Patent classifications
G07G3/003
SYSTEM AND METHOD FOR FAST CHECKOUT USING A DETACHABLE COMPUTERIZED DEVICE
The presently disclosed subject matter includes a system and method for fast checkout from a retail store. The system includes a portable computerized device that is configured to track items which are inserted or removed from a shopping container.
Operations system for combining independent product monitoring systems to automatically manage product inventory and product pricing and automate store processes
In some implementations, a device may receive data identifying products and encoded data identifying smart tags of the products. The device may map the data and the encoded data to generate encoded product data. The device may receive encoded data provided by smart tags of products received by a store. The device may receive images of the products. The device may compare the encoded data and the encoded product data to identify a set of the products received by the store. The device may correlate the images with the set of the products. The device may process the correlated data to identify locations of the set of the products in the store. The device may generate an instruction to relocate a product to a new location and may provide the instruction to a device, associated with the store, to cause the product to be relocated to the new location.
Method, system, and computer program product for identifying a malicious user
A method, system, and computer program product for identifying a malicious user obtain a plurality of service requests for a service provided by a processing system, each service request of the plurality of service requests being associated with a requesting user and a requesting system, and a plurality of service responses associated with the plurality of service requests, each service response of the plurality of service responses being associated with the processing system; and identify the requesting user as malicious based on the plurality of service requests and the plurality of service responses.
THE AUTOMATED SALESMAN MACHINE (ASM)/AUTOMATED ELECTRONIC TROLLEY (AET)
A method or a system, automatically and electronically ensures that customer pays for all goods picked up and the customer takes out of the shop only goods paid for. All this is done without the need of a shop teller and finally without the need of a shop supervisor to periodically crosscheck and ensure that the total amount of money collected by the shop teller (within a period) equals the total value of goods disbursed. The resultant of this system are the shop runs can run a totally cashless shop; reduce human resource by a significant percentage; shop can be opened 24/7; no more queues at shop teller points even during peak periods or major sales.
System and method for providing and/or collecting information relating to objects
A system for providing and/or collecting information relating to at least one object is provided. The system comprises a radio-frequency identification, RFID, tag that is provided proximate to the at least one object, the RFID tag being configured to enable detection of a position and/or a movement of the at least one object; a server device configured to receive position and/or movement data about the at least one object; and a mobile device configured to: identify the at least one object; send a request to the server device for object information about the identified at least one object; wherein: the server device is further configured to, in response to the request, provide to the mobile device targeted object information about the identified at least one object, the targeted object information being at least partially based on the position and/or movement data; and the mobile device is further configured to display the targeted object information.
INFORMATION PROCESSING SYSTEM
The objective of the present invention is to automate settlement of the price of a product, when a purchaser purchases a product displayed in a shop, in order to reduce the time required for settlement of the price of the product, and to prevent fraud by the purchaser or the cashier. The present information processing system is provided with a moving object tracking means, a shelf product recognition means, and a settlement means. The moving object tracking means finds a moving object such as a shopper or a basket moving within a store, defines the region of the moving object, and captures images of the moving object while tracking the movement thereof. The shelf product recognition means constantly monitors the state within a shelf, and compares captured images before and after an object is removed from the shelf, a change in weight, or a change in a position signal. The product to be recognized is defined from the captured images, the weight, and position information, and the product is identified from the defined information. The settlement means settles payment for the identified product.
DETECTION APPARATUS FOR DETECTING ABNORMAL OPERATIONS AT A POINT OF SALES APPARATUS
A detection apparatus for detecting abnormal operations at a point of sales (POS) terminal in a POS system that includes the POS terminal and an attendant terminal for monitoring the status of the POS terminal. The detection apparatus includes a camera interface connected to a camera for capturing images of customers operating the POS terminal, a network interface to communicate with a display control apparatus for the attendant terminal, and a processor configured to identify an action performed by a customer using an image thereof, identify an operation performed on the POS terminal by the customer based on changes in monitoring screen data generated by the display control apparatus for the attendant terminal, detect whether an abnormal operation is performed by the customer based on the identified actions and operations, and control the network interface to transmit a notification to the attendant terminal when an abnormal operation is performed.
METHOD AND SYSTEM FOR IN-STORE PURCHASE OF SECURITY-TAGGED ITEMS WHILE AVOIDING THE POINT OF SALE
A method and a system for enabling in-store purchasing of security-tagged merchandise, avoiding going through the point of sale of a retailer, are provided herein. The method may include the following steps: identifying, using a user-coupled device, a security tag attached to specific item to be purchased, wherein the security-tag is unique to the specific identified item; initiating a purchase request of said item via the user-coupled device, wherein the request includes a price of the item and identifiers of: the item, the security-tag identification, the retailer, and the user; attempting a transaction based on the purchase request, wherein the transaction is capable of being authorised by a third party; and indicating at a data repository associated with an in-store security gate sensitive to said security tag, that the security tag is no longer capable of initiating an alarm.
SYSTEMS AND METHODS FOR DETECTING POTENTIAL SHRINK EVENTS VIA RFID TECHNOLOGY
Systems and methods for detecting potential shrink events via RFID technology are provided. The systems include a point of sale (POS) system that includes an optical scanner, an RFID transceiver arrangement, a user interface and a controller. The controller is configured to perform example methods disclosed herein. For example, the controller may detect that the optical scanner has decoded a barcode, trigger the RFID transceiver arrangement to write a data string to an RFID tag located within the object scanning area, conduct a detection operation to detect the RFID tag with the data string in the bagging area. Responsive to detecting the RFID tag with the data string, the method involves the user interface performing a first operation. Responsive to not detecting the RFID tag with the data string, the method involves the user interface performing a second operation.
Data-driven machine-learning theft detection
A machine-learning algorithm is trained with features relevant to basket data for items of transactions. The trained algorithm is trained to predict whether a given transaction is more or less likely to be associated with theft being engaged in by a transaction operator for the transaction. The trained algorithm is then provided basket data for a given transaction and produces as output a theft prediction value. When the theft prediction value exceeds a configured threshold value, the transaction is flagged for manual intervention or the transaction is flagged for subsequent manual verification.