EP-4742206-A1 - SYSTEMS AND METHODS FOR USE OF AUTONOMOUS ROBOTS FOR BLIND SPOT COVERAGE
Abstract
Systems and methods for use of autonomous mobile machine for blind spot coverage may include a security controller that determines a security coverage area based on data from a facility map indicating physical and functional representations of a facility and objects within the facility. The security controller may also determine a surveillance area based on the security coverage area. The security controller may also transmit, to an autonomous mobile machine, instructions for the autonomous mobile machine to deploy to the surveillance area and perform a security task at the surveillance area.
Inventors
- OUELLETTE, Jason M.
- LAM, Kapang
- TAN, YUFENG
- HOLTON, GLENN
Assignees
- Tyco Fire & Security GmbH
Dates
- Publication Date
- 20260513
- Application Date
- 20251106
Claims (15)
- A security system, comprising: a memory storing instructions; and one or more processors coupled with the memory and configured to execute the instructions to: determine a security coverage area of a facility based on data from a facility map indicating physical and functional representations of the facility and objects within the facility; determine a surveillance area based on the security coverage area; and transmit, to an autonomous mobile machine, instructions for the autonomous mobile machine to deploy to the surveillance area and perform a security task at the surveillance area.
- The security system of claim 1, wherein the data from the facility map is based on a building information model (BIM).
- The security system of claim 1 or 2, wherein the one or more processors is further configured to execute the instructions to: receive a fault indication corresponding to a security camera of the security system, wherein the surveillance area is further based on a location of the security camera in the facility and a capability of the security camera; optionally, wherein the fault indication indicates one or more of a degraded signal or a lost signal from the security camera.
- The security system of any of claims 1 to 3, wherein the one or more processors is further configured to execute the instructions to: determine a plurality of surveillance areas including the surveillance area; and determine priority levels of the plurality of surveillance areas, wherein the surveillance area is determined further based on the priority levels; optionally, wherein the one or more processors is further configured to execute the instructions to: generate a queue to send the autonomous mobile machine to the plurality of surveillance areas based on the priority levels, wherein the surveillance area is determined further based on the queue.
- The security system of any of claims 1 to 4, wherein the one or more processors is further configured to execute the instructions to: determine capabilities of the autonomous mobile machine; and select the autonomous mobile machine from a plurality of autonomous mobile machines based on the capabilities, wherein the instructions are transmitted to the autonomous mobile machine in response to the autonomous mobile machine being selected.
- The security system of any of claims 1 to 5, wherein the security task comprises releasing an agent to mitigate a spill of a material.
- The security system of any of claims 1 to 6, wherein the instructions include an identification of an applicable agent for mitigating the material from among a plurality of available agents; and/or wherein the instructions include an instruction for the autonomous mobile machine to close a door expected to be closed but detected as open or open another door expected to be open but detected as closed.
- A method for using autonomous mobile machines for surveillance coverage by a security system, comprising: determining a security coverage area of a facility based on data from a facility map indicating physical and functional representations of the facility and objects within the facility; determining a surveillance area based on the security coverage area; and transmitting, to the autonomous mobile machine, instructions for the autonomous mobile machine to deploy to the surveillance area and perform a security task at the surveillance area.
- The method of claim 8, wherein the data from the facility map is based on a building information model (BIM).
- The method of claim 8 or 9, further comprising: receiving a fault indication corresponding to a security camera of the security system, wherein the surveillance area is further based on a location of the security camera in the facility and a capability of the security camera; optionally, wherein the fault indication indicates one or more of a degraded signal or a lost signal from the security camera.
- The method of any of claims 8 to 10, further comprising: determining a plurality of surveillance areas including the surveillance area; and determining priority levels of the plurality of surveillance areas, wherein the surveillance area is determined further based on the priority levels; optionally, further comprising: generating a queue to send the autonomous mobile machine to the plurality of surveillance areas based on the priority levels, wherein the surveillance area is determined further based on the queue.
- The method of any of claims 8 to 11, further comprising: determining capabilities of the autonomous mobile machine; and selecting the autonomous mobile machine from a plurality of autonomous mobile machines based on the capabilities, wherein the instructions are transmitted to the autonomous mobile machine in response to the autonomous mobile machine being selected.
- A computer-readable medium storing computer executable code, comprising code to: determine a security coverage area of a facility based on data from a facility map indicating physical and functional representations of the facility and objects within the facility; determine a surveillance area based on the security coverage area; and transmit, to an autonomous mobile machine, instructions for the autonomous mobile machine to deploy to the surveillance area and perform a security task at the surveillance area.
- The computer-readable medium of claim 13, wherein the data from the facility map is based on a building information model (BIM).
- The computer-readable medium of claim 13 or 14, further comprising code to: receive a fault indication corresponding to a security camera of the security system, wherein the surveillance area is further based on a location of the security camera in the facility and a capability of the security camera; optionally, wherein the fault indication indicates one or more of a degraded signal or a lost signal from the security camera; and/or further comprising code to: determine a plurality of surveillance areas including the surveillance area; and determine priority levels of the plurality of surveillance areas, wherein the surveillance area is determined further based on the priority levels; optionally, further comprising code to: generate a queue to send the autonomous mobile machine to the plurality of surveillance areas based on the priority levels, wherein the surveillance area is determined further based on the queue.
Description
TECHNICAL FIELD The present disclosure relates generally to security systems, and more particularly, to systems and methods for use of an autonomous robots for blind spot coverage. BACKGROUND Security systems at facilities include camera devices fixed to walls or ceilings throughout the facilities to monitor areas of interest in the facilities. The security systems may rely on the camera devices to detect safety issues such as unauthorized individuals in the facilities, accidents, smoke/fire issues, and/or other safety issues. However, such camera devices may not provide coverage of all areas of interest in the facilities or may become temporarily or permanently non-functioning. In view of the foregoing, there is a need for improvements in security systems. SUMMARY This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the DETAILED DESCRIPTION. This summary is not intended to identify key features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. Embodiments according to the invention are disclosed in particular in the appended claims. In an aspect, a security system including a memory storing instructions, and one or more processors coupled with the memory, is provided. The security system may be configured to determine a security coverage area of a facility based on data from a facility map indicating physical and functional representations of the facility and objects within the facility. The security system may be configured to determine a surveillance area based on the security coverage area. The security system may be configured to transmit, to an autonomous mobile machine, instructions for the autonomous mobile machine to deploy to the surveillance area and perform a security task at the surveillance area. In an aspect, a method for using autonomous mobile machines for surveillance coverage by a security system, is provided. The method may include determining a security coverage area of a facility based on data from a facility map indicating physical and functional representations of the facility and objects within the facility. The method may include determining a surveillance area based on the security coverage area. The method may include transmitting, to the autonomous mobile machine, instructions for the autonomous mobile machine to deploy to the surveillance area and perform a security task at the surveillance area. In another aspect, a computer-readable medium storing computer executable code, is provided. The computer-readable medium may include code to determine a security coverage area of a facility based on data from a facility map indicating physical and functional representations of the facility and objects within the facility. The computer-readable medium may include code to determine a surveillance area based on the security coverage area. The computer-readable medium may include code to transmit, to an autonomous mobile machine, instructions for the autonomous mobile machine to deploy to the surveillance area and perform a security task at the surveillance area. Further aspects of the present disclosure are described in more details below. BRIEF DESCRIPTION OF THE DRAWINGS The disclosed aspects will hereinafter be described in conjunction with the appended drawings, provided to illustrate and not to limit the disclosed aspects, wherein like designations denote like elements, and in which: FIG. 1 is a conceptual diagram of an example security system, according to aspects of the present disclosure;FIG. 2 is a block diagram of an example map used by the security system of FIG. 1, according to aspects of the present disclosure;FIG. 3 is a flowchart of an example method implemented by the security system of FIG. 1, according to aspects of the present disclosure;FIG. 4 is a block diagram of the example security control system of FIG. 1 including various hardware components and other features, according to aspects of the present disclosure; andFIG. 5 is a block diagram of various example system components of the security system of FIG. 1, according to aspects of the present disclosure. DETAILED DESCRIPTION The detailed description set forth below in connection with the appended drawings is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of various concepts. However, it will be apparent to those skilled in the art that these concepts may be practiced without these specific details. In some instances, well known components may be shown in block diagram form in order to avoid obscuring such concepts. Security systems are often used at public and private facilities, such as commercial buildings, businesses, retail establishments, schools,