US 12,169,971 B2
Method and apparatus for detecting suspicious activity using video analysis
Malay Kundu, Lexington, MA (US); Vikram Srinivasan, North Billerica, MA (US); Joshua Migdal, Wayland, MA (US); and Xiaowei Chen, Billerica, MA (US)
Assigned to NCR Voyix Corporation, Atlanta, GA (US)
Filed by NCR Voyix Corporation, Atlanta, GA (US)
Filed on Mar. 15, 2023, as Appl. No. 18/121,850.
Application 18/121,850 is a continuation of application No. 17/341,667, filed on Jun. 8, 2021, granted, now 11,676,387.
Application 17/341,667 is a continuation of application No. 16/932,233, filed on Jul. 17, 2020, granted, now 11,100,333.
Application 16/932,233 is a continuation of application No. 16/402,551, filed on May 3, 2019, granted, now 10,719,716.
Application 16/402,551 is a continuation of application No. 14/949,966, filed on Nov. 24, 2015, granted, now 10,318,818.
Application 14/949,966 is a continuation of application No. 14/485,848, filed on Sep. 15, 2014, granted, now 9,202,117.
Application 14/485,848 is a continuation of application No. 13/365,522, filed on Feb. 3, 2012, granted, now 8,833,653.
Application 13/365,522 is a continuation of application No. 12/625,046, filed on Nov. 24, 2009, granted, now 8,132,725.
Application 12/625,046 is a continuation of application No. 11/393,370, filed on Mar. 29, 2006, granted, now 7,631,808.
Application 11/393,370 is a continuation in part of application No. 11/157,127, filed on Jun. 20, 2005, granted, now 7,516,888.
Claims priority of provisional application 60/666,081, filed on Mar. 29, 2005.
Claims priority of provisional application 60/627,862, filed on Nov. 15, 2004.
Claims priority of provisional application 60/581,559, filed on Jun. 21, 2004.
Prior Publication US 2023/0215180 A1, Jul. 6, 2023
Int. Cl. G06Q 20/40 (2012.01); G06Q 20/00 (2012.01); G06Q 20/20 (2012.01); G06T 7/00 (2017.01); G06V 20/40 (2022.01); G06V 20/52 (2022.01); G07F 17/32 (2006.01); G07F 19/00 (2006.01); G07G 3/00 (2006.01); H04N 7/18 (2006.01); G08B 13/24 (2006.01)
CPC G06V 20/52 (2022.01) [G06Q 20/00 (2013.01); G06Q 20/20 (2013.01); G06Q 20/208 (2013.01); G06Q 20/4016 (2013.01); G06Q 20/403 (2013.01); G06T 7/00 (2013.01); G06V 20/41 (2022.01); G07F 17/3241 (2013.01); G07F 19/207 (2013.01); G07G 3/00 (2013.01); H04N 7/181 (2013.01); G06Q 20/206 (2013.01); G06T 2207/10016 (2013.01); G06T 2207/30232 (2013.01); G06V 20/44 (2022.01); G08B 13/246 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, by a server configured with a processor and memory, video captured by a camera of a transaction area during a transaction, wherein the video includes a time-stamped sequence of images capture customer and item interactions;
deriving, by the server, video details for the transaction from analysis of the video, wherein deriving includes tracking each item associated with the transaction as each item moves through regions within the transaction area based on visual cues and operator interactions with the items, wherein deriving further includes identifying each item based on unique visual characteristics and tracking spatial trajectory of each item through the regions within the transaction area;
obtaining, by the server, transaction details produced by a terminal during the transaction, wherein the transaction details include item identifiers and timestamps corresponding to scanning of items by the terminal; and
raising, by the server, an alert for suspicious activity during the transaction when the video details captured from the video do not comport with the transaction details, wherein the alert comprises capturing a video clip from the video associated with a given video item that is unaccounted for in the transaction details and forwarding the video clip and an alert notification to a security officer's terminal for immediate review, wherein the alert further comprises isolating a segment of the video where each discrepancy occurs and generating a discrepancy report that includes the time-stamped sequence of images for review.