Patents by Inventor John Costello

John Costello has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11080976
    Abstract: A terminal includes an item scanner. The item scanner determines whether an item that passes within a field of view of the scanner during a transaction has a properly noted barcode recorded for the transaction. When the item fails to have a properly noted barcode an alert is raised in real time for assistance and/or investigation of the transaction.
    Type: Grant
    Filed: June 15, 2017
    Date of Patent: August 3, 2021
    Assignee: NCR Corporation
    Inventors: Christopher John Costello, John Crooks
  • Publication number: 20210158465
    Abstract: Zones a defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.
    Type: Application
    Filed: December 23, 2019
    Publication date: May 27, 2021
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Publication number: 20210158675
    Abstract: A first device is detected within a geofenced area of an establishment. A second device is determined to be within the geofenced area. A first individual associated with the first device is instructed to enter the establishment and complete a first portion of opening security procedures associated with an opening of the establishment. Upon completion of the first portion, a second individual associated with the second device is instructed to enter the establishment for a second portion of the opening security procedures. The first individual and the second individual are monitored through video feeds during the first portion and the second portion of the opening security procedures for compliance with the opening security procedures.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Publication number: 20210160287
    Abstract: Security video is captured when one or more individuals are detected as entering a secure area. Actions of the one or more individuals are monitored based on security policies associated with the secure area. Identifiers for the one or more individuals and action identifiers for the actions are recorded in a security log while the one or more individuals remain in the secure area. The security video is stopped when the individuals are detected as exiting the secure area. The security video is linked to entries recorded in the security log. In an embodiment, when a non-compliant action is detected from the actions based on the security policies, a real-time alert is raised, and/or the security video is streamed in real time to a security monitor.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Christopher John Costello, Matthew Robert Burris, Gregory Joseph Hartl, Sudip Rahman Khan
  • Publication number: 20210158542
    Abstract: An asset is identified in a predefined area. The type of asset is identified through video or wireless tag identification. A security policy associated with the type of asset is obtained. Entries in an asset log are recorded based on a location of the asset, an individual handling the asset, and/or actions taken by an individual with respect to the asset based on the security policy. A real-time notification is sent when the location, the handling, and/or any of the actions warrant a notification based on the security policy.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210158240
    Abstract: Individuals are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras. Transaction information associated with transactions being processed by a transaction system of the establishment are monitored. The actions, behaviors, transaction information, and establishment processes are correlated to process controls of the establishment and logged in an audit log. Non-compliant actions, behaviors, or transaction information with respect to the process controls generate real-time alerts, real-time assistance for compliance by any offending individual, and/or remedial training for compliance of the offending individual.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210158055
    Abstract: Individuals, business transactions, and business activities are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras, sensor data captured by sensors, and information captured by transaction systems. Transaction/activity information associated with transactions/activities being processed by a transaction system of the establishment or performed by individuals within the establishment are monitored. The actions, behaviors, transaction information, activity information, and establishment processes are correlated to process controls, policies, and procedures of the establishment and logged. Non-compliant actions, behaviors, transaction information, activity information, and/or transaction/activity thresholds generate real-time remedial actions, such as audits, training, and notifications.
    Type: Application
    Filed: January 28, 2020
    Publication date: May 27, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 10984834
    Abstract: A dual-control security procedure is initiated, and a first person is identified for the procedure. The first person is authenticated and a remote agent that is remotely located is requested to participate in the procedure. Actions/behaviors of at least the first person are monitored from the video in accordance with the procedure and provided in real-time to the remote agent. An audit log is written to upon the conclusion of the procedure. The audit log at least comprising: identifiers for the first person and the remote agent, a procedure identifier for the procedure, an asset/area identifier associated with the procedure, a zone identifier for a location within an establishment, action identifiers for the actions, behavior identifiers for the behaviors, violation identifiers for any violations detected during the procedure, and a link to a video clip from the video that corresponds to at least the first person performing the procedure.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: April 20, 2021
    Assignee: NCR Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210097542
    Abstract: A user is identified within an establishment. An identity associated with an account of the user with the establishment is determined. Various transactions of the user are monitored. Moreover, actions and behaviors of the user are monitored through video. A current perceived state of the user is calculated based on the monitoring of the various transactions, actions, and behaviors. The state is compared to a threshold value and a response action is automatically processed based on one or more rules. In an embodiment, custom logs are retained for a period of time that the user was in the establishment and custom aggregations of the logs are sent to one or more external systems.
    Type: Application
    Filed: November 26, 2019
    Publication date: April 1, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210097299
    Abstract: An identity of a customer within an establishment is authenticated using a variety of captured biometric features obtained from sensors and/or video. Video capturing movements/interactions of the customer is analyzed in real time to identify the customer's behavior and actions. Any staff of the establishment who interact with the customer are identified from the video. Transaction data and other data retained for the customer by the establishment are aggregated and linked with the video and the customer identity. The linked data is analyzed in combination with the customer behavior and actions to determine responses within the establishment to customer-initiated transactions. In an embodiment, the customer is authorized to perform at least one transaction within the establishment based on the authenticated identity and linked data without a presentation by the customer of an identification card, a Personal Identification Number (PIN), a password and/or verification by a staff member.
    Type: Application
    Filed: January 28, 2020
    Publication date: April 1, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210056316
    Abstract: Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.
    Type: Application
    Filed: November 9, 2020
    Publication date: February 25, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 10929675
    Abstract: Decentralized cameras perform video tracking on captured video. The cameras produce metadata representing tracking of objects from the captured video. The metadata is passed between the cameras as the object moves within the captured video. Final metadata from at least one of the cameras is sent to a server, the server processes the final metadata to produce a summary of the object tracking and process one or more automated actions based on the summary.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: February 23, 2021
    Assignee: NCR Corporation
    Inventors: Christopher John Costello, Sik Piu Kwan
  • Patent number: 10867187
    Abstract: Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: December 15, 2020
    Assignee: NCR Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20200327910
    Abstract: A dual-control security procedure is initiated, and a first person is identified for the procedure. The first person is authenticated and a remote agent that is remotely located is requested to participate in the procedure. Actions/behaviors of at least the first person are monitored from the video in accordance with the procedure and provided in real-time to the remote agent. An audit log is written to upon the conclusion of the procedure. The audit log at least comprising: identifiers for the first person and the remote agent, a procedure identifier for the procedure, an asset/area identifier associated with the procedure, a zone identifier for a location within an establishment, action identifiers for the actions, behavior identifiers for the behaviors, violation identifiers for any violations detected during the procedure, and a link to a video clip from the video that corresponds to at least the first person performing the procedure.
    Type: Application
    Filed: January 28, 2020
    Publication date: October 15, 2020
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20200327335
    Abstract: Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.
    Type: Application
    Filed: November 26, 2019
    Publication date: October 15, 2020
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 10733405
    Abstract: A three-dimensional image (3D) image for a shape of an orientation of an item is captured when an item barcode for the item is captured by a scanner during item checkout at a terminal. Edges for the shape and dimensions for the shape are calculated from the 3D image based on the orientation. The shape dimensions are compared against expected dimensions for a candidate item that is identified from item information in the item barcode and a decision is made as to whether to validate the item barcode for the item during item checkout or as to whether to invalidate the item barcode and suspend item checkout at the terminal for an audit of the item checkout.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: August 4, 2020
    Assignee: NCR Corporation
    Inventor: Christopher John Costello
  • Publication number: 20200244754
    Abstract: Various embodiments describe controlling usages of channels of a user experience ecosystem. A computer system provides a user interface to a computing device, generates data entries based on user interactions with the user interface, and stores the data entries in a data store. The data entries identify the channels and specify dependencies between the usages of the channels. The computer system adds, to the data store, identifiers of storage locations of content. The computer system provides, to channel systems, access to the data entries and the identifiers of the storage locations in the data store. A usage of a channel by a channel system includes a content publication based on the data entries and the identifiers of the storage locations. The usage of this channel is coordinated with a usage of a different channel by a different channel system based on the dependencies specified in the data entries.
    Type: Application
    Filed: April 10, 2020
    Publication date: July 30, 2020
    Inventors: Stephanie Au, Peter Krmpotic, John Costello
  • Publication number: 20200193407
    Abstract: Images are captured of a customer during a transaction at a transaction terminal along with images associated with items of the transaction and any bags or cart used to hold the items. The images are processed to track any movement and locations of the customer, items, bags, and cart relative to a known location of the transaction terminal. When a transaction payment is required for the transaction and movement is detected in a direction that is moving away from the transaction terminal before a payment notification is received for the transaction, one or more alerts are raised as an indication to staff and/or security systems of a potential in-progress walk-away theft.
    Type: Application
    Filed: December 15, 2018
    Publication date: June 18, 2020
    Inventor: Christopher John Costello
  • Publication number: 20200195596
    Abstract: In one embodiment, a request to join an electronic chat room is received from a requester. A selection of an access control level for the requester is received via a user interface in order to grant the requester access to the electronic chat room according to a condition for granting access. The user interface is used to assign a selected access control level to the requester, thereupon granting access to the requester. The requester's access to content available in the electronic chat room being limited based on the selected access control level. Related methods, apparatus, and systems are also described.
    Type: Application
    Filed: February 24, 2020
    Publication date: June 18, 2020
    Inventors: John Costello, Andrew Henderson, Robert Headon
  • Patent number: 10659546
    Abstract: Various embodiments describe controlling usages of channels of a user experience ecosystem. A computer system provides a user interface to a computing device, generates data entries based on user interactions with the user interface, and stores the data entries in a data store. The data entries identify the channels and specify dependencies between the usages of the channels. The computer system adds, to the data store, identifiers of storage locations of content. The computer system provides, to channel systems, access to the data entries and the identifiers of the storage locations in the data store. A usage of a channel by a channel system includes a content publication based on the data entries and the identifiers of the storage locations. The usage of this channel is coordinated with a usage of a different channel by a different channel system based on the dependencies specified in the data entries.
    Type: Grant
    Filed: May 23, 2017
    Date of Patent: May 19, 2020
    Assignee: Adobe Inc.
    Inventors: Stephanie Au, Peter Krmpotic, John Costello