Patents by Inventor Sudip Rahman Khan

Sudip Rahman Khan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11948365
    Abstract: An identity of a customer within an establishment is authenticated using a variety of captured biometric features obtained from sensors and/or video. Video capturing movements/interactions of the customer is analyzed in real time to identify the customer's behavior and actions. Any staff of the establishment who interact with the customer are identified from the video. Transaction data and other data retained for the customer by the establishment are aggregated and linked with the video and the customer identity. The linked data is analyzed in combination with the customer behavior and actions to determine responses within the establishment to customer-initiated transactions. In an embodiment, the customer is authorized to perform at least one transaction within the establishment based on the authenticated identity and linked data without a presentation by the customer of an identification card, a Personal Identification Number (PIN), a password and/or verification by a staff member.
    Type: Grant
    Filed: March 9, 2022
    Date of Patent: April 2, 2024
    Assignee: NCR Voyix Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 11798285
    Abstract: Individuals, business transactions, and business activities are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras, sensor data captured by sensors, and information captured by transaction systems. Transaction/activity information associated with transactions/activities being processed by a transaction system of the establishment or performed by individuals within the establishment are monitored. The actions, behaviors, transaction information, activity information, and establishment processes are correlated to process controls, policies, and procedures of the establishment and logged. Non-compliant actions, behaviors, transaction information, activity information, and/or transaction/activity thresholds generate real-time remedial actions, such as audits, training, and notifications.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: October 24, 2023
    Assignee: NCR Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 11727520
    Abstract: Zones a defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.
    Type: Grant
    Filed: November 19, 2021
    Date of Patent: August 15, 2023
    Assignee: NCR Corporation
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Patent number: 11594033
    Abstract: Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.
    Type: Grant
    Filed: November 9, 2020
    Date of Patent: February 28, 2023
    Assignee: NCR Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20220198895
    Abstract: A first device is detected within a geofenced area of an establishment. A second device is determined to be within the geofenced area. A first individual associated with the first device is instructed to enter the establishment and complete a first portion of opening security procedures associated with an opening of the establishment. Upon completion of the first portion, a second individual associated with the second device is instructed to enter the establishment for a second portion of the opening security procedures. The first individual and the second individual are monitored through video feeds during the first portion and the second portion of the opening security procedures for compliance with the opening security procedures.
    Type: Application
    Filed: March 10, 2022
    Publication date: June 23, 2022
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Publication number: 20220198804
    Abstract: An identity of a customer within an establishment is authenticated using a variety of captured biometric features obtained from sensors and/or video. Video capturing movements/interactions of the customer is analyzed in real time to identify the customer's behavior and actions. Any staff of the establishment who interact with the customer are identified from the video. Transaction data and other data retained for the customer by the establishment are aggregated and linked with the video and the customer identity. The linked data is analyzed in combination with the customer behavior and actions to determine responses within the establishment to customer-initiated transactions. In an embodiment, the customer is authorized to perform at least one transaction within the establishment based on the authenticated identity and linked data without a presentation by the customer of an identification card, a Personal Identification Number (PIN), a password and/or verification by a staff member.
    Type: Application
    Filed: March 9, 2022
    Publication date: June 23, 2022
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20220198893
    Abstract: An asset is identified in a predefined area. The type of asset is identified through video or wireless tag identification. A security policy associated with the type of asset is obtained. Entries in an asset log are recorded based on a location of the asset, an individual handling the asset, and/or actions taken by an individual with respect to the asset based on the security policy. A real-time notification is sent when the location, the handling, and/or any of the actions warrant a notification based on the security policy.
    Type: Application
    Filed: March 9, 2022
    Publication date: June 23, 2022
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 11354910
    Abstract: An identity of a customer within an establishment is authenticated using a variety of captured biometric features obtained from sensors and/or video. Video capturing movements/interactions of the customer is analyzed in real time to identify the customer's behavior and actions. Any staff of the establishment who interact with the customer are identified from the video. Transaction data and other data retained for the customer by the establishment are aggregated and linked with the video and the customer identity. The linked data is analyzed in combination with the customer behavior and actions to determine responses within the establishment to customer-initiated transactions. In an embodiment, the customer is authorized to perform at least one transaction within the establishment based on the authenticated identity and linked data without a presentation by the customer of an identification card, a Personal Identification Number (PIN), a password and/or verification by a staff member.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: June 7, 2022
    Assignee: NCR Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 11328565
    Abstract: An asset is identified in a predefined area. The type of asset is identified through video or wireless tag identification. A security policy associated with the type of asset is obtained. Entries in an asset log are recorded based on a location of the asset, an individual handling the asset, and/or actions taken by an individual with respect to the asset based on the security policy. A real-time notification is sent when the location, the handling, and/or any of the actions warrant a notification based on the security policy.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: May 10, 2022
    Assignee: NCR Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 11328567
    Abstract: A first device is detected within a geofenced area of an establishment. A second device is determined to be within the geofenced area. A first individual associated with the first device is instructed to enter the establishment and complete a first portion of opening security procedures associated with an opening of the establishment. Upon completion of the first portion, a second individual associated with the second device is instructed to enter the establishment for a second portion of the opening security procedures. The first individual and the second individual are monitored through video feeds during the first portion and the second portion of the opening security procedures for compliance with the opening security procedures.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: May 10, 2022
    Assignee: NCR Corporation
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Patent number: 11321655
    Abstract: Individuals are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras. Transaction information associated with transactions being processed by a transaction system of the establishment are monitored. The actions, behaviors, transaction information, and establishment processes are correlated to process controls of the establishment and logged in an audit log. Non-compliant actions, behaviors, or transaction information with respect to the process controls generate real-time alerts, real-time assistance for compliance by any offending individual, and/or remedial training for compliance of the offending individual.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: May 3, 2022
    Assignee: NCR Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20220092496
    Abstract: Individuals are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras. Transaction information associated with transactions being processed by a transaction system of the establishment are monitored. The actions, behaviors, transaction information, and establishment processes are correlated to process controls of the establishment and logged in an audit log. Non-compliant actions, behaviors, or transaction information with respect to the process controls generate real-time alerts, real-time assistance for compliance by any offending individual, and/or remedial training for compliance of the offending individual.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20220076365
    Abstract: Zones a defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.
    Type: Application
    Filed: November 19, 2021
    Publication date: March 10, 2022
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Patent number: 11238554
    Abstract: Zones are defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: February 1, 2022
    Assignee: NCR Corporation
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Publication number: 20210158240
    Abstract: Individuals are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras. Transaction information associated with transactions being processed by a transaction system of the establishment are monitored. The actions, behaviors, transaction information, and establishment processes are correlated to process controls of the establishment and logged in an audit log. Non-compliant actions, behaviors, or transaction information with respect to the process controls generate real-time alerts, real-time assistance for compliance by any offending individual, and/or remedial training for compliance of the offending individual.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210158055
    Abstract: Individuals, business transactions, and business activities are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras, sensor data captured by sensors, and information captured by transaction systems. Transaction/activity information associated with transactions/activities being processed by a transaction system of the establishment or performed by individuals within the establishment are monitored. The actions, behaviors, transaction information, activity information, and establishment processes are correlated to process controls, policies, and procedures of the establishment and logged. Non-compliant actions, behaviors, transaction information, activity information, and/or transaction/activity thresholds generate real-time remedial actions, such as audits, training, and notifications.
    Type: Application
    Filed: January 28, 2020
    Publication date: May 27, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210158465
    Abstract: Zones a defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.
    Type: Application
    Filed: December 23, 2019
    Publication date: May 27, 2021
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Publication number: 20210158675
    Abstract: A first device is detected within a geofenced area of an establishment. A second device is determined to be within the geofenced area. A first individual associated with the first device is instructed to enter the establishment and complete a first portion of opening security procedures associated with an opening of the establishment. Upon completion of the first portion, a second individual associated with the second device is instructed to enter the establishment for a second portion of the opening security procedures. The first individual and the second individual are monitored through video feeds during the first portion and the second portion of the opening security procedures for compliance with the opening security procedures.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
  • Publication number: 20210158542
    Abstract: An asset is identified in a predefined area. The type of asset is identified through video or wireless tag identification. A security policy associated with the type of asset is obtained. Entries in an asset log are recorded based on a location of the asset, an individual handling the asset, and/or actions taken by an individual with respect to the asset based on the security policy. A real-time notification is sent when the location, the handling, and/or any of the actions warrant a notification based on the security policy.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210160287
    Abstract: Security video is captured when one or more individuals are detected as entering a secure area. Actions of the one or more individuals are monitored based on security policies associated with the secure area. Identifiers for the one or more individuals and action identifiers for the actions are recorded in a security log while the one or more individuals remain in the secure area. The security video is stopped when the individuals are detected as exiting the secure area. The security video is linked to entries recorded in the security log. In an embodiment, when a non-compliant action is detected from the actions based on the security policies, a real-time alert is raised, and/or the security video is streamed in real time to a security monitor.
    Type: Application
    Filed: November 26, 2019
    Publication date: May 27, 2021
    Inventors: Christopher John Costello, Matthew Robert Burris, Gregory Joseph Hartl, Sudip Rahman Khan