Patent classifications
G07G1/0054
Information processing method, information processing device, and recording medium
An information processing method according to an aspect of the present disclosure includes: acquiring, from a video, flow line information of a customer; detecting that the customer acquires an item; and storing, in a storage, flow line information of the customer and information on a number of items acquired by the customer, in association with each other.
NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM, NOTIFICATION METHOD, AND INFORMATION PROCESSING DEVICE
An information processing device identifies a first feature amount related to the number of the product registered on the specific machine based on an acquired product information, generating, from an image capturing a user in front of the specific machine, a first area information, a second area information and an interaction between the first class and the second class, specifies an action of the user of registering the product to the specific machine based on the first area information, the second area information, and the interaction, identifies a second feature amount related to the number of time of carrying out the action; and generates an alert based on the first feature amount and the second feature amount.
NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING APPARATUS
An information processing apparatus obtains image data in which a predetermined area in front of an accounting machine, which is used by a user to register an article and pay the bill, is captured. Then, the information processing apparatus inputs the image data in a machine learning model that is trained to identify an article and a storage for the article, and obtains the output result. Subsequently, the information processing apparatus refers to the article and the storage specified in the output result, and identifies the action taken by the user with respect to the article.
SYSTEM AND METHOD FOR AUTHENTICATING AND CERTIFYING A PHYSICAL ITEM, AND CORRESPONDING CERTIFIED PHYSICAL ITEM
A system and a method for authenticating and certifying a physical item are provided. The system has an identification tag coupled to the physical item and having a relevant tag identifier adapted to be read at a distance, a non-fungible cryptographic token issued on a predetermined digital register distributed in a plurality of nodes of a processor network and configured to store the relevant tag identifier of the identification tag coupled to the physical item and data or information representative of the physical item, and detectors for detecting the presence of the identification tag of the physical item passing nearby a predetermined detection area or through a predetermined detection gate. Data indicative of the presence of the physical item in the predetermined area or the physical item passing through the predetermined gate is recorded in the non-fungible cryptographic token. The physical item may be a garment, a sportswear item, a collectible, or a luxury item.
Systems and methods of detecting scan avoidance events
Methods of detecting scan avoidance events when items are passed through a field of view (FOV) of a scanner are disclosed herein. An example method, during a decode session, receiving, at one or more processors of the symbology reader, an image of an object; during a timeout period, detecting, at the one or more processors, an indicia in the image of the object, the indicia having a decodable payload; during the timeout period, attempting to decode the indicia to identify the decodable payload, at the one or more processors; and after the timeout period expires, when at least one portion but less than all portions of the indicia is decodable, determining a potential scan avoidance attempt and generating a scan avoidance alarm signal.
CHECKOUT APPARATUS AND CHECKOUT METHOD
A checkout apparatus in a point of sales (POS) system including a customer terminal and an attendant terminal, includes a network interface, a scanner, and a processor configured to, upon receipt of a checkout code from the customer terminal via the scanner, acquire data of one or more commodities that have been registered for purchase by the customer terminal, determine whether said one or more commodities include a particular type of commodity that needs to be checked by an attendant, and upon determining that said one or more commodities include the particular type of commodity, control the network interface to transmit a notification to the attendant terminal before executing checkout processing on the commodity.
SYSTEM FOR ITEM RECOGNITION USING COMPUTER VISION
An item recognition system uses a top camera and one or more peripheral cameras to identify items. The item recognition system may use image embeddings generated based on images captured by the cameras to generate a concatenated embedding that describes an item depicted in the image. The item recognition system may compare the concatenated embedding to reference embeddings to identify the item. Furthermore, the item recognition system may detect when items are overlapping in an image. For example, the item recognition system may apply an overlap detection model to a top image and a pixel-wise mask for the top image to detect whether an item is overlapping with another in the top image. The item recognition system notifies a user of the overlap if detected.
Systems and methods for detecting potential shrink events via RFID technology
Systems and methods for detecting potential shrink events via RFID technology are provided. The systems include a point of sale (POS) system that includes an optical scanner, an RFID transceiver arrangement, a user interface and a controller. The controller is configured to perform example methods disclosed herein. For example, the controller may detect that the optical scanner has decoded a barcode, trigger the RFID transceiver arrangement to write a data string to an RFID tag located within the object scanning area, conduct a detection operation to detect the RFID tag with the data string in the bagging area. Responsive to detecting the RFID tag with the data string, the method involves the user interface performing a first operation. Responsive to not detecting the RFID tag with the data string, the method involves the user interface performing a second operation.
REGISTRATION CHECKING APPARATUS, CONTROL METHOD, AND NON-TRANSITORY STORAGE MEDIUM
A registration checking apparatus (2000) determines, for a target transaction, whether a relation between the number of times scanning actions are performed and the number of products registered as checkout targets satisfies a predetermined condition. The scanning action is detected by analyzing a video (12). The registration checking apparatus (2000) performs predetermined output processing when the relation does not satisfy the predetermined condition. The predetermined condition is a condition being satisfied when the number of registered products is equal to or greater than the number of detected scanning actions.
SYSTEMS AND METHODS OF DETECTING FRAUDULENT ACTIVITY AT SELF-CHECKOUT TERMINALS
Methods and systems for detecting fraudulent activity at a self-checkout terminals of a retail store include a scanner for scanning an identifier of a candidate product located in the product-scanning area of the self-checkout terminal, and one or more sensors that detect at least one physical characteristic of the candidate product located in the product-scanning area of the self-checkout terminal. A computing device then correlates the obtained electronic data corresponding to actual identifying characteristic information associated with the candidate product to the reference physical characteristic information associated with the reference product in order to generate a similarity score between the actual and reference physical characteristic information. If the similarity score is above a predetermined similarity threshold, the self-checkout terminal is permitted to process a purchase of the candidate product, but if the similarity score is below the threshold, the self-checkout terminal is restricted from processing the purchase.