摘要:
In accordance with some embodiments of the present invention, a controller receives information relating to customer activity with a first vendor (e.g., via a Web page that a customer accesses). The controller further receives an indication of items the customer desires to purchase, the items having an associated total price. The controller determines, based on any of various criteria, whether to provide an offer for a subsidy based on the information relating to customer activity. The offer for a subsidy is from a second vendor (a subsidizing vendor), and may define, for example, a reduction in the price charged for the item and an obligation for the customer to fulfill in exchange for the subsidy. If the customer accepts the offer, he is charged a second price for the items. The second price is less than the total price, and may even be zero.
摘要:
One embodiment of the present invention provides for a method comprising determining sales data associated with a sales device (e.g., a vending machine) and adjusting a level of sensitivity of a currency validator based on the sales data.
摘要:
According to one or more embodiments, apparatus, systems and methods are provided for facilitating commerce. In some embodiments, an apparatus (e.g., a central computer) facilitates posting of an item for sale by receiving a digital image of an item for sale, receiving an audio description (e.g., included in an audio file) of the item, and providing an indication of the description to at least one potential buyer. In one embodiment, the digital image and the audio description are received from a mobile phone.
摘要:
One embodiment of the present invention provides for a method comprising determining sales data associated with a sales device (e.g., a vending machine) and adjusting a level of sensitivity of a currency validator based on the sales data.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.
摘要:
After a player purchases a contract providing insurance against gambling losses, a server or other device in communication with a gaming device (e.g., a “player tracking” server, “slot accounting” server and/or other computer device) may operate to (i) receive game play data in association with one or more plays of the gaming device, (ii) determine a compliance status based on the received game play data and one or more play requirements associated with the contract, and (iii) provide a refund amount due to the player based on the compliance status. Before providing any refund, the server or other device may store a status indicator relating to the one or more plays indicating whether the play was compliant with the contract. Furthermore, an alert may be provided to the player if a particular play is not compliant with the contract.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
摘要:
A controller is in communication with a plurality of vendors that are servicing customers, as well as with a plurality of “subsidizing” vendors seeking access to those customers. The controller receives from a first vendor an indication of one or more items that a customer is to purchase. In response, the controller transmits, on behalf of a subsidizing vendor, an indication of an offer for a subsidy such as a reduction in the customer's purchase price. If the customer accepts the offer, the controller provides an amount of funds from the subsidizing vendor to the first vendor. The controller may also retain a portion of the amount as payment. The controller also facilitates a transaction between the customer and the subsidizing vendor. For example, the customer may be required to sign up for a service (e.g. credit card account service) that is provided by the subsidizing vendor. By having the controller manage such a system by acting between subsidizing vendors and vendors that are servicing customers, a vendor need only communicate with the controller, rather than a plurality of other vendors.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.