Patent application number | Description | Published |
20140114480 | Methods, Devices, and Systems for Non-Mechanically Restricting and/or Programming Movement of a Tool of a Manipulator Along a Single Axis - Methods, devices (such as computer readable media), and systems (such as computer systems) for performing movements of a tool of a medical robot along a single axis that are achieved by electronically limiting the medical robot's movement to produce movement of the tool along the single axis rather than mechanically restricting the medical robot's movement to produce the single axis movement. The tool's movement will be along the single axis even if a user is moving an input device linked to the medical robot in other axes during the single axis movement. In addition, techniques are disclosed for automating the single axis movement such that it can be programmed to stop at a target location and start at or near a second (e.g., starting) location, which is useful for a procedure such as a brain biopsy, breast biopsy or implantation, and such that a user can execute a command instructing the medical robot to perform the movement without the need for the user to manipulate an input device to cause real-time responsive movement of the medical robot. | 04-24-2014 |
20140142593 | Frame Mapping and Force Feedback Methods, Devices and Systems - Methods, devices, and systems for controlling movement of a slave manipulator by an operator controlling a master manipulator in a way that the motion of that slave manipulator can be presented via a display to the operator such that the displayed position of the slave manipulator is intuitive to the operator, regardless of the actual position and orientation of the slave manipulator. Methods, devices, and systems relating to force feedback associated with medical robotic procedures. | 05-22-2014 |
Patent application number | Description | Published |
20100174410 | METHODS, DEVICES, AND SYSTEMS FOR AUTMATED MOVEMENTS INVOLVING MEDICAL ROBOTS - Methods, devices (such as computer readable media), and systems (such as computer systems) for defining and executing automated movements using robotic arms (such as robotic arms configured for use in performing surgical procedures), so that a remotely-located surgeon is relieved from causing the robotic arm to perform the automated movement through movement of an input device such as a hand controller. | 07-08-2010 |
20100198402 | METHODS, DEVICES, AND SYSTEMS FOR NON-MECHANICALLY RESTRICTING AND/OR PROGRAMMING MOVEMENT OF A TOOL OF A MANIPULATOR ALONG A SINGLE AXIS - Methods, devices (such as computer readable media), and systems (such as computer systems) for performing movements of a tool of a medical robot along a single axis that are achieved by electronically limiting the medical robot's movement to produce movement of the tool along the single axis rather than mechanically restricting the medical robot's movement to produce the single axis movement. The tool's movement will be along the single axis even if a user is moving an input device linked to the medical robot in other axes during the single axis movement. In addition, techniques are disclosed for automating the single axis movement such that it can be programmed to stop at a target location and start at or near a second (e.g., starting) location, which is useful for a procedure such as a brain biopsy, breast biopsy or implantation, and such that a user can execute a command instructing the medical robot to perform the movement without the need for the user to manipulate an input device to cause real-time responsive movement of the medical robot. | 08-05-2010 |
20100245543 | MRI COMPATIBLE CAMERA THAT INCLUDES A LIGHT EMITTING DIODE FOR ILLUMINATING A SITE - Systems and methods of using MR-compatible cameras to view magnetic resonance imaging procedures. The MR-compatible camera systems may include a casing with at least two openings, including one oriented to permit a camera to view a site, and another opening oriented to permit a light source to illuminate a portion of the site. The camera systems may be used with either closed bore or open bore MRI systems. | 09-30-2010 |
20100296723 | Methods, Devices, and Systems Useful in Registration - Methods, devices, and systems for use in accomplishing registration of a patient to a robot to facilitate image guided surgical procedures, such as stereotactic procedures. | 11-25-2010 |
20110160745 | Frame Mapping and Force Feedback Methods, Devices and Systems - Methods, devices, and systems for controlling movement of a slave manipulator by an operator controlling a master manipulator in a way that the motion of that slave manipulator can be presented via a display to the operator such that the displayed position of the slave manipulator is intuitive to the operator, regardless of the actual position and orientation of the slave manipulator. Methods, devices, and systems relating to force feedback associated with medical robotic procedures. | 06-30-2011 |
20140155735 | Methods, Devices, And Systems Useful In Registration - Methods, devices, and systems for use in accomplishing registration of a patient to a robot to facilitate image guided surgical procedures, such as stereotactic procedures. | 06-05-2014 |
Patent application number | Description | Published |
20100299747 | IDENTITY VERIFICATION IN VIRTUAL WORLDS USING ENCODED DATA - An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential information in the form of a graphic image associated with the avatar. The embedded information is preferably encrypted. | 11-25-2010 |
20130002717 | POSITIONAL CONTEXT DETERMINATION WITH MULTI MARKER CONFIDENCE RANKING - An augmented reality (AR) system receives image data from a camera of mobile device. The image data includes images of objects in the field of view of and at least two markers. A repository contains position information for objects and markers that may potentially appear in an image. The AR system receives a confidence level for the markers in the image, and selects the marker with the highest confidence level. The transformation and position of the marker in the image data is used to determine the identity of objects in the field of view. Further, the AR system generates overlaid image data that can be incorporated into the image data and sent back to be displayed on the mobile device. The overlaid image data is positioned according to the position data for the object it is associated with, and the transformation and position data for the selected marker. | 01-03-2013 |
20130042302 | COGNITIVE PATTERN RECOGNITION FOR COMPUTER-BASED SECURITY ACCESS - Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request that includes a set of images and an instruction to identify a cognitive pattern in the set of images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed. | 02-14-2013 |
20130042303 | COGNITIVE PATTERN RECOGNITION FOR SECURITY ACCESS IN A FLOW OF TASKS - Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request. The administering includes randomly selecting a set of related images from a database of images, randomly selecting one image that is unrelated to the set of related images, displaying the set of related images along with the image that is unrelated to the set of related images, and prompting a user to identify the image that is unrelated to the set of related images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed. | 02-14-2013 |
20130169684 | POSITIONAL CONTEXT DETERMINATION WITH MULTI MARKER CONFIDENCE RANKING - A computer implemented method for augmenting a display image includes receiving image data, the image data including data representing one or more objects, and at least a first marker and a second marker. The method includes receiving a first confidence level for the first marker and a second confidence level for the second marker. The method includes determining a selected marker from the first marker and the second marker. The selected marker is determined according to a highest confidence level of the first confidence level and the second confidence level. The method includes determining a transformation and a positional offset for the selected marker. The method includes generating overlaid display data for the one or more objects in the image data, the one or more objects determined in accordance with the transformation and the positional offset. | 07-04-2013 |
20130311641 | TRAFFIC EVENT DATA SOURCE IDENTIFICATION, DATA COLLECTION AND DATA STORAGE - Traffic event data source identification embodiments comprise a first monitoring system that detects a traffic event, a communication device that broadcasts a discovery signal and receives back response signals from any second monitoring systems within the vicinity of the traffic event, and a memory that stores a list of responding second monitoring systems. Traffic event data collection embodiments incorporate the identification embodiments and additional features. In this case, the first monitoring system captures data recorded at the time of the traffic event and a second communication device transmits this data and, optionally, the list to a traffic event database in a traffic event data storage system. The first communication device also transmits a data capture request signal to the second monitoring system(s) requesting capture of any data recorded at the time of the traffic event and, optionally, requesting that such data be transmitted to the database. | 11-21-2013 |
20150295864 | PREFERRED NAME PRESENTATION IN ONLINE ENVIRONMENTS - The present invention allows an on-line user to specify the name by which that user is known when communicating with other target users, regardless of the name under which the sending user is currently logged-in. The invention also provides a mechanism to block messages from sending parties that are not willing to divulge their real identity. | 10-15-2015 |
20160094611 | MANAGING REQUESTS TO A HIGH UTILIZATION WEBSITE - In an approach to managing requests to a high utilization website, one or more computer processors receive a first resource usage load status from a first server computer. The one or more computer processors receive a request for content on the first server computer from a client. The one or more computer processors determine whether the first resource usage load is above a pre-defined threshold. Responsive to determining the first resource usage load is above the pre-defined threshold, the one or more computer processors create a queue of a plurality of content requesters, wherein the client is one of the plurality of content requesters. The one or more computer processors establish a bidirectional communication channel with the client. | 03-31-2016 |