G06Q20/208

METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS
20230215180 · 2023-07-06 ·

A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment.

ARTICLE MANAGEMENT SYSTEM AND ARTICLE MANAGEMENT METHOD

An article management system includes one or more first antennas provided on a side of a first prescribed region and one or more second antennas provided on a side of a second prescribed region such that the first antennas and the second antennas have respective reading target areas which at least partially do not overlap with each other; a reader/writer configured to read article information stored in an RFID tag attached to an article by using the first antennas and the second antennas, respectively; and a management device configured to manage the article information read by the reader/writer from the RFID tag.

Data-driven machine-learning theft detection

A machine-learning algorithm is trained with features relevant to basket data for items of transactions. The trained algorithm is trained to predict whether a given transaction is more or less likely to be associated with theft being engaged in by a transaction operator for the transaction. The trained algorithm is then provided basket data for a given transaction and produces as output a theft prediction value. When the theft prediction value exceeds a configured threshold value, the transaction is flagged for manual intervention or the transaction is flagged for subsequent manual verification.

Automated object recognition kiosk for retail checkouts
11551287 · 2023-01-10 · ·

A system, method, and apparatus for automated object recognition and checkout at a retail kiosk is provided. The system includes a controller configured with a processor and a memory to control operations of the automated retail checkout system. The system further includes an imaging device in communication with the controller and configured to create multiple electronic images of an object, such as a product for purchase. The system also includes an object recognition device in communication with the controller and the imaging device. The processor may execute software to receive electronic images from the imaging device, extract at least one feature from the images, and recognize the object based on a predetermined model being applied to the extracted feature from the images. The system also includes a display device to display an indication of the recognized object from the object recognition device.

Open-type self-service vending method based on buyer positioning, and system

An open self-service sales system based on positioning of customers includes an open partitioned weight-sensing rack including multiple storage subareas. The open self-service sales system further includes a positioning module and an automatic weighing unit which are connected to the central control module. The position information of the customer is bound with the subareas to accurately identify customers and the purchasing behaviors. The data flow is simple and reliable, and a large number of computing is avoided, which is suitable for large customer flows.

GENERATING SECURITY EVENT CASE FILES FROM DISPARATE UNSTRUCTURED DATA
20230004978 · 2023-01-05 ·

Described herein are systems and methods for generating security event case files with unstructured data. For example, the method can include receiving, by a computing system, unstructured data and system-based inferences from devices positioned throughout a store, and adding structure to the unstructured data and system-based inferences based on applying one or more structuring models. Adding structure can include labeling the data and system-based inferences, classifying them into security event categories, and identifying objective identifiers to identify users in the data and system-based inferences. The method also can include generating case files for each of the objective identifiers, where the case files include the associated data. The method can include determining whether the case files satisfy alerting rules. The case files can then be reported out and acted upon (e.g., based on satisfying the alerting rules) and/or stored for subsequent analysis and use.

Method of providing digital content for users of physical items

Systems, apparatuses, and methods are provided for enhancing users' overall experiences with physical items by supplementing their physical experiences with digital experiences. According to an embodiment, a user uses an electronic device to scan a smart tag associated with an item to obtain an item identifier of the item. The electronic device sends the item identifier to a server, which selects digital content related to the item and sends the selected digital content to the user's electronic device for display.

Radar based sensing for retail applications

A radar system for monitoring shelves in a retail environment, where the system monitors the occupancy of the shelves and/or the dynamics of the customers in front of the shelves. The radar is preferably a wideband 3D imaging MIMO radar.

Non-contact media control system and method
11544696 · 2023-01-03 · ·

The present disclosure relates to a method for conducting a transaction while in proximity of a local retail network operated by a retail point of sale comprising: a) receiving an identification signal related to one or more media identifiers associated with a media control device and from a user mobile device, wherein the user mobile device is connected to a first network; b) transmitting data to the user mobile device to render a media control interface on the user mobile device; c) receiving one or more instruction signals from the user mobile device, wherein the one or more instruction signals are related to one or more outputs of one or more media devices in proximity to the user mobile device; d) transmitting the one or more instruction signals to a media control device, such that the media control device instructs the one or more media devices to generate the one or more outputs; e) disabling a connection between the user mobile device and the media control device based upon occurrence of a pre-determined condition.

SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT

Systems and methods for securely generating and printing documents are disclosed. For example, processor(s) of a computer system may receive information for the document from a computing device through a network, verify the information for the document, and upon verification, generate document generation data using at least a portion of the information for the document. The document generation data may include document metadata that enables generation of an image of the document and/or the image of the document. Upon the processor(s) verifying first authentication information of a first code associated with a printing device received from the computing device through the network and second authentication information of a second code associated with the computing device received from the printing device through the network, the processor(s) may transmit the document generation data to the printing device through the network, and cause the printing device to print the image of the document.