Mobile robot map generation
First Claim
1. A mobile robot, comprising:
- a motorized base configured to move the mobile robot throughout a floor of a building;
a wireless transceiver configured to communicatively couple to a hardware system of the building and to receive a semantic map including, for each of a set of objects within the floor of the building, an identity of the object and a location of the object;
a housing body storing one or more sensors configured to detect objects within a proximity of the patrol route; and
a controller configured to;
determine a location of a detected object;
query the semantic map with the determined location to identify a result set of objects that may represent the detected object and corresponding expected object states, each of the identified result set of objects being associated with a corresponding location within a threshold distance of the determined location of the detected object;
select a result of the result set of objects as representative of the detected object;
determine if a state of the detected object violates one or more security policies by determining that the detected object is more than a second threshold distance from an expected location;
in response to determining that the state of the detected object violates the one or more security policies, performing one or more security operations selected to change the state of the detected object to a second state that does not violate the one or more security policies; and
modifying the semantic map to reflect the change of state of the detected object caused by the one or more security operations.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile robot is configured for operation in a commercial or industrial setting, such as an office building or retail store. The robot can patrol one or more routes within a building, and can detect violations of security policies by objects, building infrastructure and security systems, or individuals. In response to the detected violations, the robot can perform one or more security operations. The robot can include a removable fabric panel, enabling sensors within the robot body to capture signals that propagate through the fabric. In addition, the robot can scan RFID tags of objects within an area, for instance coupled to store inventory. Likewise, the robot can generate or update one or more semantic maps for use by the robot in navigating an area and for measuring compliance with security policies.
34 Citations
12 Claims
-
1. A mobile robot, comprising:
-
a motorized base configured to move the mobile robot throughout a floor of a building; a wireless transceiver configured to communicatively couple to a hardware system of the building and to receive a semantic map including, for each of a set of objects within the floor of the building, an identity of the object and a location of the object; a housing body storing one or more sensors configured to detect objects within a proximity of the patrol route; and a controller configured to; determine a location of a detected object; query the semantic map with the determined location to identify a result set of objects that may represent the detected object and corresponding expected object states, each of the identified result set of objects being associated with a corresponding location within a threshold distance of the determined location of the detected object; select a result of the result set of objects as representative of the detected object; determine if a state of the detected object violates one or more security policies by determining that the detected object is more than a second threshold distance from an expected location; in response to determining that the state of the detected object violates the one or more security policies, performing one or more security operations selected to change the state of the detected object to a second state that does not violate the one or more security policies; and modifying the semantic map to reflect the change of state of the detected object caused by the one or more security operations. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method, comprising:
-
patrolling, by a mobile robot, a route through a building floor; accessing, by the mobile robot, a semantic map including, an identity and location for each of a set of objects within the building floor; detecting, by the mobile robot, an object within a proximity of the patrol route; querying, by the mobile robot, the semantic map with a location of the detected object to identify a result set of objects that may represent the detected object and corresponding expected object states, each of the identified result set of objects being associated with a corresponding location within a threshold distance of the determined location of the detected object; selecting a result of the result set of objects as representative of the detected object; determining, by the mobile robot, if a state of the detected object violates one or more security policies by determining that the detected object is more than a second threshold distance from an expected location; in response to determining that the state of the detected object violates the one or more security policies, performing, by the mobile robot, one or more security operations selected to change the state of the detected object to a second state that does not violate the one or more security policies; and modifying the semantic map to reflect the change of state of the detected object caused by the one or more security operations. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification