time interval definitions, wherein a pulse definition comprises a set of pulse characteristics to be applied in a particular time interval. A second module may be communicatively coupled to the first module, the second module including a buffer for containing a runtime image of a selected program record loaded from the persistent memory. A waveform player provided as part of the second module is operative to interpret the runtime image to generate control signals to drive an output driver circuit for applying pulse characteristics to a select set of electrodes according to the pulse definitions of the selected program record.

    Split key architecture for facilitating authentication between an implanted medical device and an external device

    公开(公告)号:US12008098B1

    公开(公告)日:2024-06-11

    申请号:US17527943

    申请日:2021-11-16

    CPC classification number: G06F21/445 H04L9/3263 H04L9/3273

    Abstract: A system and method for facilitating device and application authentication between an external device and an implanted medical device (IMD), wherein a therapy application executing on the external device is operative to communicate with the IMD via wireless telemetry communications. A device authentication parameter may be decomposed into two key components, wherein one component may be stored in a cloud key vault and the other component may be distributed to the external device as an obfuscated portion embedded in the therapy application. Upon receiving the therapy application, the external device is operative to separately retrieve both key components and reconstitute the original authentication parameter therefrom, which may be presented to the IMD for authentication.

    Compressed PKI methods for machine-to-machine authentication in bandwidth-constrained medical devices

    公开(公告)号:US12177367B1

    公开(公告)日:2024-12-24

    申请号:US17982853

    申请日:2022-11-08

    Abstract: Embodiments provide methods of conducting operations with an implantable medical device (IMD) and an external controller device for performing authentication operations. In some embodiments, the method comprises: generating or storing an authentication data structure in the external controller device for over-the-air communication between the external device and the IMD, wherein the authentication data structure is generated by: (1) removing attribute fields from a first digital certificate and adding a public key of the external controller device to form an intermediate data structure; (2) creating a digital signature of the first intermediate data structure using a second digital certificate of an issuing certificate authority (CA); and (3) forming the authentication data structure by combining the intermediate data structure, the created digital signature, a public key of the issuing CA, and a digital signature of the public key of the issuing CA created using a third digital certificate of a root CA.

    Secure file transfer system and method

    公开(公告)号:US11582022B1

    公开(公告)日:2023-02-14

    申请号:US17088287

    申请日:2020-11-03

    Abstract: A scheme for securely transferring a patient data file to an intended recipient regardless of a transfer mode selected by a sender. Encryption system executing at the sender device is operative to encrypt each plaintext data line of a file, one by one, using a symmetric key and a starting IV that is incremented per each line, resulting in corresponding ciphertext lines added to an encrypted file. A hash is generated based on the encrypted file. An encrypted header containing the symmetric key, starting IV and the hash is generated using a public key of the recipient, which is appended to the encrypted file. The encrypted header and associated encrypted file are transmitted to the recipient in any manner. Upon receipt, the recipient decrypts the encrypted header using a private key to obtain the symmetric key, starting IV and the hash, which are used by the recipient to validate and decrypt the encrypted file on a line-by-line basis.

Patent Agency Ranking