Skip to main content
Erschienen in: Journal of Medical Systems 3/2012

01.06.2012 | Original Paper

SEE: Improving Nurse-Patient Communications and Preventing Software Piracy in Nurse Call Applications

verfasst von: Mehmet S. Unluturk

Erschienen in: Journal of Medical Systems | Ausgabe 3/2012

Einloggen, um Zugang zu erhalten

Abstract

Nurse call system is an electrically functioning system by which patients can call upon from a bedside station or from a duty station. An intermittent tone shall be heard and a corridor lamp located outside the room starts blinking with a slow or a faster rate depending on the call origination. It is essential to alert nurses on time so that they can offer care and comfort without any delay. There are currently many devices available for a nurse call system to improve communication between nurses and patients such as pagers, RFID (radio frequency identification) badges, wireless phones and so on. To integrate all these devices into an existing nurse call system and make they communicate with each other, we propose software client applications called bridges in this paper. We also propose a window server application called SEE (Supervised Event Executive) that delivers messages among these devices. A single hardware dongle is utilized for authentication and copy protection for SEE. Protecting SEE with securities provided by dongle only is a weak defense against hackers. In this paper, we develop some defense patterns for hackers such as calculating checksums in runtime, making calls to dongle from multiple places in code and handling errors properly by logging them into database.
Literatur
1.
Zurück zum Zitat Huo, H., Xu, Y., Yan, H., Mubeen, S., Zhang, H., An elderly health care system using wireless sensor networks at home. 2009 Third Int. Conf. on Sensor Technologies and Applications, 158–163. Huo, H., Xu, Y., Yan, H., Mubeen, S., Zhang, H., An elderly health care system using wireless sensor networks at home. 2009 Third Int. Conf. on Sensor Technologies and Applications, 158–163.
2.
Zurück zum Zitat Jones, T. C., Reusability in programming: A survey of the state of the art. IEEE Trans. Softw. Eng. SE-10(5):488–493, 1984.CrossRef Jones, T. C., Reusability in programming: A survey of the state of the art. IEEE Trans. Softw. Eng. SE-10(5):488–493, 1984.CrossRef
3.
Zurück zum Zitat Lanergan, R. G., and Grasso, C. A., Software engineering with reusable designs and code. IEEE Trans. Softw. Eng. SE- 10(5):498–501, 1984.CrossRef Lanergan, R. G., and Grasso, C. A., Software engineering with reusable designs and code. IEEE Trans. Softw. Eng. SE- 10(5):498–501, 1984.CrossRef
4.
Zurück zum Zitat Meyer, B., Reusability: The case for object-oriented design. IEEE Softw. 4(2):50–64, 1987.CrossRef Meyer, B., Reusability: The case for object-oriented design. IEEE Softw. 4(2):50–64, 1987.CrossRef
5.
Zurück zum Zitat Bacon, J., Bates, J., Richard, H., and Moody, K., Using events to build distributed applications. 2nd International Workshop on Services in Distributed and Network Environments. Whistler, British Colombia, 1995. Bacon, J., Bates, J., Richard, H., and Moody, K., Using events to build distributed applications. 2nd International Workshop on Services in Distributed and Network Environments. Whistler, British Colombia, 1995.
6.
Zurück zum Zitat Klinger,S., Yemini, S., Yemini, Y., Ohsie, D., and Stolfo, S., A coding approach to event correlation. Fourth Symposium on Integrated Network Management. Santa Barbara, California, USA, 1995. Klinger,S., Yemini, S., Yemini, Y., Ohsie, D., and Stolfo, S., A coding approach to event correlation. Fourth Symposium on Integrated Network Management. Santa Barbara, California, USA, 1995.
7.
Zurück zum Zitat Object Management Group, The Common Object Request Broker: Architecture and specification, Technical Report 91.9.1, Object Management Group, December 1991. Object Management Group, The Common Object Request Broker: Architecture and specification, Technical Report 91.9.1, Object Management Group, December 1991.
9.
Zurück zum Zitat Abowd, G. D., and Beale, R., Users, systems and interfaces: a unifying frame-work for interaction. In: People and Computers VI, pp. 73–87. Cambridge: Cambridge University Press, 1991. Abowd, G. D., and Beale, R., Users, systems and interfaces: a unifying frame-work for interaction. In: People and Computers VI, pp. 73–87. Cambridge: Cambridge University Press, 1991.
10.
Zurück zum Zitat Bass, L., and Coutaz, J., Developing software for the user interface. Addison-Wesley, New York, 1991. Bass, L., and Coutaz, J., Developing software for the user interface. Addison-Wesley, New York, 1991.
11.
Zurück zum Zitat Beigel, M., Gellersen, H. W., and Schmidt, A., MediaCups: Experience with design and use of computer-augmented everyday objects. Comput. Networks 35(4):401–409, 2001. Special issue on Pervasive Computing, Elsevier, March.CrossRef Beigel, M., Gellersen, H. W., and Schmidt, A., MediaCups: Experience with design and use of computer-augmented everyday objects. Comput. Networks 35(4):401–409, 2001. Special issue on Pervasive Computing, Elsevier, March.CrossRef
12.
Zurück zum Zitat Plazzalunga, U., Salvaneschi, P., Balducci, F., Jacomuzzi, P., Moroncelli, C., Security strength measurement for dongle-protected software. IEEE Secur. Priv. 32–40, 2007. Plazzalunga, U., Salvaneschi, P., Balducci, F., Jacomuzzi, P., Moroncelli, C., Security strength measurement for dongle-protected software. IEEE Secur. Priv. 32–40, 2007.
13.
Zurück zum Zitat Jozwiak, I. J., Liber, A., Marczak, and K., A hardware-based software protection systems—Analysis of security dongles with memory. Proceedings of the Int. Multi-Conf. on Comp. in the Global Info. Tech., pp. 28, 2007. Jozwiak, I. J., Liber, A., Marczak, and K., A hardware-based software protection systems—Analysis of security dongles with memory. Proceedings of the Int. Multi-Conf. on Comp. in the Global Info. Tech., pp. 28, 2007.
14.
Zurück zum Zitat Jozwiak, I. J., Marczak, K., A hardware-based software protection systems—Analysis of security dongles with time meters. 2. Int. Conf. on Dependability of Computer Systems, pp. 254–261, 2007. Jozwiak, I. J., Marczak, K., A hardware-based software protection systems—Analysis of security dongles with time meters. 2. Int. Conf. on Dependability of Computer Systems, pp. 254–261, 2007.
15.
Zurück zum Zitat Nelson, R., Technology tools for the year 2005: Supporting the nursing process. Medical Technology Symposium. 32–34, 1998. Nelson, R., Technology tools for the year 2005: Supporting the nursing process. Medical Technology Symposium. 32–34, 1998.
Metadaten
Titel
SEE: Improving Nurse-Patient Communications and Preventing Software Piracy in Nurse Call Applications
verfasst von
Mehmet S. Unluturk
Publikationsdatum
01.06.2012
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 3/2012
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-010-9650-5

Weitere Artikel der Ausgabe 3/2012

Journal of Medical Systems 3/2012 Zur Ausgabe