Patents by Inventor Sudip Rahman Khan
Sudip Rahman Khan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11948365Abstract: An identity of a customer within an establishment is authenticated using a variety of captured biometric features obtained from sensors and/or video. Video capturing movements/interactions of the customer is analyzed in real time to identify the customer's behavior and actions. Any staff of the establishment who interact with the customer are identified from the video. Transaction data and other data retained for the customer by the establishment are aggregated and linked with the video and the customer identity. The linked data is analyzed in combination with the customer behavior and actions to determine responses within the establishment to customer-initiated transactions. In an embodiment, the customer is authorized to perform at least one transaction within the establishment based on the authenticated identity and linked data without a presentation by the customer of an identification card, a Personal Identification Number (PIN), a password and/or verification by a staff member.Type: GrantFiled: March 9, 2022Date of Patent: April 2, 2024Assignee: NCR Voyix CorporationInventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Patent number: 11798285Abstract: Individuals, business transactions, and business activities are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras, sensor data captured by sensors, and information captured by transaction systems. Transaction/activity information associated with transactions/activities being processed by a transaction system of the establishment or performed by individuals within the establishment are monitored. The actions, behaviors, transaction information, activity information, and establishment processes are correlated to process controls, policies, and procedures of the establishment and logged. Non-compliant actions, behaviors, transaction information, activity information, and/or transaction/activity thresholds generate real-time remedial actions, such as audits, training, and notifications.Type: GrantFiled: January 28, 2020Date of Patent: October 24, 2023Assignee: NCR CorporationInventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Patent number: 11727520Abstract: Zones a defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.Type: GrantFiled: November 19, 2021Date of Patent: August 15, 2023Assignee: NCR CorporationInventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
-
Patent number: 11594033Abstract: Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.Type: GrantFiled: November 9, 2020Date of Patent: February 28, 2023Assignee: NCR CorporationInventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Publication number: 20220198895Abstract: A first device is detected within a geofenced area of an establishment. A second device is determined to be within the geofenced area. A first individual associated with the first device is instructed to enter the establishment and complete a first portion of opening security procedures associated with an opening of the establishment. Upon completion of the first portion, a second individual associated with the second device is instructed to enter the establishment for a second portion of the opening security procedures. The first individual and the second individual are monitored through video feeds during the first portion and the second portion of the opening security procedures for compliance with the opening security procedures.Type: ApplicationFiled: March 10, 2022Publication date: June 23, 2022Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
-
Publication number: 20220198804Abstract: An identity of a customer within an establishment is authenticated using a variety of captured biometric features obtained from sensors and/or video. Video capturing movements/interactions of the customer is analyzed in real time to identify the customer's behavior and actions. Any staff of the establishment who interact with the customer are identified from the video. Transaction data and other data retained for the customer by the establishment are aggregated and linked with the video and the customer identity. The linked data is analyzed in combination with the customer behavior and actions to determine responses within the establishment to customer-initiated transactions. In an embodiment, the customer is authorized to perform at least one transaction within the establishment based on the authenticated identity and linked data without a presentation by the customer of an identification card, a Personal Identification Number (PIN), a password and/or verification by a staff member.Type: ApplicationFiled: March 9, 2022Publication date: June 23, 2022Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Publication number: 20220198893Abstract: An asset is identified in a predefined area. The type of asset is identified through video or wireless tag identification. A security policy associated with the type of asset is obtained. Entries in an asset log are recorded based on a location of the asset, an individual handling the asset, and/or actions taken by an individual with respect to the asset based on the security policy. A real-time notification is sent when the location, the handling, and/or any of the actions warrant a notification based on the security policy.Type: ApplicationFiled: March 9, 2022Publication date: June 23, 2022Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Patent number: 11354910Abstract: An identity of a customer within an establishment is authenticated using a variety of captured biometric features obtained from sensors and/or video. Video capturing movements/interactions of the customer is analyzed in real time to identify the customer's behavior and actions. Any staff of the establishment who interact with the customer are identified from the video. Transaction data and other data retained for the customer by the establishment are aggregated and linked with the video and the customer identity. The linked data is analyzed in combination with the customer behavior and actions to determine responses within the establishment to customer-initiated transactions. In an embodiment, the customer is authorized to perform at least one transaction within the establishment based on the authenticated identity and linked data without a presentation by the customer of an identification card, a Personal Identification Number (PIN), a password and/or verification by a staff member.Type: GrantFiled: January 28, 2020Date of Patent: June 7, 2022Assignee: NCR CorporationInventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Patent number: 11328565Abstract: An asset is identified in a predefined area. The type of asset is identified through video or wireless tag identification. A security policy associated with the type of asset is obtained. Entries in an asset log are recorded based on a location of the asset, an individual handling the asset, and/or actions taken by an individual with respect to the asset based on the security policy. A real-time notification is sent when the location, the handling, and/or any of the actions warrant a notification based on the security policy.Type: GrantFiled: November 26, 2019Date of Patent: May 10, 2022Assignee: NCR CorporationInventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Patent number: 11328567Abstract: A first device is detected within a geofenced area of an establishment. A second device is determined to be within the geofenced area. A first individual associated with the first device is instructed to enter the establishment and complete a first portion of opening security procedures associated with an opening of the establishment. Upon completion of the first portion, a second individual associated with the second device is instructed to enter the establishment for a second portion of the opening security procedures. The first individual and the second individual are monitored through video feeds during the first portion and the second portion of the opening security procedures for compliance with the opening security procedures.Type: GrantFiled: November 26, 2019Date of Patent: May 10, 2022Assignee: NCR CorporationInventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
-
Patent number: 11321655Abstract: Individuals are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras. Transaction information associated with transactions being processed by a transaction system of the establishment are monitored. The actions, behaviors, transaction information, and establishment processes are correlated to process controls of the establishment and logged in an audit log. Non-compliant actions, behaviors, or transaction information with respect to the process controls generate real-time alerts, real-time assistance for compliance by any offending individual, and/or remedial training for compliance of the offending individual.Type: GrantFiled: November 26, 2019Date of Patent: May 3, 2022Assignee: NCR CorporationInventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Publication number: 20220092496Abstract: Individuals are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras. Transaction information associated with transactions being processed by a transaction system of the establishment are monitored. The actions, behaviors, transaction information, and establishment processes are correlated to process controls of the establishment and logged in an audit log. Non-compliant actions, behaviors, or transaction information with respect to the process controls generate real-time alerts, real-time assistance for compliance by any offending individual, and/or remedial training for compliance of the offending individual.Type: ApplicationFiled: December 3, 2021Publication date: March 24, 2022Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Publication number: 20220076365Abstract: Zones a defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.Type: ApplicationFiled: November 19, 2021Publication date: March 10, 2022Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
-
Patent number: 11238554Abstract: Zones are defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.Type: GrantFiled: December 23, 2019Date of Patent: February 1, 2022Assignee: NCR CorporationInventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
-
Publication number: 20210158240Abstract: Individuals are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras. Transaction information associated with transactions being processed by a transaction system of the establishment are monitored. The actions, behaviors, transaction information, and establishment processes are correlated to process controls of the establishment and logged in an audit log. Non-compliant actions, behaviors, or transaction information with respect to the process controls generate real-time alerts, real-time assistance for compliance by any offending individual, and/or remedial training for compliance of the offending individual.Type: ApplicationFiled: November 26, 2019Publication date: May 27, 2021Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Publication number: 20210158055Abstract: Individuals, business transactions, and business activities are monitored for actions and behaviors of the individuals during performance of establishment processes through video feeds captured by cameras, sensor data captured by sensors, and information captured by transaction systems. Transaction/activity information associated with transactions/activities being processed by a transaction system of the establishment or performed by individuals within the establishment are monitored. The actions, behaviors, transaction information, activity information, and establishment processes are correlated to process controls, policies, and procedures of the establishment and logged. Non-compliant actions, behaviors, transaction information, activity information, and/or transaction/activity thresholds generate real-time remedial actions, such as audits, training, and notifications.Type: ApplicationFiled: January 28, 2020Publication date: May 27, 2021Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Publication number: 20210158465Abstract: Zones a defined within an enterprise. Video captured from the zones are monitored for threats (financial or physical). Any transaction data associated with transactions are monitored with the video along with sensor data captured from sensors within the zones. Threat policies are evaluated to identify actions and behaviors of individuals within the zones and threat scores are maintained. When a current threat score associated with a specific type of threat for a given individual or set of individuals exceeds a threshold, one or more automated remediation or threat avoidance actions are processed to mitigate and/or prevent the perceived threat.Type: ApplicationFiled: December 23, 2019Publication date: May 27, 2021Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
-
Publication number: 20210158675Abstract: A first device is detected within a geofenced area of an establishment. A second device is determined to be within the geofenced area. A first individual associated with the first device is instructed to enter the establishment and complete a first portion of opening security procedures associated with an opening of the establishment. Upon completion of the first portion, a second individual associated with the second device is instructed to enter the establishment for a second portion of the opening security procedures. The first individual and the second individual are monitored through video feeds during the first portion and the second portion of the opening security procedures for compliance with the opening security procedures.Type: ApplicationFiled: November 26, 2019Publication date: May 27, 2021Inventors: Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl, Sudip Rahman Khan
-
Publication number: 20210158542Abstract: An asset is identified in a predefined area. The type of asset is identified through video or wireless tag identification. A security policy associated with the type of asset is obtained. Entries in an asset log are recorded based on a location of the asset, an individual handling the asset, and/or actions taken by an individual with respect to the asset based on the security policy. A real-time notification is sent when the location, the handling, and/or any of the actions warrant a notification based on the security policy.Type: ApplicationFiled: November 26, 2019Publication date: May 27, 2021Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
-
Publication number: 20210160287Abstract: Security video is captured when one or more individuals are detected as entering a secure area. Actions of the one or more individuals are monitored based on security policies associated with the secure area. Identifiers for the one or more individuals and action identifiers for the actions are recorded in a security log while the one or more individuals remain in the secure area. The security video is stopped when the individuals are detected as exiting the secure area. The security video is linked to entries recorded in the security log. In an embodiment, when a non-compliant action is detected from the actions based on the security policies, a real-time alert is raised, and/or the security video is streamed in real time to a security monitor.Type: ApplicationFiled: November 26, 2019Publication date: May 27, 2021Inventors: Christopher John Costello, Matthew Robert Burris, Gregory Joseph Hartl, Sudip Rahman Khan