Personal security robotic vehicle

    公开(公告)号:US10725483B2

    公开(公告)日:2020-07-28

    申请号:US15693751

    申请日:2017-09-01

    Abstract: Various methods for monitoring a target user by a drone include tracking the target user by the drone, detecting an object in the presence of the target user based on one or more detection criteria, determining whether the object is a potential threat to the target user based on one or more threat criteria, determining whether to notify the third party of the potential threat to the target user based on one or more notification criteria in response to determining that the object is a potential threat, notifying the third party of the potential threat to the target user in response to determining that the third party should be notified, receiving a response from the third party including a command, and performing an action based on the command.

    System and method of generating a semantic representation of a target image for an image processing operation

    公开(公告)号:US10515289B2

    公开(公告)日:2019-12-24

    申请号:US15401261

    申请日:2017-01-09

    Abstract: Various embodiments may include a computing device analyzing an image to identify one or more elements of interest in the image, identifying concepts associated with elements of interest in the image, and identifying potential elements of interest and potential concepts that are not included in the image using other information. Various embodiments may include presenting the one or more elements of interest, the one or more potential elements of interest, and the one or more concepts, receiving a user input that selects one or more of the one or more elements of interest, the one or more potential elements of interest, and the one or more concepts identified in the identified elements of interest and concepts or any combination thereof for a target image, and generating the semantic representation of the target image based on the selected elements of interest and concepts.

    On-Device Behavioral Analysis To Detect Malfunction Due To RF Interference
    6.
    发明申请
    On-Device Behavioral Analysis To Detect Malfunction Due To RF Interference 审中-公开
    用于检测RF干扰引起的故障的设备上行为分析

    公开(公告)号:US20160242050A1

    公开(公告)日:2016-08-18

    申请号:US14620341

    申请日:2015-02-12

    Abstract: Systems, methods, and devices of the various aspects enable detecting a malfunction caused by radio frequency (RF) interference. A computing device processor may identify a location of the computing device based on a plurality of real-time data inputs received by the computing device. The processor may characterize an RF environment of the computing device based on the identified location and the plurality of real-time data inputs. The processor may determine at least one RF emissions threshold based on the characterization of the RF environment. The processor may compare the characterization of the RF environment to the at least one RF emissions threshold, and may perform an action in response to determining that the characterization of the RF environment exceeds the at least one RF emissions threshold.

    Abstract translation: 各方面的系统,方法和装置能够检测由射频(RF)干扰引起的故障。 计算设备处理器可以基于由计算设备接收的多个实时数据输入来识别计算设备的位置。 处理器可以基于所识别的位置和多个实时数据输入来表征计算设备的RF环境。 处理器可以基于RF环境的表征来确定至少一个RF发射阈值。 处理器可以将RF环境的特征与至少一个RF发射阈值进行比较,并且可以响应于确定RF环境的表征超过至少一个RF辐射阈值来执行动作。

    Personal Security Robotic Vehicle
    8.
    发明申请

    公开(公告)号:US20190072985A1

    公开(公告)日:2019-03-07

    申请号:US15693751

    申请日:2017-09-01

    Abstract: Various methods for monitoring a target user by a drone include tracking the target user by the drone, detecting an object in the presence of the target user based on one or more detection criteria, determining whether the object is a potential threat to the target user based on one or more threat criteria, determining whether to notify the third party of the potential threat to the target user based on one or more notification criteria in response to determining that the object is a potential threat, notifying the third party of the potential threat to the target user in response to determining that the third party should be notified, receiving a response from the third party including a command, and performing an action based on the command.

    System And Method Of Generating A Semantic Representation Of A Target Image For An Image Processing Operation

    公开(公告)号:US20180197040A1

    公开(公告)日:2018-07-12

    申请号:US15401261

    申请日:2017-01-09

    Abstract: Various embodiments may include a computing device analyzing an image to identify one or more elements of interest in the image, identifying concepts associated with elements of interest in the image, and identifying potential elements of interest and potential concepts that are not included in the image using other information. Various embodiments may include presenting the one or more elements of interest, the one or more potential elements of interest, and the one or more concepts, receiving a user input that selects one or more of the one or more elements of interest, the one or more potential elements of interest, and the one or more concepts identified in the identified elements of interest and concepts or any combination thereof for a target image, and generating the semantic representation of the target image based on the selected elements of interest and concepts.

    PERSONAL SECURITY ROBOTIC VEHICLE
    10.
    发明申请

    公开(公告)号:US20200257319A1

    公开(公告)日:2020-08-13

    申请号:US16865339

    申请日:2020-05-02

    Abstract: Various methods for monitoring a target user by a robotic vehicle include tracking the target user by the robotic vehicle, detecting an object in the presence of the target user based on one or more detection criteria, determining whether the object is a potential threat to the target user based on one or more threat criteria, determining whether to notify the third party of the potential threat to the target user based on one or more notification criteria in response to determining that the object is a potential threat, and notifying the third party of the potential threat to the target user in response to determining that the third party should be notified.

Patent Agency Ranking