摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.
摘要:
After a player purchases a contract providing insurance against gambling losses, a server or other device in communication with a gaming device (e.g., a “player tracking” server, “slot accounting” server and/or other computer device) may operate to (i) receive game play data in association with one or more plays of the gaming device, (ii) determine a compliance status based on the received game play data and one or more play requirements associated with the contract, and (iii) provide a refund amount due to the player based on the compliance status. Before providing any refund, the server or other device may store a status indicator relating to the one or more plays indicating whether the play was compliant with the contract. Furthermore, an alert may be provided to the player if a particular play is not compliant with the contract.
摘要:
After a player purchases a contract providing insurance against gambling losses, a server or other device in communication with a gaming device (e.g., a “player tracking” server, “slot accounting” server and/or other computer device) may operate to (i) receive game play data in association with one or more plays of the gaming device, (ii) determine a compliance status based on the received game play data and one or more play requirements associated with the contract, and (iii) provide a refund amount due to the player based on the compliance status. Before providing any refund, the server or other device may store a status indicator relating to the one or more plays indicating whether the play was compliant with the contract. Furthermore, an alert may be provided to the player if a particular play is not compliant with the contract.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
摘要:
After a player purchases a contract providing insurance against gambling losses, a server or other device in communication with a gaming device (e.g., a “player tracking” server, “slot accounting” server and/or other computer device) may operate to (i) receive game play data in association with one or more plays of the gaming device, (ii) determine a compliance status based on the received game play data and one or more play requirements associated with the contract, and (iii) provide a refund amount due to the player based on the compliance status. Before providing any refund, the server or other device may store a status indicator relating to the one or more plays indicating whether the play was compliant with the contract. Furthermore, an alert may be provided to the player if a particular play is not compliant with the contract.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of“no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.