Patents by Inventor Sudip Rahman Khan

Sudip Rahman Khan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10984834
    Abstract: A dual-control security procedure is initiated, and a first person is identified for the procedure. The first person is authenticated and a remote agent that is remotely located is requested to participate in the procedure. Actions/behaviors of at least the first person are monitored from the video in accordance with the procedure and provided in real-time to the remote agent. An audit log is written to upon the conclusion of the procedure. The audit log at least comprising: identifiers for the first person and the remote agent, a procedure identifier for the procedure, an asset/area identifier associated with the procedure, a zone identifier for a location within an establishment, action identifiers for the actions, behavior identifiers for the behaviors, violation identifiers for any violations detected during the procedure, and a link to a video clip from the video that corresponds to at least the first person performing the procedure.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: April 20, 2021
    Assignee: NCR Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210097299
    Abstract: An identity of a customer within an establishment is authenticated using a variety of captured biometric features obtained from sensors and/or video. Video capturing movements/interactions of the customer is analyzed in real time to identify the customer's behavior and actions. Any staff of the establishment who interact with the customer are identified from the video. Transaction data and other data retained for the customer by the establishment are aggregated and linked with the video and the customer identity. The linked data is analyzed in combination with the customer behavior and actions to determine responses within the establishment to customer-initiated transactions. In an embodiment, the customer is authorized to perform at least one transaction within the establishment based on the authenticated identity and linked data without a presentation by the customer of an identification card, a Personal Identification Number (PIN), a password and/or verification by a staff member.
    Type: Application
    Filed: January 28, 2020
    Publication date: April 1, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210097542
    Abstract: A user is identified within an establishment. An identity associated with an account of the user with the establishment is determined. Various transactions of the user are monitored. Moreover, actions and behaviors of the user are monitored through video. A current perceived state of the user is calculated based on the monitoring of the various transactions, actions, and behaviors. The state is compared to a threshold value and a response action is automatically processed based on one or more rules. In an embodiment, custom logs are retained for a period of time that the user was in the establishment and custom aggregations of the logs are sent to one or more external systems.
    Type: Application
    Filed: November 26, 2019
    Publication date: April 1, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20210056316
    Abstract: Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.
    Type: Application
    Filed: November 9, 2020
    Publication date: February 25, 2021
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Patent number: 10909788
    Abstract: Cameras capture time-stamped images of predefined areas (zones) and assets (objects). Behaviors and actions of persons are tracked in the images with respect to the zones and the objects based on rules. Persons are identified when the behaviors or actions indicate that the persons are attempting to access a particular zone or a particular object. Multifactor authentication is performed on the persons based on the rules and access to the particular zone or the particular object is granted or denied. All access attempts along with the corresponding images associated with the access attempts are logged for auditing.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: February 2, 2021
    Assignee: NCR Corporation
    Inventors: Matthew Robert Burris, Sudip Rahman Khan, Jodessiah Sumpter
  • Patent number: 10867187
    Abstract: Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: December 15, 2020
    Assignee: NCR Corporation
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20200327910
    Abstract: A dual-control security procedure is initiated, and a first person is identified for the procedure. The first person is authenticated and a remote agent that is remotely located is requested to participate in the procedure. Actions/behaviors of at least the first person are monitored from the video in accordance with the procedure and provided in real-time to the remote agent. An audit log is written to upon the conclusion of the procedure. The audit log at least comprising: identifiers for the first person and the remote agent, a procedure identifier for the procedure, an asset/area identifier associated with the procedure, a zone identifier for a location within an establishment, action identifiers for the actions, behavior identifiers for the behaviors, violation identifiers for any violations detected during the procedure, and a link to a video clip from the video that corresponds to at least the first person performing the procedure.
    Type: Application
    Filed: January 28, 2020
    Publication date: October 15, 2020
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20200327335
    Abstract: Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.
    Type: Application
    Filed: November 26, 2019
    Publication date: October 15, 2020
    Inventors: Sudip Rahman Khan, Matthew Robert Burris, Christopher John Costello, Gregory Joseph Hartl
  • Publication number: 20200327755
    Abstract: Cameras capture time-stamped images of predefined areas (zones) and assets (objects). Behaviors and actions of persons are tracked in the images with respect to the zones and the objects based on rules. Persons are identified when the behaviors or actions indicate that the persons are attempting to access a particular zone or a particular object. Multifactor authentication is performed on the persons based on the rules and access to the particular zone or the particular object is granted or denied. All access attempts along with the corresponding images associated with the access attempts are logged for auditing.
    Type: Application
    Filed: April 12, 2019
    Publication date: October 15, 2020
    Inventors: Matthew Robert Burris, Sudip Rahman Khan, Jodessiah Sumpter
  • Patent number: 10769908
    Abstract: Cameras capture time-stamped images within predefined areas (zones). Behaviors and actions of persons are tracked in the images with respect objects (assets) located within the zones based on rules. A risk assessment is dynamically adjusted based on the behaviors, actions, and the rules. An automated action is processed based on the risk assessment. A current risk score drives reporting, notifications, auditing, and security processes based on the rules. In an embodiment, a variety of sensors are located within the zones and provide real-time events with respect to some actions of a person or persons present within the zones.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: September 8, 2020
    Assignee: NCR Corporation
    Inventors: Matthew Robert Burris, Sudip Rahman Khan, Jodessiah Sumpter