Download - Virtual House Calls: Technology-Enabled Care
© 2015 Wind River. All Rights Reserved
Virtual House Calls: Technology-Enabled Care
Neil McLellan Senior Product Manager, Medical
Tim Skutt Director of Product Management, Security Portfolio
2 © 2015 Wind River. All Rights Reserved.
“We shall require a substantially new manner of thinking if mankind is to
survive…”
—Albert Einstein
3 © 2015 Wind River. All Rights Reserved. © 2015 Wind River. All Rights Reserved
2014: A Thrilling Ride
© 2015 Wind River. All Rights Reserved
Reimbursements
Chronic Diseases
Aging Population
Increasing Population
Doctor Shortages
Malpractice Lawsuits
Misuse of Healthcare
Longer Lifespans
Regulatory Requirements
Drug Trials Federal Subsidies Hospital Consolidations
4 © 2015 Wind River. All Rights Reserved. 6 © 2015 Wind River. All Rights Reserved
5 © 2015 Wind River. All Rights Reserved.
Unsustainable Trajectory
6 © 2015 Wind River. All Rights Reserved.
Where Are the Costs?
We spend $750 billion on unnecessary
healthcare every year.
Reasons range from poorly delivered
services to unnecessary services to missed
opportunities.
These three reasons alone equate to almost
$400 billion in spending.
7 © 2015 Wind River. All Rights Reserved.
The Era of the Virtual House Call
Achieving Better Care
8 © 2015 Wind River. All Rights Reserved
9 © 2015 Wind River. All Rights Reserved.
Achieving Better Care
10 © 2015 Wind River. All Rights Reserved.
Actionable and Meaningful Data
Conformance to Safety Standards
Key Issues for Medical Device Customers
Total Cost of Ownership
Accuracy and Reliability
Connectivity and interoperability irrespective of the age of the device
Compliant, safe, and effective
Optimum operation without failure
Keep overall cost of ownership lower
11 © 2015 Wind River. All Rights Reserved.
Key Business Issues for Device Manufacturers
Reduction in cost of development
Scalable standardized platforms with common skills, tools, certification Affordability
Cycle time is total time from beginning to end of the project
Reduction achieved by reuse of software, test assets, simulation, …
Save Time and Resources
Customer expectation for projects to be at higher TRLs (Technology Readiness Levels)
Tested and Validated
Conformance to common safety and security standards across various projects
Drive to expand market overseas, creating various regulatory pressures Time-to-Market
12 © 2015 Wind River. All Rights Reserved.
13 © 2015 Wind River. All Rights Reserved.
An Alternate Universe
14 © 2015 Wind River. All Rights Reserved.
Modern Medicine: A Practical Study
7 p.m. on a Thursday night
Winding down family dinner
15 © 2015 Wind River. All Rights Reserved.
Modern Medicine: A Practical Study
Little Ricky complains he’s not well
Fever, aches, chills…
16 © 2015 Wind River. All Rights Reserved.
7:30 p.m. before symptoms are verified
Little Ricky becomes progressively more uncomfortable
Modern Medicine: A Practical Study
Meetings and schedules cannot be interrupted
17 © 2015 Wind River. All Rights Reserved.
Family physician is part of a new network
Provides diagnosis for non-emergency cases via telepresence at nearly half the cost to the patient and payor
Modern Medicine: A Practical Study
18 © 2015 Wind River. All Rights Reserved.
Rapid POC test is needed
Prescriptions and tests available in the same location
Modern Medicine: A Practical Study
19 © 2015 Wind River. All Rights Reserved.
Little Ricky is diagnosed with severe strep
Confirmed by a rapid POC test at the local pharmacy
Proper meds are prescribed, no guessing
Modern Medicine: A Practical Study
20 © 2015 Wind River. All Rights Reserved.
Leverage common technology to connect patients and doctors
Connected, reliable, and secure platforms at the heart of POC technologies
Cooperation is the new competition - leverage expertise beyond your core area of expertise
Modern Medicine: A Practical Study
21 © 2015 Wind River. All Rights Reserved.
Real-World Challenges
| © 2012 Wind River. All Rights Reserved. 21
Connectivity Manageability Security
Firewalls
Port-blocking
Sparse link layer
EM interference
Heterogeneous hardware
End-user expertise
Intermittent connections
Update delivery mechanism
High availability requirements
Rights management
Encryption
Malware
Remote Technical
Support
Maintenance
Event
Efficiency Gain
(Perhaps?)
| © 2012 Wind River. All Rights Reserved. 22
Neil McLellan
Senior Product Manager, Medical
Wind River
© 2015 Wind River. All Rights Reserved.
Virtual House Calls: Security Tim Skutt Director of Product Management, Security Portfolio
24 © 2015 Wind River. All Rights Reserved.
Threats
25 © 2015 Wind River. All Rights Reserved.
The Way Forward
Secure Devices
Secure Communications
Secure Systems
Secure Processes
26 © 2015 Wind River. All Rights Reserved.
Secure Devices
Deploy Operation Disposal Design
• Trusted delivery • Secure development
lifecycle • Process certification
• Secure boot/load • Trusted content • Digital certificates/PKI • Secure updates
• Cryptography • Identity and
authentication • Network security • Auditing/logging
• Encrypted storage • Sanitization
27 © 2015 Wind River. All Rights Reserved.
Embedded Security Deployment Models
Security in the foundation
Separate concerns to enable security functions while preserving operational functions
27
Operational
Functions
Security
Functions
28 © 2015 Wind River. All Rights Reserved.
LAN
Sensor Hub
Device Device IoT Devices
Sensors
Actuators
Controllers
Gateways
INTERNET
Big Data
The Data Center
Generic
Network Topology
for Connected Devices
Private
Cloud
GATEWAY
Sensor Hub
Brownfield
| © 2013 Wind River. All Rights Reserved. 28
Greenfield
Edge Management System Account
Management
Device
Management
Analytics
Secure
Connectivity
Event
Triggers
Cloud
API
Data
Visualization
Agent
Agent
Data
Acquisition
Data
Aggregation
Data
Interpretation
29 © 2015 Wind River. All Rights Reserved.
Secure Systems Secure OS
VxWorks Linux
Secure Virtualization
Secure OS Secure Virtualization
Agents Secure Boot/TPM Remote Attestation
SDN/NFV (Network Security)
Security Management
SDx/xFV OVP Titanium Server/Cloud
SDx/xFV OVP Titanium Server/Cloud
SDx/xFV (Secure Enterprise Virtualization)
30 © 2015 Wind River. All Rights Reserved.
Security Processes
Safety Critical Security
Assess & Review Requirements
Design Implement Deploy Architect
Define Dev/Test
Plan
Wind River Product Development Lifecycle Framework
Propose Launch Sustain
Management Process
Development Process
+
31 © 2015 Wind River. All Rights Reserved.
Security Development Process
• Selection and
review of process
standards
• Selection and
review of process
checklists
• Establishment
and review of
requirements
baseline
• Architecture
definition
• Architecture
review
Assess & Review Requirements
Design Implement Deploy Architect
Wind River Confidential
• Design definition
• Design review
• Test plan
preparation
• Static analysis
• Manual code
review
• Test execution
• Process
compliance
analysis
• Security
validation
• Final release
review
• PSIRT
Coverity Achilles TAHI Nessus CVE Checker
Anti-Virus
32 © 2015 Wind River. All Rights Reserved. 32 | © 2014 Wind River. All Rights Reserved. 32
Connected Remote access
as allowed
Fragmented information
Reactive response to issues
Serviceable Remote access
as needed
Some proactive monitoring
Service cost avoidance
Electronic software delivery
Predictive maintenance
Services monitoring and reporting
Product data viewing and analysis
New product enhancements by leveraging usage data
Intelligent
Optimized
Enterprise integration
Configuration and warranty management
Pay-per-use models/billing integration
Track and locate/inventory management
Differentiated
New revenue- generating capabilities
Cloud-delivered customer applications
Replenishment management
Remotely controlled products
Compliance and audit reporting
Mobile integration
Cloud-to-cloud-to-mobile mashups
Level 2 Level 3
Level 4
Level 5
Level 6+
Level 1
CONNECT
MANAGE
BUILD
Integrate
Reinvent the Product
Experience
Analyze
Service
Unconnected
Fighting fires
Limited product feedback
High cost of service
IoT Solutions