IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0718327
(2003-11-20)
|
발명자
/ 주소 |
- Walker,Jay S.
- Tedesco,Daniel E.
- Alderucci,Dean P.
- Fincham,Magdalena M.
|
출원인 / 주소 |
|
인용정보 |
피인용 횟수 :
12 인용 특허 :
34 |
초록
▼
A system and method are disclosed for a central server to manage remote monitoring tasks performed by users of a data network. An exemplary method comprises: receiving a request from a user of a user device to monitor a remote location; determining a remote location to be monitored; enabling communi
A system and method are disclosed for a central server to manage remote monitoring tasks performed by users of a data network. An exemplary method comprises: receiving a request from a user of a user device to monitor a remote location; determining a remote location to be monitored; enabling communication between a sensor at the remote location and the user device; and crediting value to the user in accordance with an amount of time the user device has been in communication with the remote sensor for remote monitoring purposes. An alternate exemplary method includes measuring user attentiveness while the user device is in communication with the remote sensor. Thus, the disclosed system and method provide a way for users of a data network such as the Internet to log on at any time and perform remote monitoring tasks for value. Idle time can now be turned into value using the disclosed system and method. Moreover, little or no skill is required of the user to earn value using the disclosed system and method; the user need only be attentive while performing a remote monitoring task. Location owners also benefit from the convenience by which they can now have their properties monitored and by the ability of the disclosed system and method to ensure the attentiveness of the user performing the remote monitoring task.
대표청구항
▼
We claim: 1. A method, comprising: arranging for a first user to monitor a remote location; transmitting to the first user, while the user is supposed to be monitoring the remote location, a test image of the remote location, the test image being an image of a fabricated breach of security of the
We claim: 1. A method, comprising: arranging for a first user to monitor a remote location; transmitting to the first user, while the user is supposed to be monitoring the remote location, a test image of the remote location, the test image being an image of a fabricated breach of security of the remote location, without informing the first user that the breach of security is fabricated; determining whether the first user recognizes the breach of security in the test image; and determining an attentiveness of the first user based on whether the first user recognizes the breach of security in the test image. 2. The method of claim 1, further comprising: penalizing the first user if it is determined that the first user does not recognize the breach of security in the test image. 3. The method of claim 2, wherein penalizing the first user comprises: causing a rating associated with the first user to be lowered. 4. The method of claim 3, further comprising: causing a communication link between a device of the first user and another device facilitating the monitoring of the remote location to be disabled as a consequence of the lowered rating. 5. The method of claim 2, wherein penalizing the first user comprises: preventing the first user from monitoring remote locations in the future. 6. The method of claim 2, wherein penalizing the first user comprises: preventing a payment for the monitoring of the remote location from being provided to the first user. 7. The method of claim 2, wherein penalizing the first user comprises: lowering a pay rate based on which the first user is to be paid for the monitoring of the remote location. 8. The method of claim 1, wherein determining whether the first user recognizes the breach of security comprises: determining whether the first user responds to the test image within a predetermined period of time. 9. The method of claim 1, wherein determining whether the first user recognizes the apparent breach of security comprises: determining a response of the first user to the test image; and determining whether the response indicates that the first user recognizes the apparent breach of security of the remote location. 10. The method of claim 1, wherein determining whether the first user recognizes the apparent breach of security comprises: determining whether the first user notifies a predetermined entity of the apparent breach of security of the remote location. 11. The method of claim 1, further comprising: storing an indication of whether the first user recognized the apparent breach of security of in the test image. 12. The method of claim 1, further comprising: arranging for a second user to monitor the remote location if it is determined that the first user did not recognize the apparent breach of security of the remote location. 13. The method of claim 12, wherein arranging for a second user comprises: arranging for a second user to replace the first user, thereby arranging for the second user to monitor the remote location instead of the first user monitoring the remote location. 14. The method of claim 1, further comprising: determining whether to transmit the test image to the first user. 15. The method of claim 14, wherein determining whether to transmit the test image to the first user comprises: determining a duration of time since a previous test image of a fabricated apparent breach of security of the remote location was transmitted to the first user; and determining whether the duration of time is at least equal to a minimum duration of time. 16. The method of claim 1, wherein arranging for a first user to monitor a remote location comprises: obtaining, at a server and from a sensor located at a remote location, an image of the remote location; and forwarding the image to a device associated with the first user. 17. An apparatus comprising: a processor; and a storage device that stores a program for directing the processor; the processor being operative with the program to: perform the method of claim 1. 18. A computer readable medium encoded with instructions for directing a processor to: perform the method of claim 1. 19. A method, comprising: establishing communication link between a server and a device of a user; arranging for the user to monitor a remote location via the communication link by transmitting images of the remote location to the device of the user during a monitoring session; testing, during the monitoring session, attentiveness of the user by transmitting to the device of the user at least one of a plurality of test images of the remote location, each test image being an image of a respective fabricated breach of security of the remote location; determining whether the user responds appropriately to the at least one test image; penalizing the user if the user does not respond appropriately to the at least one test image; and causing, based on the user's performance during the monitoring session, a payment to be provided to the user. 20. The method of claim 19, wherein testing comprises: transmitting, at random intervals during the monitoring session, at least one test image, wherein the at least one test image transmitted at a given interval is of one of the fabricated breaches of security of the remote location. 21. The method of claim 19, wherein testing comprises: transmitting, periodically during the monitoring session, at least one test image, wherein the at least one test image transmitted at a given time is of one of the fabricated breaches of security of the remote location. 22. The method of claim 19, wherein penalizing the user comprises: causing a rating associated with the user to be lowered. 23. The method of claim 22, further comprising: causing the communication link to be disabled. 24. The method of claim 19, wherein penalizing the user comprises: preventing the user from monitoring remote locations in the future. 25. The method of claim 19, wherein penalizing the user comprises: preventing the payment for the monitoring session from being provided to the user. 26. The method of claim 19, wherein penalizing the user comprises: lowering a pay rate based on which the user is to be paid for the monitoring session. 27. The method of claim 19, wherein penalizing the user comprises: lowering a pay rate based on which the user is to be paid for future monitoring sessions. 28. An apparatus, comprising: a processor; and a storage device that stores a program for directing the processor; the processor being operative with the program to: perform the method of claim 19. 29. A computer readable medium encoded with instructions for directing a processor to: perform the method of claim 19.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.