SYSTEM AND METHOD FOR SELECTIVE AUDITING OF MOBILE COMMERCE BASKETS
First Claim
1. A computer-implemented method of selectively auditing baskets in a self-scan system, the method being implemented on a computer system having one or more physical processors programmed with computer program instructions that, when executed by the one or more physical processors, cause the computer system to perform the method, the method comprising:
- receiving, by the computer system, a customer identification that identifies a customer associated with a current shopping trip;
obtaining, by the computer system, customer profile information associated with the customer identified by the customer identification, wherein the customer profile information includes an indication of at least a first item that was previously purchased by the customer;
determining, by the computer system, that the first item has not been scanned during the current shopping trip;
determining, by the computer system, a first level of risk associated with the customer based on the determination that the first item has not been scanned during the current shopping trip;
receiving, by the computer system, scan information comprising an item identification that identifies a second item that was scanned during the current shopping trip;
obtaining, by the computer system, item profile information associated with the item identification, wherein the item profile information includes an indication that the second item is packaged in a manner that is used to conceal other items;
determining, by the computer system, a second level of risk associated with the second item based on the indication that the second item is packaged in a manner that is used to conceal other items; and
causing, by the computer system, an audit to occur based on the first level of risk and the second level of risk.
14 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to systems and methods of selective auditing of mobile commerce baskets based on real-time behavior, profile information, event information, and/or other information in self-scan and other self-serve retail systems. The system may make a comprehensive, real-time, audit decision based on various risk factors that indicate a probability that a given shopping trip in a self-scan system includes a scan error. The audit decision may be parameterized such that different risk factors may be considered and weighted/prioritized with respect to other risk factors. For example, audit parameters may be used to determine which risk factors are used when processing the audit decision. The system may keep track of purchases, audits, and audit results in order to provide real-time reports and analytics. The system may also model audit decisions such that audit decisions may be simulated for a one or more retail locations during different time periods.
-
Citations
36 Claims
-
1. A computer-implemented method of selectively auditing baskets in a self-scan system, the method being implemented on a computer system having one or more physical processors programmed with computer program instructions that, when executed by the one or more physical processors, cause the computer system to perform the method, the method comprising:
-
receiving, by the computer system, a customer identification that identifies a customer associated with a current shopping trip; obtaining, by the computer system, customer profile information associated with the customer identified by the customer identification, wherein the customer profile information includes an indication of at least a first item that was previously purchased by the customer; determining, by the computer system, that the first item has not been scanned during the current shopping trip; determining, by the computer system, a first level of risk associated with the customer based on the determination that the first item has not been scanned during the current shopping trip; receiving, by the computer system, scan information comprising an item identification that identifies a second item that was scanned during the current shopping trip; obtaining, by the computer system, item profile information associated with the item identification, wherein the item profile information includes an indication that the second item is packaged in a manner that is used to conceal other items; determining, by the computer system, a second level of risk associated with the second item based on the indication that the second item is packaged in a manner that is used to conceal other items; and causing, by the computer system, an audit to occur based on the first level of risk and the second level of risk. - View Dependent Claims (2, 3, 4, 5, 7, 8, 9, 10, 11, 12, 13, 32, 33, 34, 35, 36)
-
-
6. (canceled)
-
14. A computer-implemented system of selectively auditing baskets in a self-scan system, the system comprising:
-
a computer system comprising one or more physical processors programmed with computer program instructions that, when executed by the one or more physical processors, cause the computer system to; receive a customer identification that identifies a customer associated with a current shopping trip; obtain customer profile information associated with the customer identified by the customer identification, wherein the customer profile information includes an indication of at least a first item that was previously purchased by the customer; determine that the first item has not been scanned during the current shopping trip; determine a first level of risk associated with the customer based on the determination that the first item has not been scanned during the current shopping trip; receive scan information comprising an item identification that identifies a second item that was scanned during the current shopping trip; obtain item profile information associated with the item identification, wherein the item profile information includes an indication that the second item is packaged in a manner that is used to conceal other items; determine a second level of risk associated with the second item based on the indication that the second item is packaged in a manner that is used to conceal other items; and cause an audit to occur based on the first level of risk and the second level of risk. - View Dependent Claims (15, 16, 17, 18, 20, 21, 22, 23, 24, 25, 26)
-
-
19. (canceled)
-
27-31. -31. (canceled)
Specification