Patent application number | Description | Published |
20080255421 | Articulating tool with improved tension member system - The invention provides surgical or diagnostic tools and associated methods that offer improved user control for operating remotely within regions of the body, and improved methods of assembling the tools. In some embodiments these tools include a proximally-located actuator for the operation of a distal end effector, as well as proximally-located actuators for articulational and rotational movements of the end effector. Control mechanisms and methods refine operator control of end effector actuation and of these articulational and rotational movements. The articulation mechanisms comprise pairs of links, one link distal and the other proximal, configured such that movement of a proximal link is transferred to the distal link by way of tension bearing members. Embodiments of the invention include a guide for such tension bearing members that facilitates assembly of the tool. Embodiments also include improved methods for attaching tension bearing members to the links. The inventions disclosed herein may also be used with articulating devices outside of the surgical and diagnostic fields. | 10-16-2008 |
20080255588 | Tool with multi-state ratcheted end effector - The invention provides surgical or diagnostic tools and associated methods that offer improved user control for operating remotely within regions of the body. These tools include a proximally-located actuator for the operation of a distal end effector, as well as proximally-located actuators for articulational and rotational movements of the end effector. Control mechanisms and methods refine operator control of end effector actuation and of these articulational and rotational movements. A multi-state ratchet for end effector actuation provides enablement-disablement options with tactile feedback. The tool may also include other features. A force limiter mechanism protects the end effector and manipulated objects from the harm of potentially excessive force applied by the operator. An articulation lock allows the fixing and releasing of both neutral and articulated configurations of the tool and of consequent placement of the end effector. A rotation lock provides for enablement and disablement of rotatability of the end effector. | 10-16-2008 |
20080255608 | Tool with end effector force limiter - The invention provides surgical or diagnostic tools and associated methods that offer improved user control for operating remotely within regions of the body. In some embodiments these tools include a proximally-located actuator for the operation of a distal end effector, as well as proximally-located actuators for articulational and rotational movements of the end effector. Control mechanisms and methods refine operator control of end effector actuation and of these articulational and rotational movements. A force limiter mechanism protects the end effector and manipulated objects from the harm of potentially excessive force applied by the operator. The tool may also include other features. A multi-state ratchet for end effector actuation provides enablement-disablement options with tactile feedback. An articulation lock allows the fixing and releasing of both neutral and articulated configurations of the tool and of consequent placement of the end effector. A rotation lock provides for enablement and disablement of rotatability of the end effector. | 10-16-2008 |
20080262538 | ARTICULATING INSTRUMENT - The invention provides an articulating mechanism useful, for example, for remote manipulation of various surgical instruments and diagnostic tools within, or to, regions of the body. Movement of segments at the proximal end of the mechanism results in a corresponding, relative movement of segments at the distal end of the mechanism. The proximal and distal segments are connected by a set of cables in such a fashion that each proximal segment forms a discrete pair with a distal segment. This configuration allows each segment pair to move independently of one another and also permits the articulating mechanism to undergo complex movements and adopt complex configurations. The articulating mechanisms may also be combined in such a way to remotely mimic finger movements for manipulation of an object or body tissue. | 10-23-2008 |
20100234831 | ARTICULATING MECHANISM WITH FLEX-HINGED LINKS - The invention provides articulating mechanisms, and flexible members and flexible segments that can form such articulating mechanisms. The mechanisms are useful, for example, for remote steering, guidance and/or manipulation of various instruments and tools at a targeted location. The mechanisms, members or segments include links connected by flexible hinges. The proximal and distal ends of the mechanisms are connected by at least one set of cables in such a fashion that a proximal active flexible segment forms a discrete pair with a distal active flexible segment. Movement of active flexible segments at the proximal end of the mechanism results in a corresponding, relative movement of segments at the distal end of the mechanism. This configuration allows each flexible segment pair to move independently of one another and also permits the articulating mechanism to undergo complex movements and adopt complex configurations. | 09-16-2010 |
20110087071 | ARTICULATION SHEATH FOR FLEXIBLE INSTRUMENTS - A sheath useful for remote steering, guidance and/or manipulation of a flexible instrument, including e.g. an endoscope, received through the sheath. | 04-14-2011 |
20120095451 | TOOL WITH ARTICULATION LOCK - The invention provides surgical or diagnostic tools and associated methods that offer user control for operating remotely within regions of the body. These tools include a proximally-located actuator for the operation of a distal end effector, as well as proximally-located actuators for articulational and rotational movements of the end effector. Control mechanisms and methods refine operator control of end effector actuation and of these articulational and rotational movements. An articulation lock allows the fixing and releasing of both neutral and articulated configurations of the tool and of consequent placement of the end effector. The tool may also include other features. A multi-state ratchet for end effector actuation provides enablement-disablement options with tactile feedback. A force limiter mechanism protects the end effector and manipulated objects from the harm of potentially excessive force applied by the operator. A rotation lock provides for enablement and disablement of rotatability of the end effector. | 04-19-2012 |
20120323070 | Instrument Systems and Methods of Use - A sheath useful for remote steering, guidance and/or manipulation of a flexible instrument, including e.g. an endoscope, received through the sheath. | 12-20-2012 |
20130218140 | TOOL WITH END EFFECTOR FORCE LIMITER - The invention provides surgical or diagnostic tools and associated methods that offer improved user control for operating remotely within regions of the body. In some embodiments these tools include a proximally-located actuator for the operation of a distal end effector, as well as proximally-located actuators for articulational and rotational movements of the end effector. Control mechanisms and methods refine operator control of end effector actuation and of these articulational and rotational movements. A force limiter mechanism protects the end effector and manipulated objects from the harm of potentially excessive force applied by the operator. The tool may also include other features. A multi-state ratchet for end effector actuation provides enablement-disablement options with tactile feedback. An articulation lock allows the fixing and releasing of both neutral and articulated configurations of the tool and of consequent placement of the end effector. A rotation lock provides for enablement and disablement of rotatability of the end effector. | 08-22-2013 |
20140073910 | METHODS AND SYSTEMS FOR CONTROLLED DEPLOYMENT OF NEEDLE STRUCTURES IN TISSUE - A system for deploying needles in tissue includes a controller and a visual display. A treatment probe has both a needle and tines deployable from the needle which may be advanced into the tissue. The treatment probe also has adjustable stops which control the deployed positions of both the needle and the tines. The adjustable stops are coupled to the controller so that the virtual treatment and safety boundaries resulting from the treatment can be presented on the visual display prior to actual deployment of the system. | 03-13-2014 |
20140073911 | METHODS AND SYSTEMS FOR CONTROLLED DEPLOYMENT OF NEEDLE STRUCTURES IN TISSUE - A system for deploying needles in tissue includes a controller and a visual display. A treatment probe has both a needle and tines deployable from the needle which may be advanced into the tissue. The treatment probe also has adjustable stops which control the deployed positions of both the needle and the tines. The adjustable stops are coupled to the controller so that the virtual treatment and safety boundaries resulting from the treatment can be presented on the visual display prior to actual deployment of the system. | 03-13-2014 |
Patent application number | Description | Published |
20100151835 | MESSAGE FORWARDING AND RETRIEVAL WITH A SINGLE MESSAGING SERVICE - Embodiments described herein generally relate to a method and system of integrating a user's voice mail onto a single voice messaging service, e.g., a Unified Messaging (UM) service, such that a client may access this single source for voice mail retrieval, even where such voice mails are from a variety of sources, e.g., work, mobile phone, etc. A user, or the user's mobile operator, need only agree to accept the service, and the registration and configuration requirements for providing the service and forwarding calls to the service are automatically configured. The user's existing “speed dial” key or other setting for retrieving voice mail may also be automatically configured to the access number(s) for the service. Configurations may monitor the status of the service and update access and/or forwarding numbers. Voice mail forwarding and settings may also be automatically reverted back to the user's original service. | 06-17-2010 |
20130045719 | MESSAGE FORWARDING AND RETRIEVAL WITH A SINGLE MESSAGING SERVICE - Embodiments described herein generally relate to a method and system of integrating a user's voice mail onto a single voice messaging service, e.g., a Unified Messaging (UM) service, such that a client may access this single source for voice mail retrieval, even where such voice mails are from a variety of sources, e.g., work, mobile phone, etc. A user, or the user's mobile operator, need only agree to accept the service, and the registration and configuration requirements for providing the service and forwarding calls to the service are automatically configured. The user's existing “speed dial” key or other setting for retrieving voice mail may also be automatically configured to the access number(s) for the service. Configurations may monitor the status of the service and update access and/or forwarding numbers. Voice mail forwarding and settings may also be automatically reverted back to the user's original service. | 02-21-2013 |
20140364091 | MESSAGE FORWARDING AND RETRIEVAL WITH A SINGLE MESSAGING SERVICE - Embodiments described herein generally relate to a method and system of integrating a user's voice mail onto a single voice messaging service, e.g., a Unified Messaging (UM) service, such that a client may access this single source for voice mail retrieval, even where such voice mails are from a variety of sources, e.g., work, mobile phone, etc. A user, or the user's mobile operator, need only agree to accept the service, and the registration and configuration requirements for providing the service and forwarding calls to the service are automatically configured. The user's existing “speed dial” key or other setting for retrieving voice mail may also be automatically configured to the access number(s) for the service. Configurations may monitor the status of the service and update access and/or forwarding numbers. Voice mail forwarding and settings may also be automatically reverted back to the user's original service. | 12-11-2014 |
Patent application number | Description | Published |
20130026221 | IMAGE SELECTION METHOD USING MACHINE-READABLE CODES - A method of selecting digital images includes using a processor to store the digital images in an electronic storage and retrieval system, forming a corresponding machine-readable code for each stored digital image, the machine-readable code encoding a reference to the storage location of the corresponding digital image in the electronic storage and retrieval system, providing a viewable image that includes a representative image of each digital image in the first collection of digital images in association with its associated machine-readable code, selecting one or more but not all of the digital images by receiving references or photographs of the machine-readable codes and extracting the references from the received photographs, and compiling the digital images corresponding to the received or extracted references into a second image collection. | 01-31-2013 |
20130026222 | INDEX PRINT WITH MACHINE-READABLE CODES - A viewable image for selecting one or more digital images from a collection of digital images includes a plurality of representative images representing corresponding digital images in the collection, each corresponding digital image stored in an electronic storage and retrieval system and a plurality of machine-readable codes, each machine-readable code associated with one of the representative images so that a viewer can readily identify a desired digital image and a corresponding machine-readable code in the viewable image, wherein each machine-readable code can be photographed to select its corresponding digital image, and wherein the machine-readable code encodes a reference to the corresponding digital image stored in the electronic storage and retrieval system. | 01-31-2013 |
20130026223 | SELECTING IMAGES USING MACHINE-READABLE CODES - A method of selecting images includes using a processor to transmit and store each digital image in a remote electronic storage and retrieval system, receiving a viewable image that includes a representative image of each digital image in association with a machine-readable code, each machine-readable code encoding a reference to the location of its corresponding digital image in the electronic storage and retrieval system, selecting one or more but not all of the digital images from the viewable image by photographing each of the machine-readable codes corresponding to desired digital images, and transmitting the photographs to an image-product production service or extracting the references from the photographs and transmitting the references to the image-product production service, the referenced digital images specifying a second image collection. | 01-31-2013 |
20130106576 | DETECTING RFID TAG AND INHIBITING SKIMMING | 05-02-2013 |
20130106577 | AUTHORIZING RFID READER AND INHIBITING SKIMMING | 05-02-2013 |
20130314534 | CONTAINER-CLASSIFICATION IDENTIFICATION USING DIRECTIONAL-ANTENNA RFID - A classification of a container is identified using a mobile station including an image capture device and an RFID reader having a reader antenna. The container has two RFID tags affixed thereto at respective, different locations. Each tag has a directional antenna steered in a different direction, so that a reader location is defined in the intersection of the antenna propagation patterns. Using the image capture device, one or more images of the container are captured. A controller determines, using the captured image data, whether the mobile station is in a candidate reader location. When the mobile station is in the candidate reader location, the RFID reader attempts to read both tags. If both tags are read while the mobile station is in the candidate reader location, the controller determines the classification of the container is a classification corresponding to the candidate reader location. | 11-28-2013 |
Patent application number | Description | Published |
20130314206 | VERIFYING IDENTIFICATION OF SEQUENTIALLY SUPPLIED FLUIDS - A method of verifying the identification of fluids to be supplied successively through a fluid-supply hose that selectively connects to successive movable, RFID-tagged fluid containers includes providing an RFID reading unit including an antenna. A sequence of reference container identification codes is received. A container-present indication indicating one of the containers is positioned so that its RFID tag is in the antenna range is received. In response, the RFID tag of that container is read using the RFID reading unit to determine an identification code of the container. A controller automatically verifies the determined container identification code against the first reference identification code in the sequence using a controller. The starting through verifying steps are repeated, using successive values from the sequence in the verifying step, until all values in the sequence have been verified against container identification codes read using the RFID reading unit. | 11-28-2013 |
20130314209 | IDENTIFYING FLUID SUPPLIED THROUGH HOSE - Apparatus for identifying fluid to be supplied through an RFID-tagged fluid-supply hose. The hose connects to one of several movable, RFID-tagged fluid containers. A fluid station includes a plurality of antenna mounts at fixed locations so that a respective plurality of fluid-container locations is defined. An RFID reading unit connects to antennas on the mounts. A controller reads the respective RFID tags of the hose and of the containers in the fluid-container locations using the RFID reading unit. It then determines which of the plurality of movable fluid containers is positioned in the fluid-container location corresponding to the antenna range in which the fluid-supply hose is positioned, so that the fluid in the determined fluid container is identified as the fluid to be supplied through the fluid-supply hose. | 11-28-2013 |
20130314211 | CONTAINER-TYPE IDENTIFICATION USING DIRECTIONAL-ANTENNA RFID - RFID tags are read using an RFID reader. A non-RFID-active object has two RFID tags affixed thereto at respective, different tag locations. Each tag has a respective directional antenna steered in a respective, different direction. Respective directional propagation patterns are thus defined and a reader location is defined in the intersection of the propagation patterns. An RFID reader with a reader antenna located at the reader location is provided. The RFID reader is activated to read both tags. | 11-28-2013 |
20130314212 | RFID MARKING OF UNITS IN A SPACE - Non-RFID-active units in a space are marked by affixing RFID tags. Two tags are affixed to each unit, each tag having a directional antenna. The antennas are oriented to define a per-unit reader location. Units are arranged in the space so the per-unit reader locations at least partially overlap to define a reader location. The units in the space can also be detected by an RFID reader located in the overlapping per-unit reader locations. A controller can compare a received list of tag identities corresponding to units expected to be in the container to the identities of the tags read to determine whether the expected units are in the container and disposed at positions and with orientations that cause the respective per-unit reader locations to at least partially overlap with the reader location. | 11-28-2013 |
20130314213 | IDENTIFYING FLUID SUPPLIED THROUGH HOSES - Apparatus for identifying fluid to be supplied through one of a plurality of RFID-tagged fluid-supply hoses that selectively connect to a movable, RFID-tagged fluid container includes a fluid station including an antenna mount at a fixed location so that a fluid-container location is defined. An RFID reading unit is connected to an antenna on the mount. A controller reads the RFID tag of the movable fluid container positioned in the fluid-container location using the RFID reading unit and reads the RFID tag(s) attached to one or more of the fluid-supply hoses whose respective tag(s) are positioned in the antenna range. The controller then determines which of the plurality of fluid-supply hoses is positioned in the antenna range, so that the fluid in the fluid container is identified as the fluid to be supplied through the determined fluid-supply hose. | 11-28-2013 |
20130314217 | VERIFYING IDENTIFICATION OF FLUID SUPPLIED THROUGH HOSE - A method of verifying the identification of fluid to be supplied through an RFID-tagged fluid-supply hose adapted to connect to a movable, RFID-tagged fluid container includes providing an RFID reading unit including an antenna, so that the respective RFID tags of the container and the hose are within a range of the antenna. The RFID tag of the container is read using the RFID reading unit to determine an identification code of the container. The RFID tag of the fluid-supply hose is read using the RFID reading unit to determine an identification code of the hose. A controller automatically verifies the determined identification code of the container against the determined identification code of the hose. | 11-28-2013 |
20130342317 | RFID SYSTEM WITH MULTIPLE TAG TRANSMIT FREQUENCIES - An RFID system has an active tag with one antenna inside, and one outside, an RF-blocking enclosure having a port with a selected shortest dimension. The RFID reader is located outside the enclosure and uses a selected RF read frequency range. The RFID tag simultaneously transmits on a plurality of frequencies corresponding to respective wavelengths smaller than the selected shortest dimension, so that a respective beat frequency is defined between two of the frequencies. The beat frequency is within the selected RF uplink frequency range. The tag transmits a first signal at a first one of the plurality of frequencies using the interior antenna and a second signal at a second, different one of the plurality of frequencies using the exterior antenna. | 12-26-2013 |
20130342318 | RFID SYSTEM WITH CONFIGURABLE RF PORT - An active RFID tag has an antenna inside RF-blocking enclosure having a port with a selected shortest dimension. An RFID reader located outside the enclosure at a reader position transmits a downlink RF signal through the port as a directional RF signal on a downlink carrier frequency corresponding to a downlink wavelength smaller than the selected shortest dimension. The port is selectively configured so that the directional downlink RF signal can pass through the port in an access mode during a selected access time interval and are attenuated by at least 60 dB in a restricted mode during a selected restricted time interval that does not overlap with the access time interval. | 12-26-2013 |
20130342319 | RFID SYSTEM WITH MULTIPLE READER TRANSMIT FREQUENCIES - An RFID system includes an RF-blocking enclosure having a port with a selected shortest dimension. An active RFID tag including a controller and an interior antenna coupled to the controller is located in the enclosure. The tag responds to a selected RF downlink frequency range. An RFID reader located outside the enclosure simultaneously transmits directional RF signals on a plurality of frequencies corresponding to respective wavelengths smaller than the selected shortest dimension, the plurality including a carrier frequency and an interference frequency. A beat frequency is thus defined between the carrier frequency and the interference frequency and the beat frequency is within the selected RF downlink frequency range, so that the transmitted signals pass through the port and the tag responds to the beat frequency. | 12-26-2013 |
20130342320 | READING RFID TAG USING ANTENNA WITHIN ENCLOSURE - A method of reading an RFID tag using an RFID reader includes providing an RF-blocking enclosure having a port. The RFID reader has an antenna located within the enclosure. The enclosure is positioned so that the port is adjacent to a conductive surface and the RFID tag is within the enclosure. The RFID reader is activated at a selected read power level to read the tag in the enclosure. | 12-26-2013 |
20130342321 | RFID READING SYSTEM USING RF GRATING - Apparatus for reading an RFID tag includes an RF-blocking enclosure having a port and adapted to receive through the port a non-RFID-active object having an RFID tag affixed thereto. An RFID reader has a reader antenna located outside the enclosure. The antenna transmits an RF downlink signal in a particular direction. An RF grating is arranged between the reader antenna and the port so that, after the enclosure receives the object having the tag, the port is located in the transmit direction from the reader antenna, and RF energy transmitted from the reader antenna has a selected linear polarization after passing through the grating. | 12-26-2013 |
20130342322 | RFID SYSTEM WITH ENCLOSURE AND INTERFERENCE PATTERN - An RFID system includes an RFID reader with a tag antenna located at a reader location. An RFID tag includes a controller and an antenna. An RF-blocking enclosure spaced apart from the RFID reader includes a port having first and second spaced-apart apertures. The enclosure is positioned with respect to the reader location to define a tag-antenna location at which an interference pattern of a downlink signal from the reader passing through the port provides a selected downlink power at the tag-antenna location, and an interference pattern of an uplink signal from the tag passing through the port provides a selected uplink power at the reader location. The tag antenna is located in the enclosure at the tag-antenna location. | 12-26-2013 |
20130342323 | RFID SYSTEM WITH BARRIERS AND KEY ANTENNAS - An RFID system includes a reader with antenna, a first barrier, a tag with a link antenna, a second barrier, and two key antennas connected to the tag, mechanically arranged in that order. The first barrier has two or more apertures in it to produce an interference pattern of a security signal from the reader. The security signal interference pattern passes at least partly through the second barrier. One of the key antennas is at a peak of the pattern after passing through the second barrier, and one is not. The tag includes a controller responsive to a downlink signal from the reader to transmit an uplink signal using the link antenna, but only if the downlink signal is preceded by the security signal and the security signal is received more strongly by the key antenna at the peak than by the other key antenna. | 12-26-2013 |