Patent classifications
G07G3/00
READING DEVICE
According to one embodiment, a reading device is configured to read information from an RFID tag attached to a product. The reading device includes a housing, an antenna, an opening-and-closing lid, a detector, a reading unit, and an alert unit. The housing includes an opening portion, and therein a space for accommodating the product. The antenna is provided within the space. The opening-and-closing lid is opening and closing the opening portion. The detector is configured to detect an open or closed state of the opening-and-closing lid. The reading unit is configured to read the information from the RFID tag. The alert unit is configured to issue an alert on an operation method in accordance with the open or closed state of the opening-and-closing lid and an operation state of the reading unit.
POS DEVICE, CONTROL METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
A point of sales (POS) device includes: a movable part configured to be switchable between a first position in which the movable part faces in a first direction and a second position in which the movable part faces in a second direction; a sensor configured to detect an object in a detection range including the first direction; and a control circuit configured to determine whether the movable part is in the first position and if the movable part is in the first position, control notification to a store clerk in accordance with a detection signal from the sensor.
Edge-computing-based architectures for multi-layered fraud mitigation
Aspects of the disclosure relate to edge-computing (“EC”)-based systems and methods for fraud mitigation. The systems and methods may utilize a multi-layer architecture. The architecture may include a set of N gatekeeper units, and each gatekeeper unit may be associated with an EC device. When a transaction request is received, the request may be processed at a first gatekeeper unit, and, if validated, successively processed by the set of N gatekeeper units. If any gatekeeper unit flags the request as suspicious, the unit may emit an audible alert that may be sensed by the associated EC device. The EC device may transmit a signal to one or more of the other gatekeeper units to perform additional processing for the request. When the request reaches the N.sup.th gatekeeper unit and achieves validation, the transaction may be executed via a central server connected to a transaction network.
Method and apparatus for detecting suspicious activity using video analysis
A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment.
Method and apparatus for detecting suspicious activity using video analysis
A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment.
Currency trapping detection
Cash trapping at an Automated Teller Machine (ATM) is detected in real time. One or more images from one or more cameras are analyzed. The camera(s) is/are focused overhead of the ATM or on a cash slot of a dispense module for the ATM. The images are analyzed for determining one or more of whether the dispenser module is authentic, whether the cash slot opened or did not open when it should have opened for a cash withdraw, whether visual features of the dispense module have changed over a configurable period of time, and whether hands, gestures, and actions of a person present at the ATM indicate that cash trapping is taking place at the ATM. When cash trapping is detected at the ATM a variety of automated actions are processed, such as shutting down the dispense module, shutting down the ATM, notifying a financial institution, and/or notifying legal authorities.
Self-detachable RFID tags
Systems and methods for operating an RFID tag. The methods comprise: inducing current through a magnetic loop or solenoid disposed within the RFID tag that is caused by a inductive field, a magnetic field or an RF field being generated within a surrounding environment; using the current which is induced through the magnetic loop or solenoid to charge a capacitor disposed within the RFID tag; decreasing the amount of current induced through the magnetic loop or solenoid; receiving a detaching signal at the RFID tag; electrically connecting the capacitor to a detaching unit disposed within the RFID tag in response to the detaching signal; and activating the detaching unit by supplying current from the capacitor to the detaching unit, whereby the RFID tag can be detached from an article.
SYSTEMS AND METHODS OF AUTHENTICATING ITEMS
In some embodiments, systems and methods provide distributed item authentication. In some embodiments systems comprise: a housing; a set of sensor systems; a transceiver; and an authentication control circuit configured to: obtain first sensor data of an item being authenticated, obtain an initial identification of the item; access an item authentication block specific to the item; obtain a first set of authentication instructions; control one or more sensor systems in accordance with the first set of authentication instructions; compare multiple current authentication sensor data to the set of multiple historic authentication sensor data; confirm that each of a threshold number of the multiple current authentication sensor data is consistent within a threshold variation of a corresponding one of the set of multiple historic authentication sensor data; and cause the item authentication block to be updated to include the confirmation of authentication of the item.
CHECKOUT-PAYMENT DEVICE AND CHECKOUT-PAYMENT SYSTEM
A checkout-payment device includes a controller configured to recognize items to be purchased by a user from an image captured by a camera, make checkout and payment for the recognized items, and perform face recognition to identify the user based on an image of the user’s face captured by a second camera, wherein, upon recognition of an age-restricted item, after identifying a user, the controller performs age verification based on information on the age of the identified user to determine whether the user is subject to the age restrictions. The device also includes a touch screen display configured to display results of operations for item recognition, checkout and payment, and face recognition.
Printer method and apparatus
A printer has a light source that directs light toward a print medium path. An RGB sensor is positioned to receive light from the light source that is reflected by the print medium. An infrared light filter is situated between the RGB sensor and the paper to filter out infrared light. A programmed processor is coupled to an output of the RGB sensor in order to detect form elements in the output from the RGB light sensor, retrieve a stored electronic representation of a form, match the form elements to the stored electronic representation of the form to identify locations on the form, and control printing to the form.