This disclosure is directed to systems and method for visually monitoring actions at an automated retail device or a point-of-sale terminal. Further the systems and methods described herein are directed to a method of fraud detection and prevention.
Automatic retail devices have been described in a number of commonly owned or licensed patents and applications including, for example, U.S. Pat. No. 8,191,779, entitled WIRELESS MANAGEMENT OF REMOTE VENDING MACHINES; U.S. Pat. No. 8,998,082, entitled MULTIMEDIA SYSTEM AND METHODS FOR CONTROLLING VENDING MACHINES; U.S. Patent Application Publication No. 2015/0279147, entitled, SYSTEMS AND METHODS FOR AUTOMATED DISPENSING SYSTEMS IN RETAIL LOCATIONS, filed Mar. 31, 2015; U.S. Patent Application Publication No. 2017/0148005, entitled INTEGRATED AUTOMATIC RETAIL SYSTEM AND METHOD, filed Nov. 20, 2015 and US Patent Application Publication No. 202000273011, filed Dec. 13, 2017 and entitled METHODS AND UTILITIES FOR CONSUMER INTERACTION WITH A SELF SERVICE SYSTEM. Each of these patents and U.S. Publications are incorporated herein by reference.
Each of these automatic retail devices provide iterative improvements over prior known solutions enabling automatic payment, automatic detection of item removal, and theft detection. However, as is known in other areas, no matter how smart and intelligent the system, a determined person is often capable of subverting these systems. The result is the owner or operator of the automatic retail device suffers losses in both merchandise and sales. While some of these lost sales may be made whole by credit card companies or via insurance policies, the underlying crime is left unpunished, and often unreported. Moreover, seeking recovery via either mechanism remains cumbersome and time consuming. This disclosure is directed to is directed to systems and methods of detecting and preventing fraud and both product and sales losses.
One aspect of the disclosure is directed to an automatic retail device, the automatic retail device also includes a housing including an enclosure having a plurality of shelves mounted in the enclosure, and a door providing access to the enclosure when open and preventing access to the enclosure when closed; a first camera mounted along a top portion of the enclosure and configured to capture images in a top-down manner; a second camera mounted on a side of the enclosure and configured to capture images from of the automatic retail device; and an application stored in a memory and executed by a processor, where the application when executed by the processor: detect a presence of a user's hands in the images generated by the first and second camera; detect a presence of a product in the user's hands in the images generated by the first and second camera; determines a identity and number or products removed from the automatic retail device; and charges the user based on the identity and number of products removed from the automatic retail device. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods and systems described herein.
Implementations of this aspect of the disclosure may include one or more of the following features. The automatic retail device where the application employs a first convolutional neural network to identify the user's hands and a second convolution neural network to identify a product in the user's hands. The second convolutional neural network analyses a subregion of the image in which the hands are detected. The automatic retail device further including a third convolution neural network configured to determine the identity of the product detected in the user's hands. The application is configured to track the user's hands in the images from the first and second cameras and detect suspicious movements of the user's hands. The automatic retail device further including a fourth convolutional neural network to detect suspicious movement of the user's hands. The weight sensor is configured to detect the removal or return of a product to or from one of the plurality of shelves. The automatic retail device further including a planogram is stored in the memory, the planogram identifying the identity and. The automatic retail device further including a third camera on an interior surface of the door. The application is configured to acquire an image from the third camera, the image including the plurality of shelves and any products on the plurality of shelves. The application identifies the products located on the shelves in the images generated by the third camera. The application identifies portions of the plurality of shelves having no products. The automatic retail device further including an automatic door opener, and configured to open the door without requiring contact from a user. An application on the user's smartphone is in communication with the automatic retail device. The automatic retail device further including a fourth camera on an exterior of the automatic retail device and configured to capture images of an area in proximity to the automatic retail device. The application analyzes images captured by the fourth camera to detect an identity of a person captured in the image is an authorized user. If the person captured in the image is an authorized user, the application unlocks the door. If the person captured in the image has previously committed credit card fraud or theft at an automatic retail device access to the automatic retail device is denied. The automatic retail device further including a convolution neural network to analyze the images acquired to identify the person captured in the image. Implementations of the described techniques may include hardware, a method or process, or computer software on a computer-accessible medium, including software, firmware, hardware, or a combination of them installed on the system that in operation causes or cause the system to perform the actions. One or more computer programs can be configured to perform particular operations or actions by virtue of including instructions that, when executed by data processing apparatus, cause the apparatus to perform the actions.
As will be appreciated, using the three different cameras 106, 114, and 120, the entirety of the space in front of the automatic retail device 100, is observable. As explained in detail below, the overlapping fields of view 112, 118, and 124 ensure that any movement of the user including hand movements, body movements, the removal or return of products from or to the shelves 104, and others are captured by the cameras.
One such application is an image recognition engine 206. Details of the image recognition engine 206 can be seen in
A fourth convolutional network 214, and image tracking subsystem can be employed to analyze certain of the images to determine whether they evidence an act of fraud or theft. One example of evidencing fraud are suspicious hand movements. If suspicious behavior is identified, a signal is generated and transmitted to an alert module 216. Alerts may take many forms. For example, it may be as simple as an audible or visual communication to the user indicating informing the user of the products the system has identified that the user has removed from the shelves 104, and for which they will be charged. Alternatively, the alerts may be internal alerts which are transmitted to a learning system 218. The learning system 218 may include facilities for further automated assessment of the images from the cameras 106, 114, 120 in which a suspected theft is further analyzed to decide. In instances where a theft is detected, the user's account can simply be charged the amount of the merchandise, thus negating the effect of the theft on the operator of the automatic retail device 100. Additionally or alternatively, the learning system 218 may include a user-interface (not shown) where a specialist (i.e., a human) may analyze the images from that attempt to determine whether there has been an attempted theft of products from the automatic retail device 100. Where a theft is confirmed either automatically or manually, the result of this determination can be transmitted to a server 220 to update the charges on a user's account. In addition, under certain circumstances, as described in greater detail below, an alert may be transmitted to the user via an application they have downloaded to their smartphone regarding the transaction and allowing the user to challenge the determination. Additionally or alternatively, the user may be precluded from accessing any automatic retail device 100 based on their behavior either for a certain time period, or their account may be terminated preventing any future access by the user. In addition to transmission to the user's application, the limitation of access may be stored in the server 220 and further transmitted to a local database 222 to ensure that access is denied to the user regardless of the credentials provided. Further details on the denial of access and how that is effectuated are described in greater detail below.
Exemplary images from each camera can be seen in
The images of
The images acquired by the cameras 106, 114, and 122 may be individually logged and stored in either the database 222 or transmitted to the server 220 and stored there. These images can be stored in a time sequence and associated the individual transaction and with the individual user's account or the presented credit card number so that the images for any individual transaction can be easily searched for an identified in the database 22 or on the server 220 to analyze the individual transaction or the transactions of a particular user. As will be appreciated the ability to review these transactions and images allows for the collection of significant evidence that can be used by law enforcement in the prosecution of a user believed of theft or fraud in connection with the use of the automatic retail device.
As will be described in greater detail below, the shelves 104 include weight sensors. Those weight sensors detect the removal or replacement of products from the shelves 104. An application on the computing device 202, which includes a planogram (a list of products, weights, and location in the automatic retail device 100 of the products) stored in the memory 204 detailing the location of items in the automatic retail device 100, compares the location of a detected weight change and the amount of the weight change to determine which product and how many of that product have been removed from a shelf 104. The computing device 202, utilizes the weight-based information in combination with the computer vision information (e.g., the image-based detection of hands and products as described herein), to correlate the determination of the products removed for which the user should be charged and for the detection of any fraud, theft, etc. For example, in instances where weight of a product removed from a shelf 104 substantially corresponds to the weight of a product returned, the image analysis may be able to detect any differences between the two products and thus the attempted fraud or theft. Similarly, where the exterior of the product removed and returned to the shelf 104 substantially correspond, a difference in weight between the two (even a slight one of just a gram or an ounce) may be sufficient to detect the fraud or theft. Finally, where both the weight and the images of the product indicate that the product removed and the product returned appear to be the same, tracking of the hands of the user during the transaction may reveal some attempted slight of hand or other suspicious hand gestures that indicate there may be an attempted fraud or theft from the automatic retail device 100.
Though described herein above with respect to the weight sensitivity of the shelves 104, the planogram of the contents of the automatic retail device 100 is also useful in the product detection aspects of computer vision and image analysis as described herein. With the planogram stored in memory, the convolutional neural network 212 can narrow its focus to just those items that are intended be in the automatic retail device 100 to more readily and quickly identify the product held in a user's hands as either a product that is intended to be in or removed from the automatic retail device 100 or a product which is not listed on the planogram. In this way, much like limiting the area of analysis for product detection to just that portion of the image in which the hands or the product appears (i.e., a subregion of the image) to limit the processing power required for the image analysis and enabling greater accuracy in the product detection by the third convolutional neural network 212.
As described above, convolutional neural networks must be trained to detect the specific features of the images that they are to focus on. These convolution neural networks can be updated, with the actual acquired images from the automatic retail device 100, with new gestures and new tracking to result in ever more efficient and exacting determination of the location and tracking of the user's hands and products. As will be appreciated, using hundreds and even thousands of automatic retail devices 100, the data set of images increases at an incredible rate and reduces the possibility for even the most creative and skillful fraudster or thief to overcome these protections. This enables the operator of the automatic retail device 100 to have confidence that the products placed in the automatic retail device will not be the subject of theft or fraud despite being unattended by a human.
The images and the tracking of the hands and the products as manipulated by the users may be transmitted to a learning system 218 so that these behaviors and hand gestures can be analyzed. In some instances, these behaviors and hand gestures can be used to further train the convolutional neural networks 208-214. Further, these updates this additional training of the convolutional neural networks can be transmitted back to the automatic retail devices 100 to allow for ever increasing abilities to provide accurate results.
Described herein above is a planogram that details where the products are located within the automatic retail device 100. In one aspect of the disclosure the planogram is generated by an operator of the automatic retail device 100 user prior to the loading of products in the automatic retail device 100 (e.g., via an application running on a computing device in communication with the automatic retail device 100). However, the camera 120 mounted on the door 102 enables other aspects of the disclosure. For example,
A further method 700 is depicted in
Though described above with respect to accurately determining that the contents of the automatic retail device 100 at the initiation of a transaction, the systems and methods described herein are not so limited. For example, as noted above, when a particular shelf is determined to have no product and is empty, this information can be sent to an operator to indicate the need for stocking of that item. Alternatively, it can be an indicator that no item has been stocked on that shelf 104 and that the operator can undertake the necessary steps to identify a product to be stocked at that location in the future. As will be appreciated, many of the determinations regarding the need for restocking may be based on the weight sensors (described below) and used to measure the contents of the shelves 104 as this can be employed when only two or three of a particular product remain on a given shelf 104, and before zero products remain on any particular shelf 104.
Still a further aspect of the disclosure can be seen with reference the method 800 and the image of the automatic retail device 100 in
The automatic retail device 100 described herein is typically used by users who have established an account. Details of establishing that account are described in greater detail below, however, this account will typically require a user to provide biometric data (e.g., thumb print, voice data, retinal scan, or other) as well as payment resolution data (e.g., a credit card to be charged or a bank account to be debited upon removal of items). Use of Google Pay, Apple Pay, Android Pay, and other related systems may also be enabled without departing from the scope of the disclosure. However, the automatic retail device 100 is not so limited. In instances where a user has not established an account, the door 102 can be opened and a transaction initiated by the presentation of a credit card, debit card or other payment vehicle.
As will be appreciated, by accepting credit cards some individuals my a seek to present a stolen credit card. While the credit card issuing company is generally responsible for the charges beyond $50, the retailer may not be made whole. To address this shortcoming, a further aspect of the disclosure is directed to the use of a camera 124 (
In addition to the above, when a user, who does not have another means of accessing the automatic retail device 100 presents themselves and a credit or debit card to gain access the camera 124 ensures that one or more images of the user are captured and associated with the transaction. In one aspect, the camera 124 can observe and capture images of an individual that approaches the automatic retail device. The imaging may commence approximately 2.5 meters (9 feet) from the automatic retail device 100 and continue until the potential user initiates interaction with the automatic retail device 100. During this interval, images are captured by the camera 124 can process the images and using facial recognition software resident on the automatic retail device 100 compare the images to all authorized users who have an account to identify the potential user. This determination can be made by comparing acquired images of a potential user with images stored in the database 222, as well as those stored on the server 220.
Where the automatic retail device 100 can analyze the images captured by camera 124 and, using facial recognition software resident on the memory 204 and executed by a processor, identify the potential user as an account holder (e.g., based on image recognition), the automatic retail device 100 may automatically unlock allowing the account holder access to the products in the automatic retail device 100. As will be appreciated, this will initiate a transaction based solely on the facial recognition or matching of the image acquired by the camera 124 to prior images of the account holder. In at least one aspect of the disclosure, the automatic retail device 100 may include a mechanism (e.g., gear drive, spring driven, gas strut system, or others) to move the door 102 to an opened position once the potential user is confirmed as an account holder, thus allowing the account holder to initiate a transaction without having any contact with the automatic retail device itself. Even if not recognized via facial recognition, as described above, camera 124 may still be employed for iris scanning to identify the account holder and initiate a transaction without any touching of the automatic retail device 100 by the account holder. Alternatively, the automatic retail device may request further identification to initiate a transaction including thumbprint, voice, or a credit or debit card.
Where the potential user does not have an account, they may present a credit or debit card at the automatic retail device 100. Having accepted the credit or debit card, the door 102 unlocks and access is granted to the products stored therein. While granting access to the automatic retail device 100, one or more of the images acquired by the camera 124 are associated with the transaction. This image or images include clarifying characteristics of the person presenting the credit or debit card. Each transaction also includes a unique transaction identifier. All this data is stored together in the database 222 and/or on server 220 for future use if necessary.
As can be understood, the issuing authority of the credit card or debit card may reject a transaction or identify a transaction as fraudulent or committed with the use of a stolen credit or debit card. Often this is only done after the transaction is complete and the user has left the scene with both the credit or debit card and the products purchased therewith.
The method and systems described herein cannot prevent the initial fraudulent transaction. However, the systems and method described herein can prevent the same individual from gaining access to any automatic retail device 100, anywhere in the world.
Over time an extensive collection of users who have attempted to use a stolen credit or debit card can be created and all such persons can be denied access to the automatic retail devices worldwide. In this fashion, the network of automatic retail devices can greatly limit the theft and loss of products that an operator may experience. In addition to the organically created database of individuals that are not to be granted access based on their prior bad behavior, the database 222 or server 220 may be supplemented with criminal record data for individuals that have been charged with or convicted of fraudulent credit card use or the use of stolen credit cards in other transactions. In addition, the record of the specific attempted transaction may be sent to the police or the credit card company for further action (e.g., identifying the location of the individual so they can be arrested for their past interaction or so that the credit card company can make an assessment whether the presented credit card should be cancelled to prevent its use elsewhere).
As will be appreciated, the above example works on a fool me once shame on you, fool me twice shame on me principal. In this manner there will be no fool me twice, as the individual will be locked out of all devices, worldwide that share the same fraud detection system. In this way operators of the automatic retail device 100 can reduce their exposure to theft. Where an individual approaches the automatic retail device 100 and is denied access, they will as a matter of course have an opportunity to contact customer service and seek a work around, through which customer service may initiate a transmission to the automatic retail device 100 to allow the door to open and a transaction to be initiated with the presented credit card. Further, any refusal to grant access to an individual may be reviewed to determine whether denial of access is warranted or whether a mistake was made.
One of ordinary skill in the art will recognize that much of the processing described above of the images may be performed in a cloud computing environment. In one implementation, the features of the images are extracted locally by the software stored in memory 204 on the automatic retail device 100. These extracted features may then be transmitted to a cloud computing solution (e.g., server 220) for determination of a match to either an account holder authorized to access the automatic retail device 100 or a person who has previously presented a fraudulent credit or debit card and is banned from accessing the automatic retail device 100. Once a match is determined a signal is returned to the automatic retail device 100 either granting access and allowing the door 102 to open or declining entry. In some instances, the operator of the automatic retail device may also receive a signal including the image of the person who has been denied access, this image may be viewable in an operator's application running on a phone or computer, described in greater detail below.
A further aspect of the disclosure is directed to age verification of an account holder. As will be appreciated, there are often products which are age restricted, but may nonetheless be quite desirable to offer for sale in an automatic retail device 100. Some examples of products requiring age verification include alcohol, marijuana, CBD products, ammunition, cigarettes, vaping products, and others. To enable age verification, an account holder may be asked to capture an image of a government issued identification such as a driver's license, passport, or other acceptable form of identification. In addition, the user may be required to capture an image of themselves that can be used for comparison purposes by the application to confirm that the ID and the image match. As shown in
In a similar field of endeavor,
The point-of-sale terminal device 1000 includes a processor and memory storing applications that can be executed by the processor. The point-of-sale terminal device 1000 includes an access device (not shown) for connecting to the internet and particularly to the image recognition fraud and theft detection systems described herein above in connection with the automatic retail device 100. The access device may be, for example, a network interface controller that can connect to the internet via a wired or wireless connection.
In addition to connecting to the fraud and theft detection systems described above, the point-of-sale terminal device 1000 may also be connected to a point-of-sale terminal (e.g., the cash register where the cashier might ring up the items for purchase and take payment from the purchaser (cash, credit card, debit card, Apple Pay, Google Pay, etc.). The connection to the point-of-sale terminal may be wired or wireless and enables communication between the point-of-sale terminal device and the actual point-of-sale terminal. As a result, though described above as having a speaker 1006, the point-of-sale terminal device 1000 may communicate with the cashier in a discrete manner. In an example, the communication may be in the form of text presented on the point-of-sale terminal and other information that can be useful to the cashier or clerk as will be described in greater detail below.
In operation, the camera 1002 works like the camera 124 on the exterior of the automatic retail device 100. The images captured by the camera 1002 are analyzed by a facial recognition software application that employs one or more convolutional neural networks to detect features of an individual that appears in the images. The convolutional neural networks may be resident on the point-of-sale terminal device 1000 or may be connected to the point-of-sale terminal device 1000 via a wired or wireless connection over the internet. As with the facial recognition application for the automatic retail device 100, the facial recognition software for the point-of-sale terminal device 1000 must also verify the quality of the image, once the features are detected and the quality of the image is confirmed, the facial recognition software seeks to find a match to identify the person as they approach the point-of-sale terminal. As with the automatic retail device 100, a database, which may be the same database 222 or server 220 can be accessed to determine whether the image captured by the camera 1002 has the same features as a prior image captured of a person (i.e., that the person has been previously imaged).
The database 222 or server 220 not only stores the image of the person but also other information about the individual appearing in the images. As an example, the point-of-sale terminal device 1000 captures images each time a person presents themselves at a point-of-sale terminal to conduct a transaction. That image may include a date and time stamp and may in fact be a series of images or a video. In addition, the images may be associated with a unique transaction identification number. Also stored with the images may be a record of the items purchased through the point-of-sale terminal. In one example, if the individual who is imaged pays for the goods with a credit or debit card, that information may also be stored and associated with both the transaction and the image. Thus, if a fraudulent card was ever used, that information will be associated with the image as well. As a result, when the database is queried to determine if there is a match to an image acquired at a point-of sale terminal device 1000, if that match identifies the individual as someone who has previously used a stolen or otherwise fraudulent credit card, the point-of-sale terminal device 1000 may present an indicator on the point-of-sale terminal directing the cashier to request a second form of identification from the person imaged if they attempt to pay with a credit or debit card. In this way, the retailer can limit their exposure to fraudulent transactions and limit their losses.
In addition to alerting the cashier regarding the need for a second form of identification additional steps may also be taken including alerting a manager to a potential issue with the customer and potentially alerting the police that an individual associated with a prior fraudulent transaction is seeking to do so again. This action may be taken regardless of whether a currently presented credit card is in fact valid. Just by the past behavior the person may be excluded from further transactions.
As with the automatic retail device 100, mechanisms are available for automatic and manual review of the decision to deny the person the ability to undertake the transaction. Further, the individual may seek the assistance of customer support to correct any improper denial.
In this way the retailers employing point-of-sale terminals and the operators of the automatic retail devices 100 can leverage eachother's transactions to build a robust database that can be queried with the facial recognition software and seek to limit theft and fraud. And the potential fraudulent customer can be denied before they conduct any further credit card fraud.
Still further, the database 222 or server 220 may have access to and receive updates of individuals with relevant criminal records and their images. Thus, when an individual who has previously been convicted of armed robbery is imaged at a point-of-sale terminal device 1000, the image recognition software can confirm the match and the point-of-sale terminal device 1000 may cause a notification to appear on the point-of-sale terminal directing the cashier to proceed cautiously. In some instances, this may include allowing the transaction to proceed without a second form of identification to promote the safety of the cashier.
In accordance with another aspect of the disclosure, the camera 1002 of the point-of-sale terminal device 1000 can capture the traffic, estimated age, and gender, of every person who passes by the point-of-sale terminal device 1000. In addition, this data can be correlated to the items purchased. As a result, analytics around the items being purchased in each store can be generated so that a store operator can understand who is buying which products and at what times, and what portion of the customers are within those general demographics.
Other information can also be collected by capturing images of the cashier with the camera 1002 a determination can be made whether the person operating the register or point-of-sale terminal is on their smartphone and how much time the individual spends on their smartphone. This information can be transmitted to a manager or store operator for further action. Similarly, the microphone 1008 can determine whether the cashier greeted the customer properly. As will be appreciated other performance and behavior traits of the cahier can also be collected. Analyses of items such as average wait time, whether an employee took their break, and how long they too their break can be assessed.
Despite the additional functionality, a primary function of the point-of-sale terminal device 1000 is to implement the fraud and theft mitigation systems that the facial recognition features described in greater detail above in connection with the images acquired by the camera 124 of the automatic retail device 100. Though not described in detail in connection with the point-of-sale terminal device 1000, those of skill in the art will recognize that the methods and components described above in connection with the automatic retail device 100 are equally applicable to the point-of-sale terminal device 1000.
Though the foregoing generally relates to security features of the automatic retail device 100, the disclosure is not so limited.
When an authorized user makes a purchase by opening an automatic retail device 100 and removing a product, once the door 102 closes the transaction is complete. Based on the change in weight on the shelves 104 and the products that are detected as removed using cameras 106, 114, and 122 a determination is made regarding which products and how many were removed during the transaction. The application then issues a receipt, as shown in
A separate feature in the application can be seen in
As described above, one of the methods that an authorized user may gain access to the automatic retail device is vis biometric data that confirms the individual at the automatic retail device is in fact the authorized user. There are two methods with which the biometric data may be collected. One method of collecting the biometric data is at the automatic retail device 100 itself. A thumb print reader on the outside of the automatic retail device can scan the authorized user's thumb and associate the thumb print with the user's account. Similarly, camera 124 may be employed to scan the user's iris and associate the iris scan with the user's account. Once so associated the authorized user may present themselves at any automatic retail device 100 and gain access by scanning their thumb or their iris. As an alternative, the camera on the user's smartphone and the touchpad on the phone may be employed to capture an image of the user's iris and a thumb print. Once captured, the application can be employed to associate the thumb scan or iris scan with the user's account.
Another feature of the application is that it provides a platform for the presentation of promotional offers such as seen in
The automatic retail device 100 includes both a microphone and a speaker. The speaker allows an artificial intelligence resident on the automatic retail device 100 to communicate audibly with a person at the automatic retail device. The microphone can detect audible inquiries and responses from the person. The combination allows for the automatic retail device 100 to present a virtual attendant, like what one might expect with a live sales representative, to answer questions and assist in gaining access to the automatic retail device 100, selecting items, and ensuring a smooth process. The automatic retail device 100 may also display promotional or informational videos on a display screen mounted thereto. As an alternative to the communication at the automatic retail device 100,
Finally,
A further aspect of the disclosure can be seen in
Additionally, the access panel 126 which includes a touch screen 128, a near field communication (NFC) reader 129, a card reader 130, a thumb print reader 132 and the handle 134 for opening the door 102 includes ultra-violet C (UV-C) lighting embedded in the access panel 126 at strategic locations to apply a UV-C light to those surfaces. UV-C is a known antimicrobial and works by destroying the DNA inside bacteria, viruses, and fungi. Application of UV-C light to surfaces of the access panel 126 that are likely to be touched by a user ensures a safe and clean environment for each user, even if a non-symptomatic individual is allowed to access the automatic retail device.
A related safety aspect of the automatic retail device 100 is the use of UV-C lighting inside the enclosure.
Each shelf 104 is configured to receive one or more bins 1204. The bins 1204 are of different sizes depending on the size of the products to be sold in each bin 1204. Load cells or weight sensors (not shown) are configured under each bin 1204 to detect changes in weight in each bin 1204 as products are removed. This weight change in combination with the imaging described above ensures accurate determination of the products removed from the automatic retail device 100. The load cells are preferable removable and configurable on the shelf 104 or on the bottom of a bin 1204 depending on the product being sold in a particular bin. As will be appreciated, the load cells are in electrical communication with the computing device 202.
Each bin 1204 includes at least one spring driven pusher 1206. The pushers 1206 may be ganged together for a given bin 1204 to move larger or heavier products. Alternatively, the pushers may be sized for smaller products of which there may be larger numbers. As one example, a single pusher 1206 may be sized to receive cans of soda or bags of potato chips. A multiple pusher 1206 bin 1204 may include two or three pushers 1206 to effectively push an item in a larger box or having a greater weight, for example a Bluetooth speaker or other electronic device. Alternatively, the smaller pushers 1206 may be sized to advance smaller items such as lip stick, nail polish, and other smaller sized items. As will be appreciated the spring for driving the pusher 1206, which may be a coil spring that uncoils to advance the pusher 1206, may be sized in differing spring strengths so that it is strong enough to advance all the products remaining in a bin when one is removed, yet also does not crush the products.
The pusher 1206 rides on a track 1208. The track 1208 may be for example a T-track or another shape and mates with bearing (not shown) formed on the bottom or the pusher 1206 to secure the pusher to the track 1208 in the bin 1204 and allow the pusher 1206 to freely move along the track 1208. The bearing may be formed of an acetal Homopolymer, a hard plastic, or a high-density poly Ethelene. The bearing may be shaped to receive the track 1208 and slide along the track 1208 or may be shaped as rollers to roll along the track 1208. The track 1208 may be coated (e.g., powder coated) to substantially eliminate friction between the bearing and the track 1208. The combination of the materials of the bearing and the powder coating of the track 1208 results in a form of linear bearing for the pusher 1206 to traverse as it is advancing products in the bin 1204.
As will be appreciated, in instances where two or more pushers 1206 are to be employed for a given product, this will necessarily require two or more tracks 1208 and the related bearings. In addition, the number and spacing of the shelves 104 within the enclosure of the automatic retail device is also configurable. Thus, where a tall product is to be placed in a bin 1204, the shelf 104 above that tall item may be spaced to accommodate the size and shape of the product. As can be seen with reference to
With reference to
In one aspect of the disclosure, the UV-C lamps 1210 are triggered following the closure and locking of the door 102 of the automatic retail device 100. Between the angle at which the UV-C lamps are placed at and the glass of the door 102 (through which the UV-C light does not pass) users and passersby of the automatic retail device 100 are generally protected from exposure to the UV-C light. The UV-C light kills 99% of the pathogens in the automatic retail device 100.
Though described elsewhere herein, another aspect of the disclosure is directed to the use of QR codes. In one aspect of the disclosure, dynamic QR codes may be displayed on a display screen 128 on the automatic retail device 100. The QR code, when displayed can be scanned with a user's smartphone operating an application as described above. Where the person scanning the QR code is an authorized user, the interconnection between the application and the automatic retail device 100 results in a communication that authorizes the door 102 to open. This may be particularly useful where a user does not want to use the thumbprint biometric code and to engage in a contactless transaction.
Following scanning of the QR code, opening of the automatic retail device 100, and subsequent closure, a new QR code generated and displayed on the display screen 128 ready for the next person approaching the automatic retail device 100. By dynamically generating the QR codes and making the codes one-time use or very limited use, spoofing of the QR codes becomes near too impossible.
It should be understood that various aspects disclosed herein may be combined in different combinations than the combinations specifically presented in the description and accompanying drawings. It should also be understood that, depending on the example, certain acts or events of any of the processes or methods described herein may be performed in a different sequence, may be added, merged, or left out altogether (e.g., all described acts or events may not be necessary to carry out the techniques). In addition, while certain aspects of this disclosure are described as being performed by a single module or unit for purposes of clarity, it should be understood that the techniques of this disclosure may be performed by a combination of units or modules associated with, for example, a medical device.
In one or more examples, the described techniques may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored as one or more instructions or code on a computer-readable medium and executed by a hardware-based processing unit. Computer-readable media may include non-transitory computer-readable media, which corresponds to a tangible medium such as data storage media (e.g., RAM, ROM, EEPROM, flash memory, or any other medium that can be used to store desired program code in the form of instructions or data structures and that can be accessed by a computer).
Instructions may be executed by one or more processors, such as one or more digital signal processors (DSPs), general purpose microprocessors, application specific integrated circuits (ASICs), field programmable logic arrays (FPGAs), or other equivalent integrated or discrete logic circuitry. Accordingly, the term “processor” as used herein may refer to any of the foregoing structure or any other physical structure suitable for implementation of the described techniques. Also, the techniques could be fully implemented in one or more circuits or logic elements.
This application claims priority to U.S. Provisional Application No. 63/092,843 entitled COMPUTER VISION, FRAUD PROTECTION AND SANITIZATION SYSTEMS filed Oct. 16, 2020, U.S. Provisional Application No. 63/137,480 entitled FACIAL RECOGNITION AND BIOMETRIC PAYMENTS filed Jan. 14, 2021, and U.S. Provisional Application 63/171,958 entitled FACIAL RECOGNITION AND SECURITY DEVICE filed Apr. 7, 2021, the entire contents of each of which are incorporated herein by reference.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2021/055260 | 10/15/2021 | WO |
Number | Date | Country | |
---|---|---|---|
63171958 | Apr 2021 | US | |
63137480 | Jan 2021 | US | |
63092843 | Oct 2020 | US |