US20160189277A1 - Self-checkout arrangements - Google Patents

Self-checkout arrangements Download PDF

Info

Publication number
US20160189277A1
US20160189277A1 US14/971,747 US201514971747A US2016189277A1 US 20160189277 A1 US20160189277 A1 US 20160189277A1 US 201514971747 A US201514971747 A US 201514971747A US 2016189277 A1 US2016189277 A1 US 2016189277A1
Authority
US
United States
Prior art keywords
shopper
item
location
tally
cart
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/971,747
Inventor
Bruce L. Davis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digimarc Corp
Original Assignee
Digimarc Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digimarc Corp filed Critical Digimarc Corp
Priority to US14/971,747 priority Critical patent/US20160189277A1/en
Assigned to DIGIMARC CORPORATION reassignment DIGIMARC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DAVIS, BRUCE L.
Publication of US20160189277A1 publication Critical patent/US20160189277A1/en
Priority to US16/263,504 priority patent/US11074637B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B62LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
    • B62BHAND-PROPELLED VEHICLES, e.g. HAND CARTS OR PERAMBULATORS; SLEDGES
    • B62B3/00Hand carts having more than one axis carrying transport wheels; Steering devices therefor; Equipment therefor
    • B62B3/002Hand carts having more than one axis carrying transport wheels; Steering devices therefor; Equipment therefor characterised by a rectangular shape, involving sidewalls or racks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B62LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
    • B62BHAND-PROPELLED VEHICLES, e.g. HAND CARTS OR PERAMBULATORS; SLEDGES
    • B62B5/00Accessories or details specially adapted for hand carts
    • B62B5/0096Identification of the cart or merchandise, e.g. by barcodes or radio frequency identification [RFID]
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B62LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
    • B62BHAND-PROPELLED VEHICLES, e.g. HAND CARTS OR PERAMBULATORS; SLEDGES
    • B62B5/00Accessories or details specially adapted for hand carts
    • B62B5/06Hand moving equipment, e.g. handle bars
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0639Item locations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N5/225
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Definitions

  • the present disclosure details a variety of risk-mitigation technologies that can aid in reducing self-checkout fraud.
  • a responsive action may be taken.
  • a responsive action may be taken.
  • These responsive actions can include dispatching a store clerk to assist the shopper, or increasing a risk score that is repeatedly re-calculated during the shopper's visit.
  • FIG. 1 illustrates a shopping cart including certain features detailed here.
  • FIG. 2 shows an illustrative cell phone.
  • FIG. 3 depicts aspects of the presently-detailed technology, in a retail store.
  • a shopping cart 10 ( FIG. 1 ) includes a frame 12 conveying a basket 14 on casters 15 . Near a handle 16 of the cart is an inclined pad 18 on which a shopper's smartphone 20 or other mobile device rests. On a bottom shelf of the cart is a battery 22 . Wiring (not shown) links the battery 22 and the pad 18 .
  • the cart may include other electronics 25 , such as an audio or wireless sensor, or a Bluetooth beacon.
  • the battery 22 also serves to charge the shopper's smartphone 20 ( FIG. 2 ).
  • power is provided from the battery to the phone by an inductive charging arrangement, integrated into the pad 18 .
  • inductive chargers are wireless, in the sense that no wire couples the power source to the phone. Instead, a first induction coil in the pad creates an alternating electromagnetic field, and a second induction coil in the phone takes power from the electromagnetic field and converts it back into electrical current to charge the phone's battery.
  • a charging cable e.g., a USB cable
  • a charging cable can couple the phone to the cart battery 22 .
  • the cart 10 further includes an inductive charging arrangement 24 that serves to charge the cart battery.
  • a corresponding charging apparatus can be distributed through the floor of a store, but more commonly is located in the floor of a corral where the carts are stored for use. That floor-based charger is powered through commercial mains power.
  • the cart battery 22 can be charged via wired contacts formed on a retaining rail in the cart corral, which engage with wired contacts on each cart.
  • a retaining rail arrangement that can be adapted for charging in this manner is shown in patent U.S. Pat. No. 6,142,283.
  • Other contact-based charging arrangement for shopping cart batteries are detailed in patents U.S. Pat. Nos.
  • the shopper's mobile device 20 can be conventional and include a touchscreen 26 and various sensors—including a front-facing camera 28 and a rear-facing camera (not shown). When the mobile device rests on the pad 18 in the cart, one or both of these cameras serves as a scanner device by which the shopper can add items to a checkout tally, as they are placed in the cart. (The shopper may have one or more reusable bags open in the cart, and may place items directly into a bag after scanning.) As is familiar from applicant's earlier applications, items may be identified in various manners, including barcode reading, object recognition, and digital watermark decoding.
  • the shopper may lift mobile device 20 from the pad 18 and scan product-identifying information from an item before it is placed in the cart (e.g., while the item is still on a store shelf). This may be done to discover product information, such as cost, nutritional information, expiration date, etc.
  • the shopper can instruct the device to add the item to the checkout tally, and then place the item into the cart.
  • the user may first place the item in the cart, and then scan the item with the device.
  • the mobile device 20 When the shopper has obtained all the items needed, the mobile device 20 is used to make payment to the store, per the accumulated checkout tally.
  • Known electronic payment arrangements can be employed, including the PayPal and Apple Pay services, and the system detailed in applicant's patent publications 20140244514 and 20150227925.
  • One way such loss can be detected is by estimating (manually, or by machine vision techniques) the number of items in a cart, and comparing that to a number of items on that cart's checkout tally. (This can be done either in the shopping aisles, or as the cart approaches the exit of the store.)
  • Another detection technique is to have a weight sensor in the cart, and check that the sensed weight of the contents corresponds to a weight calculated from individual weight data about items on the checkout tally. In either case, if something seems amiss, a store clerk can be dispatched to politely investigate.
  • the camera of a shopper's mobile device is employed to identify items placed in a cart and compile a checkout tally, as above.
  • the tally may further include data indicating the location in the store at which each item was added to the tally.
  • Image data additionally is captured from one or more store cameras 30 ( FIG. 3 ), which are affixed to the store ceiling, to shelves, etc.
  • This latter imagery is wirelessly communicated to a store computer system 32 , which includes software that performs activity classification—identifying the time points when captured imagery seems to depict a shopper placing an item in a cart. (Multiple views of the scene aids in this analysis, since a cart can be recognized more reliably, and a 3D model can be estimated that reveals when an item is lowered into the cart by the shopper.)
  • the two sets of data thereby collected are then analyzed for anomalies.
  • One anomaly is detection of an item placed in a cart at a time that does not correspond with an entry on the checkout tally compiled by the user device. If store computer 32 , in its analysis of imagery from cameras 30 , finds that an item was likely placed in a particular cart at 1:42:03 pm, but no entry on the cart's tally (compiled by the shopper's mobile device) is found within a threshold interval (e.g., within 15, 30 or 60 seconds of this timepoint), then the event is flagged as suspicious.
  • a threshold interval e.g., within 15, 30 or 60 seconds of this timepoint
  • Another anomaly is detection of an item placed in a cart at a time that coincides with entry of an item on the checkout tally, but the item entered on the tally is not stocked on a shelf near the cart's current location (e.g., such item is stocked more than 10 or 20 feet away). This, too, is flagged as suspicious.
  • Still another anomaly is entry of a duplicate item on the cart's tally, more than a threshold interval (e.g., more than 15 or 30 seconds) after the first instance of that item was entered onto the cart's tally.
  • a threshold interval e.g., more than 15 or 30 seconds
  • Each such event can add (or subtract) points from a risk score for that cart (or for that shopper)—with the number of points dependent on parameters of the event. For example, if an item is added to a checkout tally at one position, but is stocked at a second position that is twenty feet away, 10 points may be added to the risk score. If the item is stocked at a second position that is two aisles away, 50 points may be added to the risk score.
  • Score information is relayed to a phone or other device monitored by the store's customer service personnel. If a high risk score is noted (e.g., having a value above a threshold value), a clerk can be dispatched to help the shopper compile an accurate tally.
  • the risk score may further take into consideration one or more other factors learned from analysis of records maintained by the computer 32 (e.g., by data mining), involving confirmed irregularities in shopper-compiled check-out tallies.
  • the computer 32 may discover that self-checkout irregularities seem to be more common in the 2:00 hour on Saturday afternoons, than in any other hour (e.g., normalized to a percentage of shoppers in the store). Conversely, the computer may discover that the smallest percentage of shoppers having difficulty in compiling accurate shelf-checkout tallies is found in the 9:00 am hour on weekdays. Each hour of the week may be scored in this fashion—with a metric indicating a degree of increased (or decreased) loss experience based on historical data analysis.
  • Another risk factor may be particular aisles, or regions within particular aisles, in which shoppers pause. For example, mining of historical records may suggest that shoppers who pause near a particular section of high priced specialty foods (e.g., aged balsamic vinegars) tend to be associated with greater risks of loss than those who don't. Each location in the store may be scored in this fashion—with a number indicating a degree of increased (or decreased) loss experience based on historical data analysis.
  • high priced specialty foods e.g., aged balsamic vinegars
  • the store may be virtually-divided into discrete zones, e.g., six feet in aisle length—either including shelving on just one side of the aisle, or both sides.)
  • an aggregate position-based risk score can be compiled, e.g., based on a sum of the scores associated with the various locations.
  • each SKU in the store may be associated with a loss risk factor—based on data about historical “shrinkage” (pilferage) of such stock from inventory.
  • Zone-based scores may be derived from such product-based factors, e.g., by averaging the risk loss factors for all products found on shelving within three feet of a location at which a shopper's cart pauses.
  • Analysis of store records may also indicate that items which are properly identified on a shopper's tally may be positively- or negatively-correlated with erroneous self-checkout tallies. For example, a cart listing crackers on its checkout tally may be statistically more likely to have an unreported wedge of cheese than a cart that doesn't list crackers on its checkout tally (or that lists prunes on its checkout tally).
  • heightened scrutiny e.g., in the form of an extra plus-up to a risk score
  • heightened scrutiny e.g., in the form of an extra plus-up to a risk score
  • a shopper is identified as a “regular” at the store, and no irregularity in self-checkout tallies has previously been noted, then such person's risk score may be reduced accordingly by a factor (e.g., by subtraction or division). If a shopper has not previously been noted at the store, a corresponding risk factor may be added.
  • a recognized shopper's variation from normal habits may also give rise to an adjustment of risk score. If a shopper's historical shopping patterns include, primarily, house-brands and lower-priced cuts of meat, then a visit in which the shopper pauses repeatedly near premium brands, and prime cuts of meat, is unusual. So, too, with different times, or days, of shopping. (A regular 9:00 am Tuesday morning shopper, who appears at 10:30 pm, is acting out of character.) Likewise with departure from a usual length of a store visit. (A shopper who normally spends 45-60 minutes in the store traversing all aisles of the store, before buying a cart-full of groceries, breaks that pattern by visiting the store aisles for just five minutes before heading for the exit door.)
  • an increase to the risk score may be warranted.
  • the degree of increase can be tied to particular parameters of the variance.
  • a variety of methods for generating an aggregate score can be used, depending on the particular circumstances.
  • One technique employs a polynomial approach, where different factors are weighted differently, and combined to produce an aggregate score.
  • the following exemplary scoring equation uses input metrics M 1 , M 2 , M 2 and M 4 to yield a score S for each shopper (or cart).
  • Factors A, B, C, D and exponents W, X, Y and Z can be determined experimentally, or by Bayesian techniques:
  • the score is repetitively recalculated throughout the user's visit (e.g., every time the user pauses, or every ten seconds, etc.). If, at any point, the score exceeds a threshold value, an alert is issued to the store, so that action may be taken. In hindsight, this scoring is akin to that detailed in applicant's patent publications 20120123959 and 20070205266. Those technologies concern detection of patterns that may be associated with increased (or decreased) incidences of fraud—in those cases involving ID verification (e.g., for drivers licenses). The principles detailed in those prior publications are likewise applicable in the present context to help identify patterns that may be associated with fraud. For example, arrangements employing neural networks or factor analysis (c.f., Kim, “Factor Analysis,” Sage Publications, 1979) may be employed.
  • the scoring approaches detailed above are not suited for manual performance, by humans.
  • the “signals” discovered by machine-based mining of historical data are typically too weak to be discerned by humans from review of the historical data, given any practical time constraints.
  • the repetitive recalculation of a risk score is beyond practical human capabilities. Similarly with other aspects of the technology.
  • the problems addressed by the present technologies include problems that arise from use of other technologies. For example, while self-checkout technologies bring convenience to the shopper, and labor savings to the retailer, they bring with them new risks of loss—risks that embodiments of the present technology help identify so that they can be addressed.
  • a score that increased with fraud risk e.g., a trust score
  • a score that decreased with fraud risk e.g., a trust score
  • Shopper or cart location within the store can be determined by various means, including by reference data that associates different regions in a field of view of each camera 30 with different locations in a store aisle.
  • the cart 10 can be equipped with a low power Bluetooth beacon or RFID chip that is sensed by a proximate sensor 34 mounted to store shelving.
  • geolocation by known WiFi or audio techniques can be employed, based on signals received by a sensor in the cart and relayed to the store computer system, etc.
  • a cart, or shopper can be identified in various ways.
  • a cart can be equipped with identification means, such as an RFID chip, a Bluetooth beacon, or visual indicia that can be recognized by cameras 30 .
  • a shopper can be identified by a physical or virtual store loyalty card, or payment card, employed during the shopper's visit, or by other unique-identifying data presented by the shopper. Facial- or other biometric-identification can also be employed.
  • the shopper can be demographically classified (while staying anonymous) by apparent gender, estimated age, clothing color, etc., as is familiar to artisans.
  • the device can also present other information of potential interest to the shopper, such as store map information, and location- or product-based offers. (E.g., if a shopper has added peanut butter to their cart, the shopping app can also present a coupon for jelly, or simply note the location of such companion product on a store map).
  • references to wireless technology should be understood to include not just electromagnetic radiation (e.g., light and radio signals), but also acoustic pressure waves (e.g., audio—both within and above the human range of hearing).
  • electromagnetic radiation e.g., light and radio signals
  • acoustic pressure waves e.g., audio—both within and above the human range of hearing
  • a risk score may be increased when duplicate items are entered onto a shopper's tally more than 10 seconds apart. In another implementation, the risk score may not be increased unless the duplicate items are entered at times that are at least 30 seconds apart.
  • the tally data typically includes timestamp information indicating, to the second, the time at which each item was scanned by the user and entered onto the tally.
  • Particularly contemplated mobile devices include the Google Glass product; the Apple iPhone 6; smartphones following Google's Android specification (e.g., the Galaxy S4 phone, manufactured by Samsung, and the Google Moto X phone, made by Motorola), and Windows 8 mobile phones (e.g., the Nokia Lumia 1020).
  • Google's Android specification e.g., the Galaxy S4 phone, manufactured by Samsung, and the Google Moto X phone, made by Motorola
  • Windows 8 mobile phones e.g., the Nokia Lumia 1020.
  • each includes one or more processors, one or more memories (e.g. RAM), storage (e.g., a disk or flash memory), a user interface (which may include, e.g., a keypad, a TFT LCD or OLED display screen, touch or other gesture sensors, a camera or other optical sensor, a compass sensor, a 3D magnetometer, a 3-axis accelerometer, a 3-axis gyroscope, one or more microphones, etc., together with software instructions for providing a graphical user interface), interconnections between these elements (e.g., buses), and an interface for communicating with other devices (which may be wireless, such as GSM, 3G, 4G, CDMA, WiFi, WiMax, Zigbee, Thread or Bluetooth, and/or wired, such as through an Ethernet local area network, etc.).
  • memories e.g. RAM
  • storage e.g., a disk or flash memory
  • a user interface which may include, e.g., a keypad,
  • the processes and system components detailed in this specification can be implemented as instructions for computing devices, including general purpose processor instructions for a variety of programmable processors, such as microprocessors (e.g., the Intel Atom, the ARM A5, the Qualcomm Snapdragon, and the nVidia Tegra 4; the latter includes a CPU, a GPU, and nVidia's Chimera computational photography architecture), graphics processing units (GPUs, such as the nVidia Tegra APX 2600, and the Adreno 330—part of the Qualcomm Snapdragon processor), and digital signal processors (e.g., the Texas Instruments TMS320 and OMAP series devices), etc.
  • microprocessors e.g., the Intel Atom, the ARM A5, the Qualcomm Snapdragon, and the nVidia Tegra 4; the latter includes a CPU, a GPU, and nVidia's Chimera computational photography architecture
  • GPUs such as the nVidia Tegra APX 2600, and the Adreno 330—part of the Qualcomm Snapdragon processor
  • processors can also be implemented in various forms of processor circuitry, including programmable logic devices, and field programmable gate arrays (e.g., the Xilinx Virtex series devices). Execution of the instructions can be distributed among processors and/or made parallel across processors within a device or across a network of devices. Processing of data can also be distributed among different processor and memory devices. Cloud computing resources can be used as well. References to “processors,” “modules” or “components” should be understood to refer to functionality, rather than requiring a particular form of implementation.
  • Smartphones and other devices can include software modules for performing the different functions and acts.
  • Known browser software, communications software, imaging software, and media processing software can be adapted for use in implementing the present technology.
  • Software and hardware configuration data/instructions are commonly stored as instructions in one or more data structures conveyed by non-transitory tangible media, such as magnetic or optical discs, memory cards, ROM, etc., which may be accessed across a network.
  • Some embodiments may be implemented as embedded systems—special purpose computer systems in which operating system software and application software are indistinguishable to the user (e.g., as is commonly the case in basic cell phones).
  • the functionality detailed in this specification can be implemented in operating system software, application software and/or as embedded system software.
  • ASIC application specific integrated circuit
  • the relevant module(s) are first implemented using a general purpose computer, using software such as Matlab (from Mathworks, Inc.).
  • a tool such as HDLCoder (also available from MathWorks) is next employed to convert the MatLab model to VHDL (an IEEE standard, and doubtless the most common hardware design language).
  • VHDL an IEEE standard, and doubtless the most common hardware design language
  • the VHDL output is then applied to a hardware synthesis program, such as Design Compiler by Synopsis, HDL Designer by Mentor Graphics, or Encounter RTL Compiler by Cadence Design Systems.
  • the hardware synthesis program provides output data specifying a particular array of electronic logic gates that will realize the technology in hardware form, as a special-purpose machine dedicated to such purpose.
  • This output data is then provided to a semiconductor fabrication contractor, which uses it to produce the customized silicon part. (Suitable contractors include TSMC, Global Foundries, and ON Semiconductors.)
  • module that performs a certain function should be understood to encompass one or more items of software, and/or one or more hardware circuits—such as an ASIC as just-described.
  • data can be stored anywhere: local device, remote device, in the cloud, distributed, etc.
  • the in-store mobile shopping app can form part of, or incorporate features from, applicant's Discover app.
  • This app and related technology are detailed, e.g., in published patent applications 20110212717, 20110161076, 20120208592, 20130311329, and 20140052555, and in pending application Ser. No. 14/251,229, filed Apr. 11, 2014 (now published as 20150016712).
  • Applicant's other work that is relevant to the present technology includes that detailed in patent documents 20120214515 and 20140164124.
  • Patent documents 20040153663 and 20120123959 provide additional information on multi-factor risk assessment.

Abstract

Self-checkout technologies for retail stores are improved by incorporation of enhanced fraud detection arrangements. For example, if a shopper enters an item on a self-checkout tally, while positioned at a location remote from the normal stock location for that item, a responsive action may be taken Likewise, if a shopper enters the same item on a self-checkout tally twice, at widely separated times, a responsive action may be taken. These responsive actions can include dispatching a store clerk to assist the shopper, or increasing a risk score that is repeatedly re-calculated during the shopper's visit. A great variety of other features and arrangements (e.g., powering arrangements for mobile phones in shopping carts) are also detailed.

Description

    RELATED APPLICATION DATA
  • This application claims priority to provisional application 62/096,821, filed Dec. 24, 2014, the disclosure of which is incorporated herein by reference.
  • INTRODUCTION
  • While shopper self-checkout at grocery stores has been gaining popularity in Europe, it has not been as quick to gain a foothold in the United States. Adoption of self-checkout technology may be accelerated by enhancing fraud-protection measures.
  • The present disclosure details a variety of risk-mitigation technologies that can aid in reducing self-checkout fraud.
  • For example, if a shopper enters an item on a self-checkout tally, while positioned at a location remote from the normal stock location for that item, a responsive action may be taken. Likewise, if a shopper enters the same item on a self-checkout tally twice, at widely separated times, a responsive action may be taken. These responsive actions can include dispatching a store clerk to assist the shopper, or increasing a risk score that is repeatedly re-calculated during the shopper's visit.
  • The foregoing and other features and advantages of the present technology will be more readily apparent from the following detailed description, which proceeds with reference to the drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates a shopping cart including certain features detailed here.
  • FIG. 2 shows an illustrative cell phone.
  • FIG. 3 depicts aspects of the presently-detailed technology, in a retail store.
  • DETAILED DESCRIPTION
  • The present technology expands on applicant's earlier work, detailed in patent documents 20120214515 and 20140052555, which are incorporated by reference herein and form part of the present specification.
  • In accordance with one aspect of the present technology, a shopping cart 10 (FIG. 1) includes a frame 12 conveying a basket 14 on casters 15. Near a handle 16 of the cart is an inclined pad 18 on which a shopper's smartphone 20 or other mobile device rests. On a bottom shelf of the cart is a battery 22. Wiring (not shown) links the battery 22 and the pad 18. The cart may include other electronics 25, such as an audio or wireless sensor, or a Bluetooth beacon.
  • In addition to powering any electronics provided with the cart, the battery 22 also serves to charge the shopper's smartphone 20 (FIG. 2). Desirably, power is provided from the battery to the phone by an inductive charging arrangement, integrated into the pad 18. As is familiar, inductive chargers are wireless, in the sense that no wire couples the power source to the phone. Instead, a first induction coil in the pad creates an alternating electromagnetic field, and a second induction coil in the phone takes power from the electromagnetic field and converts it back into electrical current to charge the phone's battery. (Inductive charging arrangements are further detailed in patent documents U.S. Pat. No. 5,821,731 and 20070279002.) Desirably, no wired connection to the smartphone 20 exists, affording the shopper maximum flexibility in placing and removing the smartphone. However, in alternate embodiments, a charging cable (e.g., a USB cable) can couple the phone to the cart battery 22.
  • The cart 10 further includes an inductive charging arrangement 24 that serves to charge the cart battery. A corresponding charging apparatus can be distributed through the floor of a store, but more commonly is located in the floor of a corral where the carts are stored for use. That floor-based charger is powered through commercial mains power. (Alternatively, the cart battery 22 can be charged via wired contacts formed on a retaining rail in the cart corral, which engage with wired contacts on each cart. A retaining rail arrangement that can be adapted for charging in this manner is shown in patent U.S. Pat. No. 6,142,283. Other contact-based charging arrangement for shopping cart batteries are detailed in patents U.S. Pat. Nos. 5,064,012 and 3,652,103.) The shopper's mobile device 20 can be conventional and include a touchscreen 26 and various sensors—including a front-facing camera 28 and a rear-facing camera (not shown). When the mobile device rests on the pad 18 in the cart, one or both of these cameras serves as a scanner device by which the shopper can add items to a checkout tally, as they are placed in the cart. (The shopper may have one or more reusable bags open in the cart, and may place items directly into a bag after scanning.) As is familiar from applicant's earlier applications, items may be identified in various manners, including barcode reading, object recognition, and digital watermark decoding.
  • Alternatively, the shopper may lift mobile device 20 from the pad 18 and scan product-identifying information from an item before it is placed in the cart (e.g., while the item is still on a store shelf). This may be done to discover product information, such as cost, nutritional information, expiration date, etc. The shopper can instruct the device to add the item to the checkout tally, and then place the item into the cart. In still other arrangements, the user may first place the item in the cart, and then scan the item with the device.
  • When the shopper has obtained all the items needed, the mobile device 20 is used to make payment to the store, per the accumulated checkout tally. Known electronic payment arrangements can be employed, including the PayPal and Apple Pay services, and the system detailed in applicant's patent publications 20140244514 and 20150227925.
  • While self-checkout has been gaining popularity in Europe (commonly using special purpose mobile terminals, rather than conventional smartphones), it has not been as quick to gain a foothold in the United States. Adoption of self-checkout technology may be accelerated by enhancing protection against pilferage.
  • Even though supermarkets and other retail stores commonly include security cameras that may be monitored by store personnel, applicant has found that there are some fraudulent ploys that can escape detection by such surveillance. One is for a dishonest shopper to seemingly present an item for scanning by a mobile terminal, but orient the item so that its barcode is not visible to the scanner. For digitally-watermarked items (in which the identification data spans all of the packaging), a dishonest shopper may “palm” the item, so that the shopper's hand blocks the camera from sensing the item. To store personnel watching a security camera, nothing appears amiss; it appears the item was scanned before placing it into the cart. One way such loss can be detected is by estimating (manually, or by machine vision techniques) the number of items in a cart, and comparing that to a number of items on that cart's checkout tally. (This can be done either in the shopping aisles, or as the cart approaches the exit of the store.) Another detection technique is to have a weight sensor in the cart, and check that the sensed weight of the contents corresponds to a weight calculated from individual weight data about items on the checkout tally. In either case, if something seems amiss, a store clerk can be dispatched to politely investigate.
  • But these cross-checks are susceptible to scams as well. A shopper who puts an unscanned item into the cart may seek to conceal the fraud by surreptitiously scanning—for a second time—a less expensive item that is already in the cart. That less expensive item now appears twice on the tally, increasing the cart's item count and calculated weight, while a more expensive item leaves the store without full payment.
  • In accordance with a further aspect of the present technology, the camera of a shopper's mobile device is employed to identify items placed in a cart and compile a checkout tally, as above. The tally may further include data indicating the location in the store at which each item was added to the tally. Image data additionally is captured from one or more store cameras 30 (FIG. 3), which are affixed to the store ceiling, to shelves, etc. This latter imagery is wirelessly communicated to a store computer system 32, which includes software that performs activity classification—identifying the time points when captured imagery seems to depict a shopper placing an item in a cart. (Multiple views of the scene aids in this analysis, since a cart can be recognized more reliably, and a 3D model can be estimated that reveals when an item is lowered into the cart by the shopper.)
  • The two sets of data thereby collected (e.g., the shopper's self-tally, and the data from infrastructure sensors) are then analyzed for anomalies.
  • One anomaly is detection of an item placed in a cart at a time that does not correspond with an entry on the checkout tally compiled by the user device. If store computer 32, in its analysis of imagery from cameras 30, finds that an item was likely placed in a particular cart at 1:42:03 pm, but no entry on the cart's tally (compiled by the shopper's mobile device) is found within a threshold interval (e.g., within 15, 30 or 60 seconds of this timepoint), then the event is flagged as suspicious.
  • Another anomaly is detection of an item placed in a cart at a time that coincides with entry of an item on the checkout tally, but the item entered on the tally is not stocked on a shelf near the cart's current location (e.g., such item is stocked more than 10 or 20 feet away). This, too, is flagged as suspicious.
  • Still another anomaly is entry of a duplicate item on the cart's tally, more than a threshold interval (e.g., more than 15 or 30 seconds) after the first instance of that item was entered onto the cart's tally.
  • Each such event can add (or subtract) points from a risk score for that cart (or for that shopper)—with the number of points dependent on parameters of the event. For example, if an item is added to a checkout tally at one position, but is stocked at a second position that is twenty feet away, 10 points may be added to the risk score. If the item is stocked at a second position that is two aisles away, 50 points may be added to the risk score.
  • Score information is relayed to a phone or other device monitored by the store's customer service personnel. If a high risk score is noted (e.g., having a value above a threshold value), a clerk can be dispatched to help the shopper compile an accurate tally.
  • The risk score may further take into consideration one or more other factors learned from analysis of records maintained by the computer 32 (e.g., by data mining), involving confirmed irregularities in shopper-compiled check-out tallies.
  • One involves time of day. In analyzing historical records, the computer 32 may discover that self-checkout irregularities seem to be more common in the 2:00 hour on Saturday afternoons, than in any other hour (e.g., normalized to a percentage of shoppers in the store). Conversely, the computer may discover that the smallest percentage of shoppers having difficulty in compiling accurate shelf-checkout tallies is found in the 9:00 am hour on weekdays. Each hour of the week may be scored in this fashion—with a metric indicating a degree of increased (or decreased) loss experience based on historical data analysis.
  • Another risk factor may be particular aisles, or regions within particular aisles, in which shoppers pause. For example, mining of historical records may suggest that shoppers who pause near a particular section of high priced specialty foods (e.g., aged balsamic vinegars) tend to be associated with greater risks of loss than those who don't. Each location in the store may be scored in this fashion—with a number indicating a degree of increased (or decreased) loss experience based on historical data analysis. (For this purpose, the store may be virtually-divided into discrete zones, e.g., six feet in aisle length—either including shelving on just one side of the aisle, or both sides.) As a shopper pauses at different locations in the store, an aggregate position-based risk score can be compiled, e.g., based on a sum of the scores associated with the various locations.
  • Relatedly, each SKU in the store may be associated with a loss risk factor—based on data about historical “shrinkage” (pilferage) of such stock from inventory. Zone-based scores may be derived from such product-based factors, e.g., by averaging the risk loss factors for all products found on shelving within three feet of a location at which a shopper's cart pauses.
  • Analysis of store records may also indicate that items which are properly identified on a shopper's tally may be positively- or negatively-correlated with erroneous self-checkout tallies. For example, a cart listing crackers on its checkout tally may be statistically more likely to have an unreported wedge of cheese than a cart that doesn't list crackers on its checkout tally (or that lists prunes on its checkout tally).
  • Many other factors can be applied based on identification of particular shoppers. While generalizing loss risks based on demographic factors such age, gender, nationality, etc., is disfavored, some stores may consider such factors. More useful, however, are factors discerned from historical data involving particular shoppers.
  • For example, if a particular shopper previously has been found to have one or more inaccurate self-checkout tallies, then heightened scrutiny (e.g., in the form of an extra plus-up to a risk score) is certainly appropriate. Conversely, if a shopper is identified as a “regular” at the store, and no irregularity in self-checkout tallies has previously been noted, then such person's risk score may be reduced accordingly by a factor (e.g., by subtraction or division). If a shopper has not previously been noted at the store, a corresponding risk factor may be added.
  • A recognized shopper's variation from normal habits may also give rise to an adjustment of risk score. If a shopper's historical shopping patterns include, primarily, house-brands and lower-priced cuts of meat, then a visit in which the shopper pauses repeatedly near premium brands, and prime cuts of meat, is unusual. So, too, with different times, or days, of shopping. (A regular 9:00 am Tuesday morning shopper, who appears at 10:30 pm, is acting out of character.) Likewise with departure from a usual length of a store visit. (A shopper who normally spends 45-60 minutes in the store traversing all aisles of the store, before buying a cart-full of groceries, breaks that pattern by visiting the store aisles for just five minutes before heading for the exit door.)
  • In such circumstances, an increase to the risk score may be warranted. Again, the degree of increase can be tied to particular parameters of the variance.
  • A variety of methods for generating an aggregate score can be used, depending on the particular circumstances. One technique employs a polynomial approach, where different factors are weighted differently, and combined to produce an aggregate score. The following exemplary scoring equation uses input metrics M1, M2, M2 and M4 to yield a score S for each shopper (or cart). Factors A, B, C, D and exponents W, X, Y and Z can be determined experimentally, or by Bayesian techniques:

  • S=(A*M1)W+(B*M2)X+(C*M3)Y+(D*M4)Z
  • Desirably, the score is repetitively recalculated throughout the user's visit (e.g., every time the user pauses, or every ten seconds, etc.). If, at any point, the score exceeds a threshold value, an alert is issued to the store, so that action may be taken. In hindsight, this scoring is akin to that detailed in applicant's patent publications 20120123959 and 20070205266. Those technologies concern detection of patterns that may be associated with increased (or decreased) incidences of fraud—in those cases involving ID verification (e.g., for drivers licenses). The principles detailed in those prior publications are likewise applicable in the present context to help identify patterns that may be associated with fraud. For example, arrangements employing neural networks or factor analysis (c.f., Kim, “Factor Analysis,” Sage Publications, 1979) may be employed.
  • It will be recognized that the scoring approaches detailed above are not suited for manual performance, by humans. For example, the “signals” discovered by machine-based mining of historical data (e.g., correlations of different factors with historical loss experience) are typically too weak to be discerned by humans from review of the historical data, given any practical time constraints. (The average supermarket stocked 42,214 different items in 2014. A typical supermarket checks-out hundreds of shoppers each day, including carts aggregating tens of thousands of items each week.) The repetitive recalculation of a risk score is beyond practical human capabilities. Similarly with other aspects of the technology.
  • The problems addressed by the present technologies include problems that arise from use of other technologies. For example, while self-checkout technologies bring convenience to the shopper, and labor savings to the retailer, they bring with them new risks of loss—risks that embodiments of the present technology help identify so that they can be addressed.
  • Concluding Remarks
  • It will be recognized that the foregoing arrangements address various issues that have deterred adoption of self-checkout in retail stores. For example, the detailed technologies sense circumstances associated with increased risks of loss, permitting stores to appropriately deploy personnel to assist shoppers in compiling accurate self-checkout tallies. In some embodiments, store infrastructure that is already present for other purposes (e.g., security cameras) is re-purposed to aid in activity classification and 3D shopper modeling.
  • Having described and illustrated the principles of the technology with reference to illustrative examples, it will be recognized that the technology is not so limited.
  • For example, while the detailed arrangements computed a score that increased with fraud risk, in other arrangements a score that decreased with fraud risk (e.g., a trust score) can be employed.
  • Similarly, while reference was made to use of store infrastructure cameras to sense a shopper's placement of an item in a cart, it will be recognized that other sensors can additionally or alternatively be employed for this task. Motion or weight sensors attached to store shelving are one such alternative, and can detect removal of items.
  • Although the detailed arrangements use shopping app software on the mobile device to perform product recognition, compile a checkout tally, and effect payment, in other embodiments such component functions can naturally be performed otherwise—including by operating system software on a shopper's device, by the store computer 32, by a remote server, distributed between such devices, etc.
  • Naturally, the historical correlations between different factors and different loss experiences can be based on more than data from a single store. For example, data from a chain of stores—encompassing hundreds or thousands of locations—can be considered.
  • Shopper or cart location within the store can be determined by various means, including by reference data that associates different regions in a field of view of each camera 30 with different locations in a store aisle. Alternatively, the cart 10 can be equipped with a low power Bluetooth beacon or RFID chip that is sensed by a proximate sensor 34 mounted to store shelving. Still further, geolocation by known WiFi or audio techniques can be employed, based on signals received by a sensor in the cart and relayed to the store computer system, etc.
  • Speaking of beacons, applicant's inventive combinations include use of the presently-described technologies in conjunction with beacon and other signaling arrangements described in application Ser. No. 14/739,251, filed Jun. 15, 2015.
  • Activity classification from surveillance video has been an interest of researchers for many years, and the science has been extensively developed. See, e.g., Trinh, et al, Detecting human activities in retail surveillance using hierarchical finite state machine, IEEE Int'l Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2011, pp. 1137-1340; Trinh, et al, Multimodal ranking for non-compliance detection in retail surveillance, IEEE Workshop on Applications of Computer Vision, 2012, pp. 241-246; Popoola, et al, Video-based abnormal human behavior recognition—a review, IEEE Trans. on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 42.6, 2012, pp. 865-878; Qian, et al, Recognition of human activities using SVM multi-class classifier, Pattern Recognition Letters 31.2, 2010, pp. 100-111; Wang, et al, Correspondence-free activity analysis and scene modeling in multiple camera views, IEEE Trans. on Pattern Analysis and Machine Intelligence, 32.1, 2010, pp. 56-71; and Hoai, et al, Joint segmentation and classification of human actions in video, IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), 2011, pp. 3265-3272, and references cited therein.
  • A cart, or shopper, can be identified in various ways. For example, a cart can be equipped with identification means, such as an RFID chip, a Bluetooth beacon, or visual indicia that can be recognized by cameras 30. A shopper can be identified by a physical or virtual store loyalty card, or payment card, employed during the shopper's visit, or by other unique-identifying data presented by the shopper. Facial- or other biometric-identification can also be employed. The shopper can be demographically classified (while staying anonymous) by apparent gender, estimated age, clothing color, etc., as is familiar to artisans.
  • Since the cart includes the mobile device at a posture where it is readable to the shopper (e.g., for presentation of the shopping tally), the device can also present other information of potential interest to the shopper, such as store map information, and location- or product-based offers. (E.g., if a shopper has added peanut butter to their cart, the shopping app can also present a coupon for jelly, or simply note the location of such companion product on a store map).
  • References to wireless technology should be understood to include not just electromagnetic radiation (e.g., light and radio signals), but also acoustic pressure waves (e.g., audio—both within and above the human range of hearing).
  • In implementing the presently-described technology, the artisan has a great deal of freedom concerning the parameters involved. Consider a parameter specifying how remote a shopper must be from an item's stock location, when the item is entered onto the checkout tally, in order for the action to result in an increase in risk score. Some implementers might set a threshold distance at six feet. Others might set a threshold at 15 feet, while still others wouldn't increase the risk score unless the shopper, and the item's stock location, are located in different aisles. Similarly with other concepts of spatial nearness, or proximity. In one system, two locations are near if they are within six feet. Others are near if they are within 10 feet. Etc. Likewise with concepts of temporal proximity. In one implementation, a risk score may be increased when duplicate items are entered onto a shopper's tally more than 10 seconds apart. In another implementation, the risk score may not be increased unless the duplicate items are entered at times that are at least 30 seconds apart. (The tally data typically includes timestamp information indicating, to the second, the time at which each item was scanned by the user and entered onto the tally.)
  • To keep this specification concise as required by the Patent Act, applicant has omitted certain mundane details that are straightforward to artisans implementing such technology. For example, decoding barcode indicia, transmitting product identification data to a database, displaying product information returned from a database, presenting coupon offers, etc., are all familiar to artisans in the relevant fields.
  • As should be evident, the technology detailed herein finds utility with all manner of user devices. Not just smartphones, but also tablets, digital cameras, wrist- and head-mounted systems and other wearable devices, etc., can all make use of the principles detailed herein.
  • Particularly contemplated mobile devices include the Google Glass product; the Apple iPhone 6; smartphones following Google's Android specification (e.g., the Galaxy S4 phone, manufactured by Samsung, and the Google Moto X phone, made by Motorola), and Windows 8 mobile phones (e.g., the Nokia Lumia 1020).
  • The design of smartphones is familiar to the artisan. In general terms, each includes one or more processors, one or more memories (e.g. RAM), storage (e.g., a disk or flash memory), a user interface (which may include, e.g., a keypad, a TFT LCD or OLED display screen, touch or other gesture sensors, a camera or other optical sensor, a compass sensor, a 3D magnetometer, a 3-axis accelerometer, a 3-axis gyroscope, one or more microphones, etc., together with software instructions for providing a graphical user interface), interconnections between these elements (e.g., buses), and an interface for communicating with other devices (which may be wireless, such as GSM, 3G, 4G, CDMA, WiFi, WiMax, Zigbee, Thread or Bluetooth, and/or wired, such as through an Ethernet local area network, etc.). The processes and system components detailed in this specification can be implemented as instructions for computing devices, including general purpose processor instructions for a variety of programmable processors, such as microprocessors (e.g., the Intel Atom, the ARM A5, the Qualcomm Snapdragon, and the nVidia Tegra 4; the latter includes a CPU, a GPU, and nVidia's Chimera computational photography architecture), graphics processing units (GPUs, such as the nVidia Tegra APX 2600, and the Adreno 330—part of the Qualcomm Snapdragon processor), and digital signal processors (e.g., the Texas Instruments TMS320 and OMAP series devices), etc. These instructions can be implemented as software, firmware, etc. These instructions can also be implemented in various forms of processor circuitry, including programmable logic devices, and field programmable gate arrays (e.g., the Xilinx Virtex series devices). Execution of the instructions can be distributed among processors and/or made parallel across processors within a device or across a network of devices. Processing of data can also be distributed among different processor and memory devices. Cloud computing resources can be used as well. References to “processors,” “modules” or “components” should be understood to refer to functionality, rather than requiring a particular form of implementation. Software instructions for implementing the detailed functionality can be authored by artisans without undue experimentation from the descriptions provided herein, e.g., written in C, C++, Visual Basic, Java, Python, Tcl, Perl, Scheme, Ruby, etc., in conjunction with associated data. Smartphones and other devices according to certain implementations of the present technology can include software modules for performing the different functions and acts. Known browser software, communications software, imaging software, and media processing software can be adapted for use in implementing the present technology.
  • Software and hardware configuration data/instructions are commonly stored as instructions in one or more data structures conveyed by non-transitory tangible media, such as magnetic or optical discs, memory cards, ROM, etc., which may be accessed across a network. Some embodiments may be implemented as embedded systems—special purpose computer systems in which operating system software and application software are indistinguishable to the user (e.g., as is commonly the case in basic cell phones). The functionality detailed in this specification can be implemented in operating system software, application software and/or as embedded system software.
  • Another form of implementation is electronic circuitry that has been custom-designed and manufactured to perform some or all of the component acts, as an application specific integrated circuit (ASIC).
  • To realize such an implementation, the relevant module(s) are first implemented using a general purpose computer, using software such as Matlab (from Mathworks, Inc.). A tool such as HDLCoder (also available from MathWorks) is next employed to convert the MatLab model to VHDL (an IEEE standard, and doubtless the most common hardware design language). The VHDL output is then applied to a hardware synthesis program, such as Design Compiler by Synopsis, HDL Designer by Mentor Graphics, or Encounter RTL Compiler by Cadence Design Systems. The hardware synthesis program provides output data specifying a particular array of electronic logic gates that will realize the technology in hardware form, as a special-purpose machine dedicated to such purpose. This output data is then provided to a semiconductor fabrication contractor, which uses it to produce the customized silicon part. (Suitable contractors include TSMC, Global Foundries, and ON Semiconductors.)
  • Essentially all of the functions detailed above can be implemented in such fashion, e.g., decoding a watermark or barcode payload from captured imagery, activity classification, etc.
  • Patent application Ser. No. 14/842,575, filed Sep. 1, 2015, details particular hardware implementations for watermark detection, which are suitable for use with the present technology.
  • As indicated above, reference to a “module” that performs a certain function should be understood to encompass one or more items of software, and/or one or more hardware circuits—such as an ASIC as just-described.
  • As indicated, different configurations of the functionality can be implemented on different devices. For example, in a system in which a smartphone communicates with a computer at a remote location, different tasks can be performed exclusively by one device or the other, or execution can be distributed between the devices. Extraction of watermark information from imagery is an example of a process that can be distributed in such fashion. Activity classification is another. Thus, it should be understood that description of an operation as being performed by a particular device (e.g., a smartphone) is not limiting but exemplary; performance of the operation by another device (e.g., a remote server), or shared between devices, is also expressly contemplated.
  • In like fashion, description of data being stored on a particular device is also exemplary; data can be stored anywhere: local device, remote device, in the cloud, distributed, etc.
  • The in-store mobile shopping app can form part of, or incorporate features from, applicant's Discover app. This app and related technology are detailed, e.g., in published patent applications 20110212717, 20110161076, 20120208592, 20130311329, and 20140052555, and in pending application Ser. No. 14/251,229, filed Apr. 11, 2014 (now published as 20150016712). Applicant's other work that is relevant to the present technology includes that detailed in patent documents 20120214515 and 20140164124.
  • Other cart-based shopping systems are detailed in patent documents U.S. Pat. No. 5,287,266, 20040111320, 20100072715, 20100096450, and 20140108195.
  • Patent documents 20040153663 and 20120123959 provide additional information on multi-factor risk assessment.
  • This specification has addressed several different embodiments. It should be understood that the methods, elements and concepts detailed in connection with one embodiment can be combined with the methods, elements and concepts detailed in connection with other embodiments. Applicant similarly recognizes and intends that the methods, elements and concepts of this specification can be combined, substituted and interchanged—not just among and between themselves, but also with those known from the cited prior art. Moreover, it will be recognized that the detailed technology can be included with other technologies—current and upcoming—to advantageous effect. Implementation of such combinations is straightforward to the artisan from the teachings provided in this disclosure.
  • While this disclosure has detailed particular ordering of acts and particular combinations of elements, it will be recognized that other contemplated methods may re-order acts (possibly omitting some and adding others), and other contemplated combinations may omit some elements and add others, etc.
  • Although disclosed as complete systems, sub-combinations of the detailed arrangements are also separately contemplated (e.g., omitting various features of a complete system).
  • While certain aspects of the technology have been described by reference to illustrative methods, it will be recognized that apparatuses configured to perform the acts of such methods are also contemplated as part of applicant's inventive work. Likewise, other aspects have been described by reference to illustrative apparatus, and the methodology performed by such apparatus is likewise within the scope of the present technology. Still further, tangible computer readable media containing instructions for configuring a processor or other programmable system to perform such methods is also expressly contemplated.
  • To provide a comprehensive disclosure, while complying with the statutory requirement of conciseness, applicant incorporates-by-reference each of the documents referenced herein. (Such materials are incorporated in their entireties, even if cited above in connection with specific of their teachings.) The present specification should be read in the context of these cited documents. These documents disclose technologies and teachings that can be incorporated into the arrangements detailed herein, and into which the technologies and teachings detailed herein can be incorporated. The reader is presumed to be familiar with such prior work.
  • In view of the wide variety of embodiments to which the principles and features discussed above can be applied, it should be apparent that the detailed embodiments are illustrative only, and should not be taken as limiting the scope of the invention. Rather, the subject technology includes all such modifications as may come within the scope and spirit of the following claims and equivalents thereof.

Claims (19)

1-2. (canceled)
3. A method comprising:
with a camera of a shopper's mobile device conveyed by shopping cart, capturing a product identifier from a retail item placed in the cart, and adding associated information to a purchase tally;
with a second sensor mounted to store infrastructure, capturing data about the shopper during an act of moving the item from a store shelf into the cart; and
determining if a product identifier was captured by the shopper's mobile device camera from each item placed in the shopper's cart.
4. The method of claim 3 in which the second sensor comprises a second camera, and said determining is performed using imagery captured by said second camera.
5. The method of claim 4 in which said determining includes determining, using data captured by the second camera, a time at which an item was placed in the shopper's cart, and checking said tally to confirm that a product identifier was captured from an item at said time.
6. A method comprising the acts:
determining, by detection of a signal emitted by a wireless beacon, a shopper's location in an aisle of a retail store;
adding, to a checkout tally, an item scanned at said location by the shopper, using a camera in a mobile phone device, the device extracting an item identifier encoded on the item;
checking a database to determine a stock location where said scanned item is stocked in the store; and
taking a responsive action when the stock location is remote from the shopper's location.
7. The method of claim 6 in which the stock location is more than ten feet from the shopper's location, and the method includes taking said responsive action.
8. The method of claim 6 in which the stock location is more than twenty feet from the shopper's location, and the method includes taking said responsive action.
9. The method of claim 6 in which the stock location is in an aisle different that the aisle in which the shopper is located.
10. The method of claim 6 in which the responsive action comprises issuing an alert to store personnel.
11. The method of claim 6 in which the responsive action comprises increasing a risk score.
12. A method comprising the acts:
analyzing imagery captured by a camera fixedly-mounted in a retail store, to detect an event, namely that a shopper has removed an item from a store shelf, or placed an item in a shopping basket;
storing data indicating a time of said event;
checking a shopper-compiled tally of items, the tally including, for each item, time-stamp data indicating a time that the item was added to the tally; and
taking a responsive action when no item was added to the tally within a threshold interval of time around the time indicated by said stored data.
13. The method of claim 12 in which no item was added to the tally within 15 seconds of the time of said event, and the method includes taking said responsive action.
14. The method of claim 12 in which the responsive action includes issuing an alert to store personnel.
15. The method of claim 12 in which the responsive action includes increasing a risk score.
16. A method comprising the acts:
extracting identifier data from imagery captured by a user device from an item, consulting a data structure with the extracted identifier to obtain a corresponding item identifier, and entering the item identifier on a tally with associated time-stamp data;
examining the tally for duplicate item identifiers;
determining that a time difference between entry of a first of said item identifiers on the tally, and entry of a second of said item identifiers on the tally, is greater than a threshold value; and
taking an action in response to said determining.
17. The method of claim 16 in which said time difference is greater than 15 seconds, and the method includes taking said responsive action.
18. The method of claim 16 that further includes:
determining, by detection of a signals emitted by one or more wireless beacons, the shopper's location in an aisle of a retail store, at times that said duplicate items were added to the tally;
consulting a database to identify a stock location for said duplicate items;
when said stock location is within six feet of the determined shopper location, taking a first action in response to said determining; and
when said stock location is greater than six feet away from the determined shopper location, taking a second action in response to said determining, the second action being different than said first action.
19. The method of claim 18 that further includes:
when said stock location is greater than six feet away from the determined shopper location but in the same aisle as the determined shopper location, taking one second action; and
when said stock location is great than six feet away from the determined shopper location but in a different aisle than the determined shopper location, taking a different second action.
20. (canceled)
US14/971,747 2014-12-24 2015-12-16 Self-checkout arrangements Abandoned US20160189277A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/971,747 US20160189277A1 (en) 2014-12-24 2015-12-16 Self-checkout arrangements
US16/263,504 US11074637B2 (en) 2014-12-24 2019-01-31 Self-checkout arrangements

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201462096821P 2014-12-24 2014-12-24
US14/971,747 US20160189277A1 (en) 2014-12-24 2015-12-16 Self-checkout arrangements

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/263,504 Continuation US11074637B2 (en) 2014-12-24 2019-01-31 Self-checkout arrangements

Publications (1)

Publication Number Publication Date
US20160189277A1 true US20160189277A1 (en) 2016-06-30

Family

ID=56164761

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/971,747 Abandoned US20160189277A1 (en) 2014-12-24 2015-12-16 Self-checkout arrangements
US16/263,504 Active 2035-12-21 US11074637B2 (en) 2014-12-24 2019-01-31 Self-checkout arrangements

Family Applications After (1)

Application Number Title Priority Date Filing Date
US16/263,504 Active 2035-12-21 US11074637B2 (en) 2014-12-24 2019-01-31 Self-checkout arrangements

Country Status (1)

Country Link
US (2) US20160189277A1 (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160270563A1 (en) * 2015-03-17 2016-09-22 Renewable Edge Llc Solar powered systems and devices for improved shopping cart corral
US20170053326A1 (en) * 2015-08-19 2017-02-23 Wal-Mart Stores, Inc. System for reducing waiting time
US20180315011A1 (en) * 2017-02-23 2018-11-01 John Clarke Limited Spatial Digital Directory with Physical Navigation for Optimizing Smart Carts
GB2562131A (en) * 2017-05-05 2018-11-07 Arm Kk Methods, systems and devicesfor detecting user interactions
CN108789436A (en) * 2018-06-15 2018-11-13 重庆优豆商贸有限公司 Intelligent assistance formula shopping robot
US20180365951A1 (en) * 2017-06-15 2018-12-20 Ncr Corporation Real time bypass detection in scanner
US20190164142A1 (en) * 2017-11-27 2019-05-30 Shenzhen Malong Technologies Co., Ltd. Self-Service Method and Device
US20190176864A1 (en) * 2017-12-08 2019-06-13 Toshiba Tec Kabushiki Kaisha Carriage and information processing device
US10467609B2 (en) * 2017-04-27 2019-11-05 Walmart Apollo, Llc Products identifying carrier
US10510219B1 (en) 2015-07-25 2019-12-17 Gary M. Zalewski Machine learning methods and systems for managing retail store processes involving cashier-less transactions
WO2020040710A3 (en) * 2017-12-29 2020-04-16 Migros Ticaret Anonim Sirketi A system for enabling customers to do shopping in physical stores via their mobile devices
US10885336B1 (en) 2018-01-13 2021-01-05 Digimarc Corporation Object identification and device communication through image and audio signals
US20210061334A1 (en) * 2019-09-03 2021-03-04 Dale Lee Yones Empty bottom shelf of shopping cart monitor and alerting system using distance measuring methods
US10977717B2 (en) * 2019-07-22 2021-04-13 Pickey Solutions Ltd. Hand actions monitoring device
US11126861B1 (en) 2018-12-14 2021-09-21 Digimarc Corporation Ambient inventorying arrangements
US11151540B2 (en) * 2018-06-04 2021-10-19 Worldline Sa/Nv Device and method for secure identification of a user
US20220207504A1 (en) * 2020-12-27 2022-06-30 Bizerba SE & Co. KG Self-checkout store
US20220207595A1 (en) * 2020-12-27 2022-06-30 Bizerba SE & Co. KG Self-checkout store
US20220270099A1 (en) * 2021-02-19 2022-08-25 Toshiba Tec Kabushiki Kaisha Self-checkout system and method
US11501346B2 (en) * 2019-03-26 2022-11-15 Toshiba Global Commerce Solutions Holdings Corporation System and method for facilitating seamless commerce
US11538063B2 (en) 2018-09-12 2022-12-27 Samsung Electronics Co., Ltd. Online fraud prevention and detection based on distributed system
EP4125020A1 (en) 2021-07-30 2023-02-01 Fujitsu Limited Information processing program, information processing method, and information processing apparatus
EP4125019A1 (en) 2021-07-30 2023-02-01 Fujitsu Limited Information processing program, information processing method, and information processing apparatus
US20230030356A1 (en) * 2015-04-06 2023-02-02 Position Imaging, Inc. Package tracking systems and methods
WO2023039677A1 (en) * 2021-09-17 2023-03-23 Leav Inc. Contactless checkout system with theft detection
US20230106402A1 (en) * 2020-06-15 2023-04-06 Rainus Co., Ltd. Electronic shelf label
US11755989B2 (en) * 2020-03-27 2023-09-12 Toshiba Global Commerce Solutions Holdings Corporation Preventing theft at retail stores
US11798064B1 (en) 2017-01-12 2023-10-24 Digimarc Corporation Sensor-based maximum-likelihood estimation of item assignments
EP4303825A1 (en) 2022-07-07 2024-01-10 Fujitsu Limited Information processing program, information processing method, and information processing device

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3135188C (en) * 2016-07-20 2022-06-14 United Parcel Service Of America, Inc. Location tracking using beacons
WO2019213418A1 (en) * 2018-05-02 2019-11-07 Walmart Apollo, Llc Systems and methods for transactions at a shopping cart
CN113508424B (en) * 2019-03-04 2023-07-14 日本电气株式会社 Store device, store system, checkout method, and program
US11869032B2 (en) * 2019-10-01 2024-01-09 Medixin Inc. Computer system and method for offering coupons
US20230131444A1 (en) * 2020-03-26 2023-04-27 Walmart Apollo, Llc Systems and methods of detecting fraudulent activity at self-checkout terminals
WO2022235637A1 (en) * 2021-05-04 2022-11-10 Trax Technology Solutions Pte Ltd. Methods and systems for retail environments

Family Cites Families (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4973952A (en) 1987-09-21 1990-11-27 Information Resources, Inc. Shopping cart display system
US6092725A (en) * 1997-01-24 2000-07-25 Symbol Technologies, Inc. Statistical sampling security methodology for self-scanning checkout system
CA2201423C (en) 1997-04-01 2007-06-26 Michael Coveley Cashierless shopping store and components for use therein
US6394355B1 (en) 1999-02-22 2002-05-28 Symbol Technologies, Inc. Hand-held acquistion device
US7870078B2 (en) 2002-11-01 2011-01-11 Id Insight Incorporated System, method and computer program product for assessing risk of identity theft
US20040111320A1 (en) 2002-12-05 2004-06-10 Jorg Schlieffers Electronic shopping system
US7175089B2 (en) 2003-04-07 2007-02-13 Silverbrook Research Pty Ltd Face determination
US6854656B2 (en) * 2003-05-08 2005-02-15 Fujitsu Limited Self-scanning system with enhanced features
US7631808B2 (en) 2004-06-21 2009-12-15 Stoplift, Inc. Method and apparatus for detecting suspicious activity using video analysis
NL1027947C2 (en) 2005-01-04 2006-01-09 Scangineers B V Self scanning method for use in supermarket, compares actual weight of items in trolley with theoretical weight of items scanned in as they are placed in trolley
CN101238460A (en) * 2005-04-29 2008-08-06 斯普林伯德零售网络特许有限公司 Systems and methods for managing a hierarchical structure
DE102005038811A1 (en) * 2005-08-17 2007-03-01 Rainer Brenner Method and device for securing objects
US20080237339A1 (en) 2007-03-26 2008-10-02 Media Cart Holdings, Inc. Integration of customer-stored information with media enabled shopping systems
US8229158B2 (en) 2008-04-29 2012-07-24 International Business Machines Corporation Method, system, and program product for determining a state of a shopping receptacle
US20090272801A1 (en) 2008-04-30 2009-11-05 Connell Ii Jonathan H Deterring checkout fraud
US8448859B2 (en) 2008-09-05 2013-05-28 Datalogic ADC, Inc. System and method for preventing cashier and customer fraud at retail checkout
WO2010033680A1 (en) 2008-09-19 2010-03-25 Engage In-Store, LLC Electronic device for shopping cart
US8462212B1 (en) 2008-12-04 2013-06-11 Stoplift, Inc. Correlating detected events with image data
US8403215B2 (en) 2009-05-11 2013-03-26 Toshiba Global Commerce Solutions Holdings Corporation Self shopping support by getting contents from electronic shelf labels
US8819172B2 (en) 2010-11-04 2014-08-26 Digimarc Corporation Smartphone-based methods and systems
US20100318440A1 (en) 2010-03-18 2010-12-16 Coveley Michael Ej Cashierless, Hygienic, Automated, Computerized, Programmed Shopping Store, Storeroom And Supply Pipeline With Administration Cataloguing To Eliminate Retail Fraud; With Innovative Components For Use Therein
US20110274094A1 (en) 2010-05-06 2011-11-10 Qualcomm Incorporated Methods and apparatus for estimating a geolocation of a wireless communications device
US9053473B2 (en) 2010-05-28 2015-06-09 Ncr Corporation Techniques for assisted self checkout
US20120041845A1 (en) 2010-08-11 2012-02-16 Lmr Inventions, Llc System and method for enabling customers to perform self check-out procedures in a retail setting
US10121133B2 (en) 2010-10-13 2018-11-06 Walmart Apollo, Llc Method for self-checkout with a mobile device
US9218580B2 (en) 2010-12-30 2015-12-22 Honeywell International Inc. Detecting retail shrinkage using behavioral analytics
US8317086B2 (en) 2011-02-16 2012-11-27 International Business Machines Corporation Communication of transaction data within a self-checkout environment
US8660581B2 (en) 2011-02-23 2014-02-25 Digimarc Corporation Mobile device indoor navigation
US9129277B2 (en) 2011-08-30 2015-09-08 Digimarc Corporation Methods and arrangements for identifying objects
US10129211B2 (en) 2011-09-15 2018-11-13 Stephan HEATH Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms
US20130103608A1 (en) 2011-10-21 2013-04-25 Ebay Inc. Location Determination and Map Building
US20140304107A1 (en) 2012-12-03 2014-10-09 CLARKE William McALLISTER Webrooming with rfid-scanning robots
US9702707B2 (en) 2011-12-22 2017-07-11 AppLabz, LLC Systems, methods, and apparatus for providing indoor navigation using optical floor sensors
US20130317916A1 (en) 2011-12-29 2013-11-28 Intel Corporation Location based technology for smart shopping services
US11062258B2 (en) 2012-02-24 2021-07-13 Netclearance Systems, Inc. Automated logistics management using proximity events
US9892438B1 (en) * 2012-05-03 2018-02-13 Stoplift, Inc. Notification system and methods for use in retail environments
US9536236B2 (en) 2012-06-08 2017-01-03 Ronny Hay Computer-controlled, unattended, automated checkout store outlet and related method
US10878439B2 (en) 2012-06-11 2020-12-29 Retailmenot, Inc. Mobile-offer creation
US11210688B2 (en) 2012-06-15 2021-12-28 Walmart Apollo, Llc Systems and methods for interactive shopping using a mobile computing device
US20140111380A1 (en) 2012-10-22 2014-04-24 Cambridge Silicon Radio Limited Method for short-range proximity derivation and tracking
EP2951760A4 (en) 2013-02-04 2016-08-24 Shopkick Inc Presence detection using bluetooth and hybrid-mode transmitters
US9171300B2 (en) 2013-03-12 2015-10-27 Tw Vending, Inc. Retail convenience market technology with enhanced vendor administration and user mobile app functionality
US8915429B2 (en) 2013-03-15 2014-12-23 Ncr Corporation Methods of mobile self-checkout shopping for produce items in a retail grocery store
US9033227B2 (en) 2013-05-20 2015-05-19 Ncr Corporation Methods and systems for performing security weight checks at checkouts
US20140365334A1 (en) 2013-06-07 2014-12-11 Bby Solutions, Inc. Retail customer service interaction system and method
US9928541B2 (en) 2013-06-28 2018-03-27 Wal-Mart Stores, Inc. Consumer guidance while shopping for products
US20150025969A1 (en) 2013-07-18 2015-01-22 Fetch Rewards, LLC Multisystem Interface for Roaming Self-Checkout
GB2521243A (en) 2013-08-30 2015-06-17 Wal Mart Stores Inc Methods and systems to facilitate messaging to customers
US20150095161A1 (en) 2013-10-02 2015-04-02 Anurag Goel Universal Retail App and Auxiliary Methods
US20150119076A1 (en) 2013-10-31 2015-04-30 Nant Holdings Ip, Llc Self-calibrating mobile indoor location estimations, systems and methods
US10496946B2 (en) 2013-11-06 2019-12-03 Catalina Marketing Corporation System and method for risk-based auditing of self-scan shopping baskets
US20150154675A1 (en) 2013-12-02 2015-06-04 Ebay Inc. Customer shopping help system
US10102558B2 (en) 2013-12-18 2018-10-16 Paypal, Inc. Smart dressing rooms
US9881261B2 (en) 2014-02-25 2018-01-30 Paypal, Inc. Systems and methods for remote check-in
US20150262116A1 (en) 2014-03-16 2015-09-17 International Business Machines Corporation Machine vision technology for shelf inventory management
US20150278888A1 (en) 2014-03-28 2015-10-01 Branding Brand, Inc. System and method for acquiring information
ES2525510B1 (en) 2014-04-09 2015-09-29 Jose Antonio QUINTERO TRAVERSO System and method for control and management of shopping carts
US9332522B2 (en) 2014-05-20 2016-05-03 Disney Enterprises, Inc. Audiolocation system combining use of audio fingerprinting and audio watermarking
CN109615029A (en) 2014-05-30 2019-04-12 电子商品交易合伙人有限公司 RFID enhancing and position detection in jewelry shopping experience

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160270563A1 (en) * 2015-03-17 2016-09-22 Renewable Edge Llc Solar powered systems and devices for improved shopping cart corral
US20230030356A1 (en) * 2015-04-06 2023-02-02 Position Imaging, Inc. Package tracking systems and methods
US10510219B1 (en) 2015-07-25 2019-12-17 Gary M. Zalewski Machine learning methods and systems for managing retail store processes involving cashier-less transactions
US11417179B1 (en) 2015-07-25 2022-08-16 Gary M. Zalewski Using image and voice tracking to contextually respond to a user in a shopping environment
US11315393B1 (en) 2015-07-25 2022-04-26 Gary M. Zalewski Scenario characterization using machine learning user tracking and profiling for a cashier-less retail store
US10573134B1 (en) 2015-07-25 2020-02-25 Gary M. Zalewski Machine learning methods and system for tracking label coded items in a retail store for cashier-less transactions
US11288933B1 (en) 2015-07-25 2022-03-29 Gary M. Zalewski Devices for tracking retail interactions with goods and association to user accounts for cashier-less transactions
US20170053326A1 (en) * 2015-08-19 2017-02-23 Wal-Mart Stores, Inc. System for reducing waiting time
US10650420B2 (en) * 2015-08-19 2020-05-12 Walmart Apollo, Llc System for reducing waiting time
US11798064B1 (en) 2017-01-12 2023-10-24 Digimarc Corporation Sensor-based maximum-likelihood estimation of item assignments
US20180315011A1 (en) * 2017-02-23 2018-11-01 John Clarke Limited Spatial Digital Directory with Physical Navigation for Optimizing Smart Carts
US10467609B2 (en) * 2017-04-27 2019-11-05 Walmart Apollo, Llc Products identifying carrier
GB2562131A (en) * 2017-05-05 2018-11-07 Arm Kk Methods, systems and devicesfor detecting user interactions
GB2562131B (en) * 2017-05-05 2020-11-04 Arm Kk Methods, systems and devices for detecting user interactions
US11080976B2 (en) * 2017-06-15 2021-08-03 Ncr Corporation Real time bypass detection in scanner
US20180365951A1 (en) * 2017-06-15 2018-12-20 Ncr Corporation Real time bypass detection in scanner
US20190164142A1 (en) * 2017-11-27 2019-05-30 Shenzhen Malong Technologies Co., Ltd. Self-Service Method and Device
US10636024B2 (en) * 2017-11-27 2020-04-28 Shenzhen Malong Technologies Co., Ltd. Self-service method and device
US20190176864A1 (en) * 2017-12-08 2019-06-13 Toshiba Tec Kabushiki Kaisha Carriage and information processing device
WO2020040710A3 (en) * 2017-12-29 2020-04-16 Migros Ticaret Anonim Sirketi A system for enabling customers to do shopping in physical stores via their mobile devices
US10885336B1 (en) 2018-01-13 2021-01-05 Digimarc Corporation Object identification and device communication through image and audio signals
US11151540B2 (en) * 2018-06-04 2021-10-19 Worldline Sa/Nv Device and method for secure identification of a user
CN108789436A (en) * 2018-06-15 2018-11-13 重庆优豆商贸有限公司 Intelligent assistance formula shopping robot
US11538063B2 (en) 2018-09-12 2022-12-27 Samsung Electronics Co., Ltd. Online fraud prevention and detection based on distributed system
US11126861B1 (en) 2018-12-14 2021-09-21 Digimarc Corporation Ambient inventorying arrangements
US11501346B2 (en) * 2019-03-26 2022-11-15 Toshiba Global Commerce Solutions Holdings Corporation System and method for facilitating seamless commerce
US10977717B2 (en) * 2019-07-22 2021-04-13 Pickey Solutions Ltd. Hand actions monitoring device
US20210061334A1 (en) * 2019-09-03 2021-03-04 Dale Lee Yones Empty bottom shelf of shopping cart monitor and alerting system using distance measuring methods
US11618490B2 (en) * 2019-09-03 2023-04-04 Bob Profit Partners Llc. Empty bottom shelf of shopping cart monitor and alerting system using distance measuring methods
US11755989B2 (en) * 2020-03-27 2023-09-12 Toshiba Global Commerce Solutions Holdings Corporation Preventing theft at retail stores
US20230106402A1 (en) * 2020-06-15 2023-04-06 Rainus Co., Ltd. Electronic shelf label
US20220207595A1 (en) * 2020-12-27 2022-06-30 Bizerba SE & Co. KG Self-checkout store
US20220207504A1 (en) * 2020-12-27 2022-06-30 Bizerba SE & Co. KG Self-checkout store
US11900349B2 (en) * 2020-12-27 2024-02-13 Bizerba SE & Co. KG Self-checkout store
US20220270099A1 (en) * 2021-02-19 2022-08-25 Toshiba Tec Kabushiki Kaisha Self-checkout system and method
EP4125020A1 (en) 2021-07-30 2023-02-01 Fujitsu Limited Information processing program, information processing method, and information processing apparatus
EP4125019A1 (en) 2021-07-30 2023-02-01 Fujitsu Limited Information processing program, information processing method, and information processing apparatus
WO2023039677A1 (en) * 2021-09-17 2023-03-23 Leav Inc. Contactless checkout system with theft detection
EP4303825A1 (en) 2022-07-07 2024-01-10 Fujitsu Limited Information processing program, information processing method, and information processing device

Also Published As

Publication number Publication date
US20190236684A1 (en) 2019-08-01
US11074637B2 (en) 2021-07-27

Similar Documents

Publication Publication Date Title
US11074637B2 (en) Self-checkout arrangements
US11514497B2 (en) Method of using, apparatus, product, and system for a no touch point-of-sale self-checkout
US20230017398A1 (en) Contextually aware customer item entry for autonomous shopping applications
US10885336B1 (en) Object identification and device communication through image and audio signals
US11847689B2 (en) Dynamic customer checkout experience within an automated shopping environment
US10290031B2 (en) Method and system for automated retail checkout using context recognition
US20180197218A1 (en) System and method for object detection in retail environment
US20180232799A1 (en) Exhibition device, display control device and exhibition system
JP6134607B2 (en) User observation system
US20180101875A1 (en) Method and device for recommending in-store product by using visible light communication
CA2940398C (en) Systems and methods for customer deactivation of security elements
JP2019020986A (en) Human flow analysis method, human flow analysis device, and human flow analysis system
US20200387866A1 (en) Environment tracking
JP7140223B2 (en) Payment processor, method and program
JP2010140287A (en) Purchase action analysis device, method and computer program
JP2023030008A (en) Information processing system, commodity recommendation method, and program
US20140337177A1 (en) Associating analytics data with an image
WO2019116620A1 (en) Processing device, processing method, and program
JP6399096B2 (en) Information processing apparatus, display method, and computer program
JP2016167172A (en) Information processing method, information processing system, information processor and program thereof
US11798064B1 (en) Sensor-based maximum-likelihood estimation of item assignments
JP2016024601A (en) Information processing apparatus, information processing system, information processing method, commodity recommendation method, and program
JP7156215B2 (en) Server device, mobile store, and information processing system
JP7184089B2 (en) Customer information registration device
US20230153878A1 (en) System and method for automating processing of restricted items

Legal Events

Date Code Title Description
AS Assignment

Owner name: DIGIMARC CORPORATION, OREGON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DAVIS, BRUCE L.;REEL/FRAME:037884/0994

Effective date: 20160229

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION