G07G3/00

APPARATUS, SYSTEM AND METHOD FOR SECURE TRANSACTIONS AND MONITORING IN A RETAIL ENVIRONMENT
20170308885 · 2017-10-26 ·

An apparatus, system method of providing mobile checkout. The apparatus, system and method may include obtaining, via an opt-in to an in-store wireless network, of consumer device data regarding a plurality of consumer mobile devices, the consumer data comprising device use data, prior purchase data, and GPS data, receiving video surveillance data related to at least one consumer having consumer device data, interrelating, from at least one non-transitory computer-readable medium storing at least the consumer device data and the video surveillance data, of at least the consumer device data and the video surveillance data by at least one computing processor, and applying, by the computing processor, of a plurality of business rules to the interrelated datas to enable at least the mobile checkout, wherein the mobile checkout includes a purchase of at least one in-store item via the consumer device associated with the purchasing one of the at least one consumer.

EDGE-COMPUTING-BASED ARCHITECTURES FOR MULTI-LAYERED FRAUD MITIGATION
20220060504 · 2022-02-24 ·

Aspects of the disclosure relate to edge-computing (“EC”)-based systems and methods for fraud mitigation. The systems and methods may utilize a multi-layer architecture. The architecture may include a set of N gatekeeper units, and each gatekeeper unit may be associated with an EC device. When a transaction request is received, the request may be processed at a first gatekeeper unit, and, if validated, successively processed by the set of N gatekeeper units. If any gatekeeper unit flags the request as suspicious, the unit may emit an audible alert that may be sensed by the associated EC device. The EC device may transmit a signal to one or more of the other gatekeeper units to perform additional processing for the request. When the request reaches the N.sup.th gatekeeper unit and achieves validation, the transaction may be executed via a central server connected to a transaction network.

IMAGE ANALYSIS APPARATUS, MONITORING SYSTEM, AND CHECKOUT SYSTEM
20220058609 · 2022-02-24 ·

An image analysis apparatus includes a first interface connectable to a camera configured to capture an image of a predetermined area in which registration and payment processes for one or more commodities to be purchased are performed using a checkout apparatus and a processor. The processor is configured to when the payment process is performed, determine whether an unregistered commodity is present in the area using the image, upon determining that an unregistered commodity is present in the area, determine whether a customer is present in the area, and upon determining that the customer is not present in the area, output an alert signal.

IMAGE ANALYSIS APPARATUS, MONITORING SYSTEM, AND CHECKOUT SYSTEM
20220058609 · 2022-02-24 ·

An image analysis apparatus includes a first interface connectable to a camera configured to capture an image of a predetermined area in which registration and payment processes for one or more commodities to be purchased are performed using a checkout apparatus and a processor. The processor is configured to when the payment process is performed, determine whether an unregistered commodity is present in the area using the image, upon determining that an unregistered commodity is present in the area, determine whether a customer is present in the area, and upon determining that the customer is not present in the area, output an alert signal.

RANKING AND TRACKING SUSPICIOUS PROCUREMENT ENTITIES

An apparatus, method and computer program product for identifying fraud in transaction data. The method includes: receiving invoice data comprising a vendor, a requestor and events, receiving public data and private data sources, computing a vendor risk score using the public and private data sources matching the vendor of the invoice data, computing a requestor risk score using the public data sources and the private data sources matching the requestor of the invoice data, computing an active invoice score using the vendor risk score and the requestor risk score and when the active invoice score is greater than a predetermined amount, blocking the invoice data. In one embodiment, computing a vendor risk score comprises obtaining a weight and a confidence for the event, calculating an event vendor risk score using the weight times the confidence and combining the event vendor risk scores for all of the events.

Investigation generation in an observation and surveillance system
09786113 · 2017-10-10 ·

The present disclosure is directed to systems and methods for generating investigations of user behavior. In an example embodiment, the system includes a video camera configured to capture video of user activity, a video analytic module to perform real-time video processing of the captured video to generate non-video data from video, and a computer configured to receive the video and the non-video data from the video camera. The computer includes a video analytics module configured to analyze one of video and non-video data to identify occurrences of particular user behavior, and an investigation generation module configured to generate an investigation containing at least one video sequence of the particular user behavior. In some embodiments, the investigation is generated in near real time. The particular user behavior may be defined as an action, an inaction, a movement, a plurality of event occurrences, a temporal event and/or an externally-generated event.

DEVICES, SYSTEMS, AND METHODS FOR OPTICAL VALIDATION

Existing currency validation (CVAL) devices, systems, and methods are too slow, costly, intrusive, and/or bulky to be routinely used in common transaction locations (e.g., at checkout, at an automatic teller machine, etc.). Presented herein are devices, systems, and methods to facilitate optical validation of documents, merchandise, or currency at common transaction locations and to do so in an obtrusive and convenient way. More specifically, the present invention embraces a validation device that may be used alone or integrated within a larger system (e.g., point of sale system, kiosk, etc.). The present invention also embraces methods for currency validation using the validation device, as well as methods for improving the quality and consistency of data captured by the validation device for validation.

DEVICES, SYSTEMS, AND METHODS FOR OPTICAL VALIDATION

Existing currency validation (CVAL) devices, systems, and methods are too slow, costly, intrusive, and/or bulky to be routinely used in common transaction locations (e.g., at checkout, at an automatic teller machine, etc.). Presented herein are devices, systems, and methods to facilitate optical validation of documents, merchandise, or currency at common transaction locations and to do so in an obtrusive and convenient way. More specifically, the present invention embraces a validation device that may be used alone or integrated within a larger system (e.g., point of sale system, kiosk, etc.). The present invention also embraces methods for currency validation using the validation device, as well as methods for improving the quality and consistency of data captured by the validation device for validation.

INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM
20170278362 · 2017-09-28 · ·

An information processing device (10) includes an image acquisition unit (110) that acquires an image obtained by capturing a vicinity of a merchandise self-checkout system, and a detection unit (120) that detects a presence or absence of a plurality of persons within a first area in the vicinity of the merchandise self-checkout system during a time period between a start and end of a merchandise self-checkout process based on the acquired image.

IDENTIFICATION AND IMAGING OF TERMINAL-PROXIMATE EVENT OCCURENCES
20170251183 · 2017-08-31 ·

Various embodiments herein each include at least one of systems, methods, and software for identification and imaging of terminal-proximate event occurrences. One such embodiment is in the form of a method that includes detecting an event occurrence and selecting at least one digital image captured with regard to a location of the detected event. This method further includes providing each of the at least one selected digital images to at least one location.