US20190318294A1 - Process tracking and defect detection - Google Patents
Process tracking and defect detection Download PDFInfo
- Publication number
- US20190318294A1 US20190318294A1 US16/452,589 US201916452589A US2019318294A1 US 20190318294 A1 US20190318294 A1 US 20190318294A1 US 201916452589 A US201916452589 A US 201916452589A US 2019318294 A1 US2019318294 A1 US 2019318294A1
- Authority
- US
- United States
- Prior art keywords
- batch
- untimeliness
- risk
- process tracking
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
- G06Q10/063114—Status monitoring or status determination for a person or group
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/079—Root cause analysis, i.e. error or fault diagnosis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
Definitions
- the present invention relates to the field of client services. More particularly, the present invention relates to tracking processes arising from client requests and information submissions.
- Responding to a request for a particular service, product, or benefit may be a complex process that takes time and involve many steps and interactions (such as, for example, applying for a government benefit).
- the amount of resources required (including computing, network, and/or staff) to handle the load may be difficult to predict and plan for.
- defects may occur in processing that prevent or delay successful fulfillment of a request. For example, a request may become stalled or be lost from a processing queue.
- identifying and correcting defects, redundancies, snags, and inefficiencies in computer-implemented processes may be difficult or impossible to do in timely manner.
- a method of identifying defects in request processing operations includes generating, by a process tracking system implemented on one or more computer systems, a request-made set of information including information about requests that have been made to a system. Request processing operations in the system are monitored. Monitoring request processing operations includes generating an active-processing set of information in which the active-processing set of information includes information on requests then being processed. For at least one request made to the system, the active processing set of information is compared with the request-made set of information. Based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations are identified. At least one request associated with at least one of the identified defects is flagged.
- a system includes one or more computer systems configured to implement a process tracking system.
- the process tracking system is configured to: generate a request-made set of information including information about requests that have been made to a system; monitor request processing operations in the system; identify, based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations; and flag at least one request associated with at least one of the identified defects.
- Monitoring request processing operations includes generating an active-processing set of information, wherein the active-processing set of information includes information on requests then being processed; and comparing, for at least one request made to the system, the active processing set of information with the request-made set of information.
- a tangible, computer readable medium includes program instructions stored thereon that, when executed on one or more computers, cause the one or more computers to implement a process tracking system configured to: generate a request-made set of information including information about requests that have been made to a system; identify, based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations; and flag at least one request associated with at least one of the identified defects.
- Monitoring request processing operations in the system includes generating an active-processing set of information, wherein the active-processing set of information includes information on requests then being processed; and comparing, for at least one request made to the system, the active processing set of information with the request-made set of information.
- a method of managing information received by batch capture into a system includes setting one or more untimeliness risk thresholds.
- the untimeliness thresholds include criteria for when a batch is at risk for being untimely.
- One or more untimeliness risk events are defined. At least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds.
- Inbound information received into a batch capture system by way of mail or facsimile transmission is monitored by the process tracking system.
- one or more alerts to one or more persons by the process tracking system Inbound information received into a batch capture system by way of mail or facsimile transmission is monitored by the process tracking system.
- one or more alerts to one or more persons by the process tracking system In response to detection of one or more of the untimeliness risk events.
- a system includes one or more computer systems configured to implement a process tracking system.
- the process tracking system is configured to: set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely; define one or more untimeliness risk events, wherein at least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds; monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and send, in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
- a tangible, computer readable medium includes program instructions stored thereon that, when executed on one or more computers, cause the one or more computers to implement a contact management system configured to: set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely; define one or more untimeliness risk events, wherein at least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds; monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and send in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
- a contact management system configured to: set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely; define one or more untimeliness risk events, wherein at least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness
- FIG. 1 illustrates one embodiment of a process tracking and defect detection system for tracking a document submissions and enrollment.
- FIG. 2 illustrates one embodiment of a dashboard panel display including a daily summary of mail/fax batch information.
- FIG. 3 illustrates one embodiment of a dashboard panel display including a weekly summary of mail/fax batch information.
- FIG. 4 illustrates one embodiment of a dashboard panel display including a summary of process cycle time and timeliness.
- FIG. 5 illustrates one embodiment of a dashboard panel display of a staff productivity panel.
- FIG. 6 illustrates one embodiment of a method of identifying defects in request processing operations.
- FIG. 7 illustrates a method of managing information received by batch capture into a system.
- a system monitors request processing operations and flags process defects (for example, a request that has become orphaned, stuck, or vanished from a processing queue.).
- the system uses knowledge of how a business process is expected to behave to how it is actually behaving to detect exception instances. In some cases, the system performs detection of such exception instances in real-time or near real-time. The system can detect individual process instances behaving unexpectedly as well as patterns across instance sets.
- the system maintains one set of information (for example, in a database) for requests that have been input to the system, and a second set of information for requests then being processed. The system may compare the two sets of information and identify differences between the sets of information.
- the system will compare the actual intake, aging, or completions to predicted values obtained through simulation and optimization. From the differences, the system may identify requests that have gone missing or stalled, the nature of the processing defect for each processing defect (for example, the reason the request stalled), and the consequences/effect of each defect. In some cases, the system reports defects to a user in real-time. In some cases, the system automatically recommends corrective action for processing defects.
- a mail/fax batch monitoring system provide batch level monitoring on all inbound client information received via mail or fax and processed through a batch capture system. Designated staff members may be notified upon detection of pre-defined events. Events that trigger alerts may include a batch reaching a designated threshold in which the batch is at risk for being untimely (in “jeopardy”).
- the system may provide end-to-end batch process traceability from the time of the scan or receipt of the fax to the release of the batch containing the document images to a document management system. Length of time to complete the mail/fax batch process (cycle time), work completed or claimed by staff (staff productivity), timeliness, arrival and completion volume, and other performance and process characteristics may be measured. Key performance indicators may be reported via dashboards, alerts, reports and other analytical tools.
- actions carried out by a person or group of persons (for example, agents at a contact center) or processes performed on a computing system are part of an enrollment or application process for an individual or group of individuals to receive a benefit.
- an individual seeking to enroll in a plan may, by way of a computer network, submit an application for enrollment in an insurance plan, request information about a plan, or make requests for information about a plan, submit information to support an application, or receive notifications relating to the plan.
- Agents or other service personnel perform actions relating to a benefit, such as handling contacts relating to enrollment requests, determining eligibility, and managing complaints and appeals.
- a system monitors processes and detects defects in processes relating to enrollment.
- client means, in the context of a provider of products or services, a person who has received products or services, who is receiving products or services, or is seeking to acquire products or services.
- Client includes a person seeking or receiving a benefit (for example, a government benefit such as a tax credit, access to a potential employer, or insurance coverage) or assistance.
- contact refers to a contact by client or other person. Examples of modes of contacts include inbound calls and web chat inquiries. Contacts may originate from any person or group, including customers, subscribers, purchasers, enrollees, potential enrollees, general citizens, providers, health plans, or others, including anonymous callers. “Contacts” also includes program information or health plan enrollment activities.
- FIG. 1 illustrates one embodiment of a processing tracking system connected to user devices over a network.
- System 100 includes process tracking and defect detection system 102 , user devices 104 , network 106 , document capture systems 108 , document management system 110 , and enrollment system 112 . Users (for example, an analyst, or management personnel) may access information from process tracking and defect detection system 102 by way of network 106 .
- Users for example, an analyst, or management personnel
- some or all of document capture systems 108 , document management system 110 , and enrollment system 112 may be connected to process tracking and defect detection system 102 by way of a network.
- Process tracking and defect detection system 102 may monitor, track, and report on processes carried out in document capture systems 108 , document management system 110 , and enrollment system 112 .
- process tracking and defect detection system 102 may track document processing from clients via document capture systems 108 and document management system 110 , and enrollment requests from clients made to enrollment system 112 .
- User devices 104 may be portable electronic devices. User devices 104 may be connected with one another and with process tracking and defect detection system 102 by way of network 106 . Examples of portable electronic devices 104 include a smart phone, a tablet computer, or a pager. User devices 104 may enable communication, task management, and reporting between one another and between other systems on network 106 .
- User devices 104 may be connected to the network over any suitable medium, such as electrical or optical cable, or via any suitable wireless standard such as IEEE 802.11 (“Wi-Fi”), IEEE 802.16 (“WiMax”), or cellular network.
- any suitable wireless standard such as IEEE 802.11 (“Wi-Fi”), IEEE 802.16 (“WiMax”), or cellular network.
- a system may in various embodiments have any number, and any of various types, of portable or fixed electronic devices.
- a system may in various embodiments have any number, and any of various types, of portable or fixed electronic devices.
- Process tracking and defect detection system 102 includes one or more processors 122 , system memory 124 , and data storage device 126 .
- Program instructions may be stored on system memory 124 .
- Processors 122 may access program instructions on system memory 124 .
- Processors 122 may access data storage device 126 .
- Users may be provided with information from workforce management system 102 by way of monitor 128 .
- Users interact with computer system 120 by way of I/O devices 130 .
- An I/O device 130 may be, for example, a keyboard or a mouse.
- Workforce management system 102 may include, or connect with, other devices 136 .
- Elements of computer system 120 may connect with other devices, such as computer systems in stores 104 , by way of network 106 and network 108 via network interface 132 .
- Network interface 132 may be, for example, a network interface card.
- process tracking and defect detection system 102 may include and may be implemented as multiple functional modules or components, with each module or component including one or more provider network resources (e.g., computing resources, storage resources, database resources, etc.).
- Process tracking and defect detection system 102 may include more or fewer components or modules, and a given module or component may be subdivided into two or more sub-modules or subcomponents. Also, two or more of the modules or components as shown can be combined.
- a system includes an imaging system for processing the forms and correspondence received by the Enrollment system by mail or fax.
- the related forms may include enrollment forms, disenrollment forms, transfer forms, good cause request forms, exemption/exclusion forms, fair hearing requests, surveys, and general correspondence.
- Forms are scanned into the imaging solution, classified by form type, linked to the appropriate case, client, and/or transaction, and data entered.
- the classification and linking steps may be accomplished automatically by the system. If a document is linked directly to a case and/or client or indirectly through another transaction that is linked to the case and/or client, it can be accessed later through the case-level document screen. All documents associated with a case and/or its members can be viewed from this screen.
- the imaging process may begin with a batch of documents being scanned into the system.
- the forms may include a barcode, which is associated with an outbound letter request.
- the Imaging system reads the barcode.
- the bar code information and other data pertaining to the image are captured; this is the image metadata.
- the Imaging system sends the image metadata and the image to a Document Management System (DMS).
- DMS Document Management System
- the DMS is the storage location for all images and the image metadata.
- the image metadata may be captured in a database with the corresponding location for the image.
- Envelope Control Number (ECN) and Document Control Number (DCN) assigned by the DMS may be part of the image metadata.
- ECN may be assigned to the entire envelope of documents.
- DCN may be assigned to the various documents within an envelope.
- the letter request ID is used to auto link the image to its associated case, case members or even specific transactions (for example, selection records).
- the letter type from the bar code may be used to classify the form and trigger workflow.
- Work flow tasks may be created based on the letter type workflow rules. Once the task is created, the users have the ability to claim and work these tasks.
- a Mail/Fax Batch process represents the imaging of envelopes/documents received as mail from a Post Office or electronically as faxes from the fax server. This process may be part of a document tracking parent process.
- the document tracking parent process may be made up of a Mail/Fax Batch process and a Mail/Fax Documents process.
- the Mail/Fax Batch process may end when a batch of document images is transmitted to a Document Management System (DMS), which may trigger the beginning of the Mail/Fax Documents process.
- DMS Document Management System
- a Mail/Fax Batch system may provide batch level monitoring on inbound client information received via mail or fax and processed through a batch-based capture system.
- a Mail/Fax Batch Module provides information on the following:
- a mail/fax batch system provides project management with actionable information through alerts.
- Designated staff members may be notified via email upon detection of defined events.
- Events that trigger alerts may include: when a batch reaches a designated threshold in which it is at risk for being untimely, or when a batch becomes untimely.
- the mail/fax batch system may provide end-to-end batch process traceability, (for example, from the time of the scan or receipt of the fax to the release of the batch containing the document images to the Document Management System). Alerts to project managers, supervisors, analysts or other project designated staff to be notified upon detection of defined events (for example, when batch is in jeopardy of being processes untimely).
- a system performs computations and generates graphical or tabular information about operations or processes, such as system performance, agent performance, agent efficiency, task management, workflow management, or defect detection. Information from computations performed by the system may be presented to users in the form of dashboards, reports, and alerts. In some embodiments, the system performs computations to perform an optimization, a simulation, or both.
- a mail/fax batch tracking system provides users with displays including key performance indicators, dashboards, alerts, reports and analytics. Examples of key performance indicators, dashboards, alerts, reports and analytics that may be included in a system in various embodiments are described below.
- a Mail/Fax Batches Dashboard provides a user with a snapshot of the current batch process metrics (inventory, arrival and completion volumes, cycle time, timeliness, productivity).
- This tab displays current summary information for monitoring batches
- FIG. 2 illustrates one embodiment of a dashboard panel display including a daily summary of mail/fax batch information.
- FIG. 3 illustrates one embodiment of a dashboard panel display including a weekly summary of mail/fax batch information.
- FIG. 4 illustrates one embodiment of a dashboard panel display including a summary of process cycle time and timeliness.
- FIG. 5 illustrates one embodiment of a dashboard panel display of a staff productivity panel.
- a batch intake report may display batch count subtotals received between two dates by:
- a batch inventory report may display the batches currently in inventory with the following data:
- a batch jeopardy report may display the batches currently in jeopardy with the following data:
- a batch cycle time report may display batch cycle times with the following data:
- a batch timeliness report may display batch cycle times with the following data:
- FIG. 6 illustrates one embodiment of a method of identifying defects in request processing operations.
- Process defects may include, in some embodiments, one or more of the request that has become orphaned, a request that has become stuck, or a request that has vanished from a processing queue.
- a request-made set of information including information about requests that have been made to a system is generated.
- an active-processing set of information is generated.
- the active-processing set of information may include information on requests then being processed.
- a comparison is made between the active-processing set of information and the request-made set of information.
- one or more process defects in the request processing operations are identified based on the comparison.
- one or more requests associated the identified defects is flagged.
- the nature of process defect, the reason for a stall or non-conformance in the request, or both, may be determined.
- corrective action is implemented in response to identification of the defect. Corrective action may be performed automatically by the system, manually, or both.
- FIG. 7 illustrates a method of managing information received by batch capture into a system.
- one or more untimeliness risk thresholds are set.
- the untimeliness thresholds may include criteria for when a batch is at risk for being untimely.
- the untimeliness risk events may include, in one embodiment, meeting or exceeding one of the untimeliness risk thresholds.
- inbound information received into a batch capture system is monitored.
- the system may determine work completed or claimed by a staff to a complete the one or more batch processes a length of time to a complete at least one of the one or more batch processes, a measure of timeliness for the batch process, and arrival and completion volume, and work completed or claimed by a staff to a complete the one or more batch processes. Key performance indicators for any or all of the batch processes may be displayed.
- one or more untimeliness events are detected.
- one or more alerts are sent.
- corrective action is performed in response to the untimeliness risk event.
- corrective action may be performed automatically by the system.
- a service provider provide services to participants by way of cloud computing resources.
- computation resources are rented or leased to customers of a service provider.
- services are provided to users at sites as software as a service (“SaaS”) or platform as a service (“Paas”). Services may be provided to each user on an on-demand basis.
- SaaS software as a service
- Paas platform as a service
- Networks employed in embodiments described herein may include any suitable data network or combination of networks that enable the exchange of information between electronic systems.
- networks 106 described in FIG. 1 may include one or more Local Area Networks (LANs) such as Ethernet networks, as well as Wide Area Networks (WANs), Metropolitan Area Networks (MANs), or other data or telecommunication networks implemented over any suitable medium, such as electrical or optical cable, or via any suitable wireless standard such as IEEE 802.11 (“Wi-Fi”), IEEE 802.16 (“WiMax”), etc.
- all or a portion of networks 106 may include the network infrastructure commonly referred to as the Internet.
- networks may be entirely contained within an enterprise and not directly accessible from the Internet.
- information may be exchanged over a virtual private network.
- information is exchanged over the internet, but encrypted in such a way to make a private network not accessible from the rest of the internet.
- Computer systems may, in various embodiments, include components such as a CPU with an associated memory medium such as Compact Disc Read-Only Memory (CD-ROM).
- the memory medium may store program instructions for computer programs.
- the program instructions may be executable by the CPU.
- Computer systems may further include a display device such as monitor, an alphanumeric input device such as keyboard, and a directional input device such as mouse.
- Computer systems may be operable to execute the computer programs to implement computer-implemented systems and methods.
- a computer system may allow access to users by way of any browser or operating system.
- Computer systems may include a memory medium on which computer programs according to various embodiments may be stored.
- the term “memory medium” is intended to include an installation medium, e.g., Compact Disc Read Only Memories (CD-ROMs), a computer system memory such as Dynamic Random Access Memory (DRAM), Static Random Access Memory (SRAM), Extended Data Out Random Access Memory (EDO RAM), Double Data Rate Random Access Memory (DDR RAM), Rambus Random Access Memory (RAM), etc., or a non-volatile memory such as a magnetic media, e.g., a hard drive or optical storage.
- the memory medium may also include other types of memory or combinations thereof.
- the memory medium may be located in a first computer, which executes the programs or may be located in a second different computer, which connects to the first computer over a network. In the latter instance, the second computer may provide the program instructions to the first computer for execution.
- a computer system may take various forms such as a personal computer system, mainframe computer system, workstation, network appliance, Internet appliance, personal digital assistant (“PDA”), television system or other device.
- PDA personal digital assistant
- the term “computer system” may refer to any device having a processor that executes instructions from a memory medium.
- the memory medium may store a software program or programs operable to implement embodiments as described herein.
- the software program(s) may be implemented in various ways, including, but not limited to, procedure-based techniques, component-based techniques, and/or object-oriented techniques, among others.
- the software programs may be implemented using ActiveX controls, C++ objects, JavaBeans, Microsoft Foundation Classes (MFC), browser-based applications (e.g., Java applets), traditional programs, or other technologies or methodologies, as desired.
- a CPU executing code and data from the memory medium may include a means for creating and executing the software program or programs according to the embodiments described herein.
- Suitable carrier media may include storage media or memory media such as magnetic or optical media, e.g., disk or CD-ROM, as well as signals such as electrical, electromagnetic, or digital signals, may be conveyed via a communication medium such as a network and/or a wireless link.
- a “communications network” refers to a system including one or more communication channels (for example, lines, satellite frequency, or radio waves) interconnecting one or more nodes (for example, servers, routers, computers, or communication devices).
- Examples of a “communications network” include the internet, a cellular telephone network, a local area network (LAN), or a wide area network (WAN).
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Quality & Reliability (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Educational Administration (AREA)
- General Engineering & Computer Science (AREA)
- Operations Research (AREA)
- Game Theory and Decision Science (AREA)
- Tourism & Hospitality (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Technology Law (AREA)
- Computing Systems (AREA)
- Biomedical Technology (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Mathematical Physics (AREA)
- Debugging And Monitoring (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A system monitors request processing operations and flags process defects (for example, a request that has become orphaned, stuck, or vanished from a processing queue.). The system uses knowledge of how a business process is expected to behave to how it is actually behaving to detect exception instances. The system can detect individual process instances behaving unexpectedly as well as patterns across instance sets. In some cases, the system maintains one set of information (for example, in a database) for requests that have been input to the system, and a second set of information for requests then being processed. The system may compare the two sets of information and identify differences between the sets of information.
Description
- This application is a divisional of U.S. patent application Ser. No. 14/502,783 entitled “PROCESS TRACKING AND DEFECT DETECTION” filed Sep. 30, 2014, which claims priority to U.S. Provisional Application Ser. No. 61/884,902 entitled “PROCESS TRACKING AND DEFECT DETECTION” filed Sep. 30, 2013, which is incorporated herein by reference in its entirety.
- The present invention relates to the field of client services. More particularly, the present invention relates to tracking processes arising from client requests and information submissions.
- Consumers, businesses, and other persons who receive products, services, and benefits from business and government entities must often submit requests or information submissions to the provider. For example, a person seeking to enroll in an insurance plan may need to request acceptance into the plan by way of an enrollment process, and submit documentation to establish eligibility for the insurance. Increasingly, such requests and submissions may be made by way of electronic communications, such as the internet.
- Responding to a request for a particular service, product, or benefit may be a complex process that takes time and involve many steps and interactions (such as, for example, applying for a government benefit). The amount of resources required (including computing, network, and/or staff) to handle the load may be difficult to predict and plan for. Moreover, defects may occur in processing that prevent or delay successful fulfillment of a request. For example, a request may become stalled or be lost from a processing queue. In addition, in cases where each of a large number of processes is carried out by multiple computer systems, over multiple channels of communication (for example, voice, web chat, and text), identifying and correcting defects, redundancies, snags, and inefficiencies in computer-implemented processes may be difficult or impossible to do in timely manner.
- Systems and methods of processing requests and for detecting and responding to defects in processes are disclosed. In an embodiment, a method of identifying defects in request processing operations includes generating, by a process tracking system implemented on one or more computer systems, a request-made set of information including information about requests that have been made to a system. Request processing operations in the system are monitored. Monitoring request processing operations includes generating an active-processing set of information in which the active-processing set of information includes information on requests then being processed. For at least one request made to the system, the active processing set of information is compared with the request-made set of information. Based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations are identified. At least one request associated with at least one of the identified defects is flagged.
- In an embodiment, a system includes one or more computer systems configured to implement a process tracking system. The process tracking system is configured to: generate a request-made set of information including information about requests that have been made to a system; monitor request processing operations in the system; identify, based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations; and flag at least one request associated with at least one of the identified defects. Monitoring request processing operations includes generating an active-processing set of information, wherein the active-processing set of information includes information on requests then being processed; and comparing, for at least one request made to the system, the active processing set of information with the request-made set of information.
- In an embodiment, a tangible, computer readable medium includes program instructions stored thereon that, when executed on one or more computers, cause the one or more computers to implement a process tracking system configured to: generate a request-made set of information including information about requests that have been made to a system; identify, based on the comparison between the active-processing set of information and the request-made set of information, one or more process defects in the request processing operations; and flag at least one request associated with at least one of the identified defects. Monitoring request processing operations in the system includes generating an active-processing set of information, wherein the active-processing set of information includes information on requests then being processed; and comparing, for at least one request made to the system, the active processing set of information with the request-made set of information.
- In an embodiment, a method of managing information received by batch capture into a system includes setting one or more untimeliness risk thresholds. The untimeliness thresholds include criteria for when a batch is at risk for being untimely. One or more untimeliness risk events are defined. At least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds. Inbound information received into a batch capture system by way of mail or facsimile transmission is monitored by the process tracking system. In response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons by the process tracking system.
- In an embodiment, a system includes one or more computer systems configured to implement a process tracking system. The process tracking system is configured to: set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely; define one or more untimeliness risk events, wherein at least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds; monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and send, in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
- In an embodiment, a tangible, computer readable medium includes program instructions stored thereon that, when executed on one or more computers, cause the one or more computers to implement a contact management system configured to: set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely; define one or more untimeliness risk events, wherein at least one of the untimeliness risk events includes meeting or exceeding at least one of the untimeliness risk thresholds; monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and send in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
-
FIG. 1 illustrates one embodiment of a process tracking and defect detection system for tracking a document submissions and enrollment. -
FIG. 2 illustrates one embodiment of a dashboard panel display including a daily summary of mail/fax batch information. -
FIG. 3 illustrates one embodiment of a dashboard panel display including a weekly summary of mail/fax batch information. -
FIG. 4 illustrates one embodiment of a dashboard panel display including a summary of process cycle time and timeliness. -
FIG. 5 illustrates one embodiment of a dashboard panel display of a staff productivity panel. -
FIG. 6 illustrates one embodiment of a method of identifying defects in request processing operations. -
FIG. 7 illustrates a method of managing information received by batch capture into a system. - While the invention is described herein by way of example for several embodiments and illustrative drawings, those skilled in the art will recognize that the invention is not limited to the embodiments or drawings described. It should be understood, that the drawings and detailed description thereto are not intended to limit the invention to the particular form disclosed, but on the contrary, the intention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the present invention as defined by the appended claims. The headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description or the claims. As used throughout this application, the word “may” is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words “include”, “including”, and “includes” mean including, but not limited to.
- In some embodiments, a system monitors request processing operations and flags process defects (for example, a request that has become orphaned, stuck, or vanished from a processing queue.). The system uses knowledge of how a business process is expected to behave to how it is actually behaving to detect exception instances. In some cases, the system performs detection of such exception instances in real-time or near real-time. The system can detect individual process instances behaving unexpectedly as well as patterns across instance sets. In some embodiments, the system maintains one set of information (for example, in a database) for requests that have been input to the system, and a second set of information for requests then being processed. The system may compare the two sets of information and identify differences between the sets of information. In some cases the system will compare the actual intake, aging, or completions to predicted values obtained through simulation and optimization. From the differences, the system may identify requests that have gone missing or stalled, the nature of the processing defect for each processing defect (for example, the reason the request stalled), and the consequences/effect of each defect. In some cases, the system reports defects to a user in real-time. In some cases, the system automatically recommends corrective action for processing defects.
- In some embodiments, a mail/fax batch monitoring system provide batch level monitoring on all inbound client information received via mail or fax and processed through a batch capture system. Designated staff members may be notified upon detection of pre-defined events. Events that trigger alerts may include a batch reaching a designated threshold in which the batch is at risk for being untimely (in “jeopardy”). The system may provide end-to-end batch process traceability from the time of the scan or receipt of the fax to the release of the batch containing the document images to a document management system. Length of time to complete the mail/fax batch process (cycle time), work completed or claimed by staff (staff productivity), timeliness, arrival and completion volume, and other performance and process characteristics may be measured. Key performance indicators may be reported via dashboards, alerts, reports and other analytical tools.
- In some embodiments, actions carried out by a person or group of persons (for example, agents at a contact center) or processes performed on a computing system are part of an enrollment or application process for an individual or group of individuals to receive a benefit. For example, an individual seeking to enroll in a plan may, by way of a computer network, submit an application for enrollment in an insurance plan, request information about a plan, or make requests for information about a plan, submit information to support an application, or receive notifications relating to the plan. Agents or other service personnel perform actions relating to a benefit, such as handling contacts relating to enrollment requests, determining eligibility, and managing complaints and appeals. In some embodiments, a system monitors processes and detects defects in processes relating to enrollment.
- As used herein, “client” means, in the context of a provider of products or services, a person who has received products or services, who is receiving products or services, or is seeking to acquire products or services. “Client” includes a person seeking or receiving a benefit (for example, a government benefit such as a tax credit, access to a potential employer, or insurance coverage) or assistance.
- As used herein, “contact” refers to a contact by client or other person. Examples of modes of contacts include inbound calls and web chat inquiries. Contacts may originate from any person or group, including customers, subscribers, purchasers, enrollees, potential enrollees, general citizens, providers, health plans, or others, including anonymous callers. “Contacts” also includes program information or health plan enrollment activities.
-
FIG. 1 illustrates one embodiment of a processing tracking system connected to user devices over a network.System 100 includes process tracking anddefect detection system 102,user devices 104,network 106,document capture systems 108,document management system 110, andenrollment system 112. Users (for example, an analyst, or management personnel) may access information from process tracking anddefect detection system 102 by way ofnetwork 106. In some embodiments, some or all ofdocument capture systems 108,document management system 110, andenrollment system 112 may be connected to process tracking anddefect detection system 102 by way of a network. - Process tracking and
defect detection system 102 may monitor, track, and report on processes carried out indocument capture systems 108,document management system 110, andenrollment system 112. For example, process tracking anddefect detection system 102 may track document processing from clients viadocument capture systems 108 anddocument management system 110, and enrollment requests from clients made toenrollment system 112. -
User devices 104 may be portable electronic devices.User devices 104 may be connected with one another and with process tracking anddefect detection system 102 by way ofnetwork 106. Examples of portableelectronic devices 104 include a smart phone, a tablet computer, or a pager.User devices 104 may enable communication, task management, and reporting between one another and between other systems onnetwork 106. -
User devices 104 may be connected to the network over any suitable medium, such as electrical or optical cable, or via any suitable wireless standard such as IEEE 802.11 (“Wi-Fi”), IEEE 802.16 (“WiMax”), or cellular network. - Although for illustrative purposes only a single notebook computer and a single portable electronic devices are shown in
FIG. 1 , a system may in various embodiments have any number, and any of various types, of portable or fixed electronic devices. In some embodiments, may be a fixed workstation (for example, a PC in the home of a participant). - Process tracking and
defect detection system 102 includes one ormore processors 122,system memory 124, anddata storage device 126. Program instructions may be stored onsystem memory 124.Processors 122 may access program instructions onsystem memory 124.Processors 122 may accessdata storage device 126. Users may be provided with information fromworkforce management system 102 by way ofmonitor 128. Users interact with computer system 120 by way of I/O devices 130. An I/O device 130 may be, for example, a keyboard or a mouse.Workforce management system 102 may include, or connect with, other devices 136. Elements of computer system 120 may connect with other devices, such as computer systems instores 104, by way ofnetwork 106 andnetwork 108 vianetwork interface 132.Network interface 132 may be, for example, a network interface card. - As illustrated in
FIG. 1 , process tracking anddefect detection system 102 may include and may be implemented as multiple functional modules or components, with each module or component including one or more provider network resources (e.g., computing resources, storage resources, database resources, etc.). Process tracking anddefect detection system 102 may include more or fewer components or modules, and a given module or component may be subdivided into two or more sub-modules or subcomponents. Also, two or more of the modules or components as shown can be combined. - In some embodiments, a system includes an imaging system for processing the forms and correspondence received by the Enrollment system by mail or fax. The related forms may include enrollment forms, disenrollment forms, transfer forms, good cause request forms, exemption/exclusion forms, fair hearing requests, surveys, and general correspondence. Forms are scanned into the imaging solution, classified by form type, linked to the appropriate case, client, and/or transaction, and data entered.
- Depending on the presence of a bar-code printed when the form was sent to the client, the classification and linking steps may be accomplished automatically by the system. If a document is linked directly to a case and/or client or indirectly through another transaction that is linked to the case and/or client, it can be accessed later through the case-level document screen. All documents associated with a case and/or its members can be viewed from this screen.
- The imaging process may begin with a batch of documents being scanned into the system. The forms may include a barcode, which is associated with an outbound letter request. When the form is scanned, the Imaging system reads the barcode. The bar code information and other data pertaining to the image are captured; this is the image metadata. Once all documents have been scanned, the Imaging system sends the image metadata and the image to a Document Management System (DMS). The DMS is the storage location for all images and the image metadata. The image metadata may be captured in a database with the corresponding location for the image.
- Once the DMS receives the image and image metadata, the DMS sends the necessary image metadata needed to trigger the processing of the forms. An Envelope Control Number (ECN) and Document Control Number (DCN) assigned by the DMS may be part of the image metadata. The ECN may be assigned to the entire envelope of documents. The DCN may be assigned to the various documents within an envelope.
- If the image has a bar code, the letter request ID is used to auto link the image to its associated case, case members or even specific transactions (for example, selection records). The letter type from the bar code may be used to classify the form and trigger workflow. Work flow tasks may be created based on the letter type workflow rules. Once the task is created, the users have the ability to claim and work these tasks.
- In some embodiments, a Mail/Fax Batch process represents the imaging of envelopes/documents received as mail from a Post Office or electronically as faxes from the fax server. This process may be part of a document tracking parent process. The document tracking parent process may be made up of a Mail/Fax Batch process and a Mail/Fax Documents process. The Mail/Fax Batch process may end when a batch of document images is transmitted to a Document Management System (DMS), which may trigger the beginning of the Mail/Fax Documents process.
- A Mail/Fax Batch system may provide batch level monitoring on inbound client information received via mail or fax and processed through a batch-based capture system. In one embodiment, a Mail/Fax Batch Module provides information on the following:
-
- Batches created (Intake)
- Batches released to the DMS (Completion)
- Batches created but not released to the DMS or cancelled (Inventory)
- Batches at risk of being processed untimely (Jeopardy)
- Length of time to complete the Mail/Fax Batch process (Cycle Time)
- Work completed or claimed by staff (Staff Productivity)
- Batch module data
- In some embodiments, a mail/fax batch system provides project management with actionable information through alerts. Designated staff members may be notified via email upon detection of defined events. Events that trigger alerts may include: when a batch reaches a designated threshold in which it is at risk for being untimely, or when a batch becomes untimely. The mail/fax batch system may provide end-to-end batch process traceability, (for example, from the time of the scan or receipt of the fax to the release of the batch containing the document images to the Document Management System). Alerts to project managers, supervisors, analysts or other project designated staff to be notified upon detection of defined events (for example, when batch is in jeopardy of being processes untimely).
- In some embodiments, a system performs computations and generates graphical or tabular information about operations or processes, such as system performance, agent performance, agent efficiency, task management, workflow management, or defect detection. Information from computations performed by the system may be presented to users in the form of dashboards, reports, and alerts. In some embodiments, the system performs computations to perform an optimization, a simulation, or both.
- In various embodiments, a mail/fax batch tracking system provides users with displays including key performance indicators, dashboards, alerts, reports and analytics. Examples of key performance indicators, dashboards, alerts, reports and analytics that may be included in a system in various embodiments are described below.
- Mail/Fax Batches Dashboard
- In some embodiments, a Mail/Fax Batches Dashboard provides a user with a snapshot of the current batch process metrics (inventory, arrival and completion volumes, cycle time, timeliness, productivity).
- Summary Tab: This tab displays current summary information for monitoring batches
- Tab Filters:
-
- Batch Class
- Batch Type
- 1. Daily Summary—This panel presents the following:
-
- Date/time of last batch received
- Number of batches received for current day
- Number of batches completed for current day
- Number of batches in inventory
- Link to Batch Inventory detail report
- Number of batches in jeopardy
- Link to Batch Jeopardy detail report
- Bar graph of batch inventory by age in business hours (y: batch count vs. x: hours. Bars colored green/yellow/red for timely/in jeopardy/untimely respectively).
-
FIG. 2 illustrates one embodiment of a dashboard panel display including a daily summary of mail/fax batch information. - 2. Weekly Summary—This panel presents the following:
-
- Line graph of batches received by day for the past two weeks (y: batch count vs. x: date).
- Link to Batches Received detail report
- Line graph of batches completed by day for the past two weeks (y: batch count vs. x: date).
- Link to Batches Completed detail report
-
FIG. 3 illustrates one embodiment of a dashboard panel display including a weekly summary of mail/fax batch information. - 3. Process Cycle Time & Timeliness Summary—This panel presents the following:
-
- Cumulative percentage of batches completed timely for the current month
- Control chart of the average cycle time of batches completed by day for a rolling 10 business day period. (y: hours vs. x: day with yellow/red jeopardy/timeliness thresholds respectively.)
- Link to Batch Timeliness detail report
- Link to Batch Cycle Time detail report
- Productivity Tab: This tab displays current summary information for monitoring batches
- Tab Filters:
-
- Batch Class
- Batch Type
- Operator
-
FIG. 4 illustrates one embodiment of a dashboard panel display including a summary of process cycle time and timeliness. - 4. Staff Productivity—This panel displays the following
-
- Table of users/operators with batches claimed and completed by activity
- Link to Staff Productivity detail report
-
FIG. 5 illustrates one embodiment of a dashboard panel display of a staff productivity panel. - Reports
- Batch Intake Report
- A batch intake report may display batch count subtotals received between two dates by:
-
- Date
- Batch Class
- Batch Type
- Drill into detail on any data point
- Report Prompts:
-
- Date Range (Required, Default: previous two week period)
- Batch Class
- Batch Type
- Batch Completions
- The purpose of this report is to provide leadership with detailed batch completion information
- Tabular report that displays batch count subtotals completed between two dates by:
-
- Date
- Batch Class
- Batch Type
- Drill into detail on data points
- Report Prompts:
-
- Date Range (Required, Default: previous two week period)
- Batch Class
- Batch Type
- Batch Inventory Report
- A batch inventory report may display the batches currently in inventory with the following data:
-
- Batch Create Date
- Batch Class (grouped)
- Batch Type (grouped)
- Batch Status (grouped)
- Age in business hours
- Age in business days
- Drill into detail on data points
- Report Prompts:
-
- Age Range in Business Days (from # days to # days)
- Batch Jeopardy Report
- A batch jeopardy report may display the batches currently in jeopardy with the following data:
-
- Batch Class (grouped)
- Batch Type (grouped)
- Batch Status (grouped)
- Scan Date
- Age in business hours
- Age in business days
- Drill into detail on data points
- Report Prompts:
- Age Range in Business Days (from # days to # days)
- Batch Cycle Time Report
- A batch cycle time report may display batch cycle times with the following data:
-
- Batch Create Date
- Batch Class (grouped)
- Batch Type (grouped)
- Batch Cycle Time
- Report Prompts:
-
- Batch Class
- Batch Type
- Batch Timeliness Report
- A batch timeliness report may display batch cycle times with the following data:
-
- Batch Create Date
- Batch Class (grouped)
- Batch Type (grouped)
- Batch Timeliness Status
- Report Prompts:
-
- Batch Class
- Batch Type
-
FIG. 6 illustrates one embodiment of a method of identifying defects in request processing operations. Process defects may include, in some embodiments, one or more of the request that has become orphaned, a request that has become stuck, or a request that has vanished from a processing queue. - At 200, a request-made set of information including information about requests that have been made to a system is generated.
- At 202, an active-processing set of information is generated. The active-processing set of information may include information on requests then being processed.
- At 204, a comparison is made between the active-processing set of information and the request-made set of information. At 206, one or more process defects in the request processing operations are identified based on the comparison.
- At 208, one or more requests associated the identified defects is flagged. The nature of process defect, the reason for a stall or non-conformance in the request, or both, may be determined. In some embodiments, corrective action is implemented in response to identification of the defect. Corrective action may be performed automatically by the system, manually, or both.
-
FIG. 7 illustrates a method of managing information received by batch capture into a system. At 220, one or more untimeliness risk thresholds are set. The untimeliness thresholds may include criteria for when a batch is at risk for being untimely. - At 222, one or more untimeliness risk events are defined. The untimeliness risk events may include, in one embodiment, meeting or exceeding one of the untimeliness risk thresholds.
- At 224, inbound information received into a batch capture system (for example, by way of mail or facsimile transmission) is monitored. For each batch process, the system may determine work completed or claimed by a staff to a complete the one or more batch processes a length of time to a complete at least one of the one or more batch processes, a measure of timeliness for the batch process, and arrival and completion volume, and work completed or claimed by a staff to a complete the one or more batch processes. Key performance indicators for any or all of the batch processes may be displayed.
- At 226, one or more untimeliness events are detected. At 228, in response to detection of one or more of the untimeliness risk events, one or more alerts are sent.
- At 230, corrective action is performed in response to the untimeliness risk event. In some embodiments, corrective action may be performed automatically by the system.
- In some embodiments, a service provider provide services to participants by way of cloud computing resources. In some embodiments, computation resources are rented or leased to customers of a service provider. In certain embodiments, services are provided to users at sites as software as a service (“SaaS”) or platform as a service (“Paas”). Services may be provided to each user on an on-demand basis.
- Networks employed in embodiments described herein may include any suitable data network or combination of networks that enable the exchange of information between electronic systems. For example,
networks 106 described inFIG. 1 may include one or more Local Area Networks (LANs) such as Ethernet networks, as well as Wide Area Networks (WANs), Metropolitan Area Networks (MANs), or other data or telecommunication networks implemented over any suitable medium, such as electrical or optical cable, or via any suitable wireless standard such as IEEE 802.11 (“Wi-Fi”), IEEE 802.16 (“WiMax”), etc. In various embodiments, all or a portion ofnetworks 106 may include the network infrastructure commonly referred to as the Internet. In other embodiments, networks may be entirely contained within an enterprise and not directly accessible from the Internet. In certain embodiments, information may be exchanged over a virtual private network. In one embodiment, information is exchanged over the internet, but encrypted in such a way to make a private network not accessible from the rest of the internet. - Computer systems may, in various embodiments, include components such as a CPU with an associated memory medium such as Compact Disc Read-Only Memory (CD-ROM). The memory medium may store program instructions for computer programs. The program instructions may be executable by the CPU. Computer systems may further include a display device such as monitor, an alphanumeric input device such as keyboard, and a directional input device such as mouse. Computer systems may be operable to execute the computer programs to implement computer-implemented systems and methods. A computer system may allow access to users by way of any browser or operating system.
- Computer systems may include a memory medium on which computer programs according to various embodiments may be stored. The term “memory medium” is intended to include an installation medium, e.g., Compact Disc Read Only Memories (CD-ROMs), a computer system memory such as Dynamic Random Access Memory (DRAM), Static Random Access Memory (SRAM), Extended Data Out Random Access Memory (EDO RAM), Double Data Rate Random Access Memory (DDR RAM), Rambus Random Access Memory (RAM), etc., or a non-volatile memory such as a magnetic media, e.g., a hard drive or optical storage. The memory medium may also include other types of memory or combinations thereof. In addition, the memory medium may be located in a first computer, which executes the programs or may be located in a second different computer, which connects to the first computer over a network. In the latter instance, the second computer may provide the program instructions to the first computer for execution. A computer system may take various forms such as a personal computer system, mainframe computer system, workstation, network appliance, Internet appliance, personal digital assistant (“PDA”), television system or other device. In general, the term “computer system” may refer to any device having a processor that executes instructions from a memory medium.
- The memory medium may store a software program or programs operable to implement embodiments as described herein. The software program(s) may be implemented in various ways, including, but not limited to, procedure-based techniques, component-based techniques, and/or object-oriented techniques, among others. For example, the software programs may be implemented using ActiveX controls, C++ objects, JavaBeans, Microsoft Foundation Classes (MFC), browser-based applications (e.g., Java applets), traditional programs, or other technologies or methodologies, as desired. A CPU executing code and data from the memory medium may include a means for creating and executing the software program or programs according to the embodiments described herein.
- Various embodiments may also include receiving or storing instructions and/or data implemented in accordance with the foregoing description upon a carrier medium. Suitable carrier media may include storage media or memory media such as magnetic or optical media, e.g., disk or CD-ROM, as well as signals such as electrical, electromagnetic, or digital signals, may be conveyed via a communication medium such as a network and/or a wireless link.
- As used herein, a “communications network” refers to a system including one or more communication channels (for example, lines, satellite frequency, or radio waves) interconnecting one or more nodes (for example, servers, routers, computers, or communication devices). Examples of a “communications network” include the internet, a cellular telephone network, a local area network (LAN), or a wide area network (WAN).
- Further modifications and alternative embodiments of various aspects of the invention may be apparent to those skilled in the art in view of this description. Accordingly, this description is to be construed as illustrative only and is for the purpose of teaching those skilled in the art the general manner of carrying out the invention. It is to be understood that the forms of the invention shown and described herein are to be taken as embodiments. Elements and materials may be substituted for those illustrated and described herein, parts and processes may be reversed, and certain features of the invention may be utilized independently, all as would be apparent to one skilled in the art after having the benefit of this description of the invention. Methods may be implemented manually, in software, in hardware, or a combination thereof. The order of any method may be changed, and various elements may be added, reordered, combined, omitted, modified, etc. Changes may be made in the elements described herein without departing from the spirit and scope of the invention as described in the following claims.
Claims (17)
1. A method of managing information received by batch capture into a system, comprising:
setting one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely;
defining one or more untimeliness risk events, wherein at least one of the untimeliness risk events comprises meeting or exceeding at least one of the untimeliness risk thresholds;
monitoring, by a process tracking system implemented on one or more computer systems, inbound information received into a batch capture system by way of mail or facsimile transmission; and
sending, by the process tracking system, in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
2. The method of claim 1 , further comprising tracing, for at least one document in a batch, processing of the batch from the time of scan or receipt of the document to release of a document image to a document management system.
3. The method of claim 1 , further comprising determining, for one or more batch processes for the inbound information, a length of time to a complete at least one of the one or more batch processes.
4. The method of claim 1 , further comprising determining, for one or more batch processes for the inbound information, a work completed or claimed by a staff to be complete of the one or more batch processes.
5. The method of claim 1 , further comprising determining, for one or more batch processes for the inbound information, a measure of timeliness for the one or more batch processes.
6. The method of claim 1 , further comprising determining, for one or more batch processes for the inbound information, arrival and completion volume for the one or more batch processes.
7. The method of claim 1 , further comprising displaying one or more key performance indicators for at least one batch process.
8. The method of claim 1 , further comprising performing at least one corrective action in response to an untimeliness risk event.
9. A system, comprising:
one or more computer systems configured to implement a process tracking system, wherein the process tracking system is configured to:
set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely;
define one or more untimeliness risk events, wherein at least one of the untimeliness risk events comprises meeting or exceeding at least one of the untimeliness risk thresholds;
monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and
send, in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
10. The system of claim 9 , wherein the process tracking system is configured to trace, for at least one document in a batch, processing of the batch from the time of scan or receipt of the document to release of a document image to a document management system.
11. The system of claim 9 , wherein the process tracking system is configured to determine, for one or more batch processes for the inbound information, a length of time to a complete at least one of the one or more batch processes.
12. The system of claim 9 , wherein the process tracking system is configured to determine, for one or more batch processes for the inbound information, a work completed or claimed by a staff to be complete the one or more batch processes.
13. The system of claim 9 , wherein the process tracking system is configured to determine, for one or more batch processes for the inbound information, a measure of timeliness for the one or more batch processes.
14. The system of claim 9 , wherein the process tracking system is configured to determine, for one or more batch processes for the inbound information, arrival and completion volume for the one or more batch processes.
15. The system of claim 9 , wherein the process tracking system is configured to display one or more key performance indicators for at least one batch process.
16. The system of claim 9 , wherein the process tracking system is configured to perform at least one corrective action in response to an untimeliness risk event.
17. A tangible, computer readable medium comprising program instructions stored thereon, wherein the program instructions, when executed on one or more computers, cause the one or more computers to implement a process tracking system configured to:
set one or more untimeliness risk thresholds, wherein the untimeliness thresholds comprise criteria for when a batch is at risk for being untimely;
define one or more untimeliness risk events, wherein at least one of the untimeliness risk events comprises meeting or exceeding at least one of the untimeliness risk thresholds;
monitor inbound information received into a batch capture system by way of mail or facsimile transmission; and
send in response to detection of one or more of the untimeliness risk events, one or more alerts to one or more persons.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/452,589 US20190318294A1 (en) | 2013-09-30 | 2019-06-26 | Process tracking and defect detection |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361884902P | 2013-09-30 | 2013-09-30 | |
US14/502,783 US10380518B2 (en) | 2013-09-30 | 2014-09-30 | Process tracking and defect detection |
US16/452,589 US20190318294A1 (en) | 2013-09-30 | 2019-06-26 | Process tracking and defect detection |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/502,783 Division US10380518B2 (en) | 2013-09-30 | 2014-09-30 | Process tracking and defect detection |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190318294A1 true US20190318294A1 (en) | 2019-10-17 |
Family
ID=51871264
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/502,783 Active 2038-02-18 US10380518B2 (en) | 2013-09-30 | 2014-09-30 | Process tracking and defect detection |
US16/452,589 Abandoned US20190318294A1 (en) | 2013-09-30 | 2019-06-26 | Process tracking and defect detection |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/502,783 Active 2038-02-18 US10380518B2 (en) | 2013-09-30 | 2014-09-30 | Process tracking and defect detection |
Country Status (3)
Country | Link |
---|---|
US (2) | US10380518B2 (en) |
GB (1) | GB2535373A (en) |
WO (1) | WO2015048789A2 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10380518B2 (en) | 2013-09-30 | 2019-08-13 | Maximus | Process tracking and defect detection |
US11030697B2 (en) | 2017-02-10 | 2021-06-08 | Maximus, Inc. | Secure document exchange portal system with efficient user access |
Family Cites Families (118)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5951300A (en) | 1997-03-10 | 1999-09-14 | Health Hero Network | Online system and method for providing composite entertainment and health information |
EP1526472A3 (en) | 1995-02-13 | 2006-07-26 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6021202A (en) | 1996-12-20 | 2000-02-01 | Financial Services Technology Consortium | Method and system for processing electronic documents |
US6915254B1 (en) | 1998-07-30 | 2005-07-05 | A-Life Medical, Inc. | Automatically assigning medical codes using natural language processing |
US6507826B1 (en) * | 1999-01-29 | 2003-01-14 | Koriel, Inc. | Remote electronic invoice entry and validation system and method therefor |
US20010047283A1 (en) | 2000-02-01 | 2001-11-29 | Melick Bruce D. | Electronic system for identification, recording, storing, and retrieving material handling equipment records and certifications |
US6711253B1 (en) | 2000-02-04 | 2004-03-23 | Avaya Technology Corp. | Method and apparatus for analyzing performance data in a call center |
AUPQ599700A0 (en) | 2000-03-03 | 2000-03-23 | Super Internet Site System Pty Ltd | On-line geographical directory |
US20040009461A1 (en) | 2000-04-24 | 2004-01-15 | Snyder Jonathan Scott | System for scheduling classes and managing eductional resources |
US7606778B2 (en) | 2000-06-12 | 2009-10-20 | Previsor, Inc. | Electronic predication system for assessing a suitability of job applicants for an employer |
US7587368B2 (en) | 2000-07-06 | 2009-09-08 | David Paul Felsher | Information record infrastructure, system and method |
US20020019741A1 (en) | 2000-07-07 | 2002-02-14 | Heston Robert L. | Method and system for performing legal services over the internet |
US6647269B2 (en) | 2000-08-07 | 2003-11-11 | Telcontar | Method and system for analyzing advertisements delivered to a mobile unit |
US7464036B1 (en) | 2000-10-03 | 2008-12-09 | Peopleclick, Inc. | Methods, systems, and computer program products for selecting a job post site to which a job opening description may be posted by ranking job post sites based on one or more selection criterion |
AUPR454001A0 (en) | 2001-04-20 | 2001-05-24 | Careers Fast Track Pty Ltd | Interactive learning and career management system |
US20020169718A1 (en) | 2001-05-09 | 2002-11-14 | Alsofrom Daniel D. | System for improving the payment of child support to a payee parent |
CA2447096C (en) | 2001-05-17 | 2018-06-12 | Bay Bridge Decision Technologies, Inc. | System and method for generating forecasts and analysis of contact center behavior for planning purposes |
US7051145B2 (en) * | 2001-12-10 | 2006-05-23 | Emulex Design & Manufacturing Corporation | Tracking deferred data transfers on a system-interconnect bus |
US7523505B2 (en) | 2002-08-16 | 2009-04-21 | Hx Technologies, Inc. | Methods and systems for managing distributed digital medical data |
US20040064330A1 (en) | 2002-09-30 | 2004-04-01 | Keelan Matthew Bruce | Method and apparatus for screening applicants for employer incentives/tax credits |
US7974857B1 (en) | 2002-12-12 | 2011-07-05 | Accenture Global Services Limited | Unemployment insurance management |
US7376957B1 (en) * | 2002-12-16 | 2008-05-20 | At&T Delaware Intellectual Property, Inc. | Method and system for recovering stranded outbound messages |
US7233938B2 (en) | 2002-12-27 | 2007-06-19 | Dictaphone Corporation | Systems and methods for coding information |
US8185747B2 (en) | 2003-05-22 | 2012-05-22 | Access Security Protection, Llc | Methods of registration for programs using verification processes with biometrics for fraud management and enhanced security protection |
US7730543B1 (en) | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
US7937333B2 (en) * | 2003-09-19 | 2011-05-03 | Pitney Bowes Inc. | System and method for facilitating refunds of unused postage |
US20050086075A1 (en) | 2003-10-15 | 2005-04-21 | Healthcare Finance Solutions, Inc. | Benefit management |
US20050129212A1 (en) | 2003-12-12 | 2005-06-16 | Parker Jane S. | Workforce planning system incorporating historic call-center related data |
US7539297B2 (en) | 2003-12-19 | 2009-05-26 | At&T Intellectual Property I, L.P. | Generation of automated recommended parameter changes based on force management system (FMS) data analysis |
US20050135601A1 (en) | 2003-12-19 | 2005-06-23 | Whitman Raymond Jr. | Force management automatic call distribution and resource allocation control system |
US8711732B2 (en) | 2004-05-27 | 2014-04-29 | Richard G. Johnson | Synthesized interoperable communications |
WO2006002687A2 (en) | 2004-06-30 | 2006-01-12 | Swiss Reinsurance Company | Method and system for automated location-dependent recognition of flood risks |
US7254837B2 (en) | 2004-07-13 | 2007-08-07 | Fields Daniel M | Apparatus and method for storing and distributing encrypted digital content |
US20060161464A1 (en) | 2004-11-09 | 2006-07-20 | Green Joseph S | Method and system for web-based organizational reporting management |
JP2006146679A (en) * | 2004-11-22 | 2006-06-08 | Hitachi Ltd | Control method for information processor, information processor and program |
US20060143228A1 (en) | 2004-12-29 | 2006-06-29 | Xy Concepts, Llc | System and method for selecting qualified job applicants |
WO2006086555A2 (en) | 2005-02-08 | 2006-08-17 | Massey, Susan, G. | Method and system for reducing dependent eligibility fraud in healthcare programs |
US7895060B1 (en) | 2006-02-03 | 2011-02-22 | Quest Diagnostics Investments, Inc. | Systems and methods for administration of prescription drug benefits |
US7720791B2 (en) | 2005-05-23 | 2010-05-18 | Yahoo! Inc. | Intelligent job matching system and method including preference ranking |
US8429527B1 (en) | 2005-07-12 | 2013-04-23 | Open Text S.A. | Complex data merging, such as in a workflow application |
US20070198296A1 (en) | 2006-02-21 | 2007-08-23 | Visiontree Software, Inc. | Patient health management portal |
US8112298B2 (en) | 2006-02-22 | 2012-02-07 | Verint Americas, Inc. | Systems and methods for workforce optimization |
US8868660B2 (en) * | 2006-03-22 | 2014-10-21 | Cellco Partnership | Electronic communication work flow manager system, method and computer program product |
US8539493B1 (en) * | 2006-03-23 | 2013-09-17 | Emc Corporation | Configurable prioritization and aging of queued tasks |
US8811597B1 (en) | 2006-09-07 | 2014-08-19 | Avaya Inc. | Contact center performance prediction |
US8938063B1 (en) | 2006-09-07 | 2015-01-20 | Avaya Inc. | Contact center service monitoring and correcting |
US8032396B2 (en) | 2006-09-25 | 2011-10-04 | Aetna Inc. | System and method for offering and guaranteeing renewal of suspendable healthcare benefits |
US20080103828A1 (en) | 2006-11-01 | 2008-05-01 | Squilla John R | Automated custom report generation system for medical information |
US8401886B2 (en) | 2006-11-06 | 2013-03-19 | Genpact Limited | Optimized call center operations method and system |
US20080133513A1 (en) | 2006-11-30 | 2008-06-05 | Trinity Alliance Corporation | Systems and Methods for Providing, Accessing and Returning Results on Advertising and Service Opportunities |
US8799049B2 (en) | 2007-01-11 | 2014-08-05 | Intuit Inc. | System and method for forecasting contact volume |
US7853546B2 (en) | 2007-03-09 | 2010-12-14 | General Electric Company | Enhanced rule execution in expert systems |
JP4437500B2 (en) | 2007-03-20 | 2010-03-24 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Technology that manages data in association with tag information |
US8457544B2 (en) | 2008-12-19 | 2013-06-04 | Xerox Corporation | System and method for recommending educational resources |
US20090113427A1 (en) | 2007-10-25 | 2009-04-30 | Glenn Brady | Program Management Effectiveness |
US8300823B2 (en) | 2008-01-28 | 2012-10-30 | Netapp, Inc. | Encryption and compression of data for storage |
US20100076835A1 (en) | 2008-05-27 | 2010-03-25 | Lawrence Silverman | Variable incentive and virtual market system |
US20090307052A1 (en) | 2008-06-04 | 2009-12-10 | Accenture Global Services Gmbh | Workforce planning system, method and tool |
US8694351B2 (en) | 2008-09-03 | 2014-04-08 | Centurylink Intellectual Property Llc | System and method for an audit tool for communications service providers |
US8315370B2 (en) | 2008-12-29 | 2012-11-20 | Genesys Telecommunications Laboratories, Inc. | System for scheduling routing rules in a contact center based on forcasted and actual interaction load and staffing requirements |
US8185430B2 (en) | 2009-01-30 | 2012-05-22 | Bank Of America Corporation | Supplier stratification |
US20100211516A1 (en) | 2009-02-19 | 2010-08-19 | Maximus | Method and system for matching employers with job-seeking individuals |
US20100228563A1 (en) | 2009-03-08 | 2010-09-09 | Walker Jr Samuel E | System and method for preventing health care fraud |
US8214238B1 (en) | 2009-04-21 | 2012-07-03 | Accenture Global Services Limited | Consumer goods and services high performance capability assessment |
US8180773B2 (en) | 2009-05-27 | 2012-05-15 | International Business Machines Corporation | Detecting duplicate documents using classification |
WO2011031776A1 (en) | 2009-09-08 | 2011-03-17 | Lawrence Jason Berger | Education monitoring |
US20110082777A1 (en) | 2009-10-06 | 2011-04-07 | Chess Steven M | Timekeeping Computer System with Image Capture and Quick View |
US20110112879A1 (en) | 2009-11-07 | 2011-05-12 | Jason Fama | Method and apparatus to manage a workforce |
US20110191115A1 (en) | 2009-11-12 | 2011-08-04 | Zalam Adnan A | Integrated health care management system |
US20110119197A1 (en) | 2009-11-18 | 2011-05-19 | Jason Turchin | Legal communications management mobile application |
US8615741B2 (en) | 2009-12-24 | 2013-12-24 | International Business Machines Corporation | Software defect tracking |
EP2354968A1 (en) | 2009-12-30 | 2011-08-10 | Tim Frey | Hyperadapter and method for accessing documents in a document base |
US8355926B1 (en) | 2010-02-08 | 2013-01-15 | Accenture Global Services Limited | Health and life sciences medicaid high performance capability assessment |
US8527452B2 (en) | 2010-02-18 | 2013-09-03 | International Business Machines Corporation | Construction of rules for use in a complex event processing system |
US20110218885A1 (en) | 2010-03-08 | 2011-09-08 | Sarah Manski | System and method for supply chain and relationship mapping |
US20110295623A1 (en) | 2010-05-26 | 2011-12-01 | Hartford Fire Insurance Company | System and method for workers compensation data processing and tracking |
US10521813B2 (en) | 2010-07-06 | 2019-12-31 | Groupon, Inc. | System and method for incentives |
US8724797B2 (en) | 2010-08-26 | 2014-05-13 | Satmap International Holdings Limited | Estimating agent performance in a call routing center system |
US9299266B2 (en) | 2010-09-24 | 2016-03-29 | Lexia Learning Systems Llc | System for performing assessment without testing |
US8396204B2 (en) | 2010-10-09 | 2013-03-12 | Hewlett-Packard Development Company, L.P. | Call center resource allocation |
US8300797B1 (en) | 2010-10-29 | 2012-10-30 | Sprint Communications Company L.P. | Global view of performance management in a diverse call center environment |
US8566204B2 (en) | 2010-11-01 | 2013-10-22 | Mary Joan Willard | Method for detecting ineligibility of a beneficiary and system |
US8978006B2 (en) | 2011-04-06 | 2015-03-10 | Media Direct, Inc. | Systems and methods for a mobile business application development and deployment platform |
US9367813B2 (en) | 2011-10-28 | 2016-06-14 | Xerox Corporation | Methods and systems for identifying frequently occurring intradomain episodes and interdomain episodes in multiple service portals using average user session length |
US9390228B2 (en) | 2011-10-31 | 2016-07-12 | Reid Consulting Group, Inc. | System and method for securely storing and sharing information |
US20130159017A1 (en) | 2011-12-16 | 2013-06-20 | James E. Burkholder | Method and system for verifying a user's healthcare benefits |
US20130211856A1 (en) | 2012-01-11 | 2013-08-15 | Enovation, Llc | Systems and methods for generating outcome measures |
US20130185087A1 (en) | 2012-01-17 | 2013-07-18 | Richard Merkin | Medical history database |
US20130191185A1 (en) | 2012-01-24 | 2013-07-25 | Brian R. Galvin | System and method for conducting real-time and historical analysis of complex customer care processes |
US9026550B2 (en) | 2012-01-30 | 2015-05-05 | Siemens Aktiengesellschaft | Temporal pattern matching in large collections of log messages |
US8488769B1 (en) | 2012-04-24 | 2013-07-16 | Noble Systems Corporation | Non-scheduled training for an agent in a call center |
US8965830B2 (en) | 2012-05-17 | 2015-02-24 | Xerox Corporation | Systems and methods for self-adaptive episode mining under the threshold using delay estimation and temporal division |
US8768847B2 (en) | 2012-06-21 | 2014-07-01 | Microsoft Corporation | Privacy enhancing personal data brokerage service |
US20160012561A1 (en) | 2014-07-10 | 2016-01-14 | Lexisnexis Risk Solutions Fl Inc. | Systems and Methods for Detecting Identity Theft of a Dependent |
US20140058927A1 (en) | 2012-08-27 | 2014-02-27 | Leaf Holdings, Inc. | System and method of a provider management system |
US20140074834A1 (en) | 2012-09-13 | 2014-03-13 | Transparent Io, Inc. | Storage Block Metadata Tagger |
US9563663B2 (en) | 2012-09-28 | 2017-02-07 | Oracle International Corporation | Fast path evaluation of Boolean predicates |
US9912813B2 (en) | 2012-11-21 | 2018-03-06 | Genesys Telecommunications Laboratories, Inc. | Graphical user interface with contact center performance visualizer |
EP2736002A1 (en) | 2012-11-22 | 2014-05-28 | Baden-Württemberg Stiftung gGmbH | Method, system and computer program product for enforcing access to event attributes of event streams in a complex event processing system |
US8787552B1 (en) | 2013-01-31 | 2014-07-22 | Xerox Corporation | Call center issue resolution estimation based on probabilistic models |
US20140211931A1 (en) | 2013-01-31 | 2014-07-31 | North American Communications Resources, Inc. | System and Method for Generating and Delivering Automated Reports Concerning the Performance of a Call Center |
US20140278573A1 (en) | 2013-03-15 | 2014-09-18 | State Farm Mutual Automobile Insurance Company | Systems and methods for initiating insurance processing using ingested data |
US20140289147A1 (en) | 2013-03-21 | 2014-09-25 | Alicia Jordan HAFF | System and method for calculating employee eligibility of health care benefits |
US10019297B2 (en) * | 2013-04-03 | 2018-07-10 | Salesforce.Com, Inc. | Systems and methods for implementing bulk handling in asynchronous processing |
US20140365440A1 (en) | 2013-06-05 | 2014-12-11 | Avaya Inc. | High availability snapshot core |
US11336770B2 (en) | 2013-06-07 | 2022-05-17 | Mattersight Corporation | Systems and methods for analyzing coaching comments |
US20150019451A1 (en) | 2013-07-09 | 2015-01-15 | Sap Ag | Decision basis for benefits program |
US9589244B2 (en) | 2013-09-30 | 2017-03-07 | Maximus, Inc. | Request process optimization and management |
WO2015048787A1 (en) | 2013-09-30 | 2015-04-02 | Maximus, Inc. | Contact center system with efficiency analysis tools |
US10380518B2 (en) | 2013-09-30 | 2019-08-13 | Maximus | Process tracking and defect detection |
US9280678B2 (en) | 2013-12-02 | 2016-03-08 | Fortinet, Inc. | Secure cloud storage distribution and aggregation |
US20160048758A1 (en) | 2014-01-15 | 2016-02-18 | Stanley Victor CAMPBELL | System and method for persistent evidence based multi-ontology context dependent eligibility assessment and feature scoring |
US20150356250A1 (en) | 2014-06-04 | 2015-12-10 | Polimeni Medical Infromation Technologies, Llc | Method for an Interactive, Patient Controlled Medical Information System in a Digital, Real Time Manner which Features a Single Point of Entry for Patients, Physicians, all other Health Care Providers, Health Care Payers, Researchers and Pharmaceutical Companies |
US9449187B2 (en) | 2014-08-11 | 2016-09-20 | Document Dynamics, Llc | Environment-aware security tokens |
US20160239931A1 (en) | 2015-01-31 | 2016-08-18 | Maximus, Inc. | Ensuring program integrity in benefit systems |
US11030697B2 (en) | 2017-02-10 | 2021-06-08 | Maximus, Inc. | Secure document exchange portal system with efficient user access |
US20180232487A1 (en) | 2017-02-10 | 2018-08-16 | Maximus, Inc. | Document classification tool for large electronic files |
US20180232493A1 (en) | 2017-02-10 | 2018-08-16 | Maximus, Inc. | Case-level review tool for physicians |
-
2014
- 2014-09-30 US US14/502,783 patent/US10380518B2/en active Active
- 2014-09-30 GB GB1607562.4A patent/GB2535373A/en not_active Withdrawn
- 2014-09-30 WO PCT/US2014/058431 patent/WO2015048789A2/en active Application Filing
-
2019
- 2019-06-26 US US16/452,589 patent/US20190318294A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
WO2015048789A2 (en) | 2015-04-02 |
WO2015048789A3 (en) | 2015-10-29 |
US10380518B2 (en) | 2019-08-13 |
GB201607562D0 (en) | 2016-06-15 |
US20150095072A1 (en) | 2015-04-02 |
GB2535373A (en) | 2016-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11121885B2 (en) | Data analysis system and method for predicting meeting invitees | |
US20190034854A1 (en) | Systems and methods involving features of sales force processing and/or productivity | |
US10599670B2 (en) | Performance estimation system utilizing a data analytics predictive model | |
US8868660B2 (en) | Electronic communication work flow manager system, method and computer program product | |
US20190295018A1 (en) | Methods for processing information associated with sales force management, customer relationship management and professional services management systems | |
US10223659B2 (en) | Methods and system for integrating social media analysis into an enterprise project management system | |
US20150154524A1 (en) | Methods for processing information associated with sales force management, customer relationship management and professional services management systems | |
US9589244B2 (en) | Request process optimization and management | |
US9614961B2 (en) | Contact center system with efficiency analysis tools | |
US20080288322A1 (en) | Methods and systems for project management | |
US20080222286A1 (en) | Computer Usage Monitoring | |
US11093902B2 (en) | Systems and methods for absentee management | |
US10740536B2 (en) | Dynamic survey generation and verification | |
US20150170228A1 (en) | Customer feedback system | |
US20120035977A1 (en) | Enterprise Consumer Complaints Program | |
US20150106128A1 (en) | System and method to facilitate a communication interface between insurance agent and underwriter devices | |
US20180165767A1 (en) | System and method utilizing threshold priority values for a risk relationship management platform | |
US20190318294A1 (en) | Process tracking and defect detection | |
US20210004766A1 (en) | Determining and maintaining organizational project participant compliance | |
US20090018952A1 (en) | System and method for prospecting and processing loan applications | |
US20220391818A1 (en) | Next best action recommendation system for stochastic timeline | |
US20130041712A1 (en) | Emerging risk identification process and tool | |
US20220253771A1 (en) | System and method of processing data from multiple sources to project future resource allocation | |
Djedović et al. | Optimization of the business processes via automatic integration with the document management system | |
US20210056587A1 (en) | System and method for enhanced website visitor notifications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., DELAWARE Free format text: NOTICE OF GRANT OF SECURITY INTEREST IN UNITED STATES PATENTS;ASSIGNOR:MAXIMUS, INC.;REEL/FRAME:056447/0772 Effective date: 20210528 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |