G06M1/27

Method and system for monitoring hand hygiene compliance

A system for monitoring hygiene compliance includes multiple location tags, each configured to broadcast a unique identification number, and at least one event tag including a unique event identification tag and configured to detect an occurrence of a compliance event. The system further includes a mobile device being carried by a person that is configured to: receive the broadcast unique identification numbers from the location tags; determine a location based upon the received identification numbers; analyze the determined location against a location index to determine a compliance requirement; determine whether the person should complete a compliance event; if the person has completed a compliance event, receive the broadcast unique event identification tag and record the occurrence of the compliance event; if the person has not completed a compliance event, record a missed compliance event; and determine compliance information based upon the recorded compliance events and the recorded missed compliance events.

Method and system for monitoring hand hygiene compliance

A system for monitoring hygiene compliance includes multiple location tags, each configured to broadcast a unique identification number, and at least one event tag including a unique event identification tag and configured to detect an occurrence of a compliance event. The system further includes a mobile device being carried by a person that is configured to: receive the broadcast unique identification numbers from the location tags; determine a location based upon the received identification numbers; analyze the determined location against a location index to determine a compliance requirement; determine whether the person should complete a compliance event; if the person has completed a compliance event, receive the broadcast unique event identification tag and record the occurrence of the compliance event; if the person has not completed a compliance event, record a missed compliance event; and determine compliance information based upon the recorded compliance events and the recorded missed compliance events.

LOCATING APPARATUS FOR A MACHINE TOOL

Locating apparatus for machine tool including supporting portion for placing at fixed point on object's machining surface, detector including cable to connect apparatus with machine, and locating portion to release or receive cable to measure distance between machine and apparatus and including frame, first device, second device and third device. First device attached to the frame and for receiving or releasing cable in opposition to or pushed by elastic element. Second device attached to frame and includes transmission member to allow the cable passage. Third device attached to frame and allows cable release or reception by apparatus towards machine. First device includes discoidal element rotating around axis of rotation respective to frame to wind or release cable on winding surface. Second device includes guiding slider for conveying cable along conveying direction and moving along translation direction parallel to axis of rotation in proportion to discoidal element rotation.

LOCATING APPARATUS FOR A MACHINE TOOL

Locating apparatus for machine tool including supporting portion for placing at fixed point on object's machining surface, detector including cable to connect apparatus with machine, and locating portion to release or receive cable to measure distance between machine and apparatus and including frame, first device, second device and third device. First device attached to the frame and for receiving or releasing cable in opposition to or pushed by elastic element. Second device attached to frame and includes transmission member to allow the cable passage. Third device attached to frame and allows cable release or reception by apparatus towards machine. First device includes discoidal element rotating around axis of rotation respective to frame to wind or release cable on winding surface. Second device includes guiding slider for conveying cable along conveying direction and moving along translation direction parallel to axis of rotation in proportion to discoidal element rotation.

WEARABLE ELECTRONIC DEVICE AND ASSEMBLING METHOD THEREOF
20210022461 · 2021-01-28 · ·

A wearable electronic device includes a plurality of secondary spheres and a main sphere connected in series. The main sphere includes a lower cover, an upper cover, a threading pillar, a chip, and a wireless transmitting component. The lower cover has a first assembling space. The upper cover is disposed on the lower cover and covers the first assembling space. The upper cover has a second assembling space communicated with the first assembling space. The threading pillar is clamped between the lower cover and the upper cover and is located in the first assembling space and the second assembling space. Both of the chip and the wireless transmitting component are disposed in the first assembling space, and the wireless transmitting component is electrically connected to the chip. An assembling method of a wearable electronic device is also provided.

WEARABLE ELECTRONIC DEVICE AND ASSEMBLING METHOD THEREOF
20210022461 · 2021-01-28 · ·

A wearable electronic device includes a plurality of secondary spheres and a main sphere connected in series. The main sphere includes a lower cover, an upper cover, a threading pillar, a chip, and a wireless transmitting component. The lower cover has a first assembling space. The upper cover is disposed on the lower cover and covers the first assembling space. The upper cover has a second assembling space communicated with the first assembling space. The threading pillar is clamped between the lower cover and the upper cover and is located in the first assembling space and the second assembling space. Both of the chip and the wireless transmitting component are disposed in the first assembling space, and the wireless transmitting component is electrically connected to the chip. An assembling method of a wearable electronic device is also provided.

Threshold-value detection device

A device has a latching mechanism including a catch element having at least two catches, and a pawl configured to engage in a catch interstice between two catches. The catch element is movable in relation to the pawl in a freewheeling direction, and a movement of the catch element in relation to the pawl in a blocking direction may be blocked by means of the pawl. The device further includes a deflectable actuator configured to move the catch element and the pawl relative to each other on a catch-by-catch basis in the freewheeling direction by means of deflection. According to the invention, the device also includes an electric component configured to change its electric property as a function of the catch-wise movement of the catch element in relation to the pawl.

Threshold-value detection device

A device has a latching mechanism including a catch element having at least two catches, and a pawl configured to engage in a catch interstice between two catches. The catch element is movable in relation to the pawl in a freewheeling direction, and a movement of the catch element in relation to the pawl in a blocking direction may be blocked by means of the pawl. The device further includes a deflectable actuator configured to move the catch element and the pawl relative to each other on a catch-by-catch basis in the freewheeling direction by means of deflection. According to the invention, the device also includes an electric component configured to change its electric property as a function of the catch-wise movement of the catch element in relation to the pawl.

METHOD AND DEVICE FOR DETECTING UNAUTHORIZED TRANFER BETWEEN PERSONS
20200410316 · 2020-12-31 ·

A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.

METHOD AND DEVICE FOR DETECTING UNAUTHORIZED TRANFER BETWEEN PERSONS
20200410316 · 2020-12-31 ·

A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.