Biometrics hub for changing a schedule for processing biometrics data in response to detecting a power event

ABSTRACT

A biometrics hub may establish a session with a first biometric device, receive first biometric data of a user from the first biometric device, establish a session with a second biometric device, receive second biometric data of the user from the second biometric device, and store the first biometric data and the second biometric data at the biometrics hub. The biometrics hub may further detect a power event associated with at least one of the first biometric device or the second biometric device, and change, in response to detecting the power event, a schedule for processing at least one of the first biometric data or the second biometric data.

The present disclosure relates generally to secure real timecommunications for medical and healthcare applications, and moreparticularly to devices, computer-readable media and methods forchanging a schedule for processing biometrics data in response todetecting a power event and/or for transmitting biometrics data to anauthorized remote device in accordance with a schedule.

BRIEF DESCRIPTION OF THE DRAWINGS

The teachings of the present disclosure can be readily understood byconsidering the following detailed description in conjunction with theaccompanying drawings, in which:

FIG. 1 illustrates an example system related to the present disclosure;

FIG. 2 illustrates a flowchart of an example method for changing aschedule for processing biometrics data in response to detecting a powerevent;

FIG. 3 illustrates a flowchart of an example method for transmittingbiometrics data to an authorized remote device in accordance with aschedule; and

FIG. 4 illustrates an example high-level block diagram of a computerspecifically programmed to perform the steps, functions, blocks, and/oroperations described herein.

To facilitate understanding, identical reference numerals have beenused, where possible, to designate identical elements that are common tothe figures.

DETAILED DESCRIPTION

The present disclosure broadly discloses devices, computer-readablemedia, and methods for changing a schedule for processing biometricsdata in response to detecting a power event. For instance, in oneexample, a processor of a biometrics hub may establish a session with afirst biometric device, receive first biometric data of a user from thefirst biometric device, establish a session with a second biometricdevice, receive second biometric data of the user from the secondbiometric device, and store the first biometric data and the secondbiometric data at the biometrics hub. The processor may further detect apower event associated with at least one of the first biometric deviceor the second biometric device, and change, in response to detecting thepower event, a schedule for processing at least one of the firstbiometric data or the second biometric data.

The present disclosure also broadly discloses devices, computer-readablemedia, and methods for transmitting biometrics data to an authorizedremote device in accordance with a schedule. For instance, in oneexample, a processor of a biometrics hub may establish a first schedulefor processing first biometric data of a user, establish a secondschedule for processing second biometric data of the user, storing thefirst biometric data that is received from a first biometric device viaa first persistent session, and store the second biometric data that isreceived from a second biometric device via a second persistent session.The processor may further transmit at least one of the first biometricdata or the second biometric data to an authorized remote device inaccordance with the first schedule or the second schedule. In oneexample, the transmitting includes establishing a session with theauthorized remote device, sending the at least one of the firstbiometric data or the second biometric data to the authorized remotedevice via the session with the authorized remote device, and closingthe session with the authorized remote device.

Currently numerous manufacturers provide smart biometric devices thatare either placed around a premises or comprise wearable devices such asa heartrate monitor, a hypoglycemic alarm, a pedometer, etc. At acustomer premises, these devices connect to separate routers, usuallyfrom same manufacturer, and/or to a smart mobile endpoint device that auser carries. However, these solutions are susceptible to loss ofInternet service provider (ISP) connection, loss of power to thepremises, router failure, or other problems. In any case, these issuescould lead to loss of valuable data transmitted by the biometric devicesor losing the connection and the ability to interact with the biometricdevices.

Loss of connection to an ISP or loss of power could go unnoticed andspecifically in emergency cases could have a life threatening effect onthe user and lead to major reliability issues with healthcare andinsurance agencies. Furthermore, biometric devices and manufacturers'ecosystems are often simplified from a service offering point of view.For instance, for each reading and/or interaction with a complex serviceoffering (Internet Protocol (IP) Multimedia Sub-system (IMS) services,for example), a session may need to be reestablished with the carrierand moved to active status to transmit data. Once the service iscompleted, the device may change status to idle mode, which may causeincreased power consumption and general complexity in any given device.In many cases, different biometric device manufacturers use differentprotocols for biometric devices to communicate with routers and outsideworld. These biometric devices are either connected through Wi-Fi,cellular radios or some other method of communication.

In accordance with the present disclosure, various biometric devices maybe connected to a personalized biometrics hub. If the radio or ISPconnections of one or more biometric devices fail, the personalizedbiometrics hub may act as a backup method of communication and may senda warning message to a local ISP, a third-party power company, or ahealthcare provider regarding the possible service failure, whilekeeping a line of communication open with the outside world. Inparticular, in one example, the personalized biometrics hub stores thedata from the biometric devices as a private cloud storage. In oneexample, the personalized biometrics hub may also offer power back up tosome biometric devices, e.g., those which are more critical to a userand/or which do not have their own sources of power. The personalizedbiometrics hub may also, in case of a low power warning for any givenbiometric device, change the power usage profile and reduce the powerconsumption by taking over the transmission of information and reducingthe interval of interaction with the outside world. In other words, thepersonalized biometrics hub may change a schedule for processing thebiometrics data from any biometrics device, which may include changingthe type of power source or the mode of communication (which may affecta quantity of power consumed).

In one example, the personalized biometrics hub maintains always-onsessions with biometric devices. Thus, a biometric device avoids havingto establish a new session every time the biometric device is ready tosend biometric data. The biometric device may simply send the biometricdata when it is ready via the open connection with the personalizedbiometrics hub. The personalized biometrics hub provides severalfunctions or features for local device management. For instance, thepersonalized biometrics hub may communicate with diverse types ofbiometric devices regardless of the manufacturer and protocol(s) used.This can be accomplished by talking directly to a biometric deviceand/or its proprietary bridge/gateway as a secondary/redundant point ofcontact. The personalized biometrics hub may also include a protocolconverter for third-party applications (e.g., a collection of drivers)which enables the personalized biometrics hub to communicate with anymanufacturer's biometric devices. The personalized biometrics hub mayinclude a cellular and/or Wi-Fi module that can communicate with thecarrier network and become and a redundant/backup connection to atelecommunication network and/or the cloud. The personalized biometricshub may also access and install any drivers to enable communication witha biometric device for which it does not presently possess a driver. Thepersonalized biometrics hub may also provide local storage of biometricdata from various biometric devices. Thus, the personalized biometricshub may have the ability to store generated biometric data fromconnected biometric devices and communicate information to remotedevices on demand with push and notify capabilities. In some cases, thequantities of data stored, the duration of time over which the data isstored, and so forth, is related to the data policy management and powermanagement functions described below.

In particular, the personalized biometrics hub may also provide localdevice management. For example, the personalized biometrics hub maycontrol biometric devices both in general and in case of emergency(e.g., during and/or in response to power events) and provide localstorage of biometric data measured by the biometric devices. The localdevice management may include data policy management. For instance, thepersonalized biometrics hub may establish schedules for processing thebiometric data from biometric devices, and may alter the type and amountof data being collected from biometric devices on the premises dependingupon user preferences, based upon instructions from authorized remotedevices which subscribe to receive the biometric data, and/or based upona service provider's policy that can be managed by a policy managementsubsystem. The personalized biometrics hub may negotiate schedules forprocessing the biometric data, which may determine whether and for howlong to store biometric data, when the send the biometric data to theauthorized remote device(s), the quantities of biometric data to send tothe remote device(s), how long to leave a connection open with a remotedevice, the mode of communication to use to transmit the biometric data,a primary mode of communication, one or more secondary/backup modes ofcommunication, and so forth.

The local device management may also include power management. Forinstance, the personalized biometrics hub may manages power usage ofvarious connected biometric devices. For example, to conserve power thepersonalized biometrics hub may alter the schedule for processingbiometric data from a biometric device, such as reducing the frequencyand/or duration of communications with a biometric device if a biometricdevice power level falls below a certain level. In the case of a poweroutage, the personalized biometrics hub can notify the user or notify anentity that receives the biometric data and/or a related healthcareentity about the power outage (broadly “authorized remote devices”),while reducing the power consumption of the biometric device(s) andsaving the gathered biometric data. In some cases, the data policymanagement and the power management functions of the biometrics hub mayoverlap.

The foregoing describes various aspects of a biometrics hub primarilywith respect to functions relating to the management of local connectedbiometrics devices. In accordance with the present disclosure, apersonalized biometrics hub may also provide several functions relatingto interactions with authorized remote devices. For example, inaccordance with the present disclosure, network communication-capablebiometric devices should be able to communicate with an authorizedremote device, such as a healthcare provider server, via atelecommunication network's service layer. The authorized remote deviceshould be able to render any services, regardless of intricacy andcomplexity, to a user. Service platforms such as IMS, complicatedsecurity protocols such Web-Real Time Communication (WebRTC), and evenTransmission Control Protocol (TCP) and/or TCP/IP may require protocolstacks in biometric devices and require having a session active withconstant communication with an authorized remote device to keep asession active. This may result in additional power consumption,complicated device management and communication modules, as well asadded costs to all devices connected to the network. Additionally, theremay be problems with session continuity as well difficulties in movingto a 5G network model with separate control and user planes. On theother hand, many biometrics devices are not IP enabled and even fewermay have the ability to communicate with a cellular network. This can bedetrimental when physicians and other healthcare-related entities seekto access biometrics data from biometric devices at a customer premises,such as electrocardiogram (EKG) readings for the last hour, blood sugarmeasurements for the last 24 hours, and so on. Typically, thehealthcare-related entities may access the biometric devices throughproprietary gateways provided by the manufacturers of the biometricdevices. However, a computing device of a healthcare-related entityreceiving the biometric data may not have a standardized interface frompatient to patient.

In examples of the present disclosure, various biometric devices may usedifferent communication protocols to communicate gathered data withauthorized remote devices. In addition, the various biometric devicesmay utilized different modes of communication, such as a wireless or awired connection, a cellular connection, and so forth. There may bevarious producers of such biometric devices, and in some cases thebiometric devices may include intelligence and an ability to communicatewith third-party service providers. In other cases, the biometricdevices may generally communicate only through a dedicated getaway witha basic level of communication. The use of multiple different protocolsand data formats prevents service providers from offering rich and opencommunication capabilities. In addition, the inclusion of addedcapabilities in some biometric devices, such as a cellular module, thepossible requirement to keep a session active for certain IMS services,and other factors may result in added power usage.

In accordance with the present disclosure, a personalized biometrics hubfreely communicates with all diverse types of biometric devices througha protocol converter that can discover the biometric devices at acustomer premises and instantiate sessions with the biometric devices.The personalized biometrics hub can download the protocol stack(standard or proprietary) through the personalized biometrics hub'snetwork connection(s) to enable the personalized biometrics hub tocommunicate with each biometric device. Once a session is establishedwith a biometric device, the personalized biometrics hub may become ananchor for all the services that seek to communicate with a biometricdevice or access biometric data from a given biometric device,regardless of the method of communication or the protocol stack that isused to deliver services. Thus, biometric devices may be deployed as“thin clients” with a minimum of components to maintain communicationwith the personalized biometrics hub. Biometric devices with enhancedcapabilities and communication modules may consume less power bydisabling or minimizing the use of such features.

From a third party service provider's perspective, the personalizedbiometrics hub and a thin client (i.e., a biometric device) appear asone entity. In one example, the personalized biometrics hub has theability to control biometric device power utilization by controlling thefrequency and duration of communications, and may also communicate withauthorized remote devices, such as computing devices of third-partyhealthcare-related entities, regarding the status(es) of biometricdevices. The personalized biometrics hub may also store biometric dataand other information received from various biometric devices for futurerecovery and statistical purposes. In particular, the personalizedbiometrics hub may provide local storage (e.g., at the user/customerpremises) of biometric data for third-parties, either as a primarysource of the biometric data or a backup source in case a biometricdevice, or a primary network connection of a biometric device, fails.

In one example, the personalized biometrics hub provides data policymanagement for authorized remote devices/third-party devices, and maynegotiate the types of data the third-parties want to access, how oftento provide data, how much data to provide, how much data to store, themode(s) of communication to use to transmit the data to the authorizedremote devices, and so forth. In one example, the data policy managementmay include receiving schedules for processing biometrics data of one ormore biometrics devices, negotiating such schedules, and storing andtransmitting biometrics data to the authorized remote devices inaccordance with such schedules. The personalized biometrics hub alsocommunicates with local biometric devices to obtain the biometric data.For instance, the personalized biometrics hub may act as a pass-throughand provide biometric data from a biometric device to an authorizedremote device as it is generated. In another example, the personalizedbiometrics hub may provide local storage for the third-party requestorand/or authorized remote device if real-time biometrics data is notneeded. For example, the third-party may request that an authorizedremote device receive biometric data only during overnight hours so thatbandwidth during the day is reserved for employees within an office,while machine-to-machine data that is not time critical may flow whenthe office is empty. Thus, in one example, the personalized biometricshub is tasked with establishing and tearing down sessions withauthorized remote devices for conveying biometric data, while thebiometric devices may simply have an always-on, persistent connectionwith the personalized biometrics hub and do not need to incur the extrapower consumption of establishing and tearing down sessions each timethere is biometric data to send.

In addition, in one example, the personalized biometrics hub may informthird parties of problems at the customer premises with one or morebiometric devices, such as a power failure of a particular device, ageneral loss of power at the premises, a loss of connectivity via aprimary mode of communication, and so forth. In one example, thepersonalized biometrics hub may receive instructions from third-partiesfor various purposes, such as to shut down non-essential biometricdevices, while maintaining reduced-power consumption data feeds fromother biometric devices that are more critical and/or to change aschedule for processing biometrics data from one or more biometricsdevices. For example, a change in schedule may cause the biometrics hubto: store more or less biometrics data from one or more biometricsdevices, change a mode of communication for transmitting the biometricdata, instruct one or more biometrics devices to transmit more or lessbiometrics data, instruct one or more biometrics devices to reduce afrequency of measurement sampling, and so on. In another example, thebiometrics hub may take an automated action to change a schedule forprocessing biometrics data from one or more biometrics devices and maynotify one or more authorized remote devices of the schedule change.These and other aspects of the present disclosure are discussed ingreater detail below in connection with the examples of FIGS. 1-4.

To better understand the present disclosure, FIG. 1 illustrates anexample network, or system 100 that may implement examples of thepresent disclosure for changing a schedule for processing biometricsdata in response to detecting a power event and/or for transmittingbiometrics data to an authorized remote device in accordance with aschedule. In one example, the system 100 includes a telecommunicationnetwork 110. As illustrated in FIG. 1, the telecommunication network 110may combine core network components of a cellular network withcomponents of a triple play service network, where triple play servicesinclude telephone services, Internet services and television services tosubscribers. For example, telecommunication network 110 may functionallycomprise a fixed mobile convergence (FMC) network, e.g., an IPMultimedia Subsystem (IMS) network. In addition, telecommunicationnetwork 110 may functionally comprise a telephony network, e.g., anInternet Protocol/Multi-Protocol Label Switching (IP/MPLS) backbonenetwork utilizing Session Initiation Protocol (SIP) for circuit-switchedand Voice over Internet Protocol (VoIP) telephony services. For example,telecommunication network 110 may include a Serving-Call Session ControlFunction (S-CSCF), a Proxy-Call Session Control Function (P-CSCF), or anInterrogating-Call Session Control Function (I-CSCF), one or morebilling servers for billing one or more services, including cellulardata and telephony services, wire-line phone services, Internet accessservices, and television services. In one example, telecommunicationnetwork 110 may include cellular core network components, e.g.,components of a Long Term Evolution (LTE) Evolved Packet Core (EPC),such as a Home Subscriber Server/Home Location Register (HSS/HLR) fortracking cellular subscriber device location and other functions, amobility management entity (MME) a serving gateway (SGW), a packet datanetwork gateway (PGW, or PDN-GW), an authentication, authorization,and/or accounting (AAA) server, and so forth.

As illustrated in FIG. 1, telecommunication network 110 includes agateway 111, an application server 114 and a database 115, e.g., a datastorage device/server, a cluster of servers for data storage, etc.Application server 114 may provide a healthcare-related service to oneor more user/subscribers of telecommunication network 110, such asmonitoring and anticipating strokes, detecting seizures, falls, ordisorientation, notifying medical professionals, family members, orother caregivers of such conditions, and so forth. In one example,database 115 may receive and store biometrics data, e.g., for archiving,for periodic access by AS 114 to generate reports, charts, or otherhealthcare-related visualizations for a user associated with biometricdevices 162-164 and/or for medical professionals, insurance companies,caregivers, and/or other authorized third parties, and so on. In oneexample, gateway 111 may facilitate communications between biometricshub 166 and/or biometric devices 162-164 in home network 160 and one ormore authorized remote devices, such as AS 114 and/or DB 115, computingdevices 149 in other networks 140, and so forth in connection withexamples of the present disclosure for changing a schedule forprocessing biometrics data in response to detecting a power event and/orfor transmitting biometrics data to an authorized remote device inaccordance with a schedule. In one example, gateway 111 may comprise aPDN gateway, or a device connected to a PDN gateway through which allcommunications to and from biometrics hub 166 and/or biometric devices162-164 may be routed.

Telecommunication network 110 may also further comprise a broadcasttelevision network, e.g., a traditional cable provider network or anInternet Protocol Television (IPTV) network, as well as an InternetService Provider (ISP) network. With respect to television serviceprovider functions, telecommunication network 110 may include one ormore television servers (not shown) for the delivery of televisioncontent, e.g., a broadcast server, a cable head-end, interactiveTV/video-on-demand (VOD) server(s), advertising/television commercialservers, and so forth. For example, telecommunication network 110 maycomprise a video super hub office, a video hub office and/or a serviceoffice/central office. For ease of illustration, various elements oftelecommunication network 110 are omitted from FIG. 1.

In one example, the access network 130 may comprise a Digital SubscriberLine (DSL) network, a broadband cable access network, a Local AreaNetwork (LAN), a 3^(rd) party network, and the like. For example, theoperator of telecommunication network 110 may provide a cable televisionservice, an IPTV service, or any other type of television service tosubscribers via access network 120. In this regard, access network 130may include a node, e.g., a mini-fiber node (MFN), a video-ready accessdevice (VRAD) or the like. However, in another example, such a node maybe omitted, e.g., for fiber-to-the-premises (FTTP) installations. Accessnetwork 130 may also transmit and receive communications between homenetwork 160 and telecommunication network 110 relating to voicetelephone calls, communications with computing devices 149 via othernetworks 140, and/or the Internet in general, and so forth. In anotherexample, access network 130 may be operated by a different entity fromtelecommunication network 110, e.g., an Internet service provider (ISP)network.

In one embodiment, access network 150 may comprise a radio accessnetwork implementing such technologies as: Global System for MobileCommunication (GSM), e.g., a Base Station Subsystem (BSS), or IS-95, aUniversal Mobile Telecommunications System (UMTS) network employingWideband Code Division Multiple Access (WCDMA), or a CDMA3000 network,among others. In other words, wireless access network 150 may comprisean access network in accordance with any “second generation” (2G),“third generation” (3G), “fourth generation” (4G), Long Term Evolution(LTE) or any other yet to be developed future wireless/cellular networktechnology. While the present disclosure is not limited to anyparticular type of wireless access network, in the illustrative example,wireless access network 150 is shown as an evolved UMTS terrestrialradio access network (eUTRAN) subsystem. Thus, element 155 may comprisea Node B or evolved Node B (eNodeB). In one example, wireless accessnetwork 150 may be controlled and/or operated by a same entity as corenetwork 110.

In one example, home network 160 may include a home gateway 161, whichreceives data/communications associated with different types of media,e.g., television, phone, and Internet, and separates thesecommunications for the appropriate devices. The data/communications maybe received via access network 130. In one example, television data isforwarded to set-top boxes (STBs)/digital video recorders (DVRs) to bedecoded, recorded, and/or forwarded to televisions in the home forpresentation. Similarly, telephone data is sent to and received from ahome phone, while Internet/data communications are sent to and receivedfrom router 165, which may be capable of both wired and/or wirelesscommunication. In turn, router 165 receives data from and sends data tothe appropriate devices, e.g., a personal computer or laptop computer,mobile endpoint device 167, and so forth. The mobile endpoint device 167may comprise a cellular telephone, a smartphone, a tablet computingdevice, a laptop computer, a pair of computing glasses, a wirelessenabled wristwatch, or any other wireless and/or cellular-capable mobiletelephony and computing device (broadly, a “mobile endpoint device”). Inone example, the mobile endpoint device 167 may comprise a device of asubscriber or customer of the telecommunication network 110. In oneexample, router 165 may comprise a wired Ethernet router and/or anInstitute for Electrical and Electronics Engineers (IEEE) 802.11 (Wi-Fi)router, and may communicate with respective devices in home network 160via wired and/or wireless connections.

As illustrated in FIG. 1, home network 160 may also include a biometricshub 166 and biometrics devices 162-163. In one example, the biometricshub 166 may comprise a device, such as the computing device or system400 depicted in FIG. 4, specifically configured to provide one or morefunctions for changing a schedule for processing biometrics data inresponse to detecting a power event and/or for transmitting biometricsdata to an authorized remote device in accordance with a schedule, inaccordance with the present disclosure. For instance, an example method200 for changing a schedule for processing biometrics data in responseto detecting a power event is illustrated in FIG. 2 and described ingreater detail below. In addition, an example method 300 fortransmitting biometrics data to an authorized remote device inaccordance with a schedule is illustrated in FIG. 3 and described ingreater detail below. As used herein, the terms “instantiate,”“configure,” and “reconfigure” may refer to programming or loading acomputing device with computer-readable/computer-executableinstructions, code, and/or programs, e.g., in a memory, which whenexecuted by a processor of the computing device, may cause the computingdevice to perform various functions. In addition, such terms maycomprise provisioning, allocating or assigning other resources of acomputing device to a component, such as all or a portion of a memory,an attached data storage unit, and so forth. In accordance with thepresent disclosure, biometrics hub 166 may include antenna(s),radios/transceivers and/or other modules for both cellular communicationand non-cellular wireless communication (e.g., IEEE 802.11). Thus,biometrics hub 166 may have a first mode of communication via router 165(e.g., a Wi-Fi mode, or a wired local area network (LAN) connectionmode, such as a wired Ethernet link) as well as a second mode ofcommunication (e.g., a cellular mode) via element 155 in access network150, e.g., an eNodeB.

Biometric devices 162-164 may comprise wearable units, devices connectedto a body of a user, e.g., a user of mobile endpoint device 167, ordevices which are not specifically connected to the body of the user,but which nevertheless measure physical parameters of the user (broadly“biometric data”), such as: a heartrate, a breathing rate, a bloodoxygen concentration, a blood sugar level, an electrocardiogram pattern,a pupil dilation, an activity level, skin conductance and/or sweat/skinmoisture levels, a body temperature, an activity level, a voice pitchand tone, and so forth. The biometric devices 162-164 may comprise, forexample: heart rate monitors, electrocardiogram devices, acousticsensors, sensors for measuring users' breathing rates, galvanic skinresponse (GSR) devices, portable electroencephalography (EEG) devices,event-related potential (ERP) measurement devices, diffuse opticaltomography (DOT) scanners, and so forth. The biometrics hub 166 and/orthe mobile endpoint device 167 may be in communication with biometricdevices 162-164 via wired connections, such as universal serial bus(USB) connections, high-definition multimedia interface (HDMI)connections, wired Ethernet connections, or the like, or via wirelessconnections, such as a via infrared transmitters or transceivers,radios/transceivers for IEEE 802.11 based communications (e.g.,“Wi-Fi”), IEEE 802.15 based communications (e.g., “Bluetooth”, “ZigBee”,etc.), and so forth.

As illustrated in FIG. 1, home network 160 also includes a power servicepanel 168, which may receive electrical power from a power distributionnetwork, e.g., power supplier domain 120. In this regard, it should benoted that power supplier domain 120 may include power distributioninfrastructure, as well as enterprise computing components, which mayinclude a computing device 129, e.g., a server, for managingcommunications with devices in home network 160 and/or intelecommunication network 110 regarding power events that may relate tothe power supplier domain 120 and which may affect the collection,storage, and or transmission of biometric data from home network 160.For example, computing device 129 may send messages to biometrics hub166 regarding an anticipated loss of power to the premises of homenetwork 160.

In one example, the power service panel 168 receives and distributeselectrical power from power supplier domain 120 to devices in the homenetwork such as biometrics hub 166, router 165, home gateway 161,biometric device 162, and biometric device 163. In one example, homenetwork 160 also include a backup power source 169, such as battery, agenerator, a solar panel or solar array, and so forth. In the example ofFIG. 1, the backup power source 169 may be connected to the biometricshub 166 and biometric device 163. For example, biometric device 163 maymeasure biometric data of a user that is deemed to be of greaterimportance than the biometric data measured by biometric device 162.Thus, in the event of a loss of power from the power supplier domain120, the use of the backup power source 169 may be reserved for thebiometrics hub 166 and biometric device 163 to enable the biometric datafrom biometric device 163 to continue to flow to one or more authorizedremote devices. In addition, the backup power source 169 may allowbiometrics hub 166 to send notifications to computing device 129regarding a loss of power at the premises of home network 160. Forexample, biometrics hub 166 may use a built-in cellular transceiver tocommunicate with computing device 129 via element 155 (e.g., an eNodeB)in access network 150 and via telecommunication network 110, after otherdevices in home network 160, such as router 165 and home gateway 161fail due to a loss of power from power supplier domain 120.

In one example, other networks 140 may represent one or more enterprisenetworks, a circuit switched network (e.g., a public switched telephonenetwork (PSTN)), a cable network, a digital subscriber line (DSL)network, a metropolitan area network (MAN), an Internet service provider(ISP) network, and the like. In one example, the other networks 140 mayinclude different types of networks. In another example, the othernetworks 140 may be the same type of network. In one example, the othernetworks 140 may represent the Internet in general. Computing devices145 may include servers, such as web servers, storage devices,enterprise servers, email servers, and so forth. Computing devices 145may also include personal computers, desktop computers, laptopcomputers, personal digital assistants (PDAs), tablet computing devices,or any other devices for wireless and/or wired communications. In oneexample, biometrics hub 166, mobile endpoint device 167, and/or any oneor more of biometric devices 162-164 may communicate with computingdevices 145 in other networks 140 via gateway 111 and telecommunicationnetwork 110. In one example, computing devices 145 may comprise serversfor healthcare-related applications, such as a secure database serverand/or secure streaming server for storing biometrics data, a server forremotely monitoring biometric devices and/or a patient associated withthe biometric devices, or a computing device of a doctor, a hospital, aninsurance company, and so forth. In one example, computing devices 145may comprise authorized remote devices, i.e., devices which arepermitted to receive biometrics data from any one or more of biometricdevices 162-164, to change schedules for processing biometric data fromany one or more of biometric devices 162-164, or to otherwise interactwith biometrics hub 166 and/or biometric devices 162-164. In oneexample, AS 114 and/or DB 115 may also comprise an authorized remotedevice, in accordance with the present disclosure.

In one example, communications to and from biometrics hub 166 andbiometrics devices 162-164 with authorized remote devices may all berouted through gateway 111. In one example, the gateway 111 may bereached by devices in home network 160 via different modes ofcommunication, e.g., via Wi-Fi through router 165, home gateway 161, andaccess network 130, via a separate dedicated connection betweenbiometrics hub 166 and access network 130, via a cellular connectionover access network 150, and so forth. In one example, biometrics hub166 establishes and maintains secure sessions with biometric devices162-164. The secure sessions may comprise persistent sessions wherebybiometric devices 162-164 may send biometric data as it iscollected/generated, or when the biometric devices 162-164 are scheduledto transmit the biometric data according to schedule(s) for processingthe biometric data. In other words, the biometric devices 162-164 and/orthe biometrics hub 166 do not need to establish/reestablish sessionsprior to transmitting and receiving the biometric data. In one example,biometrics hub 166 may store biometric data and transmit biometric datato authorized remote devices via gateway 111 according to one or moreschedules for processing the biometric data. In one example, biometricshub 166 establishes a secure connection to gateway 111, e.g., an EvolvedPacket System (EPS) bearer, further establishes a secure tunnel to anauthorized remote device using the secure connection to gateway 111,transmits biometrics data, and tears down the secure tunnel to theauthorized remote device and/or the secure connection to gateway 111.These features of biometrics hub 166 may be provided according to one ormore schedules for processing biometrics data, as described herein.

It should be noted that the system 100 has been simplified. In otherwords, the system 100 may be implemented in a different form than thatwhich is illustrated in FIG. 1. For example, the system 100 may beexpanded to include additional networks, such as network operationscenter (NOC) networks, additional eUTRANs, and so forth. The system 100may also be expanded to include additional network elements such asborder elements, routers, switches, policy servers, security devices,gateways, a content distribution network (CDN) and the like, withoutaltering the scope of the present disclosure. In addition, system 100may be altered to omit various elements, substitute elements for devicesthat perform the same or similar functions, combine elements that areillustrated as separate devices, and/or implement network elements asfunctions that are spread across several devices that operatecollectively as the respective network elements. In addition, variouselements of power supplier domain 120, access networks 130 and 150,other networks 140, and telecommunication network 110 may be omitted forclarity, including gateways or border elements providing connectivitybetween such networks. Similarly, due to the relatively large number ofconnections available between devices in the system 100, various linksbetween various components of system 100 are also omitted for clarity.

In addition, although aspects of the present disclosure have beendiscussed above in the context of a long term evolution (LTE)-basedcellular architecture, examples of the present disclosure are not solimited. For example, the teachings of the present disclosure can beapplied to other types of cellular networks (e.g., a 2G network, a 3Gnetwork, and the like, or a future technology or standard-basednetwork). For instance, examples of the present disclosure may implementpacket data protocol (PDP) contexts for devices accessing data servicesthrough a gateway General Packet Radio Service (GPRS) support node(GGSN) instead of an EPS bearer associated with a PDN gateway. Thus,these and other modifications are all contemplated within the scope ofthe present disclosure.

FIG. 2 illustrates a flowchart of an example method 200 for changing aschedule for processing biometrics data in response to detecting a powerevent, in accordance with the present disclosure. In one example, steps,functions and/or operations of the method 200 may be performed by abiometrics hub, e.g., biometrics hub 166 in FIG. 1, or biometrics hub166 in conjunction with other components of the system 100, such asgateway 111, and so forth. In one example, the steps, functions, oroperations of method 200 may be performed by a computing device orsystem 400, and/or processor 402 as described in connection with FIG. 4below. For example, the system 400 may represent a biometrics hub inaccordance with the present disclosure. For illustrative purposes, themethod 200 is described in greater detail below in connection with anexample performed by a processor, such as processor 402. The methodbegins in step 205 and may proceed to optional step 210, optional step215, or step 220.

At optional step 210, the processor may download from a networkrepository a first driver for communications with a first biometricdevice and/or a second driver for communications with a second biometricdevice. The network repository may comprise a server of avendor/manufacturer of the first biometric device and/or the secondbiometric device. In one example, the first biometric device and thesecond biometric device are configured to communicate in differentvendor formats. Thus, the biometrics hub (and the processor) may utilizedifferent drivers to communicate with the different biometric devices.

At optional step 215, the processor may install (at the biometrics hub)the at least one of the first driver for communications with the firstbiometric device or the second driver for communications with the secondbiometric device that is downloaded at optional step 210. In oneexample, one of the first driver for communications with the firstbiometric device or the second driver for communications with the secondbiometric device may be downloaded from a network repository at optionalstep 210, while the other of the first driver or the second driver ispre-installed on the biometrics hub.

At step 220, the processor may establish a schedule for processing theat least one the first biometric data or the second biometric data. Theschedule for processing the at least one the first biometric data or thesecond biometric data may define at least one of: a timing fortransmitting the first biometric data or the second biometric to anauthorized remote device, a timing for receiving the first biometricdata from the first biometric device or for receiving the secondbiometric data from the second biometric device, a quantity of the firstbiometric data or the second biometric data to store at the biometricshub, or a primary mode of communication for the transmitting of thefirst biometric data or the second biometric data to the authorizedremote device. In one example, the schedule for processing the at leastone the first biometric data or the second biometric data may alsodefine one or more secondary/backup modes of communication, or anindication to not allow secondary modes of communication. For example, abiometric device may have non-critical biometric data. Thus, if acellular mode of communication may be available via the biometrics hub,it may be used as a secondary mode of communication for some biometricdevices, but may not be used for non-critical biometric data of otherbiometric devices in order to conserve power, bandwidth, etc.

In one example, the schedule is received from a device of a requestingentity, e.g., from a device of the user, from the authorized remotedevice, or from another authorized entity associated with the user orthe authorized remote device, e.g., a doctor, a caregiver, an insurer, ahealthcare data storage provider, a healthcare application provider,etc. In one example, step 220 may include establishing a second schedulefor processing another of the first biometric data or the secondbiometric data, a third schedule for processing third biometric datafrom a third biometric device, and so forth, where the second schedule,the third schedule, etc., may be received from the same or a differententity as the first schedule. In one example, step 220 may include theprocessor negotiating a schedule with a device/entity requesting theschedule. For instance, the biometrics hub may not have sufficientstorage capacity to accommodate the storage preferences of multiplerequested schedules. Therefore, the processor may advise that it cannotaccommodate a schedule and reject the schedule, or may request that theschedule be voluntarily changed to comply with the current capabilitiesof the biometrics hub, an authorization level or priority of therequesting entity, and so forth.

At step 225, establishes a session with a first biometric device. In oneexample, the session comprises a persistent session. In other words, anew session between the first biometric device and the biometrics hubdoes not need to be established each time the first biometric device hasbiometrics data to send.

At step 230, the processor receives first biometric data of a user fromthe first biometric device. The first biometric data may comprisemeasurements of various physical parameters of the user, such as: aheartrate, a breathing rate, a blood oxygen concentration, a blood sugarlevel, an electrocardiogram pattern, a pupil dilation, an activity level(e.g., a number of steps taken, a distance walked, run, swam, cycled,paddled, etc.), a skin conductance (e.g., indicative of skin moistureand/or sweat), a body temperature, a voice pitch, a voice tone, and soforth.

At step 235, the processor establishes a session with a second biometricdevice. In one example, the session comprises a persistent session. Inother words, a new session between the second biometric device and thebiometrics hub does not need to be established each time the secondbiometric device has biometrics data to send.

At step 240, the processor receives second biometric data of the userfrom the second biometric device. The second biometric data may comprisemeasurements of various physical parameters of the user, as describedabove in connection with the first biometric data that is received atstep 230.

At step 245, the processor stores the first biometric data and thesecond biometric data at the biometrics hub. In one example, the firstbiometric data or the second biometric data is received and stored atthe biometrics hub in accordance with the schedule for processing the atleast one the first biometric data or the second biometric data that isestablished at optional step 220. For instance, the duration of thestorage, the quantity of biometric data stored, and so forth, may be inaccordance with the schedule. For example, the schedule may call for thebiometrics hub to store the first biometric data for a time period of 12hours after which the data may be flushed to allow storage of subsequentfirst biometric data from the first biometric device. In addition, inone example, the session with the first biometric device is maintainedbetween transmission bursts of the first biometric data from the firstbiometric device to the biometrics hub, and the session with the secondbiometric device is maintained between transmission bursts of the secondbiometric data from the second biometric device to the biometrics hub.In other words, the sessions may comprise persistent sessions. Followingstep 245, the method may proceed to optional step 250, optional step255, or step 260.

At optional step 250, the processor may receive a request for at leastone of the first biometric data or the second biometric data from anauthorized remote device. For instance, in one example the biometricshub may be used as a backup source of the at least one of the firstbiometric data or the second biometric data. In one example, theauthorized remote device may receive the at least one of the firstbiometric data or the second biometric data directly from the firstbiometric device and/or the second biometric device (e.g., withoutpassing through the biometrics hub). However, if communications betweenthe first biometric device and/or the second biometric device and theauthorized remote device fails for any reason, the authorized remotedevice may request the first biometric data and/or the second biometricdata from the biometrics hub.

At optional step 255, the processor may transmit the at least one of thefirst biometric data or the second biometric data to the authorizedremote device in response to the request received at optional step 250or in accordance with the schedule established at optional step 220. Forinstance, as mentioned above, a connection between the first biometricdevice and the authorized remote device or a connection between thesecond biometric device and the authorized remote device that does notinclude the biometrics hub may fail. Thus, the authorized remote devicemay request the first biometric data and/or second biometric data fromthe biometrics hub, in response to which the processor may transmit thefirst biometric data or the second biometric data to the authorizedremote device. However, in another example, the transmitting at optionalstep 255 may be according to a schedule, which may indicate when totransmit the at least one of the first biometric data or the secondbiometric data to the authorized remote device, a quantity of the atleast one of the first biometric data or the second biometric data, a(primary) communication mode to transmit the at least one of the firstbiometric data or the second biometric data, and so forth.

At step 260, the processor detects a power event associated with atleast one of the first biometric device or the second biometric device.The detecting the power event may comprise: receiving an electronicwarning message from a power distribution network indicating an upcomingloss of power from the power distribution network, detecting a loss ofpower at the biometrics hub from a power distribution network, detectinga loss of connectivity of a primary mode of communication of thebiometrics hub, receiving a notification of a low battery from the atleast one of the first biometric device or the second biometric device,and so forth. In one example, the first biometric device and/or thesecond biometric device remains in operation (or at least in partialoperation) following the power event.

At step 265, the processor changes, in response to detecting the powerevent, a schedule for processing at least one of the first biometricdata or the second biometric data. For example, the processor may reducea frequency of communication of the first biometric data or the secondbiometric data from the at least one of the first biometric device orthe second biometric device, decrease a frequency of measurementsampling of the at least one of the first biometric device or the secondbiometric device, or increase a storage duration or a storage quantityof the first biometric data or the second biometric data at thebiometrics hub. In the first two cases, the processor may send aninstruction to the first biometric device or the second biometric deviceto change behavior in accordance with the schedule change. In anotherexample, the changing the schedule for processing the at least one ofthe first biometric data or the second biometric data in response todetecting the power event may comprise transmitting the at least one ofthe first biometric data or the second biometric data to the authorizedremote device. For example, the schedule may call for sending the atleast one of the first biometric data or the second biometric data tothe authorized remote device at a later time. However, the power eventmay be a loss of power at the premises of the biometrics hub, and thebiometrics hub may be utilizing a backup power source, or there may bean imminent loss of power for which the biometrics hub has received anotification. Thus, the processor may attempt to send all or as much ofthe stored biometric data as possible prior to a possible complete lossof power or total loss of connectivity. As mentioned above, the firstbiometric device and/or the second biometric device may remain inoperation (or at least in partial operation) following the power event.In addition, in one example, the at least one of the first biometricdevice or the second biometric device may be powered by a backup powersource following the power event. For instance, the power distributionnetwork may comprise a primary power source for the at least one of thefirst biometric device or the second biometric device, while the firstbiometric device or the second biometric device may utilize an internalbattery backup, an external battery backup, a generator, a solarpanel/array, or the like as a secondary/backup power source.

In another example, the changing the schedule for processing the atleast one of the first biometric data or the second biometric data inresponse to detecting the power event may comprise transmitting thefirst biometric data or the second biometric data to the authorizedremote device via the biometrics hub, wherein prior to the power event,the at least one of the first biometric device or the second biometricdevice communicates the first biometric data or the second biometricdata to the authorized remote device independent from the biometricshub. In other words, the biometrics hub may comprise a backup storage.If the connectivity between the first biometric device or the secondbiometric device and the authorized remote device fails, the processormay then take over and begin transmitting to the authorized remotedevice. In one example, this may include using a different mode ofcommunication. For instance, the first biometric device or the secondbiometric device may transmit the first biometric data or secondbiometric data, respectively, to the authorized remote device via aWi-Fi connection to a router at the premises and via an ISP connection.However, the processor and the biometrics hub may utilize a cellularradio to transmit the at least one of the first biometric data or secondbiometric data to the authorized remote device via a cellular accessnetwork. In one example, the biometrics hub may be connected to a homegateway or a router for transmitting the first biometric data or thesecond biometric data to the authorized remote device, and may furtherinclude a cellular transceiver for transmitting the first biometric dataor the second biometric data to the authorized remote device via acellular link.

Following step 265, the method 200 may proceed to optional step 270,optional step 275, or to step 295.

At optional step 270, the processor may activate a backup power sourcefor the at least one of the first biometric device or the secondbiometric device in response to detecting the power event. For instance,in one example, the backup power source may need to be turnedon/activated in order to provide power to the at least one of the firstbiometric device or the second biometric device, such as a generator, abattery backup, etc. In one example, the backup power source may alsopower the biometrics hub when activated.

At optional step 275, the processor may send a notification of the powerevent to a user endpoint device of a user associated with the biometricshub. In one example, the notification may also include a notification ofthe change in the schedule. In one example, the processor may receive aninstruction from the user endpoint device in response to thenotification. For instance, the user endpoint device may instruct theprocessor to further change the schedule. For example, the processor mayautomatically instruct one of the first biometric device or the secondbiometric device to change a measurement sampling interval. However, theuser may prefer that the first biometric device or the second biometricdevice be taken completely offline to conserve additional bandwidth orpower for other biometric devices, for instance. Following step 275, themethod 200 may proceed to step 295 where the method 200 ends.

FIG. 3 illustrates a flowchart of an example method 300 for transmittingbiometrics data to an authorized remote device in accordance with aschedule. In one example, steps, functions and/or operations of themethod 300 may be performed by a biometrics hub, e.g., biometrics hub166 in FIG. 1, or biometrics hub 166 in conjunction with othercomponents of the system 100, such as gateway 111, and so forth. In oneexample, the steps, functions, or operations of method 300 may beperformed by a computing device or system 400, and/or processor 402 asdescribed in connection with FIG. 4 below. For example, the system 400may represent a biometrics hub in accordance with the presentdisclosure. For illustrative purposes, the method 300 is described ingreater detail below in connection with an example performed by aprocessor, such as processor 402. The method begins in step 305 and mayproceed to optional step 310, optional step 315, or step 320.

At optional step 310, the processor may download from a networkrepository a first driver for communications with a first biometricdevice and/or a second driver for communications with a second biometricdevice. In one example, optional step 310 may comprise the same orsimilar operations as described above in connection with optional step210 of the example method 200.

At optional step 315, the processor may install (at the biometrics hub)the at least one of the first driver for communications with the firstbiometric device or the second driver for communications with the secondbiometric device that is downloaded at optional step 310. In oneexample, optional step 315 may comprise the same or similar operationsas described above in connection with optional step 215 of the examplemethod 200.

At step 320, the processor establishes a first schedule for processingfirst biometric data of a user. The first biometric data of the user maybe measured/generated by the first biometric device. In one example, thefirst schedule for processing the first biometric data of the user maydefine at least one of: a timing for transmitting the first biometricdata to an authorized remote device, a timing for receiving the firstbiometric data from the first biometric device, a quantity of the firstbiometric to store at the biometrics hub, or a primary mode ofcommunication for the transmitting of the first biometric data to theauthorized remote device. In one example, the schedule for processingthe at least one the first biometric data or the second biometric datamay also define one or more secondary/backup modes of communication, oran indication to not allow secondary modes of communication. In oneexample, step 320 may comprise the same or similar operations asdescribed above in connection with step 220 of the example method 200.

At step 325, the processor establishes a second schedule for processingsecond biometric data of the user. In one example, step 325 may compriseoperations similar to those described in connection with step 320, andmay comprise similar operations as described above in connection withstep 220 of the example method 200. However, step 325 may relate tosecond biometric data of the user that is measured/generated by a secondbiometric device and may relate to a different type of physicalparameter of the user than the first biometric data from the firstbiometric device. In one example, at least one of the first schedule orthe second schedule is received from the authorized remote device.Alternatively, or in addition, at least one of the first schedule or thesecond schedule may be received from a device of the user. In addition,in one example, step 320 and/or step 325 may include the processornegotiating a schedule that is requested by the authorized remotedevice, by the device of the user, or by another entity.

At step 330, the processor stores the first biometric data that isreceived from the first biometric device via a first persistent session.For instance, the first persistent session with the first biometricdevice is maintained between transmission bursts of the first biometricdata from the first biometric device to the biometrics hub. In oneexample, the first biometric data is stored at the biometrics hub inaccordance with the first schedule.

At step 335, the processor stores the second biometric data that isreceived from the second biometric device via a second persistentsession. For instance, the second persistent session with the secondbiometric device is maintained between transmission bursts of the secondbiometric data from the second biometric device to the biometrics hub.In one example, the second biometric data is stored at the biometricshub in accordance with the second schedule.

In one example, the storing of the first biometric data at step 330 andthe second biometric data at step 335 may comprise the same or similaroperations as described above in connection with step 245 of the examplemethod 200. In addition, in one example, the first biometric data andthe second biometric data may comprises measurements of various physicalparameters of the user, such as: a heartrate, a breathing rate, a bloodoxygen concentration, a blood sugar level, an electrocardiogram pattern,a pupil dilation, an activity level (e.g., a number of steps taken, adistance walked, run, swam, cycled, paddled, etc.), a skin conductance(e.g., indicative of skin moisture and/or sweat), a body temperature, avoice pitch, a voice tone, and so forth.

At step 340, the processor transmits at least one of the first biometricdata or the second biometric data to the authorized remote device inaccordance with the first schedule or the second schedule. Thetransmitting at step 340 may include: establishing a session (e.g., asecure tunnel) with the authorized remote device, sending the at leastone of the first biometric data or the second biometric data to theauthorized remote device via the session with the authorized remotedevice, and closing the session with the authorized remote device.Following step 340, the method may proceed to optional step 345,optional step 360, or step 395.

At optional step 345, the processor may detect a power event associatedwith at least one of the first biometric device or the second biometricdevice. The detecting the power event may comprise: receiving anelectronic warning message from a power distribution network indicatingan upcoming loss of power from the power distribution network, detectinga loss of power at the biometrics hub from a power distribution network,detecting a loss of connectivity of a primary mode of communication ofthe biometrics hub, receiving a notification of a low battery from theat least one of the first biometric device or the second biometricdevice, and so forth. In one example, the first biometric device and/orthe second biometric device remains in operation (or at least in partialoperation) following the power event. In one example, optional step 345may comprise the same or similar operations as described above inconnection with step 260 of the example method 200. Following optionalstep 345, the method 300 may proceed to optional step 350, optional step360, or step 395.

At optional step 350, the processor may send a notification of the powerevent to the authorized remote device. In one example, the notificationmay be sent via a backup/secondary mode of communication, or via aprimary mode of communication and a backup/secondary mode ofcommunication. For instance, the power event may be a loss of theprimary mode of communication, e.g., a router failure, a connectionfailure to an ISP network, etc., or may be a loss of power that causessuch components to fail. Accordingly, the use of the secondary mode ofcommunication, or multiple modes of communication may help to ensurethat the notification is received at the authorized remote device.

At optional step 355, the processor may receive an instruction from theauthorized remote device to change at least one of the first schedulefor processing the first biometric data or the second schedule forprocessing the second biometric data. The instruction to change the atleast one of the first schedule or the second schedule may comprise aninstruction to: change a frequency of transmitting the first biometricdata or the second biometric data to the authorized remote device,increase a quantity of storage of the first biometric data or the secondbiometric data at the biometrics hub, decrease a frequency ofmeasurement sampling of at least one of the first biometric data by thefirst biometric device or the second biometric data by the secondbiometric device, or change a frequency of sending the first biometricdata by the first biometric device or the second biometric data by thesecond biometric device. In another example, the instruction to changethe at least one of the first schedule or the second schedule comprisesan instruction to change a mode of communication for transmitting the atleast one of the first biometric data or the second biometric data tothe authorized remote device. In one example, the processor may receivemultiple instructions from the authorized remote device, such as: changea mode of communication in addition to changing a frequency oftransmitting the first biometric data or the second biometric data tothe authorized remote device.

At optional step 360, the processor may change at least one of the firstschedule for processing the first biometric data or the second schedulefor processing the second biometric data in response to the instructionreceived at optional step 355. In another example, the processor maychange the at least one of the first schedule for processing the firstbiometric data or the second schedule for processing the secondbiometric data in response to detecting the power event. For instance,in one example, the notification sent at optional step 350 may includean indication of the change to be made to the at least one of the firstschedule for processing the first biometric data or the second schedulefor processing the second biometric data at optional step 360. Forinstance, the change to the at least one of the first schedule forprocessing the first biometric data or the second schedule forprocessing the second biometric data may comprise one of the same typesof changes mentioned above in connection with optional step 355.However, in one example the processor may automatically determine thechange, or may make the change according to the first schedule or thesecond schedule. For instance, the first schedule or the second schedulemay define changes to be made with respect to a frequency of collectionor transmission of biometric data, a timing of transmitting biometricdata, etc., in response to power events, or different changes to be madein response to specific types of power events. Following optional step360, the method 300 may proceed to optional step 365 or to step 395.

At optional step 365, the processor may transmit the at least one thefirst biometric data or the second biometric data to the authorizedremote device in accordance with the first schedule or the secondschedule that is changed. For instance, the processor may transmit thefirst biometric data or the second biometric data to the authorizedremote device with an increased or decreased frequency, e.g., sessionsfor transmission bursts once every five minutes, sessions fortransmission bursts once every 20 minutes, etc., with an increased ordecreased data volume, e.g., transmitting five minute samples, versus 30second samples, one minute samples, etc., and so on. Alternatively, orin addition, the processor may utilize a secondary mode of communicationfor transmitting the at least one of the first biometric data or thesecond biometric data to the authorized remote device, such as using acellular connection instead of an ISP network connection via Wi-Fi.Following optional step 365, the method 300 may proceed to step 395. Atstep 395, the method 300 ends.

In addition, it should be noted that although not specificallyspecified, one or more steps, functions or operations of the method 200or the method 300 may include a storing, displaying and/or outputtingstep as required for a particular application. In other words, any data,records, fields, and/or intermediate results discussed in the method 200or the method 300 can be stored, displayed and/or outputted to anotherdevice as required for a particular application. Furthermore, steps orblocks in FIG. 2 or FIG. 3 that recite a determining operation orinvolve a decision do not necessarily require that both branches of thedetermining operation be practiced. In other words, one of the branchesof the determining operation can be deemed as an optional step. Inaddition, one or more steps, blocks, functions, or operations of theabove described method 200 or method 300 may comprise optional steps, orcan be combined, separated, and/or performed in a different order fromthat described above, without departing from the example embodiments ofthe present disclosure.

FIG. 4 depicts a high-level block diagram of a computing device suitablefor use in performing the functions described herein. As depicted inFIG. 4, the system 400 comprises one or more hardware processor elements402 (e.g., a central processing unit (CPU), a microprocessor, or amulti-core processor), a memory 404 (e.g., random access memory (RAM)and/or read only memory (ROM)), a module 405 for changing a schedule forprocessing biometrics data in response to detecting a power event and/orfor transmitting biometrics data to an authorized remote device inaccordance with a schedule, and various input/output devices 406 (e.g.,storage devices, including but not limited to, a tape drive, a floppydrive, a hard disk drive or a compact disk drive, a receiver, atransmitter, a speaker, a display, a speech synthesizer, an output port,an input port and a user input device (such as a keyboard, a keypad, amouse, a microphone and the like)). Although only one processor elementis shown, it should be noted that the computing device may employ aplurality of processor elements. Furthermore, although only onecomputing device is shown in the figure, if the method 200 and/or themethod 300 as discussed above is implemented in a distributed orparallel manner for a particular illustrative example, i.e., the stepsof the above method 200 or method 300, or the entire method 200 ormethod 300 is implemented across multiple or parallel computing device,then the computing device of this figure is intended to represent eachof those multiple computing devices.

Furthermore, one or more hardware processors can be utilized insupporting a virtualized or shared computing environment. Thevirtualized computing environment may support one or more virtualmachines representing computers, servers, or other computing devices. Insuch virtualized virtual machines, hardware components such as hardwareprocessors and computer-readable storage devices may be virtualized orlogically represented.

It should be noted that the present disclosure can be implemented insoftware and/or in a combination of software and hardware, e.g., usingapplication specific integrated circuits (ASIC), a programmable gatearray (PGA) including a Field PGA, or a state machine deployed on ahardware device, a computing device or any other hardware equivalents,e.g., computer readable instructions pertaining to the method discussedabove can be used to configure a hardware processor to perform thesteps, functions and/or operations of the above disclosed method 200and/or method 300. In one embodiment, instructions and data for thepresent module or process 405 for changing a schedule for processingbiometrics data in response to detecting a power event and/or fortransmitting biometrics data to an authorized remote device inaccordance with a schedule (e.g., a software program comprisingcomputer-executable instructions) can be loaded into memory 404 andexecuted by hardware processor element 402 to implement the steps,functions or operations as discussed above in connection with theillustrative method 200 and/or method 300. Furthermore, when a hardwareprocessor executes instructions to perform “operations,” this couldinclude the hardware processor performing the operations directly and/orfacilitating, directing, or cooperating with another hardware device orcomponent (e.g., a co-processor and the like) to perform the operations.

The processor executing the computer readable or software instructionsrelating to the above described method can be perceived as a programmedprocessor or a specialized processor. As such, the present module 405for changing a schedule for processing biometrics data in response todetecting a power event and/or for transmitting biometrics data to anauthorized remote device in accordance with a schedule (includingassociated data structures) of the present disclosure can be stored on atangible or physical (broadly non-transitory) computer-readable storagedevice or medium, e.g., volatile memory, non-volatile memory, ROMmemory, RAM memory, magnetic or optical drive, device or diskette andthe like. Furthermore, a “tangible” computer-readable storage device ormedium comprises a physical device, a hardware device, or a device thatis discernible by the touch. More specifically, the computer-readablestorage device may comprise any physical devices that provide theability to store information such as data and/or instructions to beaccessed by a processor or a computing device such as a computer or anapplication server.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example only, and nota limitation. Thus, the breadth and scope of a preferred embodimentshould not be limited by any of the above-described exemplaryembodiments, but should be defined only in accordance with the followingclaims and their equivalents.

What is claimed is:
 1. A biometrics hub, comprising: a processor; and acomputer-readable medium storing instructions which, when executed bythe processor, cause the processor to perform operations, the operationscomprising: establishing a session with a first biometric device;receiving first biometric data of a user from the first biometricdevice; establishing a session with a second biometric device; receivingsecond biometric data of the user from the second biometric device;storing the first biometric data and the second biometric data at thebiometrics hub; detecting a power event associated with at least one ofthe first biometric device or the second biometric device; and changing,in response to detecting the power event, a schedule for processing atleast one of the first biometric data or the second biometric data. 2.The biometrics hub of claim 1, wherein the operations further comprise:establishing the schedule for processing the at least one the firstbiometric data or the second biometric data, wherein the scheduledefines at least one of: a timing for transmitting the first biometricdata or the second biometric to an authorized remote device; a timingfor receiving the first biometric data from the first biometric deviceor for receiving the second biometric data from the second biometricdevice; a quantity of the first biometric data or the second biometricdata to store at the biometrics hub; or a primary mode of communicationfor the transmitting of the first biometric data or the second biometricdata to the authorized remote device.
 3. The biometrics hub of claim 2,wherein the first biometric data or the second biometric data isreceived and stored at the biometrics hub in accordance with theschedule.
 4. The biometrics hub of claim 2, wherein the operationsfurther comprise: transmitting the first biometric data or the secondbiometric data to an authorized remote device in accordance with theschedule.
 5. The biometrics hub of claim 1, wherein the operationsfurther comprise: receiving a request for at least one of the firstbiometric data or the second biometric data from an authorized remotedevice; and transmitting the at least one of the first biometric data orthe second biometric data to the authorized remote device in response tothe request.
 6. The biometrics hub of claim 1, wherein the detecting thepower event comprises at least one of: receiving an electronic warningmessage from a power distribution network indicating an upcoming loss ofpower from the power distribution network; detecting a loss of power atthe biometrics hub from a power distribution network; detecting a lossof connectivity of a primary mode of communication of the biometricshub; or receiving a notification of a low battery from the at least oneof the first biometric device or the second biometric device.
 7. Thebiometrics hub of claim 1, wherein the operations further comprise:activating a backup power source for the at least one of the firstbiometric device or the second biometric device in response to detectingthe power event.
 8. The biometrics hub of claim 1, wherein the changingthe schedule for processing the at least one of the first biometric dataor the second biometric data in response to detecting the power eventcomprises: reducing a frequency of communication of the first biometricdata or the second biometric data from the at least one of the firstbiometric device or the second biometric device.
 9. The biometrics hubof claim 8, wherein the at least one of the first biometric device orthe second biometric device is powered by a backup power sourcefollowing the power event.
 10. The biometrics hub of claim 1, whereinthe changing the schedule for processing the at least one of the firstbiometric data or the second biometric data in response to detecting thepower event comprises: increasing a storage duration or a storagequantity of the first biometric data or the second biometric data at thebiometrics hub.
 11. The biometrics hub of claim 10, wherein the changingthe schedule for processing the at least one of the first biometric dataor the second biometric data in response to detecting the power eventcomprises: decreasing a frequency of measurement sampling of the atleast one of the first biometric device or the second biometric device.12. The biometrics hub of claim 1, wherein the changing the schedule forprocessing the at least one of the first biometric data or the secondbiometric data in response to detecting the power event comprises:transmitting the first biometric data or the second biometric data to anauthorized remote device via the biometrics hub, wherein prior to thepower event, the at least one of the first biometric device or thesecond biometric device communicates the first biometric data or thesecond biometric data to the authorized remote device independent fromthe biometrics hub.
 13. The biometrics hub of claim 12, wherein thebiometrics hub is connected to a home gateway or a router fortransmitting the first biometric data or the second biometric data tothe authorized remote device.
 14. The biometrics hub of claim 12,further comprising: a cellular transceiver for transmitting the firstbiometric data or the second biometric data to the authorized remotedevice via a cellular link.
 15. The biometrics hub of claim 1, whereinthe operations further comprise: installing at least one of a firstdriver for communications with the first biometric device or a seconddriver for communications with the second biometric device, wherein thefirst biometric device and the second biometric device are configured tocommunicate in different vendor formats.
 16. The biometrics hub of claim15, wherein the operations further comprise: downloading the at leastone of the first driver or the second driver from a network repository,wherein another of the first driver or the second driver ispre-installed on the biometrics hub.
 17. The biometrics hub of claim 1,wherein the operations further comprise: sending a notification of thepower event to a user endpoint device of a user associated with thebiometrics hub.
 18. The biometrics hub of claim 1, wherein the sessionwith the first biometric device is maintained between transmissionbursts of the first biometric data from the first biometric device tothe biometrics hub, and wherein the session with the second biometricdevice is maintained between transmission bursts of the second biometricdata from the second biometric device to the biometrics hub.
 18. Thebiometrics hub of claim 1, wherein at least one of the first biometricdata or the second biometric data comprises measurements of at least oneof: a heartrate; a breathing rate; a blood oxygen concentration; a bloodsugar level; an electrocardiogram pattern; a pupil dilation; an activitylevel; a skin conductance; a body temperature; a voice pitch; or a voicetone.
 19. A non-transitory computer-readable medium storing instructionswhich, when executed by a processor, cause the processor to performoperations, the operations comprising: establishing a session with afirst biometric device; receiving first biometric data of a user fromthe first biometric device; establishing a session with a secondbiometric device; receiving second biometric data of the user from thesecond biometric device; storing the first biometric data and the secondbiometric data at the biometrics hub; detecting a power event associatedwith at least one of the first biometric device or the second biometricdevice; and changing, in response to detecting the power event, aschedule for processing at least one of the first biometric data or thesecond biometric data.
 20. A method comprising: establishing, by aprocessor, a session with a first biometric device; receiving, by theprocessor, first biometric data of a user from the first biometricdevice; establishing, by the processor, a session with a secondbiometric device; receiving, by the processor, second biometric data ofthe user from the second biometric device; storing, by the processor,the first biometric data and the second biometric data at the biometricshub; detecting, by the processor, a power event associated with at leastone of the first biometric device or the second biometric device; andchanging, by the processor in response to detecting the power event, aschedule for processing at least one of the first biometric data or thesecond biometric data.