G07G3/003

MONITORING DEVICE AND MONITORING METHOD
20230162576 · 2023-05-25 ·

A monitoring device for monitoring a customer operating a checkout terminal in a store, includes a network interface configured to communicate with the checkout terminal configured to perform checkout processing and an attendant terminal, a camera interface through which an image captured by a camera is received, the camera being installed so as to image the customer operating the checkout terminal, and a processor configured to, upon receipt of a first command indicating that the checkout processing has been started from the checkout terminal, begin monitoring of the image captured by the camera, upon detection of presence of the customer in the image, acquire feature information representing features of the customer from the image, and upon detection of absence of the customer in the image after the feature information is acquired, control the network interface to output to the attendant terminal an alert signal with the acquired feature information.

Controlling locations shared among multiple operators

A method includes controlling a shared location. Item identifiers are read from a set of items (pertaining to one or more operators sharing the shared location) reaching a gate of the shared location. A verification request message for the item identifiers is broadcast for receiving corresponding verification response messages from central computing systems of the operators. A passage of the items through the gate is controlled according to the verification response messages. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.

RFID DETECTION OF ARTICLES WITHOUT A DATABASE
20230106047 · 2023-04-06 ·

Apparatus and methods for self-checkout at a retail establishment includes receiving, by a sensor gate and from a payment processing device, purchase transaction information related to a purchase by a customer. The sensor gate scans customized label attached to each article possessed by the customer located in a surveillance zone of the retail establishment. The sensor gate compares information contained in the customized label with the received purchase transaction information.

Method, System, and Computer Program Product for Identifying a Malicious User

A method, system, and computer program product for identifying a malicious user obtain a plurality of service requests for a service provided by a processing system, each service request of the plurality of service requests being associated with a requesting user and a requesting system, and a plurality of service responses associated with the plurality of service requests, each service response of the plurality of service responses being associated with the processing system; and identify the requesting user as malicious based on the plurality of service requests and the plurality of service responses.

VERIFICATION OF ITEMS BY AUTOMATED CHECKOUT SYSTEM
20230147176 · 2023-05-11 ·

In some implementations, a system for verifying items in a retail environment includes a physical shopping cart including a first set of sensors, and an automated checkout station including a second, different set of sensors. The physical shopping cart receives item verification data for verifying an item, detects the item as it enters the physical shopping cart, and performs a primary verification of the item. The automated checkout station obtains a virtual shopping cart that corresponds to the physical shopping cart. The virtual shopping cart includes a list of items that have been placed in the physical shopping cart, and a verification status of each item. The second, different set of sensors generate station sensor data that represents the physical shopping cart and the items in the physical shopping cart. A secondary verification of the physical shopping cart and its contents is performed by the automated checkout station.

Machine learning-based determination of limits on merchant use of a third party payments system

In general, in one aspect, one or more embodiments relate to a method including receiving, in a business rules engine, input data from disparate data sources. The input data describes a merchant and an application by the merchant to use an electronic payments system for processing transactions between the merchant and customers. Featurization is performed on the input data to form a machine readable vector. By applying the machine readable vector as input to a machine learning model in a machine learning layer, a risk score is predicted. The machine learning model is trained using training data describing use of the electronic payments system by other merchants. The risk score is an estimated probability of the merchant being unable to satisfy an obligation of using the electronic payments system. A business rules engine, based on the risk score, limits use of the electronic payments system by the merchant.

INFORMATION PROCESSING METHOD, INFORMATION PROCESSING DEVICE, AND RECORDING MEDIUM
20230136054 · 2023-05-04 · ·

An information processing method according to an aspect of the present disclosure includes: acquiring, from a video, flow line information of a customer; detecting that the customer acquires an item; and storing, in a storage, flow line information of the customer and information on a number of items acquired by the customer, in association with each other.

FRAUDULENT ACT ESTIMATION DEVICE AND CONTROL PROGRAM THEREFOR AND FRAUDULENT ACT ESTIMATION METHOD
20230196778 · 2023-06-22 ·

According to an embodiment, a fraudulent act estimation device includes a first acquiring unit, an action recognizing unit, a second acquiring unit, and an output unit. The first acquiring unit acquires operation information from commodity registration operation by a customer at a settlement terminal. The action recognizing unit recognizes an action of the customer at the settlement terminal. The second acquiring unit acquires a reliability degree for the action of the customer. The output unit outputs result information based on the operation information and the reliability degree.

MEASUREMENT INFORMATION PROCESSING MODE SWITCHING SYSTEM

Systems and methods of automatically switching measurement information processing modes related to a self-checkout kiosk. In one exemplary embodiment, a method is performed by an electronic device that includes processing circuitry. The method may include detecting, using object recognition, at least one object present in real-time captured imagery. The method may further include, responsive to detecting the at least one object present in the real-time captured imagery, switching measurement information processing modes from a first measurement information processing mode to a second measurement information processing mode.

Self-detachable RFID tags

Systems and methods for operating an RFID tag. The methods comprise: inducing current through a magnetic loop or solenoid disposed within the RFID tag that is caused by a inductive field, a magnetic field or an RF field being generated within a surrounding environment; using the current which is induced through the magnetic loop or solenoid to charge a capacitor disposed within the RFID tag; decreasing the amount of current induced through the magnetic loop or solenoid; receiving a detaching signal at the RFID tag; electrically connecting the capacitor to a detaching unit disposed within the RFID tag in response to the detaching signal; and activating the detaching unit by supplying current from the capacitor to the detaching unit, whereby the RFID tag can be detached from an article.