Systems and Methods for Theft Prevention and Detection
20220020254 · 2022-01-20
Inventors
Cpc classification
G08B13/246
PHYSICS
H04N7/18
ELECTRICITY
G06V20/52
PHYSICS
G08B13/19613
PHYSICS
G08B13/2402
PHYSICS
G06Q10/04
PHYSICS
International classification
Abstract
A system and method for premises theft prevention and detection. A system comprises a media capture device, a target area and target object at a workstation, and operably configured code in non-transitory computer readably storage media. A system recognizes a theft or misappropriation and can notify a business owner or police. The system is powered by machine-learning algorithms that progressively improve accuracy and precision in theft detection.
Claims
1. A system for premises theft prevention and detection, the system comprising a. At least one media capture device capable of capturing multimedia from individual activity at a workstation; b. A target object referenced in a target area at a workstation; c. A hardware architecture comprising a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising computer readable program code for processing and buffering video, adjusting video, and producing confidence estimates based on parameters to identify an instance of theft or misappropriation; and d. operably configured code for a suspicious gesture recognition algorithm or for a hybrid sensor classification algorithm for detecting an instance of a theft or misappropriation.
2. The system of claim 1, the system further comprising an Internet connection over a system network.
3. The system of claim 1 wherein the target object is money.
4. The system of claim 1 wherein the target object is inventory goods.
5. The system of claim 1 wherein the media capture device is a surveillance camera.
6. The system of claim 5 wherein the surveillance camera is coupled with at least one sensor.
7. The at least one sensor of claim 6 whereby the sensor is capable of detecting weight, motion, density, temperature, or direction.
8. The sensor classification algorithm of claim 8 whereby multimedia content is scanned, buffered, and a confidence estimate is produced according to gesture parameters.
9. The system of claim 1 whereby the operably configured code gesture recognition algorithm analyzes multimedia that is scanned, processed, and whereby a confidence estimate is produced according to sensor data parameters.
10. A method for implementing a system for theft prevention and detection, the method steps comprising a. Mounting a media capture device to have a focus on a workstation with a target area having a target object; b. Capturing real-time video of individual gestures at the workstation; c. Processing real-time video with operably configured software having either a gesture recognition algorithm or a hybrid sensor classification algorithm; d. identifying of a theft or misappropriation instance; and e. Notifying a user.
11. A hardware architecture for a premises theft prevention and detection system, the system comprising: A processor coupled to at least one server coupled to at least one non-transitory device, the non-transitory memory device containing operably configured code for either a gesture recognition algorithm or a hybrid sensor classification algorithm that causes the architecture to receive and scan multimedia from a multimedia capture device, produce at least one confidence estimate, and detect suspicious gestures at a target area at a workstation, executing alerts to a user.
12. The hardware architecture of claim 11 further comprising obtaining data from at least one sensor.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0011] The accompanying drawings that are incorporated in and constitute a part of this specification illustrate various embodiments of the disclosure. Together with the description, the drawings serve to explain the principles of the disclosure.
[0012]
[0013]
[0014]
[0015]
[0016]
REFERENCE NUMERALS OF THE DRAWINGS
[0017] 1. Media capture device
[0018] 3. Sensor
[0019] 6. Premises
[0020] 9. Target area
[0021] 12. Target component
[0022] 15. Workstation
[0023] 18. Individual
[0024] 21. Wireless connection
[0025] 24. Server
[0026] 27. Database
[0027] 30. Computer
[0028] 33. Processor
[0029] 36. Initialization and fill buffer
[0030] 39. Scan buffer for gesture
[0031] 41. Confidence estimate production
[0032] 44. Suspicious gesture detection
[0033] 47. Alert
[0034] 50. Buffer scan for unknown gesture
[0035] 53. Confidence estimate for unknown gesture
[0036] 56. Scan start
[0037] 59. Content scan
[0038] 62. Timing synchronization
[0039] 65. Unknown image scan
[0040] 68. Unknown image confidence estimate
[0041] 71. Sensor data
[0042] 74. Confidence estimate
[0043] 77. Media capture estimate update
[0044] 80. Target component detection
[0045] 81 Increased confidence estimate
[0046] 86. Update target area and target component count
[0047] 89. Suspicion
[0048] 92. Alert
DETAILED DESCRIPTION
[0049] The present disclosure provides generally for premises theft prevention and detection. The system comprises at least one media capture device, a target, a computer program, parameters and algorithms, and data associated with target recognition, tracking, and reconciliation.
[0050] A gesture recognition algorithm utilizes various parameters for direction, velocity, speed, and frequency and may be relative to a target item or area. Context of the target item or area may be considered for progressive machine learning patterns.
[0051] A sensor classification algorithm utilizes various parameters for density, volume, weight, shape, motion, and target area environmental conditions and changes thereof.
[0052] Generally, a system for real-time automatic adaptive recognition and counting may comprise a processor configured to execute designated commands, a server, a bus, memory coupled to a processor for storing instructions related to verification algorithms and video processing and adjustment, data storage, a network, and operably configured verification algorithm software. Generally, the methods for implementing a system for automatic adaptive recognition and counting comprise mounting a media capture device parallel, diagonally, or perpendicularly to a target area; capturing real-time multimedia; processing real-time multimedia; producing a confidence estimate according to sensor data; and initializing a notification.
[0053] The exemplary systems and methods are applicable in various industries such as commercial wholesale, consumer retail, restaurant and dining services, recreation and arcades, municipal services and facilities, and banking and exchange services. For example, gas stations and food stands are common businesses that often deal in cash transactions as well as inventor management of food goods. Employees rather than business owners may work as a cashier or as a line cook. The system described in the disclosure provides a way for business owners to remotely and passively account for inventory and cash and identify theft or likelihood of theft or misappropriation of inventory.
[0054] The system provides for inventory and money theft or misappropriation based on gesture recognition patterns. Cumulative image processing coupled with machine learning via algorithm parameters and optimization allows system detection of anomalies indicating likely theft or misappropriation.
[0055] In the following sections, detailed descriptions of examples and methods of the disclosure will be given. The description of both preferred and alternative examples are exemplary only, and it is understood that to those skilled in the art that variations, modifications, and alterations may be apparent. It is therefore to be understood that the examples do not limit the broadness of the aspects of the underlying disclosure as defined by the claims.
DETAILED DESCRIPTIONS OF THE DRAWINGS
[0056] Referring now to
[0057] Exemplary cameras may have sensors integrated therewith or may be coupled to separate sensors via a wired or wireless connection. The cameras comprise image optics, image sensors, and processors for capturing multimedia such as still images, sound, and video. The cameras may have on-board storage or may transmit the captured multimedia to a separate server, processor, or storage via a wired or wireless Internet connection. The cameras and sensors may be integrated as shown in
[0058] A target area may be an area or object of interest that will have surveillance. For example, a cash register or point-of-sale system may be a target area. A target area is typically used, operated, or manipulated by a human individual. At least, one camera and sensor may be positioned orthogonally, perpendicularly, above, below, beside, or on the target area. The camera and sensor will preferably focus on areas of human interaction with the target area and target components or items therein such as currency or other valuables.
[0059] Referring now to
[0060] Multimedia and target area data are captured on the cameras and sensors and may undergo pre-processing. The pre-processed or unprocessed data are transmitted via the Internet to a server and may be processed according to algorithms pertaining to object, movement, and pattern recognition, auto encoding, prediction and probability, data parsing, and feature extraction, for example. Generally, prediction and probability can provide for progressive machine learning pertaining to gesture recognition and sensor classification from captured multimedia.
[0061] For example, machine-learning algorithms may be implemented such as decision trees, Gaussian mixture models, support vectors, random forest, Naïve Bayes, K-means clustering and K-nearest neighbor, and hidden Markov models.
[0062] End users such as business owners who prefer to passively monitor a target area may access captured multimedia content and may access alerts and notifications. End users may access content on a computer or portable electronic device coupled with at least random access memory, a processor, database storage, and an Internet connection. Content and notifications may be accessed via a software portal or program with a graphical user interface. Data may be housed in a cloud-based database or a database having physical solid-state or hard drive storage integrated with the end-user computing device or offsite.
[0063] The executed instructions cause a processor to perform these operations: identify premises context for a defined area based at least in part on items, individuals, or parameters identified or obtained from a media capture device with or without sensors. The premises context can be defined by the identification of boundaries of a premise such as a room, the location of furniture or objects such as a countertop and a cash register, the presence of individuals, and the gestures of individuals. Suspicious gestures trigger an anomaly detection by the system. The system algorithm as explained in more detail in
[0064] Computer systems may include tangible or non-transitory computer-readable storage devices or memory for carrying or having computer-executable instructions or data structures stored thereon. Tangible computer-readable storage devices may be any available device that can be accessed by a general purpose or special purpose computer, including the functional design of any processor. For example, tangible computer-readable devices may include SSD, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other device which can be used to carry or store desired program code in the form of computer-executable instructions, data structures, or processor chip design, the connection as a computer-readable medium.
[0065] Computer-executable instructions include instructions, such as the algorithms, processes, and data further explained in
[0066] Regarding databases, database architectures such as column-oriented databases, in-memory databases, clustered databases, distributed databases, or even flat file data repositories may be used according to the disclosure. Any combination of known or future database technologies may be used as appropriate.
[0067] Regarding processors, a central processing unit may include one or more processors such as, for example, a microcontroller, a microcomputer, a programmable logic controller, an application-specific integrated circuit, and any other programmable circuit.
[0068] Software can include, but is not limited to, device drivers, firmware, operating systems, development tools, and applications software. Computer code devices of the exemplary embodiments of the disclosure may include any suitable interpretable or executable code mechanism, including but not limited to scripts, interpretable programs, dynamic link libraries (DLLs), Java classes and applets, complete executable programs.
[0069] General computer hardware and software architectures are referenced. Nevertheless, at least some of the features or functionalities of the various embodiments disclosed herein may be implemented on one or more devices such as general-purpose computers or media capture devices associated with one or more networks, such as for example an end-user or premises computer system, a client computer or point-of-sale system, a network server or other server system, a mobile computing device (tablet, wearable, mobile phone, smartphone, laptop), a consumer electronic device, or any other suitable electronic device, router, switch, or other suitable device, or any combination thereof. At least some of the features or functionalities of the exemplary systems disclosed herein may be implemented in one or more virtualized computing environments such as network computing clouds, virtual machines hosted on one or more physical computing machines, or other appropriate virtual environments.
[0070] Referring to
[0071] The system cameras with sensors placed, typically orthogonally from the target area, and with additional cameras and sensors will provide for more accurate and precise detection. The suspicious behavior as determined by the algorithms will initiate an alert or notification to the end user. This prevents an end-user from. having to constantly monitor video footage from traditional surveillance systems. Anomaly detection is achieved on a micro scale and specific to changes in human behavior within a target area's context.
[0072] Sensors for movement, direction, mass, and volume may be used in connection with counters, timers, scanners, laser or infrared detectors, open-close or unlock-lock sensors to capture data. Increased data provides for more accurate context and progressively reduces the instances of false notifications. For example, scanners and counters can be used to read and count the amount of currency in a cash register at a given time. Open-close sensors and timers may indicate instances of when the cash register is accessed and for how long. Laser or infrared detectors may monitor every time an employee places his/her hand underneath the counter. Velocity sensors may identify hand movements that are irregularly or suspiciously fast or slow or hand placement relative to the employee's body such as in a shirt or side pocket.
[0073] Referring now to
[0074] A notification may include the multimedia details such as date and time, the applicable multimedia clip showing the suspicious gesture, and that the suspicious gesture is that was detected. Multiple gesture types and their respective parameters may be pre-programmed and calibrated according to gesture standards, and the parameters may change according to machine learning. The end-user may provide notification feedback pertaining to the accuracy of the gesture detected and whether the gesture is a suspicious gesture. Gesture parameters may be manually adjusted or added or may be progressively adjusted according to machine-learning algorithms and increased data capture and processing. Progressively, the system accuracy and precision improve.
[0075] In some embodiments, set parameters of known and baseline image scans is used for system configuration and calibration. Unknown multimedia presently being captured is also scanned and buffered to produce a confidence estimate in light of the set parameters for various gestures. The suspicious gesture recognition algorithm determines if a suspicious gesture is detected. If so, then a user is alerted of a possible theft. If not, then the system cycles to the initialization and fill buffer step.
[0076] Referring now to
[0077] In addition, sensor data such as weight and motion are also analyzed to produce a confidence interval. The confidence intervals from both the sensor data and the camera multimedia data are co-analyzed for greater context and accuracy. This results in the production of machine-learning training data. A composite confidence interval is then determined. If a target item or object is detected within or outside a target area, then a second level of processing is performed with a greater confidence interval to identify more specific details such as the type of currency and amount present. A change or exchange of currency from a cash register may be identified and logged as a transaction or activity of potential interest, a trigger.
[0078] Further context and accuracy may be achieved with the inclusion of data from cash register open-close sensors. Once a transaction of interest or a suspicious gesture is detected, gesture-recognition algorithms may be executed to determine the probability or instance of a suspicious gesture during a certain time frame of a transaction of interest. If a suspicious gesture is detected, then the end-user will be notified.
[0079] In some embodiments, data from the multimedia capture device is scanned and processed. Reference data from multiple image capture devices may be analyzed and timing synchronized. Data from a camera N or unknown gesture multimedia capture source may also be obtained and analyzed. Images from the multimedia are scanned, and a confidence estimate is produced. The multimedia capture device and sensor data are progressively updated. Sensor data may be obtained from capturing parameters such as for weight, motion, velocity, light, and temperature for example. The sensors may be integrated in with the multimedia capture device such as a camera or may be a separate sensor device. Target object detection is analyzed between multiple multimedia capture sources. A higher confidence estimate results in the identification of the target object such as currency from a cash register at a workstation and within a target area. The target area may be variable and may be tracked by multimedia capture devices. The algorithm will promote the processing of an updated target object count based on multimedia captured during a video log for example and compared to the context and activities from a previous video log. The algorithm promotes the determination of a suspicious gesture or transaction. If so, a user is alerted. If not, the algorithm process starts over.
CONCLUSION
[0080] A number of embodiments of the present disclosure have been described. While this specification contains many specific implementation details, this specification should not be construed as limitations on the scope of any disclosures or of what may be claimed. The specification presents descriptions of features specific to particular embodiments of the present disclosure.
[0081] Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in combination in multiple embodiments separately or in any suitable sub-combination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a sub-combination or variation of a sub-combination.
[0082] Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous.
[0083] Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order show, or sequential order, to achieve desirable results. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the claimed disclosure.