Patent application number | Description | Published |
20090212102 | SECURE SELF-CHECKOUT - Under the present invention, item verification is automated and expedited. Specifically, items to be purchased can be scanned by the shopper using a barcode reader (e.g., a scanner) attached to or positioned near the shopping receptacle. As items are scanned, they are identified based on their barcode and added to an item list. Item verification can then performed at checkout using imaging technology. For example, the shopping cart or shopping basket can be brought into the field of view of a computer-connected camera. The camera and computer can, working from the customer's item list developed when the items are scanned, observe each product in the receptacle and “ring it up”. If all products can be accounted for, the customer is free to leave; otherwise the customer is denied egress, informed of the problem, etc. A store employee can also be signaled to investigate. The total time required to make the decision is the time to take a picture and process it, which by human standards is very fast; faster than existing verification methods. | 08-27-2009 |
20090216632 | CUSTOMER REWARDING - The present invention provides an approach for rewarding customers for use of self-checkout stations and, optionally, for being self-sufficient in such use by not requiring retailer (employee) assistance. Specifically, the under the present invention, a set of service choices made by a customer during purchasing transactions are tracked. Such service choices include whether the customer elected to use self-checkout stations. In addition, a frequency of assistance needed by the customer during the purchasing transactions will be tracked. Such tracking can be accomplished using any known technology including the use of the customer loyalty cards that are assigned to specific customers. In any event, a reward can be offered to the customer if the customer elected to use self-checkout stations to complete at least a subset of the purchasing transactions, and/or if the frequency of assistance needed by the customer during the purchasing transactions fell below a predetermined threshold. | 08-27-2009 |
20090236419 | CONTROLLING SHOPPER CHECKOUT THROUGHPUT - The present invention provides a solution for controlling checkout throughput. Specifically, under the present invention a set of attributes of an item will be obtained. An analysis of the set of attributes will then be performed to determine whether an inconsistency exists based on a tolerance threshold. Such analysis can include, for example, comparing the weight of the item to its expected weight. This can help determine if a mistake has been made or fraud has been committed. Whether an inconsistency is observed is based on a tolerance threshold. For example, a certain deviation (i.e., the tolerance threshold) from an expected value could be allowed to could be allowed to reduce errors during the checkout process and thereby increase checkout throughput. As such, the present invention allows the tolerance threshold to be tuned based on a desired checkout throughput. | 09-24-2009 |
20090237232 | ALARM SOLUTION FOR SECURING SHOPPING CHECKOUT - Under the present invention, a single, overall alarm for an entire set of shopping items will be used for any and all discrepancies. The metric used for creating an alarm for the overall set of shopping items can be based on any one of the following candidate policies: if at least one item generated an alarm; if some fixed number of items generated an alarm; if some threshold discrepancy metric got exceed; if basket size is larger than certain threshold cash value and the alarm exceeded certain threshold alarm rate; a randomly generated alarm (e.g., random audit); the customer's identity and track record (e.g., loyalty card); and/or any combination of the above. Regardless, if an overall alarm is generated one or more of the following actions can be taken: no action send the customer to customer service; appropriately record customer track record (e.g., loyalty card) when customer identity is available; audit the customer at the “shop exit; and/or any combination of thereof. | 09-24-2009 |
20090268939 | METHOD, SYSTEM, AND PROGRAM PRODUCT FOR DETERMINING A STATE OF A SHOPPING RECEPTACLE - The present invention provides an approach for determining a state of a shopping receptacle. Specifically, under the present approach, an image capture device (e.g., camera) is positioned at the checkout station and/or on the shopping receptacle. The device will capture at least one image of the shopping receptacle during the checkout process and/or when the customer or checkout clerk indicates that the transaction is ready for payment (e.g., all items have been scanned or rung through). Using such image(s), a model for an empty receptacle and a knowledgebase of non-shopping items that may remain in the shopping receptacle, it is determined whether the receptacle is empty. If not, an alarm or other notification will be activated and the events can be logged. | 10-29-2009 |
20090272801 | DETERRING CHECKOUT FRAUD - Aspects of the present invention provide an approach for deterring checkout fraud comprising a camera (e.g., still, video, etc.) that is located near (overhead) a scanner used to scan a barcode of an item being purchased. Specifically, the barcode of the item is scanned and an image of the item is recorded. It is then determined whether the identity of the item as determined based on the barcode is consistent with its appearance as determined from the image. If not, a discrepancy is registered. It is then determined whether the discrepancy is due to fraud (e.g., theft) or device error. In the case of the latter, the system can be updated to prevent a repeat of the error. In either event, the scan, the image and a shopping event corresponding to the scan and image can be logged for future analysis and/or learning. | 11-05-2009 |
20100030685 | TRANSACTION ANALYSIS - Under the present invention a transaction is processed and analyzed for potential fraud or error. Specifically, a description of a (proposed) transaction is accessed. Among other things, the description contains an expected set of events (e.g., derived from historical data). As the transaction is being performed a set of multimedia devices will record the same. The multimedia signal(s) from the set of devices will be analyzed to determine what event(s) actually took place. The actual event(s) will be compared to the expected event(s) to determine if any deviation/difference exists. If there is a difference, and it is beyond a predetermined tolerance, a notification can be generated. Regardless, a log of the activities will be kept. | 02-04-2010 |
20100053329 | EXIT SECURITY - The present invention generally provides an exit security approach. Specifically, among other things, under the present invention: an item image for at least one of a set of items at a shopping checkout station is received; a receipt corresponding to the set of items is received; a first receptacle image of a shopping receptacle holding the set of items is received; a second receptacle image of the shopping receptacle is received; an integrity of the receipt is verified; the first receptacle image is compared to the second receptacle image; and it is determined whether a discrepancy exists based on at least one of the verification of the receipt and the comparison of the first receptacle image to the second receptacle image. | 03-04-2010 |