U.S. patent application number 13/493411 was filed with the patent office on 2013-01-03 for systems and methods for computer implemented treatment of behavioral disorders.
Invention is credited to Saul Rosenthal, Joanne Walker.
Application Number | 20130004924 13/493411 |
Document ID | / |
Family ID | 39344612 |
Filed Date | 2013-01-03 |
United States Patent
Application |
20130004924 |
Kind Code |
A1 |
Walker; Joanne ; et
al. |
January 3, 2013 |
SYSTEMS AND METHODS FOR COMPUTER IMPLEMENTED TREATMENT OF
BEHAVIORAL DISORDERS
Abstract
A system and method are provided for treating excessive or
problematic computer use. In at least one embodiment, a method is
employed to treat excessive or problematic computer use by
acquiring information about the unwanted user activity, monitoring
user activity for the unwanted behavior, controlling the behavior
when it occurs, enabling the user to record self-observations and
evaluating the results. This method may employ a computer based
system to treat excessive or problematic computer use which
includes configuring a user activity monitor with constraints,
programmatically enforcing those constraints, reporting the
activities monitored and restricted, and enabling a user to input
self-observations. Potential constraints include a complete bar on
the user activity, as well as, progressively decreasing the amount
of time the user may engage in the activity, i.e. titrating the
user activity.
Inventors: |
Walker; Joanne; (Newton,
MA) ; Rosenthal; Saul; (Newton, MA) |
Family ID: |
39344612 |
Appl. No.: |
13/493411 |
Filed: |
June 11, 2012 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
11934574 |
Nov 2, 2007 |
8201223 |
|
|
13493411 |
|
|
|
|
60856507 |
Nov 3, 2006 |
|
|
|
Current U.S.
Class: |
434/236 |
Current CPC
Class: |
H04L 43/06 20130101;
G06Q 10/00 20130101; H04L 67/22 20130101; G06F 2201/81 20130101;
G09B 19/00 20130101; G06F 16/285 20190101; G06F 11/3438 20130101;
G06F 11/3419 20130101 |
Class at
Publication: |
434/236 |
International
Class: |
G09B 19/00 20060101
G09B019/00 |
Claims
1. A system for treating unwanted computer use comprising: a
controller configured to control a user activity on a computer
system according to at least one constraint, the at least one
constraint either restricting each instance of the user activity to
a titrated duration or causing a user to engage in a cognitive
restructuring exercise; and a memory coupled to the controller and
storing the at least one constraint.
2. The system according to claim 1, wherein the at least one
constraint comprises an identifier of the user.
3. The system according to claim 1, wherein the at least one
constraint comprises at least one constraint received from an
external database.
4. The system according to claim 1, wherein the at least one
constraint comprises an identifier of a website to which access is
to be constrained.
5. The system according to claim 1, wherein the at least one
constraint comprises an identifier of a software application to
which access is to be constrained.
6. The system according to claim 1, wherein the titrated duration
comprises a progressively decreasing duration that decreases by a
constant amount of time for each instance of the user activity.
7. The system according to claim 1, wherein the titrated duration
comprises a progressively decreasing duration that decreases by a
variable amount of time for each instance of the user activity.
8. The system according to claim 7, wherein the titrated duration
comprises a progressively decreasing duration that decreases by a
random amount of time for each instance of the user activity.
9. The system according to claim 1, further comprising: an input
coupled to the controller and configured to receive at least one
motivator to dissuade the user from engaging in the user activity,
the at least one motivator associated with at least one user
activity; wherein the controller is further configured to store the
at least one motivator in the memory; and wherein the cognitive
restructuring exercise includes providing the user with the at
least one motivator when the user attempts to perform the user
activity.
10. The system according to claim 9, wherein the at least one
motivator includes at least one motivator individually tailored to
the user.
11. The system according to claim 1, wherein the controller is
further configured to store a record of the user activity in the
memory.
12. The system according to claim 11, further comprising an output
coupled to the controller and configured to provide the record of
the user activity to an external entity.
13. The system according claim 11, wherein the input is further
configured to receive information regarding past user activity;
wherein the controller is further configured to store the
information regarding past user activity in the memory; and wherein
the output is further configured to provide the past user activity
compared to the record of the user activity to an external
entity.
14. The system according to claim 11, wherein the input is further
configured to receive self-observations from the user, wherein the
controller is further configured to store the information regarding
past user activity in the memory; and wherein the output is further
configured to provide the self-observations to an external
entity.
15. A computer-implemented method for treating unwanted use of a
computer comprising: receiving at least one constraint identifying
a user activity to be constrained and a type of constraint to be
imposed on the user activity, the type of constraint including
either restricting the user activity to a titrated duration or
causing a user to engage in a cognitive restructuring exercise; and
controlling, by the computer, the user activity according to the at
least one constraint.
16. The method according to claim 15, wherein controlling, by the
computer, the user activity comprises storing a record of user
activity.
17. The method according to claim 15, wherein receiving at least
one constraint comprises receiving at least one motivator to
dissuade the user from engaging in the user activity.
18. The method according to claim 15, further comprising
identifying the user.
19. The method according to claim 15, further comprising receiving
self-observations from the user.
20. The method according to claim 15, further comprising: receiving
past user activity; and reporting subsequent user activity compared
to the past user activity.
21. A computer readable medium comprising instructions that when
executed by a controller, cause the controller to perform a method
including: receiving at least one constraint identifying a user
activity to be constrained and a type of constraint to be imposed
on the user activity, the type of constraint including either
restricting the user activity to a titrated duration or causing a
user to engage in a cognitive restructuring exercise; and
controlling, by the computer, the user activity according to the at
least one constraint.
Description
RELATED APPLICATIONS
[0001] This application claims priority under 35 U.S.C.
.sctn.119(e) to U.S. Provisional Application 60/856,507 filed Nov.
3, 2006 and entitled "Methods and Systems for Computer Implemented
Treatment of Behavioral Disorders," which is hereby incorporated by
reference in its entirety.
BACKGROUND OF INVENTION
[0002] 1. Field of Invention
[0003] Aspects of the present invention relate generally to systems
and methods for computer implemented treatment of behavioral
disorders, and more specifically, to a computer implemented system
and method for treating excessive or problematic computer use.
[0004] 2. Discussion of Related Art
[0005] Fueled by continued advances in information technology and
the growth of the internet, the average person's personal and
professional computer use has increased dramatically in recent
times. For example, while in the not-too-distant past the internet
may have been in the purview of a rather restricted demographic, a
2006 study concluded that 74% of homes in the United States now
have Internet access.
[0006] While much of this use is positive and productive, for some
this amount of computer and internet use can become excessive and
problematic. Examples of such excessive and problematic behavior
range from simple time mismanagement to severely addictive
behavior. For instance, many people spend more time checking email
or surfing the web than they allot for such, and many users of
internet gaming sites suffer from compulsive gaming habits.
Researchers have estimated that one out of every eight Americans
show signs of problematic internet use. Such unwanted behavior has
garnered the attention of health care providers. For example, a
recent publication of the American Medical Association recommended
that children's total screen time be limited to 1 to 2 hours a day.
Unfortunately, given the ubiquity and necessity of internet and
computer use, complete abstinence is not a feasible means of
preventing such behavior, and many do not require or are reluctant
to seek professional assistance in treating such behavior.
[0007] The software industry has authored programs directed toward
monitoring and recording computer use. Such systems are often used
by employers to control and understand how and where their
employees spend their time. Similarly, programs exist that enable a
person in authority to prohibit access to specified internet sites
and computer applications or to allow access only to specified
internet sites and computer applications. These programs are often
used by parents or educational personnel to ensure that children
have access only to appropriate content.
SUMMARY OF INVENTION
[0008] In broad overview, aspects and embodiments of the present
invention overcome or alleviate one or more of the problems of
conventional behavior modification technology. For instance, at
least one embodiment of the present invention provides a system
capable of monitoring and gradually curtailing computer and
internet use, while allowing the user to record observations about
one's reaction to the treatment. These and other elements and
features of the present invention yield more effective treatment of
unwanted computer use than conventional approaches.
[0009] According to one aspect of the present invention, a system
is provided for treating unwanted computer use. The system includes
a controller configured to control a user activity on a computer
system according to at least one constraint. The at least one
constraint may either restrict each instance of the user activity
to a titrated duration or cause a user to engage in a cognitive
restructuring exercise. The system also includes a memory coupled
to the controller. The memory may store the at least one
constraint.
[0010] The system may further include an input coupled to the
controller and configured to receive at least one motivator to
dissuade a user from engaging in the user activity. The at least
one motivator may be associated with at least one user activity.
The controller may be further configured to store the at least one
motivator in the memory, and the cognitive restructuring exercise
may include providing the user with the at least one motivator when
the user attempts to perform the user activity. In the system, the
at least one motivator may include at least one motivator
individually tailored to the user.
[0011] In the system, the at least one constraint may include an
identifier of the user. In the system, the at least one constraint
may be received from an external database. In the system, the at
least one constraint may include an identifier of a website to
which access is to be constrained. In the system, the at least one
constraint may include an identifier of a software application to
which access is to be constrained. In the system, the titrated
duration may include a progressively decreasing duration that
decreases by a constant amount of time for each instance of the
user activity. In the system, the titrated duration may include a
progressively decreasing duration that decreases by a variable
amount of time for each instance of the user activity. In the
system, the titrated duration may include a progressively
decreasing duration that decreases by a random amount of time for
each instance of the user activity. In the system, the controller
may be further configured to store a record of the user activity in
the memory.
[0012] The system may further include an output coupled to the
controller and configured to provide the record of the user
activity to an external entity. In the system, the input may be
further configured to receive information regarding past user
activity. The controller may be further configured to store the
information regarding past user activity in the memory, and the
output may be further configured to provide the past user activity
compared to the record of the user activity to an external
entity.
[0013] In the system, the input may be further configured to
receive self-observations from the user. The controller may be
further configured to store the information regarding past user
activity in the memory, and the output is further configured to
provide the self-observations to an external entity.
[0014] According to another aspect of the present invention, a
computer-implemented method for treating unwanted use of a computer
is provided. The method includes receiving at least one constraint
identifying a user activity to be constrained and a type of
constraint to be imposed on the user activity. The type of
constraint may include either restricting the user activity to a
titrated duration or causing a user to engage in a cognitive
restructuring exercise. The method may also include controlling, by
the computer, the user activity according to the at least one
constraint.
[0015] In the method, controlling, by the computer, the user
activity may include storing a record of user activity. In the
method, receiving at least one constraint may include receiving at
least one motivator to dissuade a user from engaging in the user
activity.
[0016] The method may also include identifying the user. The method
my further include receiving self-observations from the user. The
method may further include receiving past user activity, and
reporting subsequent user activity compared to the past user
activity.
[0017] According to another aspect of the present invention, a
computer readable medium is provided that includes instructions
that when executed by a controller, cause the controller to perform
a method that includes receiving at least one constraint
identifying a user activity to be constrained and a type of
constraint to be imposed on the user activity. The type of
constraint may include either restricting the user activity to a
titrated duration or causing a user to engage in a cognitive
restructuring exercise. The method may also include controlling, by
the computer, the user activity according to the at least one
constraint.
BRIEF DESCRIPTION OF DRAWINGS
[0018] The accompanying drawings, are not intended to be drawn to
scale. In the drawings, each identical or nearly identical
component that is illustrated in various figures is represented by
a like numeral. For purposes of clarity, not every component may be
labeled in every drawing. In the drawings:
[0019] FIG. 1 is a flow chart of a process for treating excessive
or problematic computer use according to one embodiment of the
invention;
[0020] FIG. 2 shows, in context, a system for treating excessive or
problematic computer use in accordance with one embodiment of the
invention;
[0021] FIG. 3 shows a general-purpose computer system upon which
various embodiments of the invention may be practiced;
[0022] FIG. 4 illustrates a storage device of a general-purpose
computer system; and
[0023] FIG. 5 depicts a network of general-purpose computer
systems.
DETAILED DESCRIPTION
[0024] Various aspects and embodiment of the present invention will
now be described in more detail with reference to the accompanying
figures. It is to be appreciated that this invention is not limited
in its application to the details of construction and the
arrangement of components set forth in the following description or
illustrated in the drawings. The invention is capable of other
embodiments and of being practiced or of being carried out in
various ways. Examples of specific implementations are provided
herein for illustrative purposes only and are not intended to be
limiting. In particular, acts, elements and features discussed in
connection with any one or more embodiments are not intended to be
excluded from a similar role in any other embodiments. Also, the
phraseology and terminology used herein is for the purpose of
description and should not be regarded as limiting. The use of
"including," "comprising," "having," "containing," "involving," and
variations thereof herein, is meant to encompass the items listed
thereafter and equivalents thereof as well as additional items.
[0025] At least one embodiment of the present invention relates to
a method for treating excessive or problematic computer use. This
embodiment is discussed further with regard to FIG. 1.
[0026] FIG. 1 shows an example process for treating excessive or
problematic computer use according to one embodiment of the present
invention. This process may be implemented using a general-purpose
computer system as discussed with regard to FIG. 3 below. This
process may be repeated until the user activity falls within
acceptable limits. At the block 202, process 200 begins.
[0027] At block 204, user activity information may be acquired.
This user activity information may serve as a baseline level of
unwanted user activity, e.g. the amount of time a user currently
spends performing the activity to be changed. As is described in
more detail below, further activity may be compared to the baseline
in order to determine progress. In one embodiment, user information
may be acquired from information derived from external databases,
such as databases that categorize websites and software content. In
another embodiment, user information may be acquired from
descriptive information contained within the websites or
applications themselves. In still another embodiment, the user
information may be acquired by the user. Other sources of
information may be incorporated as they become available.
[0028] In general, user activity information may include all of the
behaviors that are to be treated. In one embodiment, this
information may include specific websites or applications that are
to be constrained, the amount of time spent engaging in a user
activity that is considered typical for a user, the amount of time
an average person spends engaging in this user activity, a list of
individually tailored motivators to dissuade the user from engaging
in this user activity, e.g. reasons not to engage in the activity
and/or alternative courses of action, a categorization hierarchy to
which this user activity belongs, e.g. news sites, gaming
applications, etc., and the type of constraint to be imposed, e.g.
complete bar, titration, etc.
[0029] Titration refers to progressive restriction on the amount of
time that a person is allowed to engage in a specific activity. The
size of the step-down, i.e. the duration by which the titrated
activity is decreased per time period or per instance of the
titrated activity, varies, and the rate at which the step-down size
changes may follow sundry paths including, for example, random,
linear or exponential paths. Once a titration schedule has been
set, its limits can be enforced without notifying the user of the
newly decreased duration. Constraints may be imposed at any level
within the categorization hierarchy. This user activity information
may be used in subsequent blocks 208 and 212 to both monitor and
control actual user activity.
[0030] At block 206, self-observations may be recorded. In one
embodiment, these observations may be freeform articulations of the
user's emotional state before, during and after engaging in
unwanted behavior. In another embodiment, self-observations may be
placed into a pre-existing form to follow a defined treatment
protocol. For instance, a treatment protocol may require the user
to record his Subjective Units of Distress (SUDS) level and how
much time he anticipates spending engaged in a certain user
activity. Alternatively, users may be prompted to engage in
cognitive restructuring exercises.
[0031] At block 208, user activity may be monitored. In one
embodiment, monitored user activity may include interaction with
computer input hardware, e.g. keyboard, mouse, etc. and the
interaction's effect on the computer software, e.g. which
applications are started or which websites are visited. Monitored
user activity may be used in subsequent blocks 212 and 216 to
facilitate control and evaluation of monitored user activity.
[0032] At block 210, additional self-observations may be recorded.
As with block 206, these observations may be freeform or may follow
a defined treatment protocol, e.g. recording a SUDS level. In one
embodiment, these observations may be requested regularly or
sporadically, e.g. follow a random or some predefined pattern.
[0033] At block 212, monitored user activity may be controlled. The
type of control may depend upon the constraints requested by the
user in block 204. In one embodiment, if the type of user activity
is completely barred, then the user is prevented from engaging in
the attempted behavior, e.g. prevented from browsing to a gaming
website. If the type of user activity is subject to titration, a
step-down from the previous allowed duration may be applied, and
the user is then allowed to engage in the activity for the newly
determined duration. In another embodiment, the user may be
presented with a set of alternative, computer and/or non-computer
related activities that are considered more productive than the
attempted activity.
[0034] At block 214, additional self-observations may be recorded.
As with blocks 206 and 210 these observations may be freeform or
may follow a defined treatment protocol, e.g. recording a SUDS
level. In one embodiment, the user may be asked to estimate the
amount of time actually spent engaging in a user activity. In an
another embodiment, users may be prompted to follow the "ABC" form
of analysis from Cognitive Behavioral Therapy where Antecedents,
e.g. emotional states, situational factors, etc.; Behavior, e.g.
user activity and emotional states; and Consequences, e.g.
decreased productivity, anger from family members, increased debt,
etc. are all identified and recorded for later analysis.
[0035] At block 216, results may be evaluated and appropriate
action may be taken by the user or a health care professional. In
an embodiment, this evaluation may include review of user activity
reports showing the amount of time spent engaged in unwanted
behavior compared to other measures including initial baseline
levels and user predicted levels of use recorded at previous
blocks, such as blocks 204 and 206. Additionally, the user activity
reports may show by user activity: start and stop times, the
anticipated duration, the estimated actual duration, the actual
duration and the SUDS level. In another embodiment, this content
may include a set of activities that could have been accomplished
using the time consumed by unwanted user activity.
[0036] Further, at block 216, the user may be rewarded upon
achieving certain decreased usage milestones. This reward may take
any form known in the art including reward tokens, affirmation
emails, etc. Lastly, based upon the evaluated results, new courses
of action may be prescribed, e.g. a continued step-down duration, a
new alternative behavioral suggestion per block 212, etc.
[0037] At block 218, process 200 ends.
[0038] FIG. 2 illustrates a system 300 for treating excessive or
problematic computer use according to one embodiment of the
invention when implemented on one or more computer systems. Any of
the recited modules may be implemented in customized software code
or using existing software including a GUI, email, FTP, batch
system interface, database system data movement tools, middleware,
scanning with optical character recognition (OCR), any combination
thereof, or otherwise. Moreover, embodiments in accord with the
present invention may adopt any modular structure and are not
limited to those shown in FIG. 2. The particular modular
arrangement presented in FIG. 2 was chosen to promote clarity.
[0039] System 300 may include a user activity configurer module
302, a user activity monitor module 304, a user activity controller
module 306, an input/output interface module 308, and a
self-observation interface module 310. Module 302 may accept user
activity information from various sources and supplies modules 304
and 306 with user activity constraints. Module 304 may accept user
activity constraints from module 302 and user activity from
monitored applications and the operating system. Module 304 may
supply user activity to module 306 and monitored activity to module
308. Module 306 may accept user activity constraints from module
302 and user activity from module 304 and supply constrained
activity to module 308. Module 306 may also enforce the constraints
against monitored applications and the operating system. Module 308
may accept and supply system information from and to a system
information repository. Module 308 may also supply rewards and
activity reports to users. Module 310 may accept user
self-observations and supply self-observations to module 308.
Information may flow between these modules using by any means know
in the art including, for example, by passing the information over
the network via TCP/IP, by passing the information between modules
in memory or by writing the information to a file, database, or
some other non-volatile storage device.
[0040] Module 302 may acquire user activity information such as
that discussed above with reference to block 204 of FIG. 1. In one
embodiment, an initial set of user activity may be supplied by the
system with supplemental activity added by the user. In another
embodiment, the system may import this information from an
encrypted data stream or from encrypted data files on a storage
device or have it supplied by a third party on a subscription
basis. Thus, the third party may be able to configure user activity
information on behalf of the user.
[0041] Module 304 may monitor user activity. Monitoring may include
intercepting and decoding both user interaction with hardware and
its associated affect on the software being executed. In one
embodiment, this monitoring may be implemented by an application
that is resident on the computer where the user is active. When the
user interacts with the computer, module 304 may be notified
through the use of hooks or any other means known in the art to
monitor application and system calls, such as, for example,
software drivers.
[0042] Module 306 may control user activity. In one embodiment,
user activity may be controlled by completely barring a particular
website or application. In another embodiment, module 306 allows
access to an application or website for a limited duration, e.g.
when the prescribed constraint is titration. In still another
embodiment, module 306 may present a list of suggested alternative
activities to dissuade the user from engaging in the unwanted
behavior or may present a list of user authored reasons to
disengage from the behavior.
[0043] Module 308 may act as both a user and a system interface. In
one embodiment, module 308 outputs textual and graphical reports of
user activity and observation presenting information such as that
discussed above with reference to block 216 of FIG. 1. In another
embodiment, module 308 may deliver rewards, such as electronic
reward tokens or affirmation emails, to the user. Module 308 may
also output all system information to a system information
repository for back-up, portability or other purposes.
Reciprocally, module 308 may import system information from a
system information repository for restoration, portability or other
purposes. In another embodiment, the system information repository
may be used to store and forward treatment information to health
care provider for evaluation, or to statisticians for trend
analysis.
[0044] Module 310 may present a user interface for entry of
self-observations. These observations may be input under a freeform
or form driven paradigm. While the content included may cover any
subject matter, preferably, SUD levels, emotional and situational
antecedents, emotional response to the behavior, and fiscal,
familial, and emotional consequences are included.
[0045] The modular structure and content recited above is for
exemplary purposes only and is not intended to limit the invention
to the specific structure disclosed. As will be apparent to one of
ordinary skill in the art, many variant modular structures can be
architected without deviating from the present invention. For
example, these modules may be implemented in as a stand alone
executables, services, browser-based forms, browser plug-ins or TSR
(Terminate and Stay Resident) applications.
[0046] A process for treating excessive or problematic computer use
200 according to one embodiment of the invention may be implemented
on one or more general-purpose computer systems. For example,
various aspects of the invention may be implemented as specialized
software executing in a general-purpose computer system 400 such as
that shown in FIG. 3. Computer system 400 may include one or more
output devices 401, one or more input devices 402, a processor 403
connected to one or more memory devices 404 through an
interconnection mechanism 405 and one or more storage devices 406
connected to interconnection mechanism 405. Output devices 401
typically render information for external presentation and examples
include a monitor and a printer. Input devices 402 typically accept
information from external sources and examples include a keyboard
and a mouse. Processor 403 typically performs a series of
instructions resulting in data manipulation. Processor 403 is
typically a commercially available processor such as an Intel
Pentium, Motorola PowerPC, SGI MIPS, Sun UltraSPARC, or
Hewlett-Packard PA-RISC processor, but may be any type of
processor. Memory device 404, such as a disk drive, memory, or
other device for storing data is typically used for storing
programs and data during operation of the computer system 400.
Devices in computer system 400 may be coupled by at least one
interconnection mechanism 405, which may include, for example, one
or more communication elements (e.g., busses) that communicate data
within system 400.
[0047] The storage device 406, shown in greater detail in FIG. 4,
typically includes a computer readable and writeable nonvolatile
recording medium 911 in which signals are stored that define a
program to be executed by the processor or information stored on or
in the medium 911 to be processed by the program. The medium may,
for example, be a disk or flash memory. Typically, in operation,
the processor causes data to be read from the nonvolatile recording
medium 911 into another memory 912 that allows for faster access to
the information by the processor than does the medium 911. This
memory 912 is typically a volatile, random access memory such as a
dynamic random access memory (DRAM) or static memory (SRAM). It may
be located in storage device 406, as shown, or in memory device
404. The processor 403 generally manipulates the data within the
memory 404, 912 and then copies the data to the medium 911 after
processing is completed. A variety of mechanisms are known for
managing data movement between the medium 911 and the memory 404,
912, and the invention is not limited thereto. The invention is not
limited to a particular memory device 404 or storage device
406.
[0048] Computer system 400 may be implemented using specially
programmed, special purpose hardware, or may be a general-purpose
computer system that is programmable using a high-level computer
programming language. For example, computer system 400 may include
cellular phones, personal digital assistants and/or other types of
mobile computing devices. Computer system 400 usually executes an
operating system which may be, for example, the Windows 95, Windows
98, Windows NT, Windows 2000 (Windows ME) or Windows XP operating
systems available from the Microsoft Corporation, MAC OS System X
available from Apple Computer, the Solaris Operating System
available from Sun Microsystems, or UNIX operating systems
available from various sources (e.g., Linux). Many other operating
systems may be used, and the invention is not limited to any
particular implementation. For example, an embodiment of the
present invention may display a report of monitored user activity
using a general-purpose computer system with a Sun UltraSPARC
processor running the Solaris operating system.
[0049] Although computer system 400 is shown by way of example as
one type of computer system upon which various aspects of the
invention may be practiced, it should be appreciated that the
invention is not limited to being implemented on the computer
system as shown in FIG. 3. Various aspects of the invention may be
practiced on one or more computers having a different architecture
or components than that shown in FIG. 3. To illustrate, one
embodiment of the present invention may acquire user activity
configuration information using several general-purpose computer
systems running MAC OS System X with Motorola PowerPC processors
and several specialized computer systems running proprietary
hardware and operating systems.
[0050] As depicted in FIG. 5, one or more portions of the system
may be distributed to one or more computers (e.g., systems 109-111)
coupled to communications network 108. These computer systems
109-111 may also be general-purpose computer systems. For example,
various aspects of the invention may be distributed among one or
more computer systems configured to provide a service (e.g.,
servers) to one or more client computers, or to perform an overall
task as part of a distributed system. For example, various aspects
of the invention may be performed on a client-server system that
includes components distributed among one or more server systems
that perform various functions according to various embodiments of
the invention. These components may be executable, intermediate
(e.g., IL) or interpreted (e.g., Java) code which communicate over
a communication network (e.g., the Internet) using a communication
protocol (e.g., TCP/IP). To illustrate, one embodiment may acquire
user activity information though a browser interpreting HTML forms
and may import system information from a system information
repository using a data translation service running on a separate
server.
[0051] Various embodiments of the present invention may be
programmed using an object-oriented programming language, such as
SmallTalk, Java, C++, Ada, or C# (C-Sharp). Other object-oriented
programming languages may also be used. Alternatively, functional,
scripting, and/or logical programming languages may be used.
Various aspects of the invention may be implemented in a
non-programmed environment (e.g., documents created in HTML, XML or
other format that, when viewed in a window of a browser program,
render aspects of a graphical-user interface (GUI) or perform other
functions). Various aspects of the invention may be implemented as
programmed or non-programmed elements, or any combination thereof.
For example, a self-observation information data entry screen may
be implemented using Visual Basic while the application designed to
monitor user activity may be written in C++.
[0052] It should be appreciated that a general-purpose computer
system in accord with the present invention may perform functions
outside the scope of the invention. For instance, aspects of the
system may be implemented using an existing commercial product,
such as, for example, Database Management Systems such as SQL
Server available from Microsoft of Seattle Wash., Oracle Database
from Oracle of Redwood Shores, Calif., and MySQL from MySQL AB of
UPPSALA, Sweden and WebSphere middleware from IBM of Armonk, N.Y.
If SQL Server is installed on a general-purpose computer system to
implement an embodiment of the present invention, the same
general-purpose computer system may be able to support databases
for sundry applications.
[0053] Based on the foregoing disclosure, it should be apparent to
one of ordinary skill in the art that the invention is not limited
to a particular computer system platform, processor, operating
system, network, or communication protocol. Also, it should be
apparent that the present invention is not limited to a specific
architecture or programming language.
[0054] Having now described some illustrative embodiments of the
invention, it should be apparent to those skilled in the art that
the foregoing is merely illustrative and not limiting, having been
presented by way of example only. Numerous modifications and other
illustrative embodiments are within the scope of one of ordinary
skill in the art and are contemplated as falling within the scope
of the invention. In particular, although many of the examples
presented herein involve specific combinations of method acts or
system elements, it should be understood that those acts and those
elements may be combined in other ways to accomplish the same
objectives. Acts, elements and features discussed only in
connection with one embodiment are not intended to be excluded from
a similar role in other embodiments.
* * * * *