Medical facilities, such as hospitals, face many challenges in addition to simply caring for patients. For example, securing patients and equipment (e.g., medical devices) consumes many resources and current methods lack effectiveness. In addition to requiring personnel to physically monitor locations within the facility, visitor logs, visitor badges, and radio-frequency identification (RFID) technology are often utilized to control access to certain locations within the facility. However, each of these require subjective decision-making and are prone to error by the personnel monitoring the locations or assisting visitors signing a visitor log and issuing visitor badges accordingly. Further, none of these methods necessarily prevent an authorized visitor from breaching areas of the facility where the authorized visitor is not authorized. For example, a visitor may be authorized to visit a particular patient but, based on some condition of the patient, may not have close contact with the patient. In contrast, a caregiver of the same patient may need to have close contact with the patient. Additionally, in some situations, an authorized visitor may unwittingly provide contraband (e.g., some thing or some object a particular patient is not allowed) to a patient that the current methods are unable to detect. Finally, medical devices are constantly being shuffled between patients and locations within a facility. Tracking the locations of these devices can be extremely difficult. Accordingly, overall security for patients and equipment suffers, and the many resources currently being utilized are wasted.
This brief summary is provided as a general overview of the more detailed disclosure which follows. It is not intended to identify key or essential elements of the disclosure, or to define the claim terms in isolation from the remainder of the disclosure, including the drawings.
This disclosure generally relates to methods and systems for detecting unauthorized visitors in medical facilities. Generally, and without limitation, the method involves collecting an image of a person detected in a room of a patient. The system identifies reference points on the person's face, for example, points along the cheeks, jowls, and/or brow. The system may compare the reference points to reference points of images associated with registered visitors. The system then determines, based on the comparison, if the person is a registered visitor. One or more designated recipients may be alerted if the person is not a registered visitor or if the person breaches a patient identification zone established around a particular patient. The system may also register the person in a database of visitors.
In some aspects, this disclosure relates to a method for detecting unauthorized visitors. The method comprises: receiving from a 3D motion sensor an image of a person detected in a room of a patient; comparing positions of a plurality of reference points of the image to positions of a plurality of registered reference points of images associated with registered visitors, the plurality of registered reference points of images associated with registered visitors stored in a database of registered visitors; determining, based on the comparing, if the person is a registered visitor; and registering the person, if the determining indicates the person is not a registered visitor.
In some aspects, this disclosure relates to a system for detecting unauthorized visitors. The system comprises: one or more 3D motion sensors located to provide the one or more 3D motion sensors with a view of a person to be monitored, the 3D motion sensors configured to collect a series of images of the face of the person; a computerized monitoring system communicatively coupled to the one or more 3D motion sensors, the computerized monitoring system configured to identify a plurality of reference points on the face of the person and to compare positions of the plurality of the reference points to positions of a plurality of registered reference points on the face of registered visitors to determine if the person is a registered visitor, the plurality of registered reference points on the face of registered visitors stored in a database; and a computerized communication system communicatively coupled to the computerized monitoring system, the computerized communication system configured to send an alert to one or more designated recipients if the person is not a registered visitor and is determined to be an unauthorized visitor for the patient.
The unauthorized visitor system may further comprise a central video monitoring system. The central video monitoring system may be communicatively coupled to the computerized communication system. The central video monitoring system may be configured to display an image of the person. The central video monitoring system may comprise a primary display. The central video monitoring system may comprise an alert display. The alert display may be a dedicated portion of the primary display. The alert display may be a separate display or series of displays from the primary display. If the computerized patient monitoring system detects a person that is not a registered visitor, the central communication system may be configured to send an alert to the central video monitoring system. The central video monitoring system may be configured to move the display of the image of the person from the primary display to the alert display upon receipt of an alert.
In some aspects, this disclosure relates to computer-readable storage media having embodied thereon computer-executable instructions. When executed by one or more computer processors, the instructions may cause the processors to: receive from a 3D motion sensor an image of a person detected in a room of a patient; compare the image of the person to images of registered visitors stored in a database of registered visitors; determine, based on the comparing, if the person is a registered visitor; and alert one or more designated recipients if the person is not a registered visitor and is determined to be an unauthorized visitor for the patient.
Additional objects, advantages, and novel features of the disclosure will be set forth in part in the description which follows, and in part will become apparent to those skilled in the art upon examination of the following, or may be learned by practice of the disclosure.
The description references the attached drawing figures, wherein:
As noted in the Background, medical facilities, such as hospitals, face many challenges in addition to simply caring for patients. For example, securing patients and equipment (e.g., medical devices) consumes many resources and current methods lack effectiveness. In addition to requiring personnel to physically monitor locations within the facility, visitor logs, visitor badges, and radio-frequency identification (RFID) technology are often utilized to control access to certain locations within the facility. However, each of these require subjective decision-making and are prone to error by the personnel monitoring the locations or assisting visitors signing a visitor log and issuing visitor badges accordingly. Further, none of these methods necessarily prevent an authorized visitor from breaching areas of the facility where the authorized visitor is not authorized. For example, a visitor may be authorized to visit a particular patient but is not authorized to visit another patient or particular areas of the facility. Additionally, in some situations, an authorized visitor may unwittingly provide contraband (e.g., some thing or some object a particular patient is not allowed to possess or be near) to a patient that the current methods are unable to detect. Finally, medical devices are constantly being shuffled between patients and locations within a facility. Tracking the locations of these devices can be extremely difficult. Accordingly, overall security for patients and equipment suffers, and the many resources currently being utilized are wasted.
The subject matter of the present invention is described with specificity herein to meet statutory requirements. However, the description itself is not intended to limit the scope of this patent. Rather, the inventor has contemplated that the claimed subject matter might also be embodied in other ways, to include different steps or combinations of steps similar to the ones described in this document, in conjunction with other present or future technologies. Moreover, although the terms “step” and/or “block” may be used herein to connote different elements of methods employed, the terms should not be interpreted as implying any particular order among or between various steps herein disclosed unless and except when the order of individual steps is explicitly described.
As shown in
As used herein, “a sensor” and “sensors” are used interchangeably in the singular and plural unless expressly described as a singular sensor or an array of sensors. A singular sensor may be used, or a sensor may comprise two or more cameras integrated into a single physical unit. Alternately, two or more physically distinct sensors may be used, or two or more physically distinct arrays of sensors may be used.
An “unauthorized visitor” may be a person in the room of a patient being monitored that is already registered in a database of persons (e.g., caregiver, staff, or visitor), but not allowed to be in close proximity to the patient. An unauthorized visitor may be a person in the room of the patient being monitored that has not yet been registered in a database of persons.
A 3D motion sensor 104 may be co-located with a patient 102 to be monitored. The patient 102 to be monitored may be monitored in a variety of environments, including, without limitation, a hospital, a home, a hospice care facility, a nursing home, an assisted living facility, an outpatient medical care facility, and the like. The 3D motion sensor 104 may be positioned where it is likely to capture skeletal tracking of the patient 102 to be monitored or visitors entering the room. For example, a 3D motion sensor 104 may be oriented to take images of a bed, chair, or other location where the patient 102 to be monitored or visitors entering the room may spend a significant amount of time. The 3D motion sensor 104 may be permanently installed, or may be temporarily set up in a room as needed. The patient 102 to be monitored may be under immediate medical care (e.g., in a medical facility under the supervision of a medical professional) or may not be under immediate care (e.g., in a home or other environment, possibly with a caregiver). A caregiver may be a medical professional or paraprofessional, such as an orderly, nurse's aide, nurse, or the like. A caregiver may also be a friend, relative, individual, company, or facility that provides assistance with daily living activities and/or medical care for individuals, such as individuals who are disabled, ill, injured, elderly, or otherwise in need of temporary or long-term assistance. In some instances, the person to be monitored may be self-sufficient and not under the immediate care of any other person or service provider.
The 3D motion sensor 104 may communicate data, such as skeletal images of the patient 102 being monitored or a visitor detected in the room, to a computerized patient monitoring system 106. The computerized patient monitoring system 106 is a computer programmed to monitor transmissions of data from the 3D motion sensor 104. The computerized patient monitoring system 106 may be integral to the 3D motion sensor 104 or a distinctly separate apparatus from the 3D motion sensor 104, possibly in a remote location from 3D motion sensor 104 provided that the computerized patient monitoring system 106 can receive data from the 3D motion sensor 104. The computerized patient monitoring system 106 may be located in the monitored person's room, such as a hospital room, bedroom, or living room. The computerized patient monitoring system 106 may be connected to a central video monitoring system 116. The computerized patient monitoring system 106 and central video monitoring system 116 may be remotely located at any physical locations so long as a data connection exists (USB, TCP/IP, or comparable) between the computerized patient monitoring system 106, the central communication system 112 (if separate from computerized patient monitoring system 106), the central video monitoring system 116, and the 3D motion sensor(s) 104.
The computerized patient monitoring system 106 may receive data from 3D motion sensor 104 for a monitoring zone (i.e., the patient's room or area to be monitored). At step 108, the computerized patient monitoring system 106 may assess whether a visitor is detected in the room using skeletal tracking based on detecting a skeleton in addition to the skeleton of the patient. If a visitor is not detected in the room, the computerized patient monitoring system 106 may continue to analyze images in the monitoring zone as long as 3D motion sensor 104 continues to transmit data.
If a visitor is detected within the monitoring zone at step 108 (via skeletal tracking indicating that two skeletons are too close to each other), computerized patient monitoring system 106 may, at step 110, determine whether the visitor was in proximity to the patient. Computerized patient monitoring system 106 may establish a patient identification zone within the monitoring zone that, if crossed by a visitor, establishes that the visitor was in proximity to the patient. Such a patient identification zone may also be configured by an administrator of the computerized patient monitoring system 106. Patient identification zones can be established using any shapes, including, without limitation, rectangles, squares, circles, ovals, triangles, and irregular shapes.
Computerized patient monitoring system 106 may assign reference points to identify the boundaries of the patient identification zone. For example, reference points may be assigned to a perimeter around the patient. It should be understood that the selection of the reference points may vary with the individual and/or the configuration of the monitoring system 100. Reference points may be configured automatically by the monitoring system 100, may be configured automatically by the monitoring system 100 subject to confirmation and/or modification by a system user, or may be configured manually by a system user.
On detecting the visitor came into close proximity to the patient, such as by entering the patient identification zone, and is now considered an unauthorized visitor, central communication system 112 may be configured to send an alert of the unauthorized visitor to one or more designated recipients (e.g., caregiver(s) 120). Central communication system 112 may be an integral part of computerized patient monitoring system 106 and/or may be implemented using separate software, firmware and/or hardware, possibly physically remote from central communication system 112.
When an alert is triggered, the alert may be sent, at least initially, to the patient 102 being monitored, to give the patient 102 being monitored an opportunity to respond before alerting the central video monitoring system 116 and/or caregiver(s) 120. For example, an audible message may be played in the room where patient 102 is being monitored, possibly asking something such as, “Please refrain from close contact with the patient.”
Shown as step 114 in
Central video monitoring system 116 may be alerted if no response is received at step 114, or if the response is unintelligible or indicates that the patient 102 being monitored and/or the unauthorized visitor does not intend to comply with the patient identification zone requirements. Alternately, or additionally, central video monitoring system 116 may be alerted with or even before patient 102, so that central video monitoring system 116 can determine whether the unauthorized visitor detected is, in fact, problematic. On receiving an alert, the central video monitoring system 116, or an attendant there, may view live image, video, and/or audio feed from the 3D motion sensor 104 and evaluate whether the unauthorized visitor presents a danger to the patient and/or himself. If patient 102 has been alerted by the central communication system 112, central video monitoring system 116 or an attendant there can use the data from 3D motion sensor 104 to evaluate whether a response from patient 102 indicates that patient 102 or the unauthorized visitor is complying with the patient identification zone requirements. Central video monitoring system 116 and/or computerized patient monitoring system 106 may analyze the response from patient 102 and/or the unauthorized visitor, however, if the response does not include words or gestures recognizable by the computerized system, an attendant at central video monitoring system 116 may be able to interpret the person's response. If needed, the central video monitoring system 116 and/or the attendant could then approve alert(s) to appropriate caregiver(s) 120 and/or call for emergency assistance (e.g., send a request for security).
One or more caregiver(s) 120 local to patient 102 can be alerted with or even before patient 102 and/or central video monitoring system 116, so that the caregiver(s) 120 can assess what is happening in person. Or, monitored patient 102, caregiver(s) 120, and the central video monitoring system 116 could all be alerted at the same time. The priority and timing of alerts to different individuals or stations can be configured in accordance with the needs and desires of a particular facility, experience with a particular monitored individual or type of patient, or any other criterion of the system owner or user. This is true for initial alerts as well as continuing alerts (e.g., if an unauthorized visitor is detected in and remains in close proximity to the patient 102, and no response from patient 102 or a caregiver 120 is received or observed) or repeated alerts (two or more distinct events where an unauthorized visitor is detected in close proximity to the patient 102). The priority and timing of alerts to different individuals may be different for initial, continuing, and/or repeated alerts.
Data associated with alerts may be logged by computerized patient monitoring system 106 and/or central video monitoring system 116 in a database 118. Data associated with an alert may include, without limitation, the telemetry data from 3D motion sensor 104 that triggered the alert; buffered data preceding the telemetry data that triggered the alert; telemetry data subsequent to the alert; the number and substantive content of an alert; the individual(s) and/or groups to whom an alert was addressed; the response, if any, received or observed following an alert; and combinations thereof.
As shown in
In
The 3D motion sensor 304 may communicate data, such as images of the patient 302 being monitored or a visitor detected in the room, to a computerized patient monitoring system 306. The computerized patient monitoring system 306 is a computer programmed to monitor transmissions of data from the 3D motion sensor 304. The computerized patient monitoring system 306 may be integral to the 3D motion sensor 304 or a distinctly separate apparatus from the 3D motion sensor 304, possibly in a remote location from 3D motion sensor 304 provided that the computerized patient monitoring system 306 can receive data from the 3D motion sensor 304. The computerized patient monitoring system 306 may be located in the monitored person's room, such as a hospital room, bedroom, or living room. The computerized patient monitoring system 306 may be connected to a central video monitoring system 316. The computerized patient monitoring system 306 and central video monitoring system 316 may be remotely located at any physical locations so long as a data connection exists (USB, TCP/IP, or comparable) between the computerized patient monitoring system 306, the central communication system 312 (if separate from the computerized patient monitoring system 306), the central video monitoring system 316, and the 3D motion sensor(s) 304.
The computerized patient monitoring system 306 may receive data from 3D motion sensor 304 for a monitoring zone (i.e., the patient's room or area to be monitored). At step 308, the computerized patient monitoring system 306 may assess whether a visitor is detected in the room. If a visitor is not detected in the room, the computerized patient monitoring system 306 may continue to analyze images in the monitoring zone as long as 3D motion sensor 304 continues to transmit data.
If a visitor is detected (via skeletal tracking or blob recognition) within the monitoring zone at step 308, computerized patient monitoring system 306 may, at step 310, determine whether the visitor is an authorized visitor (via facial recognition). To do so, computerized patient monitoring system 306 may assign reference points to distinctive features of the image of the visitor. For example, reference points may be assigned around the eyes and around the mouth of the visitor. It should be understood that the selection of the reference points may vary with the individual and/or the configuration of the monitoring system 300. For example, if bandages or physiological anomalies would complicate the tracking of routine reference points, alternative reference points may be assigned. Reference points may be configured automatically by the monitoring system 300, may be configured automatically by the monitoring system 300 subject to confirmation and/or modification by a system user, or may be configured manually by a system user. The reference points corresponding to the visitor may be compared to a database comprising reference points of known or authorized visitors. Various machine learning and/or facial recognition techniques may additionally be utilized to determine if the visitor is an authorized visitor. If no match is found in the database of known visitors, the visitor may be an unauthorized visitor.
Accordingly, computerized patient monitoring system 306 may communicate an image of the visitor to central communication system 312. Central communication system 312 may be configured to send an alert of the unauthorized visitor to one or more designated recipients (e.g., caregiver(s) 320). Central communication system 312 may be an integral part of computerized patient monitoring system 306 and/or may be implemented using separate software, firmware, and/or hardware, possibly physically remote from central communication system 312. When an alert is triggered, the alert may be sent, at least initially, to the patient 302 being monitored to give the patient 302 being monitored an opportunity to respond before alerting the central video monitoring system 316 and/or caregiver(s) 320. For example, an audible message may be played in the room where patient 302 is being monitored, possibly asking the visitor: “Please show your identification.”
Shown as step 314 in
Central video monitoring system 316 may be alerted if no response is received at step 314 or if the response is unintelligible or indicates that the unauthorized visitor does not intend to comply. Alternately, or additionally, central video monitoring system 316 may be alerted with or even before patient 302, so that central video monitoring system 316 can determine whether the unauthorized visitor detected is, in fact, problematic. On receiving an alert, the central video monitoring system 316, or an attendant there, may view live image, video, and/or audio feed from the 3D motion sensor 304 and evaluate whether the unauthorized visitor presents a danger to the patient and/or himself. If patient 302 has been alerted by the central communication system 312, central video monitoring system 316 or an attendant there can use the data from 3D motion sensor 304 to evaluate whether a response from patient 302 indicates that the unauthorized visitor is complying with identification requirements. Central video monitoring system 316 and/or computerized patient monitoring system 306 may analyze the response from patient 302 and/or the unauthorized visitor, however, if the response does not include words or gestures recognizable by the computerized system, an attendant at central video monitoring system 316 may be able to interpret the person's response. If needed, the central video monitoring system 316 and/or the attendant could then approve alert(s) to appropriate caregiver(s) 320 and/or call for emergency assistance (e.g., send a request for security).
One or more caregiver(s) 320 local to patient 302 can be alerted with or even before patient 302 and/or central video monitoring system 316, so that the caregiver(s) 320 can assess what is happening in person. Or, monitored patient 302, caregiver(s) 320 and the central video monitoring system 316 could all be alerted at the same time. The priority and timing of alerts to different individuals or stations can be configured in accordance with the needs and desires of a particular facility, experience with a particular monitored individual or type of patient, or any other criterion of the system owner or user. This is true for initial alerts as well as continuing alerts (e.g., if an unauthorized visitor is detected, and no response is received or observed) or repeated alerts (two or more distinct events where an unauthorized visitor is detected). The priority and timing of alerts to different individuals may be different for initial, continuing, and/or repeated alerts.
Data associated with alerts may be logged by computerized patient monitoring system 306 and/or central video monitoring system 316 in a database 318. Data associated with an alert may include, without limitation, the telemetry data from 3D motion sensor 304 that triggered the alert; buffered data preceding the telemetry data that triggered the alert; telemetry data subsequent to the alert; the number and substantive content of an alert; the individual(s) and/or groups to whom an alert was addressed; the response, if any, received or observed following an alert; and combinations thereof. In embodiments, data for authorized visitors (e.g., recognition profile) may also be stored in database 318.
As shown in
In
The 3D motion sensor 504 may communicate data, such as images of the patient 502 being monitored or a visitor detected in the room, to a computerized patient monitoring system 506. The computerized patient monitoring system 506 is a computer programmed to monitor transmissions of data from the 3D motion sensor 504. The computerized patient monitoring system 506 may be integral to the 3D motion sensor 504 or a distinctly separate apparatus from the 3D motion sensor 504, possibly in a remote location from 3D motion sensor 504 provided that the computerized patient monitoring system 506 can receive data from the 3D motion sensor 504. The computerized patient monitoring system 506 may be located in the monitored person's room, such as a hospital room, bedroom, or living room. The computerized patient monitoring system 506 may be connected to a central video monitoring system 516. The computerized patient monitoring system 506 and central video monitoring system 516 may be remotely located at any physical locations so long as a data connection exists (USB, TCP/IP, or comparable) between the computerized patient monitoring system 506, the central communication system 512 (if separate from computerized patient monitoring system 506), the central video monitoring system 516, and the 3D motion sensor(s) 504.
The computerized patient monitoring system 506 may receive data from 3D motion sensor 504 for a monitoring zone (i.e., the patient's room or area to be monitored). At step 508, the computerized patient monitoring system 506 may assess whether a visitor is detected in the room (via skeletal tracking or blob recognition). If a visitor is not detected in the room, the computerized patient monitoring system 506 may continue to analyze images in the monitoring zone as long as 3D motion sensor 504 continues to transmit data.
If a visitor is detected within the monitoring zone at step 508, computerized patient monitoring system 506 may, at step 510, determine whether the visitor in an authorized visitor. To do so, RTLS may determine whether a signal was detected, such as from a badge of the visitor, as shown at step 509, indicating an authorized person has entered the room of the patient. If a signal is detected, the computerized patient monitoring system 506 continues monitoring. If no signal is detected, computerized patient monitoring system 506 may communicate an image of the visitor to central communication system 512. Central communication system 512 may be configured to send an alert of the unauthorized visitor to one or more designated recipients (e.g., caregiver(s) 520). Central communication system 512 may be an integral part of computerized patient monitoring system 506 and/or may be implemented using separate software, firmware, and/or hardware, possibly physically remote from central communication system 512. When an alert is triggered, the alert may be sent, at least initially, to the patient 502 being monitored, to give the patient 502 being monitored an opportunity to respond before alerting the central video monitoring system 516 and/or caregiver(s) 520. For example, an audible message may be played in the room where patient 502 is being monitored, possibly asking the visitor: “Please show your identification.”
Shown as step 514 in
Central video monitoring system 516 may be alerted if no response is received at step 514, or if the response is unintelligible or indicates that the unauthorized visitor does not intend to comply. Alternately, or additionally, central video monitoring system 516 may be alerted with or even before patient 502, so that central video monitoring system 516 can determine whether the unauthorized visitor detected is, in fact, problematic. On receiving an alert, the central video monitoring system 516, or an attendant there, may view live image, video, and/or audio feed from the 3D motion sensor 504, and evaluate whether the unauthorized visitor presents a danger to the patient and/or himself. If patient 502 has been alerted by the central communication system 512, central video monitoring system 516 or an attendant there can use the data from 3D motion sensor 504 to evaluate whether a response from patient 502 indicates that the unauthorized visitor is complying with identification requirements. Central video monitoring system 516 and/or computerized patient monitoring system 506 may analyze the response from patient 502 and/or the unauthorized visitor, however, if the response does not include words or gestures recognizable by the computerized system, an attendant at central video monitoring system 516 may be able to interpret the person's response. If needed, the central video monitoring system 516 and/or the attendant could then approve alert(s) to appropriate caregiver(s) 520 and/or call for emergency assistance (e.g., send a request for security).
One or more caregiver(s) 520 local to patient 502 can be alerted with or even before patient 502 and/or central video monitoring system 516, so that the caregiver(s) 520 can assess what is happening in person. Or, monitored patient 502, caregiver(s) 520, and the central video monitoring system 516 could all be alerted at the same time. The priority and timing of alerts to different individuals or stations can be configured in accordance with the needs and desires of a particular facility, experience with a particular monitored individual or type of patient, or any other criterion of the system owner or user. This is true for initial alerts as well as continuing alerts (e.g., if an unauthorized visitor is detected, and no response is received or observed) or repeated alerts (two or more distinct events where an unauthorized visitor is detected). The priority and timing of alerts to different individuals may be different for initial, continuing, and/or repeated alerts.
Data associated with alerts may be logged by computerized patient monitoring system 506 and/or central video monitoring system 516 in a database 518. Data associated with an alert may include, without limitation, the telemetry data from 3D motion sensor 504 that triggered the alert; buffered data preceding the telemetry data that triggered the alert; telemetry data subsequent to the alert; the number and substantive content of an alert; the individual(s) and/or groups to whom an alert was addressed; the response, if any, received or observed following an alert; and combinations thereof. In embodiments, the database 518 also stores information regarding authorized visitors and information (e.g., RFID transmitter identification).
As shown in
When the centralized monitoring system 606 receives an alert from any of the computerized monitoring and communication systems 604A, 604B, 604C, indicating that a monitored person 601A, 601B, 601C is in proximity to an unauthorized visitor, audio and/or alert information for that particular person and/or the unauthorized visitor may be displayed on the centralized monitoring alert display 612. An alert can be presented in a variety of formats. An alert may be a visual cue on screen at the centralized monitoring system 606, such as the specific camera view flashing or being highlighted in a color to draw attention to that display among others. An alert may be an audible sound (e.g., a voice or alarm type sound) at the centralized monitoring system 606, an audible sound at the computerized monitoring and communication system attached to the 3D motion sensor, a text message, an email, turning on a light, or even running a program on a computer. Should the central monitoring station 150 receive alerts from more than one of the computerized monitoring and communication systems 604A, 604B, 604C, indicating that a person 601A, 601B, 601C is in proximity to an unauthorized visitor, the centralized monitoring alert display 612 may display the video, audio, and/or alerting information from all such instances at the same time. If no alert is received by the centralized monitoring station 606, it may be that nothing is displayed on the centralized monitoring alert display 612. Preferably, all monitored individual rooms can be displayed and visible on the centralized monitoring primary display 608 whether alerting or not. When an alert is generated, attention can be drawn to the particular camera on centralized monitoring primary display 608 and/or a duplicative display of the alerting camera can be displayed on a second separate computer monitor, e.g., the centralized monitoring alert display 612.
An electronic record of any alerts received, any responses to the alert observed or received, and/or any actions taken by the centralized monitoring system 606 can be stored in a database 614.
Using facial recognition algorithms, the computerized patient monitoring system may identify key features of the face of the patient being monitored. Key features may include, without limitation, the orbit of the eye socket(s), eyebrow(s), eyebrow ridge(s), the nose, the bridge of the nose, the mouth, top of the head, hairline, chin, ears, cheekbones, etc. The features used may vary with the kind of technology (e.g., visible vs. infrared light) and/or the prominent or accessible features on the patient.
The computerized patient monitoring system may use facial tracking rather than facial recognition, facial recognition implying that the software attempts to identify a particular person (e.g., Jane Doe) based on facial features, as opposed to recognizing a particular facial feature (e.g., an eye) using facial tracking. If desired, facial recognition algorithms could also be used, e.g., to confirm that the system has “locked on” to the intended person being monitored, or to confirm the identity of the person.
The computerized patient monitoring system may identify soft-tissue reference points on the face of the monitored person. Exemplary soft-tissue reference points may generally outline the eyes and/or the mouth. Other exemplary soft-tissue reference points, which could be used with or in lieu of the eyes and/or mouth, include the jowls, flesh along the cheekbone, the neck, and the portion of the neck immediately under the chin. The eyes and/or mouth may be preferred as they are easily identified by facial tracking algorithms and tend to be readily visible even if the person being monitored is wearing a blanket or high-necked clothing.
If patient identification zone 1000 is configured by a user, the user may operate an input device to select a point on an image or video from the computerized patient monitoring station. The user may draw a perimeter defining a zone freehand, or may drag the input device (such as an electronic stylus or mouse pointer) from one point to another to define a diagonal axis for the perimeter of the zone. Other configuration options, including drag-and-drop templates and coordinate identification, could be used. A 2D monitoring zone can be operated as a perimeter, or a third dimension of depth can be specified. As with the perimeter, the computerized patient monitoring system can define or recommend a depth measurement, such as shown by label 1100 in
On setting a depth parameter, and while still in a configuration view, the depth of the patient identification zone may be visible as a label 1300, as shown in
Although patient identification zone may be configured and operational, the zone parameters, depicted in
If the Device menu 1400 in
As shown in
On selection of an event 1622 in
As shown in
As shown in
The various computerized systems and processors as described herein may include, individually or collectively, and without limitation, a processing unit, internal system memory, and a suitable system bus for coupling various system components, including database 118, with a control server. Computerized patient monitoring system 106 and/or central video monitoring system 116 may provide control server structure and/or function. The system bus may be any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, and a local bus, using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
The computerized systems typically include therein, or have access to, a variety of computer-readable media, for instance, database 118. Computer-readable media can be any available media that may be accessed by the computerized system, and includes volatile and nonvolatile media, as well as removable and non-removable media. By way of example, and not limitation, computer-readable media may include computer-storage media and communication media. Computer-readable storage media may include, without limitation, volatile and nonvolatile media, as well as removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data. In this regard, computer-storage media may include, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVDs) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage, or other magnetic storage device, or any other medium which can be used to store the desired information and which may be accessed by the control server. Computer-readable storage media excludes signals per se.
Communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and may include any information delivery media. As used herein, the term “modulated data signal” refers to a signal that has one or more of its attributes set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared, and other wireless media. Combinations of any of the above also may be included within the scope of computer-readable media. The computer-readable storage media discussed above, including database 118, provide storage of computer readable instructions, data structures, program modules, and other data for the computerized systems. Computer readable instructions embodied on computer-readable storage media may be accessible by unauthorized visitor system 100 and/or component(s) thereof, and, when executed by a computer processor and/or server, may cause the system to function and/or perform the methods described herein.
The computerized systems may operate in a computer network using logical connections to one or more remote computers. Remote computers may be located at a variety of locations, for example, but not limited to, hospitals and other inpatient settings, veterinary environments, ambulatory settings, medical billing and financial offices, hospital administration settings, home health care environments, payer offices (e.g., insurance companies), home health care agencies, clinicians' offices and the clinician's home or the patient's own home or over the Internet. Clinicians may include, but are not limited to, a treating physician or physicians, specialists such as surgeons, radiologists, cardiologists, and oncologists, emergency medical technicians, physicians' assistants, nurse practitioners, nurses, nurses' aides, pharmacists, dieticians, microbiologists, laboratory experts, laboratory technologists, genetic counselors, researchers, veterinarians, students, and the like. The remote computers may also be physically located in non-traditional medical care environments so that the entire health care community may be capable of integration on the network. The remote computers may be personal computers, servers, routers, network PCs, peer devices, other common network nodes, or the like, and may include some or all of the elements described above in relation to the control server. The devices can be personal digital assistants or other like devices.
Exemplary computer networks may include, without limitation, local area networks (LANs) and/or wide area networks (WANs). Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet. When utilized in a WAN networking environment, the control server may include a modem or other means for establishing communications over the WAN, such as the Internet. In a networked environment, program modules or portions thereof may be stored in the control server, in the database 118, or on any of the remote computers. For example, and not by way of limitation, various application programs may reside on the memory associated with any one or more of the remote computers. It will be appreciated by those of ordinary skill in the art that the network connections shown are exemplary and other means of establishing a communications link between the computers may be utilized.
In operation, a user may enter commands and information into the computerized system(s) using input devices, such as a keyboard, a pointing device (commonly referred to as a mouse), a trackball, a touch pad, a 3D Gesture recognition camera or motion sensor. Other input devices may include, without limitation, microphones, satellite dishes, scanners, or the like. In addition to or in lieu of a monitor, the computerized systems may include other peripheral output devices, such as speakers and a printer.
Many other internal components of the computerized system hardware are not shown because such components and their interconnection are well known. Accordingly, additional details concerning the internal construction of the computers that make up the computerized systems are not further disclosed herein.
Methods and systems of embodiments of the present disclosure may be implemented in a WINDOWS or LINUX operating system, operating in conjunction with an Internet-based delivery system, however, one of ordinary skill in the art will recognize that the described methods and systems can be implemented in any operating system suitable for supporting the disclosed processing and communications. As contemplated by the language above, the methods and systems of embodiments of the present invention may also be implemented on a stand-alone desktop, personal computer, cellular phone, smart phone, tablet computer, PDA, or any other computing device used in a healthcare environment or any of a number of other locations.
From the foregoing, it will be seen that this disclosure is well adapted to attain all the ends and objects hereinabove set forth together with other advantages which are obvious and which are inherent to the structure.
It will be understood that certain features and subcombinations are of utility and may be employed without reference to other features and subcombinations. This is contemplated by and is within the scope of the claims.
Since many possible embodiments may be made of the invention without departing from the scope thereof, it is to be understood that all matter herein set forth or shown in the accompanying drawings is to be interpreted as illustrative and not in a limiting sense.
This application is a continuation of and claims priority to co-pending U.S. patent application Ser. No. 16/454,508, filed Jun. 27, 2019, which is a continuation of and claims priority to U.S. Pat. No. 10,410,042, issued Sep. 10, 2019, which is a continuation of and claims priority to U.S. Pat. No. 10,210,378 issued Feb. 19, 2019, which is a continuation of and claims priority to U.S. Pat. No. 9,892,311 issued Feb. 13, 2018, which claims priority to U.S. Provisional Application Ser. No. 62/273,735 filed Dec. 31, 2015, each of which are herein incorporated by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
4669263 | Sugiyama | Jun 1987 | A |
4857716 | Gombrich et al. | Aug 1989 | A |
5031228 | Lu | Jul 1991 | A |
5276432 | Travis | Jan 1994 | A |
5448221 | Weller | Sep 1995 | A |
5482050 | Smokoff et al. | Jan 1996 | A |
5592153 | Welling et al. | Jan 1997 | A |
5798798 | Rector et al. | Aug 1998 | A |
5838223 | Gallant et al. | Nov 1998 | A |
5915379 | Wallace et al. | Jun 1999 | A |
5942986 | Shabot et al. | Aug 1999 | A |
6050940 | Braun et al. | Apr 2000 | A |
6095984 | Amano et al. | Aug 2000 | A |
6160478 | Jacobsen | Dec 2000 | A |
6174283 | Nevo et al. | Jan 2001 | B1 |
6188407 | Smith et al. | Feb 2001 | B1 |
6269812 | Wallace et al. | Aug 2001 | B1 |
6287452 | Allen et al. | Sep 2001 | B1 |
6322502 | Schoenberg et al. | Nov 2001 | B1 |
6369838 | Wallace et al. | Apr 2002 | B1 |
6429869 | Kamakura et al. | Aug 2002 | B1 |
6614349 | Proctor et al. | Sep 2003 | B1 |
6727818 | Wildman et al. | Apr 2004 | B1 |
6804656 | Rosenfeld et al. | Oct 2004 | B1 |
7015816 | Wildman et al. | Mar 2006 | B2 |
7122005 | Shusterman | Oct 2006 | B2 |
7154397 | Zerhusen et al. | Dec 2006 | B2 |
7237287 | Weismiller et al. | Jul 2007 | B2 |
7323991 | Eckert et al. | Jan 2008 | B1 |
7408470 | Wildman et al. | Aug 2008 | B2 |
7420472 | Tran | Sep 2008 | B2 |
7430608 | Noonan et al. | Sep 2008 | B2 |
7502498 | Wen et al. | Mar 2009 | B2 |
7612679 | Fackler et al. | Nov 2009 | B1 |
7669263 | Menkedick et al. | Mar 2010 | B2 |
7715387 | Schuman | May 2010 | B2 |
7724147 | Brown | May 2010 | B2 |
7756723 | Rosow et al. | Jul 2010 | B2 |
7890349 | Cole et al. | Feb 2011 | B2 |
7893842 | Deutsch | Feb 2011 | B2 |
7895055 | Schneider et al. | Feb 2011 | B2 |
7908153 | Scherpbier et al. | Mar 2011 | B2 |
7945457 | Zaleski | May 2011 | B2 |
7962544 | Torok et al. | Jun 2011 | B2 |
7972140 | Renaud | Jul 2011 | B2 |
8108036 | Tran | Jan 2012 | B2 |
8123685 | Brauers et al. | Feb 2012 | B2 |
8128596 | Carter | Mar 2012 | B2 |
8190447 | Hungerford et al. | May 2012 | B2 |
8224108 | Steinberg et al. | Jul 2012 | B2 |
8237558 | Seyed Momen et al. | Aug 2012 | B2 |
8273018 | Fackler et al. | Sep 2012 | B1 |
8432263 | Kunz | Apr 2013 | B2 |
8451314 | Cline et al. | May 2013 | B1 |
8529448 | McNair | Sep 2013 | B2 |
8565500 | Neff | Oct 2013 | B2 |
8620682 | Bechtel et al. | Dec 2013 | B2 |
8655680 | Bechtel et al. | Feb 2014 | B2 |
8700423 | Eaton, Jr. et al. | Apr 2014 | B2 |
8727981 | Bechtel et al. | May 2014 | B2 |
8769153 | Dziubinski | Jul 2014 | B2 |
8890937 | Skubic et al. | Nov 2014 | B2 |
8902068 | Bechtel et al. | Dec 2014 | B2 |
8917186 | Grant | Dec 2014 | B1 |
8953886 | King et al. | Feb 2015 | B2 |
9072929 | Rush et al. | Jul 2015 | B1 |
9129506 | Kusens | Sep 2015 | B1 |
9147334 | Long et al. | Sep 2015 | B2 |
9159215 | Kusens | Oct 2015 | B1 |
9269012 | Fotland | Feb 2016 | B2 |
9292089 | Sadek | Mar 2016 | B1 |
9305191 | Long et al. | Apr 2016 | B2 |
9367270 | Robertson | Jun 2016 | B1 |
9408561 | Stone et al. | Aug 2016 | B2 |
9489820 | Kusens | Nov 2016 | B1 |
9519969 | Kusens | Dec 2016 | B1 |
9524443 | Kusens | Dec 2016 | B1 |
9536310 | Kusens | Jan 2017 | B1 |
9538158 | Rush et al. | Jan 2017 | B1 |
9563955 | Kamarshi et al. | Feb 2017 | B1 |
9597016 | Stone et al. | Mar 2017 | B2 |
9729833 | Kusens | Aug 2017 | B1 |
9741227 | Kusens | Aug 2017 | B1 |
9892310 | Kusens et al. | Feb 2018 | B2 |
9892311 | Kusens et al. | Feb 2018 | B2 |
9892611 | Kusens | Feb 2018 | B1 |
9905113 | Kusens | Feb 2018 | B2 |
9934427 | Derenne et al. | Apr 2018 | B2 |
10078956 | Kusens | Sep 2018 | B1 |
10090068 | Kusens et al. | Oct 2018 | B2 |
10091463 | Kusens | Oct 2018 | B1 |
10096223 | Kusens | Oct 2018 | B1 |
10210378 | Kusens et al. | Feb 2019 | B2 |
10225522 | Kusens | Mar 2019 | B1 |
10342478 | Kusens | Jul 2019 | B2 |
10524722 | Kusens et al. | Jan 2020 | B2 |
10643446 | Kusens et al. | May 2020 | B2 |
10878220 | Kusens | Dec 2020 | B2 |
10922946 | Kusens et al. | Feb 2021 | B2 |
20020015034 | Malmborg | Feb 2002 | A1 |
20020038073 | August | Mar 2002 | A1 |
20020077863 | Rutledge et al. | Jun 2002 | A1 |
20020101349 | Rojas, Jr. | Aug 2002 | A1 |
20020115905 | August | Aug 2002 | A1 |
20020183976 | Pearce | Dec 2002 | A1 |
20030037786 | Biondi et al. | Feb 2003 | A1 |
20030070177 | Kondo et al. | Apr 2003 | A1 |
20030092974 | Santoso et al. | May 2003 | A1 |
20030095147 | Daw | May 2003 | A1 |
20030135390 | O'Brien et al. | Jul 2003 | A1 |
20030140928 | Bui et al. | Jul 2003 | A1 |
20030227386 | Pulkkinen et al. | Dec 2003 | A1 |
20040019900 | Knightbridge et al. | Jan 2004 | A1 |
20040052418 | DeLean | Mar 2004 | A1 |
20040054760 | Ewing et al. | Mar 2004 | A1 |
20040097227 | Siegel | May 2004 | A1 |
20040116804 | Mostafavi | Jun 2004 | A1 |
20040193449 | Wildman et al. | Sep 2004 | A1 |
20050038326 | Mathur | Feb 2005 | A1 |
20050182305 | Hendrich | Aug 2005 | A1 |
20050231341 | Shimizu | Oct 2005 | A1 |
20050249139 | Nesbit | Nov 2005 | A1 |
20060004606 | Wendl et al. | Jan 2006 | A1 |
20060047538 | Condurso et al. | Mar 2006 | A1 |
20060049936 | Collins et al. | Mar 2006 | A1 |
20060058587 | Heimbrock et al. | Mar 2006 | A1 |
20060089541 | Braun et al. | Apr 2006 | A1 |
20060092043 | Lagassey | May 2006 | A1 |
20060107295 | Margis et al. | May 2006 | A1 |
20060145874 | Fredriksson et al. | Jul 2006 | A1 |
20060261974 | Albert et al. | Nov 2006 | A1 |
20070033072 | Bildirici | Feb 2007 | A1 |
20070083445 | Garcia et al. | Apr 2007 | A1 |
20070085690 | Tran | Apr 2007 | A1 |
20070118054 | Pinhas et al. | May 2007 | A1 |
20070120689 | Zerhusen et al. | May 2007 | A1 |
20070129983 | Scherpbier et al. | Jun 2007 | A1 |
20070136102 | Rodgers | Jun 2007 | A1 |
20070136218 | Bauer et al. | Jun 2007 | A1 |
20070159332 | Koblasz | Jul 2007 | A1 |
20070279219 | Warriner | Dec 2007 | A1 |
20070296600 | Dixon et al. | Dec 2007 | A1 |
20080001735 | Tran | Jan 2008 | A1 |
20080001763 | Raja et al. | Jan 2008 | A1 |
20080002860 | Super et al. | Jan 2008 | A1 |
20080004904 | Tran | Jan 2008 | A1 |
20080009686 | Hendrich | Jan 2008 | A1 |
20080015903 | Rodgers | Jan 2008 | A1 |
20080021731 | Rodgers | Jan 2008 | A1 |
20080071210 | Moubayed et al. | Mar 2008 | A1 |
20080087719 | Sahud | Apr 2008 | A1 |
20080106374 | Sharbaugh | May 2008 | A1 |
20080126132 | Warner et al. | May 2008 | A1 |
20080228045 | Gao et al. | Sep 2008 | A1 |
20080249376 | Zaleski | Oct 2008 | A1 |
20080267447 | Kelusky et al. | Oct 2008 | A1 |
20080277486 | Seem et al. | Nov 2008 | A1 |
20080281638 | Weatherly et al. | Nov 2008 | A1 |
20090082829 | Panken et al. | Mar 2009 | A1 |
20090091458 | Deutsch | Apr 2009 | A1 |
20090099480 | Salgo et al. | Apr 2009 | A1 |
20090112630 | Collins et al. | Apr 2009 | A1 |
20090119843 | Rodgers et al. | May 2009 | A1 |
20090177327 | Turner et al. | Jul 2009 | A1 |
20090224924 | Thorp | Sep 2009 | A1 |
20090278934 | Ecker et al. | Nov 2009 | A1 |
20090322513 | Hwang et al. | Dec 2009 | A1 |
20090326340 | Wang et al. | Dec 2009 | A1 |
20100117836 | Seyed Momen et al. | May 2010 | A1 |
20100169114 | Henderson et al. | Jul 2010 | A1 |
20100169120 | Herbst et al. | Jul 2010 | A1 |
20100172567 | Prokoski | Jul 2010 | A1 |
20100176952 | Bajcsy et al. | Jul 2010 | A1 |
20100188228 | Hyland | Jul 2010 | A1 |
20100205771 | Pietryga et al. | Aug 2010 | A1 |
20100245577 | Yamamoto et al. | Sep 2010 | A1 |
20100285771 | Peabody | Nov 2010 | A1 |
20100305466 | Corn | Dec 2010 | A1 |
20110018709 | Kornbluh | Jan 2011 | A1 |
20110022981 | Mahajan et al. | Jan 2011 | A1 |
20110025493 | Papadopoulos et al. | Feb 2011 | A1 |
20110025499 | Hoy et al. | Feb 2011 | A1 |
20110035057 | Receveur et al. | Feb 2011 | A1 |
20110035466 | Panigrahi | Feb 2011 | A1 |
20110054936 | Cowan et al. | Mar 2011 | A1 |
20110068930 | Wildman et al. | Mar 2011 | A1 |
20110077965 | Nolte et al. | Mar 2011 | A1 |
20110087079 | Aarts | Apr 2011 | A1 |
20110087125 | Causevic | Apr 2011 | A1 |
20110102133 | Shaffer | May 2011 | A1 |
20110102181 | Metz et al. | May 2011 | A1 |
20110106560 | Eaton et al. | May 2011 | A1 |
20110106561 | Eaton et al. | May 2011 | A1 |
20110175809 | Markovic et al. | Jul 2011 | A1 |
20110190593 | McNair | Aug 2011 | A1 |
20110227740 | Wohltjen | Sep 2011 | A1 |
20110245707 | Castle et al. | Oct 2011 | A1 |
20110254682 | Sigrist Christensen | Oct 2011 | A1 |
20110288811 | Greene | Nov 2011 | A1 |
20110295621 | Farooq et al. | Dec 2011 | A1 |
20110301440 | Riley et al. | Dec 2011 | A1 |
20110313325 | Cuddihy | Dec 2011 | A1 |
20120016295 | Tsoukalis | Jan 2012 | A1 |
20120025991 | O'Keefe et al. | Feb 2012 | A1 |
20120026308 | Johnson et al. | Feb 2012 | A1 |
20120075464 | Derenne | Mar 2012 | A1 |
20120092162 | Rosenberg | Apr 2012 | A1 |
20120098918 | Murphy | Apr 2012 | A1 |
20120140068 | Monroe et al. | Jun 2012 | A1 |
20120154582 | Johnson | Jun 2012 | A1 |
20120212582 | Deutsch | Aug 2012 | A1 |
20120259650 | Mallon et al. | Oct 2012 | A1 |
20120314901 | Hanson et al. | Dec 2012 | A1 |
20120323090 | Bechtel et al. | Dec 2012 | A1 |
20120323591 | Bechtel et al. | Dec 2012 | A1 |
20120323592 | Bechtel et al. | Dec 2012 | A1 |
20130027199 | Bonner | Jan 2013 | A1 |
20130028570 | Suematsu et al. | Jan 2013 | A1 |
20130120120 | Long | May 2013 | A1 |
20130122807 | Tenarvitz et al. | May 2013 | A1 |
20130127620 | Siebers et al. | May 2013 | A1 |
20130184592 | Venetianer | Jul 2013 | A1 |
20130265482 | Funamoto | Oct 2013 | A1 |
20130309128 | Voegeli et al. | Nov 2013 | A1 |
20130332184 | Burnham et al. | Dec 2013 | A1 |
20140039351 | Mix et al. | Feb 2014 | A1 |
20140070950 | Snodgrass | Mar 2014 | A1 |
20140081654 | Bechtel et al. | Mar 2014 | A1 |
20140085501 | Tran | Mar 2014 | A1 |
20140086450 | Huang et al. | Mar 2014 | A1 |
20140108041 | Bechtel et al. | Apr 2014 | A1 |
20140155755 | Pinter et al. | Jun 2014 | A1 |
20140168397 | Greco et al. | Jun 2014 | A1 |
20140191861 | Scherrer | Jul 2014 | A1 |
20140191946 | Cho et al. | Jul 2014 | A1 |
20140213845 | Bechtel et al. | Jul 2014 | A1 |
20140267625 | Clark et al. | Sep 2014 | A1 |
20140267736 | Delean | Sep 2014 | A1 |
20140309789 | Ricci et al. | Oct 2014 | A1 |
20140327545 | Bolling et al. | Nov 2014 | A1 |
20140328512 | Gurwicz et al. | Nov 2014 | A1 |
20140333744 | Baym et al. | Nov 2014 | A1 |
20140333776 | Dedeoglu et al. | Nov 2014 | A1 |
20140354436 | Nix et al. | Dec 2014 | A1 |
20140365242 | Neff | Dec 2014 | A1 |
20150057635 | Bechtel et al. | Feb 2015 | A1 |
20150061891 | Oleson et al. | Mar 2015 | A1 |
20150109442 | Derenne et al. | Apr 2015 | A1 |
20150206415 | Wegelin et al. | Jul 2015 | A1 |
20150269318 | Neff | Sep 2015 | A1 |
20150278456 | Bermudez Rodriguez et al. | Oct 2015 | A1 |
20150294143 | Wells et al. | Oct 2015 | A1 |
20160022218 | Hayes et al. | Jan 2016 | A1 |
20160070869 | Portnoy | Mar 2016 | A1 |
20160093195 | Ophardt | Mar 2016 | A1 |
20160127641 | Gove | May 2016 | A1 |
20160180668 | Kusens et al. | Jun 2016 | A1 |
20160183864 | Kusens et al. | Jun 2016 | A1 |
20160217347 | Mineo | Jul 2016 | A1 |
20160253802 | Venetianer et al. | Sep 2016 | A1 |
20160267327 | Franz et al. | Sep 2016 | A1 |
20160285416 | Tiwari et al. | Sep 2016 | A1 |
20160314258 | Kusens | Oct 2016 | A1 |
20160324460 | Kusens | Nov 2016 | A1 |
20160360970 | Tzvieli et al. | Dec 2016 | A1 |
20170055917 | Stone et al. | Mar 2017 | A1 |
20170084158 | Kusens | Mar 2017 | A1 |
20170091562 | Kusens | Mar 2017 | A1 |
20170109991 | Kusens | Apr 2017 | A1 |
20170116473 | Sashida et al. | Apr 2017 | A1 |
20170143240 | Stone et al. | May 2017 | A1 |
20170163949 | Suzuki et al. | Jun 2017 | A1 |
20170193772 | Kusens et al. | Jul 2017 | A1 |
20170214902 | Braune | Jul 2017 | A1 |
20170289503 | Kusens | Oct 2017 | A1 |
20170337682 | Liao et al. | Nov 2017 | A1 |
20180018864 | Baker | Jan 2018 | A1 |
20180068545 | Kusens | Mar 2018 | A1 |
20180104409 | Bechtel et al. | Apr 2018 | A1 |
20180114053 | Kusens et al. | Apr 2018 | A1 |
20180116528 | Tzvieli et al. | May 2018 | A1 |
20180144605 | Kusens | May 2018 | A1 |
20180189946 | Kusens et al. | Jul 2018 | A1 |
20180190098 | Kusens | Jul 2018 | A1 |
20180357875 | Kusens | Dec 2018 | A1 |
20190006046 | Kusens et al. | Jan 2019 | A1 |
20190029528 | Tzvieli et al. | Jan 2019 | A1 |
20190043192 | Kusens et al. | Feb 2019 | A1 |
20190057592 | Kusens | Feb 2019 | A1 |
20190122028 | Kusens et al. | Apr 2019 | A1 |
20190205630 | Kusens | Jul 2019 | A1 |
20190206218 | Kusens et al. | Jul 2019 | A1 |
20190209022 | Sobol et al. | Jul 2019 | A1 |
20190228866 | Weffers-Albu et al. | Jul 2019 | A1 |
20190253668 | Kusens | Aug 2019 | A1 |
20190307405 | Terry et al. | Oct 2019 | A1 |
20190318149 | Kusens et al. | Oct 2019 | A1 |
20200050844 | Kusens | Feb 2020 | A1 |
20200226905 | Kusens et al. | Jul 2020 | A1 |
20210202052 | Bechtel et al. | Jul 2021 | A1 |
Number | Date | Country |
---|---|---|
19844918 | Apr 2000 | DE |
2007081629 | Jul 2007 | WO |
2009018422 | Feb 2009 | WO |
2012122002 | Sep 2012 | WO |
Entry |
---|
Pre-Interview First Office action received for U.S. Appl. No. 16/816,626, dated Dec. 22, 2020, 4 pages. |
Final Office Action received for U.S. Appl. No. 15/134,189, dated May 6, 2020, 31 pages. |
Preinterview First Office Action received for U.S. Appl. No. 16/181,897 dated May 11, 2020, 5 pages. |
Non-Final Office action received for U.S. Appl. No. 16/410,745, dated May 21, 2021, 21 pages. |
Conaire et al., “Fusion of Infrared and Visible Spectrum Video for Indoor Surveillance”, WIAMIS, Apr. 2005, 4 pages. |
Mooney, Tom, “Rhode Island ER First to Test Google Glass on Medical Conditions”, EMS1, Available online at: <https://www.ems1.com/ems-products/technology/articles/1860487-Rhode-Island-ER-first-to-test-Google-Glass-on-medical-conditions/>, Mar. 10, 2014, 3 pages. |
Raheja et al., “Human Facial Expression Detection From Detected in Captured Image Using Back Propagation Neural Network”, International Journal of Computer Science and Information Technology (IJCSIT), vol. 2, No. 1, Feb. 2010, 9 pages. |
“Virtual Patient Observation: Centralize Monitoring of High-Risk Patients with Video”, Cisco, Cisco Video Surveillance Manager, 2013, pp. 1-6. |
Notice of Allowance received for U.S. Appl. No. 16/181,897, dated Oct. 14, 2020, 9 pages. |
Preinterview First Office Action received for U.S. Appl. No. 16/832,790, dated Aug. 25, 2020, 5 pages. |
Non-Final Office Action received for U.S. Appl. No. 17/101,639, dated Sep. 13, 2021, 2021, 13 pages. |
Notice of Allowance received for U.S. Appl. No. 16/816,626, dated Sep. 30, 2021, 9 pages. |
Quan et al., “Facial Asymmetry Analysis Based on 3-D Dynamic Scans”, 2012 IEEE International Conference on Systems, Man, and Cybernetics; COEX, Seoul, Korea; DOI: 10.1109/ICSMC.2012.6378151, Oct. 14-17, 2012, pp. 2676-2681. |
Non-Final Office action received for U.S. Appl. No. 17/117,414, dated Jul. 27, 2021, 12 pages. |
Pre-interview First Office Action received for U.S. Appl. No. 16/731,274, dated Sep. 1, 2021, 12 pages. |
Notice of Allowance received for U.S. Appl. No. 16/654,502, dated Feb. 17, 2021, 9 pages. |
Notice of Allowance received for U.S. Appl. No. 16/410,745, dated Jan. 4, 2022, 10 pages. |
Number | Date | Country | |
---|---|---|---|
20200226353 A1 | Jul 2020 | US |
Number | Date | Country | |
---|---|---|---|
62273735 | Dec 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16454508 | Jun 2019 | US |
Child | 16830498 | US | |
Parent | 16216210 | Dec 2018 | US |
Child | 16454508 | US | |
Parent | 15848621 | Dec 2017 | US |
Child | 16216210 | US | |
Parent | 15395526 | Dec 2016 | US |
Child | 15848621 | US |