INTERNET SURVEILLANCE SYSTEM AND METHOD
First Claim
1. A method, comprising:
- arranging for a first user to monitor a remote location;
transmitting to the first user, while the user is supposed to be monitoring the remote location, a test image of the remote location, the test image being an image of a fabricated breach of security of the remote location, without informing the first user that the breach of security is fabricated;
determining whether the first user recognizes the breach of security in the test image; and
determining an attentiveness of the first user based on whether the first user recognizes the breach of security in the test image.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for a central server to manage remote monitoring tasks performed by users of a data network. An exemplary method comprises: receiving a request from a user of a user device to monitor a remote location; determining a remote location to be monitored; enabling communication between a sensor at the remote location and the user device; and crediting value to the user in accordance with an amount of time the user device has been in communication with the remote sensor for remote monitoring purposes. An alternate exemplary method includes measuring user attentiveness while the user device is in communication with the remote sensor. Thus, the disclosed system and method provide a way for users of a data network such as the Internet to log on at any time and perform remote monitoring tasks for value. Idle time can now be turned into value using the disclosed system and method. Moreover, little or no skill is required of the user to earn value using the disclosed system and method; the user need only be attentive while performing a remote monitoring task. Location owners also benefit from the convenience by which they can now have their properties monitored and by the ability of the disclosed system and method to ensure the attentiveness of the user performing the remote monitoring task.
-
Citations
29 Claims
-
1. A method, comprising:
-
arranging for a first user to monitor a remote location;
transmitting to the first user, while the user is supposed to be monitoring the remote location, a test image of the remote location, the test image being an image of a fabricated breach of security of the remote location, without informing the first user that the breach of security is fabricated;
determining whether the first user recognizes the breach of security in the test image; and
determining an attentiveness of the first user based on whether the first user recognizes the breach of security in the test image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
establishing communication link between a server and a device of a user;
arranging for the user to monitor a remote location via the communication link by transmitting images of the remote location to the device of the user during a monitoring session;
testing, during the monitoring session, attentiveness of the user by transmitting to the device of the user at least one of a plurality of test images of the remote location, each test image being an image of a respective fabricated breach of security of the remote location;
determining whether the user responds appropriately to the at least one test image;
penalizing the user if the user does not respond appropriately to the at least one test image; and
causing, based on the user'"'"'s performance during the monitoring session, a payment to be provided to the user. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification