SYSTEM AND METHOD FOR THREAT MONITORING, DETECTION, AND RESPONSE
First Claim
1. A method for threat monitoring with a drone, the method comprising:
- receiving, at a first drone, an activation command indicating a given user'"'"'s need for monitoring;
deploying the first drone based on one or more of the activation command and a set of initial operational parameters, such that the first drone autonomously navigates to a first position with respect to the given user and performs a first configured action;
capturing, using one or more sensors on the first drone, a plurality of monitoring data signals corresponding to one or more of the given user and a given environment surrounding the given user;
transmitting, using a wireless transceiver on the first drone, one or more of the plurality of monitoring data signals to a remote monitoring system;
continuously analyzing the plurality of monitoring data signals to generate updated operational parameters causing the first drone to autonomously navigate to at least a second position with respect to the given user and perform at least a second configured action; and
performing at least a third configured action, wherein the third configured action is received at the wireless transceiver on the first drone from the remote monitoring system, and wherein the third configured action is generated based on a threat analysis of the one or more transmitted monitoring data signals performed by the remote monitoring system.
2 Assignments
0 Petitions
Accused Products
Abstract
A drone receives an activation command indicating a user'"'"'s need for monitoring, and is deployed based on the activation command and a set of initial operational parameters. The drone autonomously navigates to a first position with respect to the user and performs a first configured action. A plurality of monitoring data signals corresponding to the user and surrounding environment is captured using sensors on the drone, and is wirelessly transmitted by the drone to a remote monitoring system. The monitoring data signals are continuously analyzed to generate updated operational parameters causing the drone to autonomously navigate to a second position and perform a second configured action. A third configured action is received by the drone from the remote monitoring system, wherein the third configured action is generated based on a threat analysis performed by the remote monitoring system on the monitoring data signals.
-
Citations
37 Claims
-
1. A method for threat monitoring with a drone, the method comprising:
-
receiving, at a first drone, an activation command indicating a given user'"'"'s need for monitoring; deploying the first drone based on one or more of the activation command and a set of initial operational parameters, such that the first drone autonomously navigates to a first position with respect to the given user and performs a first configured action; capturing, using one or more sensors on the first drone, a plurality of monitoring data signals corresponding to one or more of the given user and a given environment surrounding the given user; transmitting, using a wireless transceiver on the first drone, one or more of the plurality of monitoring data signals to a remote monitoring system; continuously analyzing the plurality of monitoring data signals to generate updated operational parameters causing the first drone to autonomously navigate to at least a second position with respect to the given user and perform at least a second configured action; and performing at least a third configured action, wherein the third configured action is received at the wireless transceiver on the first drone from the remote monitoring system, and wherein the third configured action is generated based on a threat analysis of the one or more transmitted monitoring data signals performed by the remote monitoring system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification