US20160189277A1 - Self-checkout arrangements - Google Patents
Self-checkout arrangements Download PDFInfo
- Publication number
- US20160189277A1 US20160189277A1 US14/971,747 US201514971747A US2016189277A1 US 20160189277 A1 US20160189277 A1 US 20160189277A1 US 201514971747 A US201514971747 A US 201514971747A US 2016189277 A1 US2016189277 A1 US 2016189277A1
- Authority
- US
- United States
- Prior art keywords
- shopper
- item
- location
- tally
- cart
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000009471 action Effects 0.000 claims abstract description 26
- 230000001965 increasing effect Effects 0.000 claims abstract description 12
- 238000001514 detection method Methods 0.000 claims abstract description 10
- 238000000034 method Methods 0.000 claims description 36
- 238000005516 engineering process Methods 0.000 abstract description 35
- 238000010348 incorporation Methods 0.000 abstract 1
- 230000000694 effects Effects 0.000 description 10
- 241000282414 Homo sapiens Species 0.000 description 7
- 238000004458 analytical method Methods 0.000 description 6
- 230000003247 decreasing effect Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000001939 inductive effect Effects 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 230000015654 memory Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000012552 review Methods 0.000 description 3
- 240000001436 Antirrhinum majus Species 0.000 description 2
- 241000282412 Homo Species 0.000 description 2
- 241000414697 Tegra Species 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 230000005672 electromagnetic field Effects 0.000 description 2
- 230000002708 enhancing effect Effects 0.000 description 2
- 238000000556 factor analysis Methods 0.000 description 2
- 230000006698 induction Effects 0.000 description 2
- 235000013372 meat Nutrition 0.000 description 2
- 238000005065 mining Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000003909 pattern recognition Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- 244000141353 Prunus domestica Species 0.000 description 1
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical group [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000004931 aggregating effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 235000021420 balsamic vinegar Nutrition 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 235000013351 cheese Nutrition 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000005670 electromagnetic radiation Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 235000015110 jellies Nutrition 0.000 description 1
- 239000008274 jelly Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 235000016709 nutrition Nutrition 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 235000021400 peanut butter Nutrition 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 238000013349 risk mitigation Methods 0.000 description 1
- 239000010979 ruby Substances 0.000 description 1
- 229910001750 ruby Inorganic materials 0.000 description 1
- 235000002020 sage Nutrition 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 235000013403 specialized food Nutrition 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B62—LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
- B62B—HAND-PROPELLED VEHICLES, e.g. HAND CARTS OR PERAMBULATORS; SLEDGES
- B62B3/00—Hand carts having more than one axis carrying transport wheels; Steering devices therefor; Equipment therefor
- B62B3/002—Hand carts having more than one axis carrying transport wheels; Steering devices therefor; Equipment therefor characterised by a rectangular shape, involving sidewalls or racks
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B62—LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
- B62B—HAND-PROPELLED VEHICLES, e.g. HAND CARTS OR PERAMBULATORS; SLEDGES
- B62B5/00—Accessories or details specially adapted for hand carts
- B62B5/0096—Identification of the cart or merchandise, e.g. by barcodes or radio frequency identification [RFID]
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B62—LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
- B62B—HAND-PROPELLED VEHICLES, e.g. HAND CARTS OR PERAMBULATORS; SLEDGES
- B62B5/00—Accessories or details specially adapted for hand carts
- B62B5/06—Hand moving equipment, e.g. handle bars
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0639—Item locations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
-
- H04N5/225—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
Definitions
- the present disclosure details a variety of risk-mitigation technologies that can aid in reducing self-checkout fraud.
- a responsive action may be taken.
- a responsive action may be taken.
- These responsive actions can include dispatching a store clerk to assist the shopper, or increasing a risk score that is repeatedly re-calculated during the shopper's visit.
- FIG. 1 illustrates a shopping cart including certain features detailed here.
- FIG. 2 shows an illustrative cell phone.
- FIG. 3 depicts aspects of the presently-detailed technology, in a retail store.
- a shopping cart 10 ( FIG. 1 ) includes a frame 12 conveying a basket 14 on casters 15 . Near a handle 16 of the cart is an inclined pad 18 on which a shopper's smartphone 20 or other mobile device rests. On a bottom shelf of the cart is a battery 22 . Wiring (not shown) links the battery 22 and the pad 18 .
- the cart may include other electronics 25 , such as an audio or wireless sensor, or a Bluetooth beacon.
- the battery 22 also serves to charge the shopper's smartphone 20 ( FIG. 2 ).
- power is provided from the battery to the phone by an inductive charging arrangement, integrated into the pad 18 .
- inductive chargers are wireless, in the sense that no wire couples the power source to the phone. Instead, a first induction coil in the pad creates an alternating electromagnetic field, and a second induction coil in the phone takes power from the electromagnetic field and converts it back into electrical current to charge the phone's battery.
- a charging cable e.g., a USB cable
- a charging cable can couple the phone to the cart battery 22 .
- the cart 10 further includes an inductive charging arrangement 24 that serves to charge the cart battery.
- a corresponding charging apparatus can be distributed through the floor of a store, but more commonly is located in the floor of a corral where the carts are stored for use. That floor-based charger is powered through commercial mains power.
- the cart battery 22 can be charged via wired contacts formed on a retaining rail in the cart corral, which engage with wired contacts on each cart.
- a retaining rail arrangement that can be adapted for charging in this manner is shown in patent U.S. Pat. No. 6,142,283.
- Other contact-based charging arrangement for shopping cart batteries are detailed in patents U.S. Pat. Nos.
- the shopper's mobile device 20 can be conventional and include a touchscreen 26 and various sensors—including a front-facing camera 28 and a rear-facing camera (not shown). When the mobile device rests on the pad 18 in the cart, one or both of these cameras serves as a scanner device by which the shopper can add items to a checkout tally, as they are placed in the cart. (The shopper may have one or more reusable bags open in the cart, and may place items directly into a bag after scanning.) As is familiar from applicant's earlier applications, items may be identified in various manners, including barcode reading, object recognition, and digital watermark decoding.
- the shopper may lift mobile device 20 from the pad 18 and scan product-identifying information from an item before it is placed in the cart (e.g., while the item is still on a store shelf). This may be done to discover product information, such as cost, nutritional information, expiration date, etc.
- the shopper can instruct the device to add the item to the checkout tally, and then place the item into the cart.
- the user may first place the item in the cart, and then scan the item with the device.
- the mobile device 20 When the shopper has obtained all the items needed, the mobile device 20 is used to make payment to the store, per the accumulated checkout tally.
- Known electronic payment arrangements can be employed, including the PayPal and Apple Pay services, and the system detailed in applicant's patent publications 20140244514 and 20150227925.
- One way such loss can be detected is by estimating (manually, or by machine vision techniques) the number of items in a cart, and comparing that to a number of items on that cart's checkout tally. (This can be done either in the shopping aisles, or as the cart approaches the exit of the store.)
- Another detection technique is to have a weight sensor in the cart, and check that the sensed weight of the contents corresponds to a weight calculated from individual weight data about items on the checkout tally. In either case, if something seems amiss, a store clerk can be dispatched to politely investigate.
- the camera of a shopper's mobile device is employed to identify items placed in a cart and compile a checkout tally, as above.
- the tally may further include data indicating the location in the store at which each item was added to the tally.
- Image data additionally is captured from one or more store cameras 30 ( FIG. 3 ), which are affixed to the store ceiling, to shelves, etc.
- This latter imagery is wirelessly communicated to a store computer system 32 , which includes software that performs activity classification—identifying the time points when captured imagery seems to depict a shopper placing an item in a cart. (Multiple views of the scene aids in this analysis, since a cart can be recognized more reliably, and a 3D model can be estimated that reveals when an item is lowered into the cart by the shopper.)
- the two sets of data thereby collected are then analyzed for anomalies.
- One anomaly is detection of an item placed in a cart at a time that does not correspond with an entry on the checkout tally compiled by the user device. If store computer 32 , in its analysis of imagery from cameras 30 , finds that an item was likely placed in a particular cart at 1:42:03 pm, but no entry on the cart's tally (compiled by the shopper's mobile device) is found within a threshold interval (e.g., within 15, 30 or 60 seconds of this timepoint), then the event is flagged as suspicious.
- a threshold interval e.g., within 15, 30 or 60 seconds of this timepoint
- Another anomaly is detection of an item placed in a cart at a time that coincides with entry of an item on the checkout tally, but the item entered on the tally is not stocked on a shelf near the cart's current location (e.g., such item is stocked more than 10 or 20 feet away). This, too, is flagged as suspicious.
- Still another anomaly is entry of a duplicate item on the cart's tally, more than a threshold interval (e.g., more than 15 or 30 seconds) after the first instance of that item was entered onto the cart's tally.
- a threshold interval e.g., more than 15 or 30 seconds
- Each such event can add (or subtract) points from a risk score for that cart (or for that shopper)—with the number of points dependent on parameters of the event. For example, if an item is added to a checkout tally at one position, but is stocked at a second position that is twenty feet away, 10 points may be added to the risk score. If the item is stocked at a second position that is two aisles away, 50 points may be added to the risk score.
- Score information is relayed to a phone or other device monitored by the store's customer service personnel. If a high risk score is noted (e.g., having a value above a threshold value), a clerk can be dispatched to help the shopper compile an accurate tally.
- the risk score may further take into consideration one or more other factors learned from analysis of records maintained by the computer 32 (e.g., by data mining), involving confirmed irregularities in shopper-compiled check-out tallies.
- the computer 32 may discover that self-checkout irregularities seem to be more common in the 2:00 hour on Saturday afternoons, than in any other hour (e.g., normalized to a percentage of shoppers in the store). Conversely, the computer may discover that the smallest percentage of shoppers having difficulty in compiling accurate shelf-checkout tallies is found in the 9:00 am hour on weekdays. Each hour of the week may be scored in this fashion—with a metric indicating a degree of increased (or decreased) loss experience based on historical data analysis.
- Another risk factor may be particular aisles, or regions within particular aisles, in which shoppers pause. For example, mining of historical records may suggest that shoppers who pause near a particular section of high priced specialty foods (e.g., aged balsamic vinegars) tend to be associated with greater risks of loss than those who don't. Each location in the store may be scored in this fashion—with a number indicating a degree of increased (or decreased) loss experience based on historical data analysis.
- high priced specialty foods e.g., aged balsamic vinegars
- the store may be virtually-divided into discrete zones, e.g., six feet in aisle length—either including shelving on just one side of the aisle, or both sides.)
- an aggregate position-based risk score can be compiled, e.g., based on a sum of the scores associated with the various locations.
- each SKU in the store may be associated with a loss risk factor—based on data about historical “shrinkage” (pilferage) of such stock from inventory.
- Zone-based scores may be derived from such product-based factors, e.g., by averaging the risk loss factors for all products found on shelving within three feet of a location at which a shopper's cart pauses.
- Analysis of store records may also indicate that items which are properly identified on a shopper's tally may be positively- or negatively-correlated with erroneous self-checkout tallies. For example, a cart listing crackers on its checkout tally may be statistically more likely to have an unreported wedge of cheese than a cart that doesn't list crackers on its checkout tally (or that lists prunes on its checkout tally).
- heightened scrutiny e.g., in the form of an extra plus-up to a risk score
- heightened scrutiny e.g., in the form of an extra plus-up to a risk score
- a shopper is identified as a “regular” at the store, and no irregularity in self-checkout tallies has previously been noted, then such person's risk score may be reduced accordingly by a factor (e.g., by subtraction or division). If a shopper has not previously been noted at the store, a corresponding risk factor may be added.
- a recognized shopper's variation from normal habits may also give rise to an adjustment of risk score. If a shopper's historical shopping patterns include, primarily, house-brands and lower-priced cuts of meat, then a visit in which the shopper pauses repeatedly near premium brands, and prime cuts of meat, is unusual. So, too, with different times, or days, of shopping. (A regular 9:00 am Tuesday morning shopper, who appears at 10:30 pm, is acting out of character.) Likewise with departure from a usual length of a store visit. (A shopper who normally spends 45-60 minutes in the store traversing all aisles of the store, before buying a cart-full of groceries, breaks that pattern by visiting the store aisles for just five minutes before heading for the exit door.)
- an increase to the risk score may be warranted.
- the degree of increase can be tied to particular parameters of the variance.
- a variety of methods for generating an aggregate score can be used, depending on the particular circumstances.
- One technique employs a polynomial approach, where different factors are weighted differently, and combined to produce an aggregate score.
- the following exemplary scoring equation uses input metrics M 1 , M 2 , M 2 and M 4 to yield a score S for each shopper (or cart).
- Factors A, B, C, D and exponents W, X, Y and Z can be determined experimentally, or by Bayesian techniques:
- the score is repetitively recalculated throughout the user's visit (e.g., every time the user pauses, or every ten seconds, etc.). If, at any point, the score exceeds a threshold value, an alert is issued to the store, so that action may be taken. In hindsight, this scoring is akin to that detailed in applicant's patent publications 20120123959 and 20070205266. Those technologies concern detection of patterns that may be associated with increased (or decreased) incidences of fraud—in those cases involving ID verification (e.g., for drivers licenses). The principles detailed in those prior publications are likewise applicable in the present context to help identify patterns that may be associated with fraud. For example, arrangements employing neural networks or factor analysis (c.f., Kim, “Factor Analysis,” Sage Publications, 1979) may be employed.
- the scoring approaches detailed above are not suited for manual performance, by humans.
- the “signals” discovered by machine-based mining of historical data are typically too weak to be discerned by humans from review of the historical data, given any practical time constraints.
- the repetitive recalculation of a risk score is beyond practical human capabilities. Similarly with other aspects of the technology.
- the problems addressed by the present technologies include problems that arise from use of other technologies. For example, while self-checkout technologies bring convenience to the shopper, and labor savings to the retailer, they bring with them new risks of loss—risks that embodiments of the present technology help identify so that they can be addressed.
- a score that increased with fraud risk e.g., a trust score
- a score that decreased with fraud risk e.g., a trust score
- Shopper or cart location within the store can be determined by various means, including by reference data that associates different regions in a field of view of each camera 30 with different locations in a store aisle.
- the cart 10 can be equipped with a low power Bluetooth beacon or RFID chip that is sensed by a proximate sensor 34 mounted to store shelving.
- geolocation by known WiFi or audio techniques can be employed, based on signals received by a sensor in the cart and relayed to the store computer system, etc.
- a cart, or shopper can be identified in various ways.
- a cart can be equipped with identification means, such as an RFID chip, a Bluetooth beacon, or visual indicia that can be recognized by cameras 30 .
- a shopper can be identified by a physical or virtual store loyalty card, or payment card, employed during the shopper's visit, or by other unique-identifying data presented by the shopper. Facial- or other biometric-identification can also be employed.
- the shopper can be demographically classified (while staying anonymous) by apparent gender, estimated age, clothing color, etc., as is familiar to artisans.
- the device can also present other information of potential interest to the shopper, such as store map information, and location- or product-based offers. (E.g., if a shopper has added peanut butter to their cart, the shopping app can also present a coupon for jelly, or simply note the location of such companion product on a store map).
- references to wireless technology should be understood to include not just electromagnetic radiation (e.g., light and radio signals), but also acoustic pressure waves (e.g., audio—both within and above the human range of hearing).
- electromagnetic radiation e.g., light and radio signals
- acoustic pressure waves e.g., audio—both within and above the human range of hearing
- a risk score may be increased when duplicate items are entered onto a shopper's tally more than 10 seconds apart. In another implementation, the risk score may not be increased unless the duplicate items are entered at times that are at least 30 seconds apart.
- the tally data typically includes timestamp information indicating, to the second, the time at which each item was scanned by the user and entered onto the tally.
- Particularly contemplated mobile devices include the Google Glass product; the Apple iPhone 6; smartphones following Google's Android specification (e.g., the Galaxy S4 phone, manufactured by Samsung, and the Google Moto X phone, made by Motorola), and Windows 8 mobile phones (e.g., the Nokia Lumia 1020).
- Google's Android specification e.g., the Galaxy S4 phone, manufactured by Samsung, and the Google Moto X phone, made by Motorola
- Windows 8 mobile phones e.g., the Nokia Lumia 1020.
- each includes one or more processors, one or more memories (e.g. RAM), storage (e.g., a disk or flash memory), a user interface (which may include, e.g., a keypad, a TFT LCD or OLED display screen, touch or other gesture sensors, a camera or other optical sensor, a compass sensor, a 3D magnetometer, a 3-axis accelerometer, a 3-axis gyroscope, one or more microphones, etc., together with software instructions for providing a graphical user interface), interconnections between these elements (e.g., buses), and an interface for communicating with other devices (which may be wireless, such as GSM, 3G, 4G, CDMA, WiFi, WiMax, Zigbee, Thread or Bluetooth, and/or wired, such as through an Ethernet local area network, etc.).
- memories e.g. RAM
- storage e.g., a disk or flash memory
- a user interface which may include, e.g., a keypad,
- the processes and system components detailed in this specification can be implemented as instructions for computing devices, including general purpose processor instructions for a variety of programmable processors, such as microprocessors (e.g., the Intel Atom, the ARM A5, the Qualcomm Snapdragon, and the nVidia Tegra 4; the latter includes a CPU, a GPU, and nVidia's Chimera computational photography architecture), graphics processing units (GPUs, such as the nVidia Tegra APX 2600, and the Adreno 330—part of the Qualcomm Snapdragon processor), and digital signal processors (e.g., the Texas Instruments TMS320 and OMAP series devices), etc.
- microprocessors e.g., the Intel Atom, the ARM A5, the Qualcomm Snapdragon, and the nVidia Tegra 4; the latter includes a CPU, a GPU, and nVidia's Chimera computational photography architecture
- GPUs such as the nVidia Tegra APX 2600, and the Adreno 330—part of the Qualcomm Snapdragon processor
- processors can also be implemented in various forms of processor circuitry, including programmable logic devices, and field programmable gate arrays (e.g., the Xilinx Virtex series devices). Execution of the instructions can be distributed among processors and/or made parallel across processors within a device or across a network of devices. Processing of data can also be distributed among different processor and memory devices. Cloud computing resources can be used as well. References to “processors,” “modules” or “components” should be understood to refer to functionality, rather than requiring a particular form of implementation.
- Smartphones and other devices can include software modules for performing the different functions and acts.
- Known browser software, communications software, imaging software, and media processing software can be adapted for use in implementing the present technology.
- Software and hardware configuration data/instructions are commonly stored as instructions in one or more data structures conveyed by non-transitory tangible media, such as magnetic or optical discs, memory cards, ROM, etc., which may be accessed across a network.
- Some embodiments may be implemented as embedded systems—special purpose computer systems in which operating system software and application software are indistinguishable to the user (e.g., as is commonly the case in basic cell phones).
- the functionality detailed in this specification can be implemented in operating system software, application software and/or as embedded system software.
- ASIC application specific integrated circuit
- the relevant module(s) are first implemented using a general purpose computer, using software such as Matlab (from Mathworks, Inc.).
- a tool such as HDLCoder (also available from MathWorks) is next employed to convert the MatLab model to VHDL (an IEEE standard, and doubtless the most common hardware design language).
- VHDL an IEEE standard, and doubtless the most common hardware design language
- the VHDL output is then applied to a hardware synthesis program, such as Design Compiler by Synopsis, HDL Designer by Mentor Graphics, or Encounter RTL Compiler by Cadence Design Systems.
- the hardware synthesis program provides output data specifying a particular array of electronic logic gates that will realize the technology in hardware form, as a special-purpose machine dedicated to such purpose.
- This output data is then provided to a semiconductor fabrication contractor, which uses it to produce the customized silicon part. (Suitable contractors include TSMC, Global Foundries, and ON Semiconductors.)
- module that performs a certain function should be understood to encompass one or more items of software, and/or one or more hardware circuits—such as an ASIC as just-described.
- data can be stored anywhere: local device, remote device, in the cloud, distributed, etc.
- the in-store mobile shopping app can form part of, or incorporate features from, applicant's Discover app.
- This app and related technology are detailed, e.g., in published patent applications 20110212717, 20110161076, 20120208592, 20130311329, and 20140052555, and in pending application Ser. No. 14/251,229, filed Apr. 11, 2014 (now published as 20150016712).
- Applicant's other work that is relevant to the present technology includes that detailed in patent documents 20120214515 and 20140164124.
- Patent documents 20040153663 and 20120123959 provide additional information on multi-factor risk assessment.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Chemical & Material Sciences (AREA)
- Combustion & Propulsion (AREA)
- Transportation (AREA)
- Mechanical Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Cash Registers Or Receiving Machines (AREA)
Abstract
Self-checkout technologies for retail stores are improved by incorporation of enhanced fraud detection arrangements. For example, if a shopper enters an item on a self-checkout tally, while positioned at a location remote from the normal stock location for that item, a responsive action may be taken Likewise, if a shopper enters the same item on a self-checkout tally twice, at widely separated times, a responsive action may be taken. These responsive actions can include dispatching a store clerk to assist the shopper, or increasing a risk score that is repeatedly re-calculated during the shopper's visit. A great variety of other features and arrangements (e.g., powering arrangements for mobile phones in shopping carts) are also detailed.
Description
- This application claims priority to provisional application 62/096,821, filed Dec. 24, 2014, the disclosure of which is incorporated herein by reference.
- While shopper self-checkout at grocery stores has been gaining popularity in Europe, it has not been as quick to gain a foothold in the United States. Adoption of self-checkout technology may be accelerated by enhancing fraud-protection measures.
- The present disclosure details a variety of risk-mitigation technologies that can aid in reducing self-checkout fraud.
- For example, if a shopper enters an item on a self-checkout tally, while positioned at a location remote from the normal stock location for that item, a responsive action may be taken. Likewise, if a shopper enters the same item on a self-checkout tally twice, at widely separated times, a responsive action may be taken. These responsive actions can include dispatching a store clerk to assist the shopper, or increasing a risk score that is repeatedly re-calculated during the shopper's visit.
- The foregoing and other features and advantages of the present technology will be more readily apparent from the following detailed description, which proceeds with reference to the drawings.
-
FIG. 1 illustrates a shopping cart including certain features detailed here. -
FIG. 2 shows an illustrative cell phone. -
FIG. 3 depicts aspects of the presently-detailed technology, in a retail store. - The present technology expands on applicant's earlier work, detailed in patent documents 20120214515 and 20140052555, which are incorporated by reference herein and form part of the present specification.
- In accordance with one aspect of the present technology, a shopping cart 10 (
FIG. 1 ) includes aframe 12 conveying a basket 14 oncasters 15. Near ahandle 16 of the cart is aninclined pad 18 on which a shopper'ssmartphone 20 or other mobile device rests. On a bottom shelf of the cart is abattery 22. Wiring (not shown) links thebattery 22 and thepad 18. The cart may includeother electronics 25, such as an audio or wireless sensor, or a Bluetooth beacon. - In addition to powering any electronics provided with the cart, the
battery 22 also serves to charge the shopper's smartphone 20 (FIG. 2 ). Desirably, power is provided from the battery to the phone by an inductive charging arrangement, integrated into thepad 18. As is familiar, inductive chargers are wireless, in the sense that no wire couples the power source to the phone. Instead, a first induction coil in the pad creates an alternating electromagnetic field, and a second induction coil in the phone takes power from the electromagnetic field and converts it back into electrical current to charge the phone's battery. (Inductive charging arrangements are further detailed in patent documents U.S. Pat. No. 5,821,731 and 20070279002.) Desirably, no wired connection to thesmartphone 20 exists, affording the shopper maximum flexibility in placing and removing the smartphone. However, in alternate embodiments, a charging cable (e.g., a USB cable) can couple the phone to thecart battery 22. - The
cart 10 further includes aninductive charging arrangement 24 that serves to charge the cart battery. A corresponding charging apparatus can be distributed through the floor of a store, but more commonly is located in the floor of a corral where the carts are stored for use. That floor-based charger is powered through commercial mains power. (Alternatively, thecart battery 22 can be charged via wired contacts formed on a retaining rail in the cart corral, which engage with wired contacts on each cart. A retaining rail arrangement that can be adapted for charging in this manner is shown in patent U.S. Pat. No. 6,142,283. Other contact-based charging arrangement for shopping cart batteries are detailed in patents U.S. Pat. Nos. 5,064,012 and 3,652,103.) The shopper'smobile device 20 can be conventional and include atouchscreen 26 and various sensors—including a front-facingcamera 28 and a rear-facing camera (not shown). When the mobile device rests on thepad 18 in the cart, one or both of these cameras serves as a scanner device by which the shopper can add items to a checkout tally, as they are placed in the cart. (The shopper may have one or more reusable bags open in the cart, and may place items directly into a bag after scanning.) As is familiar from applicant's earlier applications, items may be identified in various manners, including barcode reading, object recognition, and digital watermark decoding. - Alternatively, the shopper may lift
mobile device 20 from thepad 18 and scan product-identifying information from an item before it is placed in the cart (e.g., while the item is still on a store shelf). This may be done to discover product information, such as cost, nutritional information, expiration date, etc. The shopper can instruct the device to add the item to the checkout tally, and then place the item into the cart. In still other arrangements, the user may first place the item in the cart, and then scan the item with the device. - When the shopper has obtained all the items needed, the
mobile device 20 is used to make payment to the store, per the accumulated checkout tally. Known electronic payment arrangements can be employed, including the PayPal and Apple Pay services, and the system detailed in applicant's patent publications 20140244514 and 20150227925. - While self-checkout has been gaining popularity in Europe (commonly using special purpose mobile terminals, rather than conventional smartphones), it has not been as quick to gain a foothold in the United States. Adoption of self-checkout technology may be accelerated by enhancing protection against pilferage.
- Even though supermarkets and other retail stores commonly include security cameras that may be monitored by store personnel, applicant has found that there are some fraudulent ploys that can escape detection by such surveillance. One is for a dishonest shopper to seemingly present an item for scanning by a mobile terminal, but orient the item so that its barcode is not visible to the scanner. For digitally-watermarked items (in which the identification data spans all of the packaging), a dishonest shopper may “palm” the item, so that the shopper's hand blocks the camera from sensing the item. To store personnel watching a security camera, nothing appears amiss; it appears the item was scanned before placing it into the cart. One way such loss can be detected is by estimating (manually, or by machine vision techniques) the number of items in a cart, and comparing that to a number of items on that cart's checkout tally. (This can be done either in the shopping aisles, or as the cart approaches the exit of the store.) Another detection technique is to have a weight sensor in the cart, and check that the sensed weight of the contents corresponds to a weight calculated from individual weight data about items on the checkout tally. In either case, if something seems amiss, a store clerk can be dispatched to politely investigate.
- But these cross-checks are susceptible to scams as well. A shopper who puts an unscanned item into the cart may seek to conceal the fraud by surreptitiously scanning—for a second time—a less expensive item that is already in the cart. That less expensive item now appears twice on the tally, increasing the cart's item count and calculated weight, while a more expensive item leaves the store without full payment.
- In accordance with a further aspect of the present technology, the camera of a shopper's mobile device is employed to identify items placed in a cart and compile a checkout tally, as above. The tally may further include data indicating the location in the store at which each item was added to the tally. Image data additionally is captured from one or more store cameras 30 (
FIG. 3 ), which are affixed to the store ceiling, to shelves, etc. This latter imagery is wirelessly communicated to astore computer system 32, which includes software that performs activity classification—identifying the time points when captured imagery seems to depict a shopper placing an item in a cart. (Multiple views of the scene aids in this analysis, since a cart can be recognized more reliably, and a 3D model can be estimated that reveals when an item is lowered into the cart by the shopper.) - The two sets of data thereby collected (e.g., the shopper's self-tally, and the data from infrastructure sensors) are then analyzed for anomalies.
- One anomaly is detection of an item placed in a cart at a time that does not correspond with an entry on the checkout tally compiled by the user device. If
store computer 32, in its analysis of imagery fromcameras 30, finds that an item was likely placed in a particular cart at 1:42:03 pm, but no entry on the cart's tally (compiled by the shopper's mobile device) is found within a threshold interval (e.g., within 15, 30 or 60 seconds of this timepoint), then the event is flagged as suspicious. - Another anomaly is detection of an item placed in a cart at a time that coincides with entry of an item on the checkout tally, but the item entered on the tally is not stocked on a shelf near the cart's current location (e.g., such item is stocked more than 10 or 20 feet away). This, too, is flagged as suspicious.
- Still another anomaly is entry of a duplicate item on the cart's tally, more than a threshold interval (e.g., more than 15 or 30 seconds) after the first instance of that item was entered onto the cart's tally.
- Each such event can add (or subtract) points from a risk score for that cart (or for that shopper)—with the number of points dependent on parameters of the event. For example, if an item is added to a checkout tally at one position, but is stocked at a second position that is twenty feet away, 10 points may be added to the risk score. If the item is stocked at a second position that is two aisles away, 50 points may be added to the risk score.
- Score information is relayed to a phone or other device monitored by the store's customer service personnel. If a high risk score is noted (e.g., having a value above a threshold value), a clerk can be dispatched to help the shopper compile an accurate tally.
- The risk score may further take into consideration one or more other factors learned from analysis of records maintained by the computer 32 (e.g., by data mining), involving confirmed irregularities in shopper-compiled check-out tallies.
- One involves time of day. In analyzing historical records, the
computer 32 may discover that self-checkout irregularities seem to be more common in the 2:00 hour on Saturday afternoons, than in any other hour (e.g., normalized to a percentage of shoppers in the store). Conversely, the computer may discover that the smallest percentage of shoppers having difficulty in compiling accurate shelf-checkout tallies is found in the 9:00 am hour on weekdays. Each hour of the week may be scored in this fashion—with a metric indicating a degree of increased (or decreased) loss experience based on historical data analysis. - Another risk factor may be particular aisles, or regions within particular aisles, in which shoppers pause. For example, mining of historical records may suggest that shoppers who pause near a particular section of high priced specialty foods (e.g., aged balsamic vinegars) tend to be associated with greater risks of loss than those who don't. Each location in the store may be scored in this fashion—with a number indicating a degree of increased (or decreased) loss experience based on historical data analysis. (For this purpose, the store may be virtually-divided into discrete zones, e.g., six feet in aisle length—either including shelving on just one side of the aisle, or both sides.) As a shopper pauses at different locations in the store, an aggregate position-based risk score can be compiled, e.g., based on a sum of the scores associated with the various locations.
- Relatedly, each SKU in the store may be associated with a loss risk factor—based on data about historical “shrinkage” (pilferage) of such stock from inventory. Zone-based scores may be derived from such product-based factors, e.g., by averaging the risk loss factors for all products found on shelving within three feet of a location at which a shopper's cart pauses.
- Analysis of store records may also indicate that items which are properly identified on a shopper's tally may be positively- or negatively-correlated with erroneous self-checkout tallies. For example, a cart listing crackers on its checkout tally may be statistically more likely to have an unreported wedge of cheese than a cart that doesn't list crackers on its checkout tally (or that lists prunes on its checkout tally).
- Many other factors can be applied based on identification of particular shoppers. While generalizing loss risks based on demographic factors such age, gender, nationality, etc., is disfavored, some stores may consider such factors. More useful, however, are factors discerned from historical data involving particular shoppers.
- For example, if a particular shopper previously has been found to have one or more inaccurate self-checkout tallies, then heightened scrutiny (e.g., in the form of an extra plus-up to a risk score) is certainly appropriate. Conversely, if a shopper is identified as a “regular” at the store, and no irregularity in self-checkout tallies has previously been noted, then such person's risk score may be reduced accordingly by a factor (e.g., by subtraction or division). If a shopper has not previously been noted at the store, a corresponding risk factor may be added.
- A recognized shopper's variation from normal habits may also give rise to an adjustment of risk score. If a shopper's historical shopping patterns include, primarily, house-brands and lower-priced cuts of meat, then a visit in which the shopper pauses repeatedly near premium brands, and prime cuts of meat, is unusual. So, too, with different times, or days, of shopping. (A regular 9:00 am Tuesday morning shopper, who appears at 10:30 pm, is acting out of character.) Likewise with departure from a usual length of a store visit. (A shopper who normally spends 45-60 minutes in the store traversing all aisles of the store, before buying a cart-full of groceries, breaks that pattern by visiting the store aisles for just five minutes before heading for the exit door.)
- In such circumstances, an increase to the risk score may be warranted. Again, the degree of increase can be tied to particular parameters of the variance.
- A variety of methods for generating an aggregate score can be used, depending on the particular circumstances. One technique employs a polynomial approach, where different factors are weighted differently, and combined to produce an aggregate score. The following exemplary scoring equation uses input metrics M1, M2, M2 and M4 to yield a score S for each shopper (or cart). Factors A, B, C, D and exponents W, X, Y and Z can be determined experimentally, or by Bayesian techniques:
-
S=(A*M1)W+(B*M2)X+(C*M3)Y+(D*M4)Z - Desirably, the score is repetitively recalculated throughout the user's visit (e.g., every time the user pauses, or every ten seconds, etc.). If, at any point, the score exceeds a threshold value, an alert is issued to the store, so that action may be taken. In hindsight, this scoring is akin to that detailed in applicant's patent publications 20120123959 and 20070205266. Those technologies concern detection of patterns that may be associated with increased (or decreased) incidences of fraud—in those cases involving ID verification (e.g., for drivers licenses). The principles detailed in those prior publications are likewise applicable in the present context to help identify patterns that may be associated with fraud. For example, arrangements employing neural networks or factor analysis (c.f., Kim, “Factor Analysis,” Sage Publications, 1979) may be employed.
- It will be recognized that the scoring approaches detailed above are not suited for manual performance, by humans. For example, the “signals” discovered by machine-based mining of historical data (e.g., correlations of different factors with historical loss experience) are typically too weak to be discerned by humans from review of the historical data, given any practical time constraints. (The average supermarket stocked 42,214 different items in 2014. A typical supermarket checks-out hundreds of shoppers each day, including carts aggregating tens of thousands of items each week.) The repetitive recalculation of a risk score is beyond practical human capabilities. Similarly with other aspects of the technology.
- The problems addressed by the present technologies include problems that arise from use of other technologies. For example, while self-checkout technologies bring convenience to the shopper, and labor savings to the retailer, they bring with them new risks of loss—risks that embodiments of the present technology help identify so that they can be addressed.
- It will be recognized that the foregoing arrangements address various issues that have deterred adoption of self-checkout in retail stores. For example, the detailed technologies sense circumstances associated with increased risks of loss, permitting stores to appropriately deploy personnel to assist shoppers in compiling accurate self-checkout tallies. In some embodiments, store infrastructure that is already present for other purposes (e.g., security cameras) is re-purposed to aid in activity classification and 3D shopper modeling.
- Having described and illustrated the principles of the technology with reference to illustrative examples, it will be recognized that the technology is not so limited.
- For example, while the detailed arrangements computed a score that increased with fraud risk, in other arrangements a score that decreased with fraud risk (e.g., a trust score) can be employed.
- Similarly, while reference was made to use of store infrastructure cameras to sense a shopper's placement of an item in a cart, it will be recognized that other sensors can additionally or alternatively be employed for this task. Motion or weight sensors attached to store shelving are one such alternative, and can detect removal of items.
- Although the detailed arrangements use shopping app software on the mobile device to perform product recognition, compile a checkout tally, and effect payment, in other embodiments such component functions can naturally be performed otherwise—including by operating system software on a shopper's device, by the
store computer 32, by a remote server, distributed between such devices, etc. - Naturally, the historical correlations between different factors and different loss experiences can be based on more than data from a single store. For example, data from a chain of stores—encompassing hundreds or thousands of locations—can be considered.
- Shopper or cart location within the store can be determined by various means, including by reference data that associates different regions in a field of view of each
camera 30 with different locations in a store aisle. Alternatively, thecart 10 can be equipped with a low power Bluetooth beacon or RFID chip that is sensed by aproximate sensor 34 mounted to store shelving. Still further, geolocation by known WiFi or audio techniques can be employed, based on signals received by a sensor in the cart and relayed to the store computer system, etc. - Speaking of beacons, applicant's inventive combinations include use of the presently-described technologies in conjunction with beacon and other signaling arrangements described in application Ser. No. 14/739,251, filed Jun. 15, 2015.
- Activity classification from surveillance video has been an interest of researchers for many years, and the science has been extensively developed. See, e.g., Trinh, et al, Detecting human activities in retail surveillance using hierarchical finite state machine, IEEE Int'l Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2011, pp. 1137-1340; Trinh, et al, Multimodal ranking for non-compliance detection in retail surveillance, IEEE Workshop on Applications of Computer Vision, 2012, pp. 241-246; Popoola, et al, Video-based abnormal human behavior recognition—a review, IEEE Trans. on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 42.6, 2012, pp. 865-878; Qian, et al, Recognition of human activities using SVM multi-class classifier, Pattern Recognition Letters 31.2, 2010, pp. 100-111; Wang, et al, Correspondence-free activity analysis and scene modeling in multiple camera views, IEEE Trans. on Pattern Analysis and Machine Intelligence, 32.1, 2010, pp. 56-71; and Hoai, et al, Joint segmentation and classification of human actions in video, IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), 2011, pp. 3265-3272, and references cited therein.
- A cart, or shopper, can be identified in various ways. For example, a cart can be equipped with identification means, such as an RFID chip, a Bluetooth beacon, or visual indicia that can be recognized by
cameras 30. A shopper can be identified by a physical or virtual store loyalty card, or payment card, employed during the shopper's visit, or by other unique-identifying data presented by the shopper. Facial- or other biometric-identification can also be employed. The shopper can be demographically classified (while staying anonymous) by apparent gender, estimated age, clothing color, etc., as is familiar to artisans. - Since the cart includes the mobile device at a posture where it is readable to the shopper (e.g., for presentation of the shopping tally), the device can also present other information of potential interest to the shopper, such as store map information, and location- or product-based offers. (E.g., if a shopper has added peanut butter to their cart, the shopping app can also present a coupon for jelly, or simply note the location of such companion product on a store map).
- References to wireless technology should be understood to include not just electromagnetic radiation (e.g., light and radio signals), but also acoustic pressure waves (e.g., audio—both within and above the human range of hearing).
- In implementing the presently-described technology, the artisan has a great deal of freedom concerning the parameters involved. Consider a parameter specifying how remote a shopper must be from an item's stock location, when the item is entered onto the checkout tally, in order for the action to result in an increase in risk score. Some implementers might set a threshold distance at six feet. Others might set a threshold at 15 feet, while still others wouldn't increase the risk score unless the shopper, and the item's stock location, are located in different aisles. Similarly with other concepts of spatial nearness, or proximity. In one system, two locations are near if they are within six feet. Others are near if they are within 10 feet. Etc. Likewise with concepts of temporal proximity. In one implementation, a risk score may be increased when duplicate items are entered onto a shopper's tally more than 10 seconds apart. In another implementation, the risk score may not be increased unless the duplicate items are entered at times that are at least 30 seconds apart. (The tally data typically includes timestamp information indicating, to the second, the time at which each item was scanned by the user and entered onto the tally.)
- To keep this specification concise as required by the Patent Act, applicant has omitted certain mundane details that are straightforward to artisans implementing such technology. For example, decoding barcode indicia, transmitting product identification data to a database, displaying product information returned from a database, presenting coupon offers, etc., are all familiar to artisans in the relevant fields.
- As should be evident, the technology detailed herein finds utility with all manner of user devices. Not just smartphones, but also tablets, digital cameras, wrist- and head-mounted systems and other wearable devices, etc., can all make use of the principles detailed herein.
- Particularly contemplated mobile devices include the Google Glass product; the Apple iPhone 6; smartphones following Google's Android specification (e.g., the Galaxy S4 phone, manufactured by Samsung, and the Google Moto X phone, made by Motorola), and Windows 8 mobile phones (e.g., the Nokia Lumia 1020).
- The design of smartphones is familiar to the artisan. In general terms, each includes one or more processors, one or more memories (e.g. RAM), storage (e.g., a disk or flash memory), a user interface (which may include, e.g., a keypad, a TFT LCD or OLED display screen, touch or other gesture sensors, a camera or other optical sensor, a compass sensor, a 3D magnetometer, a 3-axis accelerometer, a 3-axis gyroscope, one or more microphones, etc., together with software instructions for providing a graphical user interface), interconnections between these elements (e.g., buses), and an interface for communicating with other devices (which may be wireless, such as GSM, 3G, 4G, CDMA, WiFi, WiMax, Zigbee, Thread or Bluetooth, and/or wired, such as through an Ethernet local area network, etc.). The processes and system components detailed in this specification can be implemented as instructions for computing devices, including general purpose processor instructions for a variety of programmable processors, such as microprocessors (e.g., the Intel Atom, the ARM A5, the Qualcomm Snapdragon, and the nVidia Tegra 4; the latter includes a CPU, a GPU, and nVidia's Chimera computational photography architecture), graphics processing units (GPUs, such as the nVidia Tegra APX 2600, and the Adreno 330—part of the Qualcomm Snapdragon processor), and digital signal processors (e.g., the Texas Instruments TMS320 and OMAP series devices), etc. These instructions can be implemented as software, firmware, etc. These instructions can also be implemented in various forms of processor circuitry, including programmable logic devices, and field programmable gate arrays (e.g., the Xilinx Virtex series devices). Execution of the instructions can be distributed among processors and/or made parallel across processors within a device or across a network of devices. Processing of data can also be distributed among different processor and memory devices. Cloud computing resources can be used as well. References to “processors,” “modules” or “components” should be understood to refer to functionality, rather than requiring a particular form of implementation. Software instructions for implementing the detailed functionality can be authored by artisans without undue experimentation from the descriptions provided herein, e.g., written in C, C++, Visual Basic, Java, Python, Tcl, Perl, Scheme, Ruby, etc., in conjunction with associated data. Smartphones and other devices according to certain implementations of the present technology can include software modules for performing the different functions and acts. Known browser software, communications software, imaging software, and media processing software can be adapted for use in implementing the present technology.
- Software and hardware configuration data/instructions are commonly stored as instructions in one or more data structures conveyed by non-transitory tangible media, such as magnetic or optical discs, memory cards, ROM, etc., which may be accessed across a network. Some embodiments may be implemented as embedded systems—special purpose computer systems in which operating system software and application software are indistinguishable to the user (e.g., as is commonly the case in basic cell phones). The functionality detailed in this specification can be implemented in operating system software, application software and/or as embedded system software.
- Another form of implementation is electronic circuitry that has been custom-designed and manufactured to perform some or all of the component acts, as an application specific integrated circuit (ASIC).
- To realize such an implementation, the relevant module(s) are first implemented using a general purpose computer, using software such as Matlab (from Mathworks, Inc.). A tool such as HDLCoder (also available from MathWorks) is next employed to convert the MatLab model to VHDL (an IEEE standard, and doubtless the most common hardware design language). The VHDL output is then applied to a hardware synthesis program, such as Design Compiler by Synopsis, HDL Designer by Mentor Graphics, or Encounter RTL Compiler by Cadence Design Systems. The hardware synthesis program provides output data specifying a particular array of electronic logic gates that will realize the technology in hardware form, as a special-purpose machine dedicated to such purpose. This output data is then provided to a semiconductor fabrication contractor, which uses it to produce the customized silicon part. (Suitable contractors include TSMC, Global Foundries, and ON Semiconductors.)
- Essentially all of the functions detailed above can be implemented in such fashion, e.g., decoding a watermark or barcode payload from captured imagery, activity classification, etc.
- Patent application Ser. No. 14/842,575, filed Sep. 1, 2015, details particular hardware implementations for watermark detection, which are suitable for use with the present technology.
- As indicated above, reference to a “module” that performs a certain function should be understood to encompass one or more items of software, and/or one or more hardware circuits—such as an ASIC as just-described.
- As indicated, different configurations of the functionality can be implemented on different devices. For example, in a system in which a smartphone communicates with a computer at a remote location, different tasks can be performed exclusively by one device or the other, or execution can be distributed between the devices. Extraction of watermark information from imagery is an example of a process that can be distributed in such fashion. Activity classification is another. Thus, it should be understood that description of an operation as being performed by a particular device (e.g., a smartphone) is not limiting but exemplary; performance of the operation by another device (e.g., a remote server), or shared between devices, is also expressly contemplated.
- In like fashion, description of data being stored on a particular device is also exemplary; data can be stored anywhere: local device, remote device, in the cloud, distributed, etc.
- The in-store mobile shopping app can form part of, or incorporate features from, applicant's Discover app. This app and related technology are detailed, e.g., in published patent applications 20110212717, 20110161076, 20120208592, 20130311329, and 20140052555, and in pending application Ser. No. 14/251,229, filed Apr. 11, 2014 (now published as 20150016712). Applicant's other work that is relevant to the present technology includes that detailed in patent documents 20120214515 and 20140164124.
- Other cart-based shopping systems are detailed in patent documents U.S. Pat. No. 5,287,266, 20040111320, 20100072715, 20100096450, and 20140108195.
- Patent documents 20040153663 and 20120123959 provide additional information on multi-factor risk assessment.
- This specification has addressed several different embodiments. It should be understood that the methods, elements and concepts detailed in connection with one embodiment can be combined with the methods, elements and concepts detailed in connection with other embodiments. Applicant similarly recognizes and intends that the methods, elements and concepts of this specification can be combined, substituted and interchanged—not just among and between themselves, but also with those known from the cited prior art. Moreover, it will be recognized that the detailed technology can be included with other technologies—current and upcoming—to advantageous effect. Implementation of such combinations is straightforward to the artisan from the teachings provided in this disclosure.
- While this disclosure has detailed particular ordering of acts and particular combinations of elements, it will be recognized that other contemplated methods may re-order acts (possibly omitting some and adding others), and other contemplated combinations may omit some elements and add others, etc.
- Although disclosed as complete systems, sub-combinations of the detailed arrangements are also separately contemplated (e.g., omitting various features of a complete system).
- While certain aspects of the technology have been described by reference to illustrative methods, it will be recognized that apparatuses configured to perform the acts of such methods are also contemplated as part of applicant's inventive work. Likewise, other aspects have been described by reference to illustrative apparatus, and the methodology performed by such apparatus is likewise within the scope of the present technology. Still further, tangible computer readable media containing instructions for configuring a processor or other programmable system to perform such methods is also expressly contemplated.
- To provide a comprehensive disclosure, while complying with the statutory requirement of conciseness, applicant incorporates-by-reference each of the documents referenced herein. (Such materials are incorporated in their entireties, even if cited above in connection with specific of their teachings.) The present specification should be read in the context of these cited documents. These documents disclose technologies and teachings that can be incorporated into the arrangements detailed herein, and into which the technologies and teachings detailed herein can be incorporated. The reader is presumed to be familiar with such prior work.
- In view of the wide variety of embodiments to which the principles and features discussed above can be applied, it should be apparent that the detailed embodiments are illustrative only, and should not be taken as limiting the scope of the invention. Rather, the subject technology includes all such modifications as may come within the scope and spirit of the following claims and equivalents thereof.
Claims (19)
1-2. (canceled)
3. A method comprising:
with a camera of a shopper's mobile device conveyed by shopping cart, capturing a product identifier from a retail item placed in the cart, and adding associated information to a purchase tally;
with a second sensor mounted to store infrastructure, capturing data about the shopper during an act of moving the item from a store shelf into the cart; and
determining if a product identifier was captured by the shopper's mobile device camera from each item placed in the shopper's cart.
4. The method of claim 3 in which the second sensor comprises a second camera, and said determining is performed using imagery captured by said second camera.
5. The method of claim 4 in which said determining includes determining, using data captured by the second camera, a time at which an item was placed in the shopper's cart, and checking said tally to confirm that a product identifier was captured from an item at said time.
6. A method comprising the acts:
determining, by detection of a signal emitted by a wireless beacon, a shopper's location in an aisle of a retail store;
adding, to a checkout tally, an item scanned at said location by the shopper, using a camera in a mobile phone device, the device extracting an item identifier encoded on the item;
checking a database to determine a stock location where said scanned item is stocked in the store; and
taking a responsive action when the stock location is remote from the shopper's location.
7. The method of claim 6 in which the stock location is more than ten feet from the shopper's location, and the method includes taking said responsive action.
8. The method of claim 6 in which the stock location is more than twenty feet from the shopper's location, and the method includes taking said responsive action.
9. The method of claim 6 in which the stock location is in an aisle different that the aisle in which the shopper is located.
10. The method of claim 6 in which the responsive action comprises issuing an alert to store personnel.
11. The method of claim 6 in which the responsive action comprises increasing a risk score.
12. A method comprising the acts:
analyzing imagery captured by a camera fixedly-mounted in a retail store, to detect an event, namely that a shopper has removed an item from a store shelf, or placed an item in a shopping basket;
storing data indicating a time of said event;
checking a shopper-compiled tally of items, the tally including, for each item, time-stamp data indicating a time that the item was added to the tally; and
taking a responsive action when no item was added to the tally within a threshold interval of time around the time indicated by said stored data.
13. The method of claim 12 in which no item was added to the tally within 15 seconds of the time of said event, and the method includes taking said responsive action.
14. The method of claim 12 in which the responsive action includes issuing an alert to store personnel.
15. The method of claim 12 in which the responsive action includes increasing a risk score.
16. A method comprising the acts:
extracting identifier data from imagery captured by a user device from an item, consulting a data structure with the extracted identifier to obtain a corresponding item identifier, and entering the item identifier on a tally with associated time-stamp data;
examining the tally for duplicate item identifiers;
determining that a time difference between entry of a first of said item identifiers on the tally, and entry of a second of said item identifiers on the tally, is greater than a threshold value; and
taking an action in response to said determining.
17. The method of claim 16 in which said time difference is greater than 15 seconds, and the method includes taking said responsive action.
18. The method of claim 16 that further includes:
determining, by detection of a signals emitted by one or more wireless beacons, the shopper's location in an aisle of a retail store, at times that said duplicate items were added to the tally;
consulting a database to identify a stock location for said duplicate items;
when said stock location is within six feet of the determined shopper location, taking a first action in response to said determining; and
when said stock location is greater than six feet away from the determined shopper location, taking a second action in response to said determining, the second action being different than said first action.
19. The method of claim 18 that further includes:
when said stock location is greater than six feet away from the determined shopper location but in the same aisle as the determined shopper location, taking one second action; and
when said stock location is great than six feet away from the determined shopper location but in a different aisle than the determined shopper location, taking a different second action.
20. (canceled)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/971,747 US20160189277A1 (en) | 2014-12-24 | 2015-12-16 | Self-checkout arrangements |
US16/263,504 US11074637B2 (en) | 2014-12-24 | 2019-01-31 | Self-checkout arrangements |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462096821P | 2014-12-24 | 2014-12-24 | |
US14/971,747 US20160189277A1 (en) | 2014-12-24 | 2015-12-16 | Self-checkout arrangements |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/263,504 Continuation US11074637B2 (en) | 2014-12-24 | 2019-01-31 | Self-checkout arrangements |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160189277A1 true US20160189277A1 (en) | 2016-06-30 |
Family
ID=56164761
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/971,747 Abandoned US20160189277A1 (en) | 2014-12-24 | 2015-12-16 | Self-checkout arrangements |
US16/263,504 Active 2035-12-21 US11074637B2 (en) | 2014-12-24 | 2019-01-31 | Self-checkout arrangements |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/263,504 Active 2035-12-21 US11074637B2 (en) | 2014-12-24 | 2019-01-31 | Self-checkout arrangements |
Country Status (1)
Country | Link |
---|---|
US (2) | US20160189277A1 (en) |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160270563A1 (en) * | 2015-03-17 | 2016-09-22 | Renewable Edge Llc | Solar powered systems and devices for improved shopping cart corral |
US20170053326A1 (en) * | 2015-08-19 | 2017-02-23 | Wal-Mart Stores, Inc. | System for reducing waiting time |
US20180315011A1 (en) * | 2017-02-23 | 2018-11-01 | John Clarke | Limited Spatial Digital Directory with Physical Navigation for Optimizing Smart Carts |
GB2562131A (en) * | 2017-05-05 | 2018-11-07 | Arm Kk | Methods, systems and devicesfor detecting user interactions |
CN108789436A (en) * | 2018-06-15 | 2018-11-13 | 重庆优豆商贸有限公司 | Intelligent assistance formula shopping robot |
US20180365951A1 (en) * | 2017-06-15 | 2018-12-20 | Ncr Corporation | Real time bypass detection in scanner |
US20190164142A1 (en) * | 2017-11-27 | 2019-05-30 | Shenzhen Malong Technologies Co., Ltd. | Self-Service Method and Device |
US20190176864A1 (en) * | 2017-12-08 | 2019-06-13 | Toshiba Tec Kabushiki Kaisha | Carriage and information processing device |
US10467609B2 (en) * | 2017-04-27 | 2019-11-05 | Walmart Apollo, Llc | Products identifying carrier |
US10510219B1 (en) | 2015-07-25 | 2019-12-17 | Gary M. Zalewski | Machine learning methods and systems for managing retail store processes involving cashier-less transactions |
WO2020040710A3 (en) * | 2017-12-29 | 2020-04-16 | Migros Ticaret Anonim Sirketi | A system for enabling customers to do shopping in physical stores via their mobile devices |
CN111801262A (en) * | 2018-03-02 | 2020-10-20 | 马丁·埃伯莱因 | Transport device with at least one transport device and method for producing, operating and maintaining a transport device |
US10885336B1 (en) | 2018-01-13 | 2021-01-05 | Digimarc Corporation | Object identification and device communication through image and audio signals |
US20210061334A1 (en) * | 2019-09-03 | 2021-03-04 | Dale Lee Yones | Empty bottom shelf of shopping cart monitor and alerting system using distance measuring methods |
US10977717B2 (en) * | 2019-07-22 | 2021-04-13 | Pickey Solutions Ltd. | Hand actions monitoring device |
US11126861B1 (en) | 2018-12-14 | 2021-09-21 | Digimarc Corporation | Ambient inventorying arrangements |
US11151540B2 (en) * | 2018-06-04 | 2021-10-19 | Worldline Sa/Nv | Device and method for secure identification of a user |
US20220207504A1 (en) * | 2020-12-27 | 2022-06-30 | Bizerba SE & Co. KG | Self-checkout store |
US20220207595A1 (en) * | 2020-12-27 | 2022-06-30 | Bizerba SE & Co. KG | Self-checkout store |
US20220270099A1 (en) * | 2021-02-19 | 2022-08-25 | Toshiba Tec Kabushiki Kaisha | Self-checkout system and method |
US11501346B2 (en) * | 2019-03-26 | 2022-11-15 | Toshiba Global Commerce Solutions Holdings Corporation | System and method for facilitating seamless commerce |
US11538063B2 (en) | 2018-09-12 | 2022-12-27 | Samsung Electronics Co., Ltd. | Online fraud prevention and detection based on distributed system |
EP4125020A1 (en) | 2021-07-30 | 2023-02-01 | Fujitsu Limited | Information processing program, information processing method, and information processing apparatus |
EP4125019A1 (en) | 2021-07-30 | 2023-02-01 | Fujitsu Limited | Information processing program, information processing method, and information processing apparatus |
US20230030356A1 (en) * | 2015-04-06 | 2023-02-02 | Position Imaging, Inc. | Package tracking systems and methods |
WO2023039677A1 (en) * | 2021-09-17 | 2023-03-23 | Leav Inc. | Contactless checkout system with theft detection |
US20230106402A1 (en) * | 2020-06-15 | 2023-04-06 | Rainus Co., Ltd. | Electronic shelf label |
US11755989B2 (en) * | 2020-03-27 | 2023-09-12 | Toshiba Global Commerce Solutions Holdings Corporation | Preventing theft at retail stores |
US11798064B1 (en) | 2017-01-12 | 2023-10-24 | Digimarc Corporation | Sensor-based maximum-likelihood estimation of item assignments |
EP4303825A1 (en) | 2022-07-07 | 2024-01-10 | Fujitsu Limited | Information processing program, information processing method, and information processing device |
US11983663B1 (en) | 2015-04-06 | 2024-05-14 | Position Imaging, Inc. | Video for real-time confirmation in package tracking systems |
US12008513B2 (en) | 2016-09-08 | 2024-06-11 | Position Imaging, Inc. | System and method of object tracking using weight confirmation |
US12045765B1 (en) | 2015-04-06 | 2024-07-23 | Position Imaging, Inc. | Light-based guidance for package tracking systems |
US12051040B2 (en) | 2017-11-18 | 2024-07-30 | Walmart Apollo, Llc | Distributed sensor system and method for inventory management and predictive replenishment |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10650653B2 (en) * | 2016-07-20 | 2020-05-12 | United Parcel Service Of America, Inc. | Location tracking using beacons |
WO2019213418A1 (en) * | 2018-05-02 | 2019-11-07 | Walmart Apollo, Llc | Systems and methods for transactions at a shopping cart |
CN113508424B (en) * | 2019-03-04 | 2023-07-14 | 日本电气株式会社 | Store device, store system, checkout method, and program |
US11869032B2 (en) * | 2019-10-01 | 2024-01-09 | Medixin Inc. | Computer system and method for offering coupons |
US20230131444A1 (en) * | 2020-03-26 | 2023-04-27 | Walmart Apollo, Llc | Systems and methods of detecting fraudulent activity at self-checkout terminals |
WO2022235637A1 (en) * | 2021-05-04 | 2022-11-10 | Trax Technology Solutions Pte Ltd. | Methods and systems for retail environments |
Family Cites Families (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4973952A (en) | 1987-09-21 | 1990-11-27 | Information Resources, Inc. | Shopping cart display system |
US6092725A (en) * | 1997-01-24 | 2000-07-25 | Symbol Technologies, Inc. | Statistical sampling security methodology for self-scanning checkout system |
CA2201423C (en) | 1997-04-01 | 2007-06-26 | Michael Coveley | Cashierless shopping store and components for use therein |
US6394355B1 (en) | 1999-02-22 | 2002-05-28 | Symbol Technologies, Inc. | Hand-held acquistion device |
US7870078B2 (en) | 2002-11-01 | 2011-01-11 | Id Insight Incorporated | System, method and computer program product for assessing risk of identity theft |
US20040111320A1 (en) | 2002-12-05 | 2004-06-10 | Jorg Schlieffers | Electronic shopping system |
US7465342B2 (en) | 2003-04-07 | 2008-12-16 | Silverbrook Research Pty Ltd | Method of minimizing absorption of visible light in ink compositions comprising infrared metal-dithiolene dyes |
US6854656B2 (en) * | 2003-05-08 | 2005-02-15 | Fujitsu Limited | Self-scanning system with enhanced features |
US7631808B2 (en) | 2004-06-21 | 2009-12-15 | Stoplift, Inc. | Method and apparatus for detecting suspicious activity using video analysis |
NL1027947C2 (en) | 2005-01-04 | 2006-01-09 | Scangineers B V | Self scanning method for use in supermarket, compares actual weight of items in trolley with theoretical weight of items scanned in as they are placed in trolley |
MX2007013297A (en) * | 2005-04-29 | 2008-03-07 | Springboard Retail Networks Licensing Srl | Systems and methods for enabling information management incorporating a personal computing device. |
DE102005038811A1 (en) * | 2005-08-17 | 2007-03-01 | Rainer Brenner | Method and device for securing objects |
US20080237339A1 (en) | 2007-03-26 | 2008-10-02 | Media Cart Holdings, Inc. | Integration of customer-stored information with media enabled shopping systems |
US8229158B2 (en) | 2008-04-29 | 2012-07-24 | International Business Machines Corporation | Method, system, and program product for determining a state of a shopping receptacle |
US20090272801A1 (en) | 2008-04-30 | 2009-11-05 | Connell Ii Jonathan H | Deterring checkout fraud |
US8448859B2 (en) | 2008-09-05 | 2013-05-28 | Datalogic ADC, Inc. | System and method for preventing cashier and customer fraud at retail checkout |
US20100072715A1 (en) | 2008-09-19 | 2010-03-25 | Engage In-Store, LLC | Electronic device for shopping cart |
US8462212B1 (en) | 2008-12-04 | 2013-06-11 | Stoplift, Inc. | Correlating detected events with image data |
US8403215B2 (en) | 2009-05-11 | 2013-03-26 | Toshiba Global Commerce Solutions Holdings Corporation | Self shopping support by getting contents from electronic shelf labels |
US8819172B2 (en) | 2010-11-04 | 2014-08-26 | Digimarc Corporation | Smartphone-based methods and systems |
US20100318440A1 (en) | 2010-03-18 | 2010-12-16 | Coveley Michael Ej | Cashierless, Hygienic, Automated, Computerized, Programmed Shopping Store, Storeroom And Supply Pipeline With Administration Cataloguing To Eliminate Retail Fraud; With Innovative Components For Use Therein |
US20110274094A1 (en) | 2010-05-06 | 2011-11-10 | Qualcomm Incorporated | Methods and apparatus for estimating a geolocation of a wireless communications device |
US9053473B2 (en) | 2010-05-28 | 2015-06-09 | Ncr Corporation | Techniques for assisted self checkout |
US20120041845A1 (en) | 2010-08-11 | 2012-02-16 | Lmr Inventions, Llc | System and method for enabling customers to perform self check-out procedures in a retail setting |
US10121133B2 (en) | 2010-10-13 | 2018-11-06 | Walmart Apollo, Llc | Method for self-checkout with a mobile device |
US9218580B2 (en) | 2010-12-30 | 2015-12-22 | Honeywell International Inc. | Detecting retail shrinkage using behavioral analytics |
US8317086B2 (en) | 2011-02-16 | 2012-11-27 | International Business Machines Corporation | Communication of transaction data within a self-checkout environment |
US8660581B2 (en) | 2011-02-23 | 2014-02-25 | Digimarc Corporation | Mobile device indoor navigation |
US9129277B2 (en) | 2011-08-30 | 2015-09-08 | Digimarc Corporation | Methods and arrangements for identifying objects |
US10129211B2 (en) | 2011-09-15 | 2018-11-13 | Stephan HEATH | Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms |
US20130103608A1 (en) | 2011-10-21 | 2013-04-25 | Ebay Inc. | Location Determination and Map Building |
US20140304107A1 (en) | 2012-12-03 | 2014-10-09 | CLARKE William McALLISTER | Webrooming with rfid-scanning robots |
US9702707B2 (en) | 2011-12-22 | 2017-07-11 | AppLabz, LLC | Systems, methods, and apparatus for providing indoor navigation using optical floor sensors |
US20130317916A1 (en) | 2011-12-29 | 2013-11-28 | Intel Corporation | Location based technology for smart shopping services |
US11062258B2 (en) | 2012-02-24 | 2021-07-13 | Netclearance Systems, Inc. | Automated logistics management using proximity events |
US9892438B1 (en) * | 2012-05-03 | 2018-02-13 | Stoplift, Inc. | Notification system and methods for use in retail environments |
US9536236B2 (en) | 2012-06-08 | 2017-01-03 | Ronny Hay | Computer-controlled, unattended, automated checkout store outlet and related method |
US10878439B2 (en) | 2012-06-11 | 2020-12-29 | Retailmenot, Inc. | Mobile-offer creation |
US11210688B2 (en) | 2012-06-15 | 2021-12-28 | Walmart Apollo, Llc | Systems and methods for interactive shopping using a mobile computing device |
US20140111380A1 (en) | 2012-10-22 | 2014-04-24 | Cambridge Silicon Radio Limited | Method for short-range proximity derivation and tracking |
JP2016510566A (en) | 2013-02-04 | 2016-04-07 | ショップキック・インコーポレーテッドShopkick Incorporated | Presence detection using Bluetooth and hybrid mode transmitters |
US9171300B2 (en) | 2013-03-12 | 2015-10-27 | Tw Vending, Inc. | Retail convenience market technology with enhanced vendor administration and user mobile app functionality |
US8915429B2 (en) | 2013-03-15 | 2014-12-23 | Ncr Corporation | Methods of mobile self-checkout shopping for produce items in a retail grocery store |
US9033227B2 (en) | 2013-05-20 | 2015-05-19 | Ncr Corporation | Methods and systems for performing security weight checks at checkouts |
US20140365334A1 (en) | 2013-06-07 | 2014-12-11 | Bby Solutions, Inc. | Retail customer service interaction system and method |
US9928541B2 (en) | 2013-06-28 | 2018-03-27 | Wal-Mart Stores, Inc. | Consumer guidance while shopping for products |
US20150025969A1 (en) | 2013-07-18 | 2015-01-22 | Fetch Rewards, LLC | Multisystem Interface for Roaming Self-Checkout |
GB2521244A (en) | 2013-08-30 | 2015-06-17 | Asda Stores Ltd | Methods and systems to facilitate messaging to customers |
US20150095161A1 (en) | 2013-10-02 | 2015-04-02 | Anurag Goel | Universal Retail App and Auxiliary Methods |
US20150119076A1 (en) | 2013-10-31 | 2015-04-30 | Nant Holdings Ip, Llc | Self-calibrating mobile indoor location estimations, systems and methods |
US10496946B2 (en) | 2013-11-06 | 2019-12-03 | Catalina Marketing Corporation | System and method for risk-based auditing of self-scan shopping baskets |
US20150154675A1 (en) | 2013-12-02 | 2015-06-04 | Ebay Inc. | Customer shopping help system |
US10102558B2 (en) | 2013-12-18 | 2018-10-16 | Paypal, Inc. | Smart dressing rooms |
US9881261B2 (en) | 2014-02-25 | 2018-01-30 | Paypal, Inc. | Systems and methods for remote check-in |
US20150262116A1 (en) | 2014-03-16 | 2015-09-17 | International Business Machines Corporation | Machine vision technology for shelf inventory management |
US20150278888A1 (en) | 2014-03-28 | 2015-10-01 | Branding Brand, Inc. | System and method for acquiring information |
ES2525510B1 (en) | 2014-04-09 | 2015-09-29 | Jose Antonio QUINTERO TRAVERSO | System and method for control and management of shopping carts |
US9332522B2 (en) | 2014-05-20 | 2016-05-03 | Disney Enterprises, Inc. | Audiolocation system combining use of audio fingerprinting and audio watermarking |
CN106714612B (en) | 2014-05-30 | 2020-08-11 | 电子商品交易合伙人有限公司 | RFID enhancements and location detection in jewelry shopping experiences |
-
2015
- 2015-12-16 US US14/971,747 patent/US20160189277A1/en not_active Abandoned
-
2019
- 2019-01-31 US US16/263,504 patent/US11074637B2/en active Active
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160270563A1 (en) * | 2015-03-17 | 2016-09-22 | Renewable Edge Llc | Solar powered systems and devices for improved shopping cart corral |
US12045765B1 (en) | 2015-04-06 | 2024-07-23 | Position Imaging, Inc. | Light-based guidance for package tracking systems |
US20230030356A1 (en) * | 2015-04-06 | 2023-02-02 | Position Imaging, Inc. | Package tracking systems and methods |
US12008514B2 (en) * | 2015-04-06 | 2024-06-11 | Position Imaging, Inc. | Package tracking systems and methods |
US11983663B1 (en) | 2015-04-06 | 2024-05-14 | Position Imaging, Inc. | Video for real-time confirmation in package tracking systems |
US11417179B1 (en) | 2015-07-25 | 2022-08-16 | Gary M. Zalewski | Using image and voice tracking to contextually respond to a user in a shopping environment |
US10510219B1 (en) | 2015-07-25 | 2019-12-17 | Gary M. Zalewski | Machine learning methods and systems for managing retail store processes involving cashier-less transactions |
US10573134B1 (en) | 2015-07-25 | 2020-02-25 | Gary M. Zalewski | Machine learning methods and system for tracking label coded items in a retail store for cashier-less transactions |
US11315393B1 (en) | 2015-07-25 | 2022-04-26 | Gary M. Zalewski | Scenario characterization using machine learning user tracking and profiling for a cashier-less retail store |
US11288933B1 (en) | 2015-07-25 | 2022-03-29 | Gary M. Zalewski | Devices for tracking retail interactions with goods and association to user accounts for cashier-less transactions |
US20170053326A1 (en) * | 2015-08-19 | 2017-02-23 | Wal-Mart Stores, Inc. | System for reducing waiting time |
US10650420B2 (en) * | 2015-08-19 | 2020-05-12 | Walmart Apollo, Llc | System for reducing waiting time |
US12008513B2 (en) | 2016-09-08 | 2024-06-11 | Position Imaging, Inc. | System and method of object tracking using weight confirmation |
US11798064B1 (en) | 2017-01-12 | 2023-10-24 | Digimarc Corporation | Sensor-based maximum-likelihood estimation of item assignments |
US20180315011A1 (en) * | 2017-02-23 | 2018-11-01 | John Clarke | Limited Spatial Digital Directory with Physical Navigation for Optimizing Smart Carts |
US10467609B2 (en) * | 2017-04-27 | 2019-11-05 | Walmart Apollo, Llc | Products identifying carrier |
GB2562131B (en) * | 2017-05-05 | 2020-11-04 | Arm Kk | Methods, systems and devices for detecting user interactions |
GB2562131A (en) * | 2017-05-05 | 2018-11-07 | Arm Kk | Methods, systems and devicesfor detecting user interactions |
US20180365951A1 (en) * | 2017-06-15 | 2018-12-20 | Ncr Corporation | Real time bypass detection in scanner |
US11080976B2 (en) * | 2017-06-15 | 2021-08-03 | Ncr Corporation | Real time bypass detection in scanner |
US12051040B2 (en) | 2017-11-18 | 2024-07-30 | Walmart Apollo, Llc | Distributed sensor system and method for inventory management and predictive replenishment |
US20190164142A1 (en) * | 2017-11-27 | 2019-05-30 | Shenzhen Malong Technologies Co., Ltd. | Self-Service Method and Device |
US10636024B2 (en) * | 2017-11-27 | 2020-04-28 | Shenzhen Malong Technologies Co., Ltd. | Self-service method and device |
US20190176864A1 (en) * | 2017-12-08 | 2019-06-13 | Toshiba Tec Kabushiki Kaisha | Carriage and information processing device |
WO2020040710A3 (en) * | 2017-12-29 | 2020-04-16 | Migros Ticaret Anonim Sirketi | A system for enabling customers to do shopping in physical stores via their mobile devices |
US12014408B2 (en) | 2018-01-13 | 2024-06-18 | Digimarc Corporation | Object identification and device communication through image and audio signals |
US10885336B1 (en) | 2018-01-13 | 2021-01-05 | Digimarc Corporation | Object identification and device communication through image and audio signals |
CN111801262A (en) * | 2018-03-02 | 2020-10-20 | 马丁·埃伯莱因 | Transport device with at least one transport device and method for producing, operating and maintaining a transport device |
US11151540B2 (en) * | 2018-06-04 | 2021-10-19 | Worldline Sa/Nv | Device and method for secure identification of a user |
CN108789436A (en) * | 2018-06-15 | 2018-11-13 | 重庆优豆商贸有限公司 | Intelligent assistance formula shopping robot |
US11538063B2 (en) | 2018-09-12 | 2022-12-27 | Samsung Electronics Co., Ltd. | Online fraud prevention and detection based on distributed system |
US11126861B1 (en) | 2018-12-14 | 2021-09-21 | Digimarc Corporation | Ambient inventorying arrangements |
US11501346B2 (en) * | 2019-03-26 | 2022-11-15 | Toshiba Global Commerce Solutions Holdings Corporation | System and method for facilitating seamless commerce |
US10977717B2 (en) * | 2019-07-22 | 2021-04-13 | Pickey Solutions Ltd. | Hand actions monitoring device |
US20210061334A1 (en) * | 2019-09-03 | 2021-03-04 | Dale Lee Yones | Empty bottom shelf of shopping cart monitor and alerting system using distance measuring methods |
US11618490B2 (en) * | 2019-09-03 | 2023-04-04 | Bob Profit Partners Llc. | Empty bottom shelf of shopping cart monitor and alerting system using distance measuring methods |
US11755989B2 (en) * | 2020-03-27 | 2023-09-12 | Toshiba Global Commerce Solutions Holdings Corporation | Preventing theft at retail stores |
US20230106402A1 (en) * | 2020-06-15 | 2023-04-06 | Rainus Co., Ltd. | Electronic shelf label |
US12027075B2 (en) * | 2020-06-15 | 2024-07-02 | Rainus Co., Ltd. | Electronic shelf label |
US11900349B2 (en) * | 2020-12-27 | 2024-02-13 | Bizerba SE & Co. KG | Self-checkout store |
US20240144218A1 (en) * | 2020-12-27 | 2024-05-02 | Bizerba SE & Co. KG | Self-checkout store |
US20220207595A1 (en) * | 2020-12-27 | 2022-06-30 | Bizerba SE & Co. KG | Self-checkout store |
US20220207504A1 (en) * | 2020-12-27 | 2022-06-30 | Bizerba SE & Co. KG | Self-checkout store |
US20220270099A1 (en) * | 2021-02-19 | 2022-08-25 | Toshiba Tec Kabushiki Kaisha | Self-checkout system and method |
EP4125019A1 (en) | 2021-07-30 | 2023-02-01 | Fujitsu Limited | Information processing program, information processing method, and information processing apparatus |
EP4125020A1 (en) | 2021-07-30 | 2023-02-01 | Fujitsu Limited | Information processing program, information processing method, and information processing apparatus |
WO2023039677A1 (en) * | 2021-09-17 | 2023-03-23 | Leav Inc. | Contactless checkout system with theft detection |
EP4303825A1 (en) | 2022-07-07 | 2024-01-10 | Fujitsu Limited | Information processing program, information processing method, and information processing device |
Also Published As
Publication number | Publication date |
---|---|
US11074637B2 (en) | 2021-07-27 |
US20190236684A1 (en) | 2019-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11074637B2 (en) | Self-checkout arrangements | |
US12014408B2 (en) | Object identification and device communication through image and audio signals | |
US11514497B2 (en) | Method of using, apparatus, product, and system for a no touch point-of-sale self-checkout | |
US20230017398A1 (en) | Contextually aware customer item entry for autonomous shopping applications | |
US11847689B2 (en) | Dynamic customer checkout experience within an automated shopping environment | |
US10290031B2 (en) | Method and system for automated retail checkout using context recognition | |
US20180197218A1 (en) | System and method for object detection in retail environment | |
US20180232799A1 (en) | Exhibition device, display control device and exhibition system | |
US10360599B2 (en) | Tracking of members within a group | |
US20180101875A1 (en) | Method and device for recommending in-store product by using visible light communication | |
CA2940398C (en) | Systems and methods for customer deactivation of security elements | |
US20140337177A1 (en) | Associating analytics data with an image | |
US20200387866A1 (en) | Environment tracking | |
JP2010140287A (en) | Purchase action analysis device, method and computer program | |
US20240232994A1 (en) | Sensor-based maximum-likelihood estimation of item assignments | |
JP7140223B2 (en) | Payment processor, method and program | |
JP2023030008A (en) | Information processing system, commodity recommendation method, and program | |
WO2019116620A1 (en) | Processing device, processing method, and program | |
JPWO2016038872A1 (en) | Information processing apparatus, display method, and computer program | |
JP7184089B2 (en) | Customer information registration device | |
JP2016024601A (en) | Information processing apparatus, information processing system, information processing method, commodity recommendation method, and program | |
JP7156215B2 (en) | Server device, mobile store, and information processing system | |
US20230153878A1 (en) | System and method for automating processing of restricted items | |
JP7318683B2 (en) | Information processing program, information processing method, and information processing apparatus | |
WO2018134854A1 (en) | Movement analysis from visual and audio data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: DIGIMARC CORPORATION, OREGON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DAVIS, BRUCE L.;REEL/FRAME:037884/0994 Effective date: 20160229 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |