Patent classifications
G07G3/00
Systems and methods for weigh scale perimeter monitoring for scanner-scales
Systems and methods for reducing erroneous weighing of items such as by detecting items extending beyond a periphery of a weigh platter whereby in one configuration, the system employs a light source disposed in or on a housing of a scanner-scale for producing a light beam along an edge of the weigh platter, the light beam being modulated to contain a defined packet of data; a detector for receiving the data-modulated light beam, the detector being disposed in or on the housing; and a processor coupled with the detector for decoding the defined packet of data responsive to the detector receiving the data-modulated light beam. Various indicators for alerting the operator of off-scale detection are also described.
Systems and methods for cloud-based testing of POS devices
A computer-implemented method for cloud-based testing of a payment network may include receiving a test configuration for testing a payment processing network, configuring a simulated worker generator for generating a plurality of simulated workers according to the received test configuration, reading commands to be executed by each simulated worker among the plurality of simulated workers from a command bank according to the received test configuration, configuring the plurality of simulated workers according to the commands and the received test configuration, starting a swarm test of the payment processing network by the plurality of simulated workers, reading results of the swarm test from the plurality of simulated workers, and saving the results to storage.
Self checkout with security checks based on categorized items
Method and apparatus for performing security checks at a self-checkout kiosk in a retail store. The customers can create lists of items for purchase as they shop. When a customer is ready to pay, his list can be divided into sub-lists. Each sub-list can include items that require the same type of security check. The customer can then be provided with the sub-lists and an instruction for each sub-list that explains how the customer should arrange the items on the sub-list for a security check. After the customer has properly arranged the items on a sub-list, the relevant security check can be performed.
Edge-computing-based architectures for multi-layered fraud mitigation
Aspects of the disclosure relate to edge-computing (“EC”)-based systems and methods for fraud mitigation. The systems and methods may utilize a multi-layer architecture. The architecture may include a set of N gatekeeper units, and each gatekeeper unit may be associated with an EC device. When a transaction request is received, the request may be processed at a first gatekeeper unit, and, if validated, successively processed by the set of N gatekeeper units. If any gatekeeper unit flags the request as suspicious, the unit may emit an audible alert that may be sensed by the associated EC device. The EC device may transmit a signal to one or more of the other gatekeeper units to perform additional processing for the request. When the request reaches the N.sup.th gatekeeper unit and achieves validation, the transaction may be executed via a central server connected to a transaction network.
SCAN AVOIDANCE PREVENTION SYSTEM
Example aspects include a method, apparatus and computer-readable medium of determining losses at a point of sale (POS) device, comprising receiving, by a processor from an imaging device, a video feed of a scanning area. The aspects further include detecting, by the processor, an entry of an item into the scanning area. Additionally, the aspects further include identifying, by the processor, one or more motion parameters of the item. Additionally, the aspects further include determining, by the processor, a dwell-time for the item based at least on the one or more motion parameters. Additionally, the aspects further include identifying, by the processor, a scan time anomaly for the item. Additionally, the aspects further include outputting a notification, by the processor, indicating a suspicious activity for the item, wherein the notification indicating the suspicious activity is based on the scan time anomaly.
CHECKOUT APPARATUS, MONITORING APPARATUS, AND MONITORING METHOD
According to one embodiment, a checkout apparatus includes a camera interface and a processor. The camera interface acquires an image from a camera positioned to image a work region of the checkout apparatus and its surroundings in which a person performs a registration of items in a sales transaction and settlement of the sales transaction. The processor performs a registration process for registering items in the sales transaction and also a payment process for settlement of the sales transaction based on the items registered in the registration process. The processor detects whether a person has left the work region based on the image from the camera, then output an alert if it is detected that the person left the work region after performance of the registration process is started but before the payment process is completed.
Dynamic security for a self-checkout terminal
An item level security system is provided that uses dynamic security settings to optimize the competing requirements for high security and transaction throughput. Customer metrics such as customer traffic volume and the number and type of items purchased change over the course of a day and are further influenced by the day of the week and by holidays and certain vacation schedules for local schools and employers. The invention provides dynamic security settings for the item level security system that address the changing customer metrics.
Method and system for identifying goods of intelligent shopping cart
The present disclosure discloses a method and a system for identifying goods of intelligent shopping cart. The method comprises: reading bar code information of a to-be-purchased goods and obtaining corresponding prestored goods information; continuously detecting and obtaining a total goods weight m.sub.n+1 in the shopping cart, and comparing the total goods weight m.sub.n+1 with a total goods weight m.sub.n acquired after a previous purchasing action is completed, to obtain a variation m.sub.Δ of the total goods weight. According to the method of the present disclosure, when a customer puts a goods in the shopping cart in the shopping course, the correct goods is automatically identified and recorded in a shopping list, then the customer can directly settle the account after completing the shopping, accordingly a lot of time for the customers to wait for the settlement is saved.
Method and system for identifying goods of intelligent shopping cart
The present disclosure discloses a method and a system for identifying goods of intelligent shopping cart. The method comprises: reading bar code information of a to-be-purchased goods and obtaining corresponding prestored goods information; continuously detecting and obtaining a total goods weight m.sub.n+1 in the shopping cart, and comparing the total goods weight m.sub.n+1 with a total goods weight m.sub.n acquired after a previous purchasing action is completed, to obtain a variation m.sub.Δ of the total goods weight. According to the method of the present disclosure, when a customer puts a goods in the shopping cart in the shopping course, the correct goods is automatically identified and recorded in a shopping list, then the customer can directly settle the account after completing the shopping, accordingly a lot of time for the customers to wait for the settlement is saved.
Graphical user interface indicator for broadcaster presence
During audio pairing with a broadcaster computing device, a receiver computing device receives audio token data broadcast by the broadcaster computing device via audio communication channels and displays a broadcaster computing device status category to the user via a graphical user interface. In some examples, the receiver computing device receives audio token and determines a broadcaster computing device status category based on determining results of a CRC on the received audio token data. In other examples, the receiver computing device determines a signal score for the received audio token data and determines a broadcaster computing device status category based on the value of the signal score as compared to low and high threshold signal scores determined by an account management system based on aggregate signal score data received from multiple receiver computing devices of a same model as the receiver computing device.