With the emergence of eCommerce, global retailers are in a race to modernize the shopping experience. Historically on-line firms seek to play to their advantages, which include selection, convenience, and web-based analytics to overcome perceived weaknesses such as the high volume of returns, extreme comparison shopping, high-tech fraud, and the propensity of many customers to abandon purchases in the final stages. Similarly, historically store-based retailers seek to exploit their advantages of immediate gratification, merchandise interaction, and human relationships to counter eCommerce sales erosion, infrastructure costs, and inventory loss. Both are rapidly moving to integrate the best aspects of on-line and in-store shopping and over time these models will continue to converge, influenced by additional forces such as the rise of 5G networks and shifting population demographics. Tools that help integrate the on-line and in-store shopping experience will be central to realizing this transition.
Fueled by large on-line retailers like Amazon, retail analytics has become a significant global market segment, valued at $3 Billion in 2018 and expected to grow to over $8 billion by 2024. Typical products in the space might include chat bots for customer care, application of machine learning to Customer Relationship Management (CRM) data, machine vision for fraud prevention, and predictive just-in-time ordering to minimize inventory carrying costs. Within retail stores, machine vision might also be used to count total visitors, estimate “conversions”—sales to those customers—and predict interests based on an individual's movements within the store. The trajectory of individual customers through a store can be modeled through application of Kalman filtering, possibly aided by wireless inputs such as WiFi or BlueTooth.
Fusion of in-store data has been disrupted by rapid evolution of technology in this space. Additional security features on modern wireless handsets such as randomized MAC addresses has limited their value as a unique proxy for customer identity and the availability of higher-resolution cameras had enabled much more detailed but computationally intensive extraction of demographic detail. The rise of 5G technology with associated IoT protocols such as Zigbee promise more disruptions in the immediate future, with significant new opportunities being opened up for vertical (i.e., market-specific) integration between wireless operators and traditional retail solutions.
The present technology will now be described with reference to the figures, which in general relate to the generation of personal trait feature vectors using cameras or other sensors to sense physical attributes of one or more people. The feature vectors may then be analyzed using artificial intelligence algorithms to both define persona groups within which different feature vectors fit, and how well a given feature vector fits within a given persona group. This present technology enables the association of imagery-derived demographic information to a common individual to augment their purchasing history and understand their evolution of stylistic preferences over time.
This patent disclosure details an event-based marketing solution that leverages metadata available on modern 4G/5G cellular data networks to identify “visits” from repeat customers and enrich them with demographic details derived from video imagery analyzed in real-time using edge computing resources deployed remotely in the venue. This data can be used to understand visitor stylistic preferences, shopping patterns, and likely purchasing intentions which can in turn be utilized in the store to assist sales representatives and on-line to ensure the brand is offering the merchandise most desired by their most loyal customer base. Local image processing is intended to align with emerging consumer privacy regulations and control distribution of sensitive imagery, while also giving the customer the ability to review, edit and delete information as they see fit.
Advanced machine vision (MV) and image processing are central to this technology as they allow for isolation and extraction of key demographic features as well as on-going subject tracking despite occlusions and intermittent background interference. U.S. Provisional Patent Application No. 62/979,959, entitled “Machine Learning for Rapid Analysis of Image Data via Curated Customer Personas, filed Feb. 21, 2020 (“the '959 Application”) (incorporated by reference herein in its entirety), discloses feature vectors developed for each visitor that can then be analyzed in near real-time by mapping them to a family of vector templates referred to as “personas” which are tied to niche market segments, on-line style influencers, and key purchasing groups specific to the fashion and lifestyle market segments. The personas themselves are tied to specific inventory mix, historical revenue targets, and related business operation information, with customers generally mapped to multiple personas to increase diversity of product recommendations. The end result is to enable all sales staff to act as a brand ambassador at the highest level, with recommendation for their customers that are engaging, trendy, and revenue-maximizing for the retail operator.
Per the technology of this present disclosure, the mapping of customers to personas can become much more precise in the presence of accompanying signaling metadata from modern wireless data networks such as Wi-Fi, LTE, and 5G. A visitor's cell phone provides a reliable proxy indicating their presence, even if not tied directly to Personally Identifying Information (PII) such as phone number or email address. The 4G/5G signaling events of interest are generated as part of normal network operations carrying data traffic, especially when consumer devices transition between coverage modes such as from the macro radio network to a 4G or 5G “small cell” with a relatively constrained coverage area. The solution disclosed here relies on the conversion of these signaling events to external notifications via a SCEF (Service Capability Exposure Function) node or similar implementation intended for this purpose and may be dedicated or segregated by retail-enterprise per a practice referred to as 5G network slicing. WiFi-based detection events can fulfill a similar role in simplifying visual feature vector association process, though with some loss of detection fidelity and consistency. Macro network reports can also be used with a high degree of success, as long as supplemental location data with an error estimate is also provided to suggest the user is within the area of interest.
After as few as one or two visits, the algorithm assigning visitor to representative personas can almost invariably assign a “persona of one” that ties the individual—identified by parametric facial model or “Face ID”—to their cell phone metadata, along with a series of fashion models that reflect how their fashion expression has changed over time. With opt-in, this persona can be further enriched with information from the customers retention account, such as purchase history, loyalty discounts, and accumulated blockchain tokens. Identification of significant changes in this ephemeral alignment of account metadata can also be a highly accurate indicator of potential fraud.
Consider a representative retail environment, as shown in
Also assume that this retail environment is equipped with a retail video analytics solution as disclosed in the '959 application. That is, as guests enter and leave the covered area their imagery is captured on video, the video is sampled to produce the best representative still images, and these images are subjected to deep learning algorithms to develop a vector of information Fya related to each visitor's facial features, demographic attributes, and expressed fashion aesthetic. In embodiments, these feature vectors have high dimensionality (>300 elements), but can readily be subjected to dimension-reducing weighted scoring techniques to obtain a smaller number of aggregated parameters. By generalizing all facial parameters into one weighted score, and by compressing other demographic detail into a second weighted score, then the results of this machine vision application can be plotted, as shown in
Valuable insights can be derived in a computationally efficient manner by subjecting this feature vector data to persona-based analysis, as summarized in
Several points specific to
1. The number of personas defined is arbitrary. Indeed, per the '959 application, this base is actively curated to minimize error between the observed customer base and persona-based representation.
2. The personas themselves represent economically significant groups of customers specific to the fashion and lifestyle market categories. Smaller groups are usually more accurate, but also less economically significant.
3. The number and shape of personas is expected to shift over time.
4. Each person by design is associated with multiple personas with varying weight.
In some cases, though, it is beneficial to extend this persona concept down to single individuals. This allows, for example, for the association of loyalty account information to that persona along with purchase history. Any specific needs and interests can be readily communicated to sales staff through such a persona, and anomalies can be flagged as potential indicators of fraud. This introduction of a reliable “persona of one” is a focus of this present disclosure.
Consider the novel implementation of a wireless retail sensor 450 as shown in
The information exchanged between the SCEF/NCE and the external AS can vary, but at least would include a unique identifier for each UE detected, an identifier for the small cell involved, and a timestamp indicating when the device was detected. In addition, certain carriers might allow for the exchange of a token that would enable limited 2-way interaction with the customer via their UE, limited to the coverage area of specific small cells and potentially requiring a customer opt-in. Related enrichments might also be available from the carrier such as current customer service subscriptions, geolocation of the device within the coverage umbrella of approved cells, and relevant device capabilities. Detection events may incur some lag before being relayed to the AS, as this presence-signaling mechanism is intended to have very low system impact compared to other location-sensing approaches. However, it is assumed that any latency is short relative the dwell time of a customer within a given store, and the event itself is correctly time stamped to the actual time of arrival or departure. Any personally-identifying telecom information such as phone number would be hashed in the manner consistent with U.S. patent application Ser. No. 16/677,244, entitled “System and Method for Enriching Consumer Management Records Using Hashed Mobile Signaling Data,” filed Nov. 7, 2019 (“the '244 Application”), which application is incorporated by reference herein in its entirety. Per this disclosure, the feature vector Fya assigned to each customer observed in a given venue will be automatically enriched with the identifying information of all User Equipment (UE) detected in the store at that time. Given the dwell time of a given customer would nominally be in the range of minutes to tens of minutes, the number of vectors enriched with a particular UE ID can be expected to be much smaller than the universe of all vectors created over a relevant business interval, as illustrated in
Intuitively, this persona associated with UEa will have limited value at identifying a single individual based on a single visit. Indeed, an arbitrary number of vectors might have been clustered into its initial formulation and potentially with very contrasting demographics scores based on machine-vision based analysis. Further, some UE detections might be spurious and not related to anyone in the store at all. Because of this, feature vectors will be carried forward individually and not combined or aggregated until additional filtering can be accomplished to identify vectors showing a significant level of intrinsic alignment. The persona for UEa, then, rather than featuring a blended mix of all the relevant feature vectors, will instead be comprised of a cluster of potentially-related feature vectors pending further data to reveal the “real” owner of UEa.
Per the present technology, the residual ambiguity regarding the likely owner of UEa can be resolved rapidly based on subsequent visits, with probability of reliable identification only increasing over time based on additional data points.
On subsequent visits, the customer associated to Persona UEa will be reliably assigned to this persona as well as to other potentially relevant personas, consistent with this innovative persona-based marketing solution. Further, this association can be manually verified at the checkout stand by a sales associate or via high-res imagery at a self-service kiosk, enabling linking to the appropriate loyalty account with appropriate opt-in. Purchase history, browsing history, and similar information can then be utilized to further enhance fashion and lifestyle recommendations. Further, per the disclosure in the '959 application, each detection event will include a summary of specific fashion items that the customer has worn on previous visits. This can provide information specific to the evolution of a visitor's style, habits and preferences without resorting to disruptive style quizzes or costly-ship-and-return schemes.
Exemplary Implementation
An exemplary implementation of this solution utilizing an LTE femto cell deployment as shown in
The MME in this exemplary implementation generates a trigger record for each of the following events per subscriber:
In response to reach detected event, the MME sends the following parameters to ETC for each subscriber:
It is the function of the ETC to perform secure hashing of the carrier event data and also to provide an Application Programming Interface (API) allowing trusted Application Servers to subscribe to network event updates for approved eNodeBs.
An individual UE update for this exemplary solution is shown in
In this implementation, sensor-generated events are aggregated at a cloud network element referred to as the Event Triggering Server (ETS) 806. These events are then stored in a Virtual Subscriber Data Base (VSDB) 808 which also includes the feature vectors derived from on-site video analysis. This is illustrated in
In general, the role of the ETS in this disclosure is to compare in near real-time the stream of UE detection events to the database of machine vision-derived feature vectors in an attempt to create “merged” database entries that can form the basis for UE-confirmed personas specific to an individual or small group. The handling of cellular events by the ETS is illustrated in
Per
Receipt of a new Face ID will result in a similar processing at the ETS. The system will first attempt to confirm whether the Face ID matches closely with any of the existing customerID profiles. For close alignments, the system will queue up this identification for imminent confirmation by the sensor. Once received the marketing system disclosed here can proceed with a high degree of confidence that the visitor has been identified. Assuming no confirmed match with the customerID database the ETS will next search the database of all Face IDs searching for a likely match. If successful this detection event will be linked to the same Face ID record with a weighting based on measured alignment, with multiple possible associations possible. If no similarly-aligned Face ID is detected then a new Face ID is created to await further enrichment.
The procedure to create UE-based personas is summarized in
The process of aligning timestamps between Device IDs and Face IDs is a challenging aspect of this exemplary disclosure, given that some detection events can be missed for various technical reasons, and busy store environments can create ambiguity regarding the arrival and departure times of a given visitor given the relatively light focus on precise in-store stacking in this exemplary implementation. Given the relative sensitivity associated with tying a UE-gated Persona to a given individual, a very low threshold of uncertainty is allowed before the detection alignment is rejected. In this situation, subsequent visits may be required to finally establish the firm association between a given customer, their visual characteristics, and the more personally identifying information in their loyalty account.
In one aspect of this invention, no PII data is stored as part of the persona-based marketing solution itself. This connection can be readily established between the UE-based persona and other customer data stored in a conventional Customer Relationship Management system.
In another aspect, even a customer is a UE-linked persona will still benefit from the other aspects of this solution, such as fashion suggestions emulating certain fashion icons, or popular outfits being worn by others to social events.
In another aspect, specific fashion information related to each visit will be maintained within the UE-confirmed persona, including in some cases specific items the visitor was wearing. The ability to understand and build on to evolution of a given visitor's fashion aesthetic over time is a unique aspect of this solution.
In another aspect, the separation of UE from individual owner is will cause a disruption in the system. While this type disruption can certainly be related to predictable events such as a phone upgrade or shared usage of a given device, this information can also be exploited to highlight potential fraud. A common use case would be the absence of a given Face ID for a specific custom that tries to access a specific loyalty account, or use a credit card that has been used in a past by a customer with a known Face ID. These purchases can be discretely denied or another form of payment requested.
In another aspect, the data being collected by this persona-based marketing system is directly controlled by the retailer, as opposed to data purchased from over-the-top app providers such as Google. This allows for the retailers to extend to their customers the courtesy of reviewing, editing, or deleting the data in their profile that they find objectionable.
In another aspect, some UE-linked personas might exhibit ongoing noise or other symptoms of poor data alignment. This might be an indicator of an errant association or other special cause such as individuals that consistently visit in groups or individuals that take deliberate steps to dramatically change their appearance from time to time. For this reason, “noisy” personas may be kept in isolation from other enrichment data, but could still serve as valuable indicators of special factors bearing on the success of a given retail operation.
In another aspect, the Device ID database itself can serve as a valuable source of economically valuable data, including estimating total traffic through a store, dwell time per customer, anonymized location, and approximate quadrant most frequented by the customer during their visit. Effectiveness of marketing campaigns can be measured in part by the impact on foot traffic into the store and net increase in dwell time. If supported by the carrier, two-way messages can be shared with the customer regarding sales, personalized discounts, and similar proximity relevant benefits.
In another aspect, one or a plurality of macro coverage cell sites can provide functionality analogous to one or a plurality of store-based femtocells. In this realization, anonymized location is expected from the carrier to refine the position of the device within the envelope of the macrocell, along with a parameter indicating the relative accuracy of that positioning data. On public networks it is expected that the resolution of location data will be algorithmically adjusted by the carrier such that many end-devices are contained within the reporting error ellipse of any given device. This concept of Elastic Density-Based Reporting (EDBR) is intended to protect consumer privacy by ensuring the location of a given subscriber is co-mingled with at least x other subscribers to prevent direction attribution and may be tunable based on multiple parameters such as observed subscriber density, cell site ID, time-of-day, etc. Devices outside the retail target area or potentially at prolonged rest should be phased out of EDBR reporting data to mitigate reporting on users that may be at work, home, or a similarly private location. At scale, this solution can be used to monitor traffic patterns through multiple stores or through an entire defined geographic area, with individual traces identified only by hashed ID consistent with the details shared in the '244 application and with location accuracy controlled by EDBR to protect customer privacy. Alternately, the path of individual devices through this area can be sampled or historically researched based on secure sharing of the hashedID. This would involve the use of two distinct hash keys: a “reference hash” known to both the external researcher and the carrier, and “carrier hash” known only to the carrier. The reference hash would be used only to confirm a customer of interest (with both parties deriving the hash independently), while the second carrier hash is used to securely share handset data as with the femtocell case. As previously disclosed, coincident video profiles would be required to create actual marketing personas based on these presence events.
In another aspect, the Face ID database can serve as a valuable source of operational data, including estimating total traffic through a store, dwell time per customer, and approximate quadrant most frequented by the customer during their visit. Effectiveness of marketing campaigns can be measured in part by the impact on foot traffic into the store and net increase in dwell time.
In another aspect, WiFi detections can be used to play a similar role as LTE femto cells to provide detection events. WiFi detections, however will tend to be less consistent and may involve the use of anonymized MAC addresses so will generally result in “noisy” personas. However these personas can still contribute significant economic value in the context of this overall persona-based machine vision solution.
The foregoing detailed description of the technology has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the technology to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the technology and its practical application to thereby enable others skilled in the art to best utilize the technology in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the technology be defined by the claims appended hereto.
The present application claims priority to U.S. Provisional Patent Application No. 63/004,208, filed on Apr. 2, 2020, entitled “SYSTEM AND METHOD FOR CREATING PER-CUSTOMER MACHINE VISION PERSONAS BASED ON MOBILE NETWORK METADATA,” U.S. Provisional Patent Application No. 63/005,035, filed on Apr. 3, 2020, entitled “SYSTEM AND METHOD FOR CREATING PER-CUSTOMER MACHINE VISION PERSONAS BASED ON MOBILE NETWORK METADATA,” and U.S. Provisional Patent Application No. 63/007,819, filed on Apr. 9, 2020, entitled “SYSTEM AND METHOD FOR CREATING PER-CUSTOMER MACHINE VISION PERSONAS BASED ON MOBILE NETWORK METADATA,” which applications are incorporated by reference herein in their entirety.
Number | Date | Country | |
---|---|---|---|
63004208 | Apr 2020 | US | |
63005035 | Apr 2020 | US | |
63007819 | Apr 2020 | US |