G07G3/00

MULTIPLE-FACTOR VERIFICATION FOR VISION-BASED SYSTEMS
20230041775 · 2023-02-09 ·

A system and method for interaction monitoring in a retail environment that includes executing a first monitoring system and thereby generating a first evaluation of customer selection of items; executing a second monitoring system and thereby generating a second evaluation of customer selection of items; determining monitoring alignment between the first evaluation and the second evaluation of a first customer; and triggering an action in response to the monitoring alignment.

MULTIPLE-FACTOR VERIFICATION FOR VISION-BASED SYSTEMS
20230041775 · 2023-02-09 ·

A system and method for interaction monitoring in a retail environment that includes executing a first monitoring system and thereby generating a first evaluation of customer selection of items; executing a second monitoring system and thereby generating a second evaluation of customer selection of items; determining monitoring alignment between the first evaluation and the second evaluation of a first customer; and triggering an action in response to the monitoring alignment.

Threat monitoring and notifications

A system for monitoring financial threats includes: at least one central processing unit and system memory that causes the system to: receive information about a threat associated with a financial services device; identify a type of the threat; identify a location associated with the threat; and notify one or more customers associated with the financial services device based upon the type or the location of the threat.

SELF-SERVICE TERMINAL (SST) MANAGEMENT ASSISTANCE
20230095391 · 2023-03-30 ·

Two or more simultaneous conditions occurring during two or more Self-Service transactions that require a response from an attendant of a management terminal are evaluated in real time. A suggested or an expected response of the attendant for each transaction is determined based on the evaluation. A priority for each expected response relative to the other expected responses is determined based on the evaluation. A queue of the expected responses in priority order is provided in real time to the management terminal for action on the expected responses in the priority order by the attendant.

Systems and methods of detecting scan avoidance events

Methods of detecting scan avoidance events when items are passed through a field of view (FOV) of a scanner are disclosed herein. An example method, during a decode session, receiving, at one or more processors of the symbology reader, an image of an object; during a timeout period, detecting, at the one or more processors, an indicia in the image of the object, the indicia having a decodable payload; during the timeout period, attempting to decode the indicia to identify the decodable payload, at the one or more processors; and after the timeout period expires, when at least one portion but less than all portions of the indicia is decodable, determining a potential scan avoidance attempt and generating a scan avoidance alarm signal.

Non-scan loss verification at self-checkout terminal

A system and method for verifying a non-scan item at a self-checkout point-of-sale terminal is provided. A merchandise item that isn't scanned at the self-checkout terminal is identified by a detection system. Further, a user helper device is provided to verify the incident by prompting the shopper for an input. The user helper device is operably connected to the self-checkout point-of-sale terminal and the detection system to determine and verify a fraudulent incident occurring during a transaction activity by the shoppers. Further, a store attendant device is provided for human intervention when necessary.

REGISTRATION CHECKING APPARATUS, CONTROL METHOD, AND NON-TRANSITORY STORAGE MEDIUM
20230073167 · 2023-03-09 · ·

A registration checking apparatus (2000) determines, for a target transaction, whether a relation between the number of times scanning actions are performed and the number of products registered as checkout targets satisfies a predetermined condition. The scanning action is detected by analyzing a video (12). The registration checking apparatus (2000) performs predetermined output processing when the relation does not satisfy the predetermined condition. The predetermined condition is a condition being satisfied when the number of registered products is equal to or greater than the number of detected scanning actions.

METHOD, CONTROL DEVICE AND REGISTRATION TERMINAL FOR COMPUTER-SUPPORTED DETECTION OF THE EMPTY STATE OF A TRANSPORT CONTAINER

In accordance with various embodiments, a method (100) for the computer-aided recognition of a transport container (402) being empty can comprise: determining (101) one or more than one segment of image data of the transport container (402) using depth information assigned to the image data; assigning (103) the image data to one from a plurality of classes, of which a first class represents the transport container (402) being empty, and a second class represents the transport container (402) being non-empty, wherein the one or more than one segment is not taken into account in the assigning; outputting (105) a signal which represents the filtered image data being assigned to the second class.

SYSTEMS AND METHODS OF DETECTING FRAUDULENT ACTIVITY AT SELF-CHECKOUT TERMINALS

Methods and systems for detecting fraudulent activity at a self-checkout terminals of a retail store include a scanner for scanning an identifier of a candidate product located in the product-scanning area of the self-checkout terminal, and one or more sensors that detect at least one physical characteristic of the candidate product located in the product-scanning area of the self-checkout terminal. A computing device then correlates the obtained electronic data corresponding to actual identifying characteristic information associated with the candidate product to the reference physical characteristic information associated with the reference product in order to generate a similarity score between the actual and reference physical characteristic information. If the similarity score is above a predetermined similarity threshold, the self-checkout terminal is permitted to process a purchase of the candidate product, but if the similarity score is below the threshold, the self-checkout terminal is restricted from processing the purchase.

Mechanism for video review at a self-checkout terminal
11477415 · 2022-10-18 · ·

A system and method for replaying a security video at the time of a fraudulent incident at a point-of-sale checkout terminal is presented. The video playback takes place in real-time, when the event occurs, allowing personnel to take appropriate measures, corrective or otherwise, to deal with the event. Examples of such events may include when a weight-based security alert is triggered at a self-checkout, when a cashier or customer has missed scanning an item at the checkout, or other possible events where rapid replay of relevant video is required.