To guarantee the secured functioning of our website, the access right management was made based on access priority. The following diagram shows the behavior of the system when an access request is received. The system can not authorize the professional access without the patient acceptation. Fig.3 illustrates the protocol of communication between the professional and the system.
Furthermore, to simulate the communication between the wireless sensors network for patient’s supervision and the professionals, the system has to get back the recorded data in the real time database as presented in Fig. 4. If any anomaly is detected, the system alerts the professional in charge of its information.
For the patient, fig. 5 describes the access validation process to his record.