Biology-to-machine (B2M) protocol |
 |
Recommendation ITU-T X.1080.2 defines a general protocol for the exchange of biometric information from a patient facility to a medical expert facility so that a medical centre could remotely monitor a patient and retrieve information from that patient. It also allows the medical expert facility to control the sensors and other devices at the patient facility and to establish the environment for a monitor session at the patient facility. It defines a versatile and open-ended information model that allows any type of medical and non-medical information to be transferred. This Recommendation is a biosignal communication protocol between computing devices and biological systems. This protocol is based upon an aggregation of the interactions between a computing device and the biological system. Biometric interactions are described using the telebiometric multimodal model as defined by Recommendation ITU-T X.1081, which is a three-layer model combining the science, sensor and metric layers. It is a horizontal market protocol designed to be used for all IoT biometric metric applications, for example, in the aerospace, medical, automotive, industrial and consumer markets. In the case of clinical medical trials, this protocol enriches the application with a versatile and open-ended information model filled with interaction descriptions thereby ensuring an accurate comparison of measurement processes.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/14795 |
Series title: |
X series: Data networks, open system communications and security X.1000-X.1099: Information and network security X.1080-X.1099: Telebiometrics |
Approval date: |
2021-10-29 |
Provisional name: | X.b2m |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1080.2 (10/2021)
|
In force
|
here
|
here
|
here
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|