MEDICAL DEVICE SAFETY MANAGEMENT
    161.
    发明申请
    MEDICAL DEVICE SAFETY MANAGEMENT 审中-公开
    医疗器械安全管理

    公开(公告)号:US20140288966A1

    公开(公告)日:2014-09-25

    申请号:US14199744

    申请日:2014-03-06

    CPC classification number: G06Q50/22 G06Q30/014

    Abstract: A computer-implemented method of managing medical device safety comprises communicatively coupling a recall portal hosted on a network server to a health network and a computer database of medical records. Further, initiating a medical device recall through the recall portal and the health network. A consumer contact information associated with a medical device to be recalled is queried. A medical recall information is sent to the consumer contact information accessed from the computer database of medical records.

    Abstract translation: 管理医疗设备安全性的计算机实现的方法包括将托管在网络服务器上的召回门户通信地耦合到健康网络和医疗记录的计算机数据库。 此外,通过召回门户和健康网络启动医疗设备召回。 查询与要召回的医疗设备相关联的消费者联系信息。 医疗回收信息被发送到从医疗记录的计算机数据库访问的消费者联系信息。

    HEALTHCARE RECALL MANAGEMENT
    162.
    发明申请
    HEALTHCARE RECALL MANAGEMENT 审中-公开
    健康调查管理

    公开(公告)号:US20140288943A1

    公开(公告)日:2014-09-25

    申请号:US14170210

    申请日:2014-01-31

    CPC classification number: G06Q50/22 G06Q30/014 G16H40/63

    Abstract: Various technologies related to managing a medical device recall are implemented. Automated recall functions can facilitate an efficient and effective recall process. Full lifecycle of the recall process can be managed including communication with patients and replacement of devices, as well as auditing and regulatory compliance. Via the technologies described herein, healthcare providers can manage a successful medical device recall. Unique device identification, electronic health records, electronic medical records, and nationwide health information networks can be supported. A unique device identifier-centric approach can support a very high degree of automation and avoid errors during any of a variety of segments in the medical device recall life cycle.

    Abstract translation: 实施与管理医疗设备召回有关的各种技术。 自动召回功能可以促进有效和有效的召回过程。 可以管理召回过程的完整生命周期,包括与患者的沟通以及设备更换,以及审核和法规遵从。 通过本文描述的技术,医疗保健提供者可以管理成功的医疗设备回收。 可以支持独特的设备识别,电子健康记录,电子病历和全国卫生信息网络。 独特的以设备标识符为中心的方法可以支持非常高的自动化程度,并避免在医疗设备召回生命周期中的各个部分中的任何一个中发生错误。

    METHODS, SYSTEMS AND COMPUTER-READABLE MEDIA FOR DETERMINING A TIME-TO FAILURE OF AN ASSET
    163.
    发明申请
    METHODS, SYSTEMS AND COMPUTER-READABLE MEDIA FOR DETERMINING A TIME-TO FAILURE OF AN ASSET 审中-公开
    方法,系统和计算机可读介质,用于确定资产的时间失效

    公开(公告)号:US20140288908A1

    公开(公告)日:2014-09-25

    申请号:US14214055

    申请日:2014-03-14

    CPC classification number: G06F17/5009 G05B23/0221 G05B23/0245

    Abstract: The present invention provides a method and system for determining a time-to-failure of an asset. A probabilistic non-linear model of a limit state of the asset is simulated and approximated by a predetermined set of particles. A numerical scheme for computation of a conditional probability distribution of a size of the defect, based on a value of the limit state is evaluated. A set of future values of a weight factor of each particle is predicted based on an initial assigned value. The predicted set of future values can be updated on capturing a new set of inspection data. A probability of the time-failure of the asset is estimated by summing the weight factor of a set of particles, the set of particles comprising particles at which the limit state is less than a zero limit threshold.

    Abstract translation: 本发明提供了一种用于确定资产的故障时间的方法和系统。 资产的极限状态的概率非线性模型被预定的一组粒子模拟并近似。 评价用于计算缺陷大小的条件概率分布的数值方案,基于极限状态的值。 基于初始分配值预测每个粒子的权重因子的一组未来值。 可以在捕获一组新的检查数据时更新预测的未来值集。 通过将一组粒子的权重因子(包括极限状态小于零限制阈值的粒子的粒子集合)求和来估计资产的时间故障概率。

    SYSTEMS AND METHODS FOR LEARNING AND LEARNING ORIENTED ASSESSMENT
    164.
    发明申请
    SYSTEMS AND METHODS FOR LEARNING AND LEARNING ORIENTED ASSESSMENT 审中-公开
    用于学习和学习面向评估的系统和方法

    公开(公告)号:US20140287399A1

    公开(公告)日:2014-09-25

    申请号:US14180240

    申请日:2014-02-13

    CPC classification number: G09B5/08

    Abstract: The technique relates to a system and method for learning and learning oriented assessment of at least one learner based on a role to be performed by the at least one learner. This technique involves identifying knowledge areas related to a particular role to be performed by the learner. Under each knowledge area different learning workflows are identified and relevant topics are mapped to the learning workflows. The performance expectation from the learner at each learning workflow level is defined. The one more challenges related to the mapped topics are created and presented to the learner to solve and a score is generated for solving the challenges. This score is compared with the predefined performance expectation to determine the learning effectiveness of the learner and a capability index is computed for the learner.

    Abstract translation: 该技术涉及基于由至少一个学习者执行的角色来学习和学习面向至少一个学习者的评估的系统和方法。 这种技术涉及确定与学习者要执行的特定角色有关的知识领域。 在每个知识领域,识别不同的学习工作流程,并将相关主题映射到学习工作流程。 定义每个学习工作流程级的学习者的表现预期。 创建与映射主题相关的更多挑战,并将其呈现给学习者进行解决,并为解决挑战生成分数。 将此分数与预定义的绩效期望进行比较,以确定学习者的学习效果,并为学习者计算能力指数。

    METHODS FOR SECURE TRANSMISSION OF SENSITIVE DATA AND DEVICES THEREOF
    165.
    发明申请
    METHODS FOR SECURE TRANSMISSION OF SENSITIVE DATA AND DEVICES THEREOF 审中-公开
    用于安全传输敏感数据的方法及其装置

    公开(公告)号:US20140250017A1

    公开(公告)日:2014-09-04

    申请号:US14195996

    申请日:2014-03-04

    CPC classification number: G06Q20/3829 G06Q20/02 G07F7/0886

    Abstract: A method, non-transitory computer readable medium and transaction management device comprising receiving data encrypted using a public asymmetric key and a symmetric key from a mobile computing device, wherein the public asymmetric key and the symmetric key is shared between the transaction management device and the mobile computing device prior to receiving the data. The received data is decrypted using the received symmetric key and an asymmetric private key, wherein the asymmetric private key is generated by the transaction management device prior to receiving the data. One or more actions are performed on the decrypted data

    Abstract translation: 一种方法,非暂时性计算机可读介质和事务管理设备,包括使用公共非对称密钥和对称密钥从移动计算设备接收加密的数据,其中所述公共非对称密钥和所述对称密钥在所述事务管理设备与所述对称密钥之间共享 移动计算设备在接收数据之前。 接收到的数据使用接收到的对称密钥和非对称私钥进行解密,其中非对称私有密钥在接收数据之前由事务管理设备产生。 对解密的数据执行一个或多个动作

    SYSTEM AND METHOD FOR FUNCTIONAL TEST CASE GENERATION OF END-TO-END BUSINESS PROCESS MODELS
    166.
    发明申请
    SYSTEM AND METHOD FOR FUNCTIONAL TEST CASE GENERATION OF END-TO-END BUSINESS PROCESS MODELS 审中-公开
    端到端业务流程模型的功能测试案例生成系统与方法

    公开(公告)号:US20140165043A1

    公开(公告)日:2014-06-12

    申请号:US13946249

    申请日:2013-07-19

    Abstract: A system, medium and method for testing an end-to-end software application is disclosed. A structured business process model (BPM) representative of a set of business requirements for an end-to-end software application to be tested is first generated. The generated structured BPM is validated in association with one or more validation rules. A functional flow layout representative of a node structure embodying all possible scenarios to be handled by the software application is then generated. A plurality of functional flow paths is identified from the functional flow layout, wherein each functional flow path is associated with one or more corresponding scenarios of the possible scenarios. One or more test cases for each identified functional flow path is then generated.

    Abstract translation: 公开了用于测试端到端软件应用的系统,介质和方法。 首先生成代表要测试的端到端软件应用程序的一组业务需求的结构化业务流程模型(BPM)。 生成的结构化BPM与一个或多个验证规则相关联地进行验证。 然后生成表示体现由软件应用程序处理的所有可能场景的节点结构的功能流布局。 从功能流布局识别多个功能流路径,其中每个功能流路径与可能情景的一个或多个相应场景相关联。 然后生成每个识别的功能流路径的一个或多个测试用例。

    SYSTEMS AND METHODS FOR ESTIMATING AN IMPACT OF CHANGING A SOURCE FILE IN A SOFTWARE
    167.
    发明申请
    SYSTEMS AND METHODS FOR ESTIMATING AN IMPACT OF CHANGING A SOURCE FILE IN A SOFTWARE 有权
    估计软件中源文件变化的影响的系统和方法

    公开(公告)号:US20140123108A1

    公开(公告)日:2014-05-01

    申请号:US14065386

    申请日:2013-10-28

    CPC classification number: G06F8/77 G06F8/75 G06F11/3604

    Abstract: The technique relates to a system and method for estimating an impact of changing one or more source files in a software based on a clone dependency graph. This technique involves extracting the source files from a repository and detecting code cones present in the source files. After detecting the code clones the clone dependency graph is created. Several graph metrics are calculated and applied to the clone dependency graph to estimate the impact of changing a source file on other source files of the software. Finally, the output is visualized with the help of graph visualization technique.

    Abstract translation: 该技术涉及用于基于克隆依赖图来估计在软件中改变一个或多个源文件的影响的系统和方法。 该技术涉及从存储库提取源文件,并检测源文件中存在的代码锥。 检测到代码克隆后,将创建克隆依赖图。 计算几个图表度量并将其应用于克隆依赖图,以估计将源文件更改为软件的其他源文件的影响。 最后,通过图形可视化技术可视化输出。

    SYSTEM AND METHOD FOR UTILIZING A DYNAMIC VIRTUAL KEYBOARD
    168.
    发明申请
    SYSTEM AND METHOD FOR UTILIZING A DYNAMIC VIRTUAL KEYBOARD 审中-公开
    使用动态虚拟键盘的系统和方法

    公开(公告)号:US20140101595A1

    公开(公告)日:2014-04-10

    申请号:US13984598

    申请日:2011-09-09

    CPC classification number: G06F3/04886

    Abstract: A system and method of providing a dynamic virtual keyboard having a QWERTY or randomized layout that is displayed on a user interface to allow a user to input authentication information into a selected field. A first character key and a second character key are exchanged from their respective actual positions to modified positions. Mapped information associated with the exchanged original and modified positions of the first and second character keys is stored in a memory. Selection by the user of at least the displayed first character key in the modified position by the user is detected and the stored mapped information is retrieved from the memory of the first character key, wherein the first character key is translated to the second character key based on the retrieved mapped information. An authentication array including the second character key is sent to a server to authenticate the user.

    Abstract translation: 一种提供具有QWERTY或随机化布局的动态虚拟键盘的系统和方法,其显示在用户界面上,以允许用户将认证信息输入到所选择的字段中。 将第一字符键和第二字符键从它们各自的实际位置交换到修改位置。 与交换的第一和第二字符键的原始和修改位置相关联的映射信息被存储在存储器中。 检测由用户至少显示的第一字符键在用户的修改位置中的选择,并且从第一字符键的存储器检索存储的映射信息,其中第一字符键被转换为基于第二字符键的 对检索到的映射信息。 将包括第二字符密钥的认证阵列发送到服务器以认证用户。

    DYNAMIC ENFORCEMENT OF POWER MANAGEMENT POLICY AND METHODS THEREOF
    169.
    发明申请
    DYNAMIC ENFORCEMENT OF POWER MANAGEMENT POLICY AND METHODS THEREOF 审中-公开
    电力管理政策的动态执行及其方法

    公开(公告)号:US20140052304A1

    公开(公告)日:2014-02-20

    申请号:US13969450

    申请日:2013-08-16

    Abstract: Systems and methods are disclosed for a policy-based, power consumption management of resources. Power consumption data is relayed to an event management system for conducting a pattern analysis of the resources based on historical values and external factors. The event management system may provide a graphical interface for implement decisions pertaining to resource management and effective policy enforcements. The energy management system is further configured to communicate with a data layer to receive measured values.

    Abstract translation: 公开了用于资源的基于策略的功率消耗管理的系统和方法。 功耗数据被传递到事件管理系统,用于根据历史值和外部因素对资源进行模式分析。 事件管理系统可以提供用于实现与资源管理有关的决策的图形界面和有效的策略执行。 能量管理系统还被配置为与数据层通信以接收测量值。

    METHODS FOR IDENTIFYING KEY LOGGING ACTIVITIES WITH A PORTABLE DEVICE AND DEVICES THEREOF
    170.
    发明申请
    METHODS FOR IDENTIFYING KEY LOGGING ACTIVITIES WITH A PORTABLE DEVICE AND DEVICES THEREOF 有权
    用便携式设备识别主要记录活动的方法及其设备

    公开(公告)号:US20140026217A1

    公开(公告)日:2014-01-23

    申请号:US13943936

    申请日:2013-07-17

    CPC classification number: G06F21/554 G06F2221/031

    Abstract: A method, non-transitory computer readable medium, and apparatus that establishes a connection with a host computing device. One or more processes running on the host computing device are identified. One or more hooking operations performed in the one or more identified processes are identified. One or more suspected key logging actions are identified from the one or more identified hooking operations based on one or more of a first set of rules and output.

    Abstract translation: 一种建立与主计算设备的连接的方法,非暂时计算机可读介质和装置。 识别在主计算设备上运行的一个或多个进程。 识别在一个或多个所识别的过程中执行的一个或多个挂钩操作。 基于第一组规则和输出中的一个或多个,从一个或多个所标识的挂钩操作中识别一个或多个可疑密钥记录动作。

Patent Agency Ranking