US 12,154,684 B2
Information management system and method
Ophir Ronen, Seattle, WA (US); Justin Kearns, Lexington, KY (US); Keith Boudreau, Durham, NC (US); Christian Bauer, Frisco, TX (US); Michael Gruzynski, Seattle, WA (US); David Garner, Bothell, WA (US); and Thomas Dziedzic, Elmwood Park, IL (US)
Assigned to CALMWAVE, INC., Seattle, WA (US)
Filed by CalmWave, Inc., Seattle, WA (US)
Filed on Jul. 7, 2023, as Appl. No. 18/348,955.
Claims priority of provisional application 63/492,137, filed on Mar. 24, 2023.
Claims priority of provisional application 63/492,145, filed on Mar. 24, 2023.
Claims priority of provisional application 63/492,117, filed on Mar. 24, 2023.
Claims priority of provisional application 63/359,129, filed on Jul. 7, 2022.
Prior Publication US 2024/0013650 A1, Jan. 11, 2024
Int. Cl. G16H 40/40 (2018.01); A61B 5/00 (2006.01); G06F 11/30 (2006.01); G06F 11/32 (2006.01); G06Q 10/063 (2023.01); G06Q 10/105 (2023.01); G08B 7/06 (2006.01); G08B 29/02 (2006.01); G16H 10/60 (2018.01); G16H 15/00 (2018.01); G16H 40/20 (2018.01); G16H 40/63 (2018.01); G16H 40/67 (2018.01)
CPC G16H 40/40 (2018.01) [A61B 5/0002 (2013.01); A61B 5/7221 (2013.01); A61B 5/7267 (2013.01); A61B 5/746 (2013.01); G06F 11/3072 (2013.01); G06F 11/327 (2013.01); G06Q 10/063 (2013.01); G06Q 10/105 (2013.01); G08B 7/06 (2013.01); G08B 29/02 (2013.01); G16H 10/60 (2018.01); G16H 15/00 (2018.01); G16H 40/20 (2018.01); G16H 40/63 (2018.01); G16H 40/67 (2018.01)] 27 Claims
OG exemplary drawing
 
1. A computer-implemented method, executed on a computing device, comprising:
monitoring a bedside monitoring device to detect an occurrence of alarms, thus defining detected alarms;
processing the detected alarms to determine their authenticity, including:
defining volume information for the detected alarms, including comparing signal measures of the bedside monitoring device relative to one or more monitoring criteria over a first time span to signal measures of the bedside monitoring device relative to the one or more monitoring criteria over a second time span, the second time span being longer than the first time span, and
utilizing the volume information to determine the authenticity of the detected alarms; and
if a detected alarm is determined to be non-authentic, adjusting the one or more monitoring criteria that was instrumental in producing the non-authentic detected alarm.