SYSTEM AND METHODS RELATING TO AUTONOMOUS TRACKING AND SURVEILLANCE
First Claim
1. A method of protecting an asset using at least one unmanned vehicle, the method comprising the steps of:
- establishing a plurality of boundaries around the asset, the boundaries defining edges of zones;
observing a target in a first one of the zones;
deploying the unmanned vehicle to a location in a vicinity of the asset and tasking the vehicle to perform a first defensive measure as long as the target remains in the first zone; and
if the target crosses a boundary from the first zone into a second one of the zones, where the second zone is more proximate to the asset than the first zone, tasking the vehicle to perform a second defensive measure.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of protecting an asset using at least one unmanned vehicle. The method includes establishing a plurality of boundaries around the asset. The boundaries define edges of zones. The method further includes observing a target in a first one of the zones. The method further includes deploying the unmanned vehicle to a location in a vicinity of the asset and tasking the vehicle to perform a first defensive measure as long as the target remains in the first zone. If the target crosses a boundary from the first zone into a second one of the zones, where the second zone is more proximate to the asset than the first zone, the method further includes tasking the vehicle to perform a second defensive measure.
148 Citations
18 Claims
-
1. A method of protecting an asset using at least one unmanned vehicle, the method comprising the steps of:
-
establishing a plurality of boundaries around the asset, the boundaries defining edges of zones; observing a target in a first one of the zones; deploying the unmanned vehicle to a location in a vicinity of the asset and tasking the vehicle to perform a first defensive measure as long as the target remains in the first zone; and if the target crosses a boundary from the first zone into a second one of the zones, where the second zone is more proximate to the asset than the first zone, tasking the vehicle to perform a second defensive measure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of providing communication between a first individual or group and a second individual or group, where the first individual or group and the second individual or group cannot communicate directly with one another, the method comprising the steps of:
-
deploying an unmanned vehicle to a location in a vicinity of both the first individual or group and the second individual or group, such that the first individual or group is capable of communicating directly with the vehicle and the second individual or group is capable of communicating directly with the vehicle, but the first individual or group and the second individual or group cannot communicate directly with one another; relaying communications between the first individual or group and the second individual or group through the vehicle; and the vehicle autonomously tracking the first individual or group to maintain a desired distance between the vehicle and the first individual or group; wherein the step of autonomously tracking includes generating a travel path for the vehicle based on predicted future states of the vehicle and the first individual or group. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of securing an area prior to a vehicle entering the area in order to protect the vehicle and persons within the vehicle or within the area, the method comprising the steps of:
-
controlling an unmanned vehicle from the vehicle; commanding the unmanned vehicle to enter the area prior to the vehicle'"'"'s arrival; commanding the unmanned vehicle to surveil the area and locate targets, if any targets are present in the area; if targets are present in the area, commanding the unmanned vehicle to determine whether the targets pose a threat to the vehicle; and if the targets pose a threat to the vehicle, commanding the unmanned vehicle to neutralize the threat. - View Dependent Claims (15, 16, 17, 18)
-
Specification