System for Image Analysis in a Network that is Structured with Multiple Layers and Differentially Weighted Neurons

ABSTRACT

Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian&#39;s responsiveness to real or fabricated security breaches.

RELATED APPLICATIONS

This nonprovisional application is a continuation of and claims thebenefit of priority of U.S. patent application Ser. No. 13/291,889,filed 8 Nov. 2011, and entitled “SYSTEM FOR IMAGE ANALYSIS IN A NETWORKTHAT IS STRUCTURED WITH MULTIPLE LAYERS AND DIFFERENTIALLY WEIGHTEDNEURONS,” which is a continuation of and claims the benefit of priorityof U.S. patent application Ser. No. 11/427,489, filed 29 Jun. 2006,issued as U.S. Pat. No. 8,081,817, and entitled “SYSTEM FOR IMAGEANALYSIS IN A NETWORK THAT IS STRUCTURED WITH MULTIPLE LAYERS ANDDIFFERENTIALLY WEIGHTED NEURONS,” which is a continuation of and claimsthe benefit of priority of U.S. patent application Ser. No. 10/786,831,filed 25 Feb. 2004, issued as U.S. Pat. No. 7,292,723, and entitled“SYSTEM FOR IMAGE ANALYSIS IN A NETWORK THAT IS STRUCTURED WITH MULTIPLELAYERS AND DIFFERENTIALLY WEIGHTED NEURONS”.

The present utility application claims the benefit of priority of thefollowing U.S. Provisional Patent Applications:

Application No. 60/450,465, filed 26 Feb. 2003, entitled “SYSTEM ANDMETHOD FOR THE REMOTE MONITORING OF CRITICAL CIVILIAN INFRASTRUCTURE”;

Application No. 60/450,459, filed 26 Feb. 2003, entitled “SYSTEM ANDMETHOD FOR THE REMOTE MONITORING OF CRITICAL CIVILIAN INFRASTRUCTURE”;

Application No. 60/466,497, filed 29 Apr. 2003, entitled “SYSTEM ANDMETHOD FOR THE PERFORMANCE AND COMPENSATION OF MICRO-TASKS”; and

Application No. 60/491,574, filed 31 Jul. 2003, entitled “SYSTEM ANDMETHOD FOR THE REMOTE MONITORING OF PRIVATE PROPERTY”;

BACKGROUND

Many forms of violence and intimidation are of great concern to variousentities, ranging from individuals to nations. The United States andother developed nations face an unprecedented challenge posed byterrorism, both foreign and domestic.

The unprecedented magnitude of the threat is even worse than generallybelieved, and can only be appreciated by considering the quantity andvalue of other potential targets, e.g., on the U.S. homeland. Inaddition to the well understood targets such as airport terminals andlarge commercial centers, there are tens of thousands of criticalinfrastructure facilities in the U.S., including airport perimeters,chemical plants, natural gas plants, pipelines and pumping stations,nuclear and non-nuclear power plants, refineries and reservoirs.

Such facilities which are typically unguarded. Many people could, withrelative ease, approach within one hundred feet of such facilities.

Thus, given the magnitude of the problem posed by modern terrorism thereexists a clear and urgent need for systems and methods that to combatterrorism.

Novel image processing techniques may be employed in variousapplications to help combat terrorism.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an illustration of a network according to one embodiment ofthe invention.

FIG. 2 is an illustration of a network according to one embodiment ofthe invention.

DESCRIPTION OF EXAMPLE EMBODIMENT(S)

The embodiments described in this application are presented forillustrative purposes only and are not meant to be limiting in anysense. The invention is widely applicable to numerous embodiments, as isreadily apparent from the disclosure herein.

The terms “an embodiment”, “embodiment”, “embodiments”, “theembodiment”, “the embodiments” “one or more embodiments”, “someembodiments”, and “one embodiment” mean “one or more embodiments” unlessexpressly specified otherwise.

Further, although process steps, method steps, algorithms or the likemay be described in a sequential order, such processes, methods andalgorithms may be configured to work in alternate orders. In otherwords, any sequence or order of steps that may be described does notnecessarily indicate a requirement that the steps be performed in thatorder.

It will be readily apparent that the various methods and algorithmsdescribed herein may be implemented by, e.g., appropriately programmedgeneral purpose computers and computing devices. Further, programs whichimplement such methods and algorithms may be stored and transmitted in avariety of known media.

Among the many uses of the disclosed systems and methods, Applicantshave realized that there are a significant number of vulnerable siteswhich may be subject to hostile acts. Applicants have also realized thatsuch sites are typically unguarded and lack access control, and furtherthat such access control would typically be cost prohibitive.Applications have also realized that typically people are not permittedto be at or near such sites. Applicants have also realized that verymany people may be used, but are not currently being used, to performvarious types of productive work, especially from their homes or otherconvenient locations.

While the methods and apparatus of the present invention are describedherein by way of particular embodiments, those skilled in the art willrecognize that the present invention may be practiced with modificationand alteration without departing from the teachings disclosed herein.Although particular features of the present invention may be describedwith reference to one or more particular embodiments or figures, itshould be understood that such features are not limited to usage in theone or more particular embodiments or figures with reference to whichthey are described.

FIG. 1 is an illustration of a network 100 according to one embodimentof the invention. In FIG. 1, a plurality of sensors 110, such as imagecapture devices, communicate (unidirectionally or bidirectionally) withan image processing and distribution node 120, which may also bereferred to herein as a “central computer” or “central server”. Theimage processing and distribution node 120 may also be capable oftransmitting signals to sensors, either by individually addressingcertain sensor(s) or by broadcasting to some or all sensors.

In some embodiments, if the sensor is an image capture device such as acamera, images posted from cameras may be optimized forprocessing/review according to image processing rules. Such rules mayfunction to, for example, grayscale the image, enhance brightness and/orsharpness, and/or magnify or highlight certain portions of the image.The pre-processing software can be configured at the site level to tuneit to the visual characteristics of a particular site (e.g., heavy sunglare at certain hours). The “raw” (pre-processing) image may beretained for a site-defined time period before getting discarded.

In an embodiment where the sensors are image capture devices, imagecapture devices may employ on-board motion detection capabilities totrigger image capture events. Also, image capture devices may forwardcaptured images to the image processing and distribution node. The imageprocessing and distribution node may preprocess the received images, andthen store the (preprocessed) images. The database may create anassociation with the images. For example, images can be keyed in thedatabase to the location of the images.

In some embodiments, processed images may be given a unique index numberthat associates them with the source site/node. Processed images may begiven a digital watermark and/or a digital fingerprint may be taken ofthe image (e.g., via an MD5 checksum) to facilitate authentication ofthe image in its final form.

Sensed data (e.g., images) is processed by a plurality of neurons 130according to a processing algorithm. Each neuron processes at least onereceived file corresponding to sensed data, and in turn generates aresult based on the processing.

Referring to FIG. 2, in another perspective of a network 200, neurons130 transmit results to a results processor 210, which may be the imageprocessing and distribution node or may be a separate device.

Each neuron has at least one respective weight that is used to evaluatethe processed results from that neuron. Results from neurons with lowerweights may be distrusted. A weight distributor assigns weights toneurons, and updates those weights as appropriate. For example, a neuronwhich has generated faulty results may be assigned reduced weight.Similarly, a neuron which has generated accurate results may be assigneda higher weight.

Also, a neuron may have more than one weight. For example, a neuron mayhave a different weight to represent the neuron's “accuracy” inevaluating different types of sensed data (e.g., different weights fordifferent types of images, different weights for images vs. audio data).

Neurons are typically configured to generate extremely simple results,leading to efficient processing of results. In one embodiment, a neuronis only responsible for generating a binary result from a sensed datafile. For example, a neuron may be responsible for generating a bit torepresent whether or not a received image depicts a human (e.g., 1=humanpresent in the image, 0=no human present in the image).

Neurons may be arranged in “layers” to provide enhanced accuracy andreliability. For example, neurons in a first layer may each have ahigher weight than neurons in a second layer. In such an embodiment,neurons in the first layer may be more accurate and/or more trusted, andaccordingly a neuron in the first layer could supervise one or moreneurons in the second layer. It is also possible that neurons transitionamong layers as their weights are adjusted by the weight distributor. Alayer analyzer can be used to allocate neurons to different layers,based on their weights and other criteria. The layer analyzer can alsosegment a layer so that different portions of a layer are used fordifferent types of processing (e.g., different types of images,different types of sensed data)

A feedback manager can be configured to process results from neurons.The feedback manager may direct neurons to perform additional processingbased on the results. For example, if a neuron processes particularsensed data (e.g., an image) to provide a “positive result” and/or aresult which is believed to be atypical (e.g., human present in theimage when no human should be), then the feedback manager may, forexample, (i) direct the sensed data to be processed by additionalneurons, e.g., in order to verify the result; (ii)

Sensed data which is processed by a neuron with a relatively low weightmay be directed to other neurons for redundant or additional processing.Similarly, the number of additional neurons to which sensed data isdirected may be based on the weight of the original or first neuron.

Exemplary Network Configuration

The present invention can be configured to work in a network environmentwhereby the central computer, the user computer and/or the monitoringdevice communicate with each other directly or indirectly, via a wiredor wireless medium such as the Internet, LAN, WAN or Ethernet, TokenRing, or via any appropriate communications means or combination ofcommunications means. Communication between the devices and computers,and among the devices, may be direct or indirect, such as over theInternet through a Website maintained by a computer on a remote serveror over an on-line data network including commercial on-line serviceproviders, bulletin board systems and the like. In yet otherembodiments, the devices may communicate with one another and/or acomputer over RF, cable TV, satellite links and the like.

Some, but not all, possible communication networks that may comprise thenetwork or be otherwise part of the system include: a local area network(LAN), a wide area network (WAN), the Internet, a telephone line, acable line, a radio channel, an optical communications line, and asatellite communications link. Possible communications protocols thatmay be part of the system include: Ethernet (or IEEE 802.3), SAP, ATP,Bluetooth™, and TCP/IP. Further, networking of devices and computers mayinclude use of 802.11b and related wireless protocols and/or use of cellnetworks (GSM and other emerging standards).

Those skilled in the art will understand that computers and devices incommunication with each other need not be continually transmitting toeach other. On the contrary, such computers and devices need onlytransmit to each other as necessary, and may actually refrain fromexchanging data most of the time. For example, a device in communicationwith another device via the Internet may not transmit data to the otherdevice for weeks at a time.

In an embodiment, a central computer may not be necessary and/orpreferred. For example, the present invention may, in one or moreembodiments, be practiced on a monitoring device in communication onlywith one or more user computers. In such an embodiment, any functionsdescribed as performed by the central computer or data described asstored on the central computer may instead be performed by or stored onone or more monitoring devices or user computers.

Network Security

Communication among computers and devices may be encrypted to ensureprivacy and prevent fraud in any of a variety of ways well known in theart. Appropriate cryptographic protocols for bolstering system securityare described in Schneier, APPLIED CRYPTOGRAPHY, PROTOCOLS, ALGORITHMS,AND SOURCE CODE IN C, John Wiley & Sons, Inc., 2d ed., 1996.

Data Storage Devices/Memory

For each computer and/or device (i.e., the central computer, the usercomputer, and/or the monitoring apparatus), a processor may be incommunication with a memory and a communications port (e.g., forcommunicating with one or more other computers or devices). The memorymay comprise an appropriate combination of magnetic, optical and/orsemiconductor memory, and may include, for example, Random Access Memory(RAM), Read-Only Memory (ROM), a compact disc and/or a hard disk. Thememory may comprise or include any type of computer-readable medium. Theprocessor and the memory may each be, for example: (i) located entirelywithin a single computer or other device; or (ii) connected to eachother by a remote communication medium, such as a serial port cable,telephone line or radio frequency transceiver.

In one, several or all computers or devices, a memory may store aprogram for controlling a processor. The processor performs instructionsof the program, and thereby operates in accordance with the presentinvention, and particularly in accordance with the methods described indetail herein. The program may be stored in a compressed, uncompiledand/or encrypted format. The program furthermore includes programelements that may be necessary, such as an operating system, a databasemanagement system and “device drivers” for allowing the processor tointerface with computer peripheral devices. Appropriate program elementsare known to those skilled in the art, and need not be described indetail herein.

The term “computer-readable medium” as used herein refers to any mediumthat participates in providing instructions to a processor forexecution. Such a medium may take many forms, including but not limitedto, non-volatile media, volatile media, and transmission media.Non-volatile media include, for example, optical or magnetic disks, suchas memory. Volatile media include dynamic random access memory (DRAM),which typically constitutes the main memory. Transmission media includecoaxial cables, copper wire and fiber optics, including the wires thatcomprise a system bus coupled to the processor. Transmission media maycarry acoustic or light waves, such as those generated during radiofrequency (RF) and infrared (IR) data communications. Common forms ofcomputer-readable media include, for example, a floppy disk, a flexibledisk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM,DVD, any other optical medium, punch cards, paper tape, any otherphysical medium with patterns of holes, a RAM, a PROM, an EPROM, aFLASH-EEPROM, any other memory chip or cartridge, a carrier wave asdescribed hereinafter, or any other medium from which a computer canread.

Various forms of computer readable media may be involved in carrying oneor more sequences of one or more instructions to a processor forexecution. For example, the instructions may initially be borne on amagnetic disk of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem local to a particular computer ordevice can receive the data on the telephone line and use an infraredtransmitter to convert the data to an infrared signal. An infrareddetector can receive the data carried in the infrared signal and placethe data on a system bus for the processor. The system bus carries thedata to main memory, from which the processor retrieves and executes theinstructions. The instructions received by main memory may optionally bestored in memory either before or after execution by the processor. Inaddition, instructions may be received via a communication port aselectrical, electromagnetic or optical signals, which are exemplaryforms of carrier waves that carry data streams representing varioustypes of information. Thus, a computer or device may obtain instructionsin the form of a carrier wave.

According to an embodiment of the present invention, the instructions ofthe program may be read into a main memory from anothercomputer-readable medium, such from a ROM. The execution of sequences ofthe instructions in a program causes the processor perform the processsteps described herein. In alternate embodiments, hard-wired circuitrymay be used in place of, or in combination with, software instructionsfor implementation of the processes of the present invention. Thus,embodiments of the present invention are not limited to any specificcombination of hardware and software.

The memory also stores a plurality of databases, including (1) a sitedatabase, and (2) a Guardian database. Some or all of the data stored ineach database is described in conjunction with the following descriptionof the process steps. The described entries of the databases representexemplary information only; those skilled in the art will understandthat the number and content of the entries can be different from thoseillustrated herein. Further, despite any description of the databases astabular, relational databases, an object-based model could be used tostore and manipulate the data types of the present invention andlikewise, object methods or behaviors can be used to implement theprocesses of the present invention.

Site Registration

Site owners and/or operators such as owners of nuclear facilities,chemical plants, and airports must initially register with the system inorder have their sites monitored by Guardians. It is contemplated thatsite owners will purchase camera and/or other monitoring deviceequipment from the operator of the central computer, although it ispossible that site owners may register other existing cameras and/orother monitoring devices with the central computer. In some embodiments,the cameras distributed to site owners are mounted atop poles that canbe easily erected in the ground.

In embodiments where monitoring devices comprise cameras such as videocameras, cameras and supporting peripheral hardware may have embeddedcomputer devices and may support various standard internetworking andoperating system protocols (e.g., embedded Linux chips that supportHTTP, SSL, FTP, CGI, Java, etc.). For example, cameras available fromAxis®. Communications, Inc. may be employed, including model 2420 seriesnetwork cameras with infrared (IR) lenses, model 250-S MPEG-2 networkvideo servers, and model 2191 audio modules. Infrared lenses may bedesirable for low-light (i.e., nighttime) image capture.

In some embodiments, cameras may also be equipped with PTZ(Pan/Tilt/Zoom) mechanisms to facilitate remote adjustment of field ofview, focus, and the like. Further, in some embodiments, cameras may beconfigured to support on-demand requests for static and motion imagessubmitted by remote parties, such as site owners and supervisors.

It may also be desirable that cameras are weather-insulated as they maybe located outdoors and subjected to extreme temperatures, wind andprecipitation. Further, each camera preferably may have two independentcircuits, so that if one fails the other can serve as a back-up.Similarly, cameras may employ dual, redundant power sources, such thatif one power source is unavailable, a back-up power source (e.g.,batteries, generators, etc.) may be used. Indeed, in some embodiments,completely autonomous, free-standing image capture hardware may beemployed. Such hardware may use solar panels and high capacity energycells for power, and may use cellular/satellite communications fornetworking. Such autonomous camera hardware could be used in isolatedareas such as deserts and national parks where A/C power is burdensometo obtain.

After the site owners obtain suitable monitoring devices, site ownersmust register with the system by interacting with the central computerin accordance with the following process steps, which are described assteps performed by the central computer.

Step 1: Receive Request to Register at Least One Monitoring Device.

The central computer receives a request to register at least onemonitoring device. The request can be received by the central computer'sinput device or communication port. Such a communications port or inputdevice may be enabled to receive Dual-Tone Multi-Frequency (DTMF) tonesin an Interactive Voice Response (IVR) application. In such anembodiment, site owners would call the central computer via phone, andnavigate through an audio menu to complete the registration process.Alternatively, a communications port or input device may be enabled toreceive registration commands, via the Internet or other public network,from a computer or monitoring device operated by the site owner.

In a further alternate embodiment, cameras may be equipped with USB orother ports so that registration can take place automatically (i.e.,“plug and play”) upon the establishment of a connection between thecamera's port and the central computer.

Step 2: Confirm Communication with Monitoring Device.

The central computer then sends a test signal (i.e., a “ping”) to themonitoring device to confirm its presence and functional ability and, insome embodiments, determine its configuration, location, and otherimportant information.

Step 3: Assign Monitoring Device Identifier and Record Identifier InSite Database.

Once communication with the monitoring device is established, thecentral computer then assigns a unique identifier to the monitoringdevice and records the identifier in a record of the site database, suchas that which is depicted in Table 1, herein.

Step 4: Initiate Test Procedures.

In some embodiments, test procedures may be instituted to confirm themonitoring device's ability to detect (i.e., to capture images) asintended. For example, the site owner may be instructed by a supervisor,via a two-way audio communication channel, to adjust a camera so as toenable the widest possible field of view, or to reposition a cameraangle to eliminate public areas that cannot be considered no-man zones.

Step 5: Receive and Record Site-Specific Rules in Site Database.

In some embodiments, site owners may be prompted to select or otherwiseindicate site-specific rules for monitoring. Further, in someembodiments, site owners may be charged premiums for certain levels ofservice. For example, site owners desiring more or higher levels ofsecurity may request lower thresholds or triggers for supervisory reviewof images. Or, for example, site owners may desire to have at least two“5 star” rated Guardians assigned to monitor images from their site atall times. Such site-specific rules may be recorded in the recordcorresponding to the assigned monitoring device identifier in the sitedatabase, such as that which is depicted in Table 1, herein. Likewise,custom or standard emergency procedures may be similarly identified andrecorded for future reference by the system, its operators or Guardians.

In yet other embodiments, site owners and/or monitoring devices may beprompted to capture reference images for later comparison by themonitoring device and/or the central computer against subsequentlycaptured images.

TABLE 1 Site Database Monitoring device Contact Monitoring EmergencyBilling identifier(s) Site information rules procedures information1234-56789, Smith Bob Johnson, Guardians First, confirm $1000 per1234-56790, Memorial Security must be emergency month, billed1234-56791, Airport, Officer, located at with at least 5 monthly from1234-56792 Town, Ohio, cellular least 50 miles other Bank Account USAphone from site randomly Number number (212) Guardians recruited654987987645 555-1212 must be rated Guardians. 3 or higher Then contactBob Johnson directly via automated outbound IVR call to listed cellphone number. Then contact local police at (212) 555- 9999. 3333-92931,City Nancy Guardians If security $1200 per 3333-92932, HydraulicSimmons, must always threat is month, billed 3333-02033 Company, WaterPurity be assigned detected by at monthly from City, Texas Specialist,completely least two Bank Account pager number randomly. Guardians,Number (888) 222- Guardians request 5879462865832 2222 should neversupervisor receive image review of from this subject camera twice.image.

Guardian Registration

In one embodiment, Guardians register with the central computer in orderto participate in monitoring sessions and thereby earn compensation forsuch participation. Registration may take place in accordance with thefollowing process.

Step 1: Receive Registration Request from Potential Guardian.

A potential Guardian transmits to the central computer, via a userdevice such as a personal computer, cell phone or kiosk, a request toregister as a Guardian. For example, a potential Guardian may log on toa website associated with the central computer and click on a hyperlinkto indicate the potential Guardian's desire to register.

Step 2: Prompt Potential Guardian for Required Information.

The central computer may then retrieve from memory a list, a “fillable”form, an IVR menu, or other data structure prompting the potentialGuardian to input certain required information. The information requiredmay include unique identification data such as a Social Security Number(SSN), a driver's license number, a financial account identifier (creditcard account number, debit/checking account number, PayPal® accountidentifier, etc.), a biometric identifier (e.g., fingerprint), or thelike. Further, in order to proceed, the Guardian may be required toanswer certain questions, take an oath, agree to the terms of acontract, or otherwise provide assurance that access to the system willnot be used for other than its intended purpose. Any or all of suchinformation may be recorded in the Guardian database or elsewhere forfuture reference.

At this point, based in part on the received information, the centralcomputer may, in some embodiments, initiate a subroutine designed toinstitute a “background check” of the potential Guardian. Such asubroutine may involve a confirmation of the existence of certaininformation in remote databases, directly or indirectly accessible tothe central computer via a communications port. For example, if adriver's license number is required, the central computer may output arequest to a computer operated by a state's licensing authority (e.g.,the Connecticut Department of Motor Vehicles) to confirm the validity ofthe driver's license (i.e., that the license was validly issued and thatthe name matches that of the potential Guardian). If the results of abackground check subroutine indicate that inaccurate or incompleteinformation was submitted by the potential Guardian, the process mayterminate at this point. Otherwise, it may continue.

Step 3: Output Instructional Data.

The central computer may then retrieve from memory and output to thepotential Guardian's user device instructional data for the purpose ofeducating the Guardian about how to participate in monitoring sessions.Such data may take the form of (1) text, (2) audio, (3) video, or (4)any combination thereof. The content of such data may include, forexample, instructions about how to respond to images and questions aboutimages.

Step 4: Initiate Testing Subroutine.

The central computer may then, in conjunction with user device, proceedto initiate a testing subroutine for the purpose of ensuring that thepotential Guardian (1) witnessed and understood the instructional data,and/or (2) can perform with a certain minimum level of competency in atest (“mock” and/or “live”) Guardian session.

In embodiments where the testing subroutine is designed to confirm thepotential Guardian's comprehension of instructional data, questions maybe retrieved from memory and output to the potential Guardian, who wouldin turn indicate answer choice selections to the central computer viathe user device. The central computer could then compare the receivedanswer selections to a stored set of correct answer choices, determine ascore, and compare the score to a stored rule indicating a certainminimum required score. If the potential Guardian's score meets orexceeds the minimum required score, the process may continue. Otherwise,it may end or return to any earlier point (e.g., with the output ofinstructions).

In embodiments where the testing subroutine is designed to determinewhether or not the potential Guardian can perform in a “mock” Guardiansession with a minimum required level of competency, the centralcomputer can retrieve and output a stored sequence of test images andquestions. The test subroutine would thus determine if, for example, theGuardian can spot humans in no-man zones. Alternatively, a competencytest may wholly or partially include “live” images received insubstantially real-time from a remote monitoring device. In any event,the potential Guardian's responses are evaluated to determine theiraccuracy and/or conformance to a central tendency (e.g., mean, median,mode, etc.) of a plurality of responses (e.g., from other Guardians orpotential Guardians). If the potential Guardian has performed inaccordance with a minimum required level of competency, the process maycontinue. Otherwise, it may end or return at an earlier point (e.g.,with the output of instructions or with the initiation of anothertesting subroutine).

It should be noted that the instructional subroutine of Step 3 and thetesting subroutine of Step 4 may be combined to form an interactivetraining session.

Step 5: Create Record for Guardian in Guardian Database.

The central computer then creates a record for the potential Guardian ina Guardian database, such as that which is depicted herein in Table 2.In creating such a record, the central computer may generate, assign andrecord a unique Guardian identifier to the Guardian that may be used totrack a given Guardian's participation in monitoring sessions so thatrecords can be kept for rating and compensation purposes. Informationthat was received from the potential Guardian in Step 1 may be recordedin this Guardian database (e.g., SSN, driver's license number, financialaccount identifier, biometric identifier). The central computer may alsorequest, receive and record other information from the Guardian that maybe useful for future tracking, identification, security, compensation,regulatory compliance and/or tax (e.g., withholding) purposes.

TABLE 2 Guardian Database Guardian Guardian Guardian Current Guardianidentification financial account Time Logged identifier rating (1-5)information identifier this Pay Period ABCDEFG 5 Bob Schneider Visa ®Check 18 hours, 29 2 Main Street Card 8888-8888- minutes Town, USA8888-8888, Exp. State Driver's 5/07 License # 9999999 SSN 999-99- 9999ABNGUYC 4 Tom Meyer Checkin Account 3 hours, 15 32 Park Avenue Numberwith minutes City, USA ABA Routing State Driver's Code: 706001 License #1220012 7K1945 4563271 SSN 333-33- 3333 MGNWOIQ Temporarily MarySullivan PayPal ® 47 minutes banned from 913 Broadway Account Numbersystem until Village, USA 12536 retraining State Driver's completedLicense # MS 1902 SSN 222-22- 2222

Step 6: Enable Download of Guardian Software to User Device.

After a potential Guardian has achieved the status of “Guardian” bypassing all instituted security and competency checks and receiving aGuardian identifier, the central computer enables the Guardian's userdevice to download any appropriate software necessary to participate inmonitoring sessions. In some embodiments, any required cryptographickeys may be downloaded to the user's device. Techniques and protocolsenabling the downloading of software applications is well-known to thosein the art and need not be described in detail herein.

Example

The owners of a nuclear power plant, a privately-owned water reservoir,and an airport each register with the operator of the disclosed system(in this example, named “U.S. HomeGuard”) by (a) purchasing cameras, (b)installing them at certain “no-man” zones on the sites' grounds, and (c)participating in an initialization sequence whereby the installedcameras receive Internet Protocol (IP) addresses and capture “reference”images that the system subsequently can use in determining whether totransmit a given image to Guardians.

Independently, U.S. HomeGuard recruits a plurality of Guardians tomonitor select still images of the no-man zones and report potentialsecurity breaches. Guardians may register with the U.S. HomeGuard systemby (a) logging on to a central website, (b) providing certain requiredbackground information, (c) downloading operational software, and/or (d)receiving identification information such as unique alphanumeric useridentifiers.

After registration, Guardians may log on to the U.S. HomeGuard site atany time and participate in the remote monitoring of select no-man zoneimages captured by the cameras. So as to reduce the number oftransmitted images to only potential security breaches, the centralcomputer or the cameras themselves may be configured to only transmitimages to Guardians if there is a triggering activity, such as thetriggering of a motion detector circuit and/or the determination that agiven image does not match stored reference images.

Once captured, images may be routed to Guardians according to storedrules. Such rules may require, for example, that images are (i)transmitted to a threshold number of Guardians (e.g., at least threeGuardians), (ii) assigned randomly to Guardians, (iii) routed accordingto geographical rules (e.g., that Guardians must be physically situatedat least 250 miles from the given no-man zone), (iv) assigned toGuardians based on Guardian ratings (e.g., at least one top ratedGuardian receives the image), and/or (v) any combination thereof. Suchrules would function to enhance the quality of the monitoring service byallowing for redundancy (i.e., by requiring multiple viewers). Suchrules would also function to bolster the security of the system bymaking the routing of feeds unpredictable (i.e., based on randomness)and/or by maintaining site anonymity (i.e., by routing images based ongeographical rules).

Once the Guardians receive images, they are prompted by a user device toindicate if they (1) see a person/vehicle in the picture, (2) do not seea person/vehicle in the picture, or (3) are not sure. The U.S. HomeGuardcentral computer may maintain a stored set of rules for determiningwhether a threshold number of responses are received that indicate apotential security threat. If a potential security threat is reported,the central computer may initiate emergency procedures, includingverification of the emergency by other Guardians and/or trainedprofessionals, and/or the dispatch of local emergency responders to thesite.

The attentiveness of the Guardians can be tested so as to ensure qualityof the monitoring service. For example, a data storage device accessibleby the central computer may route to Guardians previously-recordedimages that depict real or fabricated security breaches in order todetermine whether or not Guardians are paying attention to the routedimages. Should Guardians fail to report such “false positives” byindicating the correct response, the central computer may (1) adjust arating associated with the Guardian, (2) adjust the compensation due tothe Guardian, and/or (3) temporarily or permanently disable the Guardianfrom participating in the system.

After viewing images, Guardians may log off at will, and may becompensated for their work. Compensation may be determined based on, forexample, (i) the amount of time spent monitoring, and/or (ii) the degreeof a given Guardian's responsiveness to real or fabricated securitybreaches. Compensation may take the form of, for example, a credit to afinancial account associated with the Guardian, such as a credit cardaccount, a debit card/checking account, or a service account (e.g., anaccount for services rendered by an Internet Service Provider).

Monitoring Sessions

Registered Guardians can initiate monitoring sessions at any time. Thatis, they need not have previously scheduled a monitoring session.

Step 1: Receive Request to Initiate Session.

Monitoring sessions begin when a Guardian sends a request to the centralcomputer to initiate a monitoring session. In some embodiments, varioussecurity protocols are employed to ensure that only registered Guardiansparticipate in monitoring sessions. For example, Guardians may berequire to submit their Guardian identifiers that were distributedduring the Guardian registration process. Guardian identifiers may besubmitted without active involvement on the Guardian's behalf, forexample, as may happen if the Guardian's user device stored a “cookie”file, accessible to the central computer, that contained the Guardian'sidentifier. Further, Guardians may be required to submit verifiablepasswords in a manner known in the art. Indeed, any level of securitydesirable and known in the art may be employed.

At this point, a subroutine may optionally be employed to verify thecoordination and attentiveness of the Guardian. For example, the centralcontroller may administer, in conjunction with the Guardian's userdevice, a simple test of the user's coordination (e.g., by requiring theuser to trace a line with the mouse cursor) or of the user's reactiontime (e.g., by requiring the user to depress the Enter key immediatelyafter seeing an image of a human). Such a test may be useful indetermining whether or not the Guardian is currently in an appropriate(i.e., sober, rested) state to participate in a monitoring session.

Alternatively or additionally, the central computer may employ yetanother subroutine to determine if the Guardian is temporarily orpermanently banned from the system. More specifically, the centralcontroller may use the submitted Guardian identifier to retrieveGuardian rating information from the Guardian database and determinewhether or not the Guardian is temporarily or permanently banned fromthe system. For example, referring to the third exemplary record inTable 2, Mary Sullivan may be banned from the system until shesuccessfully completes a retraining routine similar or identical to thatwhich is disclosed in Steps 3 and 4 of the Guardian registrationprocess. Should a Guardian be temporarily or permanently banned fromparticipating in monitoring sessions, the central computer may directthe Guardian to participate in retraining or may end the process, asappropriate.

Step 2: Identify Captured Data (i.e., Image).

Previously, substantially simultaneously, or subsequently, the centralcontroller may identify an image (or other data) that is available forGuardian review.

In some embodiments, monitoring devices such as cameras may havepreviously or substantially simultaneously captured images or other dataand transmitted such data to the central computer. Monitoring devicesmay be configured to automatically capture and transmit such data uponthe happening of a “triggering” or “image capturing” event, such as (1)the initiating of a motion detector circuit, (2) the detection ofthermal changes in a camera's field of view, and/or (3) the detection ofa mismatch between a captured image and a previously stored referenceimage.

In an alternate embodiment, an acoustic perimeter intrusion detection(APID) system may be used to trigger the capture of images. APIDsystems, such that which is manufactured by ESCI International, Inc. ofClifton, N.J., include one or more metal wires attached to physicalballast dampeners operatively connected to a computer. The wires areattached on or adjacent to a physical fence, and the computer monitorsthe wires for acoustic vibrations. If vibrations are detected, thecomputer locates the exact position of the intrusion by monitoring thevibrations on the fence and determining the time that the signals arereceived from several locations. Such a detected intrusion may in turntrigger the capture and routing of images in the inventive system.

In some embodiments, when an image capture event occurs, the camerahardware may post one (or more) images to the central computer and mayalso isolate and index a full-motion image buffer (of configurableduration before and after the triggering event) and preserve this bufferin local or remote storage for a finite time period (e.g., 48 hours).

Also, in some embodiments, the central computer may queue the capturedimage(s) in a routing database, from which images are retrieved androuted to Guardians as described in the following step.

Step 3: Route Data to at Least One Guardian.

After the central computer identifies the data, the data is routed to atleast one currently active Guardian for review. In some embodiments, thecentral computer may route the data to Guardians randomly, based onstored rules, or a combination of both. As disclosed herein, storedrules may be site-specific rules selected by the site owner (see, e.g.,columns 4 and 5 of Table 1.).

Alternatively or additionally, the central computer may be configured toimpose certain routing rules to ensure quality and security, asdiscussed herein. For example, the system may require a minimum level ofGuardian redundancy. That is, the central computer may require that aminimum number of Guardians review a given image. Further, the centralcomputer may dynamically (i.e., periodically or continuously) adjustsuch rules for any or all sites based on (1) the number and quality ofavailable Guardians at any point in time, and/or (2) a “threat level”obtained from a remote database, such as one maintained by the UnitedStates Department of Homeland Security.

In some embodiments, the routing of captured images includes the routingof response instructions and/or possible answer selections. For example,Guardians could be prompted to indicate if they (1) see a person in thepicture, (2) do not see a person in the picture, or (3) are not sure.Alternatively, Guardians could be presented with two images (i.e., oneprerecorded reference image and one subsequently captured image) andasked whether or not the two images are a match.

Additionally or alternatively, the central controller may at this stepretrieve a false image from a database and transmit the false image toat least one Guardian. The central controller may be configured totransmit false images (1) randomly, and/or (2) periodically, based onstored rules (e.g., every X images, every Y minutes).

Step 4: Identify Response(s).

Guardian responses are then transmitted to and received by the centralcomputer. In some embodiments, if an image is presented to a Guardianand a response is not subsequently received by the central computerwithin a given time interval, the image “response instance” isredistributed to another Guardian meeting the routing rules for thegiven image. That is, the image may be transmitted to another Guardian.

In yet other embodiments, if an image is not voted on by the minimumnumber of Guardians within an overall expiration time interval, theimage may be routed to supervisors or otherwise processed in accordancewith site-specific rules.

Step 5: Evaluate Received Response(s) and Process Accordingly.

If responses indicating a potential security breach exceed asite-specific threshold (e.g., 2 out of 3 Guardians indicate that thereis a human in a no-man zone), certain procedures may be implementeddepending on site-specific or general system rules. For example, if athreshold number of Guardians report a human in a no-man zone, thesubject image can be routed to one or more Guardians for confirmation(e.g., Guardians with higher ratings), routed to one or more supervisorsfor confirmation, and/or routed to the site owner for confirmation.

Alternatively or additionally, should a potential security breach bedetected, the central computer may enable a two-way audio and/or videocommunication channel to the corresponding site so that a supervisor cantalk to any person in the camera's proximity. In such an embodiment, thesupervisor would have the ability to initiate a challenge/response (or“stand down”) procedure by asking the person questions that may indicatetheir authority to occupy the given space (e.g., passwords).

In yet another alternate embodiment, should a potential security breachbe detected, the central computer may dispatch local emergencyresponders and/or contact the site owner. The central computer mayfurther route any relevant captured images to the emergency respondersand/or site owner via, for example, a high-bandwidth handheld devicesuch as a 3G enabled cellular telephone. Further, the central computermay activate: (a) an electric fence, (b) an alarm, and/or (c) othersite-specific devices and procedures.

Further, site-specific rules may dictate that any or all of thefollowing occur in the event of a potential security breach: (1) allcameras corresponding to the relevant site may immediately captureimages, post images for review, and cache full-motion buffers regardlessof motion detection status; (2) the cameras that provided the originalimage(s) may be instructed to upload the motion image buffer(s)associated with the original image to the central computer, which willmake these buffered images available to supervisors and/or emergencyresponders as needed; and (3) a site alert may be created and posted toa site incident portfolio for Supervisor review.

In embodiments where the central controller transmitted at least onefalse image to at least one Guardian, the relevant Guardian's responsemay be evaluated. The system may compare the Guardian's response againsta stored set of correct or preferred answers, and inaccurate orundesirable responses may lead to negatively adjusted ratings, asdiscussed with reference to the next step.

Step 6: Adjust Guardian Rating Based on Evaluation of ReceivedResponse(s).

As discussed herein, Guardians can be categorized according to theircurrent skill level (determined by their performance in evaluating realand false images). In some embodiments, Guardians in good standing maybe given a numerical score and Guardians who are temporarily orpermanently banned from participating in monitoring sessions may be somarked in corresponding database records (see, e.g., Table 2).

According to an alternate rating scheme, a Guardian can be in “goodstanding”, “on probation”, “suspended”, or “banned”. The scoringthresholds that define the category boundaries can be configured at thesite level. The rules defining the effect of a status and therequirement for moving out of a status can be defined system-wide andoverridden at the site level as necessary. Example rules include (a) a“good standing” Guardian may receive real (i.e., live) images and testimages according to stored image routing rules, (b) a Guardian who is“on probation” may only receive test images until their score moves themback into the “good standing” category (this category might be initiallyin effect for new Guardians); (c) a Guardian who is “suspended” may needto take a remedial on-line training course and pass it to move into the“on probation” category, (d) a Guardian who is “banned” would not beallowed back on the system.

Step 7: Receive Request to Terminate at Session.

At any time, a Guardian may unilaterally end his or her participation ina monitoring session by transmitting to the central server a signal soindicating.

It should be noted that, in an alternate embodiment, the step ofadjusting Guardian ratings (Step 6) may take place after the step ofreceiving a request to terminate the session (Step 7).

Step 8: Calculate and Initiate Provision of Compensation to Guardian.

The central computer system may then determine the amount ofcompensation due to a Guardian and initiate the provision ofcompensation. Guardians may be afforded different pay rates according totheir rating status. For example Guardians rated at “5” may receive arate of $8/hour, while Guardians rated at “4” may receive a rate of$7.50/hour. In such an embodiment, the central computer would multiplythe amount of time logged by the Guardian by the given Guardian's payrate. This could be done after each Guardian session, or, alternatively,could be done periodically (e.g., weekly, monthly) or upon theGuardian's request.

The central controller may initiate payment by instructing that anaccount associated with the Guardian be credited. Methods for creditingaccounts and transferring funds are well known and need not be describedin detail herein.

Alternate payment mediums are contemplated, as discussed herein withreference to the section entitled “Additional and AlternateEmbodiments”.

Additional Embodiments

In some embodiments, the probability of a Guardian receiving a testimage instead of a live image may be driven by a calculation thatincreases the probability in inverse proportion to their currentaccuracy rating.

In some embodiments, test images may be categorized for degree ofdifficulty and this degree of difficulty may “weight” a Guardians scorewhen they submit responses associated with these images.

In some embodiments, test images may be categorized by visualcharacteristics (e.g., snow, water effects, low light, wide angle) and ascoring engine may be used to increase the probability of a Guardianscoring well in that category getting a site image that matches thesecharacteristics.

In some embodiments, image routing and escalation rules may ultimatelybe driven be an artificial intelligence network and/or a cognitive rulesengine.

In some embodiments, Guardians who have previously reviewed images for aparticular site can be assigned a higher or lower probability ofreviewing an image from the same site (or they may be excludedcompletely).

In some embodiments, test images may be given accompanying “answer”images that highlight the part of the image that contains a person (forfalse positives) or explain that there is no person (for falsenegatives) and this “answer” image may be presented to the Guardianimmediately after erroneously voting on the test image.

In yet another alternate embodiment, site anonymity can be furthermaintained by employing stored rules that function to actively suppressthe transmission of location-specific information from the Guardians.For example, using artificial intelligence, the system may pre-screenall images and redact any text therein (e.g., signage), so thatinformation relevant to the site's location is not transmitted to theGuardians.

In some embodiments, supervisors may access the system via a supervisorinterface that may be a highly secure internet-accessible (e.g., SSLbrowser w/RSA authenticated VPN connection) tool used to manage,prioritize and resolve site alerts.

In some embodiments, the supervisor interface can enable the supervisorto adjust PTZ orientation of any camera, and can enable the supervisorto engage in two-way audio communication via appropriately configuredimage capture nodes.

In some embodiments, supervisors can schedule planned maintenanceoutages for monitoring devices.

In some embodiments, the supervisor interface may present all capturedimages related to a site incident file. These images will be provided inboth full resolution and thumbnail for quick reference.

In some embodiments, the supervisor interface can enable Supervisors toaccess and review the full motion image buffers surrounding alert imagesfrom all sites and monitoring devices.

In some embodiments, the supervisor interface can enable supervisors toaccess real-time full motion images from any monitoring device.

In some embodiments, supervisors can adjust motion sensor zones andsensitivity for monitoring devices.

In some embodiments, when Guardians and Supervisors register with thesystem they will be asked to record a number of confidentialquestion/answer pairs related to their personal information. In additionto secure site password login, these questions will intermittently beposed to Guardians/Supervisors when they log in as a means ofsupplemental authentication. The requirement for and frequency of thisauthentication can be configured at the site level for Supervisors andcan be driven by score and/or status for Guardians.

In some embodiments, supervisor authentication security may besupplemented by a hardware-based key generation device (e.g., RSA keyfob).

In some embodiments, multiple redundant core data centers may beemployed.

In some embodiments, all Guardian access may be via authenticated SSLbrowser connections.

In some embodiments, a “single sign-on” rule will be enforced forGuardians so that Guardians cannot participate in two monitoringsessions simultaneously.

In some embodiments, anti-fraud check logic may be used to preventre-establishment of banned Guardians (personal and financial datamatching algorithms, network usage patterns, etc.).

In some embodiments, administrators will access the supervisor interfacevia a browser through secure network tunnels (e.g., authenticated VPNconnections).

In some embodiments, Guardian compensation levels may be adjusted bylocal hour of the day to promote participation during periods of lowGuardian on-line activity (e.g., 1-5 AM EST).

In some embodiments, Guardians may be compensated in the form of taxcredits. For example, Guardians may be offered an alternative way to paytheir federal income taxes by participating in the system. In such anembodiment, Guardian SSNs will be used to track such earned tax credits.

Similarly, prisoners may be afforded the opportunity to earn “goodbehavior” credit by participating in monitoring sessions.

In some embodiments, Guardians may be compensated by being offered thechance to win a sweepstakes prize. In such embodiments, a game may beincorporated into the monitoring session program. For example, Guardianswho view and report winning game pieces in images may receive a prize.Such sweepstakes would encourage attentiveness and provide a differentform of economic motivation.

Further, Guardians may be rewarded with bonuses or enhanced compensationfor spotting real emergencies.

In some embodiments, all remote monitoring devices will receive a“heartbeat ping” (i.e., a query) issued by the central computer at aconfigurable interval. Devices that do not respond may immediatelytrigger the initiation of emergency procedures.

In some embodiments, at an interval defined at the site level, themonitoring devices will be instructed to post a static image regardlessof motion detection status. This image can be analyzed by the imageprocessing network and compared to the last image from the same deviceto determine if significant composition change has occurred that wouldimply movement and, if so, route the image for Guardian review. Thesensitivity of this analysis can be site or device specific.

Rather than physical property, Guardians could monitor complicatedcomputer systems, and the monitoring device could be some type ofsoftware analysis of network patterns, rather than a camera. Forexample, no accesses of a certain type should be made, and the systemcan graphically represent such accesses for ease of analysis byGuardians. This type of monitoring could be done by Guardians whopossess certain basic computer skills.

Similarly, the system could be configured to monitor sounds. Relativelyunskilled Guardians could distinguish mundane sounds from, e.g.,shouting, cries for help or gunshots. In one embodiment, soundmonitoring (which is very low bandwidth) could be used in conjunctionwith image monitoring to direct images of certain sites to moreGuardians. This works especially well even in sites which are notstrictly ‘no-man’ zones.

In some embodiments, cameras may be mobile or mounted on mobile vehicles(cars, trucks, unmanned flying drones, etc.) to enable monitoring of aplurality of sites. Again, sites need not be no-man zones. For example,cameras may be mounted on a patrol vehicle, and Guardians could monitoran area much better while the driver conducts a foot patrol.

In some embodiments, a subset of monitoring devices may be randomly orotherwise activated/deactivated at a given time based on the numberand/or quality of available Guardians. Such an embodiment would functionto increase the level of security at times when there are more camerasthan active/qualified Guardians.

In some embodiments, site owners may be charged based on the number ofimages actually reviewed by Guardians in a given amount of time.

In some embodiments, cameras configured at highly or densely populatedareas (ATMs, toll booths, shopping malls, etc.) and Guardians mayactually be asked to compare still images of human subjects capturedfrom such cameras against a reference image of a particular human inorder to determine if there is a “match”. For example, Guardians couldlog on and compare, one by one, the many captured images taken from themillions of security cameras nationwide against a given picture of afugitive or a missing person. Guardians could simply indicate “match” or“no match”. Thus, the abundance of captured images that may contain thefugitive or missing person could be viewed by Guardians in hopes thatfugitives could be caught and missing persons located. In the rare eventthat a match is detected, the date, time and position of theimage-capturing camera can be used to reconstruct the subject's trailand isolate the subject's whereabouts.

Additional Examples

The following examples illustrate various embodiments of the inventionwhich may be advantageously employed to achieve various utilities.

When an image capture event occurs, the image capture node hardware willpost one (or more depending on configuration) images to the imageservices network and will also isolate and index a full-motion imagebuffer (of configurable duration before and after the triggering event)and preserve this buffer on local storage for a finite time period(optimally 48 hours, configurable).

The image services network will pre-process the image and post the imagereview request to the routing database.

The image routing database will present the image to the nextappropriate Guardian that makes an image request, based on distributionquantity and routing rules (site/node configurable).

If an image is presented to a Guardian and is not subsequently voted onwithin a (site/node configurable) time interval that Guardian's vote isinvalidated and the image “vote instance” is redistributed.

If an image is not voted on by the minimum number of Guardians within anoverall expiration time interval (site/node configurable) the image maybe escalated according to site rules.

Guardian votes are posted and processed by a vote management service.

If affirmative votes exceed a site/node defined threshold the image isescalated according to site rules.

Site escalation rules may dictate that any of the following occur duringimage escalation:

Image goes through a second wave of distribution to Guardians based onrouting logic defined for that escalation level (e.g., to Guardians withhigher average accuracy scores).

All image capture nodes for escalated site immediately register captureevents, post images for review, and cache full-motion buffers regardlessof motion detection status.

Image capture nodes that provided the original image(s) undergoingescalation will be instructed to upload the motion image buffer(s)associated with the original image to the image services network whichwill make these buffered images available to Supervisors as needed.

When appropriate escalation level is reached, a site alert is createdand posted to a site incident portfolio for Supervisor review.

The site supervisor module will execute any appropriate automated alertnotification processes defined for the site (e.g., page, email, cellnotification w/image).

Supervisors can “stand down” image escalation at any level and close outsite alerts and site incident portfolios.

The system will archive/purge static and motion images associated withclosed alerts in accordance with site-defined rules.

Raw images posted from image capture nodes will be optimized forGuardian review through an image processing service that will do thingssuch as grayscale the image, enhance brightness & sharpness, etc. Thepre-processing software can be configured at the site/node level to tuneit to the visual characteristics of a particular node (e.g., heavy sunglare at certain hours). The “raw’ (pre-processing) image may beretained for a site-defined time period and is then discarded.

All processed images are given a unique index number that associatesthem with the source site/node.

All processed images have a digital watermark injected and a digitalfingerprint is taken of the image (e.g., via an MD5 checksum) tofacilitate authentication of the image in its final form.

After being processed, images are posted to a content distributionnetwork to facilitate image fetch load distribution.

Guardians who have previously reviewed images for a particular site/nodecan be given higher or lower probability of reviewing an image from thesame site/node (or they may be excluded completely).

Test images have accompanying “answer” images that highlight the part ofthe image that contains a person (for false positives) or explain thatthere is no person (for false negatives) and this “answer” image ispresented to the Guardian immediately after erroneously voting on thetest image (before any available live images are presented).

The probability of a Guardian receiving a test image instead of a liveimage may be driven by a calculation that increases the probability ininverse proportion to their current accuracy rating.

Test images may be categorized for degree of difficulty and this degreeof difficulty may “weight” a Guardians score when they vote on theseimages.

Test images may be categorized by visual characteristics (e.g., snow,water effects, low light, wide angle) and a scoring engine may be usedto increase the probability of a Guardian that scores well in thatcategory getting a site image that matches these characteristics.

Image routing and escalation rules may ultimately be driven be an AI/Bionetwork and/or a cognitive rules engine of some kind (though initiallywill be driven by a meta-data rule base—the prototype uses logic codedin database stored procedures and tables).

Guardians can be categorized according to their current skill level(determined by their performance in evaluating seeded test images). AGuardian can be in “good standing”, “on probation”, “suspended”, and“banned”. The scoring thresholds that define the category boundaries canbe configured at the site level.

The rules defining the effect of a status and the requirement for movingout of a status can be defined system-wide and overridden at the sitelevel as necessary. Example rules might be:

A “good standing” guardian receives live images and test imagesaccording to the image routing logic engine's determination.

A Guardian who is “on probation” only receives test images until theirscore moves them back into the “good standing” category. This categorymight be initially in effect for new Guardians.

A Guardian who is “suspended” would need to take a remedial on-linetraining course and pass it to move into the “on probation” category.

A Guardian who is “banned” would not be allowed back on the system.

When Guardians and Supervisors are set up on the system they will beasked to record a number of confidential question/answer pairs relatedto their personal information. In addition to secure site passwordlogin, these questions will intermittently be posed toGuardians/Supervisors when they log in as a means of supplementalauthentication. The requirement for and frequency of this authenticationcan be configured at the site level for Supervisors and can be driven byscore and/or status for Guardians.

Supervisor authentication security may be supplemented by ahardware-based key generation device (e.g., RSA key fob).

Guardian compensation levels may also be adjusted by local hour of theday to promote participation during periods of low Guardian on-lineactivity (e.g., 1-5 AM EST).

The site supervisor interface is a highly secure internet-accessible(e.g., SSL browser w/RSA authenticated VPN connection) tool used tomanage, prioritize and resolve site alerts.

The interface presents all image capture node images related to a siteincident profile. These images will be provided in full resolution andthumbnail for quick reference.

The interface can enable Supervisors to access and review the fullmotion image buffers surrounding alert images from all site imagecapture nodes.

The interface can enable supervisors to access real-time full motionimages from any site image capture node.

The interface can enable the supervisor to adjust PTZ orientation of anynode camera, and can enable the Supervisor to engage in two-way audiocommunication via appropriately configured image capture nodes.

Supervisors can schedule planned maintenance outages for nodes andestablish ongoing hours of operation for nodes.

Supervisors can adjust motion sensor zones and sensitivity for imagecapture nodes.

Driving parameters for escalation rules are maintained by the sitesupervisors through this interface (e.g., votes needed for escalation,escalation path, etc.).

Alert data and images may be dispatched from the supervisor interface toremote parties via electronic means (e.g., cell phone, email, etc).

Granular role-based permissions can be enforced on all site supervisorfunctionality.

Camera and supporting peripheral hardware used in image capture nodeswill have embedded computer devices and will support various standardinternetworking and operating system protocols (e.g., embedded Linuxchips that support HTTP, SSL, FTP, CGI, Java, etc.).

The prototype is being developed using Axis camera hardware (2420 seriesnetwork cameras with IR lens, 250-S MPEG-2 network video servers, 2191audio modules). All this node hardware features embedded Linux chips andopen protocols as described above (though no SSL or Java off-the-shelf).The prototype cameras & peripherals are networked using wirelessbridges—the wireless interface would optimally be on-board (as an add-incapability to save cost when not needed).

Camera hardware located outdoors will be housed in protective coveringand will be hardened to tolerate temperature extremes.

Camera hardware may be equipped with IR lenses for low-light imagecapture.

Camera hardware may be equipped with PTZ (Pan/Tilt/Zoom) mechanisms tofacilitate remote adjustment of field of view, focus, etc.

Image capture node hardware will support on-demand requests for staticand motion images submitted by remote services (such as the siteadministrator module).

It may be possible to implement completely autonomous, free-standingimage capture hardware that uses solar panels and high capacity energycells for power and cellular/satellite communications for nodenetworking (These could be used in isolated areas such as deserts andnational parks).

Image capture node networking may include use of 802.11b & relatedwireless protocols.

Image capture node networking may include use of cell networks (GSM andother emerging standards).

Multiple redundant core data centers will form the backbone of theservices layer.

A content distribution network (numerous distributed nodes) will be usedfor image distribution.

All Guardian access will be via authenticated SSL browser connections.

Single sign-on will be enforced for Guardians.

Anti-fraud check logic will be used to prevent re-establishment ofbanned Guardians (personal & financial data matching algorithms, networkusage patterns, etc.).

Administrators will access the supervisor interface via browser throughsecure network tunnels (e.g., authenticated VPN connections).

DOS attacks (e.g., spoofing and flooding of Guardian image votes) willbe a significant concern. Anti-spoofing measures will be implemented todisregard forged image requests and vote responses before they areprocessed by the appropriate services. Examples of these might benetwork pattern analysis engines that identify and suppress redundantimage requests and vote responses.

All site image capture notes will receive a heartbeat ping issued byremote management services at a configurable interval. Nodes that do notrespond will immediately generate a site alert and incident portfolioand alert will trigger appropriate escalation as defined by the siterule base.

At an interval defined at the site/node level the image capture nodeswill be instructed to post a static image regardless of motion detectionstatus. This image can be analyzed by the image processing network andcompared to the last image from the same node to determine ifsignificant composition change has occurred that would imply movementand if so process the image for Guardian review. The sensitivity of thisanalysis can be site/node configurable (if need be all health snapshotscan be submitted for review).

DEFINITIONS

The following definitions are used herein above, unless otherwiseindicated.

Central computer, central controller, central server, server—A computeror computing device, which typically comprise at least one or more of:(i) a processor, such as one based on the Intel® Pentium® seriesprocessor, (ii) a means for receiving signals from at least onemonitoring apparatus, (iii) a means for transmitting signals to at leastone user computer, and/or (iv) a data storage device/memory. Forexample, the central computer may be one or more IBM E-series™ servers.

False positive, false image, fabricated image, fabricated securitybreach—an indication which, if transmitted to a Guardian, should toelicit a positive response. For example, the false positive may be apre-recorded image or other data file depicting a real or fictitioussite or no-man zone.

Guardian—A citizen who participates in the remote monitoring of sites,typically in exchange for compensation.

Monitoring apparatus, monitoring device, sensor—A device capable ofreceiving or generating (e.g., via an input device such as a chargecoupled device) a signal indicative of a sensed state (e.g., an image)and data representing the sensed state (e.g., a captured image). Amonitoring apparatus may include, e.g., (i) a processor, such as onebased on the Intel® Pentium® series processor, and/or (ii) a datastorage device/memory. Such sensors include, but are not limited to: (a)digital video cameras, (b) digital video cameras equipped with motiondetection and/or “short loop” tripping features, (c) digital cameras,and (d) motion detectors. A monitoring devices may be capable ofconverting analog signals into digital data files.

“No-man” zone—An area, usually a security-sensitive area on a site,where no humans or vehicles should be monitored (e.g., no humans shouldbe present). No-man zones may include areas adjacent to, within, outsideof or otherwise in proximity to sites such as airports, chemical plants,natural gas plants, pipelines and pumping stations, power plants(including nuclear reactors), refineries, and reservoirs.

Site, Remote Site, Property—Property, including but not limited to realproperty, containing critical infrastructure or other resources whichare to be monitored. Such property may be monitored by one or moremonitoring apparatus.

Supervisor, Trained Professional, Professional—A supervisor may assistsite owners in configuring and initializing monitoring devices. Asupervisor may receive certain images after review by at least oneGuardian. A supervisor may be, e.g., an employee or agent of theowner/operator of the central computer.

User computer, user device, device—A device capable of (i) receiving asignal (e.g., sensed data) from a central computer and/or a monitoringapparatus, e.g., via a standard Internet connection; (ii) outputting asignal to a Guardian or other user, e.g., via a Web browser displayed ona monitor; (iii) receiving a response from a user, e.g., via an inputdevice such as a mouse, keyboard and standard Microsoft Windows®interface, and/or (iv) transmitting a signal indicative of the response(e.g., a result) to a central computer and/or a monitoring apparatus,e.g., via a standard Internet connection. In some embodiments, a userdevice may include (1) a processor, such as one based on the Intel®Pentium® series processor, and/or (2) a data storage device/memory.Examples of user devices include appropriately configured personalcomputers, cellular telephones, and game stations such as the Xbox® andthe PlayStation® game stations.

Neuron—a component which is capable of (i) receiving a signal (e.g.,sensed data) from a central computer and/or a monitoring apparatus,e.g., via a standard Internet connection; and (ii) transmitting a signalindicative of the result (e.g., based on processing the received signal)to a central computer and/or a monitoring apparatus, e.g., via astandard Internet connection. In some embodiments, a user device mayinclude (1) a processor, such as one based on the Intel® Pentium® seriesprocessor, and/or (2) a data storage device/memory. Examples of userdevices include appropriately configured personal computers (e.g., auser computer operated by a Guardian), cellular telephones, and gamestations such as the Xbox® and the PlayStation® game stations.

Disclosed below are systems and methods facilitating the ad hocperformance of tasks by workers. According to some embodiments, anetwork of devices is configured to enable individual workers to log onto a central system at any time through devices such as personalcomputers and cellular telephones and perform low-skill tasks. Suchworkers may terminate work sessions unilaterally and are compensatedbased on the amount of work performed.

According to some embodiments, the central system is configured toreceive and register task information from at least one employing party.Further, according to some embodiments, the central system is configuredto register remote workers. Additionally, according to some embodiments,the central system is configured to manage work sessions. Further still,according to some embodiments, the central system is configured tomanage the financial settlement of work sessions, including the billingof an employing party, the compensation of workers, and the allocationof commissions to the operator of the central system. Many additionaland alternate embodiments are also disclosed.

In this manner, the systems and methods disclosed herein allow, e.g.,low-skill workers to supplement their incomes. Further, the systems andmethods disclosed herein allow workers of all skill levels to earnincome at heretofore unproductive times by remotely performing low-skilltasks in an ad hoc, fluid manner. Additionally, by enabling the remoteperformance of ad hoc tasks, the systems and methods disclosed hereinallow employers to purchase labor in incremental units thattraditionally would not be economically feasible due to travel costs andhourly pay structures.

Examples Example 1

An Internet service provider such as America Online® (AOL) hasconfigured its computer system to receive job requests from remoteemployers via the Internet. A manufacturing company registers with AOLto have digital images of its assembly line process reviewed forirregularities by AOL subscribers. AOL and the manufacturing companyagree that the company will pay $5,000 for every 100,000 images viewedby two independent AOL subscribers. The parties also agree that AOL willcompensate subscribers as it sees fit. Accordingly, AOL decides toretain $11000 of every $5000 received from the manufacturing facility,leaving $4000 to compensate the duplicative viewing of 100,000 images(i.e., 200,000 images). Accordingly, AOL will thus pay AOL subscribersto view images at the rate of $0.02 per image ($4000/200,000images=$0.02/image). After the job is registered, AOL then activelyadvertises the opportunity to its subscribers. As advertised,subscribers would log on to AOL and view digital images of products at aparticular stage of an assembly line, one after the other. Subscribersare instructed to click the “OK” or “ERROR” buttons on their screen,depending on whether or not the particular images match a givenreference image that represents a high-quality, error-free unit at thegiven point in the assembly line.

Bill Jones, an AOL subscriber, is a low-wage worker who works afull-time job in a grocery store. One month, Bill is surprised with a$200 unexpected furnace repair bill. Concerned that his currentfinancial resources are insufficient, Bill logs on to AOL with theintent of emailing a relative and asking to borrow $200. However, Bill'sattention is drawn to an area on the AOL graphical user interface (GUI)advertising the opportunity to get paid for performing online qualitycontrol monitoring. Bill clicks on the advertisement and begins workimmediately by comparing the scrolling series of images on the left sideof his screen against the “control” or reference image on the right handside of the screen, entering “OK” if the images match, and “ERROR” ifthe images are not a match. Over the next few evenings, Bill logs on andreviews a total of 10,000 images and thereby earns $200. Once he reacheshis goal, he transmits a request to AOL's server to get paid, and the$200 is immediately credited to his debit/checking account already onfile with AOL.

Example 2

A news organization has arranged with Verizon Wireless to paysubscribers for answering survey questions. Mary Johnson, a Verizonsubscriber, is a commercial real estate agent working almost entirely oncommission. One evening on her way home from work, while reflecting onthe recent slump in sales, she is delayed in an unexpected traffic jam.Her thoughts turn to the rising price of gas, her high mortgage bills,and her son's college tuition. Overwhelmed and frustrated, she decidesshe must try to make this time productive. However, at 6:00 PM, it's toolate catch her clients in their offices. But, she does recall seeingVerizon marketing materials offering the opportunity to get paid foranswering survey questions. She puts on her earpiece/microphone unit,presses #WORK (#9675) on the keypad of her cellular phone, and startsanswering survey questions by listening to the questions, and respondingverbally to prompts from an Interactive Voice Response Unit (IVRU).

For example, the IRVU may output the question “Do you support anincrease in the federal income tax to fund increased healthcare benefitsfor senior citizens? Yes or no?” After deliberating for a moment, Maryresponds “no”, and the IVRU uses voice-recognition technology tointerpret, digitize and record her response. Then, the IVRU may ask “Doyou think the income tax on stock dividends should be repealed?” Marywould likewise provide her response. After ½ hour of sitting in traffic,Mary has earned $12, more than enough to pick up dinner for herself andher son on the way home.

Example 3

Jennifer, an America Online subscriber, is a teenager who regularly usesAOL's Instant Messenger to communicate with her friends. While instantmessaging, Jennifer earns money by answering survey questions frominterested commercial entities such as Old Navy, Abercrombie & Fitch,Capital Records, MTV® and the like. Because she is paid per questionanswered (rather than hourly), it is perfectly acceptable for her focusto change as she crafts instant messages, fields phone calls, changesradio stations, and the like. She can answer questions when it isconvenient for her. For example, while waiting for a friend to respondto an Instant Message, she may answer a survey question in a differentwindow of the AOL GUI.

DEFINITIONS

The following definitions are used herein below, unless otherwiseindicated.

Ad hoc task, micro-task, micro-work, piecemeal work, piecework, task—Acompensable unit of work registered with a central service by anemploying party, the performance of which taking place at any timethereafter by a remote worker. Generally, ad hoc tasks are comprised offinite, incremental units of work that together form a broader projector objective for the employing party. For example, a survey may bedivisible into many discrete, individually-compensable questions. Thedivision of projects into such micro-tasks facilitates the beginning andending of tasks in an ad hoc, impromptu manner. For example, because itonly takes a few moments to complete a single survey question, a workerwho does not have much time may quickly log on, complete a question ortwo, and then log off. In order to facilitate the impromptu performanceof tasks by a wide range of workers during a wide range of times, ad hoctasks are generally low-skill tasks.

Central computer, central controller, central server, server—A computercomprising at least one or more of: (i) a processor, such as one basedon the Intel® Pentium® series processor, (ii) a means for receivingsignals from at least one monitoring apparatus, (iii) a means fortransmitting/receiving signals to/from at least one worker device,and/or (iv) a data storage device/memory. Generally, central computersare owned, operated and maintained by communications services such ascable, phone and/or Internet services.

Employer device—A computer comprising at least one or more of: (i) aprocessor, such as one based on the Intel® Pentium® series processor,and/or (ii) a means for transmitting/receiving signals to/from at leastone central computer. In some embodiments, employer devices are used toupload information regarding low-skill tasks, including task content andpayment terms.

Employing party, employer—A party who registers a task with a centraloperator and compensates the central operator and/or one or more remoteworkers for the performance of the task.

Low-skill task—Low-skill tasks are tasks, jobs, or other units of workthat require little or no worker credentials and can be performed byproviding a simple communication responsive to a transmission of taskinformation. Generally, low-skill tasks are relatively non-imposing whencompared to other, more mentally consuming (i.e., higher skill) tasks.Thus, low-skill tasks generally can be performed by workers whileworkers are engaged in other activities. Further, low-skill tasksgenerally can be started and stopped quickly and fluidly, withoutsignificant “switching cost”.

Monitoring device—A device located at a site associated with anemploying party that is configured to communicate with a centralcomputer and/or a worker device so that workers can receivesite-specific data and perform tasks based on the site-specific data.For example, a monitoring device may comprise a video camera, and amicro-task may involve viewing an image captured by the video camera andresponding as to the contents of the image.

Work session—A period of time during which a remote worker performs atleast one micro-task. Generally, work sessions include a plurality ofmicro-tasks.

Worker—A person who communicates, via a worker device, with a centralcomputer and/or a monitoring device for the purpose of earningcompensation in exchange for the performance of micro-tasks. Generally,workers need not possess particular skills, as most micro-tasks arelow-skill tasks. Further, workers are often subscribers to acommunications service such as a cable, phone and/or Internet service.

Worker device, user computer, user device—A device capable of (i)receiving a signal from a central computer and/or monitoring device,(ii) outputting a signal to a user (i.e., a worker), (iii) receiving aresponse from a user via an input device, and (iv) transmitting a signalindicative of the response to a central computer and/or monitoringdevice. In some embodiments, a user device may include (1) a processor,such as one based on the Intel® Pentium® series or Centrino® seriesprocessor, and/or (2) a data storage device/memory. Example workerdevices include personal computers, Personal Digital Assistants (PDAs)and cellular telephones.

Network Configuration

The embodiments described below can be configured to work in a networkenvironment whereby the central computer, the user computer, theemployer device, and/or the monitoring device communicate with eachother directly or indirectly, via a wired or wireless medium such as theInternet, LAN, WAN or Ethernet, Token Ring, or via any appropriatecommunications means or combination of communications means.Communication between the devices and computers, and among the devices,may be direct or indirect, such as over the Internet through a Websitemaintained by a computer on a remote server or over an on-line datanetwork including commercial on-line service providers, bulletin boardsystems and the like. In yet other embodiments, the devices maycommunicate with one another and/or a computer over RF, cable TV,satellite links and the like.

Some, but not all, possible communication networks that may comprise thenetwork or be otherwise part of the system include: a local area network(LAN), a wide area network (WAN), the Internet, a telephone line, acable line, a radio channel, an optical communications line, and asatellite communications link. Possible communications protocols thatmay be part of the system include: Ethernet (or IEEE 802.3), SAP, ATP,Bluetooth™, and TCP/IP. Further, networking of devices and computers mayinclude use of 802.11b and related wireless protocols and/or use of cellnetworks (GSM and other emerging standards).

Those skilled in the art will understand that computers and devices incommunication with each other need not be continually transmitting toeach other. On the contrary, such computers and devices need onlytransmit to each other as necessary, and may actually refrain fromexchanging data most of the time. That is, a device in communicationwith another device via the Internet may not transmit data to the otherdevice for weeks at a time. For example, a worker may download a project(i.e., a plurality of micro-tasks such as questions) from the centralcomputer to a worker device, perform the micro-tasks piecemeal (e.g., astime permits), and then upload the project results (i.e., answers toquestions) when complete.

In an embodiment, a central computer may not be necessary and/orpreferred. For example, the present invention may, in one or moreembodiments, be practiced on a monitoring device in communication onlywith one or more user computers. In such an embodiment, any functionsdescribed as performed by the central computer or data described asstored on the central computer may instead be performed by or stored onone or more monitoring devices or user computers.

Data Storage Devices/Memory

For each computer and/or device (i.e., the central computer, the usercomputer, and/or the monitoring apparatus), a processor may be incommunication with a memory and a communications port (e.g., forcommunicating with one or more other computers or devices). The memorymay comprise an appropriate combination of magnetic, optical and/orsemiconductor memory, and may include, for example, Random Access Memory(RAM), Read-Only Memory (ROM), a compact disc and/or a hard disk. Thememory may comprise or include any type of computer-readable medium. Theprocessor and the memory may each be, for example: (i) located entirelywithin a single computer or other device; or (ii) connected to eachother by a remote communication medium, such as a serial port cable,telephone line or radio frequency transceiver.

In one, several or all computers or devices, a memory may store aprogram for controlling a processor. The processor performs instructionsof the program, and thereby operates in accordance with the presentinvention, and particularly in accordance with the processes describedin detail herein. The program may be stored in a compressed, uncompiledand/or encrypted format. The program furthermore includes programelements that may be necessary, such as an operating system, a databasemanagement system and “device drivers” for allowing the processor tointerface with computer peripheral devices. Appropriate program elementsare known to those skilled in the art, and need not be described indetail herein.

The term “computer-readable medium” as used herein refers to any mediumthat participates in providing instructions to a processor forexecution. Such a medium may take many forms, including but not limitedto, non-volatile media, volatile media, and transmission media.Non-volatile media include, for example, optical or magnetic disks, suchas memory. Volatile media include dynamic random access memory (DRAM),which typically constitutes the main memory. Transmission media includecoaxial cables, copper wire and fiber optics, including the wires thatcomprise a system bus coupled to the processor. Transmission media maycarry acoustic or light waves, such as those generated during radiofrequency (RF) and infrared (IR) data communications. Common forms ofcomputer-readable media include, for example, a floppy disk, a flexibledisk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM,DVD, any other optical medium, punch cards, paper tape, any otherphysical medium with patterns of holes, a RAM, a PROM, an EPROM, aFLASH-EEPROM, any other memory chip or cartridge, a carrier wave asdescribed hereinafter, or any other medium from which a computer canread.

Various forms of computer readable media may be involved in carrying oneor more sequences of one or more instructions to a processor forexecution. For example, the instructions may initially be borne on amagnetic disk of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem local to a particular computer ordevice can receive the data on the telephone line and use an infraredtransmitter to convert the data to an infrared signal. An infrareddetector can receive the data carried in the infrared signal and placethe data on a system bus for the processor. The system bus carries thedata to main memory, from which the processor retrieves and executes theinstructions. The instructions received by main memory may optionally bestored in memory either before or after execution by the processor. Inaddition, instructions may be received via a communication port aselectrical, electromagnetic or optical signals, which are exemplaryforms of carrier waves that carry data streams representing varioustypes of information. Thus, a computer or device may obtain instructionsin the form of a carrier wave.

According to an embodiment of the present invention, the instructions ofthe program may be read into a main memory from anothercomputer-readable medium, such from a ROM. The execution of sequences ofthe instructions in a program causes the processor to perform theprocess steps described herein. In alternate embodiments, hard-wiredcircuitry may be used in place of, or in combination with, softwareinstructions for implementation of the processes of the presentinvention. Thus, embodiments of the present invention are not limited toany specific combination of hardware and software.

The memory also may store one or more databases. Some or all of the datastored in each database is described in conjunction with the followingdescription of the process steps. The described entries of the databasesrepresent exemplary information only; those skilled in the art willunderstand that the number and content of the entries can be differentfrom those illustrated herein. Further, despite any description of thedatabases as tabular, relational databases, an object-based model couldbe used to store and manipulate the data types of the present inventionand likewise, object methods or behaviors can be used to implement theprocesses of the present invention.

Processes

The following processes are described as routines performed by thecentral computer. However, it should be understood that such processesmay be performed entirely or in-part by other devices, such as thosedescribed herein.

Task Registration Process

Step 1: Receive Task Registration Data.

Employing parties register at least one task with the central serviceby, for example, uploading data to the central computer from an employerdevice. Such data may be uploaded through a Web-accessible GUI, inaccordance with Electronic Data Interchange (EDI) standards and formats,or the like.

Task data to be uploaded may include, but is not limited to: (1) IPaddresses to patch through camera feeds, (2) remote file addresses forquestion content, possible answer choices and/or answer formats, (3)digital files containing information regarding question content and/oranswer choice content, (4) financial data, such as compensation rates(for the central service and/or workers), compensation instructions(e.g., payment medium/means) and/or an account number of the employingparty (e.g., for automatic billing purposes), (5) instructions forcompletion of the task, (6) instructions for how a task is to be divided(e.g., an indication of the divisible units of a project), (7)instructions for how and/or when the complete task is to be returnedand/or presented to the employer, (8) required/desired workerqualifications (e.g., worker demographics), (9) performanceconditions/prerequisites as defined herein.

Step 2: Process Received Task Registration Data.

In some embodiments, received task registration data is processedaccording to rules included therein or according to stored rules. Forexample, task registration data may include a complete survey, and thesurvey may be divided into individual questions. Or, task registrationdata may include a complete document that needs to be proofread, and thedocument may be divided into pages, paragraphs, sentences, phrases orwords.

Further, in some embodiments, received task registration data may bedivided into a given number of task instances according to a numericalminimum or maximum indicated by the employer. For example, an employerwishing to conduct a survey may indicate that questions are to beanswered by at least 50 respondents (workers). In this case, a singlequestion can be registered in a task database (described below) fiftytimes, as fifty separate micro-tasks.

Step 3: Store Task Registration Data in Task Database.

Uploaded task data may be stored in a task database that is consulted inthe below-described work session process. An example task database isshown in Table 3 below:

TABLE 3 Performance Task Project Employer conditions/ Payment identifieridentifier identifier Task description Compensation prequisitesconditions 321321 55555 190357 Survey question at $.02 None CheckC://tasks.questions.55555.0001 only; once more than $5 has been earned321322 55555 190357 Survey question at $.02 None CheckC://tasks.questions.55555.0002 only; once more than $5 has been earned

Worker Registration Process

According to some embodiments, workers may be required to registerbefore they are permitted to participate in work sessions.

Step 1: Receive Registration Request from Potential Worker.

According to some embodiments, potential workers may log on to a websitehosted by the central computer or otherwise log on to an online service(e.g., an ISP's home page), at which time they may send a request toregister as a worker by, for example, clicking on a button.

Step 2: Request Registration Data from Potential Worker.

According to some embodiments, workers may be required to providecertain data to the central computer in order to participate in worksessions as workers. Such data may include (1) contact information(name, address, phone number, email address, etc.), (2) Social SecurityNumber (SSN), (3) demographic information (race, gender/sex, age),and/or (4) financial account identifiers (e.g., credit card accountnumbers, debit card account numbers, checking account numbers, etc.).

The central computer may prompt or otherwise request any or all of suchdata from the potential worker after Step 1. Alternatively, such datamay be previously registered with the central computer, as may be thecase where the central computer is a computer operated by an InternetService Provider and the potential worker is already registered as acustomer of online services. That is, consumers who are registered withthe central service as a subscriber/customer may already have some orall of the requisite registration data on file with the centralcomputer. (See, e.g., Examples 1, 2, and 3 above).

In some embodiments, the terms of a general confidentially ornondisclosure agreement may be provided to the worker for acceptance.That is, because some or all of the projects registered by an employermay contain sensitive, confidential information, workers may be requiredto agree not to disclose to third parties any information obtained byvirtue of their participation in work sessions. Thus, if an employerwishing to gauge consumer feedback about a new product packaging designwere to register a survey featuring the new product design, workersemployed to provide feedback about the design would be contractuallybound to not disclose information about the design to third parties.

Step 3: Determine Whether Potential Worker is Permitted to Participatein Work Sessions Based on Stored Rules.

After the worker provides the necessary registration data to the centralcomputer, the central computer consults stored rules (e.g., in adatabase) to determine whether or not the worker meets the generalrequirements necessary to participate in work sessions.

For example, the central computer may refuse to register any potentialworker who does not accept the terms of a nondisclosure agreement.

Or, the central computer may refuse to register any potential worker whodoes not reside within a certain geographical region. For example, astored rule may indicate that workers must be citizens of the UnitedStates, as indicated through the provision of a valid SSN. In this case,the central server may receive a nine-digit number from the remotepotential worker, and consult a remote database to determine whether ornot the number corresponds to a validly issued SSN.

Further still, the central computer may refuse to register any potentialworker under a certain age, as indicated by a database lookup based on aprovided SSN. Such an embodiment may be desirable where local childlabor laws limit work by individuals under certain ages. The centralcomputer may optionally be configured to access a local or remotedatabase comprised of such jurisdictional age limits. The centralcomputer could consult the database so that the appropriate age limit isretrieved which corresponds to the potential worker's place of domicile.An example of such a database is shown in Table 4 below:

TABLE 4 State Minimum working age NY 16 LA 15 IL 17

Also, the central computer may refuse to register any potential workerwho does not provide certain information by, for example, populatingcertain fillable fields of a Web page. For example, state and federalequal opportunity and/or labor laws and regulations may require theoperator of the central computer to record the age, race and gender/sexof each potential worker, in which case any potential workers failing toprovide such information may be returned to a previous step in theprocess (e.g., so that the required information can be provided), or thesession may end.

Furthermore, in some embodiments, stored rules may require that the usermeet certain minimum hardware requirements. That is, the system mayrequire that user devices be capable of a certain minimum amount offunctionality. For example, the system may require that a user device beconfigured to communicate with the central computer through a modem of acertain speed, that the user device comprise a processor of a certainspeed, etc.

Step 4: Create Record for Worker in Worker Database.

A record for the worker is created in a worker database including atleast some of the received registration data. According to someembodiments, a worker identification number may be assigned to theworker and stored in the worker's record. The worker database may beread from and/or written to by the central computer during thebelow-described work session process.

An exemplary worker database is shown in Table 5 below:

TABLE 5 Desired form of Total Total payment/ hours hours Worker workedworked Worker financial Complete, Total within within Worker WorkerWorker Worker email account uncompensated compensation last 24 last 30identifier password name address address number tasks due hours days 222Fish Bill 2 Main bjones@emailsite.com Check Task $.04 .00146 .00146Jones Street, identifiers: Town, 321321, NY, 321322 USA

Work Sessions

Step 1: Receive Request to Initiate Work Session.

Registered workers can initiate work sessions without having previouslyscheduled a work session. Such flexibility allows registered workers tolog on at any time and earn money by performing micro-tasks.

The request to initiate a work session can be communicated by the workerin many ways, including but not limited to (1) using a mouse or otherdevice peripheral to the user computer to click on an area of agraphical user interface, such as a Web page, hosed by the centralcomputer, or (2) using a handheld wireless device such as a cellulartelephone to transmit dual-tone multi-frequency (DTMF) tones to anInteractive Voice Response Unit (IVRU) operatively connected to thecentral computer.

In some embodiments, the central computer may at this point requestand/or receive a worker identifier and/or password for securitypurposes.

Step 2: Determine If Request to Initiate Work Session is Valid.

The central computer then determines if the received request to initiatea work session is valid. In some embodiments, the central computer mayvalidate the request by simply checking the received worker identifierand/or password against the worker database to determine if theycorrespond to a valid record.

Further, in some embodiments, the central computer may validate therequest to initiate a work session by determining whether or not theworker is attempting to initiate a work session from an unauthorizedlocation or using unauthorized equipment. For example, various employersmay wish to prevent their employees from performing tasks for otheremployers (by participating in work sessions) during regular workinghours. As such, an employer may register with the central computer sothat workers cannot participate in work sessions using companycomputers. Thus, an employer may register the IP addresses or machineidentifiers of personal computers in its corporate network. Uponreceiving a request to initiate a work session, the central computer maythen consult a database comprised of such identification information todetermine whether or not the worker is attempting to initiate a worksession from an unauthorized location or machine. If so, the centralcomputer may determine that the request to initiate the work session isinvalid, and may terminate the process at this point. An exemplarydatabase comprising prohibited employer devices is shown in Table 6below:

TABLE 6 Work session participation Employer Device identifier rule(s)ABC 1234.1234.1234.1234 Not to be used in work sessions Corporation ABC1234.1234.1234.1235 Not to be used in work sessions Corporation XYZ Ltd.4321.4321.4321.4321 Not to be used in work sessions between 8AM and 6PMEST.

In some embodiments, the step of validating a request to initiate a worksession may include the step of determining whether or not a givenworker has surpassed a given work limit or compensation limit. Theoperator of the central controller may wish to limit the amount of workthat can be done within a certain period of time in order to comply withfederal or state labor laws or regulations. For example, a given law maydictate that workers in the relevant jurisdiction may not work for morethan 16 hours per day. In this case, the central computer would consulta worker's record in the worker database and determine if the worker hasperformed more than 16 hours of work within the last 24 hours, and ifso, the central computer may determine that the request to initiate thework session is invalid, and may terminate the process at this point. Itshould be noted that such a time limit may also be desirable in settingswhere the operator of the central controller wishes to preserve theindependent contractor status of workers by limiting the amount of hoursavailable to workers.

Alternatively or additionally, the operator of the central controllermay wish to limit the amount of compensation that can be earned by agiven worker in a certain period of time. In this case, the centralcomputer may be configured to access a database that stores rulesgoverning compensation limits, and may consult such a database and theworker database to determine if a given worker has surpassed acompensation limit. If so, the central computer may determine that therequest to initiate the work session is invalid, and may terminate theprocess at this point.

Step 3: Identify Task in Task Database.

Once a request to initiate a work session is validated, the centralcomputer identifies a task in a task database.

According to some embodiments, the central computer allocates a task toa worker by simply, in a serial fashion, selecting the next availabletask from the task database.

According to other embodiments, the central computer allocates tasks toa worker according to task performance conditions or prerequisites thatare stored in a task database. Thus, the central computer may seriallyreview records in a task database, searching for tasks for which theworker may be suitable.

For example, a rule may dictate that only workers from a certaingeographical area may be routed a particular task. Alternatively oradditionally, a rule may dictate that workers are not to receive tasksthat they have already performed (e.g., so that a worker does not getasked the same survey question twice).

Step 4: Transmit Task Data to Worker Including Task Content and ResponseOptions.

Once it is determined which task a worker will be routed, task data istransmitted to the worker device. In some embodiments, the data that maybe transmitted may include a textual description of the task and aplurality of response options (e.g., a question and several possibleanswers, such as “yes” or “no”, or several multiple choice answers).Further, the task data may include digital files comprising images orsounds.

An enumerated list of several different types of tasks that may beregistered by employers and performed workers is provided below (seesection below entitled “Application Contexts”).

Step 5: Receive Selected Response(s) from Worker.

After the worker receives the task data, the worker performs the taskand sends the central computer his or her response using the workerdevice. For example, after reading a question and reviewing the possibleanswer choices, a user may press a key on a worker device correspondingto a particular answer choice, and thereby transmit the selected answerchoice to the central computer.

Step 6: Evaluate Received Response(s) and Process Accordingly.

According to some embodiments, a fraud-detection subroutine may beexecuted at this point to ensure that the worker is actually making abona fide effort to contemplate tasks and transmit thoughtful responses.That is, the system may evaluate received responses against a databaseof stored rules to ensure that the worker is not merely providing arepetitive, thoughtless set of responses (e.g., answering every questionwith a “yes” response). Several methods for ensuring workerattentiveness are disclosed more fully with reference to U.S. Pat. No.6,093,026 entitled METHOD AND APPARATUS FOR ADMINISTERING A SURVEY,issued Jul. 25, 2000, the entirety of which is incorporated by referenceherein for all purposes.

Step 7: Adjust Worker Rating Based on Evaluation of ReceivedResponse(s).

In embodiments implementing fraud-detection methodology, a worker ratingmay be adjusted to reflect the worker's attentiveness and care inanswering questions. Systems and methods for updating a worker ratingbased on a user's degree of attentiveness are described with referenceto U.S. Pat. No. 6,093,026.

Step 8: Determine If a Session Termination Rule is Met. If not, Returnto Step 3. If So, Proceed to Step 9.

Next, the central computer determines if a stored session terminationrule is met. If a session termination rule is met, the process continuesto Step 9. If not, the process returns to Step 3, where the worker wouldcontinue participating in the work session.

In one embodiment, the central computer makes this determinationperiodically. In another embodiment, the central computer makes thisdetermination continuously or substantially continuously. Further,according to some embodiments, the central computer makes thisdetermination in response to a worker request. That is, in someembodiments, a worker may unilaterally end his or her participation in awork session by transmitting to the central server a signal indicatingthe desire to do so. The ability to terminate work sessions unilaterallyadds flexibility to work sessions, and allows for the performance ofmicro-tasks at traditionally unconventional times.

In some embodiments, session termination rules may constitute timelimits for work sessions to ensure that a worker does not work for morethan a certain amount of time within a certain period. Such rules may bedesirable in contexts that do not permit continuous work for a certainperiod without a break. For example, laws, regulations, and/or laborcontracts may dictate that a break must be given for every 8 hours ofwork. Or, as workers may be performing micro-tasks by operating workerdevices such as personal computers, concerns about eye-strain, carpeltunnel syndrome, or other types of fatigue may necessitate a sessiontermination rule that ends sessions after a predefined amount of time.Such rules would force a break in the continuity of a work session oncethe time limit has been reached. Further, session termination rules maydictate that sessions terminate once workers demonstrate a marked change(i.e., deterioration) in performance. For example, if a worker's averageresponse time (the time between the transmission of task data and thereceipt of a response) increases beyond a certain threshold during awork session, a session termination rule may be triggered. Or, if aworker's provided responses indicate a lack of attentiveness asdiscussed with reference to U.S. Pat. No. 6,093,026, a sessiontermination rule may be triggered.

Alternatively or additionally, session termination rules may constitutecompensation limits to ensure that a worker does not earn more than acertain amount of compensation within a certain period. For example,once a worker has earned enough to pay for a currently outstandingservice bill (e.g., a bill for cable or ISP services), a session mayterminate. Such a rule would be desirable where the operator of thecentral service does not wish to compensate workers in cash, but wouldrather limit compensation to an offsetting of an outstanding bill forservices.

Step 9: Calculate and Initiate Provision of Compensation to Worker Basedon Session Data.

Timing:

After a work session, the central computer system may determine theamount of compensation due to a worker and initiate the provision ofcompensation. In some embodiments, this step is initiated immediatelyfollowing the termination of a work session. In other embodiments, thecalculation and provision of compensation is done periodically (e.g.,weekly, monthly; at the end of a billing cycle). Further, in someembodiments, the calculation and provision of compensation could beperformed by the central computer upon the worker's request (e.g., whena worker logs on and clicks a button to request payment to his financialaccount on file with the central computer).

In some embodiments, payment may be withheld at this step if thetransaction costs of providing compensation are not justified by theamount of payment. That is, because the present invention facilitatesindividually compensable micro-tasks, it may be desirable to have adetermination of when is most cost-effective to remit payment. Forexample, because it likely costs at least $0.50 to process a credit to acredit card account, payment for micro-tasks may be withheld until thereis at least $0.60 of work performed by a given worker. An exemplarydatabase follows that stores rules that may be used in determining whencompensation due a worker sufficiently outweighs the transaction costsof a particular form of payment:

TABLE 7 Required compensation Form of payment Transaction cost due tojustify payment Credit card $.50 $.75 PayPal ® $.02 $.25 Check $1.50$1.55 Credit to ISP $.00 $.01 service account

Calculation of Payment Amount:

In some embodiments, the central computer calculates pay rates based onan advertised per-task rate. For example, if a worker performed 10 taskspriced at $0.10 each, the worker would have earned $1. Further, in someembodiments, workers may be compensated at different pay rates accordingto their rating status. For example, workers rated at “5” may receive arate of $0.02/question, while workers rated at “4” may receive a rate of$0.01/question. In such an embodiment, the central computer wouldmultiply the number of questions answered by the given worker's payrate.

Further, the step of calculating a payment amount may also include anaccounting for miscellaneous fees and charges. For example, the centralcomputer may reduce gross compensation due by various amounts including,for example: (1) state and federal tax withholding amounts, (2)insurance premiums or co-pays, and/or (3) past due or penalty amountsassociated with a service account (e.g., ISP or cellular phone serviceaccounts).

Further still, the step of calculating a payment amount may also includea credit for a “bonus” once a threshold amount of work has beenperformed (e.g., every year, every X hours of work performed, etc.).

It should be noted that, in some embodiments, the step of calculatingthe payment amount may take place before the optional step ofdetermining whether or not the transaction costs associated with theparticular form of payment are justified by the amount of payment due.

Payment Mechanisms:

In some embodiments, after calculating the amount of payment due, thecentral computer may initiate payment by instructing that an accountassociated with the worker be credited. More particularly, in someembodiments, the central computer may communicate with a remote serverowned by a financial institution, and may indicate an authorization tocharge an account associated with the owner of the central computer andcredit an account associated with the worker.

In other embodiments, the central computer would initiate payment bycrediting a service account associated with the worker. For example,where the central computer is operated by a provider of a service, suchas an Internet Service Provider, a cable TV service provider or acellular telephone service provider, a worker's service account may beoffset by any earned compensation. Thus, in such embodiments, workersmay offset their service bills by performing micro-tasks. However, suchservice providers may optionally limit the ability to earn compensationby providing that workers can only earn up to the amount owed to theservice provider. Should workers earn less than is currently owed to theservice provider, the central computer may output a bill for thedifference between the value of the services rendered and the amount ofcompensation due. Further, in some embodiments, workers may earn morecompensation than they currently owe for services, and the differencecan be credited to a future billing cycle.

Form of Payment:

Many different forms or mediums of payment are contemplated. Asdiscussed above, the central computer could credit to a financialaccount associated with the worker, including service accounts, creditaccounts, checking accounts, and the like. Alternatively, the centralcomputer may authorize the provision of other forms of compensation.

For example, product manufacturers may “employ” customers of theirproducts and compensate them with rebates. In other words, customers may“earn” a rebate or coupon by answering questions about apreviously-purchased product, providing feedback and the like. Asidefrom potentially collecting valuable consumer feedback and data, such aprogram may simply be a way to interact with a customer after apurchase, enhancing the customer's image of the product.

Alternatively, in another embodiment, workers may be compensated withdiscounts on merchandise they have not yet purchased. In addition toserving as a vehicle for providing interested customers with discounts,such an embodiment would be a useful way to identify price-sensitivecustomers.

In another alternate embodiment, workers may be allowed to view premiumcontent (e.g., sports games, concerts) for “free” if they performmicro-tasks. For example, in an embodiment where a worker initiates awork session by logging on to the central computer through his personalcomputer, the worker may earn passwords or codes that allow the workerto view a premium sports event on a restricted-access website.

Further, in another embodiment, workers may be allowed to earn eventtickets (e.g., tickets to concerts, sporting events) or travel vouchers(e.g., airline tickets).

Step 10: Aggregate and Transmit Responses to Employing Party.

Periodically or at the end of a project (i.e., once all the tasksassociated with a single, common project are completed), the centralsystem would transmit all received responses associated with the project(potentially from many workers) to the employing party.

In one embodiment, the central system merely transmits the raw responsedata. In another embodiment, the central system could process theresponses by preparing summaries, statistics, charts, graphs, or thelike based on the received responses. The operator of the centralcontroller may optionally charge a fee to the employing party for suchadditional processing.

Step 11: Charge Employer for Work Allocation Service.

The central computer may then charge the employer for the servicesperformed by the remote workers. For example, the central computer mayinitiate a billing routine or charge a predetermined financial accountassociated with the employer. The amount charged to the employer mayreflect (1) an amount of work performed by, or compensation paid to,workers and/or (2) a service fee.

Application Contexts

Many different types of tasks can be registered by employers andperformed by workers. Generally, low-skill tasks that can be performedin conjunction with the present invention constitute tasks whereby aworker must receive task data and select a response from a limited setof responses. For example, low-skill tasks used in the present inventionmay require workers to make “binary” (i.e., “yes” or “no”) decisions, orto select from an otherwise limited set of possible responses (e.g.,multiple choice answers). A list of various exemplary applications ofthe present invention follow.

1. Opinion Polls and Research.

a. Product packaging. In some embodiments, consumer productsmanufacturers, such as Proctor & Gamble, may employ workers to providetheir opinion as to product packaging (e.g., “Which packaging do youlike better, A or B?”).

b. Product rating/rescreening. In some embodiments, workers may be askedsimple binary (i.e., “yes or no”, “like or dislike”) questions abouttheir feelings toward certain products. For example, workers couldquickly rate greeting cards (“insincere?” . . . “offensive?” . . .“pushy?”).

c. Advertisement/commercial rating. In some embodiments, workers may beasked to rate which of two advertisements or commercials they likebetter.

d. Broadcast media rating/feedback. Similarly, in some embodiments,workers may be asked to rate TV pilot programs or provide input that maybe useful in making programming decisions (“like or dislike?”, “whichprogram would you watch if they were on at the same time, A or B?”).

e. Product configuration. In some embodiments, workers could ratecomparative options for how products are best configured. For example,large restaurant chains could employ workers to help identify which fooditems are best served together. Likewise, quick service restaurantscould employ workers to define what constitutes a valuable “value meal”,since consumer perceptions of value constantly change, especially inlight of competition.

f. Product placement. In some embodiments, workers may provide feedbackas to the proposed placement of items in retail stores or inadvertisements. E.g., a worker may be asked to select from a pluralityof images the setting in which the Coke bottle first became apparent tothem.

g. Public Relations: word, phrase or speech rating. Similarly, in someembodiments, corporations, politicians and other public figures may usethe present invention to test for negative/positive connotations andeffects of words, phrases, or speeches. E.g., a question may ask: “Whichphrase do you prefer: (A) “tax refund” or (2) “tax rebate?”

h. Simple, ad hoc surveys. In some embodiments, an employer can use theinventive system to administer quick surveys about any topic, providedthat the responses are limited to simple selection of relatively fewpossibilities. For example, a lifestyle-oriented magazine may utilizethe system to conduct a “hot or not?” survey. Or, news organizations mayuse the system to broaden the base of potential respondents onparticular survey questions.

i. Lie detection. In some embodiments workers could watch testimony,speeches or the like and decide whether or not someone is “lying” or“telling the truth”. For example, trial lawyers may wish to use theinventive system to see how a mock jury would react to a potentialwitness. Likewise, politicians may test the sentiment of the votingpopulous or a relevant constituency as to his or her stated version of aparticular newsworthy issue/scandal.

j. Appearance evaluation. In some embodiments, employers may post imagesfor review by workers. Thus, a lawyer may post two digital images of apotential witness (e.g., a criminal defendant) wearing differentoutfits, hairstyles, etc. Workers may then earn compensation byproviding their opinion as to which of the two makes the potentialwitness appear more credible.

2. Quality Control. In some embodiments, businesses may utilize theinventive system to ensure quality of their products.

a. Manufacturing. In some embodiments, workers can be employed tomonitor images of assembly-line instances for early problem detection,potentially saving manufacturers from downstream costs associated withremedying problems. For example, a monitoring device such as a digitalvideo camera, in conjunction with image-analysis software, may beemployed to scan the mundane operation of an assembly line and routeimages of nonconforming events (i.e., images of product line instancesthat do not conform to a reference image) to workers for evaluation.Alternatively, workers may simply watch feeds or images of the assemblyline themselves, reporting nonconforming/problem units as they aregenerated.

b. Package assembly. In some embodiments, workers may monitor imagescaptured by monitoring devices at warehouse operations to ensure thatpackages contain all invoiced items before they are shipped. Forexample, for each box of items to be shipped, an image could be captured(e.g., a top view of the box so as to make the boxes' contentsapparent). Both the image and a list of invoiced items could betransmitted to a worker. The list of items and the image may appear onthe worker's screen, and the worker could simply check off each item onthe list if it is included in the box.

c. Cleanliness. Employers may utilize the present invention to monitorthe cleanliness of physical settings such as businesses, parks, etc.Thus, in some embodiments, workers could monitor images taken frommonitoring devices at restaurants and kitchens to verify that kitchensare clean, that food is prepared in a healthy, clean manner, and thelike by watching the preparation process and reporting potentialproblems (e.g., by reporting “clean” or “unsanitary”).

3. Support for Artificial Intelligence Systems. Although artificialintelligence is increasingly used in daily life, a major problempreventing further utilization is its accuracy. Thus, in someembodiments, the present invention could be used to bolster the accuracyof such systems. In other words, workers could provide back-up supportand error-checking for most any artificial intelligence system. Forexample:

a. Assistance with speech and handwriting recognition. Currently, priorart speech-to-text conversion software is, at best, 95% accurate. Priorart handwriting recognition software is similarly inaccurate. Thus, insome embodiments of the present invention, executives, lawyers andothers using speech and handwriting recognition could utilize theinventive system to have documents checked for accuracy. Simply, workerscould just respond to different portions of text by informing the systemif there is an “error” or “no error”. In one such embodiment, workerscould compare text to supposedly-corresponding voice files and indicate“match” or “no match”. In an alternate embodiment, workers could justread portions of text and answer “correct” or “error”.

b. Detection of unusual account activity. Currently, financialinstitutions employ algorithms to determine whether or not accountactivity is unusual. However, detected activity is often notrepresentative of a security problem (e.g., when a cardholder is onvacation, an account may be inappropriately disabled merely due to alarge volume of purchases), and conversely, fraudulent activity oftengoes undetected. Thus, in some embodiments, transaction data is parsedand redacted to ensure anonymity (e.g., separated from account numbers),and sent to workers to verify normality/abnormality of transactionpatterns. Workers could respond by confirming whether or not atransaction pattern is “normal” or “abnormal”.

c. Automated customer service. The present invention may be used toconfirm the appropriateness/accuracy of automated customer serviceresponses. For example, where software is employed to scan customeremails and provide responses based on keywords therein, workers couldread the proposed responses before they are sent to customers, andthereby confirm whether or not proposed automated responses squarelyaddress the corresponding customer issues.

4. Retail Assistance. Generally, retailers may use the inventive systemto:

a. Spot undetected customer issues.

i. Customer dissatisfaction/satisfaction. In some embodiments, workerscan view images of retail customers to determine if they are satisfiedor dissatisfied with services. This information can be useful indetermining how to allocate customer service representatives, and whereto focus business resources generally. Such an embodiment is desirablebecause customer satisfaction often can be determined based on nonverbalsignals, which are best detected and interpreted by human monitors(e.g., facial expressions, body movements).

b. Spot undetected employee issues assist with HR functions.

i. Poor service. In some embodiments, workers can be employed to (1)view images taken from monitoring devices of retail employees as theyserve customers and (2) report bad service. Also, workers can beemployed to monitor when customers are not getting served. For example,a worker might simply click a button on a user device when a givencustomer “needs service”, such as when a customer appears confused, whenthey have been wandering the store, when they have been looking at astore directory or map, when they have been reading a product label fora long period of time, etc.

ii. Employee theft. In some embodiments, workers can be employed to viewimages, taken from monitoring devices, of retail clerks as they operatecash registers or otherwise handle employer assets. Workers could report“theft” or “OK” for each transaction, and could thereby perform a veryuseful function in detecting fraud or theft (e.g., “skimming” of thecash register).

iii. Employee rating. In some embodiments, consumers employed as workerscould simply watch images of employees and rate them as “good” or “bad”and/or provide simple feedback inputs as “fire,” “retrain,” or“promote”.

c. Spot undetected operational issues and assist routine operations.

i. Inventory monitoring. In some embodiments, workers may view images ofa retailer's shelves, and report “sufficient inventory” or “out ofstock”.

ii. Age/ID Verification. In some embodiments, workers may be transmittedcamera images taken from already-in-place security cameras atconvenience stores and simply determine whether each customer “looks” acertain age or not. Further, in such embodiments, the capture andtransmission of images may be limited to when certain products arepurchased (tobacco or alcohol), as indicated by products' UPC codes.Thus, a worker could simply provide “over the shoulder” validation for amerchant's decision to sell an individual cigarettes by selecting either“at least 18” or “under 18” after viewing the individual's image.Similarly, workers could view entrances (e.g., gates, doors) of certainage-restricted venues such as bars, events, etc.

5. Environmental Monitoring. In some embodiments, governmental ornot-for-profit groups may employ workers to monitor images to determineenvironmental and agricultural problems as they develop. For example,workers could compare images taken every two weeks to determine if agiven crop appears to be diseased, or if a given natural resource isdeteriorating.

6. Municipal/Local Law Enforcement. In some embodiments, municipalitiesand local law enforcement agencies may employ workers to view imagestaken from remote monitoring devices and review such images:

a. Public areas. Parks and other public areas (e.g., street corners) maybe monitored for suspicious activity. Simply, workers could simply viewimages and report “no problem” or “problem.”

b. Parking. Workers could act as remote “meter maids” by viewing imagesof parking spots and indicating whether there is a “violation” or “noviolation.”

c. Moving violations. Workers could view images of intersections andconfirm moving violations (e.g., if a car ran a red light).

7. The Internet. The following embodiments may be particularlyattractive to an Internet Service Provider who owns and operates thecentral computer.

a. Development of the World Wide Web, or certain “communities” therein.

i. Rating of Websites. In some embodiments, workers who are customers ofan ISP rate websites by clicking a button on a graphical user interface(e.g., a browser) indicative of a selected rating. Workers could ratesites quickly for general quality/appeal (e.g., one to five “stars”),for age-appropriateness (e.g., PG, R, X; or just “child safe” or “adultsonly”), etc. The ISP's central computer could, in turn, average receivedratings and publish them for customers to see (e.g., “This site'saverage user rating is 3.”)

ii. Categorizing web sites. In some embodiments, workers may be chargedwith the task of viewing a web site and selecting an appropriatecategory label (e.g., news, arts, special categories). Then, withincategories, workers could sub-categorize to add further specificity(e.g., Connecticut news, national news, etc.). Ultimately, the centralcomputer could use such “metadata” in performing Web searching andnavigation (i.e., in determining relevant search results).

iii. Linking of web sites. In some embodiments, the central computer(e.g., ISP server) can present workers with two websites (e.g., inseparate sub-windows), and workers can determine whether or not the twosites should be linked together by hyperlinks. Automatic selection ofthe two sites can be done randomly or quasi-intelligently (e.g.,keyword-based).

b. Content previewing. In some embodiments, subscribers to an ISPservice may pay a premium to employ a worker to make sure that minors(subscribers' sons and daughters) are not viewing inappropriate content,communicating with potentially threatening individuals, etc. In such anembodiment, workers could be routed Web pages, search results, ormessages before a minor receives such content. The worker could be askedwhether not such content is “appropriate” or “inappropriate” for aminor. If the content is appropriate, it could be transmitted to theminor. If the content is deemed inappropriate, the content would not betransmitted to the minor.

c. Human “Spam” filters. In some embodiments, as a premium service toISP subscribers, workers may be employed to view email messages thatinitially appear to be unsolicited (“Spam”) based on stored rules (e.g.,if thousands of similar emails are simultaneously sent to otherrecipients from a single address). Such messages that appear to be spamcould be deleted, marked, or sorted into a separate mailbox by workers.To ensure privacy, email addresses, names, addresses, phone numbers andother identifying information could be automatically redacted frommessages.

8. Social.

a. Dating/matching assistance. In some embodiments, workers may ratepotentially compatible dating candidates by viewing two pictures and/ortextual profiles and selecting “compatible” or “not compatible.”

9. Education.

a. Grading papers. In some embodiments, workers may log on and correctpapers or tests (e.g., spelling tests, multiple choice tests, etc.).

Additional Embodiments

In some embodiments, workers may perform micro-tasks from theirtelephones while “on hold”. For example, Tim Smith, a Verizon customer,calls a customer service number for a computer problem he is having.While waiting on hold, Tim presses #123, which triggers an option thatlets him earn money while he is on hold. While he is on hold, Timproceeds to answer questions, and thereby earn compensation. However,his work session is terminated when a customer service representativepicks up. Various embodiments for managing consumer-to-consumer customerservice while a first customer is waiting himself for customer serviceis discussed more fully with reference to Applicant's U.S. Pat. No.5,978,467, entitled METHOD AND APPARATUS FOR ENABLING INTERACTIONBETWEEN CALLERS WITH CALLS POSITIONED IN A QUEUE, issued Nov. 2, 1999,and U.S. Pat. No. 6,125,178, entitled METHOD AND APPARATUS FOR ENABLINGINTERACTION BETWEEN CALLERS WITH CALLS POSITIONED IN A QUEUE, issuedSep. 26, 2000, the entirety of which is incorporated by reference hereinfor all purposes.

In some embodiments, individual users may post tasks to be performed bypeers. That is, commercial or associational employers are notnecessarily the only types of employers that can benefit from thepresent invention. Thus, an individual may seek a short answer to aparticular question from an individual having similar demographiccharacteristics. For example, a high school student may wish to ask anyother high school age student what is a good movie to take a date to onthe upcoming weekend, and may indicate that she will pay $0.25 for theanswer. Thus, any high school student could respond with the answer(e.g., via a peer-to-peer communications system such as AOL's InstantMessenger) and thereby earn the offered compensation.

The following definitions are used herein below, unless otherwiseindicated.

Monitoring apparatus, monitoring device—A device capable of receiving,via an input device, a signal and outputting the signal to a centralcomputer and/or a user computer. In some embodiments, a monitoringapparatus may include (i) a processor, such as one based on the Intel®Pentium® series processor, and/or (ii) a data storage device/memory.Example monitoring devices include those that are capable of convertinganalog signals into digital data files. Such devices include, but arenot limited to: (a) digital video cameras, (b) digital video camerasequipped with motion detection and/or “short loop” tripping features,and (c) digital cameras.

Monitoring party, patroller, spotter, user, viewer—A person whoparticipates in the remote monitoring of sites, typically in exchangefor compensation. In some embodiments, such persons are members of thepublic that have no prior affiliation with monitored sites. Thus,according to some embodiments, images and/or other data that is sent tosuch viewers for review is selected randomly or substantially randomly,and/or may be edited (e.g., redacted) so that such viewers cannotdetermine the identity and whereabouts of particular sites. In thismanner, the inventive system provides a secure method and system forallowing members of the public to, in an ad hoc manner, earncompensation for monitoring the security of private property.

“No-man” zone—A security-sensitive area on a monitored site where nohumans or vehicles should be monitored (e.g., no humans should bepresent).

Site, remote site, property—Property, including but not limited to realproperty, which is to be monitored. Such property is monitored by atleast one monitoring apparatus.

Supervisor, trained professional, professional—An employee or agent ofthe central computer's owner (e.g., Net Patrol). In some embodiments,supervisors assist site owners in configuring and initializingmonitoring devices.

User computer, user device, device—A device capable of (i) receiving asignal from a central computer and/or a monitoring apparatus, (ii)outputting a signal to a user (i.e., a viewer), (iii) receiving aresponse from a user via an input device, and (iv) transmitting a signalindicative of the response to a central computer and/or a monitoringapparatus. In some embodiments, a user device may include (1) aprocessor, such as one based on the Intel® Pentium® series processor,and/or (2) a data storage device/memory. Example user devices includepersonal computers and cellular telephones.

A. System Configuration 1. Network Embodiments

The embodiments described below can be configured to work in a networkenvironment whereby a central computer, a user (e.g., viewer) computerand/or the monitoring device communicate with each other directly orindirectly, via a wired or wireless medium such as the Internet, LAN,WAN or Ethernet, Token Ring, or via any appropriate communications meansor combination of communications means. Communication between thedevices and computers, and among the devices, may be direct or indirect,such as over the Internet through a Website maintained by a computer ona remote server or over an on-line data network including commercialon-line service providers, bulletin board systems and the like. In yetother embodiments, the devices may communicate with one another and/or acomputer over RF, cable TV, satellite links and the like.

Some, but not all, possible communication networks that may comprise thenetwork or be otherwise part of the system include: a local area network(LAN), a wide area network (WAN), the Internet, a telephone line, acable line, a radio channel, an optical communications line, and asatellite communications link. Possible communications protocols thatmay be part of the system include: Ethernet (or IEEE 802.3), SAP, ATP,Bluetooth™, and TCP/IP. Further, networking of devices and computers mayinclude use of 802.11b and related wireless protocols and/or use of cellnetworks (GSM and other emerging standards).

Those skilled in the art will understand that computers and devices incommunication with each other need not be continually transmitting toeach other. On the contrary, such computers and devices need onlytransmit to each other as necessary, and may actually refrain fromexchanging data most of the time. For example, a device in communicationwith another device via the Internet may not transmit data to the otherdevice for weeks at a time.

In an embodiment, a central computer may not be necessary and/orpreferred. For example, the present invention may, in one or moreembodiments, be practiced on a monitoring device in communication onlywith one or more user computers. In such an embodiment, any functionsdescribed as performed by the central computer or data described asstored on the central computer may instead be performed by or stored onone or more monitoring devices or user computers.

2. Network Security

Communication among computers and devices may be encrypted to ensureprivacy and prevent fraud in any of a variety of ways well known in theart. Appropriate cryptographic protocols for bolstering system securityare described in Schneier, APPLIED CRYPTOGRAPHY, PROTOCOLS, ALGORITHMS,AND SOURCE CODE IN C, John Wiley & Sons, Inc., 2d ed., 1996.

3. Data Storage Devices/Memory

For each computer and/or device (i.e., the central computer, the usercomputer, and/or the monitoring apparatus), a processor may be incommunication with a memory and a communications port (e.g., forcommunicating with one or more other computers or devices). The memorymay comprise an appropriate combination of magnetic, optical and/orsemiconductor memory, and may include, for example, Random Access Memory(RAM), Read-Only Memory (ROM), a compact disc and/or a hard disk. Thememory may comprise or include any type of computer-readable medium. Theprocessor and the memory may each be, for example: (i) located entirelywithin a single computer or other device; or (ii) connected to eachother by a remote communication medium, such as a serial port cable,telephone line or radio frequency transceiver.

In one, several or all computers or devices, a memory may store aprogram for controlling a processor. The processor performs instructionsof the program, and thereby operates in accordance with the presentinvention, and particularly in accordance with the methods described indetail herein. The program may be stored in a compressed, uncompiledand/or encrypted format. The program furthermore includes programelements that may be necessary, such as an operating system, a databasemanagement system and “device drivers” for allowing the processor tointerface with computer peripheral devices. Appropriate program elementsare known to those skilled in the art, and need not be described indetail herein.

The term “computer-readable medium” as used herein refers to any mediumthat participates in providing instructions to a processor forexecution. Such a medium may take many forms, including but not limitedto, non-volatile media, volatile media, and transmission media.Non-volatile media include, for example, optical or magnetic disks, suchas memory. Volatile media include dynamic random access memory (DRAM),which typically constitutes the main memory. Transmission media includecoaxial cables, copper wire and fiber optics, including the wires thatcomprise a system bus coupled to the processor. Transmission media maycarry acoustic or light waves, such as those generated during radiofrequency (RF) and infrared (IR) data communications. Common forms ofcomputer-readable media include, for example, a floppy disk, a flexibledisk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM,DVD, any other optical medium, punch cards, paper tape, any otherphysical medium with patterns of holes, a RAM, a PROM, an EPROM, aFLASH-EEPROM, any other memory chip or cartridge, a carrier wave asdescribed hereinafter, or any other medium from which a computer canread.

Various forms of computer readable media may be involved in carrying oneor more sequences of one or more instructions to a processor forexecution. For example, the instructions may initially be borne on amagnetic disk of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem local to a particular computer ordevice can receive the data on the telephone line and use an infraredtransmitter to convert the data to an infrared signal. An infrareddetector can receive the data carried in the infrared signal and placethe data on a system bus for the processor. The system bus carries thedata to main memory, from which the processor retrieves and executes theinstructions. The instructions received by main memory may optionally bestored in memory either before or after execution by the processor. Inaddition, instructions may be received via a communication port aselectrical, electromagnetic or optical signals, which are exemplaryforms of carrier waves that carry data streams representing varioustypes of information. Thus, a computer or device may obtain instructionsin the form of a carrier wave.

According to an embodiment of the present invention, the instructions ofthe program may be read into a main memory from anothercomputer-readable medium, such from a ROM. The execution of sequences ofthe instructions in a program causes the processor perform the processsteps described herein. In alternate embodiments, hard-wired circuitrymay be used in place of, or in combination with, software instructionsfor implementation of the processes of the present invention. Thus,embodiments of the present invention are not limited to any specificcombination of hardware and software.

The memory also may store a plurality of databases. Some or all of thedata stored in each database may be described herein. Any describedentries of the databases represent exemplary information only; thoseskilled in the art will understand that the number and content of theentries can be different from those illustrated herein. Further, despiteany description of the databases as tabular, relational databases, anobject-based model could be used to store and manipulate the data typesof the present invention and likewise, object methods or behaviors canbe used to implement the processes of the present invention.

B. Processes

1. Site Registration

Site owners and/or operators may initially register with the system inorder have their sites monitored by viewers. It is contemplated thatsite owners will purchase camera and/or other monitoring deviceequipment from the operator of the central computer (e.g., Net Patrol),although it is possible that site owners may register other existingcameras and/or other monitoring devices with the central computer.

In embodiments where monitoring devices comprise cameras such as videocameras, cameras and supporting peripheral hardware may have embeddedcomputer devices and may support various standard internetworking andoperating system protocols (e.g., embedded Linux chips that supportHTTP, SSL, FTP, CGI, Java, etc.). For example, cameras available fromAxis® Communications, Inc. may be employed, including model 2420 seriesnetwork cameras with infrared (IR) lenses, model 250-S MPEG-2 networkvideo servers, and model 2191 audio modules. Infrared lenses may bedesirable for low-light (i.e., nighttime) image capture.

In some embodiments, cameras may also be equipped with PTZ(Pan/Tilt/Zoom) mechanisms to facilitate remote adjustment of field ofview, focus, and the like. Further, in some embodiments, cameras may beconfigured to support on-demand requests for static and motion imagessubmitted by remote parties, such as site owners, viewers andsupervisors.

It may also be desirable that cameras are weather-insulated as they maybe located outdoors and subjected to extreme temperatures, wind andprecipitation. Further, each camera preferably may have two independentcircuits, so that if one fails the other can serve as a back-up.Similarly, cameras may employ dual, redundant power sources, such thatif one power source is unavailable, a back-up power source (e.g.,batteries, generators, etc.) may be used. Indeed, in some embodiments,completely autonomous, free-standing image capture hardware may beemployed. Such hardware may use solar panels and high capacity energycells for power, and may use cellular/satellite communications fornetworking.

In some embodiments, the inventive system will likely tie into/ride onexisting alarm systems. In such embodiments, the camera hardware couldbe initially installed as part of the alarm system or could besubsequently added on as a retrofit. In either case, a user installationprocess may entail remote communication with a Net Patrol representative(e.g., a trained professional). Alternatively, the cameras may beinstalled professionally.

After the site owners obtain suitable monitoring devices, site ownersmay register with the system by interacting with the central computer inaccordance with the following process steps.

b. Initial Customer Registration

In some embodiments, after cameras are installed, a registration processmay follow. For example, cameras may be addressed (IP) and registered indatabase. Also, the central system may record the type of room (e.g.,bedroom), the security priority assigned to the room (e.g., bedrooms aremore important than kitchen), and the times the camera is to be active(e.g., only between 9 AM and 5 PM). Also, GPS coordinates may beregistered so that the system can later determine if the camera has beenmoved or tampered with (e.g., the system may make periodic queries tomonitoring devices, and/or any change in position may trigger a checkupprocess). Further, the system may require registration of the site'spostal/street address, a geographically relevant emergency dispatchnumber (i.e., an emergency dispatch phone number corresponding to thesite's local area), and the phone number of a relative of the siteowner.

c. Testing

After cameras are installed, a test sequence may ensue to verifyvisibility and identify coverage gaps. For example, a site owner may beasked to walk through his or her house and a supervisor could verifycoverage/identify gaps. The test may be recorded so that there is arecord of the area that the supervisor and/or his or her employer (e.g.,Net Patrol) is responsible for.

Also, there may be periodic, remote tests of the cameras to ensure thatthey are working properly. This could be done at non-invasive times,such as when a conventional alarm system is set and occupants have leftthe house. This would minimize any perceived privacy intrusion.

Further, testing may entail establishing a threshold for motiondetection (e.g., for use in embodiments where image transmission is tobe triggered upon motion detection). In this manner, the system can beprogrammed to ignore non-threatening motion, such as a small pet'smovements at the site owner's premises.

2. “Patrol” Sessions/Service Administration

a. Binary Determinations

In some embodiments, patrollers may log onto a central computer tomonitor registered sites. In one embodiment, users are asked to makesimple binary determinations about images received from monitoredlocations (e.g., “yes” or “no” answers). For example, in someembodiments, users may be asked to make a simple determination ofwhether or not they see a person in an image. That is, in privateproperty contexts, there may be “no-man zones” at certain times (e.g.,night) and in certain places (e.g., pools). Site owners may register,with the central computer, which areas (e.g., by camera location) are“no man” zones at particular times. For example, where a site owner has3 cameras installed at a site, the site owner may indicate that “CameraNumber 1”, which happens to focus on the site owner's driveway, is a “noman zone” between the hours of 10:30 PM and 5 AM.

Similarly, certain “buffer times” may be registered with the centralcomputer, indicating the times during which activity at a site is to bedisregarded. For example, the central computer may be programmed todisregard all images received when the site owner is enabling ordisabling a conventional security/alarm system (e.g., within one minutefrom when a breach is first detected, thereby allowing the site ownerone minute to provide the correct, disabling password or code).

Also, other helpful binary determinations may be made by viewers suchas: (1) Are doors/windows open or closed? (2) Are the lights on or off?(3) Is the electricity on or off? (4) Does the address have phoneservice?

Indeed, the system can be configured to make binary determinations ofseemingly non-binary questions simply by asking a binary question andverifying a first set of responses against subsequent verification sets(that may be more specific). For example, a first set of questions aboutan image taken at a private residence may ask: “Is this home safe or notsafe?” Respondents may have a “hunch” that there is suspicious activityafoot at the site, and may respond by selecting the “not safe” option.Should a sufficient number of initial respondents similarly indicate“not safe”, the system may (1) submit the same image/video clip to moreusers for verification, and/or (2) ask a more specific question (“Doesit appear that the home is on fire? Yes or no?” Or, “Does it appear thatan intruder is present in the home? Yes or no?”).

b. Session Timing

In some embodiments, patrollers may be able to log on and log off of thecentral controller at any time (e.g., may start and stop monitoringsessions unilaterally at any time). However, cameras at a particularsite may be only operative at certain times. For example, the camerasystem may turn on whenever the user turns on his or her alarm (or 30seconds thereafter). Additionally or alternatively, the camera systemmay be triggered if a certain event occurs, such as if (1) security“hacks” or breaches are detected in related security systems (e.g., ifthe company's computer system is being hacked, the Net Patrol camerasystem may turn on), or (2) a noise/volume threshold is broken (e.g., bya scream or crash) as detected by a microphone.

3. Management of Patrollers

a. Qualifying Patrollers

According to one embodiment, a process for qualifying patrollers (e.g.,training and testing) is facilitated by the central computer. Trainingmay comprise the communication of instructional information along withpractice routines. Testing patrollers may entail testing the particularviewer(s) capabilities (e.g., attention level, vision, etc.) so that (1)those below a given threshold of attentiveness/responsiveness are bannedfrom the system or retrained, and/or (2) content can be subsequentlyprovided/transmitted in accordance with each patroller's individuallevel of attentiveness/responsiveness (e.g., higher contrast, higherresolution, more time on each image, etc.).

Further, qualifying patrollers may entail remote diagnostics of thepatroller's computer (e.g., processor speed, connection speed, videocard capability, screen resolution) so that the system can determine howto send images, which images to send, etc. (Alternatively, software tobe downloaded from the central computer could have different settingsfor different hardware configurations.)

b. Session Initiation

In one embodiment, patrollers may simply log on to the central computerfor each monitoring session by providing a username and password. Moresophisticated embodiments may require coordination/attentiveness checks(e.g., trace a pattern with mouse cursor, view sequences of testimages).

c. Motivators and Compensation

i. Payment

In the simplest version, patrollers would be compensated in cash.Similarly, patrollers may be able to earn their way out of debt (creditcards, mortgages; banks could have borrowers monitor other mortgagedproperties in the bank's portfolio).

ii. Game Themes, Prizes

Monitoring sessions could take the form of several games that canmotivate and encourage patrollers to participate and pay attention. Suchgames may be comprised of the following characteristics and features:

Patrollers may be rated and rewarded based on performance (e.g.,reporting of false positives).

Patrollers may be encouraged to pay attention by participating in a gamethat asks them to spot objects embedded in or superimposed on an image(e.g., spot and collect game pieces).

Homeowners and business owners (e.g., customers of Net Patrol) couldpost bounties as rewards for reporting certain events, behavior, etc.

In a “team play” embodiment, ad hoc groups may see the same image, andchannel for discussion may open up (e.g., AOL Instant Messenger) somembers can confer as to image content.

In a slot machine themed embodiment, the transmitted images can form thereels of slot machine. If the images are different, the patroller maywin a prize. Such an embodiment would encourage patrollers to pay closeattention to the content of the transmitted images.

d. Routing of Video Feeds and Images; Security Features

Video feeds and images may be routed to particular patrollers (1)randomly, (2) based on simple geographical constraints (e.g., differentzip codes), (3) based on patroller history (e.g., never the samelocation twice), (4) based on customer (i.e., site owner) preferences(e.g., patrollers who are family members first; levels of expertise).

A related embodiment entails the editing/redacting of images and feedsto ensure anonymity for security and privacy purposes. For example,portions of an image may be blurred or otherwise concealed to protectsensitive aspects of the image.

e. Security Breach Procedures

Should a patroller detect a potential problem (e.g., a potentialintruder), a process for managing and escalating the response would betriggered. For example, if the patroller detects a potential intruder, atwo-way audio/video communication channel may open up between thepatroller's user device and the monitoring device (or another devicelocated at the monitored site) so that the patroller can initiate a“stand down” procedure, asking challenge/response questions (e.g.,“what's the password?”) to determine whether clearance should be grantedor whether emergency sequences should be initiated. Emergency sequencescan include simply allowing an alarm to be triggered or the directdispatch of emergency responders.

Alternatively, such a “stand down” procedure can be facilitated/managedby the central computer system. For example, the central computer maytransmit, to an output device at the site, a prompt for a password. Thecentral computer may then receive a voice file from a person at the site(e.g., via a microphone), and interpret the content of the voice fileusing voice recognition software. The content of the voice file may thenbe compared to a stored password. Should the provided password beincorrect, or should no password be provided within a default timeperiod, the central computer may initiate one or more emergencysequences, such as those described herein. It should be noted that suchan automated stand down procedure may also be implemented in conjunctionwith the systems and methods disclosed above

If a potential emergency is verified by a viewer and/or by the centralcomputer pursuant to the above-described processes, images may be sentto a device of the site owner (e.g., a site owner's cellular phone,personal digital assistant, personal computer, television, etc.) forconfirmation before a first responder is dispatched. In someembodiments, the site owner may confirm any potential problem byproviding a response. For example, a site owner may receive an image onhis cellular phone, and may be prompted to “press 1” if the person inthe picture is not authorized to be at the premises. In this manner, byhaving the site owner involved in the monitoring session, false alarmsmay be reduced or virtually eliminated.

If a potential emergency is verified by a viewer and/or by the centralcomputer and/or by the site owner, the images/feed may be made availableto first responders (e.g., police, firemen, first aid workers, etc.) forassistance in dealing with the emergency. For example, responders mayuse the images/feed to determine where perpetrators are hiding in thehouse/business, where a fire is burning, whether anyone is left on afloor or in the building, etc. Similarly, as discussed more fully below,an audio communication channel may be opened to the occupants on thepremises so that a customized, threat-specific evacuation plan can becommunicated (e.g., “go out the back door”) via a monitoring device orother device located at the site. Ultimately, the system may be used toprove the response activities of local responders (timing, proceduresused, etc.).

f. Pricing

The site owner may pay for different degrees of service based on manymetrics and service levels, including but not limited to, (1) artificialintelligence (AI) based prescreening sensitivity, (2) the number ofcameras, (3) the frequency of image transmission, (4) the number ofimages that are transmitted, (5) the number of images that aretransmitted until a site owner responds, (6) the number of patrollers,and (7) session times (e.g., a “vacation only” service). IV.

Aspects and Embodiments Specific to Consumer/Home Systems A. HomeSecurity—Protection Against External Attacks

1. Integration with Existing Alarm Systems

A camera system for use with the present invention may supplement aconventional alarm system by covering those aspects of a site (e.g., ahouse) that the conventional alarm is not configured to monitor (i.e.,areas other than perimeters).

Alternatively, the system may reinforce a conventional alarm system.Because conventional security systems suffer from chronic false alarms,the system may solve this problem by providing an intermediateconfirmation step before alarm signals are transmitted to respondingauthorities. That is, when a home alarm is tripped, the camera systemmay turn on so that one or more viewers can determine whether the alarmwas triggered in response to a bona fide emergency.

2. “Real Time” Evacuation Plans

In a home setting, there are many threats to guard against, includingfire and burglary. Because patrollers would have a detached, “birds eye”view of the entire premises, operators of the system (e.g., Net Patrol)may offer to provide “real-time” evacuation plans based on the threat.In other words, patrollers may come up with an “on the fly” evacuationplan to steer residents away from the dangerous areas (e.g., rooms onfire, rooms where the perpetrator is hiding) and send audio instructions(e.g., to speakers at the premises) on how to safely evacuate.

3. Privacy Issues

Home security system customers may also be particularly concerned aboutprivacy issues. Accordingly, there may be an initial, randomizedpre-screening by trained professionals for sensitive images before theyare sent to ad hoc patrollers for viewing. Further, to deterunauthorized distribution of images, transmitted images may bewatermarked or otherwise identified.

Likewise, home security system customers may be concerned about theability of patrollers to use received images to plan a crime.Accordingly, as mentioned above, images may be transmitted randomly,based on geographical constraints, on a one-time-only basis, or thelike.

B. Home Monitoring—Lifestyle Family-Oriented Systems

1. Elderly Person Monitoring Product

A related product for monitoring elderly people may aim to make surethat subjects are properly tended to (e.g., if they fall) and to makesure that subjects do not put themselves in dangerous situations (e.g.,getting in the car, drinking, taking the wrong medication). However,such a product may be particularly susceptible to privacy concerns.Accordingly, images of elderly people may be digitally modified so as toconceal identity (e.g., stock photo substitution for person's body orface; replacement of person's image with outline shape or avatar).Additionally or alternatively, elderly subjects may be assured that only“qualified” professionals (i.e., nurses) are watching the camera feeds.

2. Child Monitoring Product

Similarly, a product for monitoring children would ideally serve thesame purposes (safety). For example, because swimming pools can be “noman” (i.e., no child) zones at certain times (e.g., when parents are atwork), the Net Patrol system may be employed to monitor the pool.Similarly, the Net Patrol system may be used to monitor and preventconsumption of alcohol (e.g., cameras located by a liquor cabinet) andchemicals (e.g., cameras located under a kitchen cabinet). Indeed, theNet Patrol system could work to make sure that teenagers or babysittersare not hosting parties at the residence (e.g., volume-basedprescreening; quasi-binary decisions as discussed above).

Indeed, the Net Patrol system may be applied to quality-ensure the workof babysitters and day-care facilities. For example, patrollers may beasked to monitor “2 man zones” to confirm that at least 2 people are inthe picture (i.e., that the babysitter is in the same room as thechild). Likewise, patrollers may simply be asked to report whetherinappropriate behavior is taking place (e.g., physical danger to thechild).

Aspects and Embodiments Specific to Business Systems

There may be specific service improvements uniquely designed forbusinesses. For example, patrollers may be employed to watch for andreport theft, thereby reducing shrinkage at retail establishments.Cameras can be set up to enable viewing of self-service check-out isles,the area underneath shopping carts, and employee backrooms. Indeed, theretailer may post a bounty to catch shoplifters.

Additional Embodiments

A. Monitoring sessions (or at least short-loop portions thereof) may berecorded and stored for later reference (e.g., when an insurance claimis adjudicated, to prove emergency responder activity as discussedabove, etc.).

B. If the customer's monitoring devices are not engaged, the operator ofthe system (e.g., Net Patrol) could not reasonably be held accountablebecause the system would not be activated. Accordingly, the centralcomputer may email encrypted (e.g., time stamped) codes to customers toprove when its on/off duty.

C. The system may be utilized in quasi-private property contexts (i.e.,property where there are highly personal interests, but not necessarilyreal property ownership):

a. “Neighborhood Watch” embodiment: Cameras may be placed on neighbors'cars, on telephone poles, etc., and artificial-intelligence (AI)prescreening may be utilized to scan for apparently odd behavior, inwhich case feeds or images would be provided to patrollers for viewing.For example, AI could detect fire (e.g., via thermal-imaging) and wherecars shouldn't be stopped/“no standing zones” (e.g., via motiondetectors).

b. School embodiment: Parents of both public and private schoolsstudents may pay patrollers (e.g., indirectly through Net Patrol) tomonitor areas where children frequent with minimal adult supervision orareas where children are likely to be put in dangerous situations. Forexample, cameras may be put on playgrounds, in school busses, at busstops, and the like to monitor for unscrupulous individuals (e.g.,kidnappers, drug dealers, etc.) or dangerous behavior (e.g.,altercations, drug use, etc.).

In one embodiment, after an initial set of Net Patrollers determinesthat a potential security breach is underway (i.e., that there IS aperson in the picture), a series of images from the site are transmittedto one or more Patrollers who view the plurality of images and votefor/select the image that is most representative/useful of the potentialsecurity breach. For example, from a plurality of images containing asuspicious person, a Net Patroller may select the images that best showthe person's face. The selected images are then sent to property owners,first responders, or the like, who may determine whether or not theperson is authorized to enter the premises or not. Thus, in thisembodiment, a whole series of images relevant to an “incident” arereviewed by Net Patrollers, and some of which may be forwarded toproperty owners.

In some embodiments, images from several cameras at the monitored siteare transmitted to the property owner once a potential security breachis detected. For example, cameras aimed at “approach zones” of a house(e.g., driveway, doorways) may provide images taken just before thepotential security breach (i.e., such images may be temporarily storedvia “short loop” in case such incident arises). In this way, propertyowners are provided with several incident-relevant images forevaluation.

What is claimed is:
 1. A method comprising, by one or more computing systems: selecting one or more users registered with a content distribution network to monitor images, wherein each registered user is associated with a user profile including unique identification data and an image review accuracy score; receiving, at one or more servers associated with the content distribution network, one or more images to be reviewed, wherein the one or more images are associated with an escalation level; sending, using one or more processors associated with the one or more servers, the one or more images to at least one registered user; receiving, using the one or more processors, instructions from the at least one registered user; and executing, using the one or more processors, an action based on the received instructions.
 2. The method of claim 1, wherein the received instructions comprise confirmation of a security breach.
 3. The method of claim 1, wherein the received instructions comprise instructions to stand down image escalation.
 4. The method of claim 1, wherein the received instructions comprise instructions to close out one or more site alerts associated with the one or more images.
 5. The method of claim 1, wherein the one or more images comprise one or more buffers of images captured at one or more monitoring devices.
 6. The method of claim 1, wherein the sending the one or more images to at least one registered user comprises: providing the one or more images in a supervisor interface.
 7. The method of claim 6, wherein the received instructions comprise instructions to access real-time full motion images from one or more monitoring devices, present all captured images related to a site alert, present one or more images in full resolution, present one or more images in thumbnail format, adjust motion sensor zones for monitoring devices, adjust sensitivity for monitoring devices, adjust pan/tilt/zoom settings for one or more monitoring devices, enable two-way audio communication using one or more monitoring devices, or dispatch alert data and images.
 8. The method of claim 6, wherein the supervisor interface is accessible by a SSL connection from a browser.
 9. The method of claim 6, wherein the supervisor interface requires secure authentication of the at least one registered user using a hardware-based key generation device.
 10. The method of claim 6, wherein the supervisor interface provides access using role-based permissions.
 11. One or more computer-readable non-transitory storage media embodying software that is operable when executed to: select one or more users registered with a content distribution network to monitor images, wherein each registered user is associated with a user profile including unique identification data and an image review accuracy score; receive, at one or more servers associated with the content distribution network, one or more images to be reviewed, wherein the one or more images are associated with an escalation level; send, using one or more processors associated with the one or more servers, the one or more images to at least one registered user; receive, using the one or more processors, instructions from the at least one registered user; and execute, using the one or more processors, an action based on the received instructions.
 12. The media of claim 11, wherein the received instructions comprise confirmation of a security breach.
 13. The media of claim 11, wherein the received instructions comprise instructions to stand down image escalation.
 14. The media of claim 11, wherein the received instructions comprise instructions to close out one or more site alerts associated with the one or more images.
 15. The media of claim 11, wherein the one or more images comprise one or more buffers of images captured at one or more monitoring devices.
 16. A system for a content distribution network, comprising: one or more processors associated with one or more servers; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to: select one or more users registered with a content distribution network to monitor images, wherein each registered user is associated with a user profile including unique identification data and an image review accuracy score; receive one or more images to be reviewed, wherein the one or more images are associated with an escalation level; send the one or more images to at least one registered user; receive instructions from the at least one registered user; and execute an action based on the received instructions.
 17. The system of claim 1, wherein the processors being operable when executing the instructions to send the one or more images to at least one registered user comprises the processors being further operable to: provide the one or more images in a supervisor interface.
 18. The system of claim 17, wherein the received instructions comprise instructions to access real-time full motion images from one or more monitoring devices, present all captured images related to a site alert, present one or more images in full resolution, present one or more images in thumbnail format, adjust motion sensor zones for monitoring devices, adjust sensitivity for monitoring devices, adjust pan/tilt/zoom settings for one or more monitoring devices, enable two-way audio communication using one or more monitoring devices, or dispatch alert data and images.
 19. The system of claim 17, wherein the supervisor interface is accessible by a SSL connection from a browser.
 20. The system of claim 17, wherein the supervisor interface requires secure authentication of the at least one registered user using a hardware-based key generation device. 