G07G3/003

NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM, NOTIFICATION METHOD, AND INFORMATION PROCESSING DEVICE
20230097352 · 2023-03-30 · ·

An information processing device acquires, from an accounting machine, product information generated when the accounting machine reads a code on a product identifies a first feature amount related to first number of times indicating number of products purchased, based on the acquired product information acquires an image obtained by capturing an image of an object disposed in a certain area adjacent to the accounting machine and containing the product identifies a second feature amount related to second number of times indicating number of times of taking out operations of a product placed in the object and notifies with an alert based on the first feature amount and the second feature amount.

NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING APPARATUS
20230093938 · 2023-03-30 · ·

An information processing apparatus obtains image data in which a predetermined area in front of an accounting machine, which is used by a user to register an article and pay the bill, is captured. Then, the information processing apparatus inputs the image data in a machine learning model that is trained to identify an article and a storage for the article, and obtains the output result. Subsequently, the information processing apparatus refers to the article and the storage specified in the output result, and identifies the action taken by the user with respect to the article.

END USER TRAINING FOR COMPUTER VISION SYSTEM

Embodiments herein describe providing feedback to a shopper at a POS system using a computer vision system. Many items at a store may lack barcodes or other identifying marks such as produce. The shopper may have to perform an action to identify the item to the POS system. The computer vision system can double check the identify provided by the shopper to reduce mistakes and deter nefarious actors. If the computer vision system cannot independently confirm that the item being purchased matched the identity provided by the shopper, the POS system can display a graphical user interface (GUI) that includes an image of the item captured by the computer vision system along with identification data of the item identified by the shopper. This gives the shopper a chance to correct any mistakes.

Passage gate for emergency opening and a checkout counter
11486184 · 2022-11-01 · ·

A passage gate for allowing or preventing people to enter or to exit a passage area comprising a base portion (110) and a panel portion (120) is provided. The passage gate (100) is configured to be driven in a first operation mode and a second operation mode. When the passage gate (100) is driven in the first operation mode the panel portion (120) is slidable relative the base portion (110) between a first open position, allowing people to pass, and a closed position preventing people from passing through the passage gate (100). When the passage gate (100) is driven in the second operation mode the base portion (110) is rotatable between the closed position and a second open position for achieving a larger passage area.

Registry verification with authentication using a mobile device
11488455 · 2022-11-01 · ·

A mechanized store uses a mobile device to authenticate the user. Items removed from one or more displays of the mechanized store by the user are tracked and a list of items removed by the user is updated. The list of items removed is linked with an account of the user.

Systems and methods of detecting scan avoidance events

Methods of detecting scan avoidance events when items are passed through a field of view (FOV) of a scanner are disclosed herein. An example method, during a decode session, receiving, at one or more processors of the symbology reader, an image of an object; during a timeout period, detecting, at the one or more processors, an indicia in the image of the object, the indicia having a decodable payload; during the timeout period, attempting to decode the indicia to identify the decodable payload, at the one or more processors; and after the timeout period expires, when at least one portion but less than all portions of the indicia is decodable, determining a potential scan avoidance attempt and generating a scan avoidance alarm signal.

CHECKOUT DEVICE AND CONTROL METHOD THEREOF
20230092824 · 2023-03-23 ·

A checkout device in a point of sales (POS) system includes a table on which one or more merchandise items can be placed, a scale configured to measure a total weight of the merchandise items placed on the table, a scanner configured to read an image displayed on a terminal operated by a customer, and a processor. The processor is configured to, upon receipt of the image by the scanner, determine one or more merchandise items that have been registered by the customer using the terminal, determine a total weight of the registered merchandise items using a weight predetermined for each merchandise item, determine whether a difference between the determined total weight and the measured total weight exceeds a threshold, and upon determining that the difference exceeds the threshold, issue an abnormal command.

Linked transaction camera with cached video log
11611724 · 2023-03-21 · ·

A management terminal manages a plurality of Self-Service Terminals (SSTs) for customer-assistance, transaction overrides, theft determinations, and transaction security audits. One or more overhead cameras stream real-time video of the transactions being processed at the SSTs to a server. Transaction data produced in real time at the SSTs are also provided to the server. The video is correlated with the transaction data and evaluated for security events. The video is also cached on the server. An operator of the management terminal can access a video review interface based on events and/or information visually gleaned by the operator during the transactions. The interface permits the operator to view a configured cached portion of the video captured for any given transaction to provide context to the operator for determining whether to perform or whether not to perform a transaction audit.

Systems and methods for detecting potential shrink events via RFID technology

Systems and methods for detecting potential shrink events via RFID technology are provided. The systems include a point of sale (POS) system that includes an optical scanner, an RFID transceiver arrangement, a user interface and a controller. The controller is configured to perform example methods disclosed herein. For example, the controller may detect that the optical scanner has decoded a barcode, trigger the RFID transceiver arrangement to write a data string to an RFID tag located within the object scanning area, conduct a detection operation to detect the RFID tag with the data string in the bagging area. Responsive to detecting the RFID tag with the data string, the method involves the user interface performing a first operation. Responsive to not detecting the RFID tag with the data string, the method involves the user interface performing a second operation.

Non-scan loss verification at self-checkout terminal

A system and method for verifying a non-scan item at a self-checkout point-of-sale terminal is provided. A merchandise item that isn't scanned at the self-checkout terminal is identified by a detection system. Further, a user helper device is provided to verify the incident by prompting the shopper for an input. The user helper device is operably connected to the self-checkout point-of-sale terminal and the detection system to determine and verify a fraudulent incident occurring during a transaction activity by the shoppers. Further, a store attendant device is provided for human intervention when necessary.