Abstract:
A security tag is shown for location upon an article and removal from the article upon receiving authorisation. An internal processor (303) is arranged to transmit an output signal to an external processor indicating that a customer has identified an interest in an article. A physical switch (103) is operated to initiate a procedure for purchasing the article and releasing the tag. The tag transmits an output signal to initiate a release procedure and then receives an input signal to effect a release. The output signal is received by a mobile device and the mobile device interacts with an administration system directly to effect the purchase of the item prior to the administration system issuing the input signal. After receiving the input signal, actual release is only achieved after a further manual operation being performed by the user.
Abstract:
The present disclosure is directed to systems and methods for generating investigations of user behavior. In an example embodiment, the system includes a video camera configured to capture video of user activity, a video analytic module to perform real-time video processing of the captured video to generate non-video data from video, and a computer configured to receive the video and the non-video data from the video camera. The computer includes a video analytics module configured to analyze one of video and non-video data to identify occurrences of particular user behavior, and an investigation generation module configured to generate an investigation containing at least one video sequence of the particular user behavior. In some embodiments, the investigation is generated in near real time. The particular user behavior may be defined as an action, an inaction, a movement, a plurality of event occurrences, a temporal event and/or an externally-generated event.
Abstract:
A security module for monitoring the status of an article subject to tampering such as a point-of- sale terminal or pin pad, said module comprising: a casing; an electrical circuitry board disposed within said casing; at least one sensor selected from pressure sensors, current sensors, contact sensors, or the like which sense the presence of the article and alarm if the article is tampered with or removed, the electrical circuitry board comprising a set of relays which is in communication with; (i) a central security unit, (ii) at least one sensor in a closed monitoring loop of the module, wherein an alarm will be generated if any of the communications is disrupted or are tampered with.
Abstract:
In order to detect attempted theft, the time a shopping cart remains in the self-scanning zone is monitored. If a certain duration is not met between the time at which the region of the self-scanning register is entered and the exit is passed, an alarm is triggered.
Abstract:
A currency dispense and control system (CDCS) for securely dispensing paper currency in multiple modes: (1) an ATM system and (2) a currency control system that allows a merchant or merchant-approved employee to withdraw cash from the CDCS independent of a standard ATM electronic fund transfer (EFT) network. The CDCS may be on-site and implemented using standard ATM hardware or may be located remotely. The CDCS may also include one or more of the following functionalities: a duress dispensation system that allows the CDCS to activate an alarm and/or otherwise communicate with local police or security services during a robbery, a time-release system that effects a time-delayed dispensation functionality, and a user identification and authentication system for authenticating a user identity and determining eligibility of the user to access the currency control system.
Abstract:
A system and method for execution of financial and data transactions includes a point-of-sale device configured to execute a transaction in which at least one good or service is sold to an individual having a card with a storage medium encoding a card number. The transaction is completed after said point-of-sale device receives a data transmission authorizing said transaction. The point-of-sale device is configured to communicate via the Internet with a first computing system. The first computing system stores a set of instructions that cause the first computing system to evaluate the transaction to determine whether the transaction is to be authorized, and to send a transmission authorizing the transaction via the open network to said point-of-sale device.
Abstract:
A method, procedure and operational function of the business for inhibiting internal theft of items without inventory identifiers are provided. In one aspect, the method comprises receiving an item for sale at a POS terminal, wherein the item is missing an inventory identifier. After the item is received, a determination is made as to whether a description of the item is stored in an inventory system. If the item is not stored in the inventory system, the sale of the item is inhibited. Thereafter, the entry of identifying information in the POS terminal is requested such that the identifying information identifies the item such that the description of the item can be stored in the inventory system.
Abstract:
A method and system are provided for counting moving objects in a digital video stream. In contrast to known computationally-expensive methods, areas of motion are determined by threshold subtracting a current video frame from a short term average video scene. An object box surrounding an object is determined by threshold subtracting the current video frame from a long term average video scene. Coordinates of the moving object are identified by associating the area of motion with the object box, if it overlaps the area of motion, to define a moving object box. An event counter can be incremented when the moving object box is in a buffer zone in the current frame, and was in a detection zone in an earlier frame, and was initially detected in a buffer zone on the opposite side of the detection zone.
Abstract:
In a cash-handling point of sale (POS) environment, a method of fraud detection following a transaction, the method involving comparison of cash 5 actually held, represented as CASH data, with cash expected to be held, derived from POS data. The method comprises capturing and caching items of CASH data corresponding to the transaction, capturing and caching items of POS data relating to the transaction, determining the difference between the CASH data and the POS data, matching the difference with a known set of differences; and identifying an illegitimate transaction when the difference matches an item from the set.
Abstract:
Methods and systems are provided for displaying a fraud potential indicator graphical interface. In some embodiments, at least two fraud potential indicators may be displayed for at least two fraud potential detection techniques for business transactions. In some embodiments, fraud potential indicators may be used to rank the business transactions in order of fraud potential. Business transactions and their fraud potential indicators may be selected to display additional information about the business transaction or fraud potential indicator selected. For example, a fraud potential indicator may be selected to display information about the fraud potential detection technique that assessed the selected fraud potential indicator. In some embodiments, tabs may be selected to display additional information and/or organized lists of business transactions and fraud potential indicators.