Skip to main content
Top
Published in: Journal of Medical Systems 3/2012

01-06-2012 | Original Paper

SEE: Improving Nurse-Patient Communications and Preventing Software Piracy in Nurse Call Applications

Author: Mehmet S. Unluturk

Published in: Journal of Medical Systems | Issue 3/2012

Login to get access

Abstract

Nurse call system is an electrically functioning system by which patients can call upon from a bedside station or from a duty station. An intermittent tone shall be heard and a corridor lamp located outside the room starts blinking with a slow or a faster rate depending on the call origination. It is essential to alert nurses on time so that they can offer care and comfort without any delay. There are currently many devices available for a nurse call system to improve communication between nurses and patients such as pagers, RFID (radio frequency identification) badges, wireless phones and so on. To integrate all these devices into an existing nurse call system and make they communicate with each other, we propose software client applications called bridges in this paper. We also propose a window server application called SEE (Supervised Event Executive) that delivers messages among these devices. A single hardware dongle is utilized for authentication and copy protection for SEE. Protecting SEE with securities provided by dongle only is a weak defense against hackers. In this paper, we develop some defense patterns for hackers such as calculating checksums in runtime, making calls to dongle from multiple places in code and handling errors properly by logging them into database.
Literature
1.
go back to reference Huo, H., Xu, Y., Yan, H., Mubeen, S., Zhang, H., An elderly health care system using wireless sensor networks at home. 2009 Third Int. Conf. on Sensor Technologies and Applications, 158–163. Huo, H., Xu, Y., Yan, H., Mubeen, S., Zhang, H., An elderly health care system using wireless sensor networks at home. 2009 Third Int. Conf. on Sensor Technologies and Applications, 158–163.
2.
go back to reference Jones, T. C., Reusability in programming: A survey of the state of the art. IEEE Trans. Softw. Eng. SE-10(5):488–493, 1984.CrossRef Jones, T. C., Reusability in programming: A survey of the state of the art. IEEE Trans. Softw. Eng. SE-10(5):488–493, 1984.CrossRef
3.
go back to reference Lanergan, R. G., and Grasso, C. A., Software engineering with reusable designs and code. IEEE Trans. Softw. Eng. SE- 10(5):498–501, 1984.CrossRef Lanergan, R. G., and Grasso, C. A., Software engineering with reusable designs and code. IEEE Trans. Softw. Eng. SE- 10(5):498–501, 1984.CrossRef
4.
go back to reference Meyer, B., Reusability: The case for object-oriented design. IEEE Softw. 4(2):50–64, 1987.CrossRef Meyer, B., Reusability: The case for object-oriented design. IEEE Softw. 4(2):50–64, 1987.CrossRef
5.
go back to reference Bacon, J., Bates, J., Richard, H., and Moody, K., Using events to build distributed applications. 2nd International Workshop on Services in Distributed and Network Environments. Whistler, British Colombia, 1995. Bacon, J., Bates, J., Richard, H., and Moody, K., Using events to build distributed applications. 2nd International Workshop on Services in Distributed and Network Environments. Whistler, British Colombia, 1995.
6.
go back to reference Klinger,S., Yemini, S., Yemini, Y., Ohsie, D., and Stolfo, S., A coding approach to event correlation. Fourth Symposium on Integrated Network Management. Santa Barbara, California, USA, 1995. Klinger,S., Yemini, S., Yemini, Y., Ohsie, D., and Stolfo, S., A coding approach to event correlation. Fourth Symposium on Integrated Network Management. Santa Barbara, California, USA, 1995.
7.
go back to reference Object Management Group, The Common Object Request Broker: Architecture and specification, Technical Report 91.9.1, Object Management Group, December 1991. Object Management Group, The Common Object Request Broker: Architecture and specification, Technical Report 91.9.1, Object Management Group, December 1991.
9.
go back to reference Abowd, G. D., and Beale, R., Users, systems and interfaces: a unifying frame-work for interaction. In: People and Computers VI, pp. 73–87. Cambridge: Cambridge University Press, 1991. Abowd, G. D., and Beale, R., Users, systems and interfaces: a unifying frame-work for interaction. In: People and Computers VI, pp. 73–87. Cambridge: Cambridge University Press, 1991.
10.
go back to reference Bass, L., and Coutaz, J., Developing software for the user interface. Addison-Wesley, New York, 1991. Bass, L., and Coutaz, J., Developing software for the user interface. Addison-Wesley, New York, 1991.
11.
go back to reference Beigel, M., Gellersen, H. W., and Schmidt, A., MediaCups: Experience with design and use of computer-augmented everyday objects. Comput. Networks 35(4):401–409, 2001. Special issue on Pervasive Computing, Elsevier, March.CrossRef Beigel, M., Gellersen, H. W., and Schmidt, A., MediaCups: Experience with design and use of computer-augmented everyday objects. Comput. Networks 35(4):401–409, 2001. Special issue on Pervasive Computing, Elsevier, March.CrossRef
12.
go back to reference Plazzalunga, U., Salvaneschi, P., Balducci, F., Jacomuzzi, P., Moroncelli, C., Security strength measurement for dongle-protected software. IEEE Secur. Priv. 32–40, 2007. Plazzalunga, U., Salvaneschi, P., Balducci, F., Jacomuzzi, P., Moroncelli, C., Security strength measurement for dongle-protected software. IEEE Secur. Priv. 32–40, 2007.
13.
go back to reference Jozwiak, I. J., Liber, A., Marczak, and K., A hardware-based software protection systems—Analysis of security dongles with memory. Proceedings of the Int. Multi-Conf. on Comp. in the Global Info. Tech., pp. 28, 2007. Jozwiak, I. J., Liber, A., Marczak, and K., A hardware-based software protection systems—Analysis of security dongles with memory. Proceedings of the Int. Multi-Conf. on Comp. in the Global Info. Tech., pp. 28, 2007.
14.
go back to reference Jozwiak, I. J., Marczak, K., A hardware-based software protection systems—Analysis of security dongles with time meters. 2. Int. Conf. on Dependability of Computer Systems, pp. 254–261, 2007. Jozwiak, I. J., Marczak, K., A hardware-based software protection systems—Analysis of security dongles with time meters. 2. Int. Conf. on Dependability of Computer Systems, pp. 254–261, 2007.
15.
go back to reference Nelson, R., Technology tools for the year 2005: Supporting the nursing process. Medical Technology Symposium. 32–34, 1998. Nelson, R., Technology tools for the year 2005: Supporting the nursing process. Medical Technology Symposium. 32–34, 1998.
Metadata
Title
SEE: Improving Nurse-Patient Communications and Preventing Software Piracy in Nurse Call Applications
Author
Mehmet S. Unluturk
Publication date
01-06-2012
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 3/2012
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-010-9650-5

Other articles of this Issue 3/2012

Journal of Medical Systems 3/2012 Go to the issue