摘要:
A controller is in communication with a plurality of vendors that are servicing customers, as well as with a plurality of “subsidizing” vendors seeking access to those customers. The controller receives from a first vendor an indication of one or more items that a customer is to purchase. In response, the controller transmits, on behalf of a subsidizing vendor, an indication of an offer for a subsidy such as a reduction in the customer's purchase price. If the customer accepts the offer, the controller provides an amount of funds from the subsidizing vendor to the first vendor. The controller may also retain a portion of the amount as payment. The controller also facilitates a transaction between the customer and the subsidizing vendor. For example, the customer may be required to sign up for a service (e.g. credit card account service) that is provided by the subsidizing vendor. By having the controller manage such a system by acting between subsidizing vendors and vendors that are servicing customers, a vendor need only communicate with the controller, rather than a plurality of other vendors.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
摘要:
A method and apparatus for delivering a plurality of products from a vending machine is disclosed. The method generally allows an offer for a package to be output, in which the package defines a plurality of products, including a selected product. An apparatus is also disclosed to carry out the method steps of the present invention.
摘要:
After a player purchases a contract providing insurance against gambling losses, a server or other device in communication with a gaming device (e.g., a “player tracking” server, “slot accounting” server and/or other computer device) may operate to (i) receive game play data in association with one or more plays of the gaming device, (ii) determine a compliance status based on the received game play data and one or more play requirements associated with the contract, and (iii) provide a refund amount due to the player based on the compliance status. Before providing any refund, the server or other device may store a status indicator relating to the one or more plays indicating whether the play was compliant with the contract. Furthermore, an alert may be provided to the player if a particular play is not compliant with the contract.
摘要:
A system and method are disclosed for a central server to manage remote monitoring tasks performed by users of a data network. An exemplary method comprises: receiving a request from a user of a user device to monitor a remote location; determining a remote location to be monitored; enabling communication between a sensor at the remote location and the user device; and crediting value to the user in accordance with an amount of time the user device has been in communication with the remote sensor for remote monitoring purposes. An alternate exemplary method includes measuring user attentiveness while the user device is in communication with the remote sensor. Thus, the disclosed system and method provide a way for users of a data network such as the Internet to log on at any time and perform remote monitoring tasks for value. Idle time can now be turned into value using the disclosed system and method. Moreover, little or no skill is required of the user to earn value using the disclosed system and method; the user need only be attentive while performing a remote monitoring task. Location owners also benefit from the convenience by which they can now have their properties monitored and by the ability of the disclosed system and method to ensure the attentiveness of the user performing the remote monitoring task.
摘要:
A method for providing a link in an electronic file being presented to a user which includes defining a customized viewpoint for the user. The viewpoint includes a preference for the user that provides an association between a data pattern and a computer network resource. The method also includes generating a request for content, receiving an electronic file in response to the request, and evaluating the electronic file to recognize a match between at least one portion of the electronic file and the data pattern. Upon recognizing a match, the electronic file is modified to include a link to the computer network resource associated with the matching data pattern, and the modified electronic file is presented to the user. Thus, the link included in the electronic file presented to the user is customized for the user, and different users who retrieve the same content can be provided with links to different computer network resources depending on their respective viewpoints.
摘要:
In accordance with some embodiments of the present invention, a controller receives an indication of acceptance by a customer of an offer for a subsidy from a second vendor (e.g., a subsidizing vendor). The offer may define, for example, a reduction in the price charged for an item purchased from a first vendor and an obligation for the customer to fulfill in exchange for the subsidy. The customer is charged a second price for the items, which is less than the total price, and may even be zero.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
摘要:
Methods, systems, and apparatus are described for providing a link in an electronic file being presented to a user in accordance with a set of one or more preferences, each preference providing an association between one or more data patterns and a computer network resource. According to some embodiments, one or more layers may be available and/or selectively activated (e.g., by a user) for modifying electronic files.
摘要:
Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of“no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.