Patent application number | Description | Published |
20130185413 | Integrated Metering of Service Usage for Hybrid Clouds - An embodiment is directed to a hybrid cloud environment wherein a user of cloud computing services is disposed to consume cloud provided services delivered by each of a plurality of cloud computing service providers. Specified event data is received at an MCS component, wherein the event data pertains to metering events related to consumed services delivered by one or more cloud service providers. Event data includes event data furnished by one or more entities that actively monitor metering events at one or more local or remote cloud service provider locations. Event data is sent from the MCS component to a metering system, and the metering system generates reports from the event data that contains usage information on services provided by one or more cloud service providers, wherein information for a provider specifies amounts and quality of each type of service delivered to users by the provider. | 07-18-2013 |
20140082613 | PROVISIONING A VIRTUAL MACHINE FROM ONE OR MORE VM IMAGES - An embodiment of the invention directed to a method for provisioning a specified virtual machine from one or more selected images, sent over the network, includes the step of decomposing each of the selected VM images to provide a group of components, each component having specified information associated with it. The method further includes using a predetermined selection criterion to select components from the group for assembly into a specified VM image, and using the selected components of the specified VM image to provision the specified virtual machine at one or more locations. | 03-20-2014 |
20140082615 | PROVISIONING A VIRTUAL MACHINE FROM ONE OR MORE VM IMAGES - An embodiment of the invention directed to a method for provisioning a specified virtual machine from one or more selected images, sent over the network, includes the step of decomposing each of the selected VM images to provide a group of components, each component having specified information associated with it. The method further includes using a predetermined selection criterion to select components from the group for assembly into a specified VM image, and using the selected components of the specified VM image to provision the specified virtual machine at one or more locations. | 03-20-2014 |
20140096133 | METHOD AND APPARATUS FOR AUTHENTICATED DISTRIBUTION OF VIRTUAL MACHINE IMAGES - A computer implemented method, a computer program product, and a computer distribute a virtual machine image. A request for a virtual machine image is received. Responsive to receiving the request or the virtual machine image, the authenticity of a virtual machine image catalog associated with the virtual machine image is identified. Responsive to identifying that the virtual machine image catalog is authentic, a first digital signature to be sent with the virtual machine image is determined. Responsive to determining the signature, the virtual machine image and the signature is sent. | 04-03-2014 |
20140096135 | METHOD FOR AUTHENTICATED DISTRIBUTION OF VIRTUAL MACHINE IMAGES - A computer implemented method distributes a virtual machine image. A request for a virtual machine image is received. Responsive to receiving the request or the virtual machine image, the authenticity of a virtual machine image catalog associated with the virtual machine image is identified. Responsive to identifying that the virtual machine image catalog is authentic, a first digital signature to be sent with the virtual machine image is determined. Responsive to determining the signature, the virtual machine image and the signature is sent. | 04-03-2014 |
20140101714 | PRIVACY AWARE AUTHENTICATED MAP-REDUCE - A computer-implemented process for privacy aware authenticated map-reduce processing receives data for a MapReduce operation to form received data, identifies a control point in a set of control points of the MapReduce operation to form an identified control point and identifies an applicable set of policies for the identified control point to form a selected set of policies. The selected set of policies is applied at the identified control point and responsive to a determination that application of the selected set of policies at the identified control point returned a positive result, the computer-implemented process continues operation to a next stage in the MapReduce operation. | 04-10-2014 |
20140101715 | PRIVACY AWARE AUTHENTICATED MAP-REDUCE - A computer-implemented process for privacy aware authenticated map-reduce processing receives data for a MapReduce operation to form received data, identifies a control point in a set of control points of the MapReduce operation to form an identified control point and identifies an applicable set of policies for the identified control point to form a selected set of policies. The selected set of policies is applied at the identified control point and responsive to a determination that application of the selected set of policies at the identified control point returned a positive result, the computer-implemented process continues operation to a next stage in the MapReduce operation. | 04-10-2014 |
20140136689 | SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - A method, apparatus, and computer program product for managing a service is disclosed. A computer system collects information about the use of a set of resources by the service. Responsive to receiving a request to verify information about the use of the set of resources by the service, the computer system generates a description of the use of the set of resources by the service using the information collected. The computer system then creates a response to the request using the generated description of the use of the set of resources by the service as proof of the validity of the information. | 05-15-2014 |
20140136707 | SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - A method, apparatus, and computer program product for managing a service is disclosed. A computer system collects information about the use of a set of resources by the service. Responsive to receiving a request to verify information about the use of the set of resources by the service, the computer system generates a description of the use of the set of resources by the service using the information collected. The computer system then creates a response to the request using the generated description of the use of the set of resources by the service as proof of the validity of the information. | 05-15-2014 |
20140137247 | Limiting Information Leakage and Piracy due to Virtual Machine Cloning - Techniques for detecting a cloned virtual machine instance. A method includes transmitting an identifier associated a virtual machine from an agent embedded in the virtual machine akin to a malware to a detection entity in a network, determining whether the identifier is a unique identifier or whether the identifier is a clone of an identifier associated with a separate virtual machine in the network, and initiating at least one remedial action with the agent embedded in the virtual machine if the identifier is determined to be a clone of an identifier associated with a separate virtual machine in the network. | 05-15-2014 |
20140137272 | Limiting Information Leakage and Piracy due to Virtual Machine Cloning - Techniques for detecting a cloned virtual machine instance. A method includes transmitting an identifier associated a virtual machine from an agent embedded in the virtual machine akin to a malware to a detection entity in a network, determining whether the identifier is a unique identifier or whether the identifier is a clone of an identifier associated with a separate virtual machine in the network, and initiating at least one remedial action with the agent embedded in the virtual machine if the identifier is determined to be a clone of an identifier associated with a separate virtual machine in the network. | 05-15-2014 |
20140181058 | APPARATUS FOR AUTHENTICATION OF SOLUTION TOPOLOGY - A computer implemented method is provided to verify an integrity of a solution. The computer implemented method comprises hashing, by a computer, a set of virtual machine instances in a solution topology of the solution. The computer hashes a set of connections in the solution topology. The set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof. The computer hashes a set of solution-specific information, and then signs the hashes to create a first signed topology. | 06-26-2014 |
20140181980 | SYSTEM AND METHOD FOR PROTECTION FROM BUFFER OVERFLOW VULNERABILITY DUE TO PLACEMENT NEW CONSTRUCTS IN C++ - Systems and methods for protection from buffer overflow vulnerability due to placement new constructs in C++ are provided. A system for protecting from buffer overflow vulnerability due to placement new constructs, comprises a compiler which is capable of receiving a program including a placement new instruction, and runtime which is capable of receiving binary code from the compiler and determining whether the program includes the placement new instruction and whether the placement new instruction would lead to buffer overflow, wherein the runtime is linked to a library including methods for preventing the buffer overflow, and selects a method for preventing the buffer overflow if the runtime determines that the placement new instruction would lead to the buffer overflow. | 06-26-2014 |
20140181981 | SYSTEM AND METHOD FOR PROTECTION FROM BUFFER OVERFLOW VULNERABILITY DUE TO PLACEMENT NEW CONSTRUCTS IN C++ - Systems and methods for protection from buffer overflow vulnerability due to placement new constructs in C++ are provided. A system for protecting from buffer overflow vulnerability due to placement new constructs, comprises a compiler which is capable of receiving a program including a placement new instruction, and runtime which is capable of receiving binary code from the compiler and determining whether the program includes the placement new instruction and whether the placement new instruction would lead to buffer overflow, wherein the runtime is linked to a library including methods for preventing the buffer overflow, and selects a method for preventing the buffer overflow if the runtime determines that the placement new instruction would lead to the buffer overflow. | 06-26-2014 |
20140181984 | METHOD AND APPARATUS FOR AUTHENTICATION OF SOLUTION TOPOLOGY - A computer implemented method is provided to verify an integrity of a solution. The computer implemented method comprises hashing, by a computer, a set of virtual machine instances in a solution topology of the solution. The computer hashes a set of connections in the solution topology. The set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof. The computer hashes a set of solution-specific information, and then signs the hashes to create a first signed topology. | 06-26-2014 |
20140259089 | Security-Aware Admission Control of Requests in a Distributed System - Techniques, systems and articles of manufacture for security-aware admission control of requests in a distributed system. A method includes identifying a request dropped by a first application component in a distributed system, determining one or more actions to take with respect to the dropped request, said determining comprises identifying one or more policies of the first application component responsible for the dropped request and identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies, and executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components. | 09-11-2014 |
20140259091 | Security-Aware Admission Control of Requests in a Distributed System - Systems and articles of manufacture for security-aware admission control of requests in a distributed system include identifying a request dropped by a first application component in a distributed system, determining one or more actions to take with respect to the dropped request, said determining comprises identifying one or more policies of the first application component responsible for the dropped request and identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies, and executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components. | 09-11-2014 |
20140289791 | NETWORK-LEVEL ACCESS CONTROL MANAGEMENT FOR THE CLOUD - A cloud access manager obtains input regarding access control for at least one application deployed on a plurality of virtual machine instances in a cloud computing environment; the virtual machine instances are divided into at least first and second access zones. A cloud access manager registrar located in the cloud computing environment registers internet protocol addresses of external clients as seen from the cloud computing environment; at least some of the addresses are assigned to the clients via network address translation (NAT). Session traversal utility for NAT (STUN) is carried out to determine public internet protocol addresses assigned to the clients via NAT. The cloud access manager controls (i) access of the external clients to the plurality of virtual machine instances; and (ii) access of the plurality of virtual machine instances to each other, based on the registered internet protocol addresses, in accordance with the access zones. | 09-25-2014 |
20140310531 | METHOD AND SYSTEM FOR SECURING THE ENTRY OF DATA TO A DEVICE - A method and structure for entering authentication data into a device by displaying in an optical unit a key map which correlates data input into the device with keys of the device, the key map indicating data different from that of the keys of the device. | 10-16-2014 |
20150033221 | SANITIZATION OF VIRTUAL MACHINE IMAGES - Sanitizing a virtual machine image of sensitive data is provided. A label for a sensitivity level is attached to identified sensitive data contained within each software component in a plurality of software components of a software stack in a virtual machine image based on labeling policies. In response to receiving an input to perform a sanitization of the identified sensitive data having attached sensitivity level labels contained within software components of the software stack in the virtual machine image, the sanitization of the identified sensitive data having the attached sensitivity level labels contained within the software components of the software stack in the virtual machine image is performed based on sanitization policies. | 01-29-2015 |
20150033223 | SANITIZATION OF VIRTUAL MACHINE IMAGES - Sanitizing a virtual machine image of sensitive data is provided. A label for a sensitivity level is attached to identified sensitive data contained within each software component in a plurality of software components of a software stack in a virtual machine image based on labeling policies. In response to receiving an input to perform a sanitization of the identified sensitive data having attached sensitivity level labels contained within software components of the software stack in the virtual machine image, the sanitization of the identified sensitive data having the attached sensitivity level labels contained within the software components of the software stack in the virtual machine image is performed based on sanitization policies. | 01-29-2015 |
20150220731 | SYSTEM AND METHOD FOR PROTECTION FROM BUFFER OVERFLOW VULNERABILITY DUE TO PLACEMENT NEW CONSTRUCTS IN C++ - Systems and methods for protection from buffer overflow vulnerability due to placement new constructs in C++ are provided. A system for protecting from buffer overflow vulnerability due to placement new constructs, comprises a compiler which is capable of receiving a program including a placement new instruction, and runtime which is capable of receiving binary code from the compiler and determining whether the program includes the placement new instruction and whether the placement new instruction would lead to buffer overflow, wherein the runtime is linked to a library including methods for preventing the buffer overflow, and selects a method for preventing the buffer overflow if the runtime determines that the placement new instruction would lead to the buffer overflow. | 08-06-2015 |
20150269224 | QUERY ROUTING BASED ON COMPLEXITY CLASS DETERMINATION - A computer implemented method, computer system, and computer program product performs a query on a relational database. When a query is received, a corresponding complexity class is determined for the query. The query is routed to a corresponding query processor based on the corresponding complexity class determined for the submitted query. The query is executed on the corresponding query processor according to a determined execution plan. | 09-24-2015 |
20150363256 | ADMISSION CONTROL BASED ON THE END-TO-END AVAILABILITY - Providing admission control for a request may comprise creating a process flow associated with the request, the process flow identifying a plurality of computer-implemented components and a flow of transactions occurring between the computer-implemented components; executing the flow of transactions on the plurality of computer-implemented components; logging the flow of transactions; monitoring the flow of transactions to detect a problem in the flow or one or more of the components, or combination thereof; responsive to not detecting a problem in the flow or one or more of the components, or combination thereof, allowing the request to proceed; and responsive to detecting a problem in the flow or one or more of the components, or combination thereof, not allowing the request to proceed. | 12-17-2015 |
20150365304 | SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - Managing a service is provided. Information is collected about use of a set of resources by the service. A request is received to verify information regarding a selected portion of a period of time during the use of the set of resources by the service. A description of the use of the set of resources by the service during the selected portion of the period of time is generated using the collected information in response to receiving the request to verify the information regarding the selected portion of the period of time during the use of the set of resources by the service. A response to the request is created using the generated description of the use of the set of resources by the service during the selected portion of the period of time as proof of validity of the information. | 12-17-2015 |
20150381526 | SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - Managing a service is provided. Information is collected about use of a set of resources by the service. A request is received to verify information regarding a selected portion of a period of time during the use of the set of resources by the service. In response to receiving the request to verify the information regarding the selected portion of the period of time during the use of the set of resources by the service, a description of the use of the set of resources by the service during the selected portion of the period of time is generated using the collected information. A response to the request is created using the generated description of the use of the set of resources by the service during the selected portion of the period of time as proof of validity of the information. | 12-31-2015 |
Patent application number | Description | Published |
20130280172 | FLUORESCENT IMAGING WITH SUBSTITUTED CYANINE DYES - Compounds and methods are disclosed that are useful for noninvasive imaging in the near-infrared spectral range. The cyanine compounds of Formula I are presented: | 10-24-2013 |
20140105826 | REDUCED DYE PROBES FOR THE DETECTION OF RADICAL OXYGEN SPECIES - Reduced dyes, such as hydrocyanines, deuterocyanines, and/or other deuterated dyes capable of detecting one or more reactive oxygen species are described herein. The reduced dyes exhibit little or no fluorescence due to the disrupted π conjugation. However, upon reaction with ROS, the reduced dyes are oxidized, regenerating the extended π conjugation and causing a substantial increase in fluorescence intensity. In many case, the oxidized dye is generally membrane impermeable. However, upon reduction, many of the reduced dyes are membrane permeable. Thus, reduced dyes can accumulate in cells and/or tissue to amplify the signal. Once inside the cell or tissue, the reduced dye is reoxidized upon reaction with ROS, and the oxidized dye again becomes membrane impermeable, trapping the dye within the cell. The reduced dyes can be used to image ROS, such as hydroxide radical and superoxide, in serum, cell cultures, tissue explants, and in vivo. | 04-17-2014 |
20140213473 | APPLICATION OF REDUCED DYES IN IMAGING - The present invention provides novel compounds and methods for hydrocyanines derived from near-infrared cyanine dyes, as reactive oxygen species probes in imaging. In certain embodiments, the present invention provides reduced dyes as substrates for ELISA and Western blots. | 07-31-2014 |
20150346202 | STABILIZED CHEMILUMINESCENT SYSTEM - The present invention relate to formulations, systems, kits and methods for chemiluminescence assays to detect the catalytic activity of a peroxidase. The present invention provides formulations and methods for chemiluminescence reactions that have significantly improved signal duration, which signal lasts for hours. | 12-03-2015 |
Patent application number | Description | Published |
20080226129 | Cart Inspection for Suspicious Items - Methods and apparatus provide for a Cart Inspector to create a suspicion level for a transaction when a video image of the transaction portrays an item(s) left in a shopping cart. Specifically, the Cart Inspector obtains video data associated with a time(s) of interest. The video data originates from a video camera that monitors a transaction area. The Cart Inspector analyzes the video data with respect to target image(s) associated with a transaction in the transaction area during the time(s) of interest. The Cart Inspector creates an indication of a suspicion level for the transaction based on analysis of the target image(s). Creation of a high suspicion level for the transaction indicates that the transaction's corresponding video images most likely portray occurrences where the purchase price of an item transported through the transaction area was not included in the total amount paid by the customer. | 09-18-2008 |
20100166324 | METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS - A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment. | 07-01-2010 |
20120127316 | METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS - A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment. | 05-24-2012 |
20120188377 | CART INSPECTION FOR SUSPICIOUS ITEMS - Methods and apparatus provide for a Cart Inspector to create a suspicion level for a transaction when a video image of the transaction portrays an item(s) left in a shopping cart. Specifically, the Cart Inspector obtains video data associated with a time(s) of interest. The video data originates from a video camera that monitors a transaction area. The Cart Inspector analyzes the video data with respect to target image(s) associated with a transaction in the transaction area during the time(s) of interest. The Cart Inspector creates an indication of a suspicion level for the transaction based on analysis of the target image(s). Creation of a high suspicion level for the transaction indicates that the transaction's corresponding video images most likely portray occurrences where the purchase price of an item transported through the transaction area was not included in the total amount paid by the customer. | 07-26-2012 |
20120320199 | NOTIFICATION SYSTEM AND METHODS FOR USE IN RETAIL ENVIRONMENTS - Embodiments herein include novel ways of alerting store personnel when various activities, events, conditions, etc., occur at the checkout in retail establishments. | 12-20-2012 |
20120320214 | NOTIFICATION SYSTEM AND METHODS FOR USE IN RETAIL ENVIRONMENTS - Embodiments herein include novel ways of alerting store personnel when various activities, events, conditions, etc., occur at the checkout in retail establishments. For example, in accordance with one embodiment, the alerting can take place in substantially real-time, when the event occurs, allowing personnel to take appropriate measures, corrective or otherwise, to deal with the detected event. Examples of such events may include situations such as when a person of interest is detected as shopping at the store, when a cashier has missed scanning an item at the checkout, or to alert store personnel if a non-empty shopping cart has exited the store without payment (a.k.a., a cart push-out). Although the discussion below uses a grocery store as an example retail environment, embodiments herein can be used in any type of retail environment. | 12-20-2012 |
20120321146 | NOTIFICATION SYSTEM AND METHODS FOR USE IN RETAIL ENVIRONMENTS - Embodiments herein include novel ways of alerting store personnel when various activities, events, conditions, etc., occur at the checkout in retail establishments. For example, in accordance with one embodiment, the alerting can take place in substantially real-time, when the event occurs, allowing personnel to take appropriate measures, corrective or otherwise, to deal with the detected event. Examples of such events may include situations such as when a person of interest is detected as shopping at the store, when a cashier has missed scanning an item at the checkout, or to alert store personnel if a non-empty shopping cart has exited the store without payment (a.k.a., a cart push-out). Although the discussion below uses a grocery store as an example retail environment, embodiments herein can be used in any type of retail environment. | 12-20-2012 |
20130004090 | IMAGE PROCESSING TO PREVENT ACCESS TO PRIVATE INFORMATION - A processing resource receives original image data by a surveillance system. The original image data captures at least private information and occurrence of activity in a monitored region. The processing resource applies one or more transforms to the original image data to produce transformed image data. Application of the one or more transforms sufficiently distorts portions of the original image data to remove the private information. The transformed image data includes the distorted portions to prevent access to the private information. However, the distorted portions of the video include sufficient image detail to discern occurrence of the activity in the retail environment. | 01-03-2013 |
20130265433 | CART INSPECTION FOR SUSPICIOUS ITEMS - Methods and apparatus provide for a Cart Inspector to create a suspicion level for a transaction when a video image of the transaction portrays an item(s) left in a shopping cart. Specifically, the Cart Inspector obtains video data associated with a time(s) of interest. The video data originates from a video camera that monitors a transaction area. The Cart Inspector analyzes the video data with respect to target image(s) associated with a transaction in the transaction area during the time(s) of interest. The Cart Inspector creates an indication of a suspicion level for the transaction based on analysis of the target image(s). Creation of a high suspicion level for the transaction indicates that the transaction's corresponding video images most likely portray occurrences where the purchase price of an item transported through the transaction area was not included in the total amount paid by the customer. | 10-10-2013 |
20140168351 | Telepresence Device Communication and Control System - A telepresence unit control and communication methods are disclosed. The telepresence unit enables a virtual presence of a controller, a human being, located away from the telepresence unit. The telepresence unit control and communication methods enable a mechanical motion control of the telepresence unit by utilizing a visual communication between the telepresence unit and a computer administered by the controller. The telepresence unit utilizes a mobile computing device to establish the visual communication channel to the computer via the internet. Once the visual communication channel is established, the present invention provides a video modification as means of controlling and communicating with the telepresence unit. | 06-19-2014 |
20140176719 | VERIFICATION OF FRAUDULENT ACTIVITIES AT A SELF-CHECKOUT TERMINAL - A verification method of a fraudulent activity taking place at a self-checkout terminal is disclosed. The method verifies the fraudulent activity by confirming an incident of the fraudulent activity with multiple data generated by monitoring the transaction area and the bagging area of the self-checkout terminal. A human validation is optionally performed to verify machine-identified incidents. | 06-26-2014 |
20150049912 | IMAGE PROCESSING TO PREVENT ACCESS TO PRIVATE INFORMATION - A processing resource receives original image data by a surveillance system. The original image data captures at least private information and occurrence of activity in a monitored region. The processing resource applies one or more transforms to the original image data to produce transformed image data. Application of the one or more transforms sufficiently distorts portions of the original image data to remove the private information. The transformed image data includes the distorted portions to prevent access to the private information. However, the distorted portions of the video include sufficient image detail to discern occurrence of the activity in the retail environment. | 02-19-2015 |
20150187080 | CART INSPECTION FOR SUSPICIOUS ITEMS - Methods and apparatus provide for a Cart Inspector to create a suspicion level for a transaction when a video image of the transaction portrays an item(s) left in a shopping cart. Specifically, the Cart Inspector obtains video data associated with a time(s) of interest. The video data originates from a video camera that monitors a transaction area. The Cart Inspector analyzes the video data with respect to target image(s) associated with a transaction in the transaction area during the time(s) of interest. The Cart Inspector creates an indication of a suspicion level for the transaction based on analysis of the target image(s). Creation of a high suspicion level for the transaction indicates that the transaction's corresponding video images most likely portray occurrences where the purchase price of an item transported through the transaction area was not included in the total amount paid by the customer. | 07-02-2015 |
20150193780 | FRAUDULENT ACTIVITY DETECTION AT A BARCODE SCANNER BY VERIFYING VISUAL SIGNATURES - System and method for detecting a fraudulent activity at a barcode scanner is disclosed. The method issues an alert when the fraudulent activity is confirmed by comparing the visual signature of the item being transacted over the checkout terminal to the model visual signature. The model visual signature is obtained by averaging the collection of visual signature of the item gathered over a period of time. A human validation via a remote processor is employed to confirm the fraudulent activity verified by a computer. | 07-09-2015 |
20160078300 | METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS - A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment. | 03-17-2016 |