Patent application number | Description | Published |
20110078595 | Methods and Systems for Preventing Unauthorized Access to Patient Information - An exemplary method includes displaying a graphical user interface configured to include a patient list displayed therein, receiving user input representative of a search term comprising one or more characters selected to identify a particular patient included within a plurality of patients, dynamically updating the patient list in response to the received user input to only include a plurality of entries that contain the search term, each of the entries comprising patient information associated with a distinct one of the patients, and preventing one or more non-search term characters contained within each of the entries of the patient list from being displayed within the graphical user interface. Corresponding methods and systems are also disclosed. | 03-31-2011 |
20120029594 | Methods and Systems for Fitting a Bilateral Cochlear Implant Patient Using a Single Sound Processor - An exemplary method of fitting a bilateral cochlear implant patient using a single sound processor includes a fitting subsystem using a first sound processor associated with a first cochlear implant to selectively fit the first cochlear implant and a second cochlear implant to a cochlear implant patient, automatically segregating fitting data generated during the fitting of the first cochlear implant from fitting data generated during the fitting of the second cochlear implant, and transmitting the fitting data generated during the fitting of the second cochlear implant to a second sound processor associated with the second cochlear implant after the fitting of the second cochlear implant to the cochlear implant patient is completed. Corresponding methods and systems are also described. | 02-02-2012 |
20120029930 | Methods and Systems for Importing Data into a Database Associated with a Cochlear Implant Fitting Software Product - A method includes a fitting subsystem maintaining patient data in a primary database associated with a primary schema, receiving an export file representative of additional patient data extracted from a source database associated with a source schema and maintained by another fitting subsystem, importing the additional patient data represented by the export file into a database partition associated with the source schema, upgrading, in response to the importing, the database partition to be associated with the primary schema, and merging the additional patient data included in the upgraded database partition with the patient data in the primary database. Corresponding methods and systems are also described. | 02-02-2012 |
20120030649 | Methods and Systems for Automatic Generation of Multithread-Safe Software Code - An exemplary method of automatic generation of multithread-safe software code includes a multithread-safe code generator subsystem analyzing data representative of non-multithread-safe software code and automatically generating data representative of multithread-safe software code based on the analyzing of the data representative of the non-multithread-safe software code. Corresponding methods and systems are also described. | 02-02-2012 |
20130104049 | Methods and Systems for Preventing Unauthorized Access to Patient Information - An exemplary method includes a privacy management system 1) presenting, within a GUI, a patient list that initially includes a plurality of entries each comprising a plurality of obscured characters representative of patient information associated with a distinct patient included within a plurality of patients, 2) receiving user input representative of a search term comprising a sequence of one or more characters selected to identify a particular patient included within the plurality of patients, and 3) dynamically updating the patient list presented within the GUI in response to the user input by unobscuring a sequence of one or more obscured characters included in each entry of the patient list and that matches the sequence of one or more characters included in the search term and removing each entry included in the plurality of entries that does not include the search term from the patient list presented within the GUI. | 04-25-2013 |
Patent application number | Description | Published |
20110232696 | COMPACT RADIATOR-BASED HEAT EXCHANGER - The present invention generally relates to a compact heat exchanger for use in a mobile cleaning apparatus. The compact heat exchanger utilizes a water jacket, created by the annular space between a concentrically arranged internal housing and external housing. A radiator is enclosed within the internal housing. As super heated exhaust gas is supplied to the internal housing, heat is transferred to the surface of the internal housing before passing through the radiator. During operation of the mobile cleaning apparatus, incoming fluid, typically water, flows through an inlet and is directed through the water jacket and then the radiator for heating. | 09-29-2011 |
20110237373 | AUTOMATIC BELT TENSIONING SYSTEM - A device and method of use of that device to automatically adjust the tension of a belt(s) used in a driven system is disclosed. The system includes at least one driving device or power source and at least one driven device. The system further includes a tensioning member that serves to continuously compensate for slack which naturally develops in the belt or belts during normal operation of the system, as well as preloading the device with the appropriate amount of tension. The device provides a manually operated adjustment which allows for user control of the tensioning member, as well as an indicator which displays the amount of elongation of a belt and/or the desired preloaded tension of the system, thus simplifying removal, application, and replacement of belts, etc. | 09-29-2011 |
Patent application number | Description | Published |
20110260832 | SECURE VOICE BIOMETRIC ENROLLMENT AND VOICE ALERT DELIVERY SYSTEM - In one embodiment, a method includes enrolling a potential enrollee for an identity-monitoring service. The enrolling includes acquiring personally-identifying information (PII) and capturing a voiceprint. Following successful completion of the enrolling, the potential enrollee is an enrollee. The method further includes, responsive to an identified suspicious event related to the PII, creating an identity alert, establishing voice communication with an individual purporting to be the enrollee, and performing voice-biometric verification of the individual. The voice-biometric verification includes comparing one or more spoken utterances with the voiceprint. Following successful completion of the voice-biometric verification, the individual is a verified enrollee. In addition, the method includes authorizing delivery of the identity alert to the verified enrollee. | 10-27-2011 |
20140279467 | SYSTEM AND METHOD OF DELAYED BILLING FOR ON-DEMAND PRODUCTS - In one embodiment, a method includes receiving a binding request for an on-demand identity product from a consumer. The method also includes attempting to provide the on-demand identity product. The method further includes, responsive to the binding request, ascertaining delayed-billing settings that are applicable to the on-demand identity product. In addition, the method includes delaying billing of the on-demand identity product until it can be confirmed that the identity-product provision system has complied with the delayed-billing settings. | 09-18-2014 |
20140379600 | AUTHENTICATION SYSTEMS AND METHODS FOR ON-DEMAND PRODUCTS - In one embodiment, a method includes receiving, from a requestor, a request for an on-demand identity product in relation to an identity of a consumer, the request comprising personally identifying information (PII) of the consumer. The method also includes executing, using the PII, a partial registration of the consumer for the on-demand identity product, the partial registration omitting satisfaction of at least one security requirement. The method additionally includes determining whether delayed authentication is enabled for the on-demand identity product. Moreover, the method includes, responsive to a determination that delayed authentication is enabled for the on-demand identity product: conditionally suspending the at least one security requirement; initiating provision of the on-demand identity product to the requestor; and restricting the requestor's access to determined sensitive data resulting from the initiated provision at least until the at least one security requirement is satisfied. | 12-25-2014 |
Patent application number | Description | Published |
20090122474 | Secondary Computing Device Display - A secondary computing device display system includes a removable attachment mechanism operable to removably attach a secondary computing device display to a primary computing device display. The removable attachment mechanism comprises a first attachment member, operable to lockably attach to the secondary computing device display, and a second attachment member, comprising a first clamping portion and a second clamping portion. The first and second clamping portions are operable to removably clamp the primary computing device display within a gap defined between the first and second clamping portions. The first and second attachment member are frictionally rotatable with respect to each other along a first axis and a second axis. A surface of the primary computing device display is adapted to engage the second attachment member and utilize friction to reduce the amount of pressure sufficient to removably clamp. | 05-14-2009 |
20110043990 | Secondary Computing Device Display System - A secondary computing device display system includes a removable attachment mechanism operable to removably attach a secondary computing device display to a primary computing device display. The removable attachment mechanism comprises a first attachment member, operable to slideably attach to the secondary computing device display, and a second attachment member, comprising a clamping trench and a clamp locking lever. The second attachment member is operable to removably clamp the primary computing device display by inserting a clamping ridge of the primary computing device display in the clamping trench and engaging a notched surface of the clamping ridge with the clamp locking lever. The first and second attachment member are frictionally rotatable with respect to each other along a first axis and a second axis. | 02-24-2011 |
20140110144 | COLLAPSIBLE IN-USE COVER - An electrical device cover assembly configured for mounting over an electrical device is described. The electrical device cover assembly comprises a base comprising an opening large enough to receive an electrical device. A lid comprising a lid face, a lid ring, and an expansion section between the lid face and the lid ring, the lid coupled to the base and comprising an inside surface and an expansion section, the expansion section expandable from a first depth to a second depth at least twice as deep as the first depth is provided. An expansion arm moveable between a first collapsed position when the expansion section is at its first depth and an second expanded position when the expansion section is at its second depth, wherein in the second position the expansion arm is in contact with and supports the lid at its second depth is also provided. | 04-24-2014 |
20150122806 | COLLAPSIBLE IN-USE COVER - An electrical device cover assembly configured for mounting over an electrical device is described. The electrical device cover assembly comprises a base comprising an opening large enough to receive an electrical device. A lid comprising a lid face, a lid ring, and an expansion section between the lid face and the lid ring, the lid coupled to the base and comprising an inside surface and an expansion section, the expansion section expandable from a first depth to a second depth at least twice as deep as the first depth is provided. An expansion arm moveable between a first collapsed position when the expansion section is at its first depth and an second expanded position when the expansion section is at its second depth, wherein in the second position the expansion arm is in contact with and supports the lid at its second depth is also provided. | 05-07-2015 |