Controlled Resources Based on Good Behavior

ABSTRACT

Computing system resources are controlled based on the behavioral attributes associated with users of the computing system. These behavioral attributes are monitored in real time and through a historical log, and behavioral attributes that fall outside pre-determined preferred behavioral parameters are detected. Access by the computing system user to computing system resources contained in a preferred and habitually accessed computing system resource set associated with the computing system user are adjusted in response to the detection of the behavioral attribute outside the pre-determined preferred behavioral parameters.

FIELD OF THE INVENTION

The present invention relates to behavior monitoring and modification.

BACKGROUND OF THE INVENTION

Behavioral choices both at work and outside the workplace can affect thehealth and productivity of employees. The health and productivity ofemployees are important to employers and can be related to costs, forexample, in terms of lost productivity and healthcare costs. Healthyemployees save an employer money on health insurance premiums and lostdays of productivity as illnesses and work absences result fromunhealthy life style choices. For example, diabetes and heart diseasehave resultant costs that are paid for by patients, employers andgovernments. In certain situations, healthier lifestyle choices canreduce or even eliminated many of these costs. Diabetes, for example,affected 24 million in 2008, according to the CDC. This represents anincrease of nearly 3 million people since 2006. That same year thedisease killed approximately 72,000 people. Heart disease, which killedover 800,000 people in 2006, according to the CDC, affects about 80million Americans and is primarily caused by poor diet and lack ofexercise over a lifetime.

In an attempt to reduce these costs and to encourage healthierbehavioral choices among employees, companies have developed incentivesystems for living a lifestyle that is deemed healthier. For example,health rebates can be awarded for going to the gym and eating a healthydiet. Other systems have also been implemented to award good userbehavior. For example, insurance companies reduce regular payments if acustomer does not smoke and participates in regular exercise. Forcertain companies, employees contribute a portion of their own healthinsurance through premiums, co-pays, and deductibles. Since the 1996Health Insurance Portability and Accountability Act, allows employers todifferentiate premiums based on an employee behaviors, which can berepresented, for example, by weight, blood pressure, cholesterol levels,and smoking. Incentive programs that provide rewards to employees,however, can be too expensive for companies or do not provide sufficientmotivation to encourage good behavior.

Additional low costs or no cost stimulus programs are desired forencouraging healthy behavior are desired. Various methods exist toaddress good behavior without spending large sums of money like puttingnames on boards and giving symbolic, i.e., inexpensive, presents.Similar types of awards are used by parents and teachers, for example,allowing children and students to participate in fun activities as areward for good behavior. But this kind of awards is not applicable toadults. Therefore, low or no cost incentives to encourage healthierbehavioral choices in adults both at work and outside the workplace aredesired.

SUMMARY OF THE INVENTION

Systems and methods in accordance with exemplary embodiment of thepresent invention reward good or preferred behavior by controllingaccess to computer and network, e.g., internet, resources available toemployees. Employees demonstrating good behavior such as desiredworkstation ergonomics and participation in regular exercise areallocated more central processor unit (CPU) power and faster networkaccess. These extra perks that workers receive do not result insignificant additional costs to the company, because the additionalresources being provided are already available within the computingsystem of the company. Existing resources are reallocated based onpreferred or good behavior, and new resources do not have to added. Inone embodiment, a visual monitoring system such as a video systemobserves a work station, and that data generated are user to determineif the posture of the worked in that work station includes a straightback, a keyboard located lower than the desk top and eyes directedparallel to the floor. If deviation from pre-defined preferredbehavioral parameters covering worker posture is detected, then accessby that use to computing system resources is adjusted or throttled. Forexample, the processing of user commands that involve central processingunit (CPU) and network resource usage is decreased. In addition, thatworked is provided with a visual prompt, for example using a graphicaluser interface on the computer monitor or the user, indicating thebehavioral parameters that are outside the desired ranges as well assteps to be taken to return those behavioral parameters to the desiredrange, e.g., by correcting posture.

This reallocation or redistribution of resources does not imposed costson the company for additional resources or reward. Employees will adopthealthier behaviors and will be more productive at work, resulting in animproved workforce. The actions employees take to increase theirresource usage could also be used during employee evaluation. Employeesthat are allocated less CPU and network resources would also have anassociated reduction in productivity and would receive an associatedlower rating. Therefore, employees are encouraged to maintain healthybehaviors through monitoring and informing users regarding theseunhealthy behaviors.

In accordance with one exemplary embodiment, the present invention isdirected to a method for controlling computing system resources based onbehavioral attributes of users of the computing system. Real timebehavioral attributes of a computing system user are monitored.Monitoring real time behavioral attributes includes monitoring currentphysical attributes associated with the computing system user. Thesecurrent physical attributes include heart rate, respiration rate, eyemovement, posture, work station ergonomics, length of time sitting,elapsed time on a given task, elapsed time since last break andcombinations thereof. Monitoring of the physical attributes includes theuse of video image capture devices, audio capture devices, pressuresensors, temperature sensors, biometric monitoring devices andcombinations thereof. Monitoring of the real time behavioral attributesfurther also includes monitoring access to computing systemapplications, participation in computing system or network based games,access to social networking websites, access to non-work relatedwebsites and combinations thereof.

The method detects least one behavioral attribute outside pre-determinedpreferred behavioral parameters. In one embodiment, a log of cumulativehistorical behavioral attributes for the computing system user ismaintained, and detecting the behavioral attribute includes detecting atleast one behavioral attribute in at least one of the real timebehavioral attributes and the cumulative historical behavioralattributes. These cumulative historical behavioral attributes includehabitual exercise routines, preventative health care visits, adherenceto prescribed medical treatments, participation in professionalmeetings, continuing education, work attendance record, employeeevaluations, participation in charitable works, attending to familyobligations, participation in civic organizations and combinationsthereof.

Access by the computing system user to computing system resourcescontained in a preferred computing system resource set associated withthe computing system user is adjusted in response to the detection ofthe behavioral attribute outside the pre-determined preferred behavioralparameters. The preferred computing system resource set includes apreferred and habitually accessed computing system resource set.Adjusting access by the computing system user to computing systemresources includes decreasing allocation of central processor unitpower, decreasing available network bandwidth and combinations thereof.In one embodiment, decreasing central processor unit power isaccomplished by modifying the priority of jobs associated with thecomputing system user, launching additional jobs to occupy centralprocessor unit power and combinations thereof. Adjusting access by thecomputing system user to computing system resources also includesdenying access to computing system applications, denying access tocomputing system based games, denying access to websites, denying accessto social media sites and combinations thereof.

In one embodiment, visual indication is provided to the computing systemuser regarding the behavioral attributes that are outside thepre-determined preferred behavioral parameters and regarding correctivemeasures to be taken to return the behavioral attributes to within thepre-determined preferred behavioral parameters. Access by the computingsystem user to the computing system resources is returned topre-adjustment levels upon completion of the corrective measures by thecomputing system user. In one embodiment, the preferred computing systemresource set associated with the computing system user is created bylogging accesses to computing system applications, accesses to computingsystem or network based games, accesses to social networking websitesand accesses to websites and determining computing system resources toinclude in the preferred computing system resource set based onfrequency and duration of the logged accesses. When the real timebehavioral attributes are maintained within the pre-determined preferredbehavioral parameters, allocation of central processor unit power andavailable network bandwidth are increased and access to computing systemapplications, access to computing system based games, access to websitesand access to social media sites are granted.

The present invention is also directed to a method for controllingcomputing system resources based on behavioral attributes of users ofthe computing system, by monitoring the real time behavioral attributesof each computing system user in a pre-defined team containing aplurality of computing system users. The method of claim 19, wherein thestep of monitoring real time behavioral attributes further comprisesmonitoring comprise heart rate, respiration rate, eye movement, posture,work station ergonomics, length of time sitting, elapsed time on a giventask, elapsed time since last break, access to computing systemapplications, participation in computing system or network based games,access to social networking websites, access to non-work relatedwebsites or combinations thereof. An aggregate behavioral attributescore is determined for the pre-defined team using the monitored realtime behavioral attributes. In one embodiment, a log of cumulativehistorical behavioral attributes for each computing system user, and thelog of cumulative historical behavioral attributes for each computingsystem user is included in the aggregate behavioral attribute score.These cumulative historical behavioral attributes include habitualexercise routines, preventative health care visits, adherence toprescribed medical treatments, participation in professional meetings,continuing education, work attendance record, employee evaluations,participation in charitable works, attending to family obligations,participation in civic organizations and combinations thereof.

The aggregate behavioral attribute score is detected as being outsidepre-determined preferred behavioral parameters. Then access by allcomputing system users in the pre-defined team to computing systemresources contained in a preferred computing system resource setassociated with the pre-defined team is adjusted in response to thedetection of the aggregate behavioral attribute score outside thepre-determined preferred behavioral parameters. Adjusting access by thecomputing system users to computing system resources includes decreasingallocation of central processor unit power, decreasing available networkbandwidth, denying access to computing system applications, denyingaccess to computing system based games, denying access to websites,denying access to social media sites and combinations thereof. In oneembodiment, visual indication is provided to the computing system usersregarding the aggregate behavioral attribute score outside thepre-determined preferred behavioral parameters and regarding correctivemeasures to be taken to return aggregate behavioral attribute scorewithin the pre-determined preferred behavioral parameters. Access by thecomputing system user to the computing system resources is returned topre-adjustment levels upon completion of the corrective measures by thecomputing system users.

The present invention is also directed to a computing system having aplurality of monitors to obtain data related to real time behavioralattributes of a computing system user. The plurality of monitorsincludes video image capture devices, audio capture devices, pressuresensors, temperature sensors, biometric monitoring devices andcombinations thereof. In one embodiment, the plurality of monitors isconfigured to log accesses to computing system applications,participation in computing system or network based games, accesses tosocial networking websites, accesses to non-work related websites andcombinations thereof. The data related to real time behavioral includeheart rate, respiration rate, eye movement, posture, work stationergonomics, length of time sitting, elapsed time on a given task,elapsed time since last break, video data, audio data, visited websites,executed computing programs, executed computing system or networkedbased games, social networking websites and combinations thereof.

A monitoring module is provided in communication with the plurality ofmonitors to receive real time behavioral attributes data. A behavioralattribute analysis module is included in communication with themonitoring module to detect at least one behavioral attribute outsidepre-determined preferred behavioral parameters based on the receivedreal time behavioral attributed data. In one embodiment, the computingsystem includes a cumulative behavioral attribute module incommunication with the behavioral attribute analysis module to obtaincumulative historical behavioral attributes for the computing systemuser. A cumulative behavioral attribute database stores a log of thecumulative historical behavioral attributes, and the behavioralattribute analysis module detects at least one behavioral attributeoutside pre-determined preferred behavioral parameters based on at leastone of the received real time behavioral attributed data and the log ofthe cumulative historical behavioral attributes. The log of cumulativehistorical behavioral attributes includes habitual exercise routines,preventative health care visits, adherence to prescribed medicaltreatments, participation in professional meetings, continuingeducation, work attendance record, employee evaluations, participationin charitable works, attending to family obligations, participation incivic organizations and combinations thereof.

An access control module is included in communication with thebehavioral attribute analysis module and computing system resourcesutilized by the computing system user to adjust computing systemresources contained in a preferred computing system resource setassociated with the computing system user in response to an indicationfrom the behavioral attribute analysis module regarding the detection ofthe behavioral attribute outside the pre-determined preferred behavioralparameters. The access control module decreases allocation of centralprocessor unit power, decreases available network bandwidth andcombinations thereof. In one embodiment, the access control moduledecreases central processor unit power by modifying priority of jobsassociated with the computing system user, launching additional jobs tooccupy central processor unit power and combinations thereof. In oneembodiment, the access control module prohibits access to computingsystem applications, prohibits access to computing system based games,prohibits access to websites, prohibits access to social media sites andcombinations thereof.

The computing system also includes a graphical user interface to providevisual indication to the computing system user of the behavioralattributes that are outside the pre-determined preferred behavioralparameters and of corrective measures to be taken to return thebehavioral attributes within the pre-determined preferred behavioralparameters. In one embodiment, the behavioral attribute analysis moduledetermines completion of the corrective measures by the computing systemuser, and the access control module returns access by the computingsystem user to the computing system resources to pre-adjustment levelsupon completion of the corrective measures by the computing system user.A computing system resource access monitor is provided in communicationwith computing system resources to log accesses to computing systemapplications, accesses to computing system or network based games,accesses to social networking websites and accesses to websites by thecomputing system user, to identify preferred computing system resourcesbased on frequency and duration of the logged accesses and to create thepreferred computing system resource set associated with the computingsystem user. A preferred data resource data base in communication withthe computing system resource monitor and the access control modulestores the preferred computing system resource set. In one embodiment,the behavioral attribute analysis module detects when the real timebehavioral attributes are maintained within the pre-determined preferredbehavioral parameters, and the access control module increasesallocation of central processor unit power, increases available networkbandwidth, grants access to computing system applications, grants accessto computing system based games, grants access to websites, grantsaccess to social media sites and combinations thereof.

The present invention is also directed to a computing system containinga plurality of monitors to obtain data related to real time behavioralattributes of each computing system user in a pre-defined teamcomprising a plurality of computing system users. The plurality ofmonitors includes video image capture devices, audio capture devices,pressure sensors, temperature sensors, biometric monitoring devices,monitors configured to log accesses to computing system applications,monitors configured to log participation in computing system or networkbased games, monitors configured to log accesses to social networkingwebsites, monitors configured to log accesses to non-work relatedwebsites combinations thereof. Data related to real time behavioralattributes include heart rate, respiration rate, eye movement, posture,work station ergonomics, length of time sitting, elapsed time on a giventask, elapsed time since last break, video data, audio data, visitedwebsites, executed computing programs, executed computing system ornetworked based games, social networking websites and combinationsthereof.

A monitoring module in communication with the plurality of monitorsreceives real time behavioral attributes data. A behavioral attributeanalysis module in communication with the monitoring module determinesan aggregate behavioral attribute score for the pre-defined team usingthe received real time behavioral attribute data and to detect that theaggregate behavioral attribute score is outside pre-determined preferredbehavioral parameters. In one embodiment, a cumulative behavioralattribute module in communication with the behavioral attribute analysismodule obtains cumulative historical behavioral attributes for eachcomputing system user, and a cumulative behavioral attribute databasestores logs of the cumulative historical behavioral attributes. Thebehavioral attribute analysis module determines the aggregate behavioralattribute score for the pre-defined team further based on the log ofcumulative historical behavioral attributes for each computing systemand the received real time behavioral attributed. The cumulativehistorical behavioral attributes include habitual exercise routines,preventative health care visits, adherence to prescribed medicaltreatments, participation in professional meetings, continuingeducation, work attendance record, employee evaluations, participationin charitable works, attending to family obligations, participation incivic organizations and combinations thereof.

An access control module in communication with the behavioral attributeanalysis module and computing system resources utilized by the computingsystem users adjusts computing system resources contained in a preferredcomputing system resource set associated with pre-defined team inresponse to an indication from the behavioral attribute analysis moduleregarding the detection of the aggregate behavioral attribute scoreoutside the pre-determined preferred behavioral parameters. In oneembodiment, the access control module adjusts access to computing systemresources by decreasing allocation of central processor unit power,decreasing available network bandwidth, prohibiting access to computingsystem applications, prohibiting access to computing system based games,prohibiting access to websites, prohibiting access to social media sitesand combinations thereof. A computing system resource access monitor incommunication with computing system resources logs accesses to computingsystem applications, accesses to computing system or network basedgames, accesses to social networking websites and accesses to websitesby the computing system users, to identify preferred computing systemresources based on frequency and duration of the logged accesses and tocreate the preferred computing system resource set associated with thepre-defined team. A preferred data resource database in communicationwith the computing system resource monitor and the access control modulestores the preferred computing system resource set

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic representation of an embodiment of a system forcontrolling resources in a computing system based on the behavioralattributes of users in accordance with the present invention; and

FIG. 2 is flow chart of an embodiment of a method for controllingresources in a computing system based on the behavioral attributes ofusers in accordance with the present invention.

DETAILED DESCRIPTION

Referring initially to FIG. 1, an exemplary embodiment of a computingsystem 100 for use in controlling computing system resources based onbehavioral attributes is illustrated. Any suitable type of computingsystem can be used including, but not limited to, distributed computingsystems. The computing system includes the processors, memory systemsand executable computer programs required to perform the functions ofthe computing system in addition to the behavioral attribute monitoringand system resource control in accordance with the present invention.The computing system includes a plurality of monitors 102 that are usedto obtain data related to real time behavioral attributes of one or morecomputing system users 104. These computing system users can be, forexample, workers or employees, students, children, clients, customers,patients, military personnel or any other person utilizing a computingsystem. Each computing system user can be treated as an individual or asa member of a group or pre-defined team containing a plurality ofcomputing system users for purpose of behavior monitoring and resourceallocation. Examples of teams include, but are not limited to,departments within an organization and school grades or school classes.

The monitors are used to monitor and analyze the current or real timeactivities of a given individual or worker within an organizationincluding physical attributes associated with the computing system userand to obtain data that describes or is otherwise associated with theseactivities. These data include, but are not limited to, heart rate,respiration rate, eye movement, posture, work station ergonomics, lengthof time sitting, elapsed time on a given task, elapsed time since lastbreak, video data, audio data, visited websites, executed computingprograms, executed computing system or networked based games, socialnetworking websites and combinations thereof. Suitable monitors include,but are not limited to, video image capture devices, audio capturedevices, pressure sensors, temperature sensors, biometric monitoringdevices and combinations thereof. The monitors can also log accesses tocomputing system applications, participation in computing system ornetwork based games, accesses to social networking websites, accesses tonon-work related websites and combinations thereof. The monitors canalso be computer equipment 106 associated with each computing systemuser or other hardware or software components within the computingsystem including servers, routers, switches, hubs, communication stacks,databases and combinations thereof. This includes software executing onhardware devices that is configured to monitor or to log the activitiesof users or streams of data communicated through the computing system.

The computing system includes a monitoring module 108 executing on anysuitable platform within computing system. The monitoring module is incommunication with the plurality of monitors and receives real timebehavioral attribute data from the plurality of monitors for one or moreof the users of the computing system. In embodiment, the monitors are incommunication with the monitoring module through one or more networks110, including both local area networks and wide area networks. Themonitors can also be in communication with the monitoring module throughthe computer equipment associated with each user, e.g., a webcam on acomputer, or through third party computing systems, e.g., the publicswitched telephone network, cellular network or security camera network.Other monitors can be directly connected to the monitoring module, i.e.,not through a network. Overall, the computing system of the presentinvention can utilize data that monitors the current activities andconditions of the user, including the physical conditions of a userderived from any suitable data generating source as various datagenerating sources, e.g., security cameras, cellular phones, globalpositioning system components and physical access system, already existand generate relevant data for computing system users.

In addition, to current or real-time behavioral attributes, thecomputing system of the present invention provides for the logging andconsideration of the overall, historical behavioral attributes ofcomputing system users. These cover behaviors occurring outside theworkplace or a given location that is monitored by the computing system.In one embodiment, the computing system includes a cumulative behavioralattribute module 112 in communication with the other components andmodules of the computing system across one or more networks 110. Thecumulative behavior attribute module obtains cumulative historicalbehavioral attributes for the computing system user. These cumulativehistorical behavioral attributes include, but are not limited to,habitual exercise routines, preventative health care visits, adherenceto prescribed medical treatments, participation in professionalmeetings, continuing education, work attendance record, employeeevaluations, participation in charitable works, attending to familyobligations, participation in civic organizations and combinationsthereof. Data related to these attributes can be obtained from thecomputing system user, the system administrator or from a third partyusing any suitable method for communicating the desired data. Acumulative behavioral attribute database 114 is provided incommunication with the cumulative behavioral attribute module to store alog of the cumulative historical behavioral attributes. In oneembodiment, the behavioral attribute analysis module determines theaggregate behavioral attribute score for the pre-defined team furtherbased on the log of cumulative historical behavioral attributes for eachcomputing system and the received real time behavioral attributed.

The computing system includes a behavioral attribute analysis module 126in communication with the other components and modules of the computingsystem including the monitoring module and the cumulative behavioralattribute module through one or more networks. The behavioral attributeanalysis module receives and analyzes the behavioral attribute dataobtained from the monitoring module and contained in the log of thecumulative historical behavioral attributes to detect at least onebehavioral attribute, and potentially a plurality of behavioralattributes, outside pre-determined preferred behavioral parameters. Thepre-determined preferred behavioral parameters can be determined andcommunicated to the computing system by a computing system administrator118 through a computing or server 116 associated with the administrator.

An access control module 124 is provided in communication with thecomponents and modules of the computing including the behavioralattribute analysis module across one or more networks. The accesscontrol module is also in communication with computing system resourcesutilized by the computing system user. These including the computers 106associated with the computing system users as well as databases,servers, switches, hubs, routers and other computing system components.This allows the access control module to adjust computing systemresources available to each computing system user, including bothhardware and software computing system resources. The computing systemresources adjusted for a given user or groups of users are contained ina preferred and habitually accessed computing system resource setassociated with a given computing system user. Access to these computingsystem resources, i.e., decreasing access, denying access, allowingaccess or increasing access is made in response to an indication fromthe behavioral attribute analysis module regarding the detection of thebehavioral attribute outside the pre-determined preferred behavioralparameters. When a plurality of computing system users are containedwith a given group or team, the behavioral attribute analysis moduledetermines an aggregate behavioral attribute score for the pre-definedteam using the received real time behavioral attribute data and the logof the cumulative historical behavioral attributes. The access controlmodule adjusts computing system resources contained in a preferred andhabitually accessed computing system resource set associated withpre-defined team in response to an indication from the behavioralattribute analysis module regarding the detection of the aggregatebehavioral attribute score outside the pre-determined preferredbehavioral parameters.

In one embodiment, the access control module decreases allocation ofcentral processor unit power, decreases available network bandwidth orboth. In one embodiment, the access control module decreases centralprocessor unit power by modifying priority of jobs associated with thecomputing system user, launching additional jobs to occupy centralprocessor unit power or both. In addition, the access control moduleprohibits access to computing system applications, prohibits access tocomputing system based games, prohibits access to websites, prohibitsaccess to social media sites or combinations thereof. When thebehavioral attribute analysis module detects, for example, that the realtime behavioral attributes are maintained within the pre-determinedpreferred behavioral parameters, the access control module increasesallocation of central processor unit power, increases available networkbandwidth, grants access to computing system applications, grants accessto computing system based games, grants access to websites, grantsaccess to social media sites or combinations thereof.

In one embodiment, the type of resource adjustments taken by the accesscontrol module are related to the type of behavioral attribute that isoutside the desired parameters and to the need or the ability of thecomputing system users to change the behavioral attribute eitherimmediately or over time. For example, if a real time physical attributeis detected, e.g., failure to take a break, then the access controlmodule can severely or rapidly decrease network access or processorpower to encourage or force the user to take an immediate break. Suchsever action would not be as desirable for a violation found in ahistorical log, as the computing system user would not be able tocorrect the log immediately, and extended decreases in network bandwidthor processing power inhibits the ability of the computing system user tofunction and therefore, the productivity of the organization. Therefore,more appropriate adjustments include the denial of access to desiredsocial media networks or gaming applications until the behavioralattribute, e.g., getting an annual physical or meeting continuingeducational requirements, has been brought within acceptable parameters.

In one embodiment, the computing system further utilizes graphical userinterfaces, for example through the computer equipment associated witheach computing system user, to provide visual indication to eachcomputing system user of the behavioral attributes that are outside thepre-determined preferred behavioral parameters and of correctivemeasures to be taken to return the behavioral attributes within thepre-determined preferred behavioral parameters. The behavioral attributeanalysis module is configured to monitor and to determine when theprescribed corrective measures have been completed by the computingsystem user. Once completed, and the attribute parameters brought withinprescribed parameters, the access control module returns access by thecomputing system user to the computing system resources topre-adjustment.

In order to determine the set of resources associated with eachcomputing system user to be subject to adjustment, the computing systemincludes a computing system resource access monitor 120 in communicationwith computing system resources to log accesses to computing systemapplications, accesses to computing system or network based games,accesses to social networking websites and accesses to websites by eachcomputing system user. In addition, habitually accessed computing systemresources are identified based on frequency and duration of the loggedaccesses, and this information is used to create the preferred andhabitually accessed computing system resource set associated with eachcomputing system user. A preferred data resource data base 122 isprovided in communication with the computing system resource monitor andthe access control module to store the preferred and habitually accessedcomputing system resource set.

Referring to FIG. 2, a method for controlling computing system resourcesbased on behavioral attributes of users of the computing system 200 inaccordance with the present invention is illustrated. Computing systemresource accesses for computing system users and groups or pre-definedteams of computing system users are monitored 202. This includes loggingaccesses to computing system applications, accesses to computing systemor network based games, accesses to social networking websites andaccesses to websites. The frequency and duration with which a givencomputing system user accesses or uses a given computing system resourceis noted and is used to create a preferred and habitually accesscomputing system resource set 204 for each computing system user or fora team of computing system users.

Cumulative historical behavioral attributes are input 206 for eachcomputing system user. These input cumulative historical behavioralattributes are used to create, maintain and update a log of cumulativehistorical behavioral attributes for each computing system user 208.Suitable cumulative historical behavioral attributes include, but arenot limited to, habitual exercise routines, preventative health carevisits, adherence to prescribed medical treatments, participation inprofessional meetings, continuing education, work attendance record,employee evaluations, participation in charitable works, attending tofamily obligations, participation in civic organizations or combinationsthereof. In addition to historical behavioral attributes, real timebehavioral attributes are monitor for each computing system user or teamof computing system users 210.

Monitoring real time behavioral attributes includes monitoring currentphysical attributes associated with each computing system user. Thecurrent physical attributes include heart rate, respiration rate, eyemovement, posture, work station ergonomics, length of time sitting,elapsed time on a given task, elapsed time since last break andcombinations thereof. These physical attributes are monitored usingvideo image capture devices, audio capture devices, pressure sensors,temperature sensors, biometric monitoring devices and combinationsthereof. In addition to the physical attributes of the user, access tocomputing system applications, participation in computing system ornetwork based games, access to social networking websites and access tonon-work related websites are monitored in real time.

All of the log and monitored behavioral attribute data are analyzed todetecting if at least one of the real time behavioral attributes and thecumulative historical behavioral attributes is outside pre-determinedpreferred behavioral parameters 212 as defined, for example, by a systemadministrator. If all of the monitored and log attributes are within theprescribed parameters, then the monitoring of resource allocation,inputting of cumulative behavioral attributes and monitor of real timebehavioral attributes continues for each computing system user or teamof computing system users. In one embodiment, allocation of centralprocessor unit power and available network bandwidth are increased inresponse to a determination that the real time and logged behavioralattributes are maintained within the pre-determined preferred behavioralparameters. In one embodiment, access to computing system applications,access to computing system based games, access to websites and access tosocial media sites are granted as a reward for maintaining real time andlogged behavioral attributes within the preferred behavioral parameters.

When the monitored and logged behavioral attributes are outside theprescribed parameters, access by each computing system user to computingsystem resources contained in the preferred and habitually accessedcomputing system resource set associated with that computing system useris adjusted 216. This adjustment includes decreasing allocation ofcentral processor unit power, decreasing available network bandwidth orboth. In order to decrease central processor unit power, the priority ofjobs associated with the computing system user is modified, additionaljobs are launched to occupy central processor unit power or somecombination of both actions are taken. In addition, access to computingsystem applications, access to computing system based games, access towebsites or access to social media sites is denied.

In order to provide assistance to the computing system user inunderstanding the resource allocation adjustments and making the desiredchanges in their behavior attributes, visual indication is provided toeach computing system user of the behavioral attributes that are outsidethe pre-determined preferred behavioral parameters and of correctivemeasures to be taken to return the behavioral attributes within thepre-determined preferred behavioral parameters 214. The computing systemmonitors the computing system users for completion of the communicatedcorrective measures and the return of behavioral attributes intocompliance with the prescribed parameters 218. While the correctivemeasures are pending or the real-time or logged behavioral attributesremain outside the prescribed parameters, the appropriate computingsystem users are provided with an indication of their status andadjustments to computing system resources are maintained or are furtheradjusted or throttled. Once the corrective measures are completed or thebehavioral attributes are brought within prescribed parameters, theaccess by the computing system user to the computing system resourcesare returned to pre-adjustment levels 219. The processes of monitoringresource access, inputting behavioral attributes and monitoring realtime behavioral attributes is continued.

When real time behavioral attributes are monitored for each computingsystem user in a pre-defined team comprising a plurality of computingsystem users, an aggregate behavioral attribute score for thepre-defined team is determined using the monitored real time behavioralattributes. In addition, the aggregate behavioral attribute score forthe pre-defined team includes the log of cumulative historicalbehavioral attributes for each computing system user. It is theaggregate behavioral attribute score that is detected outsidepre-determined preferred behavioral parameters, and access by allcomputing system users in the pre-defined team to computing systemresources contained in a preferred and habitually accessed computingsystem resource set associated with the pre-defined team is adjusted inresponse to the detection of the aggregate behavioral attribute scoreoutside the pre-determined preferred behavioral parameters.

As will be appreciated by one skilled in the art, aspects of the presentinvention may be embodied as a system, method or computer programproduct. Accordingly, aspects of the present invention may take the formof an entirely hardware embodiment or an embodiment combining softwareand hardware aspects that may all generally be referred to herein as a“circuit,” “module” or “system.” Furthermore, aspects of the presentinvention may take the form of a computer program product embodied inone or more computer readable medium(s) having computer readable programcode embodied thereon.

Any combination of one or more computer readable medium(s) may beutilized. The computer readable medium may be a computer readable signalmedium or a computer readable storage medium. A computer readablestorage medium may be, for example, but not limited to, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus, or device, or any suitable combination of the foregoing. Morespecific examples (a non-exhaustive list) of the computer readablestorage medium would include the following: an electrical connectionhaving one or more wires, a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an optical fiber,a portable compact disc read-only memory (CD-ROM), an optical storagedevice, a magnetic storage device, or any suitable combination of theforegoing. In the context of this document, a computer readable storagemedium may be any tangible medium that can contain, or store a programfor use by or in connection with an instruction execution system,apparatus, or device.

A computer readable signal medium may include a propagated data signalwith computer readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Acomputer readable signal medium may be any computer readable medium thatis not a computer readable storage medium and that can communicate,propagate, or transport a program for use by or in connection with aninstruction execution system, apparatus, or device.

Program code embodied on a computer readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber cable, RF, etc., or any suitable combination ofthe foregoing.

Computer program code for carrying out operations for aspects of thepresent invention may be written in any combination of one or moreprogramming languages, including an object oriented programming languagesuch as Java, Smalltalk, C++ or the like and conventional proceduralprogramming languages, such as the “C” programming language or similarprogramming languages. The program code may execute entirely on theuser's computer, partly on the user's computer, as a stand-alonesoftware package, partly on the user's computer and partly on a remotecomputer or entirely on the remote computer or server. In the latterscenario, the remote computer may be connected to the user's computerthrough any type of network, including a local area network (LAN) or awide area network (WAN), or the connection may be made to an externalcomputer (for example, through the Internet using an Internet ServiceProvider).

Aspects of the present invention are described above with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems) and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a machine, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, create means for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in a computerreadable medium that can direct a computer, other programmable dataprocessing apparatus, or other devices to function in a particularmanner, such that the instructions stored in the computer readablemedium produce an article of manufacture including instructions whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer,other programmable data processing apparatus, or other devices to causea series of operational steps to be performed on the computer, otherprogrammable apparatus or other devices to produce a computerimplemented process such that the instructions which execute on thecomputer or other programmable apparatus provide processes forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be notedthat, in some alternative implementations, the functions noted in theblock may occur out of the order noted in the figures. For example, twoblocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

Methods and systems in accordance with exemplary embodiments of thepresent invention can take the form of an entirely hardware embodiment,an entirely software embodiment or an embodiment containing bothhardware and software elements. In a preferred embodiment, the inventionis implemented in software, which includes but is not limited tofirmware, resident software and microcode. In addition, exemplarymethods and systems can take the form of a computer program productaccessible from a computer-usable or computer-readable medium providingprogram code for use by or in connection with a computer, logicalprocessing unit or any instruction execution system. For the purposes ofthis description, a computer-usable or computer-readable medium can beany apparatus that can contain, store, communicate, propagate, ortransport the program for use by or in connection with the instructionexecution system, apparatus, or device. Suitable computer-usable orcomputer readable mediums include, but are not limited to, electronic,magnetic, optical, electromagnetic, infrared, or semiconductor systems(or apparatuses or devices) or propagation mediums. Examples of acomputer-readable medium include a semiconductor or solid state memory,magnetic tape, a removable computer diskette, a random access memory(RAM), a read-only memory (ROM), a rigid magnetic disk and an opticaldisk. Current examples of optical disks include compact disk-read onlymemory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.

Suitable data processing systems for storing and/or executing programcode include, but are not limited to, at least one processor coupleddirectly or indirectly to memory elements through a system bus. Thememory elements include local memory employed during actual execution ofthe program code, bulk storage, and cache memories, which providetemporary storage of at least some program code in order to reduce thenumber of times code must be retrieved from bulk storage duringexecution. Input/output or I/O devices, including but not limited tokeyboards, displays and pointing devices, can be coupled to the systemeither directly or through intervening I/O controllers. Exemplaryembodiments of the methods and systems in accordance with the presentinvention also include network adapters coupled to the system to enablethe data processing system to become coupled to other data processingsystems or remote printers or storage devices through interveningprivate or public networks. Suitable currently available types ofnetwork adapters include, but are not limited to, modems, cable modems,DSL modems, Ethernet cards and combinations thereof.

In one embodiment, the present invention is directed to amachine-readable or computer-readable medium containing amachine-executable or computer-executable code that when read by amachine or computer causes the machine or computer to perform a methodfor controlling computing system resources based on behavioralattributes of users of the computing system in accordance with exemplaryembodiments of the present invention and to the computer-executable codeitself. The machine-readable or computer-readable code can be any typeof code or language capable of being read and executed by the machine orcomputer and can be expressed in any suitable language or syntax knownand available in the art including machine languages, assemblerlanguages, higher level languages, object oriented languages andscripting languages. The computer-executable code can be stored on anysuitable storage medium or database, including databases disposedwithin, in communication with and accessible by computer networksutilized by systems in accordance with the present invention and can beexecuted on any suitable hardware platform as are known and available inthe art including the control systems used to control the presentationsof the present invention.

While it is apparent that the illustrative embodiments of the inventiondisclosed herein fulfill the objectives of the present invention, it isappreciated that numerous modifications and other embodiments may bedevised by those skilled in the art. Additionally, feature(s) and/orelement(s) from any embodiment may be used singly or in combination withother embodiment(s) and steps or elements from methods in accordancewith the present invention can be executed or performed in any suitableorder. Therefore, it will be understood that the appended claims areintended to cover all such modifications and embodiments, which wouldcome within the spirit and scope of the present invention.

What is claimed is:
 1. A method for controlling computing systemresources based on behavioral attributes of users of the computingsystem, the method comprising: monitoring real time behavioralattributes of a computing system user; detecting at least one behavioralattribute outside pre-determined preferred behavioral parameters; andadjusting access by the computing system user to computing systemresources contained in a preferred computing system resource setassociated with the computing system user in response to the detectionof the behavioral attribute outside the pre-determined preferredbehavioral parameters.
 2. The method of claim 1, wherein the step ofmonitoring real time behavioral attributes further comprises monitoringcurrent physical attributes associated with the computing system user.3. The method of claim 2, wherein current physical attributes compriseheart rate, respiration rate, eye movement, posture, work stationergonomics, length of time sitting, elapsed time on a given task,elapsed time since last break or combinations thereof.
 4. The method ofclaim 2, wherein the step of monitoring physical attributes furthercomprises using video image capture devices, audio capture devices,pressure sensors, temperature sensors, biometric monitoring devices orcombinations thereof.
 5. The method of claim 1, wherein the step ofmonitoring real time behavioral attributes further comprises monitoringaccess to computing system applications, participation in computingsystem or network based games, access to social networking websites,access to non-work related websites or combinations thereof.
 6. Themethod of claim 1, wherein: the method further comprises maintaining alog of cumulative historical behavioral attributes for the computingsystem user; and the step of detecting at least one behavioral attributefurther comprises detecting at least one behavioral attribute in atleast one of the real time behavioral attributes and the cumulativehistorical behavioral attributes.
 7. The method of claim 5, wherein thecumulative historical behavioral attributes comprise habitual exerciseroutines, preventative health care visits, adherence to prescribedmedical treatments, participation in professional meetings, continuingeducation, work attendance record, employee evaluations, participationin charitable works, attending to family obligations, participation incivic organizations or combinations thereof.
 8. The method of claim 1,wherein the step of adjusting access by the computing system user tocomputing system resources further comprises decreasing allocation ofcentral processor unit power, decreasing available network bandwidth orcombinations thereof.
 9. The method of claim 8, wherein decreasingcentral processor unit power comprises modifying priority of jobsassociated with the computing system user, launching additional jobs tooccupy central processor unit power or combinations thereof.
 10. Themethod of claim 1, wherein the step of adjusting access by the computingsystem user to computing system resources further comprises denyingaccess to computing system applications, denying access to computingsystem based games, denying access to websites, denying access to socialmedia sites or combinations thereof.
 11. The method of claim 1, whereinthe method further comprises providing visual indication to thecomputing system user of the behavioral attributes that are outside thepre-determined preferred behavioral parameters and of correctivemeasures to be taken to return the behavioral attributes within thepre-determined preferred behavioral parameters.
 12. The method of claim11, wherein the method further comprises returning access by thecomputing system user to the computing system resources topre-adjustment levels upon completion of the corrective measures by thecomputing system user.
 13. The method of claim 1, wherein the methodfurther comprises creating the preferred computing system resource setassociated with the computing system user by logging accesses tocomputing system applications, accesses to computing system or networkbased games, accesses to social networking websites and accesses towebsites and determining computing system resources to include in thepreferred computing system resource set based on frequency and durationof the logged accesses.
 14. The method of claim 1, wherein: the methodfurther comprises determining that the real time behavioral attributesare maintained within the pre-determined preferred behavioralparameters; and the step of adjusting access further comprisesincreasing allocation of central processor unit power, increasingavailable network bandwidth, granting access to computing systemapplications, granting access to computing system based games, grantingaccess to websites, granting access to social media sites orcombinations thereof.
 15. A computer-readable storage medium containinga computer-readable code that when read by a computer causes thecomputer to perform a method for controlling computing system resourcesbased on behavioral attributes of users of the computing system, themethod comprising: monitoring real time behavioral attributes of acomputing system user; detecting at least one behavioral attributeoutside pre-determined preferred behavioral parameters; and adjustingaccess by the computing system user to computing system resourcescontained in a preferred computing system resource set associated withthe computing system user in response to the detection of the behavioralattribute outside the pre-determined preferred behavioral parameters.16. The computer-readable medium of claim 15, wherein the step ofmonitoring real time behavioral attributes further comprises monitoringheart rate, respiration rate, eye movement, posture, work stationergonomics, length of time sitting, elapsed time on a given task,elapsed time since last break, access to computing system applications,participation in computing system or network based games, access tosocial networking websites, access to non-work related websites orcombinations thereof.
 17. The computer-readable medium of claim 15,wherein: the method further comprises maintaining a log of cumulativehistorical behavioral attributes for the computing system user; the stepof detecting at least one behavioral attribute further comprisesdetecting at least one behavioral attribute in at least one of the realtime behavioral attributes and the cumulative historical behavioralattributes; and the cumulative historical behavioral attributes comprisehabitual exercise routines, preventative health care visits, adherenceto prescribed medical treatments, participation in professionalmeetings, continuing education, work attendance record, employeeevaluations, participation in charitable works, attending to familyobligations, participation in civic organizations or combinationsthereof.
 18. The computer-readable medium of claim 15, wherein themethod further comprises: providing visual indication to the computingsystem user of the behavioral attributes that are outside thepre-determined preferred behavioral parameters and of correctivemeasures to be taken to return the behavioral attributes within thepre-determined preferred behavioral parameters; and returning access bythe computing system user to the computing system resources topre-adjustment levels upon completion of the corrective measures by thecomputing system user.
 19. A method for controlling computing systemresources based on behavioral attributes of users of the computingsystem, the method comprising: monitoring real time behavioralattributes of each computing system user in a pre-defined teamcomprising a plurality of computing system users; determining anaggregate behavioral attribute score for the pre-defined team using themonitored real time behavioral attributes; detecting the aggregatebehavioral attribute score outside pre-determined preferred behavioralparameters; and adjusting access by all computing system users in thepre-defined team to computing system resources contained in a preferredcomputing system resource set associated with the pre-defined team inresponse to the detection of the aggregate behavioral attribute scoreoutside the pre-determined preferred behavioral parameters.
 20. Themethod of claim 19, wherein the step of monitoring real time behavioralattributes further comprises monitoring comprise heart rate, respirationrate, eye movement, posture, work station ergonomics, length of timesitting, elapsed time on a given task, elapsed time since last break,access to computing system applications, participation in computingsystem or network based games, access to social networking websites,access to non-work related websites or combinations thereof.
 21. Themethod of claim 19, wherein: the method further comprises maintaining alog of cumulative historical behavioral attributes for each computingsystem user; and the step of determining a aggregate behavioralattribute score for the pre-defined team further comprises including thelog of cumulative historical behavioral attributes for each computingsystem user in the aggregate behavioral attribute score.
 22. The methodof claim 21, wherein the cumulative historical behavioral attributescomprise habitual exercise routines, preventative health care visits,adherence to prescribed medical treatments, participation inprofessional meetings, continuing education, work attendance record,employee evaluations, participation in charitable works, attending tofamily obligations, participation in civic organizations or combinationsthereof.
 23. The method of claim 19, wherein the step of adjustingaccess by the computing system users to computing system resourcesfurther comprises decreasing allocation of central processor unit power,decreasing available network bandwidth, denying access to computingsystem applications, denying access to computing system based games,denying access to websites, denying access to social media sites orcombinations thereof.
 24. The method of claim 19, wherein the methodfurther comprises: providing visual indication to the computing systemusers of the aggregate behavioral attribute score outside thepre-determined preferred behavioral parameters and of correctivemeasures to be taken to return aggregate behavioral attribute scorewithin the pre-determined preferred behavioral parameters; and returningaccess by the computing system user to the computing system resources topre-adjustment levels upon completion of the corrective measures by thecomputing system users.
 25. A computer-readable storage mediumcontaining a computer-readable code that when read by a computer causesthe computer to perform a method for controlling computing systemresources based on behavioral attributes of users of the computingsystem, the method comprising: monitoring real time behavioralattributes of each computing system user in a pre-defined teamcomprising a plurality of computing system users; determining anaggregate behavioral attribute score for the pre-defined team using themonitored real time behavioral attributes; detecting the aggregatebehavioral attribute score outside pre-determined preferred behavioralparameters; and adjusting access by all computing system users in thepre-defined team to computing system resources contained in a preferredcomputing system resource set associated with the pre-defined team inresponse to the detection of the aggregate behavioral attribute scoreoutside the pre-determined preferred behavioral parameters.