The present disclosure generally relates to retail security. In particular, the present disclosure relates to a monitoring system and method based on information prior to the point of sale.
To operate a successful retail business, you have to create a secure environment to avoid retail shrinkage. Retail shrinkage is a costly problem. A significant portion of the loss due to retail shrinkage occurs through shoplifting and sweethearting. Sweethearting is a collusion between the cashier and shopper to defraud the store by ringing up a lower cost item. Many attempts have been made to address shoplifting and sweethearting, most notably closed-circuit TV, store detectives, and tagged inventory. However, conventional approaches rely on an operator to constantly observe transactions. There is a need for a way to automatically capture information about a shopper's location and behavior prior to approaching the check-out counter, so that shoplifting and sweethearting at the point of sale can be detected more efficiently and effectively.
The present disclosure is directed to a monitoring system and method that satisfy these and other needs.
One aspect is a monitoring system comprising a tracking mechanism and a processor. The tracking mechanism tracks a shopper and merchandise as the shopper is shopping and generates a list of currently acquired items. The processor compares the list of currently acquired items to a list of purchased items that are generated at a point of sale and provides any discrepancies. In one embodiment, the tracking mechanism comprises an object tracking component, a shopper tracking component, and a behavior recognition component. The object tracking component tracks the merchandise. The shopper tracking component tracks shoppers and other people. The behavior recognition component analyzes tracking information from the object tracking component and the shopper tracking component to determine acquisition events. In another embodiment, the monitoring system further comprises a storage device. The storage device stores the list of currently acquired items and a history.
Another aspect is a monitoring method. Location information and behavior information about a shopper as the shopper is shopping is analyzed to generate a list of acquired items. A list of purchased items is generated at a point of sale. The list of acquired items is compared to the list of purchased items. Any discrepancies between the list of acquired items and the list of purchased items is provided. In one embodiment, the list of acquired items and the location information having known merchandise locations is compared and any discrepancies are provided. In another embodiment the location information and the behavior information about the shopper is gathered. In another embodiment, a history of location information, behavior information, and acquired items is stored.
Another aspect is a computer readable medium having instructions for performing a monitoring method. Tracking information about at least one shopper is gathered substantially continuously from a point of entry into a shop. A list of acquired items for the shopper is generated. At a point of sale, scanning is performed that generates a list of purchased items for the shopper. The list of acquired items and the list of purchased items are compared and any discrepancies are provided. In one embodiment, A history for the shopper is stored. In another embodiment, information is gathered about the shopper over a plurality of shopping trips. In another embodiment, generating the list of acquired items for the shopper is performed by analyzing the tracking information to recognize acquisition events.
These and other features, aspects, and advantages of the present disclosure will become better understood with reference to the following description, appended claims, and drawings where:
Tracking mechanism 100 is any kind of mechanism, such as video surveillance systems, RFID systems, or combinations of systems. Tracking mechanism 100 has an object tracking component 104, a shopper tracking component 106, and a behavior recognition component 108. Object tracking component 104 tracks merchandise and other objects. Examples of object tracking component 104 include RFID systems and video surveillance systems. Shopper tracking component 106 tracks shoppers and other people. One example of shopper tracking component 106 is a video surveillance system. Behavior recognition component 108 analyzes tracking information to determine acquisition events and other events. Behavior recognition component 108 reduces a shopper's actions to a set of primitives used to recognize events. Some examples of events are motion towards a piece of merchandise, stopping at a certain location, picking up merchandise, putting merchandise in a cart, opening merchandise and taking something out of it, putting down merchandise, and the like. In some embodiments, tracking mechanism 100 includes a storage device, such as a database for storing tracking information and other data for monitoring system 10.
A list of currently acquired items 110 is generated by tracking mechanism 100. As a shopper is shopping, list of currently acquired items 110 is generated, stored, and updated based on acquisition events. Alerts may also be created automatically based on list of currently acquired items 110 to people, such as those monitoring closed circuit TV or managers.
Processor 102 is any type of processor, such as a personal computer (PC) a server, bar scanning system, a cash register or combination of devices. Processor 102 generates a list of purchased items 112 at the point of sale or checkout.
List of purchased items 112 is compared to list of currently acquired items 110 and any discrepancies are provided. Discrepancies include things that the shopper paid for but were not detected as acquired items, things that the shopper acquired but did not purchase, and things acquired but not detected as purchased. Other categories are also contemplated. Some retailers are hesitant to directly approach customers with what amounts to an accusation of theft, so sometimes additional analysis is performed or additional information is gathered over a plurality of shopping trips. If a retailer learns that certain people are habitually in the category of having things they picked up and did not pay for, they may be invited to not to shop at the store anymore. Also, employees may be monitored for sweethearting.
The technical effect is automatically capturing information about a shopper's location and behavior prior to approaching the check-out counter, so that shoplifting and sweethearting at the point of sale can be detected more efficiently and effectively than conventional systems and methods.
In some embodiments, location and behavior information is gathered by parts of monitoring system 10, such as an RFID system or a video surveillance system as the shopper is shopping. This information may be gathered periodically, substantially continuously, and cumulatively. In some embodiments, a history of location information, behavior information, and acquired items is created. The history for each shopper is created and maintained for use during this shopping trip, future use, or any other use. For example, it would be suspicious if the shopper never walked down the isle where light bulbs are located, but a light bulb is detected at the point of sale while more expensive merchandise was determined to be acquired by the shopper earlier.
It is to be understood that the above description is intended to be illustrative and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description, such as adaptations of the present disclosure to access control systems, or other kinds of security systems. Behaviors other than shoplifting and sweethearting may be detected, such as vandalism or theft. Various designs using hardware, software, and firmware are contemplated by the present disclosure, even though some minor elements would need to change to better support the environments common to such systems and methods. The present disclosure has applicability to fields outside retail shops, such as airports, offices, and other kinds of facilities needing security. Therefore, the scope of the present disclosure should be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.