×

System and computer implemented method of personal monitoring

  • US 9,467,521 B2
  • Filed: 04/02/2014
  • Issued: 10/11/2016
  • Est. Priority Date: 04/02/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method of personal monitoring comprising the steps of:

  • determining if a user is responsive;

    if the determination is negative, performing, on a computer, a number of responsive actions;

    wherein said step of determining if a user is responsive includes the steps of;

    allowing said user to engage in a number of on-line activities;

    determining, on a computer, if said user engaged in on-line activities;

    if said determination that said user engaged in on-line activities is negative, then performing, on a computer, a number of responsive actions;

    wherein said step of allowing a user to engage in a number of on-line activities includes;

    initializing a personal monitoring module, said monitoring module structured to monitor external on-line activity; and

    allowing said user to engage in a number of on-line activities external to said personal monitoring module;

    wherein said step of determining, on a computer, if said user engaged in on-line activities includes the step of checking said user'"'"'s on-line activities external to said personal monitoring module;

    allowing said user to identify a proxy;

    alerting said proxy of the lack of on-line activities by the user;

    requesting a response from a proxy;

    if said proxy responds, then identifying said response as an on-line activity;

    allowing said user to identify a number of scripted actions, including a number of primary actions and a number of secondary actions;

    allowing said user to establish a proxy response time;

    requesting a proxy response within said proxy response time;

    determining if a proxy response has been provided within said proxy response time; and

    if no proxy response has been provided within said user response time, then performing, on a computer, the secondary actions identified by the user.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×