Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUSRE45401 E1
Publication typeGrant
Application numberUS 13/475,029
Publication date3 Mar 2015
Filing date18 May 2012
Priority date28 Dec 1998
Also published asUS6720990, US7092006, US7593033, US7602414, US7602416, US7605840, US7719565, US7817182, US20040109061, US20060225110, US20060225111, US20060225112, US20060225113, US20060225114, US20060236357, WO2000039724A2, WO2000039724A3
Publication number13475029, 475029, US RE45401 E1, US RE45401E1, US-E1-RE45401, USRE45401 E1, USRE45401E1
InventorsJay S. Walker, Daniel E. Tedesco, Dean P. Alderucci, Magdalena M. Fincham
Original AssigneeInventor Holdings, Llc
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Internet surveillance system and method
US RE45401 E1
Abstract
A system and method are disclosed for a central server to manage remote monitoring tasks performed by users of a data network. An exemplary method comprises: receiving a request from a user of a user device to monitor a remote location; determining a remote location to be monitored; enabling communication between a sensor at the remote location and the user device; and crediting value to the user in accordance with an amount of time the user device has been in communication with the remote sensor for remote monitoring purposes. An alternate exemplary method includes measuring user attentiveness while the user device is in communication with the remote sensor. Thus, the disclosed system and method provide a way for users of a data network such as the Internet to log on at any time and perform remote monitoring tasks for value. Idle time can now be turned into value using the disclosed system and method. Moreover, little or no skill is required of the user to earn value using the disclosed system and method; the user need only be attentive while performing a remote monitoring task. Location owners also benefit from the convenience by which they can now have their properties monitored and by the ability of the disclosed system and method to ensure the attentiveness of the user performing the remote monitoring task.
Images(11)
Previous page
Next page
Claims(9)
We claim
1. A method, comprising:
receiving, by a central controller server, an indication of a user request for the user to monitor any of a plurality of remote locations in exchange for payment;
selectingdetermining, by the central controllerserver and on behalf of the user, a remote monitoring task associated with a remote location from the plurality of remote locations, the remote monitoring task being selected from a plurality of remote monitoring tasks;
providing, by the central controller server and to the user, an indication of (i) the remote monitoring task, and (ii) emergency reporting information; and
facilitating, via the central controller server, communication between the user and a sensor at the remote location; and
providing, by the central controller, payment to the user, wherein the payment comprises a value calculated by multiplying a pay rate by an amount of monitoring time.
2. The method of claim 1, wherein the pay rate is based at least in part on the time of day during which the monitoring is conducted.
3. The method of claim 1, wherein the pay rate based at least in part on a number of remote locations simultaneous monitored by the user.
4. The method of claim 1, wherein the pay rate is based at least in part on a historical criminal activity level associated with the remote location.
5. The method of claim 1, wherein the pay rate is based at least in part on a total number of users that simultaneously monitor the remote location.
6. The method of claim 1, wherein the payment comprises an amount of free Internet access.
7. The method of claim 1, wherein the receiving, determining, providing of the indication(s), and facilitating, and the providing of the payment are conducted by an Internet Service Provider.
8. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed by a processor to perform a method, the method comprising:
receivereceiving an indication of a user request to monitor any of a plurality of remote locations in exchange for payment;
selectdetermining a remote monitoring task associated with a remote location from the plurality of remote locations, the remote monitoring task being selected from a plurality of remote monitoring tasks;
provideproviding, to the user, an indication of (i) the remote monitoring task, and (ii) emergency reporting information; and
facilitatefacilitating communication between the user and a sensor at the remote location; and
provide payment to the user, wherein the payment comprises a value calculated by multiplying a pay rate by an amount of monitoring time.
9. An apparatus comprising:
a processor; and
a storage device that stores a program for directing the processor, the processor being operative with the program to:
receive an indication of a user request to monitor any of a plurality of remote locations in exchange for payment;
select a remote monitoring task associated with a remote location from the plurality of remote locations, the remote monitoring task being selected from a plurality of remote monitoring tasks;
provide, to the user, an indication of (i) the remote monitoring task, and (ii) emergency reporting information; and
facilitate communication between the user and a sensor at the remote location; and
provide payment to the user, wherein the payment comprises a value calculated by multiplying a pay rate by an amount of monitoring time.
Description

This Application is a continuation of, commonly-owned U.S. patent application Ser. No. 10/718,327 filed Nov. 20, 2003 now U.S. Pat. No. 7,092,006; which is a continuation of U.S. application Ser. No. 09/221,250, entitled INTERNET SURVEILLANCE SYSTEM AND METHOD, which was filed Dec. 28, 1998 now U.S. Pat. No. 6,720,990. The entirety of this application is incorporated by reference herein for all purposes.

TECHNICAL FIELD

This invention relates generally to a commerce-based system and method, and in particular, to a system and method for a central server to manage remote monitoring tasks performed by users of a data network such as the Internet.

BACKGROUND

Video surveillance has grown to play an important part in security. Video cameras have been employed in numerous locations to monitor and deter certain undesirable behavior.

Video cameras are currently used to monitor locations in the absence of humans. ATMs, banks, and convenience stores are typically equipped with video cameras that constantly record video signals for later viewing. Thus, in the event of an emergency such as a robbery, the recorded signal can be reviewed at a later time to help identify the perpetrators of the crime. However, these systems are primarily useful for identifying criminals after the crime has been committed. The only way these systems can prevent crime is by the deterrence that results from the presence of the camera. That is, an unscrupulous party would be more hesitant to commit a crime if they saw a video camera.

Video cameras have also been employed to assist humans in monitoring locations. Retail stores have used video cameras so that store managers and security guards can view customer behavior in an effort to curtail shop-lifting. Furthermore, security guards in offices and apartment buildings use video cameras to view several locations simultaneously. For example, a security guard may view hallways, parking lots and elevators while sitting at a front desk.

While video cameras that automatically record activity for later review are not particularly useful in preventing crime, video cameras that assist humans in the monitoring process suffer their own shortcomings. For example, proprietary systems such as closed-circuit television systems can only be used by employed security guards. And because only a limited number of security guards can feasibly view the video feeds from these closed-circuit television systems, there are more errors in the detection of emergencies. In order to effectively monitor all areas of an establishment at all times, the owner would need to employ a substantial number of security guards, which would be prohibitively costly. Moreover, prior art video security systems do not enable managers and employers to test for a security guard's attentiveness. Thus, a security guard could be sleeping while supposedly “watching” the monitor.

The widespread adoption of the Internet as a tool for remote communication has also given rise to the development of video and image-based remote security systems. For example, PriVID Eye Systems Corporation is a Florida-based development firm specializing in advanced remote video monitoring technologies. Their “RemoteVision MX” is a software “video capture card” package that enables a user to view remote locations through their PC over a telephone line. Similarly, Novex Canada's “Video Catcher Plus” (“VC+”) is a home security package that includes software, 4 alarms, 4 video cameras and a small device that plugs into the serial port of a home PC. The video cameras and the alarms are connected to the computer through the device. A user of the VC+ can connect to their PC from a remote computer through a conventional modem/PSTN connection to view video feeds. The VC+ allows for viewing of up to 4 videos on one screen simultaneously. Also, the VC+ is enabled with motion detection such that recording can be automatically started only if and when a motion is detected.

Companies such as Cannondale have recently employed a web-based system enabling managers to view production work as described by James E. Gaskin, “Cyberspace Goes Blue-collar”, Inter@ctive Week, Aug. 19, 1998. As discussed in the Gaskin article, Weyer Haeuser not only uses web-based remote cameras to view the production floor, but has supplemented remote monitoring using net-cams to view dials and meters of production equipment. However, these web-based systems suffer from the same shortcomings as closed-circuit television systems. In particular, there currently is no way for a property owner to effectively monitor his premises without prohibitively escalating his costs or to test the attentiveness of those monitoring his premises.

SUMMARY OF INVENTION

The problems identified above are solved and a technical advance is achieved in the art by providing, in accordance with the present invention, a system and method for a central server to manage remote monitoring tasks.

A method for a central server to manage remote monitoring tasks according to one embodiment of the present invention includes: receiving a request from a user of a user device to monitor a remote location; determining a remote location to be monitored; enabling communication between a sensor at the remote location and the user device; and crediting value to the user for monitoring the remote location in accordance with an amount of time the user device has been in communication with the sensor for remote monitoring purposes.

A method according to an alternate embodiment of the present invention includes: receiving a request from a user of a user device to monitor a remote location in exchange for value; determining a remote location to be monitored; enabling communication between a sensor at the remote location and the user device; and measuring user attentiveness while the user device is in communication with the sensor. Many other advantageous embodiments are also disclosed.

Thus, one embodiment of the present invention is directed to a commerce-based system and method that enables members of the general public who have access to a data network such as the Internet to log on at any time and perform remote monitoring tasks for value. In accordance with one aspect of the present invention, a user account is credited with value in accordance with the amount of time a user spends monitoring remote locations. Moreover, little or no skill is required of the user short of his remaining attentive during a remote monitoring session. Thus, the idle time of unskilled workers, as well as the underutilized idle time of even highly skilled workers, can now be turned into value in accordance with the present invention.

An alternate embodiment measures user attentiveness. In one such embodiment, an inattentive user is penalized by automatically replacing him with another user and preventing him from participating in remote monitoring tasks in the future. Thus, location owners can rest assured that their properties are being diligently monitored while they are away without having to incur excessive costs associated with hiring security guards (e.g., providing them with uniforms, benefits, etc.).

Another aspect of the present invention includes taking precautions to maintain anonymity of the locations being monitored. Anonymity is advantageous because the present invention allows individuals who are not guaranteed to be trustworthy to monitor private property over a public network (e.g., rather than requiring any pre-screening of users, one embodiment of the present invention simply relies upon user attentiveness to determine whether a user will be permitted to continue to participate in remote monitoring tasks). Without taking precautions to maintain anonymity, an unscrupulous individual knowing the location's identity could study its characteristics to plan a crime. Thus, in one embodiment of the present invention, users are not provided with the identity of the remote location being monitored and, indeed, affirmative measures are taken to prevent the user from ascertaining the identity of the location.

Further aspects of the present invention will become apparent during the course of the following description and by reference to the attached drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating one embodiment of the system of the present invention.

FIG. 2 is a block diagram illustrating one embodiment of the central server of the present invention.

FIG. 3 is a block diagram illustrating an exemplary user device.

FIG. 4 illustrates an exemplary user database.

FIG. 5 illustrates an exemplary task database.

FIG. 6 illustrates an exemplary session status database.

FIG. 7 illustrates an exemplary database of user performance testing rules.

FIGS. 8A and 8B are flow-charts illustrating an exemplary process of the monitoring session program executed by the central server of the present invention.

FIG. 9 is a flow chart illustrating an exemplary emergency procedure executed by the central server of the present invention.

DETAILED DESCRIPTION

Referring now to the drawings, wherein like reference numerals refer to like parts, FIG. 1 illustrates one embodiment of the present invention wherein users of a data network such as the Internet can “log on” to a web site and monitor one or more remote locations in exchange for value.

As shown in FIG. 1, a central server 200 is coupled to a plurality of remote location sensor devices 100a-c and a plurality of user devices 300a-c. Central server 200 may be a high bandwidth web server of the type commonly operated by Internet service providers. User devices 300a-c may be personal computers and/or televisions coupled to the Internet (e.g., WebTV). Location sensor devices 100a-c may comprise digital/analog video cameras, digital/analog audio microphones, motion detectors, pressure sensors, thermal sensors, laser and/or light sensors, radar, sonar and other sensing devices well known to those skilled in the art. It is to be understood that any number of user devices and sensor devices may be coupled to the central server 200.

In one embodiment of the present invention, the central server 200 may be operated and maintained by an Internet service provider (ISP), such as America Online™. The ISP receives payment from entities (e.g., banks, retail stores, private home owners, etc.) desiring their locations to be monitored by one or more of the ISP's users. For example, Fleet Bank may offer to pay the ISP $6.00 per hour to have a user monitor a Fleet branch remotely over the Internet. The ISP in turn advertises this opportunity to its users at the stated rate (i.e., $6.00 per hour) less a service fee (e.g., 25% of the quoted rate of $6.00 per hour). After a user has logged on and completed the remote monitoring task, the ISP bills Fleet Bank at the stated rate and pays or credits the user for their time at the stated rate less the service fee.

To monitor remote locations for value, users initially register with the central server 200 and receive a user identifier. After registering, users can simply present their user identifier to central server 200 when logging on for assignment of a remote monitoring task. Remote monitoring tasks include a task identifier and a shift (e.g., a date and/or a time period). Central server 200 assigns the remote monitoring task taking into account predetermined rules specified by the location owner, such as a predetermined number of users required to monitor the remote location simultaneously and/or a minimum user rating. In accordance with one aspect of the present invention, users are rated based on their attentiveness during monitoring sessions, as will be discussed in detail hereinafter in connection with FIG. 8.

In addition, a number of precautions are preferably taken by central server 200 to maintain anonymity of the location being monitored. Anonymity is typically advantageous since the present invention allows individuals who are not guaranteed to be trustworthy to monitor private property over a public network. These precautions are discussed in detail hereinafter in connection with FIG. 8 and include preventing the user from monitoring a location that is within a predetermined distance of the user's home address. At a minimum, the identity of the physical location assigned for monitoring is not revealed to the user. In the prior art remote video surveillance systems discussed above, anonymity was not important, or even practical, because those systems were designed for private usage.

At the start of the shift, central server 200, enables communication between the location sensor devices 100a-c and the user devices 300a-c. As previously indicated, a location may be monitored by a plurality of users simultaneously. During the shift, central server 200 takes steps to measure, encourage and/or enforce user attentiveness, as will be discussed in detail hereinafter in connection with FIG. 8. One method of measuring user attentiveness includes transmitting test communications to the user device and receiving responses to the test communications within a predetermined period of time. If a predetermined number of responses to test communications are not received within the time specified, the user's rating is lowered and communication between the location sensor device(s) and the user device may consequently be disabled. In addition to lowering the user's rating, the user can be further penalized as discussed in detail hereinafter in connection with FIG. 8, including preventing future monitoring by the user. However, if communication between the user device and the remote sensor device(s) has not been disabled due to inattentiveness, at the end of the shift, central server 200 credits value to the user's account for performing the monitoring task as will be discussed in detail hereinafter.

At the time a user is assigned the remote monitoring task, he is also provided with emergency procedures to be followed in the event that the user detects an emergency at the remote location during his shift. If a signal is received by the user device from the central server 200 and the user interprets that signal to indicate an emergency at the remote location, central server 200 will determine whether the reported emergency is legitimate in the manner discussed in detail hereinafter in connection with FIG. 8. If legitimate, central server 200 will transmit an output request to an emergency dispatch service corresponding to the sensor location. Alternatively, the emergency procedure provided to the user includes the phone number of the emergency dispatch service (i.e., a service geographically corresponding to the remote location) and thus, upon detection of an emergency, the user can contact the emergency dispatch service himself.

FIG. 2 depicts a block diagram of an exemplary central server 200 maintained and operated, e.g., by an Internet service provider. The central server 200 performs all the operations of a conventional server maintained and operated by an Internet service provider and performs additional operations in accordance with the present invention. The central server 200 includes a CPU 205 coupled to a ROM 210, RAM 215 and system clock 207. The CPU 205 is also coupled to the location sensor devices 100a-c and the user devices 300a-c via a communications port 220. As shown in FIG. 2, the CPU 205 is also coupled to a data storage device 225. Of course, CPU 205 may comprise a plurality of processors working in conjunction.

Data storage device 225 includes a variety of databases including a user database 230, a task database 240, a session status database 245, and a user performance testing rules database 250. The user database 230 of data storage device 225 contains user information. The task database 240 contains information concerning remote monitoring tasks. The session status database 245 contains information concerning the status of remote monitoring tasks. The user performance testing rules database 250 contains testing rules for remote monitoring tasks. Each of these databases will be discussed in detail hereinafter in conjunction with FIGS. 4-7. Storage device 225 further includes a monitoring session program 260 executed by CPU 205 to manage remote monitoring tasks in accordance with the present invention. The monitoring session program 260 will be discussed in detail hereinafter in connection with FIGS. 8 and 9.

FIG. 3 is a block diagram illustrating an exemplary user device 300. In one embodiment, the user device can be a personal computer, which includes a CPU 305 coupled to ROM 310, RAM 315 and system clock 320. The CPU 305 is coupled to a variety of input devices 325 and output devices 330. The input devices 325 may include one or more of the following: a mouse, a keyboard, a monitor with “touch screen” capability, and a microphone. The output devices 330 may include, for example, a monitor and/or a speaker. The device 300 also includes a communications port 335 for accessing a data network 340 such as the Internet.

FIG. 4 illustrates an exemplary user database 230, which records information concerning users who have registered to log on to the central server of the present invention to monitor remote locations in exchange for value. As previously indicated, when a user first requests to monitor a remote location, a record for the user is established in the user database 230. For each record, the user database 230 includes a user identifier field 410, a user rating field 420, and an account balance field 430.

The user identifier field 410 of user database 230 contains a user identifier such as a password, a PIN number, a credit card number, or a telephone number provided by the user, or some other identifier assigned to the user by the central server 200. The user rating field 420 contains a user rating generated by central server 200 based on the user's past performance during remote monitoring sessions. Lastly, account balance field 430 is a running account (e.g., a financial account) of the value credited to the user in exchange for performing remote monitoring tasks.

FIG. 5 illustrates an exemplary task database 240 which preferably stores specific information for each remote monitoring task. When a location owner instructs the operator of server 200 (e.g., an ISP) to have its location monitored remotely by one of the ISP's users, a record for the remote monitoring task is established in the task database 240 in accordance with information provided to the ISP by the location owner. For each record, the task database includes a task identifier in field 505 (assigned by the ISP), the geographic location of the remote sensor in field 510 (e.g., Fleet Bank, Hamden, Conn. Branch), the electronic address of the remote sensor in field 515 (e.g., www.fleetbank.com/branch3/cam1), and the owner of the location in field 520 (e.g. Fleet Corporation, Hartford, Conn.). Each record also includes the pay rate associated with monitoring the location in field 525, any rules that must be satisfied prior to monitoring the location in field 530 (e.g., more than 3 users), the shift(s) during which the location is to be remotely monitored in field 535 and the emergency procedures to be followed in the event that the user detects an emergency condition at the remote location in field 540 (e.g., click the emergency button on the ISP frame). Lastly, each record also contains an indication in field 545 of the availability of the remote monitoring task (i.e., whether or not user(s) are still needed to perform the task).

FIG. 6 illustrates an exemplary session status database 245, which maintains status information for each shift of a remote monitoring task. For each task and shift identified by the task identifier in field 605 and shift in field 610, the session status database 245 includes the user identifier(s) in field 615 (as indicated above, more than one user may monitor the same location), the status of the shift in field 620, and the performance results of the user(s) in responding to test communications in field 625. As shown in FIG. 6, if the shift of the remote monitoring task has not yet commenced, the entries in fields 620 (“Status”) and 625 (“Performance Results”) will contain the indication “Not Available” (“N/A”).

FIG. 7 illustrates an exemplary user performance testing rules database 250. The user performance testing rules database 250 includes a plurality of records each associated with the user testing rules for a particular task. Each record includes fields for a task identifier in field 705, a test communication in field 710, test communication intervals in field 715, the required response time in field 720, and the required response in field 725.

The test communication field 710 in database 250 contains the test communication to be transmitted to the user during the remote monitoring task (e.g., staged emergencies, questions, etc.). Field 715 contains the frequency at which the test communication is to be transmitted to the user (e.g., random, periodic, etc.). Field 720 contains the time in which the user is required to respond to the test communication (e.g., 10 seconds). Lastly, field 725 contains the required user response to the test communication (e.g., click 911 button).

FIGS. 8A and 8B are flow-charts illustrating an exemplary process of the monitoring session program 260 executed by central server 200. Users preferably “register” with the operator of the central server 200 to perform remote monitoring tasks. Registration may take place on-line, by phone, by mail, or in-person. At the time of registration, central server 200 assigns the user a user identifier (if one is not supplied by the user) and then creates a record for the user in user database 230 (if one has not already been created). As shown in FIG. 4, the record will contain the user identifier in field 410. However, the user rating in field 420 will contain a “Not Available” entry or the like and the account balance in field 430 will be “$0.00” if the user has not yet performed a remote monitoring task. If registration occurs on-line, the user may either remain on-line for assignment of a remote monitoring task, or log off and then log back on at a later time to request an assignment.

Turning to FIG. 8A, in step 800, central server 200 receives a request from a user of the data network to monitor a remote location. The request may include the user identifier previously assigned to the user. In step 805, the central server 200 accesses task database 240 and identifies a remote monitoring task for assignment to the user. This includes determining an appropriate task identifier (e.g., “12345”) and shift (e.g., 1/1/98 and/or 12:00 AM-3:00 AM). In an alternate embodiment, the user is not assigned a shift. Rather, the user can log on for assignment of a remote monitoring task at any time and end the remote monitoring session (i.e., log off) at any time. As a precondition to logging off without negatively impacting the user's rating, sever 200 may require that an alternate user be available to continue monitoring the remote location. (As discussed in detail below, the present invention can notify a back-up user to replace an original user.)

The process of identifying a remote monitoring task may take into account the predetermined rules in field 530 of task database 240 specified by the location owner (e.g., a minimum user rating required for a user to be assigned a particular location). The process may also take into account user-specified preferences concerning the assigned shift. In addition, the process preferably includes taking precautions to maintain anonymity of the location being monitored. Without such precautions, an unscrupulous user knowing the location's identity could study the location's characteristics, such as its traffic patterns, to plan a crime. For example, central server 200 may prevent the user from monitoring a location that is within a predetermined distance from the user's physical location (as determined by reference to zip codes or modern navigation methods such as GPS). Alternatively, central server 200 may prevent the user from monitoring the location more than a predetermined total number of times, or from monitoring the location during a predetermined time of day if the user has previously monitored the location a predetermined number of times during that time of day. In yet another embodiment, central server 200 may randomly change the user's assigned location during the user's shift. In summary, it is desirable that central server 200 not provide the user with the identity of the remote location to be monitored and take affirmative steps to prevent the user from ascertaining the identity of the location.

Once a task identifier and shift has been assigned to the user, central server 200 communicates them to the user together with the emergency procedure specified in field 540 of task database 240 for reporting emergencies at the remote location. In step 810, the central server 200 establishes a record for the user in session status database 245. Rather than creating a new record for the user, the user identifier may be added to a previously established record. For example, a location may be monitored by a plurality of users and at least one user of the plurality of users may have already been assigned the location and thus a corresponding record may have already been established in session status database 245. The record in session status database 245 includes the task identifier in field 605, the shift in field 610 and the user identifier in field 615. The status in field 620 and the performance results in field 625 may contain a “Not Available” entry or the like, until commencement of the remote monitoring session.

It is to be understood that often it may be impractical for the user to remain in communication with central server 200 until the start time of the shift (e.g., the user may be logged on in the early morning and the assigned shift does not begin until mid-afternoon) In such instances, the user may log off after receiving the task identifier and shift, and then log on to central server 200 at a time closer to the start of the shift. When logging back on, the user preferably provides the user identifier, task identifier and shift to assist central server 200 in identifying which remote monitoring task in session status database 245 the user is logging on to perform (e.g., the user may be assigned more than one remote monitoring task). Central server 200 may also transmit a reminder to the user via e-mail or telephonically (i.e., a voice call) prior to the start of the shift.

At a predetermined period of time prior to the start of the shift, central server 200 in step 815 determines whether the rules in field 530 of task database 240 corresponding to the task identifier and shift assigned to the user have been satisfied. For example, the rules may require a minimum number of users (and/or users of a particular rating) for the remote monitoring task to commence. Moreover, the number of assigned users and/or the user ratings of those users may have changed since the user was initially assigned the task identifier and shift requiring a re-evaluation in light of the rules in field 530 of database 240. If the rules in field 530 have been satisfied then in step 820 central server 200 uses the sensor address in field 515 of task database 240 to enable communication between the location sensor device(s) and the user device at the start of the shift. Central server 200 also updates the status in field 620 of the appropriate record in session status database 245 from “Not Available” to “In Progress”. It is to be understood that the communication between the location sensor devices and the user devices can be video-based and/or audio-based. If only audio-based, a “speakerphone” setting on the user device is used to monitor sounds at the remote location.

As previously described, a location may be monitored in accordance with the present invention by a plurality of users simultaneously. In such instances, the present invention can deter “bystander inaction syndrome”. Bystander inaction syndrome is a sociological behavioral pattern that emerges when several people simultaneously witness an emergency, but each person assumes that someone else will notify the authorities. The present invention prevents this behavioral pattern in several ways. In one embodiment, central server 200 simply does not inform the user that anyone else is monitoring the location. In another embodiment, central server 200 informs the user that he is the only user monitoring the remote location. In either case, the user is instilled with the belief that if he does not report the emergency, it will not be reported at all. In an alternate embodiment, central server 200 informs the user whenever an emergency is reported by another user at the location the user is monitoring. In this manner, when an emergency occurs, the user knows whether anyone else has reported it yet and can act accordingly. In some of the embodiments discussed hereinafter, central server 200 imposes penalties for false positives or inattentiveness and/or pays bonuses for the detection of legitimate emergencies. Thus, in those embodiments, users are economically motivated to report legitimate emergencies.

Continuing with FIG. 8A, central server 200 in step 825 uses the task identifier to access the corresponding record in the user performance testing rules database 250. At the test communication intervals specified in field 715, central server 200 transmits the test communication specified in field 710 of the record to the user device to measure user attentiveness. In a first embodiment, the test communication comprises a randomly transmitted predetermined video of a fabricated emergency. In a second embodiment, the test communication comprises one or more questions communicated to the user, for example, by e-mail.

In an alternate embodiment, central server 200 monitors a biometric reading from the user at the remote device to measure user attentiveness. For example, the user device may be equipped with a retinal scanner similar to those being developed for ATM machines. The retinal scanner would then take random, periodic or continuous readings to determine whether the user is watching the video stream from the remote location on his screen. In yet another alternate embodiment, the user device is equipped with a video camera. Other users can then log on to central server 200 and be assigned the remote monitoring task of monitoring another user monitoring a remote location. Once inattention is detected, central server 200 may also enforce attention by causing an audible alarm to be transmitted to the user. The alarm may grow progressively louder until the user responds to the alarm.

Whereas the foregoing embodiments function to detect and deter inattention, other embodiments function to encourage attentiveness. In one embodiment, for example, central server 200 randomly transmits to the user an offer to enter the user in a sweepstakes. In another embodiment, entertainment video is transmitted to the user at random times and/or for random durations. Since the user cannot predict when the next transmission of entertainment video will occur, he will be encouraged to remain attentive to await the next transmission.

In step 830 of FIG. 8A, central server 200 determines whether a response to the test communication was received within the response time specified in field 720. If a predetermined number of responses (which may be recorded in RAM 215 for the duration of the shift) are not received within the time specified in field 720, then in step 835 central server 200 penalizes the user by adjusting the user's rating in user database 230 in accordance with predetermined criteria, and thereafter disables communications between the location sensor device(s) and the user device. In addition to adjusting the user's rating, central server 200 may penalize the user by not paying him for the remote monitoring session, paying him less than the pay rate specified in field 525 of task database 240, imposing a charge upon the user (i.e., deducting a predetermined amount from the account balance in field 430 of user database 230), and, in an extreme case, preventing the user from participating in remote monitoring tasks in the future. In one embodiment, if central server 200 determines that the user is inattentive, a back-up user can be notified to replace the original user. The back-up user can then log-on and monitor the location for the remainder of the original user's shift. Such an embodiment is particularly well suited to situations in which the operator of central server 200 is an ISP, since the ISP can actively monitor all current users that utilize the ISP for Internet related services. Thus, the ISP can recruit users to perform remote monitoring tasks for value (e.g., by transmitting offers to registered users of the ISP).

If a response was received within the specified time, central server 200, in step 840 of FIG. 8B, evaluates the response to determine whether it was the response specified in field 725 of the user performance testing rules database 250 (e.g., click 911). If the test communication transmitted to the user comprises a question, the evaluation in step 840 includes determining whether the user responded with the expected answer. In step 845, central server 200 updates the user's rating in database 230 in accordance with predetermined criteria and, if the user's shift is not over (step 850), the process returns to step 825. As discussed above, the ratings can be used when determining whether to assign a user a particular remote monitoring task and it is envisioned that users with higher ratings will be assigned higher paying tasks (e.g., a bank may be willing to pay more than a homeowner to have a location remotely monitored). At the end of the shift, in step 850, the central server 200 uses the task identifier to access the corresponding record in the session status database 245 and update the entry in field 625 (“Performance Results”) to reflect the user's performance in responding to test communications. Alternatively, the user's performance may be continuously or periodically updated during the shift.

Finally, in step 855, central server 200 credits the user's account balance in field 430 of user database 230 in accordance with the pay rate and shift duration specified in fields 525 and 535 respectively of task database 240. Various payment schemes are contemplated. For example, the pay rate may incorporate such criteria as the time of day (e.g., a user may be paid more to monitor a location between the early morning hours of 2:00 AM and 5:00 AM), whether the user is monitoring two or more locations simultaneously (e.g., a user may be paid more to monitor two or more locations at the same time), the criminal history of the community in which the sensor is located (e.g., a user may be paid more to monitor locations whose zip codes correspond to communities having statistically higher crime rates or, alternatively, more users may be assigned to higher crime areas), and/or the number of users simultaneously monitoring the remote location (e.g., the user may be paid less if more than one user is monitoring the same location). If the operator of central server 200 is an ISP, the user may be provided with discounted or free Internet access if the user monitors the location for a predetermined amount of time during the billing cycle. The ISP may also submit sweepstakes entries or other positive rewards on the user's behalf for each predetermined period of time spent monitoring a location (e.g., one entry for each x minutes spent monitoring). Those skilled in the art will appreciate that many types of services may be granted to the user in exchange for performing remote monitoring tasks. In addition, bonuses may be paid for each legitimate emergency detected by the user.

In an alternate embodiment, the user operates a different program (e.g., a word processor) in a different window on the user device 300a-c while maintaining communication with the sensor device(s) 100a-c via central server 200 using a web browser. In this embodiment, the sensor device includes a video camera and a motion detector. Rather than, or in addition to, detecting motion at the remote location, the sensor device may be equipped to detect other events such as a predetermined level of light intensity (e.g., a bright light illuminating a dark area) or static (e.g., resulting from the sensor having been disabled). In response to a signal from the central server indicative of a predetermined event having been detected by a sensor device, the user device preempts the program being operated by the user to immediately display the video data received from the video camera. The user can then review the displayed video data to determine whether an emergency has occurred at the remote location. Thus, in accordance with one aspect of the present invention, a user can receive value for passively monitoring a remote location while working on an entirely different project.

In yet an alternate embodiment, rather than enabling communication between sensor devices 100a-c and user devices 300a-c via the Internet, central server 200 causes the video/audio data stream received from sensor devices 100a-c to be transmitted to user devices 300a-c via a dedicated television channel of a wireless or cable television system. The user can then monitor the video/audio data on the user device, which, in this embodiment, is preferably a television set. In addition, if the user device includes a picture-in-picture feature, the user can employ this feature to monitor the video data while watching a program on another television station. In these embodiments, a user can submit a request to monitor a remote location via an interactive television set or, via his telephone by calling the operator of central server 200, if his television does not include an interactive feature. In an alternate embodiment, in addition to a video camera, the sensor device(s) 100a-c include detectors for detecting predetermined events (e.g., a predetermined level of motion, sound, light intensity, etc.) at the remote location. When a predetermined event is detected by the sensor device, a signal indicative of the predetermined event is transmitted from the central server to functionality in the television set via the wireless or cable television system. In response to the received signal, the functionality in the television set preempts the television program currently being watched by the user to display the video/audio data received from the video camera (e.g., the television will change channels to the dedicated television channel). Alternatively, the functionality in the television set may simply display a visual alert to the user to manually change channels to the dedicated television channel. In these embodiments, functionality in the television set may also cause an audible alarm to be issued to inform the user that a predetermined event has been detected at the remote sensor. Thus, the user may engage in other activities, such as household chores, while monitoring a remote location in exchange for value.

FIG. 9 is a flow chart illustrating an exemplary emergency procedure executed by the central server 200 of the present invention. In step 900, central server 200 receives a signal from the user device indicating an emergency at the remote location corresponding to the sensor address of the current monitoring session. In step 905, central server 200 determines whether the reported emergency is in response to a test communication and, if not, whether the reported emergency is legitimate. In one embodiment, if the reported emergency is not in response to a test communication, central server 200 will immediately communicate the video feed of the remote location to other users who will verify that an emergency has occurred. In a second embodiment, central server 200 will contact an emergency dispatch service only if a threshold number or percentage of users have reported the emergency. If the emergency is not legitimate, central server 200, in step 910, lowers the user's rating in user database 230 in accordance with predetermined criteria. If, however, the reported emergency is legitimate, central server 200, in step 915, transmits an output request to an emergency dispatch service corresponding to the sensor location in field 510 of task database 240. Alternatively, central server 200 communicates to the user the phone number of the emergency dispatch service corresponding to the geographic location of the sensor. Upon detecting an emergency, the user contacts the emergency dispatch service himself.

The many features and advantages of the present invention are apparent from the detailed specification, and thus, it is intended by the appended claims to cover all such features and advantages of the invention which fall within the true spirit and scope of the present invention.

Furthermore, since numerous modifications and variations will readily occur to those skilled in the art, it is not desired that the present invention be limited to the exact construction and operation illustrated and described herein, and accordingly, all suitable modifications and equivalents which may be resorted to are intended to fall within the scope of the claims.

Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US42452452 Feb 197613 Jan 1981Pioneer Electronic CorporationInteractive CATV system
US445826621 Oct 19813 Jul 1984The Commonwealth Of AustraliaVideo movement detector
US45118866 Oct 198316 Apr 1985Micron International, Ltd.Electronic security and surveillance system
US462253818 Jul 198411 Nov 1986Otis Elevator CompanyRemote monitoring system state machine and method
US46461457 Apr 198024 Feb 1987R. D. Percy & CompanyTelevision viewer reaction determining systems
US483827520 Jul 198713 Jun 1989Lee Arnold St JHome medical surveillance system
US485791227 Jul 198815 Aug 1989The United States Of America As Represented By The Secretary Of The NavyIntelligent security assessment system
US48611546 Aug 198629 Aug 1989Westinghouse Electric Corp.Automated visual assessment system with steady state visual evoked potential stimulator and product detector
US495538828 Jul 198611 Sep 1990Swinburne LimitedElectroencephalographic attention monitor
US49691368 Aug 19866 Nov 1990Chamberlin David BCommunications network and method with appointment information communication capabilities
US498234616 Dec 19881 Jan 1991Expertel Communications IncorporatedMall promotion network apparatus and method
US503480719 Oct 198923 Jul 1991Kohorn H VonSystem for evaluation and rewarding of responses and predictions
US5204703 *11 Jun 199120 Apr 1993The Center For Innovative TechnologyEye movement and pupil diameter apparatus and method
US524743320 Mar 199021 Sep 1993Hitachi, Ltd.Man-machine system
US52836449 Jul 19921 Feb 1994Ibaraki Security Systems Co., Ltd.Crime prevention monitor system
US5307262 *29 Jan 199226 Apr 1994Applied Medical Data, Inc.Patient data quality review method and system
US541270812 Mar 19932 May 1995Katz; Ronald A.Videophone system for scrutiny monitoring with computer control
US5454043 *30 Jul 199326 Sep 1995Mitsubishi Electric Research Laboratories, Inc.Dynamic and static hand gesture recognition through low-level image analysis
US546740214 Mar 199414 Nov 1995Hitachi, Ltd.Distributed image recognizing system and traffic flow instrumentation system and crime/disaster preventing system using such image recognizing system
US551966919 Aug 199321 May 1996At&T Corp.Acoustically monitored site surveillance and security system for ATM machines and other facilities
US553714115 Apr 199416 Jul 1996Actv, Inc.Distance learning system providing individual television participation, audio responses and memory for every student
US554464915 Mar 199513 Aug 1996Cardiomedix, Inc.Ambulatory patient health monitoring techniques utilizing interactive visual communication
US555058131 May 199527 Aug 1996Lucent Technologies Inc.Low bit rate audio-visual communication system having integrated perceptual speech and video coding
US55536099 Feb 199510 Sep 1996Visiting Nurse Service, Inc.Intelligent remote visual monitoring system for home health care service
US555949619 May 199324 Sep 1996Dubats; William C.Remote patrol system
US557105716 Sep 19945 Nov 1996Ayers; Margaret E.Apparatus and method for changing a sequence of visual images
US559845628 Apr 199528 Jan 1997Feinberg; David H.Integrated telephone, intercom, security and control system for a multi-unit building
US570865514 Jun 199613 Jan 1998Telefonaktiebolaget L M Ericsson PublMethod and apparatus for addressing a wireless communication station with a dynamically-assigned address
US57173793 Apr 199610 Feb 1998Alcatel N.V.Remote monitoring system
US57343352 Dec 199631 Mar 1998Finmeccanica S.P.A.Forest surveillance and monitoring system for the early detection and reporting of forest fires
US575910111 Apr 19942 Jun 1998Response Reward Systems L.C.Central and remote evaluation of responses of participatory broadcast audience with automatic crediting and couponing
US576261112 Nov 19969 Jun 1998The United States Of America As Represented By The Secretary Of The NavyEvaluation of a subject's interest in education, training and other materials using brain activity patterns
US57867463 Oct 199528 Jul 1998Allegro Supercare Centers, Inc.Child care communication and surveillance system
US57901746 Mar 19964 Aug 1998Bell Atlantic Network Services, Inc.PSTN architecture for video-on-demand services
US579421011 Dec 199511 Aug 1998Cybergold, Inc.Attention brokerage
US585719027 Jun 19965 Jan 1999Microsoft CorporationEvent logging system and method for logging events in a network system
US586222324 Jul 199619 Jan 1999Walker Asset Management Limited PartnershipMethod and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce
US587013814 Mar 19969 Feb 1999Hitachi, Ltd.Facial image processing
US590954831 Oct 19961 Jun 1999Sensormatic Electronics CorporationApparatus for alerting human operator to status conditions of intelligent video information management system
US594805427 Feb 19967 Sep 1999Sun Microsystems, Inc.Method and system for facilitating the exchange of information between human users in a networked computer system
US599174220 May 199623 Nov 1999Tran; Bao Q.Time and expense logging system
US5991881 *8 Nov 199623 Nov 1999Harris CorporationNetwork surveillance system
US6038337 *29 Mar 199614 Mar 2000Nec Research Institute, Inc.Method and apparatus for object recognition
US607014427 Aug 199830 May 2000The State Of OregonSystem and process for job scheduling using limited discrepancy search
US60930266 Jul 199825 Jul 2000Walker Digital, LlcMethod and apparatus for administering a survey
US60974291 Aug 19971 Aug 2000Esco Electronics CorporationSite control unit for video security system
US610478520 Jan 199915 Aug 2000Tempa Communication Inc.Subscriber control unit for united home security system
US61283968 Sep 19973 Oct 2000Fujitsu LimitedAutomatic monitoring apparatus
US61667297 May 199726 Dec 2000Broadcloud Communications, Inc.Remote digital image viewing system and method
US6208266 *28 Apr 199727 Mar 2001Scientific Telemetry CorporationRemote data acquisition and processing system
US62545367 Dec 19983 Jul 2001Ibva Technologies, Inc.Method and apparatus for measuring and analyzing physiological signals for active or passive control of physical and virtual spaces and the contents therein
US625995614 Jan 199910 Jul 2001Rawl & Winstead, Inc.Method and apparatus for site management
US62717522 Oct 19987 Aug 2001Lucent Technologies, Inc.Intelligent multi-access system
US62978256 Apr 19982 Oct 2001Synapix, Inc.Temporal smoothing of scene analysis data for image sequence generation
US6297844 *24 Nov 19992 Oct 2001Cognex CorporationVideo safety curtain
US647685812 Aug 19995 Nov 2002Innovation InstituteVideo monitoring and security system
US653868926 Oct 199825 Mar 2003Yu Wen ChangMulti-residence monitoring using centralized image content processing
US654207720 Aug 20011 Apr 2003Raymond Anthony JoaoMonitoring apparatus for a vehicle and/or a premises
US657061013 Dec 199927 May 2003Alan KipustSecurity system with proximity sensing for an electronic device
US661645814 Sep 19999 Sep 2003Jay S. WalkerMethod and apparatus for administering a survey
US66180741 Aug 19979 Sep 2003Wells Fargo Alarm Systems, Inc.Central alarm computer for video security system
US672099028 Dec 199813 Apr 2004Walker Digital, LlcInternet surveillance system and method
US6784833 *21 Feb 200331 Aug 2004Lockheed Martin CorporationPersonal surveillance system with locating capabilities
US69409981 Feb 20016 Sep 2005Cernium, Inc.System for automated screening of security cameras
US6950013 *31 May 200227 Sep 2005Robert Jeffery ScamanIncident recording secure database
US704343316 Sep 19999 May 2006Enounce, Inc.Method and apparatus to determine and use audience affinity and aptitude
US7046138 *27 Aug 200316 May 2006Intelagents, Inc.System and method for monitoring a security of an asset
US711635714 Mar 19963 Oct 2006Canon Kabushiki KaishaCamera monitoring system
US712442712 Jan 200017 Oct 2006Touch Technologies, Inc.Method and apparatus for surveillance using an image server
US7444287 *31 Mar 200528 Oct 2008Emc CorporationEfficient monitoring system and method
US8064898 *18 Jun 200722 Nov 2011Murat CarnallCall management in a telecommunications system
JPH1153669A Title not available
WO1997022074A111 Dec 199619 Jun 1997Cybergold, Inc.Method for trading customer attention for advertisement
WO2005033911A226 Feb 200414 Apr 2005Walker Digital, LlcImage analysis method and apparatus in a network that is structured with multiple layers and differentially weighted neurons
Non-Patent Citations
Reference
1"Court Rejects Killer's Appeal in Genovese Case", The New York Times, Dec. 26, 1996, Section B, p. 7, col. 1, Metropolitan Desk, 1pg.
2"Fortune" Jul. 20, 1998 The Bill and Warren Show: In . . . , Fortune Magazine, (http // www pathfinder com/fortune/1998/980721/bil html), download date: Sep. 21, 1998.
3"Smile, You're on the Web!", RePlay Magazine, Jun. 1998, p. 48, 1pg.
4"What is NOVEX Video Catcher Plus? (NOVEX VC+)", NOVEX Invest Ltd., (http //www tradezone com/tradesites/novex html), download date: Aug. 5, 1998, 17 pp.
5Anderson, Lee, "Good Samaritanism Here", Chattanooga Free Press, Jul. 3, 1998, Section: Editorial, p. A6, 2pp.
6Bott, Jennifer, "Eyes on Road, Hands on the Wheel? Researchers Want to See Whether Technical Gadgets and Devices are Creating Sensory Overloads for Drivers.", Akron Beacon Journal, May 25, 1998, Section: Business, p. D1, 3 pp.
7Connerat, Carolyn, "Business television in the digital age; Special Section: Business TV", Satellite Communications, Feb. 1995, Section: vol. 19, No. 2, p. 39, ISSN: 0147-7439, 2pp.
8Dorman, Michael, "Long Island: Our Story/The Killing of Kitty Genovese/Her Public Slaying in Queens Becomes a Symbol of American Failure to Get Involved", Newsday, Jun. 10, 1998, Section: News, p. A19, 3pp.
9Edmondson, Gail et al., "A Tidal Wave of Temps (int'l edition)", Business Week, Copyright 1997 by the McGraw-Hill Companies, Inc, 4 pp.
10Ex Parte Reexamination Certificate (90/020,000) for U.S. Patent No. 7,817,182 issued Oct. 8, 2012, 2 pp.
11Ex Parte Reexamination Certificate for U.S. Patent No. 7,605,840 issued Oct. 17, 2012, 2 pp.
12Final Office Action for Reexamination No. 90/009,999 mailed Mar. 8, 2013, 152 pp.
13Gaskin, James E., "Cyberspace Goes Blue-Collar", Inter@ctive Week, Aug. 19, 1998, 2 pp.
14International Search Report for PCT Application No. PCT/US99/296599, dated Apr. 17, 2001.
15Notice of Allowance for U.S. Appl. No. 09/221,250, dated Oct. 21, 2003, 4 pp.
16Notice of Allowance for U.S. Appl. No. 10/718,327, dated Mar. 20, 2006, 6 pp.
17Notice of Allowance for U.S. Appl. No. 11/424,702, dated Jun. 1, 2009, 6 pp.
18Notice of Allowance for U.S. Appl. No. 11/424,708, dated Dec. 15, 6 pp.
19Notice of Allowance for U.S. Appl. No. 11/424,718, dated Jun. 8, 2009, 6 pp.
20Notice of Allowance for U.S. Appl. No. 11/424,731, dated Jun. 1, 2009, 6 pp.
21Notice of Allowance for U.S. Appl. No. 11/424,738, dated May 15, 2009, 6 pp.
22Notice of Intent to Issue Ex Parte Reexamination Certificate No. 90/009,998 mailed Sep. 24, 2012, 8 pp.
23Notice of Intent to Issue Ex Parte Reexamination Certificate No. 90/012,585 mailed Sep. 24, 2012, 8 pp.
24Notice of Intent to Issue Ex Parte Reexamination Certificate No. 90/020,000 mailed Aug. 29, 2012, 6 pp.
25Notice of Intent to Issue Reexamination Certificate for Reexam No. 90/009,999 dated Sep. 12, 2014, 6 pp.
26Notice of Intent to Issue Reexamination Certificate for Reexam No. 90/020,001 dated Sep. 16, 2014, 6 pp.
27O'Driscoll, Patrick, "Bystanders' silence resounds Denver shocked by failure to call police during murder", USA Today, Mar. 31, 1998, Section: News, p. 3A, 3pp.
28Office Action for Reexamination No. 90/009,999 mailed Sep. 24, 2012, 133 pp.
29Office Action for Reexamination No. 90/012,585 mailed Jun. 18, 2012, 23 pp.
30Office Action for Reexamination No. 90/020,001 mailed Aug. 28, 2012, 194 pp.
31Office Action for Reexamination No. 90/020,001 mailed Feb. 25, 2013, 23 pp.
32Office Action for Reexamination No. 90/020,001 mailed Jun. 18, 2012, 22 pp.
33Office Action for U.S. Appl. No. 09/221,250, dated Jun. 20, 2003, 14 pp.
34Office Action for U.S. Appl. No. 09/221,250, dated Nov. 2, 2001, 38 pp.
35Office Action for U.S. Appl. No. 09/221,250, dated Oct. 19, 2001, 35 pp.
36Office Action for U.S. Appl. No. 09/221,250, dated Sep. 24, 2002, 26 pp.
37Office Action for U.S. Appl. No. 10/718,327, dated Oct. 3, 2005, 7 pp.
38Office Action for U.S. Appl. No. 11/424,702, dated May 15, 2008, 6 pp.
39Office Action for U.S. Appl. No. 11/424,702, dated Sep. 12, 2008, 5 pp.
40Office Action for U.S. Appl. No. 11/424,708, dated Jun. 25, 2008, 12 pp.
41Office Action for U.S. Appl. No. 11/424,708, dated Mar. 20, 2009, 12 pp.
42Office Action for U.S. Appl. No. 11/424,718, dated Jul. 25, 2008, 6 pp.
43Office Action for U.S. Appl. No. 11/424,718, dated Nov. 12, 2008, 13 pp.
44Office Action for U.S. Appl. No. 11/424,724, dated Sep. 18, 2008, 9 pp.
45Office Action for U.S. Appl. No. 11/424,731, dated Oct. 17, 2008, 14 pp.
46Office Action for U.S. Appl. No. 11/424,738, dated Dec. 12, 2008, 23 pp.
47Order Denying Ex Parte Reexamination 90/012,585 mailed Dec. 3, 2012, 28 pp.
48Order Granting Request for Reexamination No. 90/009,999 mailed Jul. 19, 2012, 25 pp.
49Order Granting Request for Reexamination No. 90/020,000 mailed Jun. 13, 2012, 11 pp.
50Reexamination Certificate for Reexam No. 90/009,999 issued Oct. 20, 2014, 2 pp.
51Reexamination Certificate for Reexam No. 90/020,001 issued Oct. 22, 2014, 2 pp.
52Request for Ex Parte Reexamination 90/009,998 for U.S. Patent No. 7,605,840 filed Apr. 30, 2012, 167 pp.
53Request for Ex Parte Reexamination 90/009,999 for U.S. Patent No. 7,593,033 filed Apr. 30, 2012, 238 pp.
54Request for Ex Parte Reexamination 90/012,585 for U.S. Patent No. 7,817,182 filed Apr. 30, 2012, 167 pp.
55Request for Ex Parte Reexamination 90/012,585 for U.S. Patent No. 7,817,182 filed Sep. 14, 2012, 188 pp.
56Request for Ex Parte Reexamination 90/020,001 for U.S. Patent No. 7,817,182 filed Apr. 30, 2012, 115 pp.
57Risen, James, "Rise in Temp Workers Leads to Sharp Fall in Job Security", The Tech, Feb. 15, 1994, vol. 114, No. 6, p. 2.
58Ruppe, David, "ABCNEWS.com: Working Poor Reap Limited Gains in New Economy", (http //abcnews go com/sections/business/DailyNews/poverty-000628 html), Copyright 2000 ABC News Internet Ventures, 4 pp.
59Ruppe, David, "ABCNEWS.com: Working Poor Reap Limited Gains in New Economy", (http //abcnews go com/sections/business/DailyNews/poverty—000628 html), Copyright 2000 ABC News Internet Ventures, 4 pp.
60Sanders, Lisa, "Smile, You're On Job-Candidate Camera", Business Week, Aug. 5, 1996, Section: Up Front, Hunting Heads, No. 3487, p. 6, 1pg.
61Schlender, Brent, "The Bill and Warren Show Introduction", Fortune, Jul. 20, 1998, 25 pp.
62Spera, Vincent, "The Low Wage Labor Market: Problems and Solutions", American Youth Policy Forum, Sep. 7, 1997, 2 pp.
63Supplemental Notice of Allowance for U.S. Appl. No. 11/424,731, dated Aug. 27, 2009, 6 pp.
64The Associated Press, "Courts Rejects Killer's Appeal in Genovese Case", The New York Times, Dec. 26, 1996, 1 pg.
65Walker Digital, LLC v. ADT Security Services, Inc., C.A. No. 11-310-RGA, Iveda Solutions, Inc., Proposed Terms for Claim Construction, dated Jan. 18, 2013, 6 pp.
66Walker Digital, LLC v. AXIS Communications AB et al., C.A. No. 1:11-cv-00558, On-Net Surveillance Systems, Inc., Proposed Terms for Claim Construction, dated Jan. 18, 2013, 7 pp.
67Walker Digital, LLC. v. Aix Communications AB et al., 1:11-cv-00558, District Court Delaware, filed Jun. 22, 2011, 11 pp.
68Website: "High speed digital transmission of video imag . . . ", (http//www tradezone com/tradesites/novex html), download date: Aug. 5, 1998, 2pp.
69Website: "Remote Video Monitoring Software by PriVIDEye", (http://www.privid-eye.com/index.html), download date: Aug. 5, 1998, 3 pp.
70Website: "Remote video surveillance and monitoring of high-tech, PC-cam adapter?", (http://www novexcanada com/), download date: Aug. 5, 1998, 15pp.
71Website: "Spies: Surveillance, Security, Wiretaps, Prot . . . ", (http://www.spyzone.com/CCSSL1.html), download date: Aug. 5, 1998, 3 pp.
72Website: "SpyZone.Com: CSS Group: Company Profile", (http://www.spyzone.com/CCSSZL1.html), download date: Aug. 5, 1998, 7 pp.
73Wu, Corinna, "Private Eyes-Biometric identification is set to replace passwords and PINs", Science News, Apr. 4, 1998, vol. 153, pp. 216-217, 2pp.
74Wu, Corinna, "Private Eyes—Biometric identification is set to replace passwords and PINs", Science News, Apr. 4, 1998, vol. 153, pp. 216-217, 2pp.
Classifications
U.S. Classification348/143, 348/159
International ClassificationH04N7/18, H04N21/61, G06Q30/06
Cooperative ClassificationG06Q30/06, H04N7/181, H04N21/6125, H04N7/183
Legal Events
DateCodeEventDescription
8 Dec 2014ASAssignment
Owner name: WALKER DIGITAL CORPORATION, CONNECTICUT
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WALKER, JAY S.;TEDESCO, DANIEL E.;ALDERUCCI, DEAN P.;ANDOTHERS;SIGNING DATES FROM 19990211 TO 19990212;REEL/FRAME:034423/0840
Owner name: WALKER DIGITAL, LLC, CONNECTICUT
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WALKER DIGITAL CORPORATION;REEL/FRAME:034423/0869
Effective date: 19991124
Owner name: INVENTOR HOLDINGS, LLC, CONNECTICUT
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WALKER DIGITAL, LLC;REEL/FRAME:034423/0929
Effective date: 20131101