G07G3/00

Automated money laundering detection, notification, and reporting techniques implemented at casino gaming networks

Various aspects described or referenced herein are directed to different methods, systems, and computer program products for implementing automated money laundering detection, notification, and reporting techniques implemented at casino gaming networks.

Protection method for data information about electronic device and protection circuit therefor

Disclosed is a method for protecting data information of an electronic device, comprising the following steps: 1) performing power-on detection on an electronic device of which production and installation are completed, detecting the stray capacitance of a signal line thereof, and recording same as a standard value of the signal line; 2) during a power-on operation, monitoring the stray capacitance of the signal line; 3) comparing the monitored capacitance value with the standard value, and entering step 4) when exceeding the set threshold value, otherwise entering step 2); and 4) erasing significant data in the electronic device. The method uses the manner of monitoring the stray capacitance to monitor the contact of outside foreign matter with the signal line, guarantees the security of data in the electronic device, and has the characteristics that the implementation process is simple and easy, safe and reliable, and the cost is low.

Protection method for data information about electronic device and protection circuit therefor

Disclosed is a method for protecting data information of an electronic device, comprising the following steps: 1) performing power-on detection on an electronic device of which production and installation are completed, detecting the stray capacitance of a signal line thereof, and recording same as a standard value of the signal line; 2) during a power-on operation, monitoring the stray capacitance of the signal line; 3) comparing the monitored capacitance value with the standard value, and entering step 4) when exceeding the set threshold value, otherwise entering step 2); and 4) erasing significant data in the electronic device. The method uses the manner of monitoring the stray capacitance to monitor the contact of outside foreign matter with the signal line, guarantees the security of data in the electronic device, and has the characteristics that the implementation process is simple and easy, safe and reliable, and the cost is low.

Activity verification

Disclosed are various embodiments of systems, methods, and computer programs that facilitate verification of activity in an environment of predefined activity orchestration. Activity is captured on image capture devices in the environment of predefined activity orchestration. The activity is verified to be consistent with the predefined activity orchestration. An event is generated based upon whether the activity is consistent with the predefined activity orchestration.

QUANTITY SENSING STORAGE SYSTEM
20220044197 · 2022-02-10 ·

A quantity sensing storage device enables automatic ordering of a product using an ordering engine that monitors quantity signals generated by a quantity sensor that is configured to provide the quantity signals based on a quantity of a first set of a product stored at the quantity sensing storage device. Base on the quantity of the first set, the ordering engine determines whether an order threshold has been satisfied. The quantity sensing storage device automatically provides instructions to a service provider device via a wireless communication subsystem to order a second set of the product in response to determining that the order threshold has been satisfied. The ordering engine continuously updates the order threshold such that when the second set of the product is received by a user of the quantity sensing storage device, an optimal portion of the first set of the product remains stored in the storage enclosure.

QUANTITY SENSING STORAGE SYSTEM
20220044197 · 2022-02-10 ·

A quantity sensing storage device enables automatic ordering of a product using an ordering engine that monitors quantity signals generated by a quantity sensor that is configured to provide the quantity signals based on a quantity of a first set of a product stored at the quantity sensing storage device. Base on the quantity of the first set, the ordering engine determines whether an order threshold has been satisfied. The quantity sensing storage device automatically provides instructions to a service provider device via a wireless communication subsystem to order a second set of the product in response to determining that the order threshold has been satisfied. The ordering engine continuously updates the order threshold such that when the second set of the product is received by a user of the quantity sensing storage device, an optimal portion of the first set of the product remains stored in the storage enclosure.

TRUSTED MONITORING SYSTEM AND METHOD
20220237997 · 2022-07-28 ·

Methods and apparatus for monitoring remotely located objects with a system including at least one master data collection unit, remote sensor units, and a central data collection server are described. The master unit is configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the monitored objects. The master unit may be in a fixed location or attached to a mobile object. The master unit is configured for monitoring objects that enter and leave an area. The master unit may act as a parent controller for one or more child devices including remote sensors or monitors of measurable conditions including environmental conditions, substance identification, product identification, and/or biometric identification. The master unit may discover remote sensor units as they enter or leave the area where the master unit is located. The master unit can be remotely reprogrammed such as with authenticated instructions.

TRUSTED MONITORING SYSTEM AND METHOD
20220237997 · 2022-07-28 ·

Methods and apparatus for monitoring remotely located objects with a system including at least one master data collection unit, remote sensor units, and a central data collection server are described. The master unit is configured to monitor any object, mobile or stationary, including monitoring multiple remote sensor units associated with the monitored objects. The master unit may be in a fixed location or attached to a mobile object. The master unit is configured for monitoring objects that enter and leave an area. The master unit may act as a parent controller for one or more child devices including remote sensors or monitors of measurable conditions including environmental conditions, substance identification, product identification, and/or biometric identification. The master unit may discover remote sensor units as they enter or leave the area where the master unit is located. The master unit can be remotely reprogrammed such as with authenticated instructions.

Total Property Intelligence System
20210406556 · 2021-12-30 ·

A total property security system may be implemented to conduct security and surveillance operations. The system includes security operations centers that are connected to one or more sensors and vehicles for collecting and transmitting surveillance data to a database hosted on cloud services. The collected surveillance data is analyzed in order to automatically deploy security measures and/or recommend courses of action using a rules engine that can be configured to client-specific or user-specific security needs. The cloud services can provide a set of application program interface services that can act on the surveillance operations center. Sensor fusion data and other surveillance data can be also transmitted to vetted monitoring service providers on a subscription basis to provide physical security services to the area within the property perimeter. During the subscription period, the selected monitoring service providers can obtain time-based encryption token for accessing surveillance data.

Total Property Intelligence System
20210406556 · 2021-12-30 ·

A total property security system may be implemented to conduct security and surveillance operations. The system includes security operations centers that are connected to one or more sensors and vehicles for collecting and transmitting surveillance data to a database hosted on cloud services. The collected surveillance data is analyzed in order to automatically deploy security measures and/or recommend courses of action using a rules engine that can be configured to client-specific or user-specific security needs. The cloud services can provide a set of application program interface services that can act on the surveillance operations center. Sensor fusion data and other surveillance data can be also transmitted to vetted monitoring service providers on a subscription basis to provide physical security services to the area within the property perimeter. During the subscription period, the selected monitoring service providers can obtain time-based encryption token for accessing surveillance data.