×

ROBOTIC ASSISTANCE IN SECURITY MONITORING

  • US 20160266577A1
  • Filed: 01/22/2016
  • Published: 09/15/2016
  • Est. Priority Date: 03/12/2015
  • Status: Active Grant
First Claim
Patent Images

1. A monitoring system, comprising:

  • one or more robotic devices;

    a plurality of sensors located at different locations throughout a property;

    one or more charging stations; and

    a monitor control unit, wherein the monitor control unit includes;

    a network interface;

    one or more processors; and

    one or more storage devices that include instructions that are operable, when executed by the one or more processors, to cause the one or more processors to perform operations comprising;

    detecting one or more events based on data received from one or more of the plurality of sensors;

    determining a location of one or more sensors of the plurality of sensors that has broadcasted data indicative of an event;

    determining a time of day;

    determining a number of detected events;

    determining an amount of time that the monitor control unit has been detecting events;

    determining a current state of the monitoring system based on the number of detected events and the amount of time that the monitor control unit has been detecting events;

    determining, from among multiple security strategies, a particular security strategy for responding to one or more of the detected events based on an evaluation of multiple factors including the data received from the one or more sensors, the determined time of day, and the determined current state of the monitoring system;

    accessing information describing the capabilities of each of the one or more robotic devices;

    selecting one or more of the robotic devices based on the particular security strategy; and

    transmitting a command to the one or more robotic devices that instructs each respective robotic device to navigate to one or more of the determined locations of the property to investigate one or more of the detected events based on the particular security strategy.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×