Patents by Inventor Christopher John Costello

Christopher John Costello has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220103736
    Abstract: A ratio associated with capture of image frames by cameras of a scanner during short exposure mode and long exposure mode is configurable for scanner operation. Moreover, camera activation signals for the cameras are controlled during long exposure mode of the cameras to reduce illumination by illumination sources of the scanner during the long exposure mode of the cameras.
    Type: Application
    Filed: September 29, 2020
    Publication date: March 31, 2022
    Inventors: Christopher John Costello, Vreeland Phillip Tharp
  • Publication number: 20220092496
    Abstract: Individuals are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras. Transaction information associated with transactions being processed by a transaction system of the establishment are monitored. The actions, behaviors, transaction information, and establishment processes are correlated to process controls of the establishment and logged in an audit log. Non-compliant actions, behaviors, or transaction information with respect to the process controls generate real-time alerts, real-time assistance for compliance by any offending individual, and/or remedial training for compliance of the offending individual.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 11275916
    Abstract: Processor utilization for a combined transaction terminal and scanner device is controlled during item code image capture, item code reading, and/or read item code communications. Item image capture rates, item image frame reads, and read item code communications are controlled to override preconfigured processing and to reduce processor utilization on the device. This frees up processor capacity for performing other operations during transactions on the device.
    Type: Grant
    Filed: August 28, 2020
    Date of Patent: March 15, 2022
    Assignee: NCR Corporation
    Inventors: Christopher John Costello, Si Ha, Steve Pixton
  • Publication number: 20220076365
    Abstract: Zones a defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.
    Type: Application
    Filed: November 19, 2021
    Publication date: March 10, 2022
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Publication number: 20220067321
    Abstract: Processor utilization for a combined transaction terminal and scanner device is controlled during item code image capture, item code reading, and/or read item code communications. Item image capture rates, item image frame reads, and read item code communications are controlled to override preconfigured processing and to reduce processor utilization on the device. This frees up processor capacity for performing other operations during transactions on the device.
    Type: Application
    Filed: August 28, 2020
    Publication date: March 3, 2022
    Inventors: Christopher John Costello, Si Ha, Steve Pixton
  • Patent number: 11238554
    Abstract: Zones are defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: February 1, 2022
    Assignee: NCR Corporation
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Patent number: 11080976
    Abstract: A terminal includes an item scanner. The item scanner determines whether an item that passes within a field of view of the scanner during a transaction has a properly noted barcode recorded for the transaction. When the item fails to have a properly noted barcode an alert is raised in real time for assistance and/or investigation of the transaction.
    Type: Grant
    Filed: June 15, 2017
    Date of Patent: August 3, 2021
    Assignee: NCR Corporation
    Inventors: Christopher John Costello, John Crooks
  • Publication number: 20210158465
    Abstract: Zones a defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.
    Type: Application
    Filed: December 23, 2019
    Publication date: May 27, 2021
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Publication number: 20210158675
    Abstract: A first device is detected within a geofenced area of an establishment. A second device is determined to be within the geofenced area. A first individual associated with the first device is instructed to enter the establishment and complete a first portion of opening security procedures associated with an opening of the establishment. Upon completion of the first portion, a second individual associated with the second device is instructed to enter the establishment for a second portion of the opening security procedures. The first individual and the second individual are monitored through video feeds during the first portion and the second portion of the opening security procedures for compliance with the opening security procedures.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Publication number: 20210160287
    Abstract: Security video is captured when one or more individuals are detected as entering a secure area. Actions of the one or more individuals are monitored based on security policies associated with the secure area. Identifiers for the one or more individuals and action identifiers for the actions are recorded in a security log while the one or more individuals remain in the secure area. The security video is stopped when the individuals are detected as exiting the secure area. The security video is linked to entries recorded in the security log. In an embodiment, when a non-compliant action is detected from the actions based on the security policies, a real-time alert is raised, and/or the security video is streamed in real time to a security monitor.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Christopher John Costello, Matthew Robert Burris, Gregory Joseph Hartl, Sudip Rahman Khan
  • Publication number: 20210158542
    Abstract: An asset is identified in a predefined area. The type of asset is identified through video or wireless tag identification. A security policy associated with the type of asset is obtained. Entries in an asset log are recorded based on a location of the asset, an individual handling the asset, and/or actions taken by an individual with respect to the asset based on the security policy. A real-time notification is sent when the location, the handling, and/or any of the actions warrant a notification based on the security policy.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210158055
    Abstract: Individuals, business transactions, and business activities are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras, sensor data captured by sensors, and information captured by transaction systems. Transaction/activity information associated with transactions/activities being processed by a transaction system of the establishment or performed by individuals within the establishment are monitored. The actions, behaviors, transaction information, activity information, and establishment processes are correlated to process controls, policies, and procedures of the establishment and logged. Non-compliant actions, behaviors, transaction information, activity information, and/or transaction/activity thresholds generate real-time remedial actions, such as audits, training, and notifications.
    Type: Application
    Filed: January 28, 2020
    Publication date: May 27, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210158240
    Abstract: Individuals are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras. Transaction information associated with transactions being processed by a transaction system of the establishment are monitored. The actions, behaviors, transaction information, and establishment processes are correlated to process controls of the establishment and logged in an audit log. Non-compliant actions, behaviors, or transaction information with respect to the process controls generate real-time alerts, real-time assistance for compliance by any offending individual, and/or remedial training for compliance of the offending individual.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 10984834
    Abstract: A dual-control security procedure is initiated, and a first person is identified for the procedure. The first person is authenticated and a remote agent that is remotely located is requested to participate in the procedure. Actions/behaviors of at least the first person are monitored from the video in accordance with the procedure and provided in real-time to the remote agent. An audit log is written to upon the conclusion of the procedure. The audit log at least comprising: identifiers for the first person and the remote agent, a procedure identifier for the procedure, an asset/area identifier associated with the procedure, a zone identifier for a location within an establishment, action identifiers for the actions, behavior identifiers for the behaviors, violation identifiers for any violations detected during the procedure, and a link to a video clip from the video that corresponds to at least the first person performing the procedure.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: April 20, 2021
    Assignee: NCR Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210097542
    Abstract: A user is identified within an establishment. An identity associated with an account of the user with the establishment is determined. Various transactions of the user are monitored. Moreover, actions and behaviors of the user are monitored through video. A current perceived state of the user is calculated based on the monitoring of the various transactions, actions, and behaviors. The state is compared to a threshold value and a response action is automatically processed based on one or more rules. In an embodiment, custom logs are retained for a period of time that the user was in the establishment and custom aggregations of the logs are sent to one or more external systems.
    Type: Application
    Filed: November 26, 2019
    Publication date: April 1, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210097299
    Abstract: An identity of a customer within an establishment is authenticated using a variety of captured biometric features obtained from sensors and/or video. Video capturing movements/interactions of the customer is analyzed in real time to identify the customer's behavior and actions. Any staff of the establishment who interact with the customer are identified from the video. Transaction data and other data retained for the customer by the establishment are aggregated and linked with the video and the customer identity. The linked data is analyzed in combination with the customer behavior and actions to determine responses within the establishment to customer-initiated transactions. In an embodiment, the customer is authorized to perform at least one transaction within the establishment based on the authenticated identity and linked data without a presentation by the customer of an identification card, a Personal Identification Number (PIN), a password and/or verification by a staff member.
    Type: Application
    Filed: January 28, 2020
    Publication date: April 1, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210056316
    Abstract: Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.
    Type: Application
    Filed: November 9, 2020
    Publication date: February 25, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 10929675
    Abstract: Decentralized cameras perform video tracking on captured video. The cameras produce metadata representing tracking of objects from the captured video. The metadata is passed between the cameras as the object moves within the captured video. Final metadata from at least one of the cameras is sent to a server, the server processes the final metadata to produce a summary of the object tracking and process one or more automated actions based on the summary.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: February 23, 2021
    Assignee: NCR Corporation
    Inventors: Christopher John Costello, Sik Piu Kwan
  • Patent number: 10867187
    Abstract: Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: December 15, 2020
    Assignee: NCR Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20200327910
    Abstract: A dual-control security procedure is initiated, and a first person is identified for the procedure. The first person is authenticated and a remote agent that is remotely located is requested to participate in the procedure. Actions/behaviors of at least the first person are monitored from the video in accordance with the procedure and provided in real-time to the remote agent. An audit log is written to upon the conclusion of the procedure. The audit log at least comprising: identifiers for the first person and the remote agent, a procedure identifier for the procedure, an asset/area identifier associated with the procedure, a zone identifier for a location within an establishment, action identifiers for the actions, behavior identifiers for the behaviors, violation identifiers for any violations detected during the procedure, and a link to a video clip from the video that corresponds to at least the first person performing the procedure.
    Type: Application
    Filed: January 28, 2020
    Publication date: October 15, 2020
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl