Unmanned vehicle security guard

ABSTRACT

Unmanned vehicles can be terrestrial, aerial, nautical, or multi-mode. Unmanned vehicles may be used to survey a property in response to or in anticipation of a threat. For example, an unmanned vehicle may analyze information about the property and based on the information deter theft of items on the property.

CROSS-REFERENCE TO RELATED APPLICATION

The present application claims priority to and is a continuation of U.S.patent application Ser. No. 16/676,875, filed Nov. 7, 2019, which is acontinuation of U.S. patent application Ser. No. 15/596,898, filed May16, 2017, now U.S. Pat. No. 10,474,168, which issued on Nov. 12, 2019,which claims priority to, and the benefit of Provisional PatentApplication No. 62/337,071 filed May 16, 2016, which is incorporatedherein by reference in its entirety.

BACKGROUND OF THE INVENTION

Unmanned vehicles (e.g., unmanned aerial vehicles) are known for theiruse in combat zones. In combat zones, they are often used to surveillean area, damage a structures, or lethally wound a potential enemycombatant. The use of unmanned vehicles can go far beyond theaforementioned examples, especially outside of a combat zone and in acommercial setting. Businesses of all sorts are now developinginnovative ways to use unmanned vehicles to benefit their business.

SUMMARY

Unmanned vehicles can be terrestrial, aerial, nautical, or multi-mode.Unmanned vehicles may be used to surveille a property in response to orin anticipation of a threat. For example, an unmanned vehicle mayanalyze information about the property and based on the informationdeter theft of items on the property.

This Summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This Summary is not intended to identify key features oressential features of the claimed subject matter, nor is it intended tobe used to limit the scope of the claimed subject matter. Furthermore,the claimed subject matter is not constrained to limitations that solveany or all disadvantages noted in any part of this disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

A more detailed understanding may be had from the following description,given by way of example in conjunction with the accompanying drawingswherein:

FIG. 1 illustrates an exemplary system associated with a unmannedvehicle security guard;

FIG. 2 illustrates an overhead view of an exemplary neighborhood thatmay be surveilled by an unmanned vehicle;

FIG. 3 illustrates an exemplary method for providing security using anunmanned vehicle;

FIG. 4 is an exemplary block diagram representing a computer system inwhich aspects of the methods and systems disclosed herein or portionsthereof may be incorporated.

DETAILED DESCRIPTION

Unmanned vehicles may be used to proactively or reactively secure one ormore properties. For example, an unmanned vehicle may surveille aproperty in response to or in anticipation of a threat. For example, anunmanned vehicle may analyze information about the property and based onthe information deter theft of items on the property.

FIG. 1 illustrates an exemplary system 90 associated with an unmannedvehicle security guard. Unmanned vehicle 100 includes sensor 145, dataanalysis engine 120, route determination engine 130, and sensormanagement engine 140. Unmanned vehicle 100 may be communicativelyconnected with network 50 and server 150. A business (e.g., an insuranceprovider or law enforcement agency) may own or have control of unmannedvehicle 100, network 50, or server 150. Person 131 (e.g., a homeowner orintruder) may be located in area 146 and vehicle 132 (e.g., anautomobile, motorcycle, or boat—possibly unmanned) may be located inarea 147, as shown.

With continued reference to FIG. 1 , data analysis engine 120, routedetermination engine 130, and sensor management engine 140 are logicalentities that may be implemented in the form of software (e.g.,computer-executable instructions) stored in a memory of, and executingon a processor of unmanned vehicle 100, server 150, or another computersystem such as illustrated in FIG. 4 . Data analysis engine 120 mayanalyze data retrieved by sensor 145. Analysis by data analysis engine120 may include comparing image data of person 131 or vehicle 132 toother information (e.g., information on server 150) to identify vehicle132 or person 131. Route determination engine 130 may be utilized tomanage unmanned vehicle 100, which may include confirming that unmannedvehicle 100 remains on a planned path based on a particular mission.Route determination engine 130 may also determine modifications to aroute of unmanned vehicle 100 based on gathered information. Forexample, if additional images (e.g., picture or video) are needed of analleged intruder (e.g., a certain location, which may include adifferent perspective or angle) route determination engine 130 mayrequest unmanned vehicle 100 to vary the planned path accordingly, whichmay change the parameters of the mission. Another example may be forunmanned vehicle 100 to pursue person 131 (e.g., an alleged intruder) inorder to identify the position of person 131 until law enforcementarrives.

Sensor management engine 140 controls sensor 145. This control mayinclude directing which sensor of a plurality of sensors gathersinformation, directing the operating characteristics of said informationgathering (e.g., the level of zoom of a visible light camera), directingwhere sensor 145 is aimed, or any other sensor performance controlvariables. It is contemplated herein that sensor 145 may include avisible light camera, an infrared camera, a microphone, a particleinspection device (e.g., a device that can detect what compounds are insampled air gathered by unmanned vehicle 100), radar emitting/detectingdevice(s), a spectrometer, a hyperspectral sensor, a temperature sensor,a humidity sensor, a gas sensor, or a navigation sensor, among otherthings.

FIG. 2 illustrates an overhead view of a neighborhood 160 that one ormore unmanned vehicles may patrol. As shown, there may be a plurality ofhouses, such as house 162, in neighborhood 160. House 162 may have oneor more sensors attached to it or the surrounding land within theproperty line associated with house 162. Neighborhood 160 may have aplurality of unmanned vehicles, such as unmanned vehicle 100, unmannedvehicle 166, unmanned vehicle 167, or unmanned vehicle 168. There may bea vehicle 132 in neighborhood 160 and persons, such as person 131 orperson 164. Vehicle 132 may include sensors and may be a smart car thatmay have automated features with regard to self-driving or remote turnon/off. The houses, cars, and unmanned vehicles in neighborhood 160 maybe communicatively connected with each other and share informationcaptured by their respective sensors, indications of a threat level, orother information.

FIG. 3 illustrates an exemplary method to secure one or more propertieswith use of an unmanned vehicle. At step 171, the environment (hereneighborhood 160) is sensed by one more sensors. The sensed informationmay be from sensor 145 of unmanned vehicle 100 or other sensors ordevices of house 162, vehicle 132, person 164, person 131, or sensors ofunmanned vehicles 166, 167, and 168. In an example, house 162, vehicle162, or unmanned vehicle 166 may have sensors that include a camera ormotion detector, among other things. Person 164 or person 131 may havelocation sensors, cameras, wearable activity sensors, or manualindicators (e.g., alert button or text message), among other things.Activity sensors (also known as activity trackers) are wireless-enabledwearable devices that measure data such as the number of steps walked,heart rate, quality of sleep, steps climbed, and other personal metrics.Heart rate and other information from the activity sensor may be used todetermine threat level. For example, higher the heart rate, then may bethe more likely a threat. The heart rate may be compared to a baselineof that person. The heart rate may be indication that someone elseproximate to the sensed person is a threat.

At step 172, a threat level may be determined based on at least thesensed information of step 171. The sensed information of step 171 maybe combined in a variety ways with other information to determine thethreat level of a general environment (e.g., neighborhood 160 overall),person (e.g., person 131), or thing (e.g., vehicle 132—car bomb). Thedetermination and display of the threat level may occur in real-time.The threat level may be constantly updated. In an example, house 162 andvehicle 132 may sense movement, which may trigger unmanned vehicle 100to investigate an area proximate to house 162 and vehicle 132. Whenunmanned vehicle 100 arrives proximate to house 162, it may sense (e.g.,via a camera) the activity or identity of a person, animal, or thing. Inthis example, the threat level may be determined by analyzing acombination of information including sensed movement from house 162 andvehicle 132 (e.g., movement or speed of movement), sensed identity(e.g., facial recognition) and activity patterns (e.g., sidewalk orbushes) of a person by unmanned vehicle 100, heart rate of person 131 byactivity sensor, time of day, or history of negative activity (e.g.,break-ins) proximate to house 162, among other things.

As discussed herein, identity may be sensed in different ways. Forexample, person 131 may have a mobile device or activity sensor thatwirelessly transmits identity of person 131 when unmanned vehicle 100 iswithin a particularly close distance (e.g., 10 feet) of person 131. Inanother example, person 131 may have an ID that may communicate via RFIDor a driver's license type ID with a barcode that may be scanned bysensor 145 of unmanned vehicle 100. In another example, an authorizedperson (e.g., a homeowner—person 164) of the security system ofneighborhood 160 may program a temporary (e.g., 2 hours or a day)authorization code for person 131, just in case person 131 is observedin neighborhood 160 by unmanned vehicle 100. The authorization code maybe associated with an RFID, driver's license, mobile phone, or activitytracker. In addition, the authorization code may be associated with ahand gesture, spoken code, texted code, or facial recognition, amongother things. Threat level considerations that may tie into identity mayinclude how many times and what issues occurred when person 131, animal(e.g., wolf), or thing (e.g., car) entered into neighborhood 160 duringa previous period, if at all.

With continued reference to FIG. 3 , at step 173, the area (e.g.,neighborhood 160, area 147, area 146, or area 169) may be secured basedon the determined threat level. Securing an area may include sendingalerts, triggering sirens, turning off devices in an area, or otheractions which deter or neutralize a threat. In an example, the threatlevel of step 172 may be formerly classified based on the threat levelreaching a certain threshold. For instance, the classification systemmay include four threshold levels which may be classified as low,elevated, high, or severe. The classifications may be displayed on adigitally displayed neighborhood map (e.g., a real-time updated heat mapof threat levels of areas around houses in neighborhood 160) or sent toa subscriber mobile device via text message, among other things. Theclassifications may also provide for mandatory actions by unmannedvehicle 100 or other devices in neighborhood 160. For example, at aclassified high threat level, there may be mandatory video recording ofall devices in neighborhood 160 or mandatory enablement of locationservices for all wireless devices in neighborhood 160.

As discussed herein, when the threat level reaches a threshold level(e.g., high threat level or 90 rating), unmanned vehicle 100 may takecertain actions to secure neighborhood 160. In an example, when unmannedvehicle 100 determines a high threat level based on sensed informationfrom sensor 145, the entire neighborhood 160 may be lit or regions ofneighborhood 160 may be lit based on lights being proximate (e.g., area169) to the security threat, which may be person 131. An example actionby unmanned vehicle 100 may be to tag person 131 with an electronicbeacon, with fluorescent paint, or the like. Based on the tag areas maybe lit up, as well as alerts sent to different devices (e.g., mobiledevice). Fluorescent paint may be discovered or tracked by a camera,while an electronic beacon may send out wireless signals. Anotherexample action may be for unmanned vehicle 100 to follow and videorecord person 100. The video recording may be live streamed totelevisions or mobile devices in neighborhood 160. Another exampleaction may be for unmanned vehicle 100 to split into multiple drones andfollow person 131 and person 164.

With continued reference to step 173 of FIG. 3 , in a first examplescenario, person 131 may have a high threat level. Cameras throughoutneighborhood 160 may be directed to turn to the location of unmannedvehicle 100 or the location of person 131 based on other sensedinformation from unmanned vehicle 100. Unmanned vehicle 100 may be usedas beacon for other security related systems in neighborhood 160 tofocus on or be directed by. In a second example scenario, unmannedvehicle 100 may indicate it is low on battery life. Because theintegration of the security systems throughout neighborhood 160,unmanned vehicle 168 may automatically communicate that it will take theplace of unmanned vehicle 100. In a third example scenario, person 131may have a high threat level. A plurality of unmanned vehicles, such asunmanned vehicle 100, unmanned vehicle 166, and unmanned vehicle 167 mayconverge on area 169. Unmanned vehicle 100, unmanned vehicle 166, andunmanned vehicle 167 may be strategically placed in locations aroundperson 131 (e.g., a perimeter) based on the geography of neighborhood160 (e.g., cliffs, dead-end roads, walls, etc. . . . ). The geography ofneighborhood 160 may be used to determine not only location, but thenumber of unmanned vehicles used to surveille person 131. Unmannedvehicle 100 may shutdown self-driving/automated vehicles (e.g., vehicle132) in area 169, lock down houses (e.g., doors and windows of house162), send alerts via social media, alert law enforcement, or alertinsurance service providers for a possible claim, among other things.The unmanned vehicles of neighborhood 160 may be positioned based oncrime statistics (e.g., break-ins), which may or may not be based onthreat level.

Unmanned vehicle 100 may be attached to house 162 and deployedperiodically to proactively surveille house 162 or other property inneighborhood 160. Deployment of unmanned vehicle 100 may be responsiveto sensed information (e.g., motion) or historical information (crimestatistics of neighborhood 160 or comparable neighborhoods). Unmannedvehicle 100 may be a shared resource for service providers (e.g.,insurance providers). House 162 may be a smart home or the like.Generally, a smart home may be considered a home equipped with lighting,heating, and other electronic devices that may be controlled remotely byphone or computer and may be programmed to be automated. Multipleunmanned vehicles may be deployed based on the reason of deployment,specifications of an unmanned vehicle (e.g., range of unmanned vehicle),or consideration of information gathered after deployment. Unmannedvehicle 100 may release another unmanned vehicle (not shown) that may besmaller and be able go into restricted areas (e.g., inside a home).Unmanned vehicle 100 may have multiple sensors.

Sensed information may be encrypted, stored, or shared according tovarious criteria. In a fourth example scenario, unmanned vehicle 100 mayindicate that it desires the identity of person 131. As discussedherein, person 131 may have an RFID, driver's license, or mobile devicethat is able to provide the identity of person 131. In an example, themobile device may not send the identification to unmanned vehicle 100directly, but may determine the most secure link (e.g., WiFi of house162) to securely connect with server 150. Server 150 may send only anindication of authorization (no identity information) to unmannedvehicle 100.

The present disclosure is directed to an unmanned vehicle securityguard. It is to be understood that any terms, phrases, structural andfunctional details, disclosed herein are merely examples for teachingvarious ways to employ the present disclosure.

Unless defined otherwise, all technical and scientific terms used hereinhave the same meaning as commonly understood by one of ordinary skill inthe art to which this invention belongs. Although any methods andmaterials similar or equivalent to those described herein can also beused in the practice or testing of the present disclosure, exemplarymethods and materials are now described.

It must be noted that as used herein and in the appended claims, thesingular forms “a”, “an,” and “the” include plural referents unless thecontext clearly dictates otherwise. Thus, for example, reference to “astimulus” includes a plurality of such stimuli and reference to “thesignal” includes reference to one or more signals and equivalents.

Although at least one series of steps are presented as an exemplarymethod of practicing one or more examples described herein, it iscontemplated that the steps identified may be practiced in any orderthat is practicable, including without limitation the omission of one ormore steps.

It is to be appreciated that network 50 depicted in FIG. 1 , forexample, may include a local area network (LAN), a wide area network(WAN), a personal area network (PAN), or combinations thereof. Suchnetworking environments are commonplace in offices, enterprise-widecomputer networks, intranets, and the Internet. For instance, when usedin a LAN networking environment, system 90 is connected to the LANthrough a network interface or adapter (not shown). When used in a WANnetworking environment, the computing system environment typicallyincludes a modem or other means for establishing communications over theWAN, such as the Internet. The modem, which may be internal or external,may be connected to a system bus via a user input interface, or viaanother appropriate mechanism. In a networked environment, programmodules depicted relative to system 90, or portions thereof, may bestored in a remote memory storage device such as storage medium.Computing devices may communicate over network 50 through one or morecommunications links formed between data interfaces. Communication linksmay comprise either wired or wireless links. It is to be appreciatedthat the illustrated network connections in the figures (e.g., FIG. 1 orFIG. 4 ) are exemplary and other ways of establishing a communicationslink between multiple devices may be used.

FIG. 4 and the following discussion are intended to provide a briefgeneral description of a suitable computing environment in which themethods and systems disclosed herein or portions thereof may beimplemented. Although not required, the methods and systems disclosedherein is described in the general context of computer-executableinstructions, such as program modules, being executed by a computer,such as a client workstation, server, personal computer, or mobilecomputing device such as a smartphone. Generally, program modulesinclude routines, programs, objects, components, data structures and thelike that perform particular tasks or implement particular abstract datatypes. Moreover, it should be appreciated the methods and systemsdisclosed herein and/or portions thereof may be practiced with othercomputer system configurations, including hand-held devices,multi-processor systems, microprocessor-based or programmable consumerelectronics, network PCs, minicomputers, mainframe computers and thelike. A processor may be implemented on a single-chip, multiple chips ormultiple electrical components with different architectures. The methodsand systems disclosed herein may also be practiced in distributedcomputing environments where tasks are performed by remote processingdevices that are linked through a communications network. In adistributed computing environment, program modules may be located inboth local and remote memory storage devices.

FIG. 4 is a block diagram representing a general purpose computer systemin which aspects of the methods and systems disclosed herein and/orportions thereof may be incorporated. As shown, the exemplary generalpurpose computing system includes a computer 920 or the like, includinga processing unit 921, a system memory 922, and a system bus 923 thatcouples various system components including the system memory to theprocessing unit 921. The system bus 923 may be any of several types ofbus structures including a memory bus or memory controller, a peripheralbus, and a local bus using any of a variety of bus architectures. Thesystem memory includes read-only memory (ROM) 924 and random accessmemory (RAM) 925. A basic input/output system 926 (BIOS), containing thebasic routines that help to transfer information between elements withinthe computer 920, such as during start-up, is stored in ROM 924.

The computer 920 may further include a hard disk drive 927 for readingfrom and writing to a hard disk (not shown), a magnetic disk drive 928for reading from or writing to a removable magnetic disk 929, and anoptical disk drive 930 for reading from or writing to a removableoptical disk 931 such as a CD-ROM or other optical media. The hard diskdrive 927, magnetic disk drive 928, and optical disk drive 930 areconnected to the system bus 923 by a hard disk drive interface 932, amagnetic disk drive interface 933, and an optical drive interface 934,respectively. The drives and their associated computer-readable mediaprovide non-volatile storage of computer readable instructions, datastructures, program modules and other data for the computer 920. Asdescribed herein, computer-readable media is a tangible, physical, andconcrete article of manufacture and thus not a signal per se.

Although the exemplary environment described herein employs a hard disk,a removable magnetic disk 929, and a removable optical disk 931, itshould be appreciated that other types of computer readable media whichcan store data that is accessible by a computer may also be used in theexemplary operating environment. Such other types of media include, butare not limited to, a magnetic cassette, a flash memory card, a digitalvideo or versatile disk, a Bernoulli cartridge, a random access memory(RAM), a read-only memory (ROM), and the like.

A number of program modules may be stored on the hard disk, magneticdisk 929, optical disk 931, ROM 924 or RAM 925, including an operatingsystem 935, one or more application programs 936, other program modules937 and program data 938. A user may enter commands and information intothe computer 920 through input devices such as a keyboard 940 andpointing device 942. Other input devices (not shown) may include amicrophone, joystick, game pad, satellite disk, scanner, or the like.These and other input devices are often connected to the processing unit921 through a serial port interface 946 that is coupled to the systembus, but may be connected by other interfaces, such as a parallel port,game port, or universal serial bus (USB). A monitor 947 or other type ofdisplay device is also connected to the system bus 923 via an interface,such as a video adapter 948. In addition to the monitor 947, a computermay include other peripheral output devices (not shown), such asspeakers and printers. The exemplary system of FIG. 4 also includes ahost adapter 955, a Small Computer System Interface (SCSI) bus 956, andan external storage device 962 connected to the SCSI bus 956.

The computer 920 may operate in a networked environment using logicalconnections to one or more remote computers, such as a remote computer949. The remote computer 949 may be a personal computer, a server, arouter, a network PC, a peer device or other common network node, andmay include many or all of the elements described above relative to thecomputer 920, although only a memory storage device 950 has beenillustrated in FIG. 4 . The logical connections depicted in FIG. 4include a local area network (LAN) 951 and a wide area network (WAN)952. Such networking environments are commonplace in offices,enterprise-wide computer networks, intranets, and the Internet.

When used in a LAN networking environment, the computer 920 is connectedto the LAN 951 through a network interface or adapter 953. When used ina WAN networking environment, the computer 920 may include a modem 954or other means for establishing communications over the wide areanetwork 952, such as the Internet. The modem 954, which may be internalor external, is connected to the system bus 923 via the serial portinterface 946. In a networked environment, program modules depictedrelative to the computer 920, or portions thereof, may be stored in theremote memory storage device. It will be appreciated that the networkconnections shown are exemplary and other means of establishing acommunications link between the computers may be used.

Computer 920 may include a variety of computer readable storage media.Computer readable storage media can be any available media that can beaccessed by computer 920 and includes both volatile and nonvolatilemedia, removable and non-removable media. By way of example, and notlimitation, computer readable media may comprise computer storage mediaand communication media. Computer storage media include both volatileand nonvolatile, removable and non-removable media implemented in anymethod or technology for storage of information such as computerreadable instructions, data structures, program modules or other data.Computer storage media include, but are not limited to, RAM, ROM,EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disks (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by computer 920. Combinations of any of theabove should also be included within the scope of computer readablemedia that may be used to store source code for implementing the methodsand systems described herein. Any combination of the features orelements disclosed herein may be used in one or more examples.

In describing preferred examples of the subject matter of the presentdisclosure, as illustrated in the Figures, specific terminology isemployed for the sake of clarity. The claimed subject matter, however,is not intended to be limited to the specific terminology so selected,and it is to be understood that each specific element includes alltechnical equivalents that operate in a similar manner to accomplish asimilar purpose.

This written description uses examples to disclose the invention,including the best mode, and also to enable any person skilled in theart to practice the invention, including making and using any devices orsystems and performing any incorporated methods. The patentable scope ofthe invention is defined by the claims, and may include other examples.Such other examples are intended to be within the scope of the claims ifthey have structural elements that do not differ from the literallanguage of the claims, or if they include equivalent structuralelements with insubstantial differences from the literal languages ofthe claims.

What is claimed is:
 1. An unmanned vehicle comprising: a processor; anda memory coupled with the processor, the memory having stored thereonexecutable instructions that when executed by the processor cause theprocessor to effectuate operations comprising: receiving data collectedby an activity sensor, wherein the data is associated with a personwithin a surveilled environment; analyzing the data collected by theactivity sensor; determining, based on the analyzed data, a threat levelassociated with the person; and securing, based on the determined threatlevel, the surveilled environment.
 2. The unmanned vehicle of claim 1,wherein the operations further comprise: receiving external data from adevice external to the unmanned vehicle; analyzing the external data;and determining, based on the analyzed external data, the threat level.3. The unmanned vehicle of claim 1, wherein the operations furthercomprise patrolling an area of the surveilled environment.
 4. Theunmanned vehicle of claim 1, wherein the activity sensor comprises acamera; and wherein the operations further comprise controlling a zoomlevel and a direction of aim of the camera.
 5. The unmanned vehicle ofclaim 1, wherein the activity sensor comprises a device worn by theperson and the data comprises at least one of steps walked, heart rate,quality of sleep, and steps climbed.
 6. The unmanned vehicle of claim 1,wherein the securing the surveilled environment comprises transmittingan alert indicative of the threat level to one or more devices externalto the unmanned vehicle.
 7. A system comprising: an activity sensor; andan unmanned vehicle in communication with the activity sensor, whereinthe unmanned vehicle is configured to: receive data from the activitysensor, wherein the data is associated with a person within a surveilledenvironment, analyze the data received from the activity sensor,determine, based on the analyzed data, a threat level associated withthe person, and secure, based on the determined threat level, thesurveilled environment.
 8. The system of claim 7, wherein the unmannedvehicle comprises an unmanned aerial vehicle.
 9. The system of claim 7,wherein the unmanned vehicle comprises: a first unmanned vehicle; and asecond unmanned vehicle configured to: house the first unmanned vehicle;deploy the first unmanned vehicle; and guide the first unmanned vehicle.10. The system of claim 7, wherein unmanned vehicle is configured tosecure the surveilled environment by: tagging, with paint or anelectronic beacon, the person or an object in the surveilledenvironment; and transmitting a notification indicative of the taggingto one or more devices associated with the surveilled environment. 11.The system of claim 7, wherein the activity sensor is configured to scanan identification barcode and identify the person based on the scanningthe identification barcode.
 12. A method comprising: receiving, by anunmanned vehicle and from an activity sensor, data associated with aperson within a surveilled environment; analyzing, by the unmannedvehicle, the data received from the activity sensor; determining, by theunmanned vehicle and based on the analyzed data, a threat levelassociated with the person; and securing, by the unmanned vehicle andbased on the determined threat level, the surveilled environment. 13.The method of claim 12, wherein the activity data received from thesensor comprises a heart rate of the person; and wherein the analyzingthe data comprises comparing the heart rate of the person to a baselineheart rate of the person.
 14. The method of claim 12, wherein the datafrom the sensor comprises an image of the person and wherein theanalyzing the data comprises comparing, by the unmanned vehicle, theimage to stored information, and identifying, by the unmanned vehicleand based on the comparing the image to the stored information, theperson.
 15. The method of claim 12, further comprising: navigating, bythe unmanned vehicle, a planned path; and modifying, by the unmannedvehicle and based on the data from the activity sensor, the plannedpath.
 16. The method of claim 15, wherein the modifying the planned pathis based on a travel path of the person.
 17. The method of claim 12,wherein the securing the surveilled environment comprises causing, bythe unmanned vehicle, at least one device associated with the surveilledenvironment to turn on or to turn off.
 18. The method of claim 12,wherein the securing the surveilled environment comprises causing, bythe unmanned vehicle, one or more structures in the surveilledenvironment to lock.
 19. The method of claim 12, further comprisingaccessing, by the unmanned vehicle and based on the data received fromthe activity sensor, stored information associated with the surveilledenvironment; and wherein the determining the threat level is furtherbased on the accessed information.
 20. The method of claim 12, whereinthe security the surveilled environment comprises transmitting, by theunmanned vehicle and to another unmanned vehicle, a request for theanother unmanned vehicle to travel to a position at the surveilledenvironment.