System and Method for Virtual Inspection of a Structure

ABSTRACT

A computer implemented method for linking an underwriting action to a customer is presented. The method receives an inspection model corresponding to a geographic location associated with a structure and determines that a virtual inspection is necessary based on the inspection model. The method also retrieves a first aerial image corresponding to the geographic location and a second aerial image corresponding to the geographic location and a time threshold. The method further receives a comparison data value corresponding to the first and second aerial image, determines an underwriting action based on the comparison data and links the underwriting action to a customer account.

FIELD OF THE DISCLOSURE

The present disclosure generally relates to a system and method forvirtual inspection of a structure by company employees in an insurancequote and underwriting processes.

BACKGROUND

The background description provided herein is for the purpose ofgenerally presenting the context of the disclosure. Work of thepresently named inventors, to the extent it is described in thisbackground section, as well as aspects of the description that may nototherwise qualify as prior art at the time of filing, are neitherexpressly nor impliedly admitted as prior art against the presentdisclosure.

Traditionally, in order for insurance underwriters to properly makedecisions concerning insurance products, a physical inspection of astructure or property is often necessary. For example, the underwritermay need to know the condition of a structure, information about theproperty surrounding (such as liability concerns, fire hydrants, etc.),assess damage to the structure, or determine whether the properstructure is on the property Traditionally, this inspection processrequired a company employee to physically travel to the location inquestion and physically inspect the property. Physical inspections arelabor intensive, time-consuming, expensive and usually focus on theexterior physical characteristics of a home as well as liabilityexposures.

SUMMARY

This Summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This Summary is not intended to identify key features oressential features of the claimed subject matter, nor is it intended tobe used to limit the scope of the claimed subject matter.

In one embodiment, a computer implemented method for linking anunderwriting action to a customer account includes receiving, via acomputer network, an inspection model, wherein the inspection modelcorresponds to a geographic location associated with a structure anddetermining, at one or more processors, that a virtual inspection isrecommended based on the inspection model. The method may also includeretrieving, via the computer network, a first aerial image, wherein thefirst aerial image corresponds to the geographic location and a secondaerial image, wherein the second aerial image corresponds to thegeographic location and a time threshold. The method further includesreceiving a comparison data value corresponding to the first and secondaerial image, determining, at the one or more processors, anunderwriting action based on the comparison data and linking, at the oneor more processors, the underwriting action to a customer account.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a simplified and exemplary block diagram of a system forvirtual inspection of a structure;

FIG. 2 is an exemplary architecture of server of a system for virtualinspection of a structure;

FIG. 3 is flow chart illustrating a method for linking an action item toa customer account;

FIG. 4 a is a flow chart illustrating a method for virtual inspection ofa structure;

FIG. 5 is a flow chart illustrating a method for intelligent aerialimage data analysis determining a best aerial image data source;

FIG. 6 is an exemplary aerial image;

FIG. 7 is a flow chart illustrating a method for determining if two ormore objects in an image are within a threshold distance of each other;and

FIG. 8 is a flow chart illustrating an exemplary method for identifyingone or more objects in an aerial image.

The figures depict a preferred embodiment of the present invention forpurposes of illustration only. One skilled in the art will readilyrecognize from the following discussion that alternative embodiments ofthe structures and methods illustrated herein may be employed withoutdeparting from the principles of the invention described herein.

DETAILED DESCRIPTION

Although the following text sets forth a detailed description ofnumerous different embodiments, it should be understood that the legalscope of the description is defined by the words of the claims set forthat the end of this patent. The detailed description is to be construedas exemplary only and does not describe every possible embodiment sincedescribing every possible embodiment would be impractical, if notimpossible. Numerous alternative embodiments could be implemented, usingeither current technology or technology developed after the filing dateof this patent, which would still fall within the scope of the claims.

It should also be understood that, unless a term is expressly defined inthis patent using the sentence “As used herein, the term “ ” is herebydefined to mean . . . ” or a similar sentence, there is no intent tolimit the meaning of that term, either expressly or by implication,beyond its plain or ordinary meaning, and such term should not beinterpreted to be limited in scope based on any statement made in anysection of this patent (other than the language of the claims). To theextent that any term recited in the claims at the end of this patent isreferred to in this patent in a manner consistent with a single meaning,that is done for sake of clarity only so as to not confuse the reader,and it is not intended that such claim term be limited, by implicationor otherwise, to that single meaning. Finally, unless a claim element isdefined by reciting the word “means” and a function without the recitalof any structure, it is not intended that the scope of any claim elementbe interpreted based on the application of 35 U.S.C. §112, sixthparagraph.

Traditionally, aerial images were not reliable due to their age,availability, and resolution. Because of these limitations, the actionsthat underwriters could take based on them alone has been limited. Forexample, underwriters can compare these photos with agent submittedphotos for more information, or to identify exposures that may not havebeen included in other available photos. If there is a problemidentified, however, underwriters must still request a physicalinspection, or must communicate concerns to an agent to resolve issues.Due to the above-mentioned current limitations, adverse underwritingaction was limited based on aerial imagery alone. Instead, aerialimagery is an input into a larger process for underwriting action.

The systems and method of aerial imaging described herein provideunderwriters a tool that utilizes multiple forms of aerial imagetechnology to enable underwriters to make decisions and takeunderwriting action without having to transfer applications to otherworks queues. The system provides underwriters with streamlined accessto high-resolution aerial imagery that enable access to low-leveldetails on an individual property regarding exterior physicalcharacteristics and potential liability hazards on the property. Thesystems and methods presented further provide underwriters access torecent satellite images in order to check the validity or current stateof a property. Although the satellite images are not as high-resolution,the satellite images can be cross-referenced with the high resolutionimages in order to determine significant changes in the physicalcharacteristics of the home, such as the presence of liability hazardson the property, room additions, etc.

The innovation discussed herein utilizes aerial imaging technology toincorporate the ability for an underwriter to take action on a policysolely based on the aerial imagery. By combining highly reliable aerialimagery with up to date lower-resolution satellite imagery, the systemis designed to allow an underwriter to quickly and efficiently determinewhether a physical inspection, virtual inspection, or no inspection isnecessary.

FIG. 1 illustrates various aspects of an exemplary architecture forimplementing a virtual inspection system 100. The high-levelarchitecture includes both hardware and software applications, as wellas various data communications channels for communicating data betweenthe various hardware and software components. The virtual inspectionsystem 100 may include various software and hardware components ormodules that may employ a method to analyze and process images, such assatellite images, high resolutions images and other types of images. Thevarious modules may be implemented as computer-readable storage memoriescontaining computer-readable instructions (i.e., software) for executionby a processor of the intelligent aerial image data processing system100.

The virtual inspection system 100 may include front end components 102,including a computing device 104 that may execute instructions forperforming a quote application process. The computing device 104 mayinclude a personal computer, smart phone, tablet computer, or othersuitable computing device. Those skilled in the art will recognize thatthe present system may be used in a dedicated application, a webbrowser, a combination thereof, etc.

In some embodiments, the computing device 104 connects to a computernetwork 106, such as the Internet or other type of suitable network(e.g., local area network (LAN), a metropolitan area network (MAN), awide area network (WAN), a mobile, a wired or wireless network, aprivate network, a virtual private network, etc.). The computing device104 may connect to back end components 108 via the computer network 106.

The back end components 108 may include an underwriting system 110 thatassists an underwriter with the underwriting process. The underwritingsystem 110 includes an underwriting server 112 that may includecomputer-executable instructions to instantiate an aerial imageretrieval tool 122 and an aerial image analysis tool 124. The quotesystem 110 may also include a customer data base 116 that stores data116 a associated with a customer. The customer database 116 a mayinclude a data storage device such as random-access memory (RAM), harddisk drive (HDD), flash memory, flash memory such as a solid state drive(SSD), etc. The quote system 110 may further include one or moreadditional databases 118 for storing other data 118 a. The back endcomponents may communicate with each other through a communicationnetwork 120 such as a local area network or other type of suitablenetwork (e.g., the Internet, a metropolitan area network (MAN), a widearea network (WAN), a mobile, a wired or wireless network, a privatenetwork, a virtual private network, etc.).

The aerial image retrieval tool 122 of the underwriting server 120 mayaccess and/or receive data from one or more sources via the computernetwork 106, such as a high resolution image database 126, a satelliteimage database 128, one or more internet sources 130, etc. The highresolution database 126 may include a data storage device such asrandom-access memory (RAM), hard disk drive (HDD), flash memory, flashmemory such as a solid state drive (SSD), etc. Similarly, the satelliteimage database 128 may include a data storage device such asrandom-access memory (RAM), hard disk drive (HDD), flash memory, flashmemory such as a solid state drive (SSD), etc. In some embodiments, thehigh resolution image database 126 and the satellite image database 128may be third party databases, such as a private or a public database.The third party database may be offered, for example, by a third partyvendor. In some embodiments, the high resolution image database 126 andthe satellite image database 128 may be included in the back endcomponents 108 and/or the quote system 110 and may also be accessed bythe aerial image retrieval tool 122 via the communication network 106.

The aerial image analysis tool 124 may analyze one or more imagesretrieved from the high resolution image database 126, the satelliteimage database 128, internet source 130, etc. As will be discussed belowin reference to FIGS. 3-7, the aerial image analysis tool 124 mayperform a variety of analysis, such as identifying one or more dataobjects, translating one or more data objects, etc.

The underwriting server 112 may send and receive information such ascomputer-executable instructions and data associated with applicationsexecuting on the computing device 104. The applications executing withinthe system 100 may include cloud-based applications, web-basedinterfaces to back end components 108, software applications executingon the computing device 104, or applications including instructions thatare executed and/or stored within any component of the system 100. Theback end components 108 may receive, via the computer network 108, afile, such as a high resolution image 126 a from the high resolutiondatabase 126, satellite image 128 a from a satellite image database,etc. The backend components 108 may communicate with the computingdevice 104 through the underwriting server 110 via the computer network106. The applications, web browser application, and other tools may bestored in various locations, including separate repositories andphysical locations.

Referring now to FIG. 2, a data server 200 includes a controller 202.Exemplary data servers include the underwriting server 112 illustratedin FIG. 1. The controller 202 includes a program memory 204, amicrocontroller or a microprocessor (W) 210, a random-access memory(RAM) 212, and an input/output (I/O) circuit 216, all of which areinterconnected via an address/data bus 218. The program memory 204 maystore computer-executable instructions, which may be executed by themicroprocessor 210. In some embodiments, the controller 202 may alsoinclude, or otherwise be communicatively connected to, a database 214 orother data storage mechanism (e.g., one or more hard disk drives,optical storage drives, solid state storage devices, etc.). It should beappreciated that although FIG. 2 depicts only one microprocessor 210,the controller 202 may include multiple microprocessors 210. Similarly,the memory 204 of the controller 202 may include multiple RAMs 234 andmultiple program memories 236, 236A and 236B storing one or morecorresponding application modules, according to the controller'sparticular configuration. The data server 200 may also include specificroutines to be performed by the data server 200.

Although FIG. 2 depicts the I/O circuit 216 as a single block, the I/Ocircuit 216 may include a number of different types of I/O circuits (notdepicted). The RAM(s) 212, 234 and the program memories 236, 236A and236B may be implemented in a known form of computer storage media,including but not limited to, semiconductor memories, magneticallyreadable memories, and/or optically readable memories, for example, butdoes not include transitory media such as carrier waves.

FIG. 3 is a high level flow chart of a method, routine or process 300for linking an action item to a customer account, such as an insuranceaccount, customer account with a company, etc. A company employee, suchas an underwriter, an insurance agent with the company or some otheremployee or independent contractor affiliated with the company, may usea client device, such as the computing device 108 illustrated in FIG. 1to access a company server 122. The company server may be accessed via acompany website, mobile application, desktop application, etc. Thecompany website may be hosted on one or more servers, such as the server122, described in reference to FIG. 1.

For each employee, underwriter, etc., the server may store one or morework queues, including different applications that the employee isworking on, needs to complete, etc. The employee may enter an input, viaa mouse click, touch press, etc., representing the work queue item to beselected. For example, the employee may select an insurance product fora structure, such as a house. In response to receiving the inputrepresenting the selection of an application to be processed (block302), the server may execute an instruction to begin the process. Aprocessor of the server may execute one or more instructions to retrievea high resolution image corresponding to the structure (block 304). Forexample, the instruction may access the high resolution database 126described in reference to FIG. 1. The processor of the server may alsoexecute one or more instructions to retrieve a satellite imagecorresponding to the structure (block 306). For example, the instructionmay access the satellite database 128 described in reference to FIG. 1.The processor may also receive an action item (block 308) and execute aninstruction to link the action item to a customer account (block 310).

FIG. 4 is a flow chart of a method, routine or process 400 for virtualinspection of a structure. As discussed above in reference to FIG. 3,the underwriting process for an insurance product may include retrievingand analyzing an aerial image. The method 400 may be used during theunderwriting process, such as the quote application process 300described in reference to FIG. 3, though those skilled in the art willrecognize that the method 400 can be used in a variety of differentprice quote application processes for insurance products.

The processor of a server, such as the server 112, illustrated in FIG.1, may select a work item (block 402) and execute an instruction todetermine whether or not a virtual inspection is necessary for the workitem (block 404). For example, the processor may execute an instructionto process the request through an inspection model. If the processorexecuting the instruction determines that an inspection is not necessary(NO branch of block 404), then the method 400 may end. If the processorexecuting the instruction determines that an inspection is necessary,the server may send the work item to an underwriter's work queue (block406). In some embodiments the underwriter may additionally oralternatively review the work item and determine whether an actionableitem is necessary and/or an inspection is necessary.

The processor of the server may execute an instruction to determine if ahigh resolution image is available (block 408). If a high resolutionimage for the structure is not available (NO branch of block 408), theprocessor may execute an instruction to end the method 400. In someembodiments, the processor may execute an instruction to order aphysical inspection. For example, a request may be sent to an agent'swork queue to perform a physical inspection of the structure and/orproperty. If the processor executing the instruction determines that anaerial image for the structure is available, (YES branch of block 408)the processor may execute an instruction to retrieve the aerial imagefor the structure (block 410). The processor may access a companydatabase, such as the database 116 or 118 illustrated in FIG. 1, anaerial image database, such as the high resolution image database, 126illustrated in FIG. 1, an internet source, such as the internet source130 described in FIG. 1, etc. In some embodiments, the company may use adatabase or other source maintained by the company, while in otherembodiments the server may access a database that is maintained by athird party.

The processor of the server may also execute an instruction to determineif a satellite image is available (block 412). If the processorexecuting the instruction determines that an aerial image for thestructure is available, (YES branch of block 412) the processor mayexecute an instruction to retrieve the satellite image for the structure(block 414). The processor may access a company database, such as thedatabase 116 or 118 illustrated in FIG. 1, an aerial image database,such as the high resolution image database, 126 illustrated in FIG. 1,an internet source, such as the internet source 130 described in FIG. 1,etc. In some embodiments, the company may use a database or other sourcemaintained by the company, while in other embodiments the server mayaccess a database that is maintained by a third party. In someembodiments, the processor may also execute an instruction to order avirtual inspection on demand, if an image is not available. If a highresolution image for the structure is not available (NO branch of block412), the processor may execute an instruction to end the method 400.

In some embodiments, the satellite image may fall within a certain timethreshold. For example, the time threshold may be 72 hours, though othertime thresholds may be used. This allows the underwriter to have accessto recent data and make more accurate decisions. In some embodiments,the processor may execute one or more instructions to determine and/orconfirm that the satellite image meets the time/quality threshold.

The processor may also execute an instruction to display the images(block 416). In some embodiments, rather than execute an instruction todisplay the image, the processor may execute an instruction to transmitthe images to the client computing device for display. Once displayed,the underwriter may view the images and make any necessary decisions.The underwriter may input any action items based on the high resolutionand/or satellite image. The processor executing the instruction mayreceive the action item (block 418) and link the action item to thecustomer account corresponding to the selected structure (block 420).

There are numerous action items and determinations which the underwritermay make using the presented system. Furthermore, the underwriter canview the images and determine certain objective and/or subjectivecategories. Objective categories may include whether the property inquestion is being used for a legal purpose and/or the purpose which thecustomer has claimed. Certain locations may be licensed for commercialactivity, rental activity, etc. Other objective categories includenumber of stories of a structure, whether or not certain objects appearon the property or in the surrounding area, such as fire hydrants,garage, fences, pools, distance to coast, etc. The underwriter may alsodetermine characteristic data corresponding to the objects. For example,the underwriter may determine the material that a roof is made out of orwhether a pool is above ground or below ground. Subjective categoriesmay include pride of ownership such as housekeeping, damage to one ormore structures on the property (i.e. hail damage), whether there is aliability concern on the property or nearby, whether any part of thestructure on the property is in need of repair.

FIG. 5 is a flow chart of a method, routine or process 500 forintelligent aerial image data analysis. As discussed above in referenceto FIG. 4, during the underwriting process, an underwriter may determineone or more action items corresponding to a structure. In someembodiments, an automated processor for intelligent aerial image dataanalysis may be used to determine one or more action items. A processorof the server may execute an instruction to identify one or more objectdata categories from a retrieved image (block 502), such as thesatellite image and/or high resolution image. The processor may furtherexecute an instruction to determine one or more data valuescorresponding to the object data categories (block 504). The processormay also execute an instruction to identify one or more action items(block 506) based at least on the object data categories and/or datavalues and link the action item to the customer account (block 508). Insome embodiments, the processor may also incorporate one or morebusiness rules into the instruction. For example, a business rule mayspecify that if the structure includes a roof made of shingles, that anaction item must be linked to a customer account. In some embodimentsthe processor may also execute an instruction to take one or morepotential actions.

As a general example, the image retrieved may be of a structure such asa home. Accordingly, the processor may execute an instruction to analyzethe image and translate the object data categories. Exemplary datacategories include a roof, a pool, garage, fence, etc. Once the datacategory has been identified, the processor may execute an instructionto determine one or more object data values corresponding to the datacategory. In the roof example, the object data value may correspond tothe roofing material and include, for example, shingles, slate, ceramictile, copper, concrete, etc. Another value may correspond to a qualityof the roof and/or roofing material and may be on a scale of 1-10, apercentage, or some other value. If the identified data category is apool, the data values identified may be the type of pool, such as if thepool is in-ground, above ground, the approximate size of the pool, etc.The object data values may be objective data, such as whether an objectdata (such as a pool) is present, or a subjective value, describing thepool (in-ground, above ground, etc.). The object data categories andvalues may also be structured data retrieved from the image file, suchas geocoded data, etc. Of course these are just examples and the datacategories can be any of a wide variety of objects, etc. For example, ifthe structure is a commercial building, the object data categories mayinclude a drive way, a parking garage, or other structure, fire hydrant,etc.

Turning briefly to FIG. 6, a sample aerial image 600 is provided. Theprocessor executing the instructions may identify one or more objectdata categories, such as a house 602, a pool 604 and a garage 606. Ofcourse these are just example object data categories and in someembodiments other data categories may be used. Furthermore, theprocessor executing the instructions may determine a data value for oneof the identified object data categories. As one example, the processorexecuting the instruction may determine that data value for the pool604, is that the pool is an in-ground pool. Of course this is just oneexample, and the methods provided can be used with any variety of aerialimages, data values and data categories, etc.

FIG. 7 is a flow chart of a method, routine or process 700 fordetermining a best image data source. In some embodiments, multiple datasources for images may exist. For example, the server 122 may haveaccess to one or more databases, including third party databases frommultiple sources and/or one or more additional sources, such as thedatabases 116, 118, 126, 128, internet source 130, discussed inreference to FIG. 1. The processor may execute an instruction todetermine the best data source (block 702). This may be done in avariety of ways. For example, the processor may execute an instructionto retrieve at least one image from each of the available data sourcesand to determine one of more characteristics of the image filesretrieved, such as resolution, file format, etc. In some embodiments,one or more of the aerial image files and/or sources may be graded basedon reliability or quality. In some embodiments, the server may storeprevious determinations and view the photos to execute an instruction todetermine which is the best source available based on previousdecisions.

Nonetheless, once the processor executing the instructions determinesthe best data source, the processor may execute an instruction todetermine if the best data source is available for the desired structure(block 704). If the best data source is available for the desiredstructure, (YES branch of block 704), the processor may execute aninstruction to retrieve one or more aerial images from the data source(block 706).

If the processor executing the instruction determines that the best datasource is not available for the desired structure (NO branch of block704), the processor may execute an instruction to select the next bestdata source (block 708) and determine whether the select data source isavailable for the structure (block 704). The processor may continue toexecute instructions incorporating the method until a suitable source isfound. In some embodiments, the processor may end the method 700 after acertain number of sources, certain amount of time, etc.

FIG. 8 is a flow chart of a method, routine or process 800 fordetermining if two or more objects in an image are within a thresholddistance of each other. In some embodiments, an aerial image may haveone or more relevant objects present. For example, in determining aninsurance quote for a home, it may be relevant to the underwriter thatthe structures includes a pool in the backyard, a garage, a fence, anearby fire hydrant, a nearby fire station, a nearby police station,home built on a slope or hilltop etc. The processor may execute aninstruction to analyze the aerial image (block 802), identify a firstobject (block 804) and determine the location of the first object (block806). The instruction executed by the processor may incorporate one ormore image identifying techniques as are known on the art. The processormay further execute an instruction to identify a second object (block808) and determine the location of the second object (block 810). Insome embodiments, the first object and second object may correspond toone or more of the object data categories determined by the method 800,discussed above in reference to FIG. 8. Furthermore, although thisdiscussion only mentions a first and a second object, those of ordinaryskill in the art will recognize that the method 800 can involve anynumber of identified object data.

The processor may execute an instruction to determine a thresholddistance (block 812), compare the locations of the first and secondobject (block 814) and determine if the locations meet the thresholddistance (block 816). If the processor determines that the locationmeets the distance threshold, the processor executing the instructionmay confirm the match (block 818). If the processor determines that thelocation does not meet the threshold distance, the processor executingthe instruction may flag the customer account (block 820). In someembodiments, the processor may also use the confirmation to determineone or more answers for questions in the quote process and auto-populatea form corresponding to the quote process, such as an online form for anonline quote process executing on a client device. The server may alsoexecute an instruction to transmit the information to the client devicefor presentation, confirmation, etc.

For example, a processor of the server may execute an instructionincorporating the method 800 to determine if a fire station is within athreshold distance of a home. A customer may wish to receive a quote ona home insurance product, but a business rule may determine that acertain additional premium is to be charged if the customer's home isnot within a threshold distance, for example five miles, of a firestation or determine the risk is unacceptable. Accordingly, theprocessor may execute an instruction to analyze the aerial image andidentify a first object, such as the home structure itself. Theprocessor may further execute an instruction to identify a secondobject, such as the fire station. The processor may then execute aninstruction to compare the distances of the home structure and the firestation and determine whether or not the fire station is within thethreshold distance of the home structure. Of course this is only anexample for demonstration purposes, and the method 800 can be used withany variety of objects and/or threshold distances.

The following additional considerations apply to the foregoingdiscussion. Throughout this specification, plural instances mayimplement functions, components, operations, or structures described asa single instance. Although individual functions and instructions of oneor more methods are illustrated and described as separate operations,one or more of the individual operations may be performed concurrently,and nothing requires that the operations be performed in the orderillustrated. Structures and functionality presented as separatecomponents in example configurations may be implemented as a combinedstructure or component. Similarly, structures and functionalitypresented as a single component may be implemented as separatecomponents. These and other variations, modifications, additions, andimprovements fall within the scope of the subject matter herein.

The methods described in this application may include one or morefunctions or routines in the form of non-transitory computer-executableinstructions that are stored in a tangible computer-readable storagemedium and executed using a processor of a computing device (e.g., thecomputing device 104, the server 112, or any combination of computingdevices within the system 100). The routines may be included as part ofany of the modules described in relation to FIG. 1 or 2 or as part of amodule that is external to the system illustrated by FIGS. 1 and 2. Forexample, the methods may be part of a browser application or anapplication running on the computing device 104 as a plug-in or othermodule of the browser application. Further, the methods may be employedas “software-as-a-service” to provide a computing device 104 with accessto the quote system 110.

Additionally, certain embodiments are described herein as includinglogic or a number of functions, components, modules, blocks, ormechanisms. Functions may constitute either software modules (e.g.,non-transitory code stored on a tangible machine-readable storagemedium) or hardware modules. A hardware module is a tangible unitcapable of performing certain operations and may be configured orarranged in a certain manner. In example embodiments, one or morecomputer systems (e.g., a standalone, client or server computer system)or one or more hardware modules of a computer system (e.g., a processoror a group of processors) may be configured by software (e.g., anapplication or application portion) as a hardware module that operatesto perform certain operations as described herein.

In various embodiments, a hardware module may be implementedmechanically or electronically. For example, a hardware module maycomprise dedicated circuitry or logic that is permanently configured(e.g., as a special-purpose processor, such as a field programmable gatearray (FPGA) or an application-specific integrated circuit (ASIC) toperform certain functions. A hardware module may also compriseprogrammable logic or circuitry (e.g., as encompassed within ageneral-purpose processor or other programmable processor) that istemporarily configured by software to perform certain operations. Itwill be appreciated that the decision to implement a hardware modulemechanically, in dedicated and permanently configured circuitry, or intemporarily configured circuitry (e.g., configured by software) may bedriven by cost and time considerations.

Accordingly, the term hardware should be understood to encompass atangible entity, be that an entity that is physically constructed,permanently configured (e.g., hardwired), or temporarily configured(e.g., programmed) to operate in a certain manner or to perform certainoperations described herein. Considering embodiments in which hardwaremodules are temporarily configured (e.g., programmed), each of thehardware modules need not be configured or instantiated at any oneinstance in time. For example, where the hardware modules comprise ageneral-purpose processor configured using software, the general-purposeprocessor may be configured as respective different hardware modules atdifferent times. Software may accordingly configure a processor, forexample, to constitute a particular hardware module at one instance oftime and to constitute a different hardware module at a differentinstance of time.

Hardware and software modules can provide information to, and receiveinformation from, other hardware and/or software modules. Accordingly,the described hardware modules may be regarded as being communicativelycoupled. Where multiple of such hardware or software modules existcontemporaneously, communications may be achieved through signaltransmission (e.g., over appropriate circuits and buses) that connectthe hardware or software modules. In embodiments in which multiplehardware modules or software are configured or instantiated at differenttimes, communications between such hardware or software modules may beachieved, for example, through the storage and retrieval of informationin memory structures to which the multiple hardware or software moduleshave access. For example, one hardware or software module may perform anoperation and store the output of that operation in a memory device towhich it is communicatively coupled. A further hardware or softwaremodule may then, at a later time, access the memory device to retrieveand process the stored output. Hardware and software modules may alsoinitiate communications with input or output devices, and can operate ona resource (e.g., a collection of information).

The various operations of example functions and methods described hereinmay be performed, at least partially, by one or more processors that aretemporarily configured (e.g., by software) or permanently configured toperform the relevant operations. Whether temporarily or permanentlyconfigured, such processors may constitute processor-implemented modulesthat operate to perform one or more operations or functions. The modulesreferred to herein may, in some example embodiments, compriseprocessor-implemented modules.

Similarly, the methods or functions described herein may be at leastpartially processor-implemented. For example, at least some of thefunctions of a method may be performed by one or processors orprocessor-implemented hardware modules. The performance of certain ofthe functions may be distributed among the one or more processors, notonly residing within a single machine, but deployed across a number ofmachines. In some example embodiments, the processor or processors maybe located in a single location (e.g., within a home environment, anoffice environment or as a server farm), while in other embodiments theprocessors may be distributed across a number of locations.

The one or more processors may also operate to support performance ofthe relevant operations in a “cloud computing” environment or as a“software as a service” (SaaS). For example, at least some of thefunctions may be performed by a group of computers (as examples ofmachines including processors), these operations being accessible via anetwork (e.g., the Internet) and via one or more appropriate interfaces(e.g., application program interfaces (APIs).

The performance of certain of the operations may be distributed amongthe one or more processors, not only residing within a single machine,but deployed across a number of machines. In some example embodiments,the one or more processors or processor-implemented modules may belocated in a single geographic location (e.g., within a homeenvironment, an office environment, or a server farm). In other exampleembodiments, the one or more processors or processor-implemented modulesmay be distributed across a number of geographic locations.

Some portions of this specification are presented in terms of algorithmsor symbolic representations of operations on data and data structuresstored as bits or binary digital signals within a machine memory (e.g.,a computer memory). These algorithms or symbolic representations areexamples of techniques used by those of ordinary skill in the dataprocessing arts to convey the substance of their work to others skilledin the art. As used herein, a “function” or an “algorithm” or a“routine” is a self-consistent sequence of operations or similarprocessing leading to a desired result. In this context, functions,algorithms, routines and operations involve physical manipulation ofphysical quantities. Typically, but not necessarily, such quantities maytake the form of electrical, magnetic, or optical signals capable ofbeing stored, accessed, transferred, combined, compared, or otherwisemanipulated by a machine. It is convenient at times, principally forreasons of common usage, to refer to such signals using words such as“data,” “content,” “bits,” “values,” “elements,” “symbols,”“characters,” “terms,” “numbers,” “numerals,” or the like. These words,however, are merely convenient labels and are to be associated withappropriate physical quantities.

Unless specifically stated otherwise, discussions herein using wordssuch as “processing,” “computing,” “calculating,” “determining,”“presenting,” “displaying,” or the like may refer to actions orprocesses of a machine (e.g., a computer) that manipulates or transformsdata represented as physical (e.g., electronic, magnetic, or optical)quantities within one or more memories (e.g., volatile memory,non-volatile memory, or a combination thereof), registers, or othermachine components that receive, store, transmit, or displayinformation.

As used herein any reference to “some embodiments” or “one embodiment”or “an embodiment” means that a particular element, feature, structure,or characteristic described in connection with the embodiment isincluded in at least one embodiment. The appearances of the phrase “inone embodiment” in various places in the specification are notnecessarily all referring to the same embodiment.

Some embodiments may be described using the expression “coupled” and“connected” along with their derivatives. For example, some embodimentsmay be described using the term “coupled” to indicate that two or moreelements are in direct physical or electrical contact. The term“coupled,” however, may also mean that two or more elements are not indirect contact with each other, but yet still co-operate or interactwith each other. The embodiments are not limited in this context.

As used herein, the terms “comprises,” “comprising,” “includes,”“including,” “has,” “having” or any other variation thereof, areintended to cover a non-exclusive inclusion. For example, a function,process, method, article, or apparatus that comprises a list of elementsis not necessarily limited to only those elements but may include otherelements not expressly listed or inherent to such process, method,article, or apparatus. Further, unless expressly stated to the contrary,“or” refers to an inclusive or and not to an exclusive or. For example,a condition A or B is satisfied by any one of the following: A is true(or present) and B is false (or not present), A is false (or notpresent) and B is true (or present), and both A and B are true (orpresent).

In addition, use of the “a” or “an” are employed to describe elementsand components of the embodiments herein. This is done merely forconvenience and to give a general sense of the description. Thisdescription should be read to include one or at least one and thesingular also includes the plural unless it is obvious that it is meantotherwise.

Still further, the figures depict preferred embodiments of a computersystem 100 for purposes of illustration only. One of ordinary skill inthe art will readily recognize from the following discussion thatalternative embodiments of the structures and methods illustrated hereinmay be employed without departing from the principles described herein.

Upon reading this disclosure, those of skill in the art will appreciatestill additional alternative structural and functional designs for asystem and a process for intelligent aerial image data processing. Thus,while particular embodiments and applications have been illustrated anddescribed, it is to be understood that the disclosed embodiments are notlimited to the precise construction and components disclosed herein.Various modifications, changes and variations, which will be apparent tothose skilled in the art, may be made in the arrangement, operation anddetails of the method and apparatus disclosed herein without departingfrom the spirit and scope defined in the appended claims.

To the extent that any meaning or definition of a term in this documentconflicts with any meaning or definition of the same term in a documentincorporated by reference, the meaning or definition assigned to thatterm in this document shall govern. The detailed description is to beconstrued as exemplary only and does not describe every possibleembodiment since describing every possible embodiment would beimpractical, if not impossible. Numerous alternative embodiments couldbe implemented, using either current technology or technology developedafter the filing date of this patent, which would still fall within thescope of the claims. While particular embodiments of the presentinvention have been illustrated and described, it would be obvious tothose skilled in the art that various other changes and modificationscan be made without departing from the spirit and scope of theinvention. It is therefore intended to cover in the appended claims allsuch changes and modifications that are within the scope of thisinvention.

What is claimed is:
 1. A computer implemented method for linking an underwriting action to a customer account, the method comprising: receiving, via a computer network, an inspection model, wherein the inspection model corresponds to a geographic location associated with a structure; determining, at one or more processors, that a virtual inspection is necessary based on the inspection model; retrieving, via the computer network, a first aerial image, wherein the first aerial image corresponds to the geographic location; retrieving, via the computer network, a second aerial image, wherein the second aerial image corresponds to the geographic location; receiving a comparison data value corresponding to the first and second aerial image; and determining, at the one or more processors, an underwriting action based on the comparison data value; and linking, at the one or more processors, the underwriting action to an customer account.
 2. The computer implemented method of claim 1, further comprising: defining, at the one or more processors, a time threshold; and determining, at the one or more processors, that the second aerial image meet the time threshold.
 3. The computer implemented method of claim 1, further comprising: identifying, at one or more processors, a first data object from the first aerial image; and determining, at the one or more processors, a data value corresponding to the data object.
 4. The computer implemented method of claim 3, further comprising: identifying, at one or more processors, a second data object from the first aerial image; determining, at the one or more processors, a distance between the first and second data objects; and determining, at the one or more processors, that the distance between the first and second data objects is within a distance threshold.
 5. The computer implemented method of claim 1 further comprising: accessing, via the computer network, one or more aerial image databases; and determining, at the one or more processors, that at least one aerial image database contains an aerial image corresponding to the location.
 6. The computer implemented method of claim 1, further comprising: identifying, at the one or more processors, a second data category from the aerial image, wherein the second data category is an objective data category.
 7. A computer device for determining an insurance premium, the computer device comprising; one or more processors; and one or more memories coupled to the one or more processors; wherein the one or more memories include computer executable instructions stored therein that, when executed by the one or more processors, cause the one or more processors to: receive, via a computer network, an inspection model, wherein the inspection model corresponds to a geographic location associated with a structure; determine that a virtual inspection is necessary based on the inspection model; retrieve, via the computer network, a first aerial image, wherein the first aerial image corresponds to the geographic location; retrieve, via the computer network, a second aerial image, wherein the second aerial image corresponds to the geographic location; receive a comparison data value corresponding to the first and second aerial image; and determine an underwriting action based on the comparison data value; and link the underwriting action to a customer account.
 8. The computer device of claim 7, wherein the computer executable instructions further cause the one or more processors to: define a time threshold, wherein the time threshold is less than 72 hours; and determine that the second aerial image meets the time threshold.
 9. The computer device of claim 7, wherein the computer executable instructions further cause the one or more processors to: identify a first data object from the first aerial image; and determine a data value corresponding to the data object.
 10. The computer device of claim 7, wherein the computer executable instructions further cause the one or more processors to: identify a second data category from the first aerial image; determine a distance between the first and second data objects; and determine that the distance between the first and second data objects is within a distance threshold.
 11. The computer device of claim 7, wherein the computer executable instructions further cause the one or more processors to: access, via the computer network, one or more aerial image databases; and determine that at least one aerial image database contains an aerial image corresponding to the location.
 12. The computer device of claim 7, wherein the computer executable instructions further cause the one or more processors to: identify, at the one or more processors, a second data category from the aerial image, wherein the second data category is an objective data category.
 13. A non-transitory computer readable storage medium comprising non-transitory computer readable instructions stored thereon determining an insurance premium, the instructions when executed on one or more processors cause the one or more processors to: receive, via a computer network, an inspection model, wherein the inspection model corresponds to a geographic location associated with a structure; determine that a virtual inspection is necessary based on the inspection model; retrieve, via the computer network, a first aerial image, wherein the first aerial image corresponds to the geographic location; retrieve, via the computer network, a second aerial image, wherein the second aerial image corresponds to the geographic location; receive a comparison data value corresponding to the first and second aerial image; and determine an underwriting action based on the comparison data value; and link the underwriting action to a customer account.
 14. The non-transitory computer readable storage medium of claim 13, wherein the instructions when executed on the one or more processors further cause the one or more processors to: define a time threshold, wherein the time threshold is less than 72 hours; and determine that the second aerial image meets the time threshold.
 15. The non-transitory computer readable storage medium of claim 13, wherein the instructions when executed on the one or more processors further cause the one or more processors to: identify a first data object from the first aerial image; and determine a data value corresponding to the data object.
 16. The non-transitory computer readable storage medium of claim 13, wherein the data category is structured data received from the aerial image.
 17. The non-transitory computer readable storage medium of claim 13, wherein the instructions when executed on the one or more processors further cause the one or more processors to: identify a second data category from the first aerial image; determine a distance between the first and second data objects; and determine that the distance between the first and second data objects is within a distance threshold.
 18. The non-transitory computer readable storage medium of claim 17, wherein the instructions when executed on the one or more processors further cause the one or more processors to: access, via the computer network, one or more aerial image databases; and determine that at least one aerial image database contains an aerial image corresponding to the location. 