Patent classifications
G08B13/1965
METHODS AND SYSTEMS FOR OPERATING A MOVING PLATFORM TO DETERMINE DATA ASSOCIATED WITH A TARGET PERSON OR OBJECT
Methods and systems for operating a moving platform to determine an identity of an unidentified target are disclosed. In an example method to determine the identity of the unidentified target, a first moving platform, configured with a first type of sensor, is caused to move to an area associated with the target. An attempt is made to determine, via the first moving platform and the first type of sensor, the identity of the target. Based on the attempt, a second moving platform, configured with a second type of sensor, is caused to move to the area. The identity of the target is determined via the second moving platform and the second type of sensor.
Enhanced audiovisual analytics
A monitoring system that is configured to monitor a property includes a camera that is configured to capture video data of the property. The monitoring system further includes a microphone that is configured to capture audio data of the property. The monitoring system further includes a monitor control unit that is configured to access and analyze the video data. The monitor control unit is further configured to determine that an alarm condition does not exist at the property. The monitor control unit is further configured to access and analyze the audio data. The monitor control unit is further configured to override the determination that an alarm condition does not exist at the property. The monitor control unit is further configured to, based on overriding the determination that an alarm condition does not exist at the property, perform a monitoring system action.
Autonomous home security devices
An autonomous vehicle such as a drone or a robot is programmed or configured to respond to reports of alarm events or conditions within one or more spaces of a facility. The autonomous vehicle travels to a location of a reported alarm event or condition and captures data using onboard sensors. The autonomous vehicle independently determines whether the reported alarm event or condition is false, or is otherwise properly addressed by resources that are available at the location, using images or other data captured by the onboard sensors. Alternatively, the autonomous vehicle transmits a request for additional resources to be provided at the location, where necessary. A physical map of the location generated based on the images or other data captured by the onboard sensors may be utilized for any purpose, such as to make one or more recommendations of products that are appropriate for use at the facility.
Asset management monitoring
Techniques are described for an autonomous asset management system that integrates autonomous devices, such as drone devices and other robotic devices, with a home security system of a property to enable management, monitoring, and/or tracking of various assets located within the property. In some implementations, an indication of an asset associated with a property is obtained by an autonomous device. Sensor data collected by one or more sensors of the property is obtained by the autonomous device based on the indication of the asset. A present status of the asset is determined by the autonomous device based on the sensor data. A determination that the present status of the asset does not correspond to an expected status of the asset is made by the autonomous device. In response, the autonomous device navigates to the particular location of the property.
DRONE PRE-SURVEILLANCE
Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a drone to pre-surveil a portion of a property. In one aspect, a system may include a monitoring unit. The monitoring unit may include a network interface, a processor, and a storage device that includes instructions to cause the processor to perform operations. The operations may include obtaining data that is indicative of one or more acts of an occupant of the property, applying the obtained data that is indicative of one or more acts of the occupant of the property to a pre-surveillance rule, determining that the pre-surveillance rule is satisfied, determining a drone navigation path that is associated with the pre-surveillance rule, transmitting, to a drone, an instruction to perform pre-surveillance of the portion of the one or more properties using the drone navigation path.
SYSTEMS AND METHODS FOR GEOFENCE SECURITY
The present invention is directed to methods and systems for enforcing at least one rule within a geofence. The rule is enforced by a fencing agent on an Unmanned Aerial Vehicle (UAV). The geofence is defined by a plurality of geographic designators, with the plurality of geographic designators each being associated with an Internet Protocol (IP) address, preferably an IPv6 address.
Drone control device
In one general aspect, a drone control device includes a body, a motor that is configured to move the body, a network module, an input module, and a processor. The network module is configured to communicate with a security system that monitors a property and receive data associated with a location within the property. The input module is configured to receive user input. The processor is configured to perform operations that include: determine, from among the location within the property and other locations within the property, a target location within the property; move the body to the target location within the property by providing a signal to the motor; receive, from the input module, input data that is associated with an operation of the security system; and in response to receiving the input data, perform the operation of the security system.
SYSTEM FOR IMPLEMENTING AN AERIAL SECURITY NETWORK
A system to implement an aerial security network utilizing unmanned aerial vehicles (UAVs) to provide security surveillance, suspicious activity/target detection and tracking, and deterrence actions for a protected area. The system includes one or more UAVs to capture images or videos of a protected area, a plurality of sensors to provide sensor information, one or more aerial security hubs (ASHs) to receive sensor information from the plurality of sensors, and an aerial security service to detect a suspicious activity in the protected area based on the sensor information. Upon detecting the suspicious activity by the aerial security service, one or more ASHs may instruct one or more UAVs to collect evidence of detected suspicious activity and/or perform defensive actions to deter the suspicious activity. One or more users may be notified of the suspicious activity, may receive a real-time view of the suspicious activity, and may remotely control the UAVs.
Monitoring system for monitoring unattended services
Methods, systems, and apparatus, including computer programs encoded on a storage device, for accommodating unattended services at a property. In one aspect, a monitoring system is disclosed that includes a processor and a storage device storing instructions that, when executed by the processor, cause the processor to perform operations. The operations can include receiving a request to enter the property to perform the unattended service, configuring the monitoring system to allow access to a first portion of the property associated with the unattended service without triggering an alarm event, obtaining image data of the property after the monitoring system is configured to allow access to the first portion of the property, determining, based on the obtained image data, that an unattended service provider has entered into a second, different portion of the property, and triggering an alarm event.
INVESTIGATION GENERATION IN AN OBSERVATION AND SURVEILLANCE SYSTEM
The present disclosure is directed to systems and methods for generating investigations of user behavior. In an example embodiment, the system includes a video camera configured to capture video of user activity, a video analytic module to perform real-time video processing of the captured video to generate non-video data from video, and a computer configured to receive the video and the non-video data from the video camera. In some embodiments, the video camera is at least one of a traffic camera or an aerial drone camera. The computer includes a video analytics module configured to analyze one of video and non-video data to identify occurrences of particular user behavior, and an investigation generation module configured to generate an investigation containing at least one video sequence of the particular user behavior. In some embodiments, the investigation is generated in near real time. The particular user behavior may be defined as an action, an inaction, a movement, a plurality of event occurrences, a temporal event and/or an externally-generated event.