SYSTEMS AND METHODS OF USING WIRELESS LOCATION, CONTEXT, AND/OR ONE OR MORE COMMUNICATION NETWORKS FOR MONITORING FOR, PREEMPTING, AND/OR MITIGATING PRE-IDENTIFIED BEHAVIOR
First Claim
1. A system for monitoring for, preempting, and/or mitigating pre-identified behavior, the system comprising a plurality of devices and/or sensors configured to:
- determine, through one or more communications networks, a location of a person and/or a context of the person at the location;
predict and evaluate a risk of a pre-identified behavior by the person in relation to the location and/or the context; and
facilitate one or more actions and/or activities to mitigate the risk of the pre-identified behavior, if any, and/or react to the pre-identified behavior, if any, by the person.
1 Assignment
0 Petitions
Accused Products
Abstract
Exemplary embodiments are disclosed of systems and methods of using location, context, and/or one or more communication networks for monitoring for, preempting, and/or mitigating pre-identified behavior. For example, exemplary embodiments disclosed herein may include involuntarily, automatically, and/or wirelessly monitoring/mitigating undesirable behavior (e.g., addiction related undesirable behavior, etc.) of a person (e.g., an addict, a parolee, a user of a system, etc.). In an exemplary embodiment, a system generally includes a plurality of devices and/or sensors configured to determine, through one or more communications networks, a location of a person and/or a context of the person at the location; predict and evaluate a risk of a pre-identified behavior by the person in relation to the location and/or the context; and facilitate one or more actions and/or activities to mitigate the risk of the pre-identified behavior, if any, and/or react to the pre-identified behavior, if any, by the person.
-
Citations
31 Claims
-
1. A system for monitoring for, preempting, and/or mitigating pre-identified behavior, the system comprising a plurality of devices and/or sensors configured to:
-
determine, through one or more communications networks, a location of a person and/or a context of the person at the location; predict and evaluate a risk of a pre-identified behavior by the person in relation to the location and/or the context; and facilitate one or more actions and/or activities to mitigate the risk of the pre-identified behavior, if any, and/or react to the pre-identified behavior, if any, by the person. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for monitoring for, preempting, and/or mitigating pre-identified behavior, the method comprising:
-
determining, via one or more devices and/or sensors across one or more communications networks, a location of a person and/or a context of the person at the location; predicting and evaluating a risk of a pre-identified behavior by the person in relation to the location and/or the context; and facilitating one or more actions and/or activities to mitigate the risk of the pre-identified behavior, if any, and/or react to the pre-identified behavior, if any, by the person. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A non-transitory computer-readable storage media comprising computer-executable instructions for monitoring for, preempting, and/or mitigating pre-identified behavior, which when executed by at least one processor, cause the at least one processor to:
-
determine, via one or more devices and/or sensors across one or more communications networks, a location of a person and/or a context of the person at the location; predict and evaluate a risk of a pre-identified behavior by the person in relation to the location and/or the context; and facilitate one or more actions and/or activities to mitigate the risk of the pre-identified behavior, if any, and/or react to the pre-identified behavior, if any, by the person. - View Dependent Claims (31)
-
Specification