System, method and device for monitoring the status of an entity based upon an established monitoring profile
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G08B-023/00
G08B-001/00
G08B-025/00
G05B-023/02
G08B-021/02
G08B-021/22
출원번호
US-0151171
(2011-06-01)
등록번호
US-9741226
(2017-08-22)
발명자
/ 주소
Rothschild, Keith Alan
Snow, Rachel
출원인 / 주소
COX COMMUNICATIONS, INC
대리인 / 주소
Merchant & Gould
인용정보
피인용 횟수 :
0인용 특허 :
12
초록▼
A method for monitoring a status of an entity presents an interface for defining status parameters for configuring a monitoring profile, receives input defining status parameters for configuring the monitoring profile, establishes the monitoring profile for a monitored entity based upon the received
A method for monitoring a status of an entity presents an interface for defining status parameters for configuring a monitoring profile, receives input defining status parameters for configuring the monitoring profile, establishes the monitoring profile for a monitored entity based upon the received input defining status parameters for configuring the monitoring profile and executes the established monitoring profile according to the defined status parameters. A processor generates a user interface for receiving input defining status parameters for configuring a monitoring profile, establishes the monitoring profile for a monitored entity based upon the received input defining status parameters for configuring the monitoring profile and executes the established monitoring profile according to the defined status parameters.
대표청구항▼
1. A method for monitoring a status of an entity, comprising: presenting an interface for defining status parameters for configuring a monitoring profile;receiving input defining status parameters for configuring the monitoring profile;establishing the monitoring profile for a monitored entity based
1. A method for monitoring a status of an entity, comprising: presenting an interface for defining status parameters for configuring a monitoring profile;receiving input defining status parameters for configuring the monitoring profile;establishing the monitoring profile for a monitored entity based upon the received input defining status parameters for configuring the monitoring profile;executing the established monitoring profile according to the defined status parameters, the defined status parameters identifying devices, contacts, calendar entries and services associated with the monitored entity, wherein executing the established monitoring profile defines a schedule for an escalation flow of verification mechanisms to verify the status of the monitored entity, wherein the schedule includes setting a time period associated with each of the verification mechanisms, and wherein the escalation flow being implemented via a two-way interactive interface, the escalation flow including: sending messages to the monitored entity via a mobile device requesting the monitored entity to verify the status,monitoring, via a set top box, television activity of the monitored entity and when television activity is detected, requesting the monitored entity to verify the status,monitoring email and internet traffic for the monitored entity and when email and internet activity is detected, requesting the monitored entity to verify the status; andsending a communication, via an automatic voice system, to a contact identified by the defined status parameters, wherein the contact is identified in the contacts or the calendar entries, and when an escalation contact responds to the communication the escalation contact is given a predetermined time window to follow up with the monitored entity and have a subscriber check-in,in response to receiving a check-in by the monitored entity, terminating execution of the established monitoring profile; andresetting the schedule for initiating execution of the established monitoring profile. 2. The method of claim 1, wherein the establishing the monitoring profile further comprises creating the escalation flow, the escalation flow including a series of verification mechanisms provided in an order defined by the status parameters. 3. The method of claim 2, wherein the executing the established monitoring profile according to the defined status parameters further comprises executing the escalation flow by initiating the verification mechanisms in the order defined by the status parameters until a verification mechanism results in receipt of a check-in by the monitored entity. 4. The method of claim 1, wherein the receiving input defining status parameters for configuring the monitoring profile further comprises receiving an ordered list of verification mechanisms and the schedule for initiating execution of the established monitoring profile. 5. The method of claim 1, wherein the receiving input defining status parameters for configuring the monitoring profile further comprises receiving a check-in time and a list of verification mechanisms ordered according to the escalation flow. 6. The method of claim 5, wherein the receiving input defining status parameters for configuring the monitoring profile further comprises receiving a time window for waiting to receive a response to a verification mechanism and implementing a next verification mechanism in the escalation flow when the response is not received before expiration of the time window. 7. The method of claim 5, wherein the receiving input defining status parameters for configuring the monitoring profile further comprises receiving a key for providing secure access to the monitoring profile for the monitored entity. 8. The method of claim 7, wherein the receiving the key for providing secure access to the monitoring profile for the monitored entity provides secure access by an emergency contact of the monitored entity for verifying status of the monitored entity. 9. The method of claim 7, wherein the receiving the key for providing secure access to the monitoring profile for the monitored entity provides access to a log of status verification associated with the monitored entity. 10. The method of claim 1, wherein the executing the established monitoring profile according to the defined status parameters further comprises monitoring activity of a device of the monitored entity and implementing contact with the monitored entity through the device when activity associated with the device is detected. 11. The method of claim 1, wherein the establishing a monitoring profile for a monitored entity further comprises establishing a monitoring profile for a secondary entity to verify the status of the secondary entity and wherein the executing the established monitoring profile according to the defined status parameters further comprises contacting a primary entity only when the status of the secondary entity is not verified according to the monitoring profile for the secondary entity. 12. A server for providing a monitored check-in system, comprising: memory for storing data; anda processor, coupled to the memory, the processor generating a user interface for: receiving input defining status parameters for configuring a monitoring profile, establishing the monitoring profile for a monitored entity based upon the received input defining status parameters for configuring the monitoring profile and executing the established monitoring profile according to the defined status parameters, the defined status parameters identifying devices, contacts, calendar entries and services associated with the monitored entity, wherein executing the established monitoring profile defines a schedule for an escalation flow comprising at least one verification mechanism to verify a status of the monitored entity, wherein the schedule includes setting a time period associated with each of the verification mechanisms, and wherein the escalation flow being implemented via an two-way interactive interface, the escalation flow including: sending messages to the monitored entity via a mobile device requesting the monitored entity to verify the status;monitoring, via a set top box, television activity of the monitored entity and when television activity is detected, requesting the monitored entity to verify the status;monitoring email and internet traffic for the monitored entity and when email and internet activity is detected, requesting the monitored entity to verify the status;sending a communication, via an automatic voice system, to a contact identified by the defined status parameters, wherein the contact is identified in the contacts or the calendar entries, and when an escalation contact responds to the communication the escalation contact is given a predetermined time window to follow up with the monitored entity and have a subscriber check-in;in response to receiving a check-in by the monitored entity, terminating execution of the established monitoring profile; andresetting the schedule for initiating execution of the established monitoring profile. 13. The server of claim 12, wherein the escalation flow including a series of verification mechanisms provided in an order defined by the status parameters for checking the status of the monitored entity. 14. The server of claim 13, wherein the verification mechanisms comprises at least one emergency contact and at least one user device capable of receiving status inquiries from the processor. 15. The server of claim 13, wherein the verification mechanisms comprises information for contacting local authorities. 16. The server of claim 13, wherein the processor initiates the verification mechanisms in the order defined by the status parameters until a verification mechanism results in receipt of a check-in by the monitored entity. 17. The server of claim 12, wherein the processor terminates the execution of the established monitoring profile and resets a check-in time for initiating execution of the established monitoring profile when the status of the monitored entity is received. 18. The server of claim 12, wherein the received input status parameters for configuring the monitoring profile further comprises a schedule of check-in times and a list of verification mechanisms ordered according to the escalation flow. 19. The server of claim 18, wherein the received input status parameters for configuring the monitoring profile further comprises a time window for waiting to receive a response to a verification mechanism, wherein the processor implements a next verification mechanism in the escalation flow when the response is not received before expiration of the time window. 20. The server of claim 18, wherein the received input status parameters for configuring the monitoring profile further comprises a key for providing secure access to the monitoring profile for the monitored entity. 21. The server of claim 20, wherein the key is selected from a plurality of codes, each of the plurality of codes having a predetermined meaning. 22. The server of claim 20, wherein the key is selected for a code requesting authorities to be called. 23. The server of claim 20, wherein the key is selected for a code used to restrict a device to contacting only the monitored entity. 24. The server of claim 20, wherein the key is verified by the processor and, upon verification, the processor provides secure access to the monitoring profile by an emergency contact of the monitored entity for verifying status of the monitored entity. 25. The server of claim 20, wherein the key is verified by the processor and, upon verification, the processor provides access to a log of status verification associated with the monitored entity. 26. The server of claim 12, wherein the processor monitors activity of a device of the monitored entity and implements contact with the monitored entity through the device when activity associated with the device is detected. 27. The server of claim 12, wherein the monitoring profile establishes an escalation flow associated with a secondary entity for verifying a status of the secondary entity and wherein the processor contacts a primary entity only when the status of the secondary entity is not verified according to the escalation flow associated with the secondary entity. 28. The server of claim 12, wherein the monitoring profile for the monitored entity includes an order list of devices to use to contact the monitored entity. 29. The server of claim 28, wherein the order list of devices include at least one selected from the group consisting of a set-top box, a mobile communication device, a computer having Internet access and an interactive voice response system. 30. The server of claim 28, wherein the processor contacts devices in the ordered list of devices via at least one selected from the group consisting of pop-up messages displayed on a television, an interactive program guide, text messaging, email messaging, browser messaging, and a telephone. 31. The server of claim 12, wherein the processor monitors a location of a monitored entity relative to an itinerary provided according the monitoring profile. 32. The server of claim 12, wherein the monitoring profile includes a setting for disengaging status checks for the monitored entity. 33. The server of claim 12, wherein the processor contacts the monitored entity using a two-way communication service. 34. The server of claim 12, wherein the processor is disposed in a consumer device. 35. A computing device including a processor and a memory including executable instructions which, when executed by the processor, provides an escalation flow in a monitored check-in system, by: receiving input defining status parameters for configuring the monitoring profile;establishing the monitoring profile for a monitored entity based upon the received input defining status parameters for configuring the monitoring profile wherein defining status parameters comprises establishing at least one verification mechanism;executing the established monitoring profile according to the defined status parameters, the defined status parameters identifying devices, contacts, calendar entries and services associated with the monitored entity, wherein executing the established monitoring profile defines a schedule for an escalation flow of verification mechanisms to verify a status of the monitored entity, wherein the schedule includes setting a time period associated with each of the verification mechanisms, and wherein the escalation flow being implemented via a two-way interactive interface, the escalation flow including: sending messages to the monitored entity via a mobile device requesting the monitored entity to verify the status,monitoring, via a set top box, television activity of the monitored entity and when television activity is detected, requesting the monitored entity to verify the status,monitoring email and internet traffic for the monitored entity and when email and internet activity is detected, requesting the monitored entity to verify the status,sending a communication to the monitored entity via an automatic voice system, wherein interactive voice response allows the monitored entity to interact via telephone keypad or speech recognition,sending a communication, via the automatic voice system, to an escalation contact provided by the monitored entity to request the status of the monitored entity, wherein the escalation contact is identified in the contacts or the calendar entries, wherein interactive voice responses allow the escalation contact to interact via telephone keypad or speech recognition, and when the escalation contact responds to the communication the escalation contact is given a predetermined time window to follow up with the monitored entity and have a subscriber check-in,wherein the escalation flow performs an operation according to the schedule, and in response to the monitored entity not verifying the status, the escalation flow performs subsequent operations according to the schedule; andwhen all attempts to verify the status of the subscriber have failed, contacting relevant authorities, via the automatic voice system, to notify the relevant authorities that the monitored entity has failed to check-in;in response to receiving a check-in by the monitored entity, terminating execution of the established monitoring profile; andresetting the schedule for initiating execution of the established monitoring profile. 36. The server of claim 20, wherein the email and internet traffic for the monitored entity is associated with a computer for the monitored entity.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (12)
Rudman, Frederic, Communications device and method and method of use.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.