Systems and Methods for Monitoring Compliance With Recovery Goals

20210110911 · 2021-04-15

    Inventors

    Cpc classification

    International classification

    Abstract

    Systems and methods for incentivizing a user to satisfy a goal for attending twelve step meetings. The method includes the steps of: providing the user with a mobile device; detecting the presence of the mobile device at a first location and at a first time selected by the user; comparing the first time and the first location to a database of approved meetings, wherein the comparing is substantially contemporaneous with the first time; and providing a reward to the user upon confirming that: i) the first time and the first location correspond to an approved meeting; and ii) the user is proximate the mobile device at the first time.

    Claims

    1. A method of facilitating attendance compliance at a meeting organized by a meeting organizer having a first financial account, the method comprising the steps of: populating a database of affiliates associated with the meeting organizer, including a meeting time and a meeting location for each affiliate; providing a user with a mobile device having a processor configured to execute a monitoring application; funding a second financial account associated with the mobile device; detecting the presence of the mobile device at a first meeting location at a corresponding first meeting time; determining, substantially contemporaneously with the first meeting time, whether the first meeting time and the first meeting location correspond to an affiliate within the database; prompting the user to authorize a transfer of funds from the second account to the first account substantially contemporaneously with the first time upon confirming that the first meeting time and the first meeting location correspond to an affiliate within the database.

    2. The method of claim 1, further comprising: identifying and associating respective financial accounts for each affiliate; and allocating at least a portion of the transferred funds to the affiliate account associated with the first meeting location and the first time.

    3. The method of claim 1, further comprising establishing a geo-fence surrounding one or more of the meeting locations, wherein detecting the presence of the mobile device at a meeting location is the detection of the presence of the mobile device inside the geo-fence.

    4. The method of claim 3, wherein the mobile device does not report its position to the monitoring application when its presence is detected outside the geo-fence.

    5. The method of claim 3, wherein the electronic device silences itself while its presence is detected within the geo-fence.

    6. The method of claim 3, further comprising a check-in request feature wherein a third party prompts the electronic device to alarm and request an immediate check-in by the user.

    7. The method of claim 3, wherein the geo-fence encompasses a no-go area.

    8. A method of facilitating a user's attendance compliance with a recovery plan that includes attending a predetermined number of approved meetings within a predetermined time period and avoiding at least one no-go zone, the method comprising the steps of: providing the user with a mobile device including a global positioning system (GPS) module, a monitoring application in operable communication with the GPS module, and the user's sobriety data recorded on a memory device comprised in the mobile device; providing an electronic benefit to the user based upon compliance with the recovery plan; populating an electronically searchable database with at least one approved meeting, each approved meeting comprising a meeting time and a meeting location; populating the electronically searchable database with at least one no-go zone, having an associated geo-fence; determining, using the GPS module, instances in which the mobile device is one of not physically present at one of the approved meetings and crosses the at least one geo-fence; terminating the electronic benefit upon confirming that the mobile device was not physically present at the meeting location at the meeting time; and terminating the user benefit upon confirming that the electronic device has breached a geo-fence.

    9. The method of claim 8, further comprising confirming the user's proximity to the mobile device using a biometric parameter at the meeting time.

    10. The method of claim 8, wherein the terminating step includes terminating the user's internet access.

    11. The method of claim 8, wherein the electronic benefit is an electronic cash transfer.

    12. The method of claim 8, wherein the mobile device is configured to not report its GPS location outside the geo-fence.

    13. The method of claim 8, further comprises reporting the user's sobriety data upon determining that the electronic device is within a geo-fence.

    14. The method of claim 13, further comprising the collection of sobriety data for other people within the geo-fence, calculating a sobriety metric for all people within the geo-fence, and displaying a sobriety metric based on the collected sobriety data for all of the people within the geo-fence.

    15. A method of facilitating a user's compliance with a recovery plan that includes attending a predetermined number of approved meetings within a predetermined time period, the method comprising the steps of: detecting the presence of a mobile device at a first time and a first location selected by the user; comparing the first time and first location to a database of approved meetings, wherein the comparing is substantially contemporaneous with the first time; and providing a reward via the mobile device upon confirming that: i) the first time and the first location correspond to an approved meeting; and ii) the user is proximate the mobile device at the first time.

    16) The method of claim 15, wherein the detecting the presence of a mobile device at a first time and a first location incudes detecting that the mobile device has crossed a geo-fence.

    17) The method of claim 16, wherein the mobile device is configured to not report its location outside the geo-fence.

    18) The method of claim 16 further comprising the automatic taking of a blood sample by a testing device in operable physical contact with the user's body and in electronic communication with the mobile device.

    19) The method of claim 18, further comprising the automatic, real-time analysis of the blood sample and real time electronic communication of analysis results via the mobile device to a third party.

    20) The method of claim 15, further comprising a request a ride/offer a ride transportation service.

    Description

    BRIEF DESCRIPTION OF THE DRAWING FIGURES

    [0020] Exemplary embodiments will hereinafter be described in conjunction with the following drawing figures, wherein like numerals denote like elements, and:

    [0021] FIG. 1 is a schematic block diagram of a system including a user device, a server, and financial accounts configured to communicate over a network such as the internet in accordance with various embodiments; and

    [0022] FIG. 2 is a schematic block diagram of a mobile device in accordance with various embodiments.

    DETAILED DESCRIPTION OF PREFERRED EXEMPLARY EMBODIMENTS

    [0023] The following detailed description of the invention is merely exemplary in nature and is not intended to limit the invention or the application and uses of the invention. Furthermore, there is no intention to be bound by any theory presented in the preceding background or the following detailed description.

    [0024] Various embodiments of the present invention relate to devices, tools, techniques, systems, and associated methods for monitoring a person's compliance with a plan for recovering from alcoholism and/or drug addiction. Various embodiments involve an interactive user application running on a mobile telephone having a global positioning system (GPS) module for tracking the geo-location of the user. In a preferred embodiment, the user application contemplates a default “private” mode in which location services (e.g., GPS) is disabled. In the default mode, the user may enter a location (e.g., manually) to confirm attendance at a scheduled twelve step meeting. Alternatively, the user may over-ride the default mode by enabling location services, allowing the system to track the user's location and automatically confirm the user's presence at a scheduled meeting or other event. In this way the application is able to provide positive reinforcement for desired behavior, such as attending twelve step meetings and otherwise complying with recovery protocols. In the context of a recovery program, positive reinforcement may include financial, social, and lifestyle incentives such as providing transportation, mobile phone services, internet access, payment for treatment services, cigarettes, and the like. The application may also be configured to provide negative reinforcement for unhealthy behaviors such as going to liquor stores, bars, and acquaintances (e.g., former boyfriends and girlfriends) which may serve as relapse triggers. In this context, negative reinforcement may include termination of the aforementioned rewards.

    [0025] Referring now to FIG. 1, a recovery monitoring system 100 includes one or more user and/or administrative devices 102, a server 106, and financial accounts 108 configured to communicate with one another through a network no such as the internet. In various embodiments, the user device 102 may be a hand held device, a wearable device (e.g., a watch, pendant, garment, or the like), a laptop, Kindle, cell phone, or any other portable device associated with a person 104 in recovery (also referred to herein as a mobile device user, candidate, or patient in recovery).

    [0026] In addition, devices 102 may be associated with one or more ancillary persons or entities having a role in the user's recovery, such as a sponsor, parole officer, family member, friend, court clerk, guardian, counselor, health care professional, or the like. Those skilled in the art will appreciate that varying degrees of access to the user's information by third parties may be authorized by the user. For example, tracking information regarding the user's whereabouts may be limited to only those with a need to know or otherwise required by a court, for example to enforce probation or other protocols.

    [0027] By way of further illustration, a user may be persuaded or required to provide access to personal information (e.g., location, drug test results) to a trusted friend or family member in exchange for continued financial support. In one embodiment, the financial incentive may be in the form of continued provision of mobile phone service, internet access, transportation, housing, and the like, in exchange for access to personal information in order to ensure that the user remains accountable to the person or entity (e.g., government or social service organization) that has agreed to pay for the foregoing incentives as long as the user remains compliant with a treatment plan. In this regard, the system may be configured to allow the user or a designated administrator to determine levels of reporting and/or sharing of information such as, for example, educational progress, location data, drug tests, and the like. In one embodiment, the user may elect to share all or various sub-sets of information with a first level which may include designated family members, friends, sponsor, probation officer, house manager, or the like. A second level may include counselors, therapists, and licensing boards. A third level may include a custom configuration, such only the user and/or a trusted agent.

    [0028] With continued reference to FIG. 1, the server 106 may comprise one or more servers, databases, storage devices, and associated processing systems as appropriate to implement the functions, techniques, and methods described herein. In one embodiment, the server 106 includes an approved meeting database which includes, for each of a plurality of meetings, the meeting location (e.g., street address and/or GPS coordinates) and the meeting time (e.g., start time, end time, and which days of the week the meeting occurs). In addition, the meeting database may indicate the type of meeting, such as alcoholics anonymous, narcotics anonymous, overeaters anonymous, and so on. In a further embodiment, server 106 may comprise various other databases such as, for example, a list of names, contact information, sobriety dates, meeting attendance records, pseudonyms, usernames, or avatars associated with various users so that both personal and anonymous (e.g., aggregate) data may be shared with other users, as authorized and appropriate in view of AA's longstanding culture of anonymity.

    [0029] Referring now to FIG. 2, an exemplary mobile device 200 includes a display module 202 (optionally configurable to display a keypad), a GPS module 204, a processing module 206, an input/output module 208, a storage module 210, and a telephony/connectivity module 212. More particularly, the storage module 210 may store the monitoring application executed by the processor 206, as well as other programs and data for implementing the various functionality discussed herein (e.g., optical character recognition (OCR) for capturing, storing, and reporting receipts). The I/O module 208 may include hardware and/or software (e.g., drivers) for implementing a microphone, speakers, video streaming, camera, tactile functions, and biometrics (e.g., fingerprint capture, voice recognition, pulse oximetry, blood alcohol detection, retinal scans, and the like).

    [0030] Various embodiments of the present invention involve systems, tools, and methods for assisting people recovering from addictions and other mental health issues with their recovery plan. Typically, this involves attending meetings, working a twelve step program (preferably with a sponsor of the same gender), and modifying lifestyle, attitudinal, and social behaviors. For many in early sobriety, the process can be overwhelming without treatment. However, treatment facilities can be prohibitively expensive, and thus out of reach to most alcoholics and addicts. The present invention seeks to provide guidance, structure, education, and accountability through a mobile app to assist the addict in managing the logistics of recovery. Significantly, various aspects of the present provide tools which allow a third part to monitor and/or verify the candidate's compliance in real time, for example, as a predicate to providing financial, legal, emotional, and logistical support to the person in recovery.

    [0031] In accordance with a further aspect of the invention, the mobile app provides time management, financial management, and other tools for developing life skills needed for sustained recovery. For example, the application allows the user to snap a photo of every receipt, and store them for later review. This not only facilitates budgeting skills by summarizing how money is spent, but provides a time management auditing tool as well.

    [0032] In one embodiment, educational modules allow the candidate to self-administer a custom program, which may be in the form of text, audio, video, and game-based files. To reduce the risk of overwhelming a candidate in early sobriety, successive educational modules may be configured to “unlock” only after a previous module has been completed.

    [0033] The system may be configured to suggest and/or require bio-verification to allow access to and to confirm progress in and/or completion of educational and training programs or discrete segments thereof, including answering questions or otherwise confirming that the user understands the underlying material. Such education/training programs may be integral to the system ecosystem. Alternatively, third party programs may be dynamically integrated on a plug-n-play basis. Such programs, whether native or third party, may include addiction and recovery assessment tools, as well as tools for tracking relapse factors, triggers, and/or actual relapses including drug and alcohol usage and other addictive behaviors and tendencies.

    [0034] Bio-verification techniques may also include heartbeat or pulse verification tools, as well as needle-free blood draw and DNA verification tools such as described in Peeters et al. U.S. patent application Ser. No. 14/289,362 filed May 28, 2014 and published Dec. 3, 2015 as U.S. Publication 2015/0342509 entitled “Needle-Free Blood Draw,” the entire contents of which are hereby incorporated by this reference. Alternatively, a continuous blood chemistry monitor may be used that is similar to a continuous glucose monitor such as the “Dexcom G6” or the Medtronic “FreestyleLibre,” which are non-limiting examples of a continuous blood monitoring system. Such a continuous blood chemistry module may be combined with or instead of the needle free blood draw to provide continuous, periodic or on demand drug monitoring.

    [0035] In accordance with a further aspect of the invention, data for a plurality of users may be anonymized and aggregated for use in machine learning, artificial intelligence (AI), and otherwise harvested using data mining techniques familiar to those skilled in the art.

    [0036] A further aspect facilitates contracts between the candidate and other people or institutions to whom the candidate is accountable. For example, the candidate may enter into an agreement with a sponsor to maintain ongoing contact (e.g., through telephone calls, emails, and/or text messages) with an approved recovery network (ARN) of other individuals in recovery. In one example, the mobile app may track and log communications with the ARN, and may further allow the sponsor to help design the ARN. In an embodiment, the ARN may consist of not more than x number of persons having less than one year of sobriety, y number of persons having between 1 and 5 years of sobriety, z number of persons having between 5 and 10 years of sobriety, and so on, where the numbers x, y, and z may be agreed to by the candidate and sponsor. In this way, both the quantity (frequency of contact) and quality (years of sobriety within the ARN) of the communication (“reaching out”) protocol component may be objectively evaluated.

    [0037] In a further embodiment, the mobile app allows each user to log into a meeting, for example by manually entering the user's location (if location services is disabled) or, if location services is enabled, by comparing the GPS coordinates of the user's mobile device to a geo-fence surrounding the GPS coordinates of a plurality of meetings stored within a database accessible by the mobile app. If the app determines that the mobile device is within a recognized geo-fence during a scheduled meeting, it may be confirmed that the device “attended” the meeting. By further verifying that the user is in possession of the device at that time (e.g., using a unique biometric parameter), it may be confidently inferred that the user attended the meeting.

    [0038] Continuing the above example, as a number of users log into the same meeting, with each user anonymously disclosing their sobriety date, the system may compute an aggregate sobriety score for a particular meeting which indirectly reflects the quality of sobriety in attendance. As a further objective metric for monitoring a user's compliance, the user may agree to attend at least one meeting per week having a sobriety score of at least one year, one or more meetings per week (or other metric such per month) having a sobriety score greater than two years, least one meeting per week having a sobriety score greater than five years, and so on. If the user finds that the meetings do not satisfy the targeted sobriety scores, the user may be motivated to select a different mix of meetings going forward.

    [0039] A further aspect of the invention involves an optionally anonymous abuse report function with or without a secondary connection function. More particularly, the system may be configured to allow a user to chronicle or report past, present, and/or possible future threats, harassment, bullying, triggers, and other circumstances or people which potentially compromise recovery, either within or outside meeting rooms. To facilitate this reporting function, the system may dynamically construct a database of names of suspected abusers submitted by users, predators, and the like. When a user submits a name, the user is advised of the number of other users who have reported the same abuser, without also identifying those users. By enabling the secondary “connect” feature, the system may reveal the names of other users who previously reported the same offender. The victims can then collaborate to determine whether to report the abuser to appropriate authorities, local AA luminaries, or their sponsors.

    [0040] In one use case, the “abuser” may be someone engaged in any type of illegal or inappropriate activity, such as prostitution or offering or selling drugs or stolen merchandise. In this way, a database of offenders and/or danger zones (e.g., particular meetings or meeting locations) of predatory or threatening activity may be made available to users. Each user can determine whether to share their concerns publically (to all app users), or with a subset of users such as groups of friends. Sponsors, family members, probation officers, and others may monitor these zones and intervene, as appropriate. In an embodiment, the zones may be displayed on a color coded map, with red corresponding to a high danger zone, yellow corresponding to a moderate level of danger, and so on.

    [0041] A method is thus provided for incentivizing a user to satisfy an attendance goal. The method includes the steps of providing the user with a mobile device and detecting the presence of the mobile device at a first location and at a first time selected by the user. In this context, the first location and first time selected by the user corresponds to a particular meeting held at a particular location chosen by the user from a list of available meetings in the area. Those skilled in the art will appreciate that may communities publish lists of meeting times and locations, and update the list as to reflect ongoing changes.

    [0042] The method further involves comparing the first time and the first location to a database of approved meetings, wherein the comparing is substantially contemporaneous with the first time; stated another way, the system may compare the GPS coordinates of the user's mobile device to the database of meetings in real time. in this way, for example, if a user has committed to attending a particular meeting at a particular time, those to whom the user is accountable will know immediately that the user either honored or breached his attendance commitment. If the user complies with his commitment for either a particular meeting or for a schedule of meetings over a period of time, an incentive (or reward) may be provided to the user upon confirming that: i) the first time and the first location correspond to an approved meeting; and ii) the user is proximate the mobile device at the first time. In other words, the reward may be contingent upon confirming that the device was at the meeting, and that the user was in possession of the device at the time the meeting occurred. This prevents “cheating” by having an acquaintance bring the user's phone to the meeting, without the user himself actually attending.

    [0043] In an embodiment, the mobile device includes a processor and the method further includes equipping the mobile device with a monitoring application configured to run on the processor.

    [0044] In an embodiment, the reward may include any type of financial, social, logistical, or legal incentive such as continued access to the mobile device by the user, continued payment for treatment, housing, food, or a certification that the user is compliant with legal requirements such as probation.

    [0045] In an embodiment, the method further includes populating the database with meeting times and meeting locations for a plurality of approved meetings. In this regard, the system nay be configured to access one or more websites and download meeting lists, and convert the meeting addresses to GPS coordinates, or otherwise use mapping techniques to construct a geo-fence around each meeting location so that the system can determine when a user's mobile device is at a meeting. Moreover, either the mobile app or the server may include a web crawler or other functionality for periodically updating the meeting database to reflect both new meetings and changes to existing meetings. Alternatively, the meeting database may be manually populated.

    [0046] The method may also involve determining whether the user is proximate the mobile device at the first time (i.e., at the scheduled meeting time) using a biometric parameter associated with the user, such as a finger print, retinal scan, voice profile, or any other metric intended to uniquely identify the user.

    [0047] In an embodiment, the monitoring application (mobile app) may be configured to: determine GPS coordinates for each of the plurality of meeting locations; automatically detect the presence of the mobile device at the first location by comparing the GPS coordinates of the mobile device to each of the meeting location GPS coordinates; and upon determining that the mobile device GPS coordinates match one of the meeting location GPS coordinates, prompt the user to confirm that the user is proximate the mobile device at the first time. That is, the user may either proactively “check in” with the device, or the device may prompt the user to confirm his presence, for example using biometrics, passwords, or other handshake techniques.

    [0048] In an embodiment, each of the meeting times comprises a time window within which the corresponding meeting is expected to occur; and the first time corresponds to the time at which the monitoring application confirms that the mobile device is within a geo-fence associated with the first location. That is, the system may be configured to confirm the user's attendance at a meeting at the precise time at which the meeting begins, or thereafter. For example, if the user's sponsor determines that the user must be on time for all meetings, the system may confirm attendance at the scheduled start time. A more lax approach may allow the system to confirm attendance within a five, ten, or fifteen (or other metric) minute window before or after the start time, or at any time during which the meeting is being conducted (i.e., at any time between 8:00 and 9:00 pm).

    [0049] In an embodiment, the monitoring application is configured to automatically place the mobile device into an “airplane,” sleep, silent, off, or other suitable operational mode for a predetermined period of time once it is determined that the mobile device is at a meeting (e.g., within a geo-fence). Indeed, this feature may be employed in any number of contexts such as church, formal social events (weddings, funerals), business meetings, counseling sessions, and the like.

    [0050] In an embodiment, the monitoring application may be configured to: submit the user's sobriety date to a sobriety database which includes respective sobriety dates for other persons attending the same meeting; compute a sobriety score for the meeting (e.g., based on current and/or historical sobriety date data for attendees); and display the sobriety score on the user's mobile device.

    [0051] In an embodiment, the monitoring application may be configured to: submit the user's first name, gender, and mobile device identifier to a support database which includes respective first names and mobile device identifier (telephone number, email address, avatar, Facebook, Linkedin, Twitter, or other social media username or handle) associated with other persons attending the same meeting; and transmit to (and, if desired, display on) the user's mobile device, the first names and mobile device identifiers with other persons of the same gender attending the same meeting.

    [0052] In this regard, those familiar with twelve step cultures will appreciate that men typically comprise the primary social support network for other men, and women typically comprise the primary social support network for other women. Thus, while it may be appropriate to share names and contact information for both genders, experience suggests that segregating men and women is often more appropriate, particularly in early sobriety.

    [0053] It should be noted that any or all of the foregoing information may also be provided to one or more administrative users, such as friends, sponsors, probation officers, counselors, and the like to assist them if monitoring the user and verify compliance with program protocols.

    [0054] A method is also provided for facilitating financial contributions from a meeting attendee to a meeting organizer (e.g., a home group or local chapter) having a first account, the method comprising the steps of: populating a database of affiliates associated with the meeting organizer, including a meeting time and a meeting location for each affiliate; providing a user with a mobile device having a processor configured to execute a monitoring application; funding a second account associated with the mobile device; detecting the presence of the mobile device at a first one of the meeting locations at a corresponding first meeting time; determining, substantially contemporaneously with the first meeting time, whether the first meeting time and the first meeting location correspond to an affiliate within the database; prompting the user to authorize a transfer of funds from the second account to the first account substantially contemporaneously with the first time upon confirming that the first meeting time and the first meeting location correspond to an affiliate within the database.

    [0055] In an embodiment, the meeting organizer comprises a twelve step group, support group, church, synagogue, or other charitable organization.

    [0056] In an embodiment, the method involves establishing respective accounts for each affiliate (e.g., meeting group, home group, half-way house, or local twelve step intergroup); and allocating at least a portion of the transferred funds to the affiliate account associated with the first meeting location and the first meeting time.

    [0057] A method is also provided for facilitating a user's compliance with a recovery plan of the type including: i) attending a predetermined number of approved meetings within a predetermined time period; and ii) avoiding no-go zones. In an embodiment, the method may include the steps of: providing the user with a mobile device including a GPS module; populating a first database of approved meetings, each comprising a meeting time and a meeting location; populating a second database of no-go zones, each having an associated geo-fence; tracking, using the GPS module, instances in which the mobile device attends one of the approved meetings or breaches one of the geo-fences; providing a prepaid user benefit to the user contingent upon the user's compliance with the recovery plan; continuing the user benefit upon confirming that the user has attended the predetermined number of meetings within the predetermined time period; and terminating the user benefit upon confirming that the user has entered a no-go zone.

    [0058] As used herein, the word “exemplary” means “serving as an example, instance, or illustration.” Any implementation described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other implementations, nor is it intended to be construed as a model that must be literally duplicated.

    [0059] While the foregoing detailed description will provide those skilled in the art with a convenient road map for implementing various embodiments of the invention, it should be appreciated that the particular embodiments described above are only examples, and are not intended to limit the scope, applicability, or configuration of the invention in any way. To the contrary, various changes may be made in the function and arrangement of elements described without departing from the scope of the invention.