System and Computer Implemented Method of Personal Monitoring

ABSTRACT

A system and computer implemented method of personal monitoring is provided. The method includes allowing a user to engage in a number of on-line activities, determining, on a computer, if the user engaged in on-line activities, and if the determination is negative, then performing, on a computer, a number of responsive actions. The system and method further provide for an investigation of external modules; that is, the system and method investigate external sites such as, but not limited to, social networks, forums, weblogs (blogs), that are not associated with the personal monitoring module. The system and method further allow a proxy to respond for the user.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation application of and claims priority toU.S. patent application Ser. No. 14/242,902, filed Apr. 2, 2014,entitled, SYSTEM AND COMPUTER IMPLEMENTED METHOD FO PERSONAL MONITORING.

BACKGROUND OF THE INVENTION

Field of the Invention

The disclosed and claimed concept relates to a computer implementedmethod of monitoring a user's on-line activities and, more specifically,to a method wherein the user or a proxy is allowed to indicate the useris still engaging in on-line activities.

Background Information

On-line activities are a daily occurrence in many peoples' lives. Thatis, many people use email, electronic banking, social networks, gaming,not to mention simple web surfing. The on-line accounts and other toolsrelated to such on-line activities, however, survive the death orincapacitation of the user. Many users would prefer to control theiron-line accounts and tools related to such on-line activities in theevent of their death or incapacitation.

Systems and methods have been developed that provide some control ofon-line accounts and tools related to such on-line activities in theevent of a death or other form of incapacitation. Such systems, ormodules (i.e., generally, software) perform an investigation todetermine if the user is able to provide a response. These systems andmethods, however, are limited. For example, one system and methodrequires the user to identify a specific date, or range of dates, whenthe investigation will occur, e.g. May 1-May 6 which, for example, maybe each day the user is on vacation. Further, these systems are limitedto internal interactions. That is, the user must be utilizing theprogram, site, or other electronic construct that incorporates theinvestigation system or modules. Thus, if a user does not access thesystem/module incorporating the investigation module, then the usercannot satisfy the investigation.

SUMMARY OF THE INVENTION

The disclosed and claimed concept provides for a system and computerimplemented method of personal monitoring including the steps of:allowing a user to engage in a number of on-line activities,determining, on a computer, if the user engaged in on-line activities,and if the determination is negative, then performing, on a computer, anumber of responsive actions. The system and method further provides foran investigation of external modules; that is, the system and methodinvestigate external sites such as, but not limited to, social networks,forums, weblogs (blogs), that are not associated with the personalmonitoring module. The system and method further allow a proxy torespond for the user. The system and method further allow the proxydirect access thereby enabling the proxy to inform the system that theuser is dead, or otherwise incapacitated, thereby initiating the numberof responsive actions.

BRIEF DESCRIPTION OF THE DRAWINGS

A full understanding of the invention can be gained from the followingdescription of the preferred embodiments when read in conjunction withthe accompanying drawings in which:

FIG. 1 is a schematic view of a computer system.

FIGS. 2A, 2B, and 2C are a flow chart of the steps associated with themethod.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

As used herein, a “computer” is a device structured to process datahaving at least one input device, e.g., a keyboard, mouse, ortouch-screen, at least one output device, e.g., a display, a graphicscard, a communication device, e.g. an Ethernet card or wirelesscommunication device, permanent memory, e.g., a hard drive, temporarymemory, i.e., random access memory, and a processor, e.g., aprogrammable logic circuit. The “computer” may be a traditional desktopunit but also includes cellular telephones, tablet computers, laptopcomputers, as well as other devices, such as gaming devices that havebeen adapted to include components such as, but not limited to, thoseidentified above. Further, the “computer” may include components thatare physically in different locations. For example, a desktop unit mayutilize a remote hard drive for storage. Such physically separateelements are, as used herein, a “computer.”

As used herein, the word “display” means a device structured to presenta visible image.

As used herein, a “computer readable medium” includes, but is notlimited to, hard drives, CDs, DVDs, magnetic tape, floppy drives, andrandom access memory.

As used herein, “permanent memory” means a computer readable storagemedium and, more specifically, a computer readable storage mediumstructured to record information in a non-transitory manner. Thus,“permanent memory” is limited to non-transitory tangible media.

As used herein, “stored in the permanent memory” means that a module ofexecutable code, or other data, has become functionally and structurallyintegrated into the storage medium.

As used herein a “file” is an electronic storage means for containingexecutable code that is processed, or, data that may be expressed astext, images, audio, video or any combination thereof.

As used herein, a “module” is a construct used by a computer andincludes, but is not limited to, a computer file or a group ofinteracting computer files such as an executable code file and datastorage files, used by a processor and stored on a computer readablemedium. It is understood that modules may be identified by their purposeof function. For example, “email,” when not referring to a specificmessage, means an email module and a “social network” means a modulethat is structured to operate as a social network web site or similarconstruct.

As used herein, “structured to [verb]” when used in relation to amodule, means that the module includes executable computer instructions,code, or similar elements that perform the identified task.

As used herein, a “scripted” action is a number of commands performed bya module.

As used herein, unless otherwise noted, a step of “allowing” a user toperform an action includes presenting to the user a user interface thatis structured to accomplish the identified step upon input from theuser. It is understood that the input from the user is stored. Forexample, a step of “allowing a user to identify a proxy” means that theuser is presented an input field and provided instructions to enter thename of a proxy. Further, once the name is entered in the input field,the name is stored. An exception to this definition is “allowing a userto engage in a number of on-line activities,” or similar terms, whichfurther means the user is not inhibited from performing any externalactivities on-line.

As used herein, an “electronic communication network” includes anysystem of linked computers such as the Internet, an Intranet, or aschool or company network.

As used herein, a “moniker” is an identifier for a user. “Monikers”include, but are not limited to, usernames, email addresses, sign innames, login names, screen names, user IDs, and handles. A “moniker” maybe an alias or false name.

As used herein, a “page” means an electronic construct stored andpresented according to the HTML (the Hypertext Markup Language) and HTTP(the Hypertext Transfer Protocol) standards. The page may be static orinteractive and is structured to be displayed on a computer monitor. Itis understood that pages may be created on one computer and transmittedelectronically to a display or another computer. Thus, information/pagesmay exist even in the absence of a monitor. That is, pages may existsolely as an electronic construct. Unless otherwise noted, a page iscommunicated to the user via a display, or other computer output device.That is, a page is “presented” to a user via a computer having adisplay, or other computer output device.

As used herein, to “select” or to “click on” an option on a page meansto use an input device, such as a mouse, to communicate to the computerwhich option and/or link on the page is to be actuated.

As used herein, a “button” on a page is an area of the image that may beselected or clicked on to cause the program to provide additional dataor display a new page.

The disclosed system 10 and method utilize computers 12 and anelectronic network 14 such as, but not limited to, the Internet. As isknown, a computer 12 includes various elements such as, but not limitedto, at least one input device, e.g., a keyboard 16, mouse, ortouch-screen, at least one output device, e.g., a display 18, a graphicscard, a communication device, e.g., an Ethernet card or wirelesscommunication device, permanent memory, e.g., a hard drive, temporarymemory, i.e., random access memory, and a processor, e.g., aprogrammable logic circuit (selected elements not shown). In anexemplary embodiment, a number of programs or modules 20 are stored inpermanent memory. In an alternate embodiment, selected modules 20 aredownloaded to temporary memory. For example, a web browser module 20Ais, in an exemplary embodiment, stored in the permanent memory of theuser's computer 12. As is known, use of the web browser module 20Aallows a user to download other modules 20 to the user's computer 12 tobe viewed or executed. Such downloaded modules 20 are stored in thepermanent memory of another computer such as, but not limited to theprovider's computer 12C.

Generally, the user utilizes an interaction module 20B to interact withremote computers 12. Interaction modules 20B include, but are notlimited to, a web browser module 20A as noted above, an e-mail module20C, and an application module typically associated with a smartphone,e.g., a social network “app” (not shown). Further, a module 20 includeswebsites, such as, but not limited to, a social network website, whichis downloaded and presented via a web browser module 20A. Further, asused herein, related modules 20 are “internal” relative to each other.That is, for example, when a web browser module 20A accesses a socialnetwork website, in an exemplary embodiment, the social network websitemodule 20 includes related modules 20 such as, but not limited to, amessaging module, an uploading module, a newsfeed module, etc. (noneshown) each of which are presented to the user via the web browsermodule 20A. Such related modules 20 are “internal” relative to thesocial network website module 20. Further, as used herein, unrelatedmodules 20 are “external” relative to each other. For example, twointeraction modules 20B that do not share data in the absence of a useraction, e.g., a web browser module 20A and an email module 20C, such as,but not limited to Microsoft Internet Explorer® and Microsoft Outlook®,both from Microsoft Corporation Corp. One, Microsoft Way, Redmond,Wash., generally operate independent of each other and are unrelatedand, therefore, “external” to each other. Such “external” modules maystill cooperate for ease of use. For example, while in a web browsermodule 20A, a user 30 may click on an email address thereby launchingthe email module 20C and inserting the clicked upon email address in the“To:” field of the email message. This is an example of external modulessharing data in response to a user 30 action.

Further, as used herein, websites having different domains are“external” to each other, and, websites are “external” to the webbrowser module 20A on which they are presented. Conversely, websiteshaving the same domain are “internal” to each other. Thus, for example,all the modules 20 related to a specific social network website are“internal” relative to each other. Further, modules 20 provided by oneentity that share data independent of a user action are “internal” toeach other. For example, the email service “G-mail®” and the socialnetwork “Google+®,” both provided by Google Inc., 1600 AmphitheatreParkway, Mountain View, Calif., are “internal” to each other in that, inthe absence of a user action, the modules share data with each other.That is, for example, a user's 30 G-mail® and Google+® contact list(email addresses) are shared without a specific action by the user 30.

As shown schematically in FIG. 1, the system 10 for monitoring personalactivity, hereinafter “personal monitoring” relies upon the interactionof a number of computers 12, 12A, 12B, 12C. The system 10, however, is,in an exemplary embodiment, substantially disposed on a single computer12B as set forth below. In an exemplary embodiment, and for the sake ofan example, in the following description, the first computer 10 isoperated by a “user” 30. As used herein, a “user” 30 is a person thatutilizes the personal monitoring service. The user uses the firstcomputer 12 to electronically communicate with others and interacts withvarious services via modules 20 associated with email, social networkwebsite, etc., collectively represented by the second computer 12A. Theservice provider 32 operates the third computer 12B that hosts thepersonal monitoring service. The personal monitoring service isperformed by a number of modules 20, structured to perform as describedbelow, and which are stored, and in an exemplary embodiment, stored inthe permanent memory of the third computer 12B. The fourth computer 12Cis used by a “proxy” 34. As used herein, a “proxy” 34 is a persondesignated by the user 30 to act on the user's behalf, as detailedbelow.

The service provider 32 utilizes the third computer 12B that executes apersonal monitoring module 40. The service provider third computer 12Bis in electronic communication with the electronic network 14. Thepersonal monitoring module 40, in an exemplary embodiment, includes anumber of modules 20 such as, but not limited to, a communication module42, an interface module 44, a number of database modules 46, anadministration module 48, an investigation module 50, a verificationmodule 52 and a response module 54. In an exemplary embodiment, theverification module 52 is part of the response module 54 in that thesteps relating to verification, described below, are an initialresponse. As is generally known, the communication module 42 isstructured to allow the personal monitoring module 40 to communicatewith other computers 12 via the electronic network 14. The interfacemodule 44 is structured to create the user interface presented to theuser 30 on the user's computer 12. The database modules 46 arestructured to store data including, but not limited to, data specific toeach user 30, i.e., names, passwords, billing information, andinvestigation data. A database module 46 may be associated with, orincorporated into, any other module 20. Alternatively, or in additionthereto, any module 20 can be structured to access a database module 46.The administration module 48 is structured to process information suchas, but not limited to, account information, i.e., requesting a user'sidentification (username) and password. These modules 42, 44, 46, 48 andtheir functions are well known in the art. Further, in an exemplaryembodiment, interaction between the user 30, or the proxy 34, and thepersonal monitoring module 40 occurs via the communication module 42 andinterface module 44 which interact with other modules 20, 42, 46, 48;specific reference to the communication module 42 and interface module44 will not be made below.

Generally, and as described in detail below, the user 30 electronicallycontacts the service provider 32. In an exemplary embodiment, the user30 utilizes the first computer 12 and a web browser module 20A toelectronically communicate, via the electronic network 14, with thethird computer 12B. The user 30 provides the personal monitoring module40, and, in an exemplary embodiment, the administration module 48, withidentification data about their on-line activities such as, but notlimited to, the user's moniker(s) or username(s) for social networks,blogs, forums, and other web sites, the user's email address(es) andsimilar electronic identifiers as well as identifying the socialnetworks, blogs, forums, and other web sites commonly used by the user30. This information is hereinafter collectively named, and as usedherein, “identification data.” Stated alternately, the administrationmodule 48 is structured to receive and the database module 46 isstructured to store, the user's identification data. The identificationdata is stored in a database module 46. At selected intervals, theinvestigation module 50 investigates the user identified sites todetermine if the user has engaged in any on-line activity. If thedetermination is positive, i.e., the investigation module 50 findsevidence that the user 30 has been active, a new time period before asubsequent investigation is established, but generally, no other actionis taken. If the investigation module 50 determines that there is a lackof on-line activity, the verification module 52 attempts to verify theuser 30 is active.

That is, the verification module 52 is structured to contact the user 30and to contact the proxy 34. In an exemplary embodiment, the user 30identifies the verification path. That is, the user 30 is allowed toidentify a preferred method of communication for the verification module52. The verification module 52 attempts to contact the user 30 via emailor a similar communication used by the user's 30 on-line sites. Forexample, a social network site may include an instant messaging service.For such a site, the verification module 52 sends an instant message asa verification message. The verification message may be sent repeatedlyon a short cycle, such as, but not limited to, every fifteen minutes. Ifsuch messages can be deleted, the verification module 52 is structuredto delete past verification messages so that the user's message servicedoes not become filled with multiple verification messages. If theattempt to contact the user 30 succeeds, a new time period before asubsequent investigation is established, but generally, no other actionis taken. If the attempt to contact the user 30 fails, the responsemodule 54 is structured to perform a number of selected scriptedactions, or a number of primary selected scripted actions. Such actionsinclude, but are not limited to, notifying selected persons, lockingaccounts, deleting files for various modules, transmitting files toselected persons, clearing browser module 20A history, executing scriptson target computers 12, and unlocking accounts.

In another embodiment, if the attempt to contact the user 30 fails, theverification module 52 attempts to contact the proxy 34. That is, theservice provider 32 utilizes the third computer 12B to electronicallycommunicate, via the electronic network 14, with the proxy's fourthcomputer 12C. In one exemplary embodiment, if the attempt to contact theproxy 34 succeeds, a new time period before a subsequent investigationis established, but generally, no other action is taken. In anotherexemplary embodiment, if the attempt to contact the proxy 34 succeeds,the response module 54 performs a second set of selected actions. Thesecond set of selected actions may be the same as the first set ofactions, but typically the user 30 will identify a more limited set ofselected actions for the second set of selected actions.

In an exemplary embodiment, a user 30 creates an account with theservice provider 32. This is accomplished by the user 30 utilizing thefirst computer 12 to electronically communicate, via the electronicnetwork 14, with the third computer 12B. The administration module 48 isstructured to collect information from the user 30 and to assign, orallow the user 30 to select, a username. The user's data is stored inthe database module 46. As is known, the administration module 48 isstructured to perform other functions such as, but not limited to,assigning, or allow the user 30 to select, a password associated withthe account, tracking usage by the user 30, billing the user 30, andother administrative functions. Further, the administration module 48 isstructured to allow the user 30 to identify a selected period of timebetween investigations and the method of verification, described below.

The administration module 48 is also structured to allow the user 30 toidentify a number of proxies 34. Stated alternately, the administrationmodule 48 is structured to receive, and the database module 46 isstructured to store, the identification data for a number of proxies 34,such as, but not limited to, an email address for each proxy 34. For thedescription below, unless otherwise noted, it is assumed that there is asingle proxy 34. It is understood that the description related to thesingle, described proxy 34 is generally applicable to all proxies 34.

The administration module 48 is further structured to allow the user toestablish a user response time and a proxy response time. Statedalternately, the administration module 48 is structured to receive, andthe database module 46 is structured to store, a user response time anda proxy response time. The user response time is the time period betweenthe verification module 52 sending a verification message to the user 30and activating the response module 54, as discussed below. Similarly,the proxy response time is the time between the verification module 52sending a supplemental verification message to the proxy 34 andactivating the response module 54, as discussed below. It is noted thatwhen there are multiple proxies 34, each proxy 34 is assigned their ownproxy response time, or, all proxies 34 may be assigned the same proxyresponse time. Further, the proxy response times may run simultaneouslyor consecutively, as described below. The administration module 48 isfurther structured to assign, or allow the user 30 or the proxy 34 toselect, a username for the proxy 34 (hereinafter “proxy username”). Theproxy's data is stored in the database module 46. The administrationmodule 48 is structured to perform other functions such as, but notlimited to, assigning, or allow the proxy 34 to select, a password(hereinafter “proxy password”). Further, as is known in the art, a user30, or a proxy 34, may access the personal monitoring module 40 andinteract therewith by logging-on, i.e. accessing the personal monitoringmodule 40 via the communication module 42, and providing a usernameand/or password.

The user 30 further provides identification data related to the user's30 on-line activities. In an exemplary embodiment, the user 30 providesidentification data such as the user's email address (or addresses),social network information such as, but not limited to various usernames and, if required, a password for each email account or socialnetwork, a cellular telephone number, and any other contact informationfor various devices/computers. The user 30 also provides identificationdata related to their on-line activities on web logs (blogs) andelectronic communities (forums, chat rooms, etc.). The user 30 furtherprovides information account information, including passwords, for useby the response module 54. This information includes, but is not limitedto, email address and/or telephone numbers for emergency contacts,information required to access financial accounts, information requiredto access the first computer 12. All information is stored in thedatabase module 46.

Further, the administration module 48 is structured to receive an inputfrom the user 30, or a proxy 34, that initiates the response module 54to perform a number of sets of selected scripted actions, as discussedbelow. That is, for example, the proxy 34 may learn that the user 30 isincapacitated and, rather than wait for an investigation, as discussedbelow, the proxy 34 can actively initiate the response module 54 byaccessing, i.e., logging into, the personal monitoring module 40.

The investigation module 50 is structured to investigate a user 30 andto determine if the user has engaged in an on-line activity within aselected period of time, hereinafter the “investigation period.” As usedherein, an “investigation” is the process of the investigation module 50checking the user's on-line activities during the investigation period.That is, the investigation module 50 is structured to perform a numberof investigations of the electronic network 14 to determine if the user30 has engaged in any on-line activity. In an exemplary embodiment, theinvestigation module 50 is structured to perform a passiveinvestigation. That is, as used herein, a “passive investigation” is aninvestigation initiated by the investigation module 50 without aspecific direction from the user. In an exemplary embodiment, the“passive investigation” occurs a selected time period after the mostrecent investigation resulting in a positive response, i.e., aninvestigation that established the user 30 had engaged in an on-lineactivity. For example, an initial passive investigation occurs aselected time period after the user 30 first activates their account. Inone exemplary embodiment, the first passive investigation occurs aboutfour weeks after the user 30 first activates their account and everyfour weeks thereafter. In another exemplary embodiment, e.g., for aperson with health issues, the passive investigation occurs about onceor twice a day. If the investigation determines that the user 30 hasengaged in an on-line activity within the time period between activationand the investigation, a positive result is determined and recorded. Theinvestigation module 50 then schedules another investigation to occurand the personal monitoring module 40 performs no other actions. In anexemplary embodiment, the investigations occur on a regular cycle, suchas, but not limited to, every day or every four weeks. In an alternativeembodiment, the passive investigation occurs at a selected date, e.g.,the first of each month. In a “passive investigation,” the user 30 doesnot schedule a specific investigation time or identify a limited periodin which the investigation occurs, e.g., every day between May 1 and May5, or every day when the user 30 is on vacation.

In an exemplary embodiment, the investigation module 50 is structured tocheck on the user's 30 external on-line activities. That is, theinvestigation module 50 is structured to check one of the user's publicon-line activities or private on-line activities. Stated alternately,the investigation module 50 is structured to perform one of a publicinvestigation or a private investigation. For a public investigation,the investigation module 50 initially accesses the user's 30 account andidentifies and logs (e.g., makes a record in the database) the user'sidentification data. The investigation module 50 is further structuredto identify monikers, as discussed above, on public blogs, publicportions of social networks, public forums, and similar sites as well asthe date on which the moniker was used. The investigation module 50 thenaccesses the electronic network 14 via the communication module 42 andsearches for evidence of the user 30 engaging in any public on-lineactivity. That is, for a public search, the investigation module 50 doesnot access the user's 30 private accounts, such as, but not limited to,an email account or a social network account. Instead, the investigationmodule 50 searches public information, such as, but not limited to,public blogs, public portions of social networks, public forums andsimilar sites. The investigation module 50 is further structured tocompare the identification data to the monikers found on the electronicnetwork 14 and to determine if the monikers found on the electronicnetwork 14 were used during the investigation period.

If the investigation module 50 finds that the identification data wasused during the investigation period, the investigation module 50determines that the user has engaged in on-line activity. That is, asused herein, the investigation returns a “positive result” or makes a“positive determination.” Upon a positive determination, theinvestigation module 50 starts a new investigation period, and generallytakes no other action. In one embodiment, the investigation module 50 isstructured to alert the user 30, or the proxy 34, that an investigationhas been successfully completed, e.g., via an e-mail.

If the investigation module 50 finds that the identification data wasnot used during the investigation period, the investigation module 50determines that the user has not engaged in on-line activity. That is,as used herein, the investigation returns a “negative result” or makes a“negative determination.” Upon a negative determination, theinvestigation module 50 activates the verification module 52, asdiscussed below.

For a private investigation, the investigation module 50 initiallyaccesses the user's 30 account and identifies and records logs selecteddata such as, but not limited to, the user's username(s) for socialnetworks, blogs, forums, and similar electronic activities as well asvarious passwords. The investigation module 50 is structured to thenaccess the user's accounts. That is, the investigation module 50 will,in an exemplary embodiment, log into a user's email account or socialnetwork account. Further, the investigation module 50 is structured todetermine if such accounts have been utilized within the investigationperiod. For example, the investigation module 50 is structured todetermine if an email has been sent from the user's email account withinthe investigation period, or, if the user has accessed a social networkaccount within the investigation period. As before, if the investigationmodule 50 finds evidence of user activity during the investigationperiod, the investigation module 50 makes a positive determination, or,if the investigation module 50 does not find evidence of user activityduring the investigation period, the investigation module 50 makes anegative determination. Upon a positive determination, the investigationmodule 50 starts a new investigation period, but takes no other action.Upon a negative determination, the investigation module 50 activates theverification module 52.

The verification module 52 is structured to alert the user 30 of thelack of on-line activities. The verification module 52 is furtherstructured to request a response from the user 30 within the userresponse time and, if the response is received, to identify the responseas an on-line activity. In an exemplary embodiment, the verificationmodule 52 is structured to create and send the user 30 a verificationmessage, such as but not limited to, an email or text message. In anexemplary embodiment, within the user's account information are a numberof user contacts, e.g., email addresses and telephone numbers. The user30 identifies a number of the contacts as a verification contact(s). Theverification module 52 communicates with the verification contact. In anexemplary embodiment, the user 30 selects a verification path or method.For example, the user 30 can select to be alerted by a text message,i.e., a verification message, sent to the user's cellular telephone.Further, the user 30 selects a method of verification response. Themethod of verification response may be “passive” or “active.” That is,in an exemplary embodiment and utilizing a “passive” method ofverification response, the user 30 simply engages in an on-line activityafter receiving a verification message. For example, the user 30 mayverify their presence by engaging in an on-line activity, such as, butnot limited to, utilizing a social network site. As part of theverification process, the verification module 52 is structured toinitiate the investigation module 50 and can decrease the time span ofthe investigation period. Such a shortened investigation period isidentified as a “verification investigation period.” For example, averification investigation period, in an exemplary embodiment, is set toevery fifteen minutes. The user 30 further identifies a maximum numberof verification investigation periods be ninety-six, e.g., a 24-hourspan, which is the user response time. As before, the investigationmodule 50 makes a positive determination or a negative determinationregarding the user's presence on-line and either resets theinvestigation module 50 or causes the verification module 52 to initiatethe response module 54, as described below.

In another exemplary embodiment, utilizing an “active” verificationresponse, the verification module 52 is structured to generate averification page, i.e., a web page or similar construct. Theverification page, in an exemplary embodiment, includes a verificationinput field. In this embodiment, the verification message includes alink to the verification page and a verification code. When a useractivates the link and accesses the verification page, the user isrequested to enter the verification code in the verification inputfield. When the user enters the verification code in the verificationinput field, the verification module 52 communicates with theinvestigation module 50 which, in turn, makes a positive determinationof on-line activity and starts a new investigation period. If the userdoes not enter the verification code in the verification input fieldwithin a selected time period, i.e., the user response time, theverification module 52 activates the response module 54. Thus, as usedherein, a “passive verification response” means that the user 30verifies their on-line activity via an external on-line activity.Conversely, as used herein, an “active verification response” means thatthe user 30 verifies their on-line activity via direct communicationwith the personal monitoring module 40.

In an alternative embodiment, the user provides a verification code aspart of setting up the account. That is, the administration module 48requests and the database module 46 stores the verification code. Inthis embodiment, the verification code may be in the form of an answerto a selected question, such as, but not limited to, “what is yourmother's maiden name,” or, “what was your first pet's name.” Further,the verification module 52, in other embodiments, uses other forms ofverification of on-line activities. For example, the verification maybe, but is not limited to, sending an email with an electronic returnreceipt. That is, the verification module 52 generates a verificationemail, e.g., via an email module (not shown), with an electronic returnreceipt. When the user opens the verification email, the return receiptis returned to the verification module 52 thereby confirming an on-lineactivity by the user 30.

In an alternate embodiment, the verification module 52 is structured toaccept a verification from a proxy 34. That is, the verification module52 is structured to alert the proxy 34 of the lack of on-line activitiesby the user 30. The verification module 52 is further structured torequest a response from the proxy 34 within the proxy request time and,if the response is received, to identify the response as an on-lineactivity by the user 30. In an exemplary embodiment, the verificationmodule 52 initially sends a verification message to the user 30 asdescribed upon. If the user 30 fails to respond to the verificationmessage within a selected time period, the verification module 52 sendsa supplemental verification message to the proxy 34. In an exemplaryembodiment, the supplemental verification message operates in a mannersimilar to the initial verification message. That is, the verificationmodule 52 is structured to generate a supplemental verification page.The supplemental verification page, in an exemplary embodiment, includesa verification input field. In this embodiment, the supplementalverification message includes a link to the supplemental verificationpage and a supplemental verification code. When the proxy 34 activatesthe link and accesses the supplemental verification page, the proxy 34is requested to enter the supplemental verification code in theverification input field. When the proxy 34 enters the supplementalverification code in the verification input field, the verificationmodule 52 communicates with the investigation module 50 which, in turn,makes a positive determination of on-line activity by the user 30 andstarts a new investigation period. If the proxy 34 does not enter theverification code in the verification input field within a selected timeperiod, i.e., the proxy response time, the verification module 52initiates the response module 54.

In an alternate embodiment, the verification module 52 is structured tocontact the proxy 34 before contacting the user 30. That is, theverification module 52 contacts the proxy 34 as described above. If theproxy 34 does not respond within the proxy response time, theverification module 52 is structured to contact the user 30, asdescribed above.

When the verification module 52 fails to receive a verification from theuser, the verification module 52 activates the response module 54. Thatis, for example, if the user 30 has selected a passive verificationresponse, the verification module 52 performs, via the investigationmodule 50, an investigation of the user 30 up to the maximum number ofverification investigation periods and then initiates the responsemodule 54. In an embodiment wherein the verification module 52 is partof the response module 54, the verification module 52 initiates afurther response from the response module 54. The response module 54 isstructured to perform a number of scripted actions. In an exemplaryembodiment, the response module 54 is structured to perform a number ofsets of selected scripted actions on external modules 20; that is,modules 20 that are not part of the personal monitoring module 40. Suchexternal modules 20 include, but are not limited to, email and socialnetworks.

In an exemplary embodiment, the response module 54 is structured toacquire the user's information, such as, but not limited to, the user'semergency contacts and related contact information, the user's usernamesand passwords, from the database module 46. The response module 54 isfurther structured to perform a number of scripted actions related tothe user's information. In an exemplary embodiment, the response module54 contacts the user's emergency contacts via the contact informationand alerts the emergency contacts that the user 30 has failed to respondto the verification message. In an exemplary embodiment, the responsemodule 54 is further structured to access the user's computer(s) anddelete files related to web browser module 20A, such as, but not limitedto, browser history, cookies, and temporary files. In an exemplaryembodiment, the response module 54 is further structured to delete filesand/or folders, execute a module 20 on a target computer 12 that wipes,i.e., unrecoverable deleting, all or portion of data, send files orpredefined emails such as instructions to access account, user names,passwords, account locations, etc. The response module 54 is furtherstructured to post or updates status on social media accounts and anyand all electronic/digital actions predetermined by user 30. In anexemplary embodiment, the number of scripted actions occur in modules 20external to the personal monitoring module 40.

The response module 54 is structured to allow access by the user 30, orthe proxy 34, and to perform a number of scripted actions related to theuser's information. That is, the user may desire to intentionallyinitiate the number of scripted actions, e.g., prior to a vacation orstay at a hospital. Alternatively, the proxy 34 may become aware thatthe user 30 has passed away or has become incapacitated and initiate thenumber of scripted actions. In these instances, the user 30 or the proxy34 sends an instruction to the response module 54 initiating thescripted actions.

Accordingly, the personal monitoring module 40 is used to perform amethod of personal monitoring including the steps of determining 100 ifa user is responsive and, if the determination is negative, thenperforming 104, on a computer, a number of responsive actions. The stepof determining 100 if a user is responsive includes allowing 101 a userto engage in a number of on-line activities, determining 102, on acomputer, if the user engaged in on-line activities, and if thedetermination that the user engaged in on-line activities is negative,then performing 104 the number of responsive actions. The step ofdetermining 100 if a user is responsive further, or alternatively,includes the step of receiving 106 an instruction. The instruction canbe sent by the user 30 or the proxy 34, as described below. The step ofallowing 101 a user to engage in a number of on-line activities includesthe step of initializing 110 the personal monitoring module 40. The stepof initializing 110 the personal monitoring module 40 includes the stepsof allowing the user to access 112 the personal monitoring module 40,allowing the user to provide 114 identification data to the personalmonitoring module 40, and in an exemplary embodiment, to theadministration module 48, wherein the identification data relates to, ordetails, the user's 30 external on-line activities including data suchas, but not limited to, usernames, monikers or other identifiers andsites that are utilized. The step of initializing 110 the personalmonitoring module 40 further includes the step of storing 115 the user'sidentification data.

Further, the step of initializing 110 the personal monitoring module 40includes the step of allowing 120 the user 30 to identify a proxy 34. Inassociation with identifying a proxy 34, the user 30, or the proxy 34,is allowed to provide 114A proxy identification data to the personalmonitoring module 40. That is, the user 30 is allowed to identify, forexample, a proxy username and password. Such information would then becommunicated by the user 30 to the proxy 34 by any known method ofcommunication. As is known, the proxy username and password may betemporary and be deleted after a period of time. That is, the proxy 34is allowed to access the personal monitoring module 40 and change someproxy identification data, such as, but not limited to, the proxy username and proxy password. If the proxy 34 does not update the proxyusername and proxy password within a selected period of time, thetemporary proxy username and password are deleted. The step ofinitializing 110 the personal monitoring module 40 further includes thestep of storing 115A the proxy identification data.

The step of allowing the user to provide 114 identification data to thepersonal monitoring module 40, including information about the user's 30external on-line activities, is associated with the step of providing116 the personal monitoring module 40 with access to the user's on-lineactivities external to the personal monitoring module 40. The step ofinitializing 110 the personal monitoring module 40 further includes thestep of allowing 122 the user 30 to establish 117 a path for response.As used herein a “path for response” means the computer 12 (which asnoted above, includes cellular telephones) and/or the module 20 used tocommunicate a verification message to the personal monitoring module 40,as discussed below.

The step of initializing 110 the personal monitoring module 40 furtherincludes the step of allowing 122 the user 30 to establish a userresponse time, and, allowing 124 the user 30 to establish a proxyresponse time. The user response time and the proxy response time areassociated with the steps 202, 212 of requesting a response from theuser 30 and proxy 34 as discussed below.

The step of allowing 101 a user to engage in a number of on-lineactivities further includes allowing 103 the user to engage in a numberof external on-line activities such as, but not limited to, utilizingsocial networks, communicating with, i.e., leaving comments on,electronic forums, utilizing blogs, utilizing commercial sites andleaving comments, and similar activities. Generally, the user utilizesthe first computer 12 to electronically communicate, via the electronicnetwork 14, with a number of second computers 12A.

The step of initializing 110 the personal monitoring module 40 furtherincludes the step of allowing 118 the user to select a passive interval,or time period, between the determination 102 of whether the userengaged in on-line activities, as described below. That is, the user 30is allowed to select the passive investigation period. As noted above,the step of initializing 110 the personal monitoring module 40 includesthe step of allowing 120 the user 30 to identify a proxy 34. Further,the step of initializing 110 the personal monitoring module 40 includesthe step of allowing 130 the user 30 to identify a number of scriptedactions. The number of scripted actions includes a number of primaryactions and a number of secondary actions. That is, the user 30 isallowed 132 to identify a number of primary actions and allowed 134 toidentify a number of secondary actions. The user 30 is then allowed 101to engage in a number of on-line activities external to the personalmonitoring module, as noted above. Further, if there is more than oneproxy 34, the step of initializing 110 the personal monitoring module 40includes the step of allowing 124 the user 30 to establish a proxyresponse time for each proxy 34 as well as allowing 126 the user 30 toestablish the scheduling of the proxy response times. That is, forexample, the user 30 may allow the proxies to respond in sequence orsimultaneously.

The step of determining 102, on a computer, if the user engaged inon-line activities includes the step of checking 150 the user's 30on-line activities external to the personal monitoring module. The stepof checking 150 the user's 30 on-line activities external to thepersonal monitoring module includes the steps of checking 152 the user'spublic on-line activities and the step of checking 154 the user'sprivate on-line activities, i.e., a public investigation or a privateinvestigation. The step of checking 152 the user's public on-lineactivities includes the steps of accessing 156 the user's identificationdata, accessing 158 the electronic network 14 and searching 160 publicinformation, such as, but not limited to, public blogs, public portionsof social networks, public forums and similar sites. The step ofchecking 154 the user's private on-line activities includes the steps ofaccessing 156 the user's identification data, accessing 158 theelectronic network 14, and accessing 170 the user's accounts.

The step of checking 150 the user's 30 on-line activities external tothe personal monitoring module, during a public investigation or aprivate investigation, further includes the steps of comparing 180 theidentification data to the monikers found on the electronic network 14,and, determining 182 if the identification data and the monikers foundon the electronic network 14 match. If the identification data and themonikers found on the electronic network 14 match, then the personalmonitoring module 40 identifies 184 matches as user monikers. The stepof checking 150 the user's 30 on-line activities external to thepersonal monitoring module further includes the step of determining 185if the user monikers found on the electronic network 14 were used duringthe investigation period. If the step of determining 185 if the usermonikers found on the electronic network 14 were used during theinvestigation period finds that the user monikers were used during theinvestigation period, the personal monitoring module 40 makes a positivedetermination. If a positive determination is made, the step of checking150 the user's 30 on-line activities external to the personal monitoringmodule includes the step of restarting 190 the investigation period. Ifa negative determination is made, the step of checking 150 the user's 30on-line activities external to the personal monitoring module includesthe step of initiating 192 the response module 54.

The initial response is a verification that the user 30 is notparticipating in on-line activities. That is, the step of performing104, on a computer, a responsive action includes the steps of alerting200 the user 30 of the lack of on-line activities, requesting 202 aresponse from the user 30, and either, identifying 204 a response as anon-line activity, or, performing 206 a number of scripted actions, orperforming 207 a number of primary scripted actions, as described below.The step of requesting 202 a response from the user 30 includes, in anexemplary embodiment, the steps of requesting 201 a response from theuser within the user response time and determining 203 if the userresponse has been provided within the user response time.

The verification may also incorporate a response from a proxy 34. Thatis, the step of performing 104, on a computer, a responsive actionfurther includes the steps of alerting 210 the proxy 34 of the lack ofon-line activities by the user 30, requesting 212 a response from theproxy 34 and either, identifying 214 a response as an on-line activityby the user 30, or, performing 216 a number of secondary scriptedactions. The step of requesting 212 a response from the proxy 34includes, in an exemplary embodiment, the step of requesting 211 aresponse from the user within the proxy response time and determining213 if the user response has been provided within the user responsetime. In another embodiment, the step of performing 104, on a computer,a number of responsive actions includes only the steps related to theproxy 34. Further, if there is more than one proxy 34, the steps aboveare applicable to each proxy 34. That is, the step of performing 206 anumber of scripted actions includes a number of sets of scriptedactions, for example, a number of primary scripted actions and a numberof secondary scripted actions. In an embodiment wherein a proxy 34 isused, the primary set of scripted actions are performed 207 upon a lackof response from the user 30 and the secondary set of scripted actionsare performed 216 upon a lack of response by the proxy 34. It is furtherunderstood that the primary set of scripted actions may be a null set,i.e., no actions are performed until the proxy 34 fails to respond. Thatis, as used herein with respect to the step of or performing 207 anumber of primary scripted actions, the primary “set” of scriptedactions can include no actions or a number of actions.

The step of requesting 202 a response from the user is selected from thegroup consisting of an active verification response or a passiveverification response. In an exemplary embodiment wherein the responseis an active verification response, the steps of alerting 200 the user30 of the lack of on-line activities and requesting 202 a response fromthe user further include the steps of, sending 220 the user averification message, as discussed above, and requesting 222 a responsefrom the user to the verification message. As with the step ofrequesting 202 a response from the user 30, the step of and requesting222 a response from the user 30 to the verification message includes thesteps of requesting 224 a response from the user to the verificationmessage within the user response time and determining 226 if the userresponse has been provided within the user response time.

In an exemplary embodiment wherein the user 30 response is a passiveverification response from the user 30, the step of requesting 202 aresponse from the user 30 includes the step of establishing 228 averification investigation period and the step of checking 150′ theuser's 30 on-line activities external to the personal monitoring module.The step of checking 150′ the user's 30 on-line activities issubstantially similar to step 150 described above and includes the substeps discussed therein, i.e., sub steps 152, 154, 158, 160, 170,180-186; those sub steps will not be restated herein but may besubsequently identified as being part of the passive verificationresponse, as opposed to the original step of checking 150, by theindication of a “prime” after the reference number. The step of checking150′ the user's 30 on-line activities is repeated for each verificationinvestigation period and continues until there is a step of making apositive determination 186′, or, the user response time expires.

If the user 30 responds to the verification message, either passively oractively, the response is identified 204 as an on-line activity.Further, the step of identifying 204 a response as an on-line activityincludes the step of restarting 190 the investigation period. If theuser 30 does not respond to the verification message within the userresponse time, the personal monitoring module 40 initiates a furtherresponse from the response module 54. In an exemplary embodiment, thefurther response includes the personal monitoring module 40 performing206 a number of scripted actions, or, performing 207 a number of primaryscripted actions, as described above. The scripted actions include, butare not limited to, the scripted actions described above.

In an embodiment wherein a proxy 34 has been identified, the steps ofalerting 210 the proxy 34 of the lack of on-line activities by the user30 and requesting 212 a response from the proxy include the steps ofsending 230 the proxy a verification message, as discussed above, andrequesting 232 a response from the proxy to the verification message. Aswith the step of requesting 212 a response from the proxy 34, the stepof and requesting 232 a response from the proxy to the verificationmessage includes the steps of requesting 234 a response from the proxy34 to the verification message within the proxy response time anddetermining 236 if the proxy response has been provided within the proxyresponse time.

If there is more than one proxy 34, the proxy response time for eachproxy 34 may occur simultaneously, or, in sequence. If the proxyresponse times run simultaneously, both proxies are alerted and anyproxy 34 may respond within the their proxy response time.Alternatively, the user 30 may select for the proxy response times tooccur in sequence. In this situation, the steps of alerting 210 theproxy 34 of the lack of on-line activities by the user 30 and requesting212 a response from the proxy occur with respect to one proxy and, whenthe proxy response time ends, the steps occur with respect to anotherproxy. If no proxy 34 responds, the personal monitoring module 40initiates a further response from the response module 54 as describedbelow.

If the proxy 34 responds to the verification message, the response isidentified 238 as an on-line activity by the user 30. That is, thepersonal monitoring module 40 performs the step of identifying 238 theproxy's response as an on-line activity by the user 30. Further, thestep of identifying 204 a response as an on-line activity by the user 30includes the step of restarting 190 the investigation period. If theproxy 34 does not respond to the verification message within the proxyresponse time, the personal monitoring module 40 initiates a furtherresponse from the response module 54. In an exemplary embodiment, thefurther response includes the personal monitoring module 40 performing216 a number of secondary scripted actions. The scripted actionsinclude, but are not limited to, the scripted actions described above.

Alternatively, the user 30, or the proxy 34, can actively initiate thescripted actions. That is, the step of determining 100 if a user isresponsive includes the step of receiving 106 an instruction indicatingthe user is nonresponsive. As used herein, “an instruction indicatingthe user is nonresponsive,” means an instruction from the user 30, orthe proxy 34 specifically identifying that the user 30 isnon-responsive. This may be accomplished, for example, by the user 30,or the proxy 34, accessing the personal monitoring module 40 andclicking on an input option indicating that the user 30 isnon-responsive. That is, the step of performing 206 a number of scriptedactions is, in the embodiment above, started after a determination thatthe user 30 is nonresponsive which, in turn, initiates the step ofperforming 206 a number of scripted actions. It is understood that aninstruction from the user 30 may be considered a “response,” but forconsistency in terminology, the meaning of the term “an instructionindicating the user is nonresponsive” redefines a response from the user30 that initiates the step of performing 206 a number of scriptedactions as the user 30 being “nonresponsive.” Moreover, it is believedthat the step of receiving 106 an instruction indicating the user isnonresponsive is more likely to be sent by a proxy 34 when the user 30is incapacitated or otherwise nonresponsive.

In view of the prediction that the step of receiving 106 an instructionindicating the user is nonresponsive will more likely be initiated bythe proxy 34, the following description shall use the proxy 34 as theactive participant. It is understood, however, that any step used inrelation to the step of receiving 106 an instruction indicating the useris nonresponsive can be performed by the user 30. The step of receiving106 an instruction indicating the user is nonresponsive includes thesteps of, allowing 250 the proxy to log-in and verify 252 the proxy'sidentity (e.g., by requesting the proxy 34 enter the proxy password),and determining 254 that a request to initiate a responsive action hasbeen made. The step of receiving 106 an instruction indicating the useris nonresponsive further includes the steps performing 206 a number ofscripted actions, or performing 207 a number of primary scripted actionsand performing 216 a number of secondary scripted actions, as describedabove.

While specific embodiments of the invention have been described indetail, it will be appreciated by those skilled in the art that variousmodifications and alternatives to those details could be developed inlight of the overall teachings of the disclosure. Accordingly, theparticular arrangements disclosed are meant to be illustrative only andnot limiting as to the scope of invention which is to be given the fullbreadth of the claims appended and any and all equivalents thereof.

What is claimed is:
 1. A computer implemented method of personalmonitoring comprising the steps of: determining if a user is responsive;if the determination is negative, performing, on a computer, a number ofresponsive actions; wherein said step of determining if a user isresponsive includes the steps of: allowing said user to engage in anumber of on-line activities; determining, on a computer, if said userengaged in on-line activities; if said determination that said userengaged in on-line activities is negative, then performing, on acomputer, a number of responsive actions; wherein said step of allowinga user to engage in a number of on-line activities includes:initializing a personal monitoring module, said monitoring modulestructured to monitor external on-line activity; and allowing said userto engage in a number of on-line activities external to said personalmonitoring module.
 2. The computer implemented method of claim 1 whereinsaid step of determining, on a computer, if said user engaged in on-lineactivities includes the step of checking said user's on-line activitiesexternal to said personal monitoring module.
 3. The computer implementedmethod of claim 2 wherein said step of performing, on a computer, anumber of responsive actions includes the steps of: alerting said userof the lack of on-line activities; requesting a response from said user;and if said user responds, then identifying said response as an on-lineactivity.
 4. The computer implemented method of claim 3 wherein saiduser response is selected from the group consisting of an activeverification response or a passive verification response.
 5. Thecomputer implemented method of claim 3 wherein said steps ofinitializing a personal monitoring module and performing, on a computer,a number of responsive actions includes the steps of: allowing said userto identify a proxy; alerting said proxy of the lack of on-lineactivities by the user; requesting a response from a proxy; and if saidproxy responds, then identifying said response as an on-line activity.6. The computer implemented method of claim 5 wherein said steps ofinitializing a personal monitoring module and performing, on a computer,a number of responsive actions includes the steps of: allowing said userto identify a number of scripted actions; allowing said user toestablish a user response time; requesting a user response within saiduser response time; determining if said user response has been providedwithin said user response time; if no user response has been providedwithin said user response time, then performing, on a computer, thescripted actions identified by the user.
 7. The computer implementedmethod of claim 1 wherein said step of checking said user's on-lineactivities external to said personal monitoring module includes the stepof checking on said user's public on-line activities.
 8. The computerimplemented method of claim 1 wherein said steps of initializing apersonal monitoring module and checking said user's on-line activitiesexternal to said personal monitoring module includes the steps of:accessing the user's identification data; and checking on said user'sprivate on-line activities.
 9. The computer implemented method of claim1 wherein said steps of initializing a personal monitoring module andperforming, on a computer, a number of responsive actions includes thesteps of: allowing said user to identify a number of scripted actions;allowing said user to establish a user response time; requesting a userresponse within said user response time; determining if a said userresponse has been provided within said user response time; and if nouser response has been provided within said user response time, thenperforming, on a computer, the scripted actions identified by the user.10. The computer implemented method of claim 1 wherein said step ofdetermining if a user is responsive includes the step of receiving aninstruction indicating the user is nonresponsive.
 11. The computerimplemented method of claim 10 wherein said step of receiving aninstruction indicating the user is nonresponsive includes the steps of:allowing a proxy to log-in; verifying the proxy's identity; determiningthat a request to initiate a responsive action has been made; andperforming a number of scripted actions.
 12. A system for personalmonitoring, the system comprising: a non-transitory computer-readablestorage medium storing a number of modules including: an investigationmodule structured to investigate a user and to determine if the user hasengaged in an on-line activity within an investigation period; aresponse module structured to perform a number of selected scriptedactions; and wherein said investigation module is structured to performa passive investigation.
 13. The system of claim 12 wherein saidinvestigation module is structured to check a user's external on-lineactivities.
 14. The system of claim 13 wherein said investigation moduleis structured to check one of said user's public on-line activities orsaid user's private on-line activities.
 15. The system of claim 12wherein: said response module includes a verification module; saidverification module structured to contact a user; and said verificationmodule structured to contact a proxy.
 16. The system of claim 15wherein: if said verification module does not contact said user, saidresponse module is structured to perform a number of primary scriptedactions; and if said verification module does not contact said proxy,said response module is structured to perform a number of secondaryscripted actions.
 17. A system for personal monitoring, the systemcomprising: a non-transitory computer-readable storage medium storingnumber of modules including: an administrative module structured toreceive a user's identification data; a database module structured tostore said user's identification data an investigation module structuredto investigate a user and to determine if the user has engaged in anexternal on-line activity within an investigation period; and a responsemodule structured to perform a number of selected scripted actions. 18.The system of claim 17 wherein: said administrative module structured toreceive the identification data for a proxy; and said database modulestructured to store said identification data for a proxy.
 19. The systemof claim 17 wherein: said administrative module structured to receive auser response time; said database module structured to store said userresponse time; said administrative module structured to receive a proxyresponse time; and said database module structured to store said proxyresponse time.
 20. A system for personal monitoring, the systemcomprising: a non-transitory computer-readable storage medium storing anumber of modules including: an investigation module structured toinvestigate a user and to determine if the user has engaged in anon-line activity within an investigation period; a response modulestructured to perform a number of selected scripted actions; saidresponse module structured to allow said user to identify a proxy, allowsaid user to identify a number of scripted actions, including a numberof primary actions and a number of secondary actions, and allow saiduser to establish a proxy response time; said selected scripted actionsincluding alerting said proxy of the lack of on-line activities by theuser, requesting a proxy response within said proxy response time,determining if a proxy response has been provided within said proxyresponse time, if said proxy responds, then identifying said response asan on-line activity, if no proxy response has been provided within saiduser response time, then performing, on a computer, the secondaryactions identified by the user; and wherein said investigation module isstructured to perform a passive investigation.