Aegis Inc | Date: 2014-11-25
Systems and methods are provided enabling context information, such as a current speed of travel, to be transmitted between a context source, such as a vehicle, and a mobile device. Illustratively, the mobile device may be configured to utilize context information to enforce context-based restrictions on the mobile device, such as to restrict non-emergency functionality of the device when travelling above a threshold speed. Specifically, embodiments of the present application enable context information to be encoded within service data, and transmitted to the mobile device without requiring an established connection (e.g., a pairing) between the mobile device and the context source. For example, specific context information may be encoded into a service identifier, and transmitted within a service record to the mobile device. The mobile device may then decode the context information from the service identifier to determine a context, e.g., for use in context-based policy enforcement.
Mayo Foundation For Medical Education And Research and Aegis Inc | Date: 2015-09-28
Navigation and tissue capture systems and methods for navigation to and/or capture of selected tissue using the innate electrical activity of the selected tissue and/or other tissue are described. In the context of left atrial appendage closure, the systems and methods can be used to navigate to the left atrial appendage and capture/control the appendage while a closure instrument (suture, clip, ring) is placed over the appendage and tightened down or a closure method (ablation, cryogenic procedures, stapling, etc.) is performed to close the left atrial appendage. The use of innate electrical activity for navigating devices may be used in connection with other tissues and/or areas of the body.
Aegis Inc | Date: 2014-02-28
Aspects of the present disclosure correspond to the utilization of criteria for distinguishing between temporary changes to mobile communication device movement state in determining whether a mobile communication device context has changed. A mobile communication device can be configured to manage one or more aspects of functionality of the mobile communication device based on a mobile communication device context. At some point, the mobile communication device can determine a transition to a substantially stationary state. Rather than immediately transitioning the mobile communication device context, the mobile communication device can define a period of time in which additional changes to the mobile communication device movement state can be detected. Accordingly, if the mobile communication device movement state transitions again to a non-stationary movement state within the guard period, the mobile communication device context remains in the non-stationary movement state and never transitions.
Aegis Inc and Mayo Foundation For Medical Education And Research | Date: 2015-11-25
Systems and methods capture and/or occlusion of selected body tissue using various tissue characteristics and/or techniques are described. In the context of left atrial appendage closure, the systems and methods can be used to capture the left atrial appendage while a closure instrument (suture, clip, ring, etc.) is placed over the appendage and tightened down or a closure method (ablation, cryogenic procedures, stapling, etc.) is performed to close the left atrial appendage.
Aegis Inc | Date: 2014-09-18
Systems, methods and interfaces are disclosed for restricting functionality of protected mobile communication devices. Protected mobile communication devices may generally include mobile communication devices that do not allow applications to directly restrict the mobile communication devices functionalities, such as call reception or access to a standard user interface. Specifically, a mobile application can monitor the context of the mobile communication device to determine whether the device is in one of three states: inactive; active and locked; or active and under the applications control. When the device enters the active and locked state, the mobile application can ensure that unlocking the device places the device under the applications control. Further, when the device is under the applications control, the mobile application can ensure that leaving the applications control places the device in a locked state. The device can therefore be restricted to functionality provided under these three states.