The present disclosure relates, generally, to patient support apparatuses and, more specifically, to access systems for use with patient support apparatuses.
Patient support apparatuses, such as hospital beds, stretchers, cots, tables, wheelchairs, and chairs are used to help caregivers facilitate care of patients in a health care setting. Conventional patient support apparatuses generally comprise a base and a patient support surface upon which the patient is supported. Often, these patient support apparatuses have one or more powered devices with actuators to perform one or more functions, such as lifting and lowering the patient support surface, articulating one or more deck sections, raising a patient from a slouched position, turning a patient, centering a patient, extending a length or width of the patient support apparatus, and the like. Furthermore, these patient support apparatuses typically employ one or more sensors arranged to detect patient movement, monitor patient vital signs, and the like.
When a caregiver wishes to perform a function, such as operating a powered device that adjusts the patient support surface relative to the base, the caregiver actuates an input device of a user interface, often in the form of a touchscreen or a button on a control panel. In order to ensure that the patient receives proper care, the patient support apparatus may employ a security system to prevent unauthorized access to certain features of the patient support apparatus, such as powered device functions. Here, the security system may require the caregiver to enter a password via the user interface before the powered device function can be performed. The security system may also require that the caregiver possess a token, such as an identification badge, before allowing access to the powered device functions.
Modern medical care facilities often employ different types of caregivers to provide patient care and, thus, the patient support apparatus may be utilized by different types of caregivers. Here, the security system is often configured such that certain caregivers are only permitted to access a limited number of powered device functions. However, depending on the type of security system, unauthorized access to powered device functions can be achieved in a number of different ways. By way of example, a caregiver who is not authorized to access a certain powered device function may achieve access by inputting the password of a different caregiver who is authorized. Similarly, a caregiver who is not authorized to access a powered device function may be able to access the powered device function when a different caregiver, who is authorized, is nearby.
While conventional patient support apparatuses have generally performed well for their intended purpose, there remains a need in the art for a patient support apparatus which overcomes the disadvantages in the prior art, which can be used in such a way to ensure that only authorized users are able to access powered device functions, and which affords caregivers and patients with improved usability and functionality in a number of different operating conditions.
Referring to
A support structure 32 provides support for the patient P. In the representative embodiment illustrated herein, the support structure 32 comprises a base 34, an intermediate frame 36, and a patient support deck 38. The intermediate frame 36 and the patient support deck 38 are spaced above the base 34 in
The patient support deck 38 has at least one deck section 40 arranged for movement relative to the intermediate frame 36 between a plurality of section positions 40A, 40B. The deck sections 40 of the patient support deck 38 provide a patient support surface 42 upon which the patient P is supported. More specifically, in the representative embodiment of the patient support apparatus 30 illustrated herein, the patient support deck 38 has four deck sections 40 which cooperate to define the patient support surface 42: a back section 44, a seat section 46, a leg section 48, and a foot section 50 (see
A mattress 52 is disposed on the patient support deck 38 during use. The mattress 52 comprises a secondary patient support surface upon which the patient P is supported. The base 34, the intermediate frame 36, and the patient support deck 38 each have a head end and a foot end corresponding to designated placement of the patient's P head and feet on the patient support apparatus 30. It will be appreciated that the specific configuration of the support structure 32 may take on any known or conventional design, and is not limited to that specifically illustrated and described herein. In addition, the mattress 52 may be omitted in certain embodiments, such that the patient P can rest directly on the patient support surface 42 defined by the deck sections 40 of the patient support deck 38.
Side rails 54, 56, 58, 60 are coupled to the support structure 32 and are supported by the base 34. A first side rail 54 is positioned at a right head end of the intermediate frame 36. A second side rail 56 is positioned at a right foot end of the intermediate frame 36. A third side rail 58 is positioned at a left head end of the intermediate frame 36. A fourth side rail 60 is positioned at a left foot end of the intermediate frame 36. The side rails 54, 56, 58, 60 are advantageously movable between a raised position in which they block ingress and egress into and out of the patient support apparatus 30, one or more intermediate positions, and a lowered position in which they are not an obstacle to such ingress and egress. It will be appreciated that there may be fewer side rails for certain embodiments, such as where the patient support apparatus 30 is realized as a stretcher or a cot. Moreover, it will be appreciated that in certain configurations, the patient support apparatus 30 may not include any side rails. Similarly, it will be appreciated that side rails may be attached to any suitable component or structure of the patient support apparatus 30. Furthermore, in certain embodiments the first and third side rails 54, 58 are coupled to a deck section 40 for concurrent movement between section positions 40A, 40B (for example, see
As shown in
One or more caregiver interfaces 66, such as handles, are shown in
Wheels 68 are coupled to the base 34 to facilitate transportation over floor surfaces. The wheels 68 are arranged in each of four quadrants of the base 34, adjacent to corners of the base 34. In the embodiment shown in
The patient support apparatus 30 further comprises a lift mechanism, generally indicated at 72, which operates to lift and lower the intermediate frame 36 relative to the base 34 which, in turn, moves the patient support deck 38 between a first vertical configuration 38A (for example, a “raised” vertical position as depicted in
As noted above, the patient support deck 38 is operatively attached to the intermediate frame 36, and the deck section 40 is arranged for movement between a first section position 40A (see
Those having ordinary skill in the art will appreciate that the patient support apparatus 30 could employ any suitable number of deck actuators 80, of any suitable type or configuration sufficient to effect selective movement of the deck section 40 relative to the support structure 32. By way of non-limiting example, the deck actuator 80 could be a linear actuator or one or more rotary actuators driven electronically and/or hydraulically, and/or controlled or driven in any suitable way. Moreover, the deck actuator 80 could be mounted, secured, coupled, or otherwise operatively attached to the intermediate frame 36 and to the deck section 40, either directly or indirectly, in any suitable way. In addition, one or more of the deck actuators 80 could be omitted for certain applications.
As shown in
In the representative embodiment which is depicted schematically in
With continued reference to
In some embodiments, sensors 98 are provided to determine, detect, record, sense, or otherwise observe changes in connection with the patient support apparatus 30, the user U, and/or the patient P. By way of example, the patient support apparatus 30 may comprise one or more apparatus sensors, generally indicated at 98A, which are configured to determine changes in or relating to the position, operation, status, and the like, of one or more components or systems of the patient support apparatus 30. For example, apparatus sensors 98A could be provided to determine movement of the patient support deck 38 between the vertical configurations 38A, 38B, as noted above. In some embodiments, environment sensors 98E may also be provided to determine changes in the environment surrounding the patient support apparatus 30, such as ambient lighting, temperature, humidity, noise, or any other quantifiable environmental variable. Furthermore, patient sensors 98P are provided in some embodiments to determine changes in the patient's P status, condition, health, and the like. By way of non-limiting example, patient sensors 98P could detect changes in the patient's heart rate, blood pressure, breathing rate, temperature, position on the patient support deck 38, or any other quantifiable variable associated with the patient. Similarly, in some embodiments, user sensors 98U are provided to determine changes in the user's status, condition, health, performance, and the like. The sensors 98A, 98E, 98P, 98U will be described in greater detail below.
As noted above, the control system 82 of the patient support apparatus 30 is configured to facilitate operation of one or more powered devices 86 to carry out various functions FN. Here, those having ordinary skill in the art will appreciate that the patient support apparatus 30 may comprise a number of different powered devices 86 to carry out different functions FN. By way of non-limiting illustration, powered devices 86 may comprise patient raising devices, patient centering devices, patient turning devices, patient ingress/egress devices, lift devices (for example, lift actuators 78), bed length extension devices, bed width extension devices, deck adjustment devices (for example, deck actuators 80), temperature devices (for example, heated mattresses 52), entertainment devices (for example, television displays or screens), lighting devices, or any other type of powered device 86 suitable for use in connection with patient support apparatuses 30. Furthermore, it will be appreciated that a single powered device 86 may comprise a number of different components, actuators, sensors, and the like, and may carry out different functions FN. By way of non-limiting example, powered devices 86 realized as lift devices may comprise two lift actuators 78 which cooperate to carry out the function FN of raising/lowering the patient support deck 38 relative to the base 34, and which are independently operable to carry out the function FN of “tilting” the patient support deck 38 relative to the base 34 (for example, to place the patient P in the Trendelenburg position). While the various user interfaces 84 and powered devices 86 noted above are generally formed integrally with or otherwise as a part of the patient support apparatus 30 itself, it will be appreciated that one or more user interfaces 84 and/or powered devices 86 could be provided external to or separate from the patient support apparatus 30 to carry out various functions FN, such as a powered device 86 realized as an electronic lock without a discrete user interface 84. Other configurations are contemplated.
Referring now to
As noted above, the input system 102 is disposed in communication with the powered device 86 and is configured to receive or otherwise generate input data DI. To this end, the input system 102 may comprise one or more user interfaces 84 and/or one or more sensors 98. By way of illustration, a user U may actuate an input device 90 (for example, a button) of a user interface 84 to request access to a powered device 86 function FN, or a sensor 98 may sense a user's U proximity to the powered device 86, and may collect input data DI such as biometric identification data ID to ensure that the user U is authorized to access the powered device 86 function FN. Those having ordinary skill in the art will appreciate that the input system 102 could comprise both user interfaces 84 and sensors 98 in certain embodiments. Moreover, the user interface 84 itself may rely on one or more sensors 98 to collect input data DI and, thus, a single sensor 98 could collect different types of input data DI. By way of illustration, user interfaces 84 realized as touchscreens could employ touch sensors 98 configured to collect input data DI generated from what the user U inputs on the touchscreen (for example, a multi-character passcode typed on a virtual keyboard), as well as input data DI generated by how the user U engages the touchscreen (for example, the characteristic pattern, speed, force, and the like with which the user U inputs the passcode characters).
Continuing with this illustration, a user's U passcode could be the characters 123ABC and the user U may habitually enter the characters 1, 2, and 3 in quick succession, pause, and then enter the characters A, B, and C more slowly (for example, 1-2-3-A-B-C). Thus, in this embodiment, input data DI concern the specific passcode entered by the user U, and other input data DI (such as identification data ID) concern how the passcode is entered by the user U, and all input data DI can be checked before access to the powered device 86 function FN is allowed. Thus, even if a different user were to obtain the user's passcode (123ABC), the access system could be configured to differentiate how that passcode is entered by different users U and could prevent unauthorized access to the powered device 86 function FN. It will be appreciated that the forgoing illustration is exemplary and non-limiting.
As noted above, the access system 100 could be configured to receive certain kinds of input data DI from user interfaces 84 which are not associated with patient support apparatuses 30 or powered devices 86. For example, the user interface 84 could comprise a portable electronic device, such as a mobile phone, computer, tablet, and the like, which is carried and utilized by the user U. Here, input data DI from the portable electronic device could be communicated to the access system 100 to monitor the user U (for example, with motion or location data), and also to authenticate the user's U presence (for example, using the portable electronic device as a token/badge registered with the communication interface 96, such as via Near Field Communication or other types of wireless communication). Thus, it will be appreciated that portable electronic devices, such as the user's U personal mobile phone, can serve as part of, or otherwise cooperate with, the access system 100.
As noted above, the input data DI received and/or generated by the input system 102 could comprise a number of different types, including without limitation: user keystroke data, user touchscreen data, user movement data, user physiological data, user sound data, and/or user biometric data; as well as patient age data, patient condition data, patient physiological data, and/or patient treatment data. Here too, the input data DI could comprise an electronic medical record (EMR).
As noted above, input data DI could be received or generated by the input system 102 from different types of sensors 98. Here, sensors 98 can be configured so as to be responsive to changes in any measurable variable. By way of non-limiting example, the input system 102 could comprise apparatus sensors 98A configured to measure changes in or relating to the position, status, and/or configuration of various components of the patient support apparatus 30, such as with potentiometers, load cells, accelerometers, gyroscopes, hall-effect sensors, limit switches, and the like. Further, the input system 102 could comprise environment sensors 98E configured to measure changes in the environment adjacent to the patient support apparatus 30, such as with thermocouples or thermistors, humidity or moisture sensors, light sensors, microphones or noise sensors, location or positioning sensors, smoke or particulate sensors, odor or smell sensors, and the like. Further still, the input system 102 could comprise patient sensors 98P configured to measure changes associated with the patient's P condition, health, vital signs, position, status, and the like, such as with cardiac or heartrate sensors, breathing sensors, body temperature sensors, fluid or hydration sensors, blood oxygen sensors, weight distribution sensors, movement sensors, visual sensors such as cameras, blood pressure sensors, perspiration sensors, and the like. Similarly, the input system 102 could comprise user sensors 98U configured to measure changes associated with the user's U condition, health, performance, vital signs, sobriety, and the like, with similar or different sensors 98 as the patient sensors 98P noted above.
Moreover, it is conceivable that user sensors 98U, the patient sensors 98P, or any other sensors 98, could be configured to track, monitor, and/or identify the user U, the patient P, or any other person based on biometric information. By way of non-limiting example, sensors 98 could be used to identify, track, and/or differentiate between users U and/or patients P based on one or more of the following: patterns in walking/gait, heartrate, breathing, typing; fingerprints; iris scans; visual facial recognition; vocal/speaking cadence, pitch, tone, volume, accent; overall height, width, weight; body/build type; muscle tone; odor, smell, fragrance; color of skin, hair, eyes; presence, type, arrangement of hair on, head, face, body; and gender. Other types of sensors 98, user interfaces 84, and/or input systems 102 are contemplated.
It will be appreciated that the input system 102 could be comprised of any suitable combination of user interfaces 84 and/or sensors 98, located or arranged in any suitable way sufficient to receive and/or generate input data DI communicated to the user control system 104 and/or the powered device 86. By way of non-limiting example, and as is depicted in the embodiment illustrated schematically in
With continued reference to
It will be appreciated that the access system 100 described herein can also be used in connection with powered devices 86 which are remote from the patient support apparatus 30. Put differently, certain powered devices 86 in communication with the access system 100 do not necessarily form a part of any patient support apparatus 30. By way of non-limiting example, powered devices 86 could be realized as powered tools, instrumentation, terminals, communication systems, alarm and/or security systems, tracking systems, electronic locks, or any other suitable type of powered device 86 used in connection with providing care to patients P. As depicted in
Referring now to
Those having ordinary skill in the art will appreciate that operation of the authorization module 106 requires that the access system 100 be configured to identify and differentiate between users U. In some embodiments, the operation of the authorization module 106 described herein can be based on conventional user U identification and differentiation methods or systems, such as passcodes, identification badges, and the like. However, in certain embodiments, the control system 104 of the access system 100 comprises an identification module, indicated schematically at 108, which is configured to identify and differentiate between users U and/or patients P. The identification module 108 is generally configured to access identification profiles IP associated with users U, to receive identification data ID relating to the users U, and to update the respective user U identification profiles IP based on the identification data ID received from the input system 102. Put differently, the identification module 108 is able to review previously observed/recorded identification data ID associated with specific users U, and can update that user's U identification profile IP with newly-observed identification data ID at predetermined frequencies or at predetermined intervals. The authorization module 106, the permission level PL, the identification module, and the identification profiles IP will each be described in greater detail below.
It will be appreciated that the authorization module 106 and/or the identification module 108 of the user control system 104 can be realized in a number of different ways and from a number of different components. By way of non-limiting example, the modules 106, 108 could employ one or more microprocessors for processing instructions or for processing an algorithm stored in memory to control operation of the access system 100, facilitate cooperation between and communication with the powered devices 86 and input system 102, and the like. Additionally or alternatively, the user control system 104 may comprise one or more microcontrollers, field programmable gate arrays, integrated circuits, discrete circuits, and/or any other suitable hardware, software, or firmware that is capable of carrying out the various functions and operations described herein. Furthermore, it will be appreciated that the user control system 104 could be realized as a number of different components and/or systems that can be integrated with or formed separately from the patient support apparatuses 30, the powered devices 86, and/or the input system 102. Specifically, any part of the user control system 104 could be integrated into the patient support apparatus 30 (for example, an on-board processor), or could be located remotely from the patient support apparatus 30 (for example, a server). Other configurations of the control system 104 are contemplated.
In the representative embodiment illustrated in
The dossiers 112 may comprise one or more of: stored permission levels PL associated with the ability of the respective user U or patient P to access/perform functions FN via powered devices 86; identification profiles IP associated with stored input data DI, including identification data ID, performance data ND, cooperation data CD, and/or patient data PD; access logs AL associated with the user U or patient's P attempted and/or actual use of powered device 86 functions FN; and data reporters DR configured to facilitate communication of particular situations, trends, and/or changes observed in input data DI. In some embodiments, unauthorized access may be recorded in the access log Al associated with the dossier 112 of the user U. In some embodiments, the information stored in the database 110 and/or dossiers 112 can be accessed, updated, and/or reviewed directly by certain users, such as supervisors who setup new users U, review changes in user U performance data ND, review access logs AL, and the like.
As noted above, in some embodiments, the access system 100 employs the identification module 108 of the user control system 104 to dynamically monitor users U and/or patients P, and to update the user U identification profiles IP in the dossiers 112 based on input data DI received, generated, or determined via the input system 102. In some embodiments, the identification module 108 also uses input data DI to dynamically identify and differentiate users U and/or patients P from each other. It will be appreciated that different types of identification data ID and/or other input data DI can be checked, updated, and/or compared against historical input data DI in the identification profile IP to ensure that users U are properly identified. Here, consistent, reliable identification of users U via the identification module 108 allows the access system 100 to ensure that the authorization module 106 properly controls user U access to powered device 86 functions FN.
The access system 100 can adaptively recognize, monitor, and/or update user U identification profiles IP based on fluctuations over different times of the day, different days of the week, different months of the year, and the like. By way of illustration, different users U may utilize or otherwise interact with the access system 100 according to different schedules, based such as on a shift schedule or hospital rounds. Thus, it will be appreciated that the access system 100 can be configured to recognize access requests or habits which occur at unusual times and can respond by performing additional checks against the user's U identification profile IP, by flagging the user U for further review without modifying the user's U permission level PL, by restricting the user's permission level PL, and the like. Here, because medical facilities such as hospitals frequently operate based on multiple shift schedules throughout a day (for example, a hospital with three shifts each staffed and supervised by different groups of employees), the access system 100 can utilize existing shift schedules, time clocks, and the like to recognize unusual user U access and/or requests. This configuration helps promote patient P safety by ensuring that users U are providing care in accordance with standard procedures and shift schedules.
By dynamically updating user U identification profiles IP via the identification module 108 over time, the access system 100 can effectively compensate for certain changes in user U appearance, performance, behavior, and the like. By way of illustration, where the access system 100 controls permission levels PL via the authorization module 106, and relies on identification data ID associated with facial recognition input data DI to differentiate between users U (such as with user sensors 98U realized as cameras), updating identification profiles IP in dossiers 112 with new facial imaging identification data ID at relatively short time intervals can help prevent misidentification that might otherwise occur when updating at longer intervals. Specifically, gradual changes in the user's U physical appearance over time (wrinkles, hair loss, and the like) are less noticeable when current identification data ID are compared against recently-updated identification profiles IP (for example, updated daily or weekly). Thus, the ability of the identification module 108 to update user U identification profiles IP with current identification data ID at a predetermined frequency allows the access system 100 to substantially mitigate misidentification that might otherwise occur when comparing current information data ID to outdated information data ID. Here, cooperation between the identification module 108 and the authorization module 106 helps to ensure that the user U is not misidentified and, thus, is not inadvertently restricted or prevented from accessing powered device 86 functions FN.
In some embodiments, the authorization module 106 relies on the most recently collected identification data ID in the identification profile IP of the user's U dossier 112 to identify the user U. However, it will be appreciated that input data DI can be stored in the dossier 112 for comparison across multiple data points and over extended periods of time, such as to facilitate observing and recording changes over time, identifying areas for improvement, and the like. Similarly, it will be appreciated that input data DI can be stored in the dossier 112 for comparison against different locations, different types and configurations of user interfaces 84 and/or powered devices 86, and the like. By way of non-limiting example, the input data DI can be used to compare one user's U performance in different environments or conditions, such as may be used to determine if the user U performs differently using the same powered device 86 in two different locations. Other configurations are contemplated.
As noted above, several different types of identification data ID can be updated by the identification module 108 to help identify and/or differentiate users U. In some embodiments, multiple types of identification data ID are stored in the dossier 112 and are respectively compared against current, observed identification data ID. This configuration can help prevent misidentification that might otherwise be caused by sudden changes in the user's U appearance, behavior, and the like.
Continuing with the previous example of facial recognition, it is conceivable that a user U with a clean-shaven face may be unrecognizable when compared against stored identification data ID depicting the user U with a full beard. Here, rather than immediately restricting or preventing user U access to one or more powered device 86 functions FN based on a sudden change in physical appearance like this, the access system 100 could be configured to simultaneously compare other types of current identification data ID against previously-recorded identification data ID stored in the user's U identification profile IP. For example, the identification module 108 could simultaneously monitor and compare input data DI associated with different types of identification data ID, such as voice recognition, walking/gait patterns, height, and the like, to prevent inadvertent misidentification caused by a sudden change in one particular type of identification data ID. Here in this example, the identification module 108 could note the sudden change to the user's U facial recognition data in the data reporter DR, and the access system 100 could be configured to subsequently identify or track that user U differently in response, such as by temporally ignoring outdated identification data ID which depict the user U with a full beard.
Referring now to
In
At block 206, the access system 100 checks to see if the user's U identification profile IP has been updated within a specified time interval. Here at block 206, the access system 100 can determine whether or not the user's U identification profile IP is outdated or otherwise should be updated. If the identification profile IP does not need updating, then the access system 100 returns to block 202. However, if updates are needed, the access system 100 moves to block 210 and updates the identification profile IP in the user's U dossier 112 with current identification data ID before returning to block 202. It will be appreciated that the need for updates, even where the identification data ID are considered to be consistent with the identification profile IP, can be determined in a number of different ways, such as based on a predetermined update schedule, based on certain changes in the user's U behavior, appearance, performance, and the like. In some embodiments, the access system 100 may determine the need to update the user's U identification profile IP based on changes occurring in the amount of time, processes, and the like which are required to properly identify the user U. By way of non-limiting example, minor changes in the user's U appearance, such as those caused by aging, may be consistent with the identification profile IP but may require increasing amounts of computing resources or multiple checks against other types of identification data ID to verify the user's U identity. Thus, updating the identification profile IP periodically and/or in response to these types of computing resource changes promotes improved subsequent identification speed. Other configurations are contemplated.
At block 208, where the access system 100 has previously determined the identification data ID are inconsistent with the identification profile IP in the user's U dossier 112, the access system 100 updates the identification profile IP in the user's U dossier 112 with current identification data ID before moving to block 212. Here at block 212, if the access system 100 determines that the current identification data ID are similar enough to the previous identification data ID in the identification profile IP, then the access system 100 returns to block 202. However, if the access system 100 determines that the current identification data ID suggest a significant deviation from the identification profile IP in the user's dossier 112, then the access system 100 moves to block 214 and updates user's U dossier 112 to implement a lower permission level PL before returning to block 202.
Those having ordinary skill in the art will appreciate that significant deviations from the user U identification profile IP can be predetermined (for example, set by a supervisor), or can be determined by the access system 100. Moreover, it will be appreciated that lowering the permission level PL for the user U based on deviations from the identification profile IP can be useful in a number of different situations. By way of illustration, if the user U has sustained injuries during an accident, they could have bruises, be wearing bandages, and/or may walk with a limp. Here, the identification module 108 could be configured to recognize that the user U has sustained an injury based on the changes in their physical appearance (bruises and bandages) and/or based on the changes in their behavior (walking slower than usual, with a limp). Based on the determination that the user U has been injured, the access system 100 could then lower the user's U permission level PL, whereby the authorization module 106 would then prevent the user U from accessing certain powered device 86 functions FN until they recover. Here too, the access system 100 could update the data reporter DR in the user's U dossier 112 to note the injury and the adjusted permission level PL, which could be reviewed by a supervisor. It will be appreciated that, in some situations, no change of permission level PL may be necessary, and the access system 100 could update the data reporter DR in the user's U dossier 112 to note the injury and to update the identification profile IP for faster subsequent recognition of the user's U identification. Other configuration and scenarios are contemplated.
It is also conceivable that the access system 100 could lower the permission level PL for the user U based on deviations from the identification profile IP which are significant enough to question the user's U identity. By way of illustrative example, a user U returning from a two-week-long vacation stops by to visit his long-term patient P on his way home from the airport, but the user U has grown a beard, is wearing a hat and sunglasses, and is not dressed in scrubs. These deviations could conceivably be significant enough to cause the access system 100 to question the identity of the user U and subsequently limit or prevent the user U from accessing certain powered device 86 functions FN until the user's U identity is verified. For example, the access system 100 could communicate the discrepancy to a supervisor, or to another user U, via the data reporter DR for review and/or verification. Many other situations and configurations are contemplated.
Referring now to
In order to implement changes in user U access to powered device 86 functions FN, the access system 100 can be configured to alter the permission level PL of the user U, and/or to alter the required permission level PL of the powered device 86. As noted above, permission levels PL can be defined, assigned, or changed in a number of different ways. In general, it will be appreciated that certain powered devices 86 and/or functions FN may require different permission levels PL than other powered devices 86 and/or functions FN. Further, while certain powered devices 86 may require a common permission level PL associated with all functions FN the powered device 86 is able to perform, other powered devices 86 may require different permission levels PL for different functions FN. Thus, it will be appreciated that users U could have different permission levels PL stored in their dossier 112 for every function FN available within the access system 100.
In some embodiments, the access system 100 can restrict access to powered device 86 functions FN by modifying its required permission level PL based on changes in the location, status, and the like, of the powered device 86 itself, the patient P, and/or the user U. By way of illustration, a powered device 86 may require different permission levels PL based on whether or not the powered device 86 is located within a sterile field. Similarly, a malfunctioning powered device 86 can be “locked out” by modifying its required permission level PL to deny access to regular users U but allow access to repair technicians, prevent all access when patients P are nearby, and the like.
As noted above, the access system 100 can restrict access to powered device 86 functions FN by changing the user's U permission level PL. In one embodiment, the permission level PL comprises one of a first permission level PL1 that restricts the user U from operating the powered device 86 with the input system 102 to perform the function FN, and a second permission level PL2 that authorizes the user U to operate the powered device 86 with the input system 102 to perform the function FN. In other embodiments, such as where the powered device 86 can perform multiple functions FN, the second permission level PL2 authorizes the user U to operate the powered device 86 with the input system 102 to perform a first function FN1, and a third permission level PL3 authorizes the user to operate the powered device 86 with the input system 102 to additionally perform a second function FN2.
In the illustrative example noted above and described in greater detail below, the permission levels PL are configured in an escalated manner such that accessing the first function FN1 requires the user U to have a permission level PL greater than the first permission level PL1, and accessing the second function FN2 requires the user U to have a permission level PL greater than the second permission level PL2. Other, non-escalated configurations are contemplated. For example, rather than denoting escalated permission levels PL, the terms “first permission level PL1,” “second permission level PL2,” “third permission level PL3,” and the like, could be used as unique identifiers or labels merely to differentiate between different functions FN and/or powered devices 86.
In some embodiments, the authorization module 106 is configured to switch the permission level PL of the user U from the second permission level PL2 or the third permission level PL3 to the first permission level PL1 in the event that performance data ND fails to meet a predetermined performance criterion. Put differently, poor user U performance can result in limited access to certain powered device 86 functions FN. By way of illustrative example, if the user U forgets to “plug in” a battery-operated, chargeable powered device 86 after use, the access system 100 may subsequently lower the user's U permission level PL for that powered device 86 to disable the user's U access to help ensure that other users U are not routinely unable to use the powered device 86 because of dead batteries. Conversely, in some embodiments, the authorization module 106 is configured to switch the permission level PL of the user U from the second permission level PL2 to the third permission level PL3 in the event that performance data ND exceeds a predetermined performance criterion. Here, by way of illustrative example, if the user U becomes proficient with a powered devices 86 that can perform additional functions FN with escalated permission level PL requirements, then the access system 100 may allow that user U to access certain additional functions FN based on their proficiency. Thus, the authorization module 106 can be configured to adjust the user's U permission level PL based on performance data ND for any function FN of any powered device 86.
As noted above, the access system 100 can use the input system 102 to monitor input data DI associated with the user U and also input data DI associated with the patient P in the user's U care. In some embodiments, the authorization module 106 is configured to modify the permission level PL of the user U based on patient data PD associated with the patient P. By way of illustrative example, if a new and less-experienced user U is providing care for a patient P whose health or status begins to deteriorate significantly, the access system 100 could limit this less-experienced user's U access to certain powered devices 86 used in connection with providing care to the patient P until the patient's P health or status improves, is verified by a more-experienced user U, and the like. By way of further illustrative example, if the access system 100 determines that a patient P is reacting poorly to intravenous pain medication supplied via a pump, the authorization module 106 could prevent certain users U, such as floor nurses, from increasing the pump's flowrate until an appropriately trained user U, such as a doctor, can assess the patient's P condition further.
As noted above, the access system 100 can use the input system 102 to monitor input data DI associated with multiple users U, and can adjust the permission levels PL of different users U independently. Moreover, the authorization module 106 can modify permission levels PL of one or more users U based on cooperation data CD, as noted above and as is described in greater detail below.
In one embodiment, care is provided to the patient P by a first user U1 and by a second user U2. Each of the users U1, U2 has a respective permission level PL which dictates whether that user U1, U2 has permission to operate certain powered devices 86 with the input system 102 to perform certain functions FN, as described above. Here, the authorization module 106 determines cooperation data CD for the users U1, U2 relating to cooperation between those users U1, U2 in providing care to the patient P. Based on these cooperation data CD, the authorization module 106 can modify the permission level PL of at least one user U1, U2.
It will be appreciated that cooperation data CD between users U1, U2 can relate to a number of different types of input data DI. In one embodiment, the cooperation data CD relate to the proximity of the first user U1 and the second user U2 to the patient support apparatus 30. In one embodiment, the cooperation data CD relate to the proximity of the first user U1 and the second user U2 to the patient P. In one embodiment, the cooperation data CD relate to the proximity of the first user U1 to the second user U2. In one embodiment, the cooperation data CD relate to communications between the first user U1 and the second user U2. It will be appreciated that cooperation data CD can relate to a number of different types of input data DI, and can be used to effect modification of user U permission levels PL in different ways. Specifically, those having ordinary skill in the art will appreciate that communication can be based on things other than proximity and direct, in-person interaction between users U1, U2. For example, communications could occur across audio and/or video-based systems such as telephony, video conferencing, and the like. Furthermore, communications could be based on or otherwise involve authorization, such as electronic or written authorization, from one user U1 granting another user U2 a permission level PL modification. Specifically, as will be appreciated from the subsequent description of the access system 100 below, “communications” could include any suitable type interaction between/among more than one user U1, U2 that sufficient to give or adjust permission to one or more users U. By way of non-limiting example, “communications” could occur through video conferencing, telephone, email, handwritten message, voice message, video message (with or without voice), gesture confirmation, and the like. Thus, one of the users U1 does not necessarily have to be physically present and next to the other user U2 in order to obtain access to the first user to operate certain powered devices 86 with the input system 102 to perform certain functions FN, as described above. It will be appreciated that different types of communications could be used to effect temporary changes in permission level PL, depending on the configuration of the access system 100 and the specific cooperation data CD observed.
As noted above, the access system 100 could utilize in-person communications between users U1, U2 in a number of different ways. By way of illustration, it is conceivable that both the first user U1 and the second user U2 could have respective permission levels PL which prevent them from individually accessing powered devices 86 necessary to transfer the patient P occupying the patient support apparatus 30 off of the patient support deck 38, such as where the weight of the patient P is greater than either of the users U1, U2 could manage on their own. However, cooperation data CD between the users U1, U2 may indicate that the first user U1 and the second user U2, working together, could safely transfer the patient P. Based on this cooperation data CD, the access system 100 could modify one or both of the users' U1, U2 permission levels PL to allow access to powered device 86 functions FN associated with facilitating patient P transfer.
By way of further illustration, it is conceivable that the first user U1 could have a low permission level PL that is insufficient to access a particular powered device 86 function FN, and the second user U1 could have a higher permission level PL that is sufficient to access the function FN. For example, the first user U1 may be a nurse who is not authorized to use a computer system 86 to access patient records FN, and the second user U2 could be a doctor who is authorized to access patient records FN. Here in this example, the authorization module 106 could use cooperation data CD, such as input data ID indicating that both the nurse U1 and the doctor U2 are in the same room and are working closely together to provide care to the patient P, to temporarily modify the nurse's U1 permission level PL to allow access to patient records FN while the doctor U2 is nearby without necessitating that the doctor U2 actually operate the computer system 86. As noted above, it will be appreciated that cooperation data CD can be used by the authorization module 106 based on a number of different types of communication, including audio, voice, written, and/or electronic communication.
At block 248, the authorization module 106 confirms that the second user U2 is cooperating with the first user U1 to provide care to the patient P, such as by input data DI which indicates both users U1, U2 are nearby the patient P. If the second user U2 is not cooperating with the first user U1, then the authorization module 106 moves to block 250 and denies the first user U1 access to the powered device 86 function FN. However, if the second user U2 is cooperating with the first user U1, then the authorization module 106 moves to block 252 and checks to see if the second user U2 has the permission level PL required for accessing the requested powered device 86 function FN.
At block 252, if the second user U2 has the requisite permission level PL, the authorization module 106 moves from block 252 to block 254 and allows the first user U1 and/or the second user U2 access to the powered device 86 function FN before returning to block 238. However, if the second user U2 does not have the requisite permission level PL, then the authorization module 106 moves from block 252 to block 256.
At block 256, the authorization module 106 checks for other cooperation data CD in the users' U1, U2 dossiers 112, as well as additional input data DI, which suggest temporarily increasing one or both of the users' U1, U2 permission level PL to allow access to the powered device 86 function FN. If the cooperation data CD do suggest increasing the permission level PL, then the authorization module 106 moves to block 254 and allows the first user U1 and/or the second user U2 access to the powered device 86 function FN before returning to block 238. However, if the cooperation data CD do not suggest increasing the permission level PL, then the authorization module 106 moves to block 258.
At block 258, the authorization module checks for patient data PD which indicate an emergency situation necessitating or otherwise warranting increasing the permission level PL of one or both users U1, U2. Here, for example, even where both users U1, U2 have permission levels PL insufficient to access adjusting the vertical configuration 38A, 38B of the patient support deck 38, and even where no cooperation data CD between the users U1, U2 exist that merits adjusting the permission level PL, the authorization system 100 could nevertheless allow the users U1, U2 to lower the patient support deck 38 during an emergency, such as where the patient P is having a heart attack and needs immediate cardiopulmonary resuscitation (CPR). However, if at block 258 the access system 100 determines no emergency situation is present, then the authorization module 106 moves to block 260 and denies both users U1, U2 access to the powered device 86 function FN before returning to block 238.
In this way, the embodiments of the access system 100 and patient support apparatus 30 of the present disclosure afford significant opportunities for enhancing the functionality and operation of powered devices 86 by managing users U and dynamically controlling access to powered devices 86 by specific users U and/or patients P in a number of different situations. Moreover, the access system 100 allows users U and patients P to be monitored and tracked dynamically, in a number of different ways, and based on a number of different types of input data DI, to ensure and maintain proper user U identification and access while, at the same time, preventing unauthorized access to powered devices 86.
As noted above, the subject patent application is related to U.S. Provisional Patent Application No. 62/525,377 filed on Jun. 27, 2017. In addition, the subject patent application is also related to: U.S. Provisional Patent Application No. 62/525,353 filed on Jun. 27, 2017 and its corresponding Non-Provisional patent application Ser. No. 16/020,068 filed on Jun. 27, 2018; U.S. Provisional Patent Application No. 62/525,359 filed on Jun. 27, 2017 and its corresponding Non-Provisional patent application Ser. No. 16/020,052 filed on Jun. 27, 2018; U.S. Provisional Patent Application No. 62/525,363 filed on Jun. 27, 2017 and its corresponding Non-Provisional patent application Ser. No. 16/020,085 filed on Jun. 27, 2018; U.S. Provisional Patent Application No. 62/525,368 filed on Jun. 27, 2017 and its corresponding Non-Provisional patent application Ser. No. 16/019,973 filed on Jun. 27, 2018; and U.S. Provisional Patent Application No. 62/525,373 filed on Jun. 27, 2017 and its corresponding Non-Provisional patent application Ser. No. 16/020,003 filed on Jun. 27, 2018. The disclosures of each of the above-identified Provisional Patent Applications and corresponding Non-Provisional Patent Applications are each hereby incorporated by reference in their entirety.
It will be further appreciated that the terms “include,” “includes,” and “including” have the same meaning as the terms “comprise,” “comprises,” and “comprising.” Moreover, it will be appreciated that terms such as “first,” “second,” “third,” and the like are used herein to differentiate certain structural features and components for the non-limiting, illustrative purposes of clarity and consistency.
Several configurations have been discussed in the foregoing description. However, the configurations discussed herein are not intended to be exhaustive or limit the invention to any particular form. The terminology which has been used is intended to be in the nature of words of description rather than of limitation. Many modifications and variations are possible in light of the above teachings and the invention may be practiced otherwise than as specifically described.
The invention is intended to be defined in the independent claims, with specific features laid out in the dependent claims, wherein the subject-matter of a claim dependent from one independent claim can also be implemented in connection with another independent claim.
The subject patent application is a divisional of U.S. patent application Ser. No. 16/019,986 filed on Jun. 27, 2018, which claims priority to and all the benefits of U.S. Provisional Patent Application No. 62/525,377 filed on Jun. 27, 2017, the disclosures of each of which are hereby incorporated by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
5113214 | Nagata et al. | May 1992 | A |
5276432 | Travis | Jan 1994 | A |
5434621 | Yu | Jul 1995 | A |
5640953 | Bishop et al. | Jun 1997 | A |
5645667 | Kusen | Jul 1997 | A |
5664270 | Bell et al. | Sep 1997 | A |
5971913 | Newkirk et al. | Oct 1999 | A |
6320510 | Menkedick et al. | Nov 2001 | B2 |
6340977 | Lui et al. | Jan 2002 | B1 |
6362725 | Ulrich et al. | Mar 2002 | B1 |
6702314 | Crose | Mar 2004 | B1 |
6876303 | Reeder et al. | Apr 2005 | B2 |
6948592 | Kavounas | Sep 2005 | B2 |
7154397 | Zerhusen et al. | Dec 2006 | B2 |
7296312 | Menkedick et al. | Nov 2007 | B2 |
7319386 | Collins, Jr. et al. | Jan 2008 | B2 |
7336187 | Hubbard, Jr. et al. | Feb 2008 | B2 |
7389552 | Reed et al. | Jun 2008 | B1 |
7443302 | Reeder et al. | Oct 2008 | B2 |
7472439 | Lemire et al. | Jan 2009 | B2 |
7487562 | Frondorf et al. | Feb 2009 | B2 |
7490021 | Holland et al. | Feb 2009 | B2 |
7570152 | Smith et al. | Aug 2009 | B2 |
7690059 | Lemire et al. | Apr 2010 | B2 |
7747644 | Reihl et al. | Jun 2010 | B1 |
7888901 | Larson et al. | Feb 2011 | B2 |
7895519 | Allegrezza et al. | Feb 2011 | B1 |
7962981 | Lemire et al. | Jun 2011 | B2 |
8069157 | Jam | Nov 2011 | B2 |
8117701 | Bobey et al. | Feb 2012 | B2 |
8121856 | Huster et al. | Feb 2012 | B2 |
8143846 | Herman et al. | Mar 2012 | B2 |
8165908 | Bolle et al. | Apr 2012 | B2 |
8209608 | Linyard et al. | Jun 2012 | B1 |
8266742 | Andrienko | Sep 2012 | B2 |
8308237 | Kunou | Nov 2012 | B2 |
8319633 | Becker et al. | Nov 2012 | B2 |
8334779 | Zerhusen et al. | Dec 2012 | B2 |
8341777 | Hensley et al. | Jan 2013 | B2 |
8344860 | Collins, Jr. et al. | Jan 2013 | B2 |
8410943 | Metz et al. | Apr 2013 | B2 |
8413270 | Turner et al. | Apr 2013 | B2 |
8413271 | Blanchard et al. | Apr 2013 | B2 |
8432287 | O'Keefe et al. | Apr 2013 | B2 |
8442738 | Patmore | May 2013 | B2 |
8464380 | Bobey et al. | Jun 2013 | B2 |
8525682 | Dixon et al. | Sep 2013 | B2 |
8544126 | Elliott et al. | Oct 2013 | B2 |
8552880 | Kopp et al. | Oct 2013 | B2 |
8604917 | Collins et al. | Dec 2013 | B2 |
8641301 | Yang et al. | Feb 2014 | B2 |
8650682 | Herman | Feb 2014 | B2 |
8674839 | Zerhusen et al. | Mar 2014 | B2 |
8716941 | Kim | May 2014 | B2 |
8756078 | Collins, Jr. et al. | Jun 2014 | B2 |
8768520 | Oexman et al. | Jul 2014 | B2 |
8789102 | Pickelsimer et al. | Jul 2014 | B2 |
8847756 | Tallent et al. | Sep 2014 | B2 |
8868542 | Kimball et al. | Oct 2014 | B2 |
8870812 | Alberti et al. | Oct 2014 | B2 |
8896524 | Birnbaum et al. | Nov 2014 | B2 |
8923994 | Laikari et al. | Dec 2014 | B2 |
8924218 | Corpier et al. | Dec 2014 | B2 |
8926535 | Rawls-Meehan | Jan 2015 | B2 |
8984685 | Robertson et al. | Mar 2015 | B2 |
9001038 | Kasahara | Apr 2015 | B2 |
9032510 | Sampathkumaran et al. | May 2015 | B2 |
9038217 | Elliot et al. | May 2015 | B2 |
9088282 | Holenarsipur et al. | Jul 2015 | B2 |
9126571 | Lemire et al. | Sep 2015 | B2 |
9138173 | Penninger et al. | Sep 2015 | B2 |
9173792 | Goffer | Nov 2015 | B2 |
9204823 | Derenne et al. | Dec 2015 | B2 |
9220650 | Bobey et al. | Dec 2015 | B2 |
9230421 | Reeder et al. | Jan 2016 | B2 |
9233033 | Valentino et al. | Jan 2016 | B2 |
9259369 | Derenne et al. | Feb 2016 | B2 |
9262876 | Wood et al. | Feb 2016 | B2 |
9320664 | Newkirk et al. | Apr 2016 | B2 |
9342677 | Ali et al. | May 2016 | B2 |
9381125 | Herbst et al. | Jul 2016 | B2 |
9424699 | Kusens et al. | Aug 2016 | B2 |
9456938 | Blickensderfer et al. | Oct 2016 | B2 |
9463126 | Zerhusen et al. | Oct 2016 | B2 |
9466163 | Kusens et al. | Oct 2016 | B2 |
9486084 | Connell et al. | Nov 2016 | B2 |
9569591 | Vanderpohl, III | Feb 2017 | B2 |
9593833 | McMannon et al. | Mar 2017 | B2 |
9655798 | Zerhusen et al. | May 2017 | B2 |
9691206 | Kusens et al. | Jun 2017 | B2 |
9774991 | Kusens | Sep 2017 | B2 |
9814410 | Kostic et al. | Nov 2017 | B2 |
9838849 | Kusens | Dec 2017 | B2 |
9844275 | Nunn et al. | Dec 2017 | B2 |
9849051 | Newkirk et al. | Dec 2017 | B2 |
9858741 | Kusens et al. | Jan 2018 | B2 |
9892310 | Kusens et al. | Feb 2018 | B2 |
9892311 | Kusens et al. | Feb 2018 | B2 |
9916649 | Kusens | Mar 2018 | B1 |
9934427 | Derenne et al. | Apr 2018 | B2 |
9940810 | Derenne et al. | Apr 2018 | B2 |
9984521 | Kusens et al. | May 2018 | B1 |
9997001 | Kusens et al. | Jun 2018 | B2 |
9998857 | Kusens | Jun 2018 | B2 |
9999555 | Magill et al. | Jun 2018 | B2 |
10004654 | Zerhusen et al. | Jun 2018 | B2 |
10013831 | Kusens et al. | Jul 2018 | B1 |
10034979 | Bechtel et al. | Jul 2018 | B2 |
10052249 | Elliott et al. | Aug 2018 | B2 |
10090068 | Kusens et al. | Oct 2018 | B2 |
10096101 | Kusens | Oct 2018 | B2 |
10098796 | Valentino et al. | Oct 2018 | B2 |
10109179 | Kusens | Oct 2018 | B2 |
10115253 | Kusens et al. | Oct 2018 | B2 |
10115254 | Kusens et al. | Oct 2018 | B1 |
10121299 | Kusens et al. | Nov 2018 | B2 |
10136841 | Alghazi | Nov 2018 | B2 |
10147184 | Kusens et al. | Dec 2018 | B2 |
10147256 | Kusens et al. | Dec 2018 | B2 |
10172752 | Goffer | Jan 2019 | B2 |
10187755 | Kusens et al. | Jan 2019 | B2 |
10188569 | Elku et al. | Jan 2019 | B2 |
10194278 | Kusens | Jan 2019 | B1 |
10198886 | Kusens et al. | Feb 2019 | B2 |
10210378 | Kusens et al. | Feb 2019 | B2 |
10708745 | Gravelle et al. | Jul 2020 | B2 |
20020000727 | Rass et al. | Jan 2002 | A1 |
20020014951 | Kramer et al. | Feb 2002 | A1 |
20030183427 | Tojo et al. | Oct 2003 | A1 |
20040083394 | Brebner et al. | Apr 2004 | A1 |
20060077186 | Park et al. | Apr 2006 | A1 |
20060102392 | Johnson et al. | May 2006 | A1 |
20070163045 | Becker et al. | Jul 2007 | A1 |
20070219950 | Crawford | Sep 2007 | A1 |
20080141459 | Hamberg et al. | Jun 2008 | A1 |
20080172789 | Elliot et al. | Jul 2008 | A1 |
20080235872 | Newkirk et al. | Oct 2008 | A1 |
20090153370 | Cooper et al. | Jun 2009 | A1 |
20100039414 | Bell | Feb 2010 | A1 |
20100212087 | Leib et al. | Aug 2010 | A1 |
20110080421 | Capener | Apr 2011 | A1 |
20110162067 | Shuart et al. | Jun 2011 | A1 |
20110169653 | Wang et al. | Jul 2011 | A1 |
20110277242 | Dionne | Nov 2011 | A1 |
20120023670 | Zerhusen et al. | Feb 2012 | A1 |
20120089419 | Huster et al. | Apr 2012 | A1 |
20120137436 | Andrienko | Jun 2012 | A1 |
20120215360 | Zerhusen et al. | Aug 2012 | A1 |
20120239173 | Laikari et al. | Sep 2012 | A1 |
20130138452 | Cork et al. | May 2013 | A1 |
20130142367 | Berry et al. | Jun 2013 | A1 |
20130227787 | Herbst et al. | Sep 2013 | A1 |
20130238991 | Jung et al. | Sep 2013 | A1 |
20130300867 | Yoder | Nov 2013 | A1 |
20130318716 | Vanderpohl, III | Dec 2013 | A1 |
20140076644 | Derenne et al. | Mar 2014 | A1 |
20140188512 | Parker | Jul 2014 | A1 |
20140259410 | Zerhusen et al. | Sep 2014 | A1 |
20140259414 | Hayes | Sep 2014 | A1 |
20140265181 | Lambarth et al. | Sep 2014 | A1 |
20140297327 | Heil et al. | Oct 2014 | A1 |
20140313700 | Connell et al. | Oct 2014 | A1 |
20140342330 | Freeman et al. | Nov 2014 | A1 |
20150002393 | Cohen et al. | Jan 2015 | A1 |
20150020151 | Ramanathan | Jan 2015 | A1 |
20150060162 | Goffer | Mar 2015 | A1 |
20150077534 | Derenne et al. | Mar 2015 | A1 |
20150109442 | Derenne et al. | Apr 2015 | A1 |
20150154002 | Weinstein et al. | Jun 2015 | A1 |
20150250669 | Elliott et al. | Sep 2015 | A1 |
20150317068 | Marka et al. | Nov 2015 | A1 |
20160006765 | Shem Tov | Jan 2016 | A1 |
20160012218 | Perna et al. | Jan 2016 | A1 |
20160022039 | Paul et al. | Jan 2016 | A1 |
20160038361 | Bhimavarapu et al. | Feb 2016 | A1 |
20160045382 | Goffer | Feb 2016 | A1 |
20160049028 | Kusens et al. | Feb 2016 | A1 |
20160050217 | Mare et al. | Feb 2016 | A1 |
20160065909 | Derenne et al. | Mar 2016 | A1 |
20160095774 | Bobey et al. | Apr 2016 | A1 |
20160098676 | Kusens et al. | Apr 2016 | A1 |
20160140307 | Brosnan | May 2016 | A1 |
20160180668 | Kusens et al. | Jun 2016 | A1 |
20160183864 | Kusens et al. | Jun 2016 | A1 |
20160193095 | Roussy et al. | Jul 2016 | A1 |
20160199240 | Newkirk et al. | Jul 2016 | A1 |
20160247342 | Kusens et al. | Aug 2016 | A1 |
20160296396 | Kolar et al. | Oct 2016 | A1 |
20160324705 | Bach Castillo | Nov 2016 | A1 |
20160338891 | Agdeppa et al. | Nov 2016 | A1 |
20160366327 | Kusens | Dec 2016 | A1 |
20160367420 | Zerhusen et al. | Dec 2016 | A1 |
20160371786 | Kusens et al. | Dec 2016 | A1 |
20160373313 | Giri | Dec 2016 | A1 |
20170026358 | Hankins | Jan 2017 | A1 |
20170027789 | St.John et al. | Feb 2017 | A1 |
20170049642 | Valentino et al. | Feb 2017 | A9 |
20170055113 | Kusens | Feb 2017 | A1 |
20170076526 | Kusens et al. | Mar 2017 | A1 |
20170094477 | Kusens et al. | Mar 2017 | A1 |
20170097800 | Vanderpohl, III | Apr 2017 | A1 |
20170098048 | Brosnan et al. | Apr 2017 | A1 |
20170109770 | Kusens et al. | Apr 2017 | A1 |
20170111770 | Kusens | Apr 2017 | A1 |
20170116790 | Kusens et al. | Apr 2017 | A1 |
20170124844 | Huster et al. | May 2017 | A1 |
20170128296 | Kostic et al. | May 2017 | A1 |
20170143565 | Childs et al. | May 2017 | A1 |
20170193177 | Kusens | Jul 2017 | A1 |
20170193180 | Kusens et al. | Jul 2017 | A1 |
20170193279 | Kusens et al. | Jul 2017 | A1 |
20170193772 | Kusens et al. | Jul 2017 | A1 |
20170195637 | Kusens et al. | Jul 2017 | A1 |
20170213445 | Kusens | Jul 2017 | A1 |
20170224562 | Zerhusen et al. | Aug 2017 | A1 |
20170229009 | Foster et al. | Aug 2017 | A1 |
20170259811 | Coulter et al. | Sep 2017 | A1 |
20170281440 | Puvogel et al. | Oct 2017 | A1 |
20170295181 | Parimi | Oct 2017 | A1 |
20170352212 | Kusens et al. | Dec 2017 | A1 |
20180017945 | Sidhu et al. | Jan 2018 | A1 |
20180039743 | Dixon et al. | Feb 2018 | A1 |
20180040091 | Kusens | Feb 2018 | A1 |
20180041864 | Kusens | Feb 2018 | A1 |
20180055418 | Kostic et al. | Mar 2018 | A1 |
20180056985 | Coulter et al. | Mar 2018 | A1 |
20180084390 | Kusens | Mar 2018 | A1 |
20180096550 | Kusens et al. | Apr 2018 | A1 |
20180110445 | Bhimavarapu et al. | Apr 2018 | A1 |
20180114053 | Kusens et al. | Apr 2018 | A1 |
20180137340 | Kusens et al. | May 2018 | A1 |
20180151010 | Kusens et al. | May 2018 | A1 |
20180161225 | Zerhusen et al. | Jun 2018 | A1 |
20180167816 | Kusens et al. | Jun 2018 | A1 |
20180184984 | Zerhusen et al. | Jul 2018 | A1 |
20180189946 | Kusens et al. | Jul 2018 | A1 |
20180211464 | Kusens et al. | Jul 2018 | A1 |
20180218489 | Kusens | Aug 2018 | A1 |
20180232979 | Kusens et al. | Aug 2018 | A1 |
20180232980 | Kusens et al. | Aug 2018 | A1 |
20180247476 | Kusens et al. | Aug 2018 | A1 |
20180250177 | Magill et al. | Sep 2018 | A1 |
20180271286 | Jacobs et al. | Sep 2018 | A1 |
20180271287 | Jacobs et al. | Sep 2018 | A1 |
20180279075 | Kusens | Sep 2018 | A1 |
20180293826 | Kusens et al. | Oct 2018 | A1 |
20180300977 | Kusens et al. | Oct 2018 | A1 |
20180303687 | Moreno et al. | Oct 2018 | A1 |
20180369035 | Bhimavarapu et al. | Dec 2018 | A1 |
20180369037 | Desaulniers et al. | Dec 2018 | A1 |
20180369038 | Bhimavarapu et al. | Dec 2018 | A1 |
20180369039 | Bhimavarapu et al. | Dec 2018 | A1 |
20180374573 | Bhimavarapu et al. | Dec 2018 | A1 |
20180374577 | Bhimavarapu | Dec 2018 | A1 |
20180376300 | Kusens et al. | Dec 2018 | A1 |
20190006046 | Kusens et al. | Jan 2019 | A1 |
20190008708 | Moreno et al. | Jan 2019 | A1 |
20190019283 | Kusens | Jan 2019 | A1 |
20190024882 | Jonsson et al. | Jan 2019 | A1 |
20190043192 | Kusens et al. | Feb 2019 | A1 |
20190046373 | Coulter et al. | Feb 2019 | A1 |
20190073849 | Kusens et al. | Mar 2019 | A1 |
Number | Date | Country |
---|---|---|
101789230 | Jul 2010 | CN |
19505162 | Mar 1996 | DE |
10018560 | Oct 2001 | DE |
102008011899 | Sep 2009 | DE |
102010015736 | Oct 2010 | DE |
0727298 | Aug 1996 | EP |
0727298 31 | Aug 1999 | EP |
1146185 | Oct 2001 | EP |
1146185 | Mar 2003 | EP |
1146185 81 | Jun 2005 | EP |
2489341 | Aug 2012 | EP |
2531159 | Dec 2012 | EP |
2619724 | Jul 2013 | EP |
2918255 | Sep 2015 | EP |
2003140631 | May 2003 | JP |
20130076922 | Jul 2013 | KR |
0101913 | Jan 2001 | WO |
2006089399 | Aug 2006 | WO |
2011097569 | Aug 2011 | WO |
2012040554 | Mar 2012 | WO |
2014021873 | Feb 2014 | WO |
2015148578 | Oct 2015 | WO |
2015157402 | Oct 2015 | WO |
2015171365 | Nov 2015 | WO |
2016025927 | Feb 2016 | WO |
2016049593 | Mar 2016 | WO |
2016049593 | May 2016 | WO |
2016123595 | Aug 2016 | WO |
2016196403 | Dec 2016 | WO |
2016200556 | Dec 2016 | WO |
2017027427 | Feb 2017 | WO |
2017031111 | Feb 2017 | WO |
2017058991 | Apr 2017 | WO |
2017061471 | Apr 2017 | WO |
2017070350 | Apr 2017 | WO |
2017058991 | May 2017 | WO |
2017070350 | Jul 2017 | WO |
2017124056 | Jul 2017 | WO |
2017201513 | Nov 2017 | WO |
2018026979 | Feb 2018 | WO |
2018154819 | Aug 2018 | WO |
2018203476 | Nov 2018 | WO |
2018216387 | Nov 2018 | WO |
2018236588 | Dec 2018 | WO |
2018236588 | Jan 2019 | WO |
Entry |
---|
AHIMA, “Facial Recognition Enters into Healthcare”, Journal of AHIMA, Sep. 4, 2018, https://journal.ahima.org/2018/09/04/facial-recognition-enters-into-healthcare/, 4 pages. |
Apple, “Adjust the Brightness on you iPhone, IPad, or IPod Touch”, https://support.apple.com/en-us/HT202613, 2018, 2 pages. |
Astral Healthcare, “Opthalmology Day Surgery Chair Webpage”, Apr. 2018, http://astralhealthcare.com/?product=opthalmology-day-surgery-chair, 6 pages. |
Campbell, Mikey, “Apple Expected to Replace Touch ID With Two-Step Facial, Fingerprint Bio-Recognition Tech”, Apple Insider, Jan. 21, 2017, http://iphone.appleinsider.com/articles/17/01/21/apple-expected-to-replace-touch-id-with-two-step-facial-fingerprint-bio-recognition-tech, 4 pages. |
Chouffani, Reda, “Use of Facial Recognition in Healthcare Improves Hospital Security”, Dec. 2018, https://searchhealthit.techtarget.com/tip/Use-of-facial-recognition-in-healthcare-improves-hospital-security, 5 pages. |
Dai, Sarah, “Meet Five Chinese Start-Ups Pushing Facial Recognition Technology Into the Mainstream”, South China Morning Post, Feb. 20, 2018, https://www.scmp.com/tech/start-ups/article/2133234/meet-five-chinese-start-ups-pushing-facial-recognition-technology, 7 pages. |
DOGE Medical, “DOC Classic—DOC Surgery Chairs Webpage”, 2014, 2 pages, https://web.archive.org/web/20140214203605/http://www.dogemedical.com/pages/en/products/surgery-chairs/doc-classic.php?lang=EN. |
English language abstract and machine-assisted English translation for CN 101789230 extracted from espacenet.com database on Aug. 30, 2018, 31 pages. |
English language abstract and machine-assisted English translation for DE 10 2008 011 899 extracted from espacenet.com database on Mar. 20, 2019, 13 pages. |
English language abstract and machine-assisted English translation for DE 10 2010 015 736 extracted from espacenet.com database on Mar. 20, 2019, 7 pages. |
English language abstract and machine-assisted English translation for JP 2003-140631 extracted from espacenet.com database on Aug. 30, 2018, 19 pages. |
English language abstract and machine-assisted English translation for KR 2013-0076922 A extracted from espacenet.com database on Aug. 16, 2018, 8 pages. |
English language abstract and machine-assisted English translation for WO 2017/061471 extracted from espacenet.com database on Mar. 25, 2019, 26 pages. |
English language abstract and machine-assisted English translation for WO 2018/154819 extracted from espacenet.com database on Mar. 25, 2019, 35 pages. |
English language abstract and machine-assisted English translation for WO 2018/203476 extracted from espacenet.com database on Mar. 25, 2019, 37 pages. |
English language abstract and machine-assisted English translation for WO 2018/216387 extracted from espacenet.com database on Mar. 25, 2019, 43 pages. |
English language abstract for DE 100 18 560 extracted from espacenet.com database on Mar. 20, 2019, 2 pages. |
English language abstract for DE 195 05 162 C1 extracted from espacenet.com database on Aug. 16, 2018, 1 page. |
English language abstract for EP 0 727 298 A1 extracted from espacenet.com database on Aug. 16, 2018, 1 page. |
English language abstract for EP 0 727 298 B1 extracted from espacenet.com database on Aug. 16, 2018, 1 page. |
English language abstract for EP 1 146 185 A2 extracted from espacenet.com database on Mar. 20, 2019, 2 pages. |
English language abstract for EP 1 146 185 A3 extracted from espacenet.com database on Mar. 20, 2019, 2 pages. |
English language abstract for EP 1 146 185 B1 extracted from espacenet.com database on Mar. 20, 2019, 2 pages. |
Hall, Stephen, “Nest's 3rd Generation Thermostat Gets Some New Views for its Farsight Feature”, 9 to 5 Google, Jun. 14, 2016, https://9to5google.com/2016/06/14/nest-3rd-gen-thermostat-views-farsight/, 4 pages. |
Hill-Rom, “Centrelia Smart+Bed Brochure” 2017, 11 pages. |
Imore, “How to Use Night Shift on your iPhone or iPad”, video also found at https://www.imore.com/night-shift, Nov. 1, 2017, 12 pages. |
Nwosu, Kingsley C., “Mobile Facial Recognition System for Patient Indentification in Medical Emergencies for Developing Economies”, Journal for the Advancement of Developing Economies, vol. 5, Issue 5, 2016, https://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1009&context=jade, pp. 62-72. |
Recliners.LA “Stellar 550 Large Lift Chair Recliner Webpage”, Apr. 2018, https://www.recliners.la/products/ultra-comfort-stellar-550-large-lift-chair, 4 pages. |
Stryker Medical, “InTouch Critical Care Bed Operations Manual”, Aug. 2014, 125 pages. |
Stryker, “InTouch Critical Care Bed Model FL27 (2130/2140) Operations Manual—Optional Pendant Control”, 2130-009-001 REV C, Apr. 2008, p. 25. |
Supportec-Trade, “Portfolilio Webpage”, 2017, https://supportec-trade.nl/en, 2 pages. |
U.S. Appl. No. 16/019,973, filed Jun. 27, 2018, 90 pages. |
U.S. Appl. No. 16/019,986, filed Jun. 27, 2018, 57 pages. |
U.S. Appl. No. 16/020,003, filed Jun. 27, 2018, 37 pages. |
U.S. Appl. No. 16/020,052, filed Jun. 27, 2018, 48 pages. |
U.S. Appl. No. 16/020,068, filed Jun. 27, 2018, 125 pages. |
U.S. Appl. No. 16/020,085, filed Jun. 27, 2018, 67 pages. |
U.S. Appl. No. 62/525,359, filed Jun. 27, 2017. |
U.S. Appl. No. 62/525,363, filed Jun. 27, 2017. |
U.S. Appl. No. 62/525,368, filed Jun. 27, 2017. |
U.S. Appl. No. 62/525,373, filed Jun. 27, 2017. |
U.S. Appl. No. 62/525,377, filed Jun. 27, 2017. |
Youtube, “Memory Seat Escape Video”, Nov. 4, 2013, https://www.youtube.com/watch?v=xlghNmAK-7A, 1 page. |
Youtube, “Microsoft HoloLens: Partner Spotlight with Stryker Communications Video”, Feb. 21, 2017, https://www.youtube.com/watch?v=FTPxUGRGpnA, 3 pages. |
Youtube, “Umano Medical Med Surg Bed: The Next Generation of Medical Bed (Canadian Version) Video”, Apr. 14, 2015, https://www.bing.com/videos/search?q=umano+ook+snow&&view=detail&mid=2407A16C09D0734591912407A16C09D073459191&rvsmid=FFCD5876C49E791738DFFFCD5876C49E791738DF&FORM=VDRVRV, 1 page. |
Number | Date | Country | |
---|---|---|---|
20200411175 A1 | Dec 2020 | US |
Number | Date | Country | |
---|---|---|---|
62525377 | Jun 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16019986 | Jun 2018 | US |
Child | 17020053 | US |