Patent application number | Description | Published |
20080226129 | Cart Inspection for Suspicious Items - Methods and apparatus provide for a Cart Inspector to create a suspicion level for a transaction when a video image of the transaction portrays an item(s) left in a shopping cart. Specifically, the Cart Inspector obtains video data associated with a time(s) of interest. The video data originates from a video camera that monitors a transaction area. The Cart Inspector analyzes the video data with respect to target image(s) associated with a transaction in the transaction area during the time(s) of interest. The Cart Inspector creates an indication of a suspicion level for the transaction based on analysis of the target image(s). Creation of a high suspicion level for the transaction indicates that the transaction's corresponding video images most likely portray occurrences where the purchase price of an item transported through the transaction area was not included in the total amount paid by the customer. | 09-18-2008 |
20100166324 | METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS - A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment. | 07-01-2010 |
20120127316 | METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS - A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment. | 05-24-2012 |
20120188377 | CART INSPECTION FOR SUSPICIOUS ITEMS - Methods and apparatus provide for a Cart Inspector to create a suspicion level for a transaction when a video image of the transaction portrays an item(s) left in a shopping cart. Specifically, the Cart Inspector obtains video data associated with a time(s) of interest. The video data originates from a video camera that monitors a transaction area. The Cart Inspector analyzes the video data with respect to target image(s) associated with a transaction in the transaction area during the time(s) of interest. The Cart Inspector creates an indication of a suspicion level for the transaction based on analysis of the target image(s). Creation of a high suspicion level for the transaction indicates that the transaction's corresponding video images most likely portray occurrences where the purchase price of an item transported through the transaction area was not included in the total amount paid by the customer. | 07-26-2012 |
20120320199 | NOTIFICATION SYSTEM AND METHODS FOR USE IN RETAIL ENVIRONMENTS - Embodiments herein include novel ways of alerting store personnel when various activities, events, conditions, etc., occur at the checkout in retail establishments. | 12-20-2012 |
20120320214 | NOTIFICATION SYSTEM AND METHODS FOR USE IN RETAIL ENVIRONMENTS - Embodiments herein include novel ways of alerting store personnel when various activities, events, conditions, etc., occur at the checkout in retail establishments. For example, in accordance with one embodiment, the alerting can take place in substantially real-time, when the event occurs, allowing personnel to take appropriate measures, corrective or otherwise, to deal with the detected event. Examples of such events may include situations such as when a person of interest is detected as shopping at the store, when a cashier has missed scanning an item at the checkout, or to alert store personnel if a non-empty shopping cart has exited the store without payment (a.k.a., a cart push-out). Although the discussion below uses a grocery store as an example retail environment, embodiments herein can be used in any type of retail environment. | 12-20-2012 |
20120321146 | NOTIFICATION SYSTEM AND METHODS FOR USE IN RETAIL ENVIRONMENTS - Embodiments herein include novel ways of alerting store personnel when various activities, events, conditions, etc., occur at the checkout in retail establishments. For example, in accordance with one embodiment, the alerting can take place in substantially real-time, when the event occurs, allowing personnel to take appropriate measures, corrective or otherwise, to deal with the detected event. Examples of such events may include situations such as when a person of interest is detected as shopping at the store, when a cashier has missed scanning an item at the checkout, or to alert store personnel if a non-empty shopping cart has exited the store without payment (a.k.a., a cart push-out). Although the discussion below uses a grocery store as an example retail environment, embodiments herein can be used in any type of retail environment. | 12-20-2012 |
20130004090 | IMAGE PROCESSING TO PREVENT ACCESS TO PRIVATE INFORMATION - A processing resource receives original image data by a surveillance system. The original image data captures at least private information and occurrence of activity in a monitored region. The processing resource applies one or more transforms to the original image data to produce transformed image data. Application of the one or more transforms sufficiently distorts portions of the original image data to remove the private information. The transformed image data includes the distorted portions to prevent access to the private information. However, the distorted portions of the video include sufficient image detail to discern occurrence of the activity in the retail environment. | 01-03-2013 |
20130265433 | CART INSPECTION FOR SUSPICIOUS ITEMS - Methods and apparatus provide for a Cart Inspector to create a suspicion level for a transaction when a video image of the transaction portrays an item(s) left in a shopping cart. Specifically, the Cart Inspector obtains video data associated with a time(s) of interest. The video data originates from a video camera that monitors a transaction area. The Cart Inspector analyzes the video data with respect to target image(s) associated with a transaction in the transaction area during the time(s) of interest. The Cart Inspector creates an indication of a suspicion level for the transaction based on analysis of the target image(s). Creation of a high suspicion level for the transaction indicates that the transaction's corresponding video images most likely portray occurrences where the purchase price of an item transported through the transaction area was not included in the total amount paid by the customer. | 10-10-2013 |
20140168351 | Telepresence Device Communication and Control System - A telepresence unit control and communication methods are disclosed. The telepresence unit enables a virtual presence of a controller, a human being, located away from the telepresence unit. The telepresence unit control and communication methods enable a mechanical motion control of the telepresence unit by utilizing a visual communication between the telepresence unit and a computer administered by the controller. The telepresence unit utilizes a mobile computing device to establish the visual communication channel to the computer via the internet. Once the visual communication channel is established, the present invention provides a video modification as means of controlling and communicating with the telepresence unit. | 06-19-2014 |
20140176719 | VERIFICATION OF FRAUDULENT ACTIVITIES AT A SELF-CHECKOUT TERMINAL - A verification method of a fraudulent activity taking place at a self-checkout terminal is disclosed. The method verifies the fraudulent activity by confirming an incident of the fraudulent activity with multiple data generated by monitoring the transaction area and the bagging area of the self-checkout terminal. A human validation is optionally performed to verify machine-identified incidents. | 06-26-2014 |
20150049912 | IMAGE PROCESSING TO PREVENT ACCESS TO PRIVATE INFORMATION - A processing resource receives original image data by a surveillance system. The original image data captures at least private information and occurrence of activity in a monitored region. The processing resource applies one or more transforms to the original image data to produce transformed image data. Application of the one or more transforms sufficiently distorts portions of the original image data to remove the private information. The transformed image data includes the distorted portions to prevent access to the private information. However, the distorted portions of the video include sufficient image detail to discern occurrence of the activity in the retail environment. | 02-19-2015 |