System and computer implemented method of personal monitoring
First Claim
1. A computer implemented method of personal monitoring comprising the steps of:
- determining if a user is responsive;
if the determination is negative, performing, on a computer, a number of responsive actions;
wherein said step of determining if a user is responsive includes the steps of;
allowing said user to engage in a number of on-line activities;
determining, on a computer, if said user engaged in on-line activities;
if said determination that said user engaged in on-line activities is negative, then performing, on a computer, a number of responsive actions;
wherein said step of allowing a user to engage in a number of on-line activities includes;
initializing a personal monitoring module, said monitoring module structured to monitor external on-line activity; and
allowing said user to engage in a number of on-line activities external to said personal monitoring module;
wherein said step of determining, on a computer, if said user engaged in on-line activities includes the step of checking said user'"'"'s on-line activities external to said personal monitoring module;
allowing said user to identify a proxy;
alerting said proxy of the lack of on-line activities by the user;
requesting a response from a proxy;
if said proxy responds, then identifying said response as an on-line activity;
allowing said user to identify a number of scripted actions, including a number of primary actions and a number of secondary actions;
allowing said user to establish a proxy response time;
requesting a proxy response within said proxy response time;
determining if a proxy response has been provided within said proxy response time; and
if no proxy response has been provided within said user response time, then performing, on a computer, the secondary actions identified by the user.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and computer implemented method of personal monitoring is provided. The method includes allowing a user to engage in a number of on-line activities, determining, on a computer, if the user engaged in on-line activities, and if the determination is negative, then performing, on a computer, a number of responsive actions. The system and method further provide for an investigation of external modules; that is, the system and method investigate external sites such as, but not limited to, social networks, forums, weblogs (blogs), that are not associated with the personal monitoring module. The system and method further allow a proxy to respond for the user.
-
Citations
1 Claim
-
1. A computer implemented method of personal monitoring comprising the steps of:
-
determining if a user is responsive; if the determination is negative, performing, on a computer, a number of responsive actions; wherein said step of determining if a user is responsive includes the steps of; allowing said user to engage in a number of on-line activities; determining, on a computer, if said user engaged in on-line activities; if said determination that said user engaged in on-line activities is negative, then performing, on a computer, a number of responsive actions; wherein said step of allowing a user to engage in a number of on-line activities includes; initializing a personal monitoring module, said monitoring module structured to monitor external on-line activity; and allowing said user to engage in a number of on-line activities external to said personal monitoring module; wherein said step of determining, on a computer, if said user engaged in on-line activities includes the step of checking said user'"'"'s on-line activities external to said personal monitoring module; allowing said user to identify a proxy; alerting said proxy of the lack of on-line activities by the user; requesting a response from a proxy; if said proxy responds, then identifying said response as an on-line activity; allowing said user to identify a number of scripted actions, including a number of primary actions and a number of secondary actions; allowing said user to establish a proxy response time; requesting a proxy response within said proxy response time; determining if a proxy response has been provided within said proxy response time; and if no proxy response has been provided within said user response time, then performing, on a computer, the secondary actions identified by the user.
-
Specification