The present invention generally relates to surveillance systems. Specifically, the present invention provides a method for utilizing transaction logs to improve checkout related theft prevention.
Surveillance systems today provide a whole new level of pro-active control and monitoring. Networked video surveillance technology not only offers superior loss prevention, but it can also be used to boost sales, improve staff and customer security, optimize store layouts, boost productivity, monitor flow control, and to improve many more key functions. Many such surveillance systems also allow for obtaining valuable asset tracking information therefore allowing for improved asset management.
For instance, long term mining of transaction logs and associating such logs with checker's identities can help systematically investigate checker specific variances therefore providing starting points for investigations of checker related fraud. Today, unfortunately, checkout and even more so, self-checkout related fraud are prime examples of the most critical problems relating to growing retail inventory shrinkage.
With increased volumes of shoppers and in-store employees, theft is growing at an alarming rate. In an attempt to detect such theft, many variations of in-store surveillance systems are implemented. Data gathered by such systems is often analyzed and, based on such analysis, further actions are determined. However, as of today no known solutions attack the problem of checkout related fraud comprehensively.
Thus, there exist a need for providing a method and a system for facilitating a checkout variance investigation, such method comprising generating a set of benchmark parameters during a cumulative learning process; normalizing such set of benchmark parameters; establishing a confidence time interval required for identifying normal variations; recording a particular checker's transactions during such time interval, and identifying transactions, recorded during such time interval that fail meeting the set of benchmark parameters.
The proposed solution to the existing problem of checkout related fraud detection provides a system and a method that require implementation of three major stages, i.e., learning and relearning, tuning and operation. All these stages will be discussed in greater detail below. It is, however, noted that said learning and relearning as well as tuning is performed as frequently as necessary, but it also depends on a particular store's environment and on cost of such learning/relearning and tuning.
In one embodiment there is a method for facilitating checkout variance investigation, the method comprising: generating a set of benchmark parameters during a cumulative learning process; normalizing the set of benchmark parameters, establishing a confidence time interval required for identifying normal variations; recording a particular checker's transactions during such confidence time interval, and identifying transactions, recorded during the time interval, that fail meeting the set of benchmark parameters.
In a second embodiment, there is a system for facilitating checkout variance investigation, the system comprising: at least one processing unit; memory operably associated with the at least one processing unit; a generating tool storable in memory and executable by the at least one processing unit, the generating tool configured to generate a set of benchmark parameters based on results of a cumulative learning process; a normalizing tool storable in memory and executable by the at least one processing unit, the normalizing tool configured to normalize the set of benchmark parameters; an establishing tool storable in memory and executable by the at least one processing unit, such establishing tool configured to establish a confidence time interval required for identifying normal variations; a recording tool storable in memory and executable by the at least one processing unit, the recording tool configured to record a particular checker's transactions during the confidence time interval, and an identifying tool storable in memory and executable by the at least one processing unit, such identifying tool configured to identify transactions, recorded during the confidence time interval, that fail meeting the set of benchmark parameters.
In a third embodiment, there is a computer-readable medium storing computer instructions, which when executed, enable a computer system to facilitate checkout variance investigation, the computer instructions comprising: generating a set of benchmark parameters during a cumulative learning process; normalizing the set of benchmark parameters, establishing a confidence time interval required for identifying normal variations; recording a particular checker's transactions during such confidence time interval, and identifying transactions, recorded during the time interval, that fail meeting the set of benchmark parameters.
In a fourth embodiment, there is a method for deploying a facilitating tool for facilitating checkout variance investigation, the method comprising: providing a computer infrastructure operable to: generate a set of benchmark parameters during a cumulative learning process; normalize such set of benchmark parameters, establish a confidence time interval required for identifying normal variations; record a particular checker's transactions during such confidence time interval, and identify transactions, recorded during the time interval, that fail meeting the set of benchmark parameters.
The drawings are not necessarily to scale. The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements.
Embodiments of this invention are directed to a method and a system for facilitating checkout variance investigation. In one embodiment such method comprises: generating a set of benchmark parameters during a cumulative learning process; normalizing the set of benchmark parameters, establishing a confidence time interval required for identifying normal variations; recording a particular checker's transactions during such confidence time interval, and identifying transactions, recorded during the time interval, that fail meeting the set of benchmark parameters.
In a second embodiment, there is a system for facilitating checkout variance investigation, the system comprising: at least one processing unit; memory operably associated with the at least one processing unit; a generating tool storable in memory and executable by the at least one processing unit, the generating tool configured to generate a set of benchmark parameters based on results of a cumulative learning process; a normalizing tool storable in memory and executable by the at least one processing unit, the normalizing tool configured to normalize the set of benchmark parameters; an establishing tool storable in memory and executable by the at least one processing unit, such establishing tool configured to establish a confidence time interval required for identifying normal variations; a recording tool storable in memory and executable by the at least one processing unit, the recording tool configured to record a particular checker's transactions during the confidence time interval, and an identifying tool storable in memory and executable by the at least one processing unit, such identifying tool configured to identify transactions, recorded during the confidence time interval, that fail meeting the set of benchmark parameters.
In a third embodiment, there is a computer-readable medium storing computer instructions, which when executed, enable a computer system to facilitate checkout variance investigation, the computer instructions comprising: generating a set of benchmark parameters during a cumulative learning process; normalizing the set of benchmark parameters, establishing a confidence time interval required for identifying normal variations; recording a particular checker's transactions during such confidence time interval, and identifying transactions, recorded during the time interval, that fail meeting the set of benchmark parameters.
In a fourth embodiment, there is a method for deploying a facilitating tool for facilitating checkout variance investigation, the method comprising: providing a computer infrastructure operable to: generate a set of benchmark parameters during a cumulative learning process; normalize such set of benchmark parameters, establish a confidence time interval required for identifying normal variations; record a particular checker's transactions during such confidence time interval, and identify transactions, recorded during the time interval, that fail meeting the set of benchmark parameters.
Computer system 104 is intended to represent any type of computer system that may be implemented in deploying/realizing the teachings recited herein. In this particular example, computer system 104 represents an illustrative system for detecting and deterring RFID tag related fraud using a color camera based appearance check. It should be understood that any other computers implemented under the present invention may have different components/software, but will perform similar functions. As shown, computer system 104 includes a processing unit 106 capable of analyzing video surveillance, and producing a usable output, e.g., compressed video and video meta-data. Also shown is memory 108 for storing a facilitating program 124, a bus 110, and device interfaces 112.
Computer system 104 is shown communicating with one or more image capture devices 122 that communicate with bus 110 via device interfaces 112.
Processing unit 106 collects and routes signals representing outputs from image capture devices 122 to facilitating program 124. The signals can be transmitted over a LAN and/or a WAN (e.g., T1, T3, 56 kb, X.25), broadband connections (ISDN, Frame Relay, ATM), wireless links (802.11, Bluetooth, etc.), and so on. In some embodiments, the video signals may be encrypted using, for example, trusted key-pair encryption. Different capture devices may transmit information using different communication pathways, such as Ethernet or wireless networks, direct serial or parallel connections, USB, Firewire®, Bluetooth®, or other proprietary interfaces. (Firewire is a registered trademark of Apple Computer, Inc. Bluetooth is a registered trademark of Bluetooth Special Interest Group (SIG)). In some embodiments, image capture devices 122 are capable of two-way communication, and thus can receive signals (to power up, to sound an alert, etc.) from facilitating program 124.
In general, processing unit 106 executes computer program code, such as program code for executing facilitating program 124, which is stored in memory 108 and/or storage system 116. While executing computer program code, processing unit 106 can read and/or write data to/from memory 108 and storage system 116. Storage system 116 stores video metadata generated by processing unit 106, as well as rules and attributes against which the metadata is compared to identify objects and attributes of objects present within scan area (not shown). Storage system 116 can include VCRs, DVRs, RAID arrays, USB hard drives, optical disk recorders, flash storage devices, image analysis devices, general purpose computers, video enhancement devices, de-interlacers, scalers, and/or other video or data processing and storage elements for storing and/or processing video. The video signals can be captured and stored in various analog and/or digital formats, including, but not limited to, Nation Television System Committee (NTSC), Phase Alternating Line (PAL), and Sequential Color with Memory (SECAM), uncompressed digital signals using DVI or HDMI connections, and/or compressed digital signals based on a common codec format (e.g., MPEG, MPEG2, MPEG4, or H.264).
Although not shown, computer system 104 could also include I/O interfaces that communicate with one or more external devices 118 that enable a user to interact with computer system 104 (e.g., a keyboard, a pointing device, a display, etc.).
Further, as shown in
In the preferred embodiment, as shown further in
In the one embodiment, the distance to each of the relevant KPI average vectors is calculated. Further, the distances from each SSA are added to produce a “D” variable. Thereafter, D is compared to a predefined threshold T. If D>T, the suspicion counter associated with the transaction is incremented at 503.
In another embodiment, said suspicion counters are accumulated over extended period of time. In such an embodiment, an alarm is generated when said suspicion counter of a checker is significantly larger than those of the other individuals.
While there has been shown and described what is considered to be preferred embodiments of the invention, it will, of course, be understood that various modifications and changes in form or detail could readily be made without departing from the spirit of the invention. It is therefore intended that the invention be not limited to the exact forms described and illustrated, but should be constructed to cover all modifications that may fall within the scope of the appended claims.
The invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
The invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus or device.
The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk read only memory (CD-ROM), compact disk read/write (CD-R/W), and DVD.
The system and method of the present disclosure may be implemented and run on a general-purpose computer or computer system. The computer system may be any type of known or will be known systems and may typically include a processor, memory device, a storage device, input/output devices, internal buses, and/or a communications interface for communicating with other computer systems in conjunction with communication hardware and software, etc.
The terms “computer system” and “computer network” as may be used in the present application may include a variety of combinations of fixed and/or portable computer hardware, software, peripherals, and storage devices. The computer system may include a plurality of individual components that are networked or otherwise linked to perform collaboratively, or may include one or more stand-alone components. The hardware and software components of the computer system of the present application may include and may be included within fixed and portable devices such as desktop, laptop, and server. A module may be a component of a device, software, program, or system that implements some “functionality”, which can be embodied as software, hardware, firmware, electronic circuitry, or etc.