[go: nahoru, domu]

US20190318294A1 - Process tracking and defect detection - Google Patents

Process tracking and defect detection Download PDF

Info

Publication number
US20190318294A1
US20190318294A1 US16/452,589 US201916452589A US2019318294A1 US 20190318294 A1 US20190318294 A1 US 20190318294A1 US 201916452589 A US201916452589 A US 201916452589A US 2019318294 A1 US2019318294 A1 US 2019318294A1
Authority
US
United States
Prior art keywords
batch
untimeliness
risk
process tracking
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/452,589
Inventor
Randall Riefel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maximus Inc
Original Assignee
Maximus Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maximus Inc filed Critical Maximus Inc
Priority to US16/452,589 priority Critical patent/US20190318294A1/en
Publication of US20190318294A1 publication Critical patent/US20190318294A1/en
Assigned to JPMORGAN CHASE BANK, N.A. reassignment JPMORGAN CHASE BANK, N.A. NOTICE OF GRANT OF SECURITY INTEREST IN UNITED STATES PATENTS Assignors: MAXIMUS, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063114Status monitoring or status determination for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/079Root cause analysis, i.e. error or fault diagnosis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Definitions

  • the present invention relates to the field of client services. More particularly, the present invention relates to tracking processes arising from client requests and information submissions.
  • Responding to a request for a particular service, product, or benefit may be a complex process that takes time and involve many steps and interactions (such as, for example, applying for a government benefit).
  • the amount of resources required (including computing, network, and/or staff) to handle the load may be difficult to predict and plan for.
  • defects may occur in processing that prevent or delay successful fulfillment of a request. For example, a request may become stalled or be lost from a processing queue.
  • identifying and correcting defects, redundancies, snags, and inefficiencies in computer-implemented processes may be difficult or impossible to do in timely manner.
  • a method of identifying defects in request processing operations includes generating, by a process tracking system implemented on one or more computer systems, a request-made set of information including information about requests that have been made to a system. Request processing operations in the system are monitored. Monitoring request processing operations includes generating an active-processing set of information in which the active-processing set of information includes information on requests then being processed. For at least one request made to the system, the active processing set of information is compared with the request-made set of information. Based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations are identified. At least one request associated with at least one of the identified defects is flagged.
  • a system includes one or more computer systems configured to implement a process tracking system.
  • the process tracking system is configured to: generate a request-made set of information including information about requests that have been made to a system; monitor request processing operations in the system; identify, based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations; and flag at least one request associated with at least one of the identified defects.
  • Monitoring request processing operations includes generating an active-processing set of information, wherein the active-processing set of information includes information on requests then being processed; and comparing, for at least one request made to the system, the active processing set of information with the request-made set of information.
  • a tangible, computer readable medium includes program instructions stored thereon that, when executed on one or more computers, cause the one or more computers to implement a process tracking system configured to: generate a request-made set of information including information about requests that have been made to a system; identify, based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations; and flag at least one request associated with at least one of the identified defects.
  • Monitoring request processing operations in the system includes generating an active-processing set of information, wherein the active-processing set of information includes information on requests then being processed; and comparing, for at least one request made to the system, the active processing set of information with the request-made set of information.
  • a method of managing information received by batch capture into a system includes setting one or more untimeliness risk thresholds.
  • the untimeliness thresholds include criteria for when a batch is at risk for being untimely.
  • One or more untimeliness risk events are defined. At least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds.
  • Inbound information received into a batch capture system by way of mail or facsimile transmission is monitored by the process tracking system.
  • one or more alerts to one or more persons by the process tracking system Inbound information received into a batch capture system by way of mail or facsimile transmission is monitored by the process tracking system.
  • one or more alerts to one or more persons by the process tracking system In response to detection of one or more of the untimeliness risk events.
  • a system includes one or more computer systems configured to implement a process tracking system.
  • the process tracking system is configured to: set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely; define one or more untimeliness risk events, wherein at least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds; monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and send, in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
  • a tangible, computer readable medium includes program instructions stored thereon that, when executed on one or more computers, cause the one or more computers to implement a contact management system configured to: set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely; define one or more untimeliness risk events, wherein at least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds; monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and send in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
  • a contact management system configured to: set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely; define one or more untimeliness risk events, wherein at least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness
  • FIG. 1 illustrates one embodiment of a process tracking and defect detection system for tracking a document submissions and enrollment.
  • FIG. 2 illustrates one embodiment of a dashboard panel display including a daily summary of mail/fax batch information.
  • FIG. 3 illustrates one embodiment of a dashboard panel display including a weekly summary of mail/fax batch information.
  • FIG. 4 illustrates one embodiment of a dashboard panel display including a summary of process cycle time and timeliness.
  • FIG. 5 illustrates one embodiment of a dashboard panel display of a staff productivity panel.
  • FIG. 6 illustrates one embodiment of a method of identifying defects in request processing operations.
  • FIG. 7 illustrates a method of managing information received by batch capture into a system.
  • a system monitors request processing operations and flags process defects (for example, a request that has become orphaned, stuck, or vanished from a processing queue.).
  • the system uses knowledge of how a business process is expected to behave to how it is actually behaving to detect exception instances. In some cases, the system performs detection of such exception instances in real-time or near real-time. The system can detect individual process instances behaving unexpectedly as well as patterns across instance sets.
  • the system maintains one set of information (for example, in a database) for requests that have been input to the system, and a second set of information for requests then being processed. The system may compare the two sets of information and identify differences between the sets of information.
  • the system will compare the actual intake, aging, or completions to predicted values obtained through simulation and optimization. From the differences, the system may identify requests that have gone missing or stalled, the nature of the processing defect for each processing defect (for example, the reason the request stalled), and the consequences/effect of each defect. In some cases, the system reports defects to a user in real-time. In some cases, the system automatically recommends corrective action for processing defects.
  • a mail/fax batch monitoring system provide batch level monitoring on all inbound client information received via mail or fax and processed through a batch capture system. Designated staff members may be notified upon detection of pre-defined events. Events that trigger alerts may include a batch reaching a designated threshold in which the batch is at risk for being untimely (in “jeopardy”).
  • the system may provide end-to-end batch process traceability from the time of the scan or receipt of the fax to the release of the batch containing the document images to a document management system. Length of time to complete the mail/fax batch process (cycle time), work completed or claimed by staff (staff productivity), timeliness, arrival and completion volume, and other performance and process characteristics may be measured. Key performance indicators may be reported via dashboards, alerts, reports and other analytical tools.
  • actions carried out by a person or group of persons (for example, agents at a contact center) or processes performed on a computing system are part of an enrollment or application process for an individual or group of individuals to receive a benefit.
  • an individual seeking to enroll in a plan may, by way of a computer network, submit an application for enrollment in an insurance plan, request information about a plan, or make requests for information about a plan, submit information to support an application, or receive notifications relating to the plan.
  • Agents or other service personnel perform actions relating to a benefit, such as handling contacts relating to enrollment requests, determining eligibility, and managing complaints and appeals.
  • a system monitors processes and detects defects in processes relating to enrollment.
  • client means, in the context of a provider of products or services, a person who has received products or services, who is receiving products or services, or is seeking to acquire products or services.
  • Client includes a person seeking or receiving a benefit (for example, a government benefit such as a tax credit, access to a potential employer, or insurance coverage) or assistance.
  • contact refers to a contact by client or other person. Examples of modes of contacts include inbound calls and web chat inquiries. Contacts may originate from any person or group, including customers, subscribers, purchasers, enrollees, potential enrollees, general citizens, providers, health plans, or others, including anonymous callers. “Contacts” also includes program information or health plan enrollment activities.
  • FIG. 1 illustrates one embodiment of a processing tracking system connected to user devices over a network.
  • System 100 includes process tracking and defect detection system 102 , user devices 104 , network 106 , document capture systems 108 , document management system 110 , and enrollment system 112 . Users (for example, an analyst, or management personnel) may access information from process tracking and defect detection system 102 by way of network 106 .
  • Users for example, an analyst, or management personnel
  • some or all of document capture systems 108 , document management system 110 , and enrollment system 112 may be connected to process tracking and defect detection system 102 by way of a network.
  • Process tracking and defect detection system 102 may monitor, track, and report on processes carried out in document capture systems 108 , document management system 110 , and enrollment system 112 .
  • process tracking and defect detection system 102 may track document processing from clients via document capture systems 108 and document management system 110 , and enrollment requests from clients made to enrollment system 112 .
  • User devices 104 may be portable electronic devices. User devices 104 may be connected with one another and with process tracking and defect detection system 102 by way of network 106 . Examples of portable electronic devices 104 include a smart phone, a tablet computer, or a pager. User devices 104 may enable communication, task management, and reporting between one another and between other systems on network 106 .
  • User devices 104 may be connected to the network over any suitable medium, such as electrical or optical cable, or via any suitable wireless standard such as IEEE 802.11 (“Wi-Fi”), IEEE 802.16 (“WiMax”), or cellular network.
  • any suitable wireless standard such as IEEE 802.11 (“Wi-Fi”), IEEE 802.16 (“WiMax”), or cellular network.
  • a system may in various embodiments have any number, and any of various types, of portable or fixed electronic devices.
  • a system may in various embodiments have any number, and any of various types, of portable or fixed electronic devices.
  • Process tracking and defect detection system 102 includes one or more processors 122 , system memory 124 , and data storage device 126 .
  • Program instructions may be stored on system memory 124 .
  • Processors 122 may access program instructions on system memory 124 .
  • Processors 122 may access data storage device 126 .
  • Users may be provided with information from workforce management system 102 by way of monitor 128 .
  • Users interact with computer system 120 by way of I/O devices 130 .
  • An I/O device 130 may be, for example, a keyboard or a mouse.
  • Workforce management system 102 may include, or connect with, other devices 136 .
  • Elements of computer system 120 may connect with other devices, such as computer systems in stores 104 , by way of network 106 and network 108 via network interface 132 .
  • Network interface 132 may be, for example, a network interface card.
  • process tracking and defect detection system 102 may include and may be implemented as multiple functional modules or components, with each module or component including one or more provider network resources (e.g., computing resources, storage resources, database resources, etc.).
  • Process tracking and defect detection system 102 may include more or fewer components or modules, and a given module or component may be subdivided into two or more sub-modules or subcomponents. Also, two or more of the modules or components as shown can be combined.
  • a system includes an imaging system for processing the forms and correspondence received by the Enrollment system by mail or fax.
  • the related forms may include enrollment forms, disenrollment forms, transfer forms, good cause request forms, exemption/exclusion forms, fair hearing requests, surveys, and general correspondence.
  • Forms are scanned into the imaging solution, classified by form type, linked to the appropriate case, client, and/or transaction, and data entered.
  • the classification and linking steps may be accomplished automatically by the system. If a document is linked directly to a case and/or client or indirectly through another transaction that is linked to the case and/or client, it can be accessed later through the case-level document screen. All documents associated with a case and/or its members can be viewed from this screen.
  • the imaging process may begin with a batch of documents being scanned into the system.
  • the forms may include a barcode, which is associated with an outbound letter request.
  • the Imaging system reads the barcode.
  • the bar code information and other data pertaining to the image are captured; this is the image metadata.
  • the Imaging system sends the image metadata and the image to a Document Management System (DMS).
  • DMS Document Management System
  • the DMS is the storage location for all images and the image metadata.
  • the image metadata may be captured in a database with the corresponding location for the image.
  • Envelope Control Number (ECN) and Document Control Number (DCN) assigned by the DMS may be part of the image metadata.
  • ECN may be assigned to the entire envelope of documents.
  • DCN may be assigned to the various documents within an envelope.
  • the letter request ID is used to auto link the image to its associated case, case members or even specific transactions (for example, selection records).
  • the letter type from the bar code may be used to classify the form and trigger workflow.
  • Work flow tasks may be created based on the letter type workflow rules. Once the task is created, the users have the ability to claim and work these tasks.
  • a Mail/Fax Batch process represents the imaging of envelopes/documents received as mail from a Post Office or electronically as faxes from the fax server. This process may be part of a document tracking parent process.
  • the document tracking parent process may be made up of a Mail/Fax Batch process and a Mail/Fax Documents process.
  • the Mail/Fax Batch process may end when a batch of document images is transmitted to a Document Management System (DMS), which may trigger the beginning of the Mail/Fax Documents process.
  • DMS Document Management System
  • a Mail/Fax Batch system may provide batch level monitoring on inbound client information received via mail or fax and processed through a batch-based capture system.
  • a Mail/Fax Batch Module provides information on the following:
  • a mail/fax batch system provides project management with actionable information through alerts.
  • Designated staff members may be notified via email upon detection of defined events.
  • Events that trigger alerts may include: when a batch reaches a designated threshold in which it is at risk for being untimely, or when a batch becomes untimely.
  • the mail/fax batch system may provide end-to-end batch process traceability, (for example, from the time of the scan or receipt of the fax to the release of the batch containing the document images to the Document Management System). Alerts to project managers, supervisors, analysts or other project designated staff to be notified upon detection of defined events (for example, when batch is in jeopardy of being processes untimely).
  • a system performs computations and generates graphical or tabular information about operations or processes, such as system performance, agent performance, agent efficiency, task management, workflow management, or defect detection. Information from computations performed by the system may be presented to users in the form of dashboards, reports, and alerts. In some embodiments, the system performs computations to perform an optimization, a simulation, or both.
  • a mail/fax batch tracking system provides users with displays including key performance indicators, dashboards, alerts, reports and analytics. Examples of key performance indicators, dashboards, alerts, reports and analytics that may be included in a system in various embodiments are described below.
  • a Mail/Fax Batches Dashboard provides a user with a snapshot of the current batch process metrics (inventory, arrival and completion volumes, cycle time, timeliness, productivity).
  • This tab displays current summary information for monitoring batches
  • FIG. 2 illustrates one embodiment of a dashboard panel display including a daily summary of mail/fax batch information.
  • FIG. 3 illustrates one embodiment of a dashboard panel display including a weekly summary of mail/fax batch information.
  • FIG. 4 illustrates one embodiment of a dashboard panel display including a summary of process cycle time and timeliness.
  • FIG. 5 illustrates one embodiment of a dashboard panel display of a staff productivity panel.
  • a batch intake report may display batch count subtotals received between two dates by:
  • a batch inventory report may display the batches currently in inventory with the following data:
  • a batch jeopardy report may display the batches currently in jeopardy with the following data:
  • a batch cycle time report may display batch cycle times with the following data:
  • a batch timeliness report may display batch cycle times with the following data:
  • FIG. 6 illustrates one embodiment of a method of identifying defects in request processing operations.
  • Process defects may include, in some embodiments, one or more of the request that has become orphaned, a request that has become stuck, or a request that has vanished from a processing queue.
  • a request-made set of information including information about requests that have been made to a system is generated.
  • an active-processing set of information is generated.
  • the active-processing set of information may include information on requests then being processed.
  • a comparison is made between the active-processing set of information and the request-made set of information.
  • one or more process defects in the request processing operations are identified based on the comparison.
  • one or more requests associated the identified defects is flagged.
  • the nature of process defect, the reason for a stall or non-conformance in the request, or both, may be determined.
  • corrective action is implemented in response to identification of the defect. Corrective action may be performed automatically by the system, manually, or both.
  • FIG. 7 illustrates a method of managing information received by batch capture into a system.
  • one or more untimeliness risk thresholds are set.
  • the untimeliness thresholds may include criteria for when a batch is at risk for being untimely.
  • the untimeliness risk events may include, in one embodiment, meeting or exceeding one of the untimeliness risk thresholds.
  • inbound information received into a batch capture system is monitored.
  • the system may determine work completed or claimed by a staff to a complete the one or more batch processes a length of time to a complete at least one of the one or more batch processes, a measure of timeliness for the batch process, and arrival and completion volume, and work completed or claimed by a staff to a complete the one or more batch processes. Key performance indicators for any or all of the batch processes may be displayed.
  • one or more untimeliness events are detected.
  • one or more alerts are sent.
  • corrective action is performed in response to the untimeliness risk event.
  • corrective action may be performed automatically by the system.
  • a service provider provide services to participants by way of cloud computing resources.
  • computation resources are rented or leased to customers of a service provider.
  • services are provided to users at sites as software as a service (“SaaS”) or platform as a service (“Paas”). Services may be provided to each user on an on-demand basis.
  • SaaS software as a service
  • Paas platform as a service
  • Networks employed in embodiments described herein may include any suitable data network or combination of networks that enable the exchange of information between electronic systems.
  • networks 106 described in FIG. 1 may include one or more Local Area Networks (LANs) such as Ethernet networks, as well as Wide Area Networks (WANs), Metropolitan Area Networks (MANs), or other data or telecommunication networks implemented over any suitable medium, such as electrical or optical cable, or via any suitable wireless standard such as IEEE 802.11 (“Wi-Fi”), IEEE 802.16 (“WiMax”), etc.
  • all or a portion of networks 106 may include the network infrastructure commonly referred to as the Internet.
  • networks may be entirely contained within an enterprise and not directly accessible from the Internet.
  • information may be exchanged over a virtual private network.
  • information is exchanged over the internet, but encrypted in such a way to make a private network not accessible from the rest of the internet.
  • Computer systems may, in various embodiments, include components such as a CPU with an associated memory medium such as Compact Disc Read-Only Memory (CD-ROM).
  • the memory medium may store program instructions for computer programs.
  • the program instructions may be executable by the CPU.
  • Computer systems may further include a display device such as monitor, an alphanumeric input device such as keyboard, and a directional input device such as mouse.
  • Computer systems may be operable to execute the computer programs to implement computer-implemented systems and methods.
  • a computer system may allow access to users by way of any browser or operating system.
  • Computer systems may include a memory medium on which computer programs according to various embodiments may be stored.
  • the term “memory medium” is intended to include an installation medium, e.g., Compact Disc Read Only Memories (CD-ROMs), a computer system memory such as Dynamic Random Access Memory (DRAM), Static Random Access Memory (SRAM), Extended Data Out Random Access Memory (EDO RAM), Double Data Rate Random Access Memory (DDR RAM), Rambus Random Access Memory (RAM), etc., or a non-volatile memory such as a magnetic media, e.g., a hard drive or optical storage.
  • the memory medium may also include other types of memory or combinations thereof.
  • the memory medium may be located in a first computer, which executes the programs or may be located in a second different computer, which connects to the first computer over a network. In the latter instance, the second computer may provide the program instructions to the first computer for execution.
  • a computer system may take various forms such as a personal computer system, mainframe computer system, workstation, network appliance, Internet appliance, personal digital assistant (“PDA”), television system or other device.
  • PDA personal digital assistant
  • the term “computer system” may refer to any device having a processor that executes instructions from a memory medium.
  • the memory medium may store a software program or programs operable to implement embodiments as described herein.
  • the software program(s) may be implemented in various ways, including, but not limited to, procedure-based techniques, component-based techniques, and/or object-oriented techniques, among others.
  • the software programs may be implemented using ActiveX controls, C++ objects, JavaBeans, Microsoft Foundation Classes (MFC), browser-based applications (e.g., Java applets), traditional programs, or other technologies or methodologies, as desired.
  • a CPU executing code and data from the memory medium may include a means for creating and executing the software program or programs according to the embodiments described herein.
  • Suitable carrier media may include storage media or memory media such as magnetic or optical media, e.g., disk or CD-ROM, as well as signals such as electrical, electromagnetic, or digital signals, may be conveyed via a communication medium such as a network and/or a wireless link.
  • a “communications network” refers to a system including one or more communication channels (for example, lines, satellite frequency, or radio waves) interconnecting one or more nodes (for example, servers, routers, computers, or communication devices).
  • Examples of a “communications network” include the internet, a cellular telephone network, a local area network (LAN), or a wide area network (WAN).

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Quality & Reliability (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Educational Administration (AREA)
  • General Engineering & Computer Science (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Tourism & Hospitality (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Debugging And Monitoring (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A system monitors request processing operations and flags process defects (for example, a request that has become orphaned, stuck, or vanished from a processing queue.). The system uses knowledge of how a business process is expected to behave to how it is actually behaving to detect exception instances. The system can detect individual process instances behaving unexpectedly as well as patterns across instance sets. In some cases, the system maintains one set of information (for example, in a database) for requests that have been input to the system, and a second set of information for requests then being processed. The system may compare the two sets of information and identify differences between the sets of information.

Description

    PRIORITY CLAIM
  • This application is a divisional of U.S. patent application Ser. No. 14/502,783 entitled “PROCESS TRACKING AND DEFECT DETECTION” filed Sep. 30, 2014, which claims priority to U.S. Provisional Application Ser. No. 61/884,902 entitled “PROCESS TRACKING AND DEFECT DETECTION” filed Sep. 30, 2013, which is incorporated herein by reference in its entirety.
  • BACKGROUND Field
  • The present invention relates to the field of client services. More particularly, the present invention relates to tracking processes arising from client requests and information submissions.
  • Description of the Related Art
  • Consumers, businesses, and other persons who receive products, services, and benefits from business and government entities must often submit requests or information submissions to the provider. For example, a person seeking to enroll in an insurance plan may need to request acceptance into the plan by way of an enrollment process, and submit documentation to establish eligibility for the insurance. Increasingly, such requests and submissions may be made by way of electronic communications, such as the internet.
  • Responding to a request for a particular service, product, or benefit may be a complex process that takes time and involve many steps and interactions (such as, for example, applying for a government benefit). The amount of resources required (including computing, network, and/or staff) to handle the load may be difficult to predict and plan for. Moreover, defects may occur in processing that prevent or delay successful fulfillment of a request. For example, a request may become stalled or be lost from a processing queue. In addition, in cases where each of a large number of processes is carried out by multiple computer systems, over multiple channels of communication (for example, voice, web chat, and text), identifying and correcting defects, redundancies, snags, and inefficiencies in computer-implemented processes may be difficult or impossible to do in timely manner.
  • SUMMARY
  • Systems and methods of processing requests and for detecting and responding to defects in processes are disclosed. In an embodiment, a method of identifying defects in request processing operations includes generating, by a process tracking system implemented on one or more computer systems, a request-made set of information including information about requests that have been made to a system. Request processing operations in the system are monitored. Monitoring request processing operations includes generating an active-processing set of information in which the active-processing set of information includes information on requests then being processed. For at least one request made to the system, the active processing set of information is compared with the request-made set of information. Based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations are identified. At least one request associated with at least one of the identified defects is flagged.
  • In an embodiment, a system includes one or more computer systems configured to implement a process tracking system. The process tracking system is configured to: generate a request-made set of information including information about requests that have been made to a system; monitor request processing operations in the system; identify, based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations; and flag at least one request associated with at least one of the identified defects. Monitoring request processing operations includes generating an active-processing set of information, wherein the active-processing set of information includes information on requests then being processed; and comparing, for at least one request made to the system, the active processing set of information with the request-made set of information.
  • In an embodiment, a tangible, computer readable medium includes program instructions stored thereon that, when executed on one or more computers, cause the one or more computers to implement a process tracking system configured to: generate a request-made set of information including information about requests that have been made to a system; identify, based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations; and flag at least one request associated with at least one of the identified defects. Monitoring request processing operations in the system includes generating an active-processing set of information, wherein the active-processing set of information includes information on requests then being processed; and comparing, for at least one request made to the system, the active processing set of information with the request-made set of information.
  • In an embodiment, a method of managing information received by batch capture into a system includes setting one or more untimeliness risk thresholds. The untimeliness thresholds include criteria for when a batch is at risk for being untimely. One or more untimeliness risk events are defined. At least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds. Inbound information received into a batch capture system by way of mail or facsimile transmission is monitored by the process tracking system. In response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons by the process tracking system.
  • In an embodiment, a system includes one or more computer systems configured to implement a process tracking system. The process tracking system is configured to: set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely; define one or more untimeliness risk events, wherein at least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds; monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and send, in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
  • In an embodiment, a tangible, computer readable medium includes program instructions stored thereon that, when executed on one or more computers, cause the one or more computers to implement a contact management system configured to: set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely; define one or more untimeliness risk events, wherein at least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds; monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and send in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates one embodiment of a process tracking and defect detection system for tracking a document submissions and enrollment.
  • FIG. 2 illustrates one embodiment of a dashboard panel display including a daily summary of mail/fax batch information.
  • FIG. 3 illustrates one embodiment of a dashboard panel display including a weekly summary of mail/fax batch information.
  • FIG. 4 illustrates one embodiment of a dashboard panel display including a summary of process cycle time and timeliness.
  • FIG. 5 illustrates one embodiment of a dashboard panel display of a staff productivity panel.
  • FIG. 6 illustrates one embodiment of a method of identifying defects in request processing operations.
  • FIG. 7 illustrates a method of managing information received by batch capture into a system.
  • While the invention is described herein by way of example for several embodiments and illustrative drawings, those skilled in the art will recognize that the invention is not limited to the embodiments or drawings described. It should be understood, that the drawings and detailed description thereto are not intended to limit the invention to the particular form disclosed, but on the contrary, the intention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the present invention as defined by the appended claims. The headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description or the claims. As used throughout this application, the word “may” is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words “include”, “including”, and “includes” mean including, but not limited to.
  • DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
  • In some embodiments, a system monitors request processing operations and flags process defects (for example, a request that has become orphaned, stuck, or vanished from a processing queue.). The system uses knowledge of how a business process is expected to behave to how it is actually behaving to detect exception instances. In some cases, the system performs detection of such exception instances in real-time or near real-time. The system can detect individual process instances behaving unexpectedly as well as patterns across instance sets. In some embodiments, the system maintains one set of information (for example, in a database) for requests that have been input to the system, and a second set of information for requests then being processed. The system may compare the two sets of information and identify differences between the sets of information. In some cases the system will compare the actual intake, aging, or completions to predicted values obtained through simulation and optimization. From the differences, the system may identify requests that have gone missing or stalled, the nature of the processing defect for each processing defect (for example, the reason the request stalled), and the consequences/effect of each defect. In some cases, the system reports defects to a user in real-time. In some cases, the system automatically recommends corrective action for processing defects.
  • In some embodiments, a mail/fax batch monitoring system provide batch level monitoring on all inbound client information received via mail or fax and processed through a batch capture system. Designated staff members may be notified upon detection of pre-defined events. Events that trigger alerts may include a batch reaching a designated threshold in which the batch is at risk for being untimely (in “jeopardy”). The system may provide end-to-end batch process traceability from the time of the scan or receipt of the fax to the release of the batch containing the document images to a document management system. Length of time to complete the mail/fax batch process (cycle time), work completed or claimed by staff (staff productivity), timeliness, arrival and completion volume, and other performance and process characteristics may be measured. Key performance indicators may be reported via dashboards, alerts, reports and other analytical tools.
  • In some embodiments, actions carried out by a person or group of persons (for example, agents at a contact center) or processes performed on a computing system are part of an enrollment or application process for an individual or group of individuals to receive a benefit. For example, an individual seeking to enroll in a plan may, by way of a computer network, submit an application for enrollment in an insurance plan, request information about a plan, or make requests for information about a plan, submit information to support an application, or receive notifications relating to the plan. Agents or other service personnel perform actions relating to a benefit, such as handling contacts relating to enrollment requests, determining eligibility, and managing complaints and appeals. In some embodiments, a system monitors processes and detects defects in processes relating to enrollment.
  • As used herein, “client” means, in the context of a provider of products or services, a person who has received products or services, who is receiving products or services, or is seeking to acquire products or services. “Client” includes a person seeking or receiving a benefit (for example, a government benefit such as a tax credit, access to a potential employer, or insurance coverage) or assistance.
  • As used herein, “contact” refers to a contact by client or other person. Examples of modes of contacts include inbound calls and web chat inquiries. Contacts may originate from any person or group, including customers, subscribers, purchasers, enrollees, potential enrollees, general citizens, providers, health plans, or others, including anonymous callers. “Contacts” also includes program information or health plan enrollment activities.
  • FIG. 1 illustrates one embodiment of a processing tracking system connected to user devices over a network. System 100 includes process tracking and defect detection system 102, user devices 104, network 106, document capture systems 108, document management system 110, and enrollment system 112. Users (for example, an analyst, or management personnel) may access information from process tracking and defect detection system 102 by way of network 106. In some embodiments, some or all of document capture systems 108, document management system 110, and enrollment system 112 may be connected to process tracking and defect detection system 102 by way of a network.
  • Process tracking and defect detection system 102 may monitor, track, and report on processes carried out in document capture systems 108, document management system 110, and enrollment system 112. For example, process tracking and defect detection system 102 may track document processing from clients via document capture systems 108 and document management system 110, and enrollment requests from clients made to enrollment system 112.
  • User devices 104 may be portable electronic devices. User devices 104 may be connected with one another and with process tracking and defect detection system 102 by way of network 106. Examples of portable electronic devices 104 include a smart phone, a tablet computer, or a pager. User devices 104 may enable communication, task management, and reporting between one another and between other systems on network 106.
  • User devices 104 may be connected to the network over any suitable medium, such as electrical or optical cable, or via any suitable wireless standard such as IEEE 802.11 (“Wi-Fi”), IEEE 802.16 (“WiMax”), or cellular network.
  • Although for illustrative purposes only a single notebook computer and a single portable electronic devices are shown in FIG. 1, a system may in various embodiments have any number, and any of various types, of portable or fixed electronic devices. In some embodiments, may be a fixed workstation (for example, a PC in the home of a participant).
  • Process tracking and defect detection system 102 includes one or more processors 122, system memory 124, and data storage device 126. Program instructions may be stored on system memory 124. Processors 122 may access program instructions on system memory 124. Processors 122 may access data storage device 126. Users may be provided with information from workforce management system 102 by way of monitor 128. Users interact with computer system 120 by way of I/O devices 130. An I/O device 130 may be, for example, a keyboard or a mouse. Workforce management system 102 may include, or connect with, other devices 136. Elements of computer system 120 may connect with other devices, such as computer systems in stores 104, by way of network 106 and network 108 via network interface 132. Network interface 132 may be, for example, a network interface card.
  • As illustrated in FIG. 1, process tracking and defect detection system 102 may include and may be implemented as multiple functional modules or components, with each module or component including one or more provider network resources (e.g., computing resources, storage resources, database resources, etc.). Process tracking and defect detection system 102 may include more or fewer components or modules, and a given module or component may be subdivided into two or more sub-modules or subcomponents. Also, two or more of the modules or components as shown can be combined.
  • In some embodiments, a system includes an imaging system for processing the forms and correspondence received by the Enrollment system by mail or fax. The related forms may include enrollment forms, disenrollment forms, transfer forms, good cause request forms, exemption/exclusion forms, fair hearing requests, surveys, and general correspondence. Forms are scanned into the imaging solution, classified by form type, linked to the appropriate case, client, and/or transaction, and data entered.
  • Depending on the presence of a bar-code printed when the form was sent to the client, the classification and linking steps may be accomplished automatically by the system. If a document is linked directly to a case and/or client or indirectly through another transaction that is linked to the case and/or client, it can be accessed later through the case-level document screen. All documents associated with a case and/or its members can be viewed from this screen.
  • The imaging process may begin with a batch of documents being scanned into the system. The forms may include a barcode, which is associated with an outbound letter request. When the form is scanned, the Imaging system reads the barcode. The bar code information and other data pertaining to the image are captured; this is the image metadata. Once all documents have been scanned, the Imaging system sends the image metadata and the image to a Document Management System (DMS). The DMS is the storage location for all images and the image metadata. The image metadata may be captured in a database with the corresponding location for the image.
  • Once the DMS receives the image and image metadata, the DMS sends the necessary image metadata needed to trigger the processing of the forms. An Envelope Control Number (ECN) and Document Control Number (DCN) assigned by the DMS may be part of the image metadata. The ECN may be assigned to the entire envelope of documents. The DCN may be assigned to the various documents within an envelope.
  • If the image has a bar code, the letter request ID is used to auto link the image to its associated case, case members or even specific transactions (for example, selection records). The letter type from the bar code may be used to classify the form and trigger workflow. Work flow tasks may be created based on the letter type workflow rules. Once the task is created, the users have the ability to claim and work these tasks.
  • In some embodiments, a Mail/Fax Batch process represents the imaging of envelopes/documents received as mail from a Post Office or electronically as faxes from the fax server. This process may be part of a document tracking parent process. The document tracking parent process may be made up of a Mail/Fax Batch process and a Mail/Fax Documents process. The Mail/Fax Batch process may end when a batch of document images is transmitted to a Document Management System (DMS), which may trigger the beginning of the Mail/Fax Documents process.
  • A Mail/Fax Batch system may provide batch level monitoring on inbound client information received via mail or fax and processed through a batch-based capture system. In one embodiment, a Mail/Fax Batch Module provides information on the following:
      • Batches created (Intake)
      • Batches released to the DMS (Completion)
      • Batches created but not released to the DMS or cancelled (Inventory)
      • Batches at risk of being processed untimely (Jeopardy)
      • Length of time to complete the Mail/Fax Batch process (Cycle Time)
      • Work completed or claimed by staff (Staff Productivity)
      • Batch module data
  • In some embodiments, a mail/fax batch system provides project management with actionable information through alerts. Designated staff members may be notified via email upon detection of defined events. Events that trigger alerts may include: when a batch reaches a designated threshold in which it is at risk for being untimely, or when a batch becomes untimely. The mail/fax batch system may provide end-to-end batch process traceability, (for example, from the time of the scan or receipt of the fax to the release of the batch containing the document images to the Document Management System). Alerts to project managers, supervisors, analysts or other project designated staff to be notified upon detection of defined events (for example, when batch is in jeopardy of being processes untimely).
  • In some embodiments, a system performs computations and generates graphical or tabular information about operations or processes, such as system performance, agent performance, agent efficiency, task management, workflow management, or defect detection. Information from computations performed by the system may be presented to users in the form of dashboards, reports, and alerts. In some embodiments, the system performs computations to perform an optimization, a simulation, or both.
  • In various embodiments, a mail/fax batch tracking system provides users with displays including key performance indicators, dashboards, alerts, reports and analytics. Examples of key performance indicators, dashboards, alerts, reports and analytics that may be included in a system in various embodiments are described below.
  • Mail/Fax Batches Dashboard
  • In some embodiments, a Mail/Fax Batches Dashboard provides a user with a snapshot of the current batch process metrics (inventory, arrival and completion volumes, cycle time, timeliness, productivity).
  • Summary Tab: This tab displays current summary information for monitoring batches
  • Tab Filters:
      • Batch Class
      • Batch Type
  • 1. Daily Summary—This panel presents the following:
      • Date/time of last batch received
      • Number of batches received for current day
      • Number of batches completed for current day
      • Number of batches in inventory
      • Link to Batch Inventory detail report
      • Number of batches in jeopardy
      • Link to Batch Jeopardy detail report
      • Bar graph of batch inventory by age in business hours (y: batch count vs. x: hours. Bars colored green/yellow/red for timely/in jeopardy/untimely respectively).
  • FIG. 2 illustrates one embodiment of a dashboard panel display including a daily summary of mail/fax batch information.
  • 2. Weekly Summary—This panel presents the following:
      • Line graph of batches received by day for the past two weeks (y: batch count vs. x: date).
      • Link to Batches Received detail report
      • Line graph of batches completed by day for the past two weeks (y: batch count vs. x: date).
      • Link to Batches Completed detail report
  • FIG. 3 illustrates one embodiment of a dashboard panel display including a weekly summary of mail/fax batch information.
  • 3. Process Cycle Time & Timeliness Summary—This panel presents the following:
      • Cumulative percentage of batches completed timely for the current month
      • Control chart of the average cycle time of batches completed by day for a rolling 10 business day period. (y: hours vs. x: day with yellow/red jeopardy/timeliness thresholds respectively.)
      • Link to Batch Timeliness detail report
      • Link to Batch Cycle Time detail report
  • Productivity Tab: This tab displays current summary information for monitoring batches
  • Tab Filters:
      • Batch Class
      • Batch Type
      • Operator
  • FIG. 4 illustrates one embodiment of a dashboard panel display including a summary of process cycle time and timeliness.
  • 4. Staff Productivity—This panel displays the following
      • Table of users/operators with batches claimed and completed by activity
      • Link to Staff Productivity detail report
  • FIG. 5 illustrates one embodiment of a dashboard panel display of a staff productivity panel.
  • Reports
  • Batch Intake Report
  • A batch intake report may display batch count subtotals received between two dates by:
      • Date
      • Batch Class
      • Batch Type
      • Drill into detail on any data point
  • Report Prompts:
      • Date Range (Required, Default: previous two week period)
      • Batch Class
      • Batch Type
  • Batch Completions
  • The purpose of this report is to provide leadership with detailed batch completion information
  • Tabular report that displays batch count subtotals completed between two dates by:
      • Date
      • Batch Class
      • Batch Type
      • Drill into detail on data points
  • Report Prompts:
      • Date Range (Required, Default: previous two week period)
      • Batch Class
      • Batch Type
  • Batch Inventory Report
  • A batch inventory report may display the batches currently in inventory with the following data:
      • Batch Create Date
      • Batch Class (grouped)
      • Batch Type (grouped)
      • Batch Status (grouped)
      • Age in business hours
      • Age in business days
      • Drill into detail on data points
  • Report Prompts:
      • Age Range in Business Days (from # days to # days)
  • Batch Jeopardy Report
  • A batch jeopardy report may display the batches currently in jeopardy with the following data:
      • Batch Class (grouped)
      • Batch Type (grouped)
      • Batch Status (grouped)
      • Scan Date
      • Age in business hours
      • Age in business days
      • Drill into detail on data points
  • Report Prompts:
  • Age Range in Business Days (from # days to # days)
  • Batch Cycle Time Report
  • A batch cycle time report may display batch cycle times with the following data:
      • Batch Create Date
      • Batch Class (grouped)
      • Batch Type (grouped)
      • Batch Cycle Time
  • Report Prompts:
      • Batch Class
      • Batch Type
  • Batch Timeliness Report
  • A batch timeliness report may display batch cycle times with the following data:
      • Batch Create Date
      • Batch Class (grouped)
      • Batch Type (grouped)
      • Batch Timeliness Status
  • Report Prompts:
      • Batch Class
      • Batch Type
  • FIG. 6 illustrates one embodiment of a method of identifying defects in request processing operations. Process defects may include, in some embodiments, one or more of the request that has become orphaned, a request that has become stuck, or a request that has vanished from a processing queue.
  • At 200, a request-made set of information including information about requests that have been made to a system is generated.
  • At 202, an active-processing set of information is generated. The active-processing set of information may include information on requests then being processed.
  • At 204, a comparison is made between the active-processing set of information and the request-made set of information. At 206, one or more process defects in the request processing operations are identified based on the comparison.
  • At 208, one or more requests associated the identified defects is flagged. The nature of process defect, the reason for a stall or non-conformance in the request, or both, may be determined. In some embodiments, corrective action is implemented in response to identification of the defect. Corrective action may be performed automatically by the system, manually, or both.
  • FIG. 7 illustrates a method of managing information received by batch capture into a system. At 220, one or more untimeliness risk thresholds are set. The untimeliness thresholds may include criteria for when a batch is at risk for being untimely.
  • At 222, one or more untimeliness risk events are defined. The untimeliness risk events may include, in one embodiment, meeting or exceeding one of the untimeliness risk thresholds.
  • At 224, inbound information received into a batch capture system (for example, by way of mail or facsimile transmission) is monitored. For each batch process, the system may determine work completed or claimed by a staff to a complete the one or more batch processes a length of time to a complete at least one of the one or more batch processes, a measure of timeliness for the batch process, and arrival and completion volume, and work completed or claimed by a staff to a complete the one or more batch processes. Key performance indicators for any or all of the batch processes may be displayed.
  • At 226, one or more untimeliness events are detected. At 228, in response to detection of one or more of the untimeliness risk events, one or more alerts are sent.
  • At 230, corrective action is performed in response to the untimeliness risk event. In some embodiments, corrective action may be performed automatically by the system.
  • In some embodiments, a service provider provide services to participants by way of cloud computing resources. In some embodiments, computation resources are rented or leased to customers of a service provider. In certain embodiments, services are provided to users at sites as software as a service (“SaaS”) or platform as a service (“Paas”). Services may be provided to each user on an on-demand basis.
  • Networks employed in embodiments described herein may include any suitable data network or combination of networks that enable the exchange of information between electronic systems. For example, networks 106 described in FIG. 1 may include one or more Local Area Networks (LANs) such as Ethernet networks, as well as Wide Area Networks (WANs), Metropolitan Area Networks (MANs), or other data or telecommunication networks implemented over any suitable medium, such as electrical or optical cable, or via any suitable wireless standard such as IEEE 802.11 (“Wi-Fi”), IEEE 802.16 (“WiMax”), etc. In various embodiments, all or a portion of networks 106 may include the network infrastructure commonly referred to as the Internet. In other embodiments, networks may be entirely contained within an enterprise and not directly accessible from the Internet. In certain embodiments, information may be exchanged over a virtual private network. In one embodiment, information is exchanged over the internet, but encrypted in such a way to make a private network not accessible from the rest of the internet.
  • Computer systems may, in various embodiments, include components such as a CPU with an associated memory medium such as Compact Disc Read-Only Memory (CD-ROM). The memory medium may store program instructions for computer programs. The program instructions may be executable by the CPU. Computer systems may further include a display device such as monitor, an alphanumeric input device such as keyboard, and a directional input device such as mouse. Computer systems may be operable to execute the computer programs to implement computer-implemented systems and methods. A computer system may allow access to users by way of any browser or operating system.
  • Computer systems may include a memory medium on which computer programs according to various embodiments may be stored. The term “memory medium” is intended to include an installation medium, e.g., Compact Disc Read Only Memories (CD-ROMs), a computer system memory such as Dynamic Random Access Memory (DRAM), Static Random Access Memory (SRAM), Extended Data Out Random Access Memory (EDO RAM), Double Data Rate Random Access Memory (DDR RAM), Rambus Random Access Memory (RAM), etc., or a non-volatile memory such as a magnetic media, e.g., a hard drive or optical storage. The memory medium may also include other types of memory or combinations thereof. In addition, the memory medium may be located in a first computer, which executes the programs or may be located in a second different computer, which connects to the first computer over a network. In the latter instance, the second computer may provide the program instructions to the first computer for execution. A computer system may take various forms such as a personal computer system, mainframe computer system, workstation, network appliance, Internet appliance, personal digital assistant (“PDA”), television system or other device. In general, the term “computer system” may refer to any device having a processor that executes instructions from a memory medium.
  • The memory medium may store a software program or programs operable to implement embodiments as described herein. The software program(s) may be implemented in various ways, including, but not limited to, procedure-based techniques, component-based techniques, and/or object-oriented techniques, among others. For example, the software programs may be implemented using ActiveX controls, C++ objects, JavaBeans, Microsoft Foundation Classes (MFC), browser-based applications (e.g., Java applets), traditional programs, or other technologies or methodologies, as desired. A CPU executing code and data from the memory medium may include a means for creating and executing the software program or programs according to the embodiments described herein.
  • Various embodiments may also include receiving or storing instructions and/or data implemented in accordance with the foregoing description upon a carrier medium. Suitable carrier media may include storage media or memory media such as magnetic or optical media, e.g., disk or CD-ROM, as well as signals such as electrical, electromagnetic, or digital signals, may be conveyed via a communication medium such as a network and/or a wireless link.
  • As used herein, a “communications network” refers to a system including one or more communication channels (for example, lines, satellite frequency, or radio waves) interconnecting one or more nodes (for example, servers, routers, computers, or communication devices). Examples of a “communications network” include the internet, a cellular telephone network, a local area network (LAN), or a wide area network (WAN).
  • Further modifications and alternative embodiments of various aspects of the invention may be apparent to those skilled in the art in view of this description. Accordingly, this description is to be construed as illustrative only and is for the purpose of teaching those skilled in the art the general manner of carrying out the invention. It is to be understood that the forms of the invention shown and described herein are to be taken as embodiments. Elements and materials may be substituted for those illustrated and described herein, parts and processes may be reversed, and certain features of the invention may be utilized independently, all as would be apparent to one skilled in the art after having the benefit of this description of the invention. Methods may be implemented manually, in software, in hardware, or a combination thereof. The order of any method may be changed, and various elements may be added, reordered, combined, omitted, modified, etc. Changes may be made in the elements described herein without departing from the spirit and scope of the invention as described in the following claims.

Claims (17)

What is claimed is:
1. A method of managing information received by batch capture into a system, comprising:
setting one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely;
defining one or more untimeliness risk events, wherein at least one of the untimeliness risk events comprises meeting or exceeding at least one of the untimeliness risk thresholds;
monitoring, by a process tracking system implemented on one or more computer systems, inbound information received into a batch capture system by way of mail or facsimile transmission; and
sending, by the process tracking system, in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
2. The method of claim 1, further comprising tracing, for at least one document in a batch, processing of the batch from the time of scan or receipt of the document to release of a document image to a document management system.
3. The method of claim 1, further comprising determining, for one or more batch processes for the inbound information, a length of time to a complete at least one of the one or more batch processes.
4. The method of claim 1, further comprising determining, for one or more batch processes for the inbound information, a work completed or claimed by a staff to be complete of the one or more batch processes.
5. The method of claim 1, further comprising determining, for one or more batch processes for the inbound information, a measure of timeliness for the one or more batch processes.
6. The method of claim 1, further comprising determining, for one or more batch processes for the inbound information, arrival and completion volume for the one or more batch processes.
7. The method of claim 1, further comprising displaying one or more key performance indicators for at least one batch process.
8. The method of claim 1, further comprising performing at least one corrective action in response to an untimeliness risk event.
9. A system, comprising:
one or more computer systems configured to implement a process tracking system, wherein the process tracking system is configured to:
set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely;
define one or more untimeliness risk events, wherein at least one of the untimeliness risk events comprises meeting or exceeding at least one of the untimeliness risk thresholds;
monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and
send, in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
10. The system of claim 9, wherein the process tracking system is configured to trace, for at least one document in a batch, processing of the batch from the time of scan or receipt of the document to release of a document image to a document management system.
11. The system of claim 9, wherein the process tracking system is configured to determine, for one or more batch processes for the inbound information, a length of time to a complete at least one of the one or more batch processes.
12. The system of claim 9, wherein the process tracking system is configured to determine, for one or more batch processes for the inbound information, a work completed or claimed by a staff to be complete the one or more batch processes.
13. The system of claim 9, wherein the process tracking system is configured to determine, for one or more batch processes for the inbound information, a measure of timeliness for the one or more batch processes.
14. The system of claim 9, wherein the process tracking system is configured to determine, for one or more batch processes for the inbound information, arrival and completion volume for the one or more batch processes.
15. The system of claim 9, wherein the process tracking system is configured to display one or more key performance indicators for at least one batch process.
16. The system of claim 9, wherein the process tracking system is configured to perform at least one corrective action in response to an untimeliness risk event.
17. A tangible, computer readable medium comprising program instructions stored thereon, wherein the program instructions, when executed on one or more computers, cause the one or more computers to implement a process tracking system configured to:
set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely;
define one or more untimeliness risk events, wherein at least one of the untimeliness risk events comprises meeting or exceeding at least one of the untimeliness risk thresholds;
monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and
send in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
US16/452,589 2013-09-30 2019-06-26 Process tracking and defect detection Abandoned US20190318294A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/452,589 US20190318294A1 (en) 2013-09-30 2019-06-26 Process tracking and defect detection

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201361884902P 2013-09-30 2013-09-30
US14/502,783 US10380518B2 (en) 2013-09-30 2014-09-30 Process tracking and defect detection
US16/452,589 US20190318294A1 (en) 2013-09-30 2019-06-26 Process tracking and defect detection

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/502,783 Division US10380518B2 (en) 2013-09-30 2014-09-30 Process tracking and defect detection

Publications (1)

Publication Number Publication Date
US20190318294A1 true US20190318294A1 (en) 2019-10-17

Family

ID=51871264

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/502,783 Active 2038-02-18 US10380518B2 (en) 2013-09-30 2014-09-30 Process tracking and defect detection
US16/452,589 Abandoned US20190318294A1 (en) 2013-09-30 2019-06-26 Process tracking and defect detection

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/502,783 Active 2038-02-18 US10380518B2 (en) 2013-09-30 2014-09-30 Process tracking and defect detection

Country Status (3)

Country Link
US (2) US10380518B2 (en)
GB (1) GB2535373A (en)
WO (1) WO2015048789A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10380518B2 (en) 2013-09-30 2019-08-13 Maximus Process tracking and defect detection
US11030697B2 (en) 2017-02-10 2021-06-08 Maximus, Inc. Secure document exchange portal system with efficient user access

Family Cites Families (118)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5951300A (en) 1997-03-10 1999-09-14 Health Hero Network Online system and method for providing composite entertainment and health information
EP1526472A3 (en) 1995-02-13 2006-07-26 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6021202A (en) 1996-12-20 2000-02-01 Financial Services Technology Consortium Method and system for processing electronic documents
US6915254B1 (en) 1998-07-30 2005-07-05 A-Life Medical, Inc. Automatically assigning medical codes using natural language processing
US6507826B1 (en) * 1999-01-29 2003-01-14 Koriel, Inc. Remote electronic invoice entry and validation system and method therefor
US20010047283A1 (en) 2000-02-01 2001-11-29 Melick Bruce D. Electronic system for identification, recording, storing, and retrieving material handling equipment records and certifications
US6711253B1 (en) 2000-02-04 2004-03-23 Avaya Technology Corp. Method and apparatus for analyzing performance data in a call center
AUPQ599700A0 (en) 2000-03-03 2000-03-23 Super Internet Site System Pty Ltd On-line geographical directory
US20040009461A1 (en) 2000-04-24 2004-01-15 Snyder Jonathan Scott System for scheduling classes and managing eductional resources
US7606778B2 (en) 2000-06-12 2009-10-20 Previsor, Inc. Electronic predication system for assessing a suitability of job applicants for an employer
US7587368B2 (en) 2000-07-06 2009-09-08 David Paul Felsher Information record infrastructure, system and method
US20020019741A1 (en) 2000-07-07 2002-02-14 Heston Robert L. Method and system for performing legal services over the internet
US6647269B2 (en) 2000-08-07 2003-11-11 Telcontar Method and system for analyzing advertisements delivered to a mobile unit
US7464036B1 (en) 2000-10-03 2008-12-09 Peopleclick, Inc. Methods, systems, and computer program products for selecting a job post site to which a job opening description may be posted by ranking job post sites based on one or more selection criterion
AUPR454001A0 (en) 2001-04-20 2001-05-24 Careers Fast Track Pty Ltd Interactive learning and career management system
US20020169718A1 (en) 2001-05-09 2002-11-14 Alsofrom Daniel D. System for improving the payment of child support to a payee parent
CA2447096C (en) 2001-05-17 2018-06-12 Bay Bridge Decision Technologies, Inc. System and method for generating forecasts and analysis of contact center behavior for planning purposes
US7051145B2 (en) * 2001-12-10 2006-05-23 Emulex Design & Manufacturing Corporation Tracking deferred data transfers on a system-interconnect bus
US7523505B2 (en) 2002-08-16 2009-04-21 Hx Technologies, Inc. Methods and systems for managing distributed digital medical data
US20040064330A1 (en) 2002-09-30 2004-04-01 Keelan Matthew Bruce Method and apparatus for screening applicants for employer incentives/tax credits
US7974857B1 (en) 2002-12-12 2011-07-05 Accenture Global Services Limited Unemployment insurance management
US7376957B1 (en) * 2002-12-16 2008-05-20 At&T Delaware Intellectual Property, Inc. Method and system for recovering stranded outbound messages
US7233938B2 (en) 2002-12-27 2007-06-19 Dictaphone Corporation Systems and methods for coding information
US8185747B2 (en) 2003-05-22 2012-05-22 Access Security Protection, Llc Methods of registration for programs using verification processes with biometrics for fraud management and enhanced security protection
US7730543B1 (en) 2003-06-30 2010-06-01 Satyajit Nath Method and system for enabling users of a group shared across multiple file security systems to access secured files
US7937333B2 (en) * 2003-09-19 2011-05-03 Pitney Bowes Inc. System and method for facilitating refunds of unused postage
US20050086075A1 (en) 2003-10-15 2005-04-21 Healthcare Finance Solutions, Inc. Benefit management
US20050129212A1 (en) 2003-12-12 2005-06-16 Parker Jane S. Workforce planning system incorporating historic call-center related data
US7539297B2 (en) 2003-12-19 2009-05-26 At&T Intellectual Property I, L.P. Generation of automated recommended parameter changes based on force management system (FMS) data analysis
US20050135601A1 (en) 2003-12-19 2005-06-23 Whitman Raymond Jr. Force management automatic call distribution and resource allocation control system
US8711732B2 (en) 2004-05-27 2014-04-29 Richard G. Johnson Synthesized interoperable communications
WO2006002687A2 (en) 2004-06-30 2006-01-12 Swiss Reinsurance Company Method and system for automated location-dependent recognition of flood risks
US7254837B2 (en) 2004-07-13 2007-08-07 Fields Daniel M Apparatus and method for storing and distributing encrypted digital content
US20060161464A1 (en) 2004-11-09 2006-07-20 Green Joseph S Method and system for web-based organizational reporting management
JP2006146679A (en) * 2004-11-22 2006-06-08 Hitachi Ltd Control method for information processor, information processor and program
US20060143228A1 (en) 2004-12-29 2006-06-29 Xy Concepts, Llc System and method for selecting qualified job applicants
WO2006086555A2 (en) 2005-02-08 2006-08-17 Massey, Susan, G. Method and system for reducing dependent eligibility fraud in healthcare programs
US7895060B1 (en) 2006-02-03 2011-02-22 Quest Diagnostics Investments, Inc. Systems and methods for administration of prescription drug benefits
US7720791B2 (en) 2005-05-23 2010-05-18 Yahoo! Inc. Intelligent job matching system and method including preference ranking
US8429527B1 (en) 2005-07-12 2013-04-23 Open Text S.A. Complex data merging, such as in a workflow application
US20070198296A1 (en) 2006-02-21 2007-08-23 Visiontree Software, Inc. Patient health management portal
US8112298B2 (en) 2006-02-22 2012-02-07 Verint Americas, Inc. Systems and methods for workforce optimization
US8868660B2 (en) * 2006-03-22 2014-10-21 Cellco Partnership Electronic communication work flow manager system, method and computer program product
US8539493B1 (en) * 2006-03-23 2013-09-17 Emc Corporation Configurable prioritization and aging of queued tasks
US8811597B1 (en) 2006-09-07 2014-08-19 Avaya Inc. Contact center performance prediction
US8938063B1 (en) 2006-09-07 2015-01-20 Avaya Inc. Contact center service monitoring and correcting
US8032396B2 (en) 2006-09-25 2011-10-04 Aetna Inc. System and method for offering and guaranteeing renewal of suspendable healthcare benefits
US20080103828A1 (en) 2006-11-01 2008-05-01 Squilla John R Automated custom report generation system for medical information
US8401886B2 (en) 2006-11-06 2013-03-19 Genpact Limited Optimized call center operations method and system
US20080133513A1 (en) 2006-11-30 2008-06-05 Trinity Alliance Corporation Systems and Methods for Providing, Accessing and Returning Results on Advertising and Service Opportunities
US8799049B2 (en) 2007-01-11 2014-08-05 Intuit Inc. System and method for forecasting contact volume
US7853546B2 (en) 2007-03-09 2010-12-14 General Electric Company Enhanced rule execution in expert systems
JP4437500B2 (en) 2007-03-20 2010-03-24 インターナショナル・ビジネス・マシーンズ・コーポレーション Technology that manages data in association with tag information
US8457544B2 (en) 2008-12-19 2013-06-04 Xerox Corporation System and method for recommending educational resources
US20090113427A1 (en) 2007-10-25 2009-04-30 Glenn Brady Program Management Effectiveness
US8300823B2 (en) 2008-01-28 2012-10-30 Netapp, Inc. Encryption and compression of data for storage
US20100076835A1 (en) 2008-05-27 2010-03-25 Lawrence Silverman Variable incentive and virtual market system
US20090307052A1 (en) 2008-06-04 2009-12-10 Accenture Global Services Gmbh Workforce planning system, method and tool
US8694351B2 (en) 2008-09-03 2014-04-08 Centurylink Intellectual Property Llc System and method for an audit tool for communications service providers
US8315370B2 (en) 2008-12-29 2012-11-20 Genesys Telecommunications Laboratories, Inc. System for scheduling routing rules in a contact center based on forcasted and actual interaction load and staffing requirements
US8185430B2 (en) 2009-01-30 2012-05-22 Bank Of America Corporation Supplier stratification
US20100211516A1 (en) 2009-02-19 2010-08-19 Maximus Method and system for matching employers with job-seeking individuals
US20100228563A1 (en) 2009-03-08 2010-09-09 Walker Jr Samuel E System and method for preventing health care fraud
US8214238B1 (en) 2009-04-21 2012-07-03 Accenture Global Services Limited Consumer goods and services high performance capability assessment
US8180773B2 (en) 2009-05-27 2012-05-15 International Business Machines Corporation Detecting duplicate documents using classification
WO2011031776A1 (en) 2009-09-08 2011-03-17 Lawrence Jason Berger Education monitoring
US20110082777A1 (en) 2009-10-06 2011-04-07 Chess Steven M Timekeeping Computer System with Image Capture and Quick View
US20110112879A1 (en) 2009-11-07 2011-05-12 Jason Fama Method and apparatus to manage a workforce
US20110191115A1 (en) 2009-11-12 2011-08-04 Zalam Adnan A Integrated health care management system
US20110119197A1 (en) 2009-11-18 2011-05-19 Jason Turchin Legal communications management mobile application
US8615741B2 (en) 2009-12-24 2013-12-24 International Business Machines Corporation Software defect tracking
EP2354968A1 (en) 2009-12-30 2011-08-10 Tim Frey Hyperadapter and method for accessing documents in a document base
US8355926B1 (en) 2010-02-08 2013-01-15 Accenture Global Services Limited Health and life sciences medicaid high performance capability assessment
US8527452B2 (en) 2010-02-18 2013-09-03 International Business Machines Corporation Construction of rules for use in a complex event processing system
US20110218885A1 (en) 2010-03-08 2011-09-08 Sarah Manski System and method for supply chain and relationship mapping
US20110295623A1 (en) 2010-05-26 2011-12-01 Hartford Fire Insurance Company System and method for workers compensation data processing and tracking
US10521813B2 (en) 2010-07-06 2019-12-31 Groupon, Inc. System and method for incentives
US8724797B2 (en) 2010-08-26 2014-05-13 Satmap International Holdings Limited Estimating agent performance in a call routing center system
US9299266B2 (en) 2010-09-24 2016-03-29 Lexia Learning Systems Llc System for performing assessment without testing
US8396204B2 (en) 2010-10-09 2013-03-12 Hewlett-Packard Development Company, L.P. Call center resource allocation
US8300797B1 (en) 2010-10-29 2012-10-30 Sprint Communications Company L.P. Global view of performance management in a diverse call center environment
US8566204B2 (en) 2010-11-01 2013-10-22 Mary Joan Willard Method for detecting ineligibility of a beneficiary and system
US8978006B2 (en) 2011-04-06 2015-03-10 Media Direct, Inc. Systems and methods for a mobile business application development and deployment platform
US9367813B2 (en) 2011-10-28 2016-06-14 Xerox Corporation Methods and systems for identifying frequently occurring intradomain episodes and interdomain episodes in multiple service portals using average user session length
US9390228B2 (en) 2011-10-31 2016-07-12 Reid Consulting Group, Inc. System and method for securely storing and sharing information
US20130159017A1 (en) 2011-12-16 2013-06-20 James E. Burkholder Method and system for verifying a user's healthcare benefits
US20130211856A1 (en) 2012-01-11 2013-08-15 Enovation, Llc Systems and methods for generating outcome measures
US20130185087A1 (en) 2012-01-17 2013-07-18 Richard Merkin Medical history database
US20130191185A1 (en) 2012-01-24 2013-07-25 Brian R. Galvin System and method for conducting real-time and historical analysis of complex customer care processes
US9026550B2 (en) 2012-01-30 2015-05-05 Siemens Aktiengesellschaft Temporal pattern matching in large collections of log messages
US8488769B1 (en) 2012-04-24 2013-07-16 Noble Systems Corporation Non-scheduled training for an agent in a call center
US8965830B2 (en) 2012-05-17 2015-02-24 Xerox Corporation Systems and methods for self-adaptive episode mining under the threshold using delay estimation and temporal division
US8768847B2 (en) 2012-06-21 2014-07-01 Microsoft Corporation Privacy enhancing personal data brokerage service
US20160012561A1 (en) 2014-07-10 2016-01-14 Lexisnexis Risk Solutions Fl Inc. Systems and Methods for Detecting Identity Theft of a Dependent
US20140058927A1 (en) 2012-08-27 2014-02-27 Leaf Holdings, Inc. System and method of a provider management system
US20140074834A1 (en) 2012-09-13 2014-03-13 Transparent Io, Inc. Storage Block Metadata Tagger
US9563663B2 (en) 2012-09-28 2017-02-07 Oracle International Corporation Fast path evaluation of Boolean predicates
US9912813B2 (en) 2012-11-21 2018-03-06 Genesys Telecommunications Laboratories, Inc. Graphical user interface with contact center performance visualizer
EP2736002A1 (en) 2012-11-22 2014-05-28 Baden-Württemberg Stiftung gGmbH Method, system and computer program product for enforcing access to event attributes of event streams in a complex event processing system
US8787552B1 (en) 2013-01-31 2014-07-22 Xerox Corporation Call center issue resolution estimation based on probabilistic models
US20140211931A1 (en) 2013-01-31 2014-07-31 North American Communications Resources, Inc. System and Method for Generating and Delivering Automated Reports Concerning the Performance of a Call Center
US20140278573A1 (en) 2013-03-15 2014-09-18 State Farm Mutual Automobile Insurance Company Systems and methods for initiating insurance processing using ingested data
US20140289147A1 (en) 2013-03-21 2014-09-25 Alicia Jordan HAFF System and method for calculating employee eligibility of health care benefits
US10019297B2 (en) * 2013-04-03 2018-07-10 Salesforce.Com, Inc. Systems and methods for implementing bulk handling in asynchronous processing
US20140365440A1 (en) 2013-06-05 2014-12-11 Avaya Inc. High availability snapshot core
US11336770B2 (en) 2013-06-07 2022-05-17 Mattersight Corporation Systems and methods for analyzing coaching comments
US20150019451A1 (en) 2013-07-09 2015-01-15 Sap Ag Decision basis for benefits program
US9589244B2 (en) 2013-09-30 2017-03-07 Maximus, Inc. Request process optimization and management
WO2015048787A1 (en) 2013-09-30 2015-04-02 Maximus, Inc. Contact center system with efficiency analysis tools
US10380518B2 (en) 2013-09-30 2019-08-13 Maximus Process tracking and defect detection
US9280678B2 (en) 2013-12-02 2016-03-08 Fortinet, Inc. Secure cloud storage distribution and aggregation
US20160048758A1 (en) 2014-01-15 2016-02-18 Stanley Victor CAMPBELL System and method for persistent evidence based multi-ontology context dependent eligibility assessment and feature scoring
US20150356250A1 (en) 2014-06-04 2015-12-10 Polimeni Medical Infromation Technologies, Llc Method for an Interactive, Patient Controlled Medical Information System in a Digital, Real Time Manner which Features a Single Point of Entry for Patients, Physicians, all other Health Care Providers, Health Care Payers, Researchers and Pharmaceutical Companies
US9449187B2 (en) 2014-08-11 2016-09-20 Document Dynamics, Llc Environment-aware security tokens
US20160239931A1 (en) 2015-01-31 2016-08-18 Maximus, Inc. Ensuring program integrity in benefit systems
US11030697B2 (en) 2017-02-10 2021-06-08 Maximus, Inc. Secure document exchange portal system with efficient user access
US20180232487A1 (en) 2017-02-10 2018-08-16 Maximus, Inc. Document classification tool for large electronic files
US20180232493A1 (en) 2017-02-10 2018-08-16 Maximus, Inc. Case-level review tool for physicians

Also Published As

Publication number Publication date
WO2015048789A2 (en) 2015-04-02
WO2015048789A3 (en) 2015-10-29
US10380518B2 (en) 2019-08-13
GB201607562D0 (en) 2016-06-15
US20150095072A1 (en) 2015-04-02
GB2535373A (en) 2016-08-17

Similar Documents

Publication Publication Date Title
US11121885B2 (en) Data analysis system and method for predicting meeting invitees
US20190034854A1 (en) Systems and methods involving features of sales force processing and/or productivity
US10599670B2 (en) Performance estimation system utilizing a data analytics predictive model
US8868660B2 (en) Electronic communication work flow manager system, method and computer program product
US20190295018A1 (en) Methods for processing information associated with sales force management, customer relationship management and professional services management systems
US10223659B2 (en) Methods and system for integrating social media analysis into an enterprise project management system
US20150154524A1 (en) Methods for processing information associated with sales force management, customer relationship management and professional services management systems
US9589244B2 (en) Request process optimization and management
US9614961B2 (en) Contact center system with efficiency analysis tools
US20080288322A1 (en) Methods and systems for project management
US20080222286A1 (en) Computer Usage Monitoring
US11093902B2 (en) Systems and methods for absentee management
US10740536B2 (en) Dynamic survey generation and verification
US20150170228A1 (en) Customer feedback system
US20120035977A1 (en) Enterprise Consumer Complaints Program
US20150106128A1 (en) System and method to facilitate a communication interface between insurance agent and underwriter devices
US20180165767A1 (en) System and method utilizing threshold priority values for a risk relationship management platform
US20190318294A1 (en) Process tracking and defect detection
US20210004766A1 (en) Determining and maintaining organizational project participant compliance
US20090018952A1 (en) System and method for prospecting and processing loan applications
US20220391818A1 (en) Next best action recommendation system for stochastic timeline
US20130041712A1 (en) Emerging risk identification process and tool
US20220253771A1 (en) System and method of processing data from multiple sources to project future resource allocation
Djedović et al. Optimization of the business processes via automatic integration with the document management system
US20210056587A1 (en) System and method for enhanced website visitor notifications

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., DELAWARE

Free format text: NOTICE OF GRANT OF SECURITY INTEREST IN UNITED STATES PATENTS;ASSIGNOR:MAXIMUS, INC.;REEL/FRAME:056447/0772

Effective date: 20210528

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION