UNMANNED AERIAL VEHICLE BASED SECURITY SYSTEM
First Claim
1. A method comprising:
- defining at least one flight plan of an unmanned aerial vehicle from a rest location thereof to a destination location within a memory of the unmanned aerial vehicle based on accessing an Application Programming Interface (API) exposed through a programming toolkit executing on a processor of the unmanned aerial vehicle, a flight plan of the at least one flight plan being a sequence of operations to be performed by the unmanned aerial vehicle as part of dispatch thereof to the destination location;
capturing, through at least one sensor communicatively coupled to the unmanned aerial vehicle and a server through a computer network, data related to an environment of a specific location covered by the at least one sensor, the server being at a location remote from the at least one sensor;
detecting, through a processor associated with at least one of;
the at least one sensor and the server, at least one of;
a security breach and a security threat at the specific location based on analyzing the captured data;
automatically activating, through one of;
the at least one sensor and the server, the flight plan of the at least one flight plan on the unmanned aerial vehicle in response to the detection of the at least one of;
the security breach and the security threat at the specific location; and
executing, through the unmanned aerial vehicle, the sequence of operations defined in the flight plan to dispatch the unmanned aerial vehicle to perform additional surveillance of the specific location with regard to the detected at least one of;
the security breach and the security threat in accordance with interpretation of the specific location as the destination location of the unmanned aerial vehicle and the automatic activation of the flight plan on the unmanned aerial vehicle.
0 Assignments
0 Petitions
Accused Products
Abstract
A method includes defining a flight plan of an unmanned aerial vehicle from a rest location thereof to a destination location within a memory of the unmanned aerial vehicle, and capturing, through one or more sensor(s) communicatively coupled to the unmanned aerial vehicle and a server through a computer network, data related to an environment of a specific location covered by the one or more sensor(s). The method also includes detecting, through a processor associated with the one or more sensor(s) and/or the server, a security breach and/or a security threat at the specific location based on analyzing the captured data, and automatically activating, through the one or more sensor(s) or the server, the flight plan on the unmanned aerial vehicle in response to the detection of the security breach and/or the security threat to dispatch the unmanned aerial vehicle to perform additional surveillance of the specific location.
-
Citations
20 Claims
-
1. A method comprising:
-
defining at least one flight plan of an unmanned aerial vehicle from a rest location thereof to a destination location within a memory of the unmanned aerial vehicle based on accessing an Application Programming Interface (API) exposed through a programming toolkit executing on a processor of the unmanned aerial vehicle, a flight plan of the at least one flight plan being a sequence of operations to be performed by the unmanned aerial vehicle as part of dispatch thereof to the destination location; capturing, through at least one sensor communicatively coupled to the unmanned aerial vehicle and a server through a computer network, data related to an environment of a specific location covered by the at least one sensor, the server being at a location remote from the at least one sensor; detecting, through a processor associated with at least one of;
the at least one sensor and the server, at least one of;
a security breach and a security threat at the specific location based on analyzing the captured data;automatically activating, through one of;
the at least one sensor and the server, the flight plan of the at least one flight plan on the unmanned aerial vehicle in response to the detection of the at least one of;
the security breach and the security threat at the specific location; andexecuting, through the unmanned aerial vehicle, the sequence of operations defined in the flight plan to dispatch the unmanned aerial vehicle to perform additional surveillance of the specific location with regard to the detected at least one of;
the security breach and the security threat in accordance with interpretation of the specific location as the destination location of the unmanned aerial vehicle and the automatic activation of the flight plan on the unmanned aerial vehicle. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A server comprising:
-
a memory; and a processor communicatively coupled to the memory, the processor being configured to execute instructions to; define at least one flight plan of an unmanned aerial vehicle from a rest location thereof to a destination location within a memory of the unmanned aerial vehicle based on accessing an API exposed through a programming toolkit executing on a processor of the unmanned aerial vehicle, a flight plan of the at least one flight plan being a sequence of operations to be performed by the unmanned aerial vehicle as part of dispatch thereof to the destination location, detect at least one of;
a security breach and a security threat at a specific location based on analyzing data captured through at least one sensor communicatively coupled to the unmanned aerial vehicle and the server through a computer network, the captured data being related to an environment of the specific location covered by the at least one sensor, and the server being at a location remote from the at least one sensor;automatically activate the flight plan of the at least one flight plan on the unmanned aerial vehicle in response to the detection of the at least one of;
the security breach and the security threat at the specific location, anddispatch the unmanned aerial vehicle to the specific location to perform additional surveillance thereat with regard to the detected at least one of;
the security breach and the security threat based on execution of the flight plan on the unmanned aerial vehicle in accordance with interpretation of the specific location as the destination location of the unmanned aerial vehicle and the automatic activation of the flight plan on the unmanned aerial vehicle. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
an unmanned aerial vehicle having at least one flight plan from a rest location thereof to a destination location defined within a memory of the unmanned aerial vehicle based on access to an API exposed through a programming toolkit executing on a processor of the unmanned aerial vehicle, a flight plan of the at least one flight plan being a sequence of operations to be performed by the unmanned aerial vehicle as part of dispatch thereof to the destination location; a server; at least one sensor communicatively coupled to the unmanned aerial vehicle and the server through a computer network to capture data related to an environment of a specific location covered by the at least one sensor, the server being at a location remote from the at least one sensor; and a processor associated with at least one of;
the at least one sensor and the server to detect at least one of;
a security breach and a security threat at the specific location based on analyzing the captured data,wherein one of;
the at least one sensor and the server is configured to automatically activate the flight plan of the at least one flight plan on the unmanned aerial vehicle in response to the detection of the at least one of;
the security breach and the security threat at the specific location, andwherein the unmanned aerial vehicle is configured to execute the sequence of operations defined in the flight plan to dispatch the unmanned aerial vehicle to perform additional surveillance of the specific location with regard to the detected at least one of;
the security breach and the security threat in accordance with interpretation of the specific location as the destination location of the unmanned aerial vehicle and the automatic activation of the flight plan on the unmanned aerial vehicle. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification