Patents by Inventor David D. TADA
David D. TADA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10509890Abstract: A device for using rules in the processing of information includes a first interface that allows for secure communications, a first database, a second database, a second interface that allows for secure communications, and a detection component implemented at least partially in hardware, the first interface connecting to the first database, the first database connecting to the detection component, the second database connecting to the detection component, the second interface connecting to the detection component, the second database including a plurality of rule libraries, each rule library, of the plurality of rule libraries, storing a set of related rules, and a plurality of rule engines, each rule engine, of the plurality of rule engines, corresponding to a rule library, of the plurality of libraries, and the detection component including a rule selector, and a rule applicator to apply a selected rule to information.Type: GrantFiled: September 14, 2015Date of Patent: December 17, 2019Assignee: Verizon Patent and Licensing Inc.Inventors: John H. Van Arkel, James J. Wagner, Corrine L. Schweyen, Saralyn M. Mahone, David D. Tada, Terrill J. Curtis, Scott Hagins
-
Patent number: 10467379Abstract: A device may identify information associated with other devices, generate a first value for one or more indicators associated with the information, process, based on providing the information to a rules engine corresponding to a library of rules including the rule and receiving, from the rules engine and based on providing the information to the rules engine, information associated with a second value the information using a rule to generate the second value based on combining the first value with one or more third values, and output information regarding the second value to determine how to process the information.Type: GrantFiled: August 31, 2015Date of Patent: November 5, 2019Assignee: Verizon Patent and Licensing Inc.Inventors: John H. Van Arkel, James J. Wagner, Corrine L. Schweyen, Saralyn M. Mahone, David D. Tada, Terrill J. Curtis, Scott Hagins
-
Patent number: 10372878Abstract: A system for providing secure communications may include a management system to receive first information, the first information being received via a first secure connection, analyze the received information to form analyzed information, and provide the analyzed information, a processor device to receive the analyzed information, the analyzed information being received via a second secure connection between the processor device and the management system, and perform an action based on the analyzed information, and a clearinghouse device to receive second information, the second information being received via a third secure connection between the clearinghouse device and each provider device of a plurality of provider devices, process the second information to form the first information, and provide the first information to the management system via the first secure connection.Type: GrantFiled: August 27, 2015Date of Patent: August 6, 2019Assignee: Verizon Patent and Licensing Inc.Inventors: John H. Van Arkel, James J. Wagner, Corrine L. Schweyen, Saralyn M. Mahone, David D. Tada, Terrill J. Curtis, Scott Hagins
-
Publication number: 20160004826Abstract: A device for using rules in the processing of information includes a first interface that allows for secure communications, a first database, a second database, a second interface that allows for secure communications, and a detection component implemented at least partially in hardware, the first interface connecting to the first database, the first database connecting to the detection component, the second database connecting to the detection component, the second interface connecting to the detection component, the second database including a plurality of rule libraries, each rule library, of the plurality of rule libraries, storing a set of related rules, and a plurality of rule engines, each rule engine, of the plurality of rule engines, corresponding to a rule library, of the plurality of libraries, and the detection component including a rule selector, and a rule applicator to apply a selected rule to information.Type: ApplicationFiled: September 14, 2015Publication date: January 7, 2016Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS
-
Publication number: 20150370978Abstract: A device may identify information associated with other devices, generate a first value for one or more indicators associated with the information, process, based on providing the information to a rules engine corresponding to a library of rules including the rule and receiving, from the rules engine and based on providing the information to the rules engine, information associated with a second value the information using a rule to generate the second value based on combining the first value with one or more third values, and output information regarding the second value to determine how to process the information.Type: ApplicationFiled: August 31, 2015Publication date: December 24, 2015Inventors: John H. Van Arkel, James J. Wagner, Corrine L. Schweyen, Saralyn M. Mahone, David D. Tada, Terrill J. Curtis, Scott Hagins
-
Publication number: 20150363557Abstract: A system for providing secure communications may include a management system to receive first information, the first information being received via a first secure connection, analyze the received information to form analyzed information, and provide the analyzed information, a processor device to receive the analyzed information, the analyzed information being received via a second secure connection between the processor device and the management system, and perform an action based on the analyzed information, and a clearinghouse device to receive second information, the second information being received via a third secure connection between the clearinghouse device and each provider device of a plurality of provider devices, process the second information to form the first information, and provide the first information to the management system via the first secure connection.Type: ApplicationFiled: August 27, 2015Publication date: December 17, 2015Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS
-
Publication number: 20130006657Abstract: A healthcare fraud management system receives healthcare claims information associated with a particular entity, and receives historical healthcare information associated with the particular entity. The healthcare fraud management system also performs data mining techniques on the historical healthcare information to produce data mining information associated with the particular entity. The healthcare fraud management system generates reports, associated with the particular entity, based on the healthcare claims information, the historical healthcare information, and the data mining information, and outputs the generated reports to a clearinghouse or a claims processor.Type: ApplicationFiled: June 28, 2012Publication date: January 3, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS
-
Publication number: 20130006655Abstract: A healthcare fraud management system is configured to store multiple rules for detecting healthcare fraud, receive a healthcare claim involving a provider and a beneficiary, and obtain other healthcare fraud information associated with the provider or the beneficiary. The healthcare fraud management system is further configured to select rules, from the multiple rules, based on information associated with the claim, information associated with the provider or the beneficiary, and the other healthcare fraud information. The healthcare fraud management system is also configured to process the healthcare claim using the selected rules to generate a fraud score, and output, prior to payment of the healthcare claim, information regarding the fraud score to a clearinghouse or a claims processor to assist the clearinghouse or the claims processor in determining whether to accept, deny, or review the healthcare claim.Type: ApplicationFiled: June 28, 2012Publication date: January 3, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS
-
Publication number: 20130006656Abstract: A healthcare fraud management system receives healthcare claims associated with a particular entity, selects rules, from a plurality of rules for detecting healthcare fraud, based on information associated with the healthcare claims, and processes the healthcare claims using the selected rules to generate alarms. The healthcare fraud management system prioritizes, based on the generated alarms, healthcare information associated with the particular entity in relation to healthcare information associated with other entities. The healthcare fraud management system provides for display, prior to payment of the healthcare claims, the prioritized healthcare information associated with the particular entity and the other entities.Type: ApplicationFiled: June 28, 2012Publication date: January 3, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS
-
Publication number: 20130006668Abstract: A healthcare fraud management system receives healthcare claims, performs data reduction on information associated with the healthcare claims, and processes the reduced information associated with the healthcare claims by using a plurality of rules. The system also generates alarms, for the healthcare claims, based on the processing of the reduced information associated with the healthcare claims, generates scores for the alarms based on one or more predictive modeling rules, and prioritizes the healthcare claims, to create a list of prioritized healthcare claims, based on the generated scores for the alarms corresponding to the healthcare claims. The system further outputs, prior to payment of the healthcare claims, the list of the prioritized healthcare claims to a clearinghouse or a claims processor to assist the clearinghouse or the claims processor in determining whether to accept, deny, or review the healthcare claims.Type: ApplicationFiled: June 28, 2012Publication date: January 3, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS