Autonomous data machines and systems
First Claim
1. A system for controlling one or more autonomous data machines configured to perform surveillance and monitor security within a predefined location, the system comprising:
- a control center in remote communication with the one or more one or more autonomous data machines, wherein the control center comprises one or more processors located remotely from the one or more autonomous data machines and are individually or collectively configured to;
receive data indicative of at least one security event occurring at the predefined location, wherein at least a portion of the data is from a plurality of sensors on-board the one or more autonomous data machines, wherein the data comprises location of a mobile device detected by at least one of the sensors configured to detect a wireless network signal of the mobile device that is not directed to the one or more autonomous data machines;
analyze the data to generate a set of instructions for responding to the at least one security event; and
provide the set of instructions to the one or more autonomous data machines, wherein one or more processors on the one or more autonomous data machines are individually or collectively configured to execute the set of instructions, thereby causing the one or more autonomous data machines to perform an action in response to the at least one security event.
3 Assignments
0 Petitions
Accused Products
Abstract
Autonomous data machines and systems may be provided, which may be deployed in an environment. The machines may roam within the environment and collect data with aid of one or more sensors. The data may be sent to a control center, which may optionally receive information from additional data sources, such as other on-site sensors, existing static data, or real-time social data. The control center may send instructions to the machines to perform one or more reaction based on the received information. The autonomous data machines may be capable of reacting autonomously to one or more detected condition. In some instances, the autonomous data machines may be employed for security or surveillance.
-
Citations
20 Claims
-
1. A system for controlling one or more autonomous data machines configured to perform surveillance and monitor security within a predefined location, the system comprising:
a control center in remote communication with the one or more one or more autonomous data machines, wherein the control center comprises one or more processors located remotely from the one or more autonomous data machines and are individually or collectively configured to; receive data indicative of at least one security event occurring at the predefined location, wherein at least a portion of the data is from a plurality of sensors on-board the one or more autonomous data machines, wherein the data comprises location of a mobile device detected by at least one of the sensors configured to detect a wireless network signal of the mobile device that is not directed to the one or more autonomous data machines; analyze the data to generate a set of instructions for responding to the at least one security event; and provide the set of instructions to the one or more autonomous data machines, wherein one or more processors on the one or more autonomous data machines are individually or collectively configured to execute the set of instructions, thereby causing the one or more autonomous data machines to perform an action in response to the at least one security event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
18. A method for controlling one or more autonomous data machines configured to perform surveillance and monitor security within a predefined location, the method comprising:
with aid of one or more processors located remotely from the one or more autonomous data machines individually or collectively; receiving data indicative of at least one security event occurring in the predefined location, wherein at least a portion of the data is from a plurality of sensors on-board the one or more autonomous data machines, wherein the data comprises location of a mobile device detected by at least one of the sensors configured to detect a wireless network signal of the mobile device that is not directed to the one or more autonomous data machines; analyzing the data to generate a set of instructions for responding to the at least one security event; and providing the set of instructions to the one or more autonomous data machines, wherein a plurality of processors on the one or more autonomous data machines are individually or collectively configured to execute the set of instructions, thereby causing the one or more autonomous data machines to perform an action in response to the at least one security event.
-
19. A non-transitory computer readable medium storing instructions that, when executed by one or more processors located remotely from the one or more autonomous data machines, causes the one or more processors to individually or collectively perform a method for controlling one or more autonomous data machines configured to perform surveillance and monitor security within a predefined location, the method comprising:
receiving data indicative of at least one security event occurring at the predefined location, wherein at least a portion of the data is from a plurality of sensors on-board the one or more autonomous data machines, wherein the data comprises location of a mobile device detected by at least one of the sensors configured to detect a wireless network signal of the mobile device that is not directed to the one or more autonomous data machines; analyzing the data to generate a set of instructions for responding to the at least one security event; and providing the set of instructions to the one or more autonomous data machines, wherein a plurality of processors on the one or more autonomous data machines are individually or collectively configured to execute the set of instructions, thereby causing the one or more autonomous data machines to perform an action in response to the at least one security event. - View Dependent Claims (20)
Specification