Patent classifications
G06Q50/265
Operations system for combining independent product monitoring systems to automatically manage product inventory and product pricing and automate store processes
In some implementations, a device may receive data identifying products and encoded data identifying smart tags of the products. The device may map the data and the encoded data to generate encoded product data. The device may receive encoded data provided by smart tags of products received by a store. The device may receive images of the products. The device may compare the encoded data and the encoded product data to identify a set of the products received by the store. The device may correlate the images with the set of the products. The device may process the correlated data to identify locations of the set of the products in the store. The device may generate an instruction to relocate a product to a new location and may provide the instruction to a device, associated with the store, to cause the product to be relocated to the new location.
AUTHENTICATION SYSTEM, METHOD, AND COMPUTER-READABLE RECORDING MEDIUM
Provided is an authentication system that improves user convenience. This authentication system includes at least one first terminal, a plurality of second terminals, and a server device. The first terminal is capable of providing services using a biometric authentication function or non-biometric authentication function. Each of the second terminals is capable of switching between a biometric authentication function and a non-biometric authentication function and capable of providing services using the biometric authentication function or non-biometric authentication function. The server device is connected to the first terminal and the plurality of second terminals. The server device calculates the rate of usage of a biometric authentication function by the at least one first terminal. The server device determines an operation mode for at least one of the plurality of second terminals on the basis of the calculated rate of usage.
System Providing Self-Service Access to Locked Merchandise
A system providing self-service access to locked merchandise comprising: (a) providing a fixture that restricts access to the locked merchandise, wherein the fixture can automatically lock or unlock, allowing or restricting access to the locked merchandise; (b) providing a means of uniquely identifying an individual attempting to access the merchandise; (c) measuring a set of behaviors of the individual during any time the fixture is an open mode; (d) assessing whether the set of behaviors of the individual are suspicious or not relative to a set of suspicious event thresholds; (e) storing the individual and their set of behaviors as accessible records in at least one database; and (f) providing an algorithm which determines future access privileges of the individual to the enclosure based on a set of variables.
Method, system, and computer program product for identifying a malicious user
A method, system, and computer program product for identifying a malicious user obtain a plurality of service requests for a service provided by a processing system, each service request of the plurality of service requests being associated with a requesting user and a requesting system, and a plurality of service responses associated with the plurality of service requests, each service response of the plurality of service responses being associated with the processing system; and identify the requesting user as malicious based on the plurality of service requests and the plurality of service responses.
Fully-automated self-divesting screening system and method
Various embodiments of the present invention are directed toward systems and methods relating to security screening. For example, a screening system includes a chamber configured to accommodate a user to be screened, and a chamber scanner. The chamber scanner is configured to scan the user to identify whether the user is carrying an undivested item that needs to be divested. The chamber is configured to release the user to proceed from the chamber to a secure area, upon confirmation that no undivested items are to be divested.
Custodian disambiguation and data matching
Provided is a technique for matching different user representations of a person in a plurality of computer systems may be provided. The technique includes collecting information sets about user representations from a plurality of computer systems; normalizing the information sets to a unified format; grouping the information sets in the unified format into indexing buckets based on a user name using a non-phonetic algorithm; determining a similarity score for each pair of information sets in each of the indexing buckets; classifying each information set pair into a set of classes based on the similarity scores, wherein the set of classes comprise at least matches and non-matches; and using a data structure for merging information of information set pairs classified as matches.
Systems and methods for identity graph based fraud detection
A method and apparatus for fraud detection during transactions using identity graphs are described. The method may include receiving, at a commerce platform system, a transaction from a user having initial transaction attributes and transaction data. The method may also include determining, by the commerce platform system, an identity associated with the user, wherein the identity is associated with additional transaction attributes not received with the transaction. Furthermore, the method may include accessing, by the commerce platform system, a feature set associated with the initial transaction attributes and the additional transaction attributes, wherein the feature set comprises machine learning (ML) model features for detecting transaction fraud. The method may also include performing, by the commerce platform system, a machine learning model analysis using the feature set and the transaction data to determine a likelihood that the transaction is fraudulent, and performing, by the commerce platforms system, the transaction when the likelihood that the transaction is fraudulent does not satisfy a transaction fraud threshold.
SYSTEMS AND METHODS FOR MONITORING USE OF PERSONAL PROTECTIVE EQUIPMENT
A personal protective equipment (PPE) monitoring system is disclosed that includes a set of wireless transmitting devices and a mobile application executable on a mobile device. The mobile device receives a wireless signal from a transmitting device associated with a workstation and determines the type of workstation based on an identifier included in the wireless signal. The mobile device also receives wireless signals from transmitting devices attached to PPE items located in proximity to the mobile device and determines the types of PPE items based on respective identifiers included in the wireless signals. The mobile application determines PPE items required to operate equipment at the workstation and further determines whether the set of detected PPE items includes all of the required PPE items. The mobile application generates a user interface that indicates the presence or absence of each required PPE item and displays the UI on the mobile device.
METHOD AND APPARATUS FOR IMPROVING DISPATCH OF DIFFERENT TYPES OF LAW ENFORCEMENT PATROLS FOR ACHIEVING A DESIRED DETERRENT EFFECT
A process for improving dispatch of different types of law enforcement patrols (LEPs) for achieving a desired deterrent effect includes first receiving patrol route information indicating patrol routes taken by first LEPs, and then determining, as a function of a type of each of the first LEPs, a threshold level of deterrence reached for each of the patrol routes taken. Subsequently, a threshold level of deterrence desired (TLoDD) for each of the plurality of patrol routes is determined as a function of historical and/or real-time crime information. A first patrol route having a threshold level of deterrence reached (TLoDR) that is less than a TOoDD is identified and, as a function of the difference, a particular type of second LEP having a sufficient deterrent effect factor to compensate for the difference is identified. An available responding second LEP of the particular type is then identified for dispatch.
Gunshot detection system with forensic data retention, live audio monitoring, and two-way communication
A gunshot detection system includes gunshot sensor units with microphones for detecting gunshots and capturing audio data depicting the detected gunshots and other ambient sounds, an environmental board with various environmental sensors for generating environmental data indicating environmental conditions. The audio data, environmental data, and position information can be stored locally on local nonvolatile storage of the gunshot sensor unit for later retrieval by law enforcement entities. In one embodiment, the gunshot sensor units include a wired and/or wireless data transfer interface for transferring the audio data, environmental data and/or position information to handheld units of law enforcement entities. The gunshot sensor unit can also stream live captured audio data for live monitoring by a control panel, and might also include speakers for providing audio playback of audio data from the control panel.