Security

ABSTRACT

A robotic customer service agent (“robot”) is provided to a service location. The robot may present a number of security concerns that, whether realized or not, present barriers to acceptance. A robot is provided that is determined to be in compliance with a security criteria. The security criteria may be related to software (e.g., running anti-virus software), hardware (e.g., an added camera is secure), communication (e.g., no unexpected communications), or other aspect. Should the robot be in compliance, it may operate in a secure mode, such as to perform or access more sensitive information. If the robot is not in compliance, the robot is operated in a non-secure mode, such as to block data transmissions, information capturing, or other process or operation that may present a security risk.

FIELD OF THE DISCLOSURE

The disclosure relates generally to command and control ofmicroprocessor-driven mechanical devices.

BACKGROUND

Automation and mechanization of human tasks has lead to many of theadvances found in modern life. Devices, such as robots, are available toprovide many functions. For example, low-cost, general purpose personalrobots are available as toys or tools for hobbyists. High-powered,high-precision industrial robots are available for industrial orcommercial applications. Unfortunately, the cost, power, programming,maintenance, calibration, and other requirements make a human thepreferred actor for many needs.

SUMMARY

The present disclosure can provide a number of advantages depending onthe particular configuration. These and other advantages will beapparent from the disclosure and the embodiments herein.

In one embodiment, a personal robot may be provided to connect to abusiness at a customer location. The robot may be programmed and/orinstructed to do nearly any function in a house or business on behalf ofa contact center agent. For example, repairing a household appliance,pickup and delivery, mending socks, medical functions, etc. A contactcenter may provide the robot with downloadable or pre-loaded code forfine maneuvering.

Security and privacy are areas of concern in contact center and robotinteractions with customers. Authentication, blocked functions,third-party oversight, and standards must be considered, such as topromote trust and overcome resistance to adoption. Documented anddemonstrable security and privacy measures promotes consumer acceptanceof higher-level robot functions in their home.

In one embodiment, a robotic solution is provided comprising security,privacy, monitoring, and/or interaction capabilities between contactcenters and customers. A robot may comprise components that are owned orcontrolled by a customer. A particular function may be performed by arobot provided via the contact center, the customer, or a combinationthereof. Additionally, a robot may interact with customer-ownedcomponents (e.g., power supply, communication interface, input-outputdevice, etc.). Robots may have a variety of information gathering toolsthat, whether real or perceived, present a risk to the contact center ifinformation obtained is misused or stolen and a risk to the customer forloss of information, loss of privacy, and anguish over the potential forsuch information to be used to perpetrate a crime or other unwelcomeaction against the customer. Accordingly, when a contact center deploysa robot or interacts with a customer-owned robot or other equipment,security, and authentication are priorities. As an extension of thecontact center's capabilities within a customer's home, facets ofsecurity and connection beyond the current models must be considered andimplemented.

Software security:

As security is a priority, in one embodiment, a contact center has theability to deem whether a robot is “clean enough” to be trusted as itsagent to enter and operate in a customer's home or business. As such,the contact center can employ the following tasks: a) verify that atrusted anti-virus security software/system is present on the robot andoperational; b) load a virus scanning software module as part of itsdownloadable software package for further verification; and/or c) invokea trusted “cleaning cycle” of a trusted anti-virus software package oroperating system capability.

Movement and Interaction Verification:

To verify identity or human physical capabilities, software could bedownloaded to authenticate or provide simple human capabilityverification. Consider the following embodiments:

1. The contact center may command a local robot to ask a local human totap its shoulder twice, pat its head once, hold both wrists, etc. as ameans to verify the mobility and/or language compression of the human.

2. The contact center may command the robot to request that the human gothrough a physical password. The physical password may comprise, forexample, one or more of vocal utterances, arm or hand movements in freespace, and additional movements that may involve the robot. For example,one human's password could consist of saying “One, Blue,” then takingtwo steps towards the robot and touching the left shoulder of the robotwith the human's left hand.

3. In addition to movement interaction sequences, the robot may be alocal agent to accept and authenticate other forms of voice, visual, andinteraction multi-factor authentication. Notifications can be providedby robots, agents, and customers as authentication and testing takeplace.

4. Various algorithms for the duration of the authentication period canbe enforced, including: time-based (e.g., good for one hour, etc.),proximity-based (e.g., human must be in sight at all times withoutinterruption to the robot, must be within a certain distance),biometrics-based (e.g., good only while subject is observed to beliving, respiration is below 20 breaths per minute, etc.), continuousvocal/audio interaction-based (e.g., robot hears human's breathing, lowvolume heartbeat effects, requires human to carry on continuousconversation, etc.), and/or event-based (e.g., good until a given eventoccurs, good for three attempts, etc.). Multiple techniques may beemployed for notifying a human that the validation period is coming to aclose or needs to be refreshed, including: audio announcements, visualdisplays, or specific movements (e.g., look at human, extend arms,open/close palm three times as if to ask for a key, etc.).

Authentication through 3D Reconstruction:

A robot may have one or more movable “heads” and thus one or more fixedor movable cameras. The robot can capture still or video images inoptical and non-optical wavelengths, passive and/or induced magneticfield imaging, and/or sonar or other mechanical wave-based imaging. Therobot may determine the precise location of the camera relative to thebody of the robot. With this information, a robot can be programmed bythe contact center to transmit a stream of data to the contact centerand enable the contact center systems to perform scene/environmenttwo-dimensional (2D) and/or three-dimensional (3D) reconstructions. Witha receiver in the robot's arm, hand, etc., a service like 3D humanimaging (e.g., x-ray, sonogram, computerized tomography, magneticresonance imaging, etc.) may be provided. Reconstructed 3D environmentsand/or subjects may be used for 3D identification of humans at the robotlocation, systems/equipment diagnostics, and as an input to holographic3D scene recreation for use by contact center agents. Alternatively,processing can be done solely or partially by the robot for individualinputs and optionally with a derived 3D scene description transmitted tothe contact center.

O/S Blocking Function for Privacy:

A robot provided, in whole or in part by the user (e.g., customer), or“bring your own robot” (BYOR) may gather a wealth of personalinformation from data collected or analyzed. Accordingly, the robot mayemploy a base operating system and/or other applications thatspecifically limit, for example, a contact center application's abilityto gather information to only that which is essential for a 3Dreconstruction or other permitted/required task.

A robot's imaging may be varied based on a more precise location. Forexample, while an image of a human patient for medical purposes may havea high frame rate, pixel resolution, and/or pixels per frame up to andincluding the maximum imaging capacity of one or more cameras. However,travel through the patient's home may be more limited, such as tominimally satisfy the requirement for autonomous travel within the homeand avoid capturing unnecessarily detailed images unrelated to a purposeof the robot.

A robot may be limited by owner-provided software and/or configurationas to where images may be permitted (e.g., only in the laundry room fora washer repair application and not the living room or other rooms ofthe house). Similarly, other information may be limited by a blockingfunction, such as quality of audio, where audio may be collected, reviewof audio, etc., or for location, precision of location information,requiring location information to be relative (e.g., three feet fromstarting point, then two feet, etc.) but not absolute (e.g., no GPScoordinates), so robot can move around the room safely, but cannottransmit the effective location of the house itself. Another functionwhen feeding video from the robot to the agent can be to mask facesother than the authorized human in the home and/or obscure otheridentifying items. The system and/or application can, based on userprivacy settings, pixilate, fuzz, or otherwise sufficiently obscure thefaces of other people, children, displayed images (e.g., artwork,photographs, etc.), diplomas, etc. that might be displayed in a home orbusiness.

Blocked and Limited Functions:

Another area of security concern is abated by the contact center havingthe ability to provide blocked functions, such as blocked fields inco-browsing. Functions can be totally blocked, blocked based onlocation, blocked based on client's approval, and time-based functionswith expiration. For example, with regard to a washing machine repair, arobot may not be permitted to touch physical objects, other than thefloor for support, outside of the laundry room, and only allowed totouch and manipulate the washer for the purpose of performing therepair, which may optionally be time-limited (e.g., sixty minutes, etc).

Third-party Oversight:

Safety can also be a concern when robots are in a home. Third-partyoversight can be provided per customer request or by design given thecomplexity or potential safety issues for a task. A providing companymay use a resource similar to VeriSign for this purpose. Consider, forexample, the washing machine repair scenario: a customer might be afraidthat a contact center-owned robot may use the screwdriver to attackthem. The customer can thus request third-party oversight of robotactions. In another example, a customer may be concerned that a robotmay damage walls or other property, become entangled in cords, rugs,etc., or otherwise become a hazard to persons or property due to anoperation having an unintended consequence.

Several mechanisms are disclosed with regard to providing third-partyoversight:

1. The base operating system of the robot can have certain rulespreprogrammed into a continuous monitoring oversight function.

2. The local human/owner can acquire third-party oversight software toperform the blocking control function.

3. A contact center/repair company can submit software to a testinginstitute (e.g., Underwriters Laboratory) for “safety certification.”

4. To limit liability, a contact center/repair company can require thateither the first or second disclosed mechanism is present on the machinein addition to certifications it may perform on its own software as a“safe harbor” requirement.

5. Institute and advertise a policy requiring third-party oversight whena situation involves a robot's handling of sharp objects, hazardouschemicals, high-value objects, or other high-risk objects.

6. A second trusted robot may be deployed in the home or business forobserving the actions of the first robot, whether it is contact center-or customer-owned. “Observing” here can be visual monitoring, monitoringof first robot fundamentals (e.g., speed of movement of an arm,proximity to local humans—keep a safe distance, etc.). Additionally,keep alive/verified sanity interactions between a watchdog master robotand a working robot (owned by a customer or contact center) can beemployed. Finally, a trusted robot can be deployed to “protect” thelocal humans from attack, thrown objects, excessive noise, etc.

Examples of a Dispatched Agent Robot:

1. A home robot, which may comprise third-party software, is dispatchedon a mission and leaves premises (e.g., to go grocery shopping, conductpharmacy pickup, attend community meeting for remote participation,vote, etc.).

2. A robot comprises a control mechanism for spending currency on behalfof owner (e.g., remote validation, voice verification, pre-authorizedspending limit, etc.).

3. Standard interface for police identification compliance, such as foridentification of a robot and/or robot owner to police in response tothe robot performing an illegal action, such as a trespass, trafficinfraction, or other criminal or civil violation. Standard interface forgovernment/police-to-robot interaction (e.g., order the robot to abortits mission and leave the area due to a fire or other hazard, etc.).Standard language capability for authority control (e.g., voicelanguage, signal-encoded laser with VeriSign certificate authority andremote command capability).

4. Return-home functionally for a robot in the field experiencingoperational issues, failing a self-check, or other out-of-specificationcondition. The return-home functionality may be implemented, in whole orin part, by third-party software.

In one embodiment, and by way of general introduction, robotic serviceagents are provided with security and control aspects similar to thoseprovided to human service agents (e.g., repair personnel, homehealthcare workers, cleaners, etc.). For example, human service agentsmay be restricted, either formally or by expectations, to conform tocertain physical constraints of the service area, such as a home. Inparticular, a human service agent on-site at a service area for thepurpose of repairing a refrigerator may be allowed free access to thekitchen area with the refrigerator and points between the refrigeratorand the entry to the service area, but cause concern if they enter abedroom.

In order for robotic service agents to be more readily accepted,security concerns, whether real or perceived, need to be addressed. Inpart, robotic service agents may need to be confined to a “need to know”mode of operation and not access locations or information that is notrequired to perform a task for which the robotic service agent is beingutilized. Use of robotic service agents may instill security concernssimilar to those of human service agents (e.g., theft, accessingunjustified areas of the service area, gathering information without abona fide reason, harm to persons or property, etc.). Additionally,robotic service agents are computers which comprise input components(e.g., microphones, cameras, radar, etc.) and communication components(e.g., WiFi, cellular, Ethernet, Bluetooth, infrared, etc.). A user orcustomer of a robotic service agent may be concerned that the roboticservice agent is a “Trojan horse” utilized for communicating gatheredinformation to parties unknown, or known but potentially nefarious.Robotic service agents have one or more physical capabilities, which maybe another source of concern. For example, programming or instructionfailure or error, mechanical failure, communication failure, action of abad-actor in communication with the robotic service agent, or othercondition may be perceived as a physical risk to persons, property, ordata. For example, a robotic service agent may knock over a lamp, steala wallet, attack a human with a screwdriver, or cause a storage devicefull of family pictures to be purged. Even if a particular roboticservice agent is not capable of perform such unwanted acts, theperceived risks may still require management and mitigation in order forrobotic service agents to gain broader acceptance.

Robotic service agents may be embodied as end-user (e.g., customer)owned and operated, contact center-owned and/or operated device,third-party-owned and operated, or various portions and combinationsthereof. In one embodiment, the customer may own a portion of the robotbut a particular task requires a specialized tool. The contact center orthird-party may provide the tool, which may be kept by the customer orreturned upon completion of the task. In another embodiment, thecustomer may own computational and/or communication portion and accesssoftware from the contact center or third-party, to allow specializedfunctionality of the robotic service agent.

Sourcing a robotic service agent's components, in order to configure therobotic service agent to be able to perform a particular task, may comefrom a variety of sources and, as a result, the associated securityvulnerabilities may also come from a variety of sources. Errant ormalicious software (e.g., viruses, malware, bugs, etc.) may be found inlegitimate software of the customer, contact center, third-party, and/orother software provider. Additionally, imposter software; datainterception; loss of communication and/or control; incompatibility withlogical and/or physically attached components; flawed hardware, and/orother component may allow the robotic service agent to operate in amanner outside of its intended service purpose.

The term “robot,” as used herein, refers to a robotic service agentcomprising a microprocessor, physical capability in communication withthe microprocessor, and a communication interface.

The phrases “at least one,” “one or more,” “or,” and “and/or” areopen-ended expressions that are both conjunctive and disjunctive inoperation. For example, each of the expressions “at least one of A, Band C,” “at least one of A, B, or C,” “one or more of A, B, and C,” “oneor more of A, B, or C,” “A, B, and/or C,” and “A, B, or C” means Aalone, B alone, C alone, A and B together, A and C together, B and Ctogether, or A, B and C together.

The term “a” or “an” entity refers to one or more of that entity. Assuch, the terms “a” (or “an”), “one or more,” and “at least one” can beused interchangeably herein. It is also to be noted that the terms“comprising,” “including,” and “having” can be used interchangeably.

The term “automatic” and variations thereof, as used herein, refers toany process or operation, which is typically continuous orsemi-continuous, done without material human input when the process oroperation is performed. However, a process or operation can beautomatic, even though performance of the process or operation usesmaterial or immaterial human input, if the input is received beforeperformance of the process or operation. Human input is deemed to bematerial if such input influences how the process or operation will beperformed. Human input that consents to the performance of the processor operation is not deemed to be “material.”

Aspects of the present disclosure may take the form of an embodimentthat is entirely hardware, an embodiment that is entirely software(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “circuit,” “module,” or “system.”Any combination of one or more computer-readable medium(s) may beutilized. The computer-readable medium may be a computer-readable signalmedium or a computer-readable storage medium.

A computer-readable storage medium may be, for example, but not limitedto, an electronic, magnetic, optical, electromagnetic, infrared, orsemiconductor system, apparatus, or device, or any suitable combinationof the foregoing. More specific examples (a non-exhaustive list) of thecomputer-readable storage medium would include the following: anelectrical connection having one or more wires, a portable computerdiskette, a hard disk, a random access memory (RAM), a read-only memory(ROM), an erasable programmable read-only memory (EPROM or Flashmemory), an optical fiber, a portable compact disc read-only memory(CD-ROM), an optical storage device, a magnetic storage device, or anysuitable combination of the foregoing. In the context of this document,a computer-readable storage medium may be any tangible medium that cancontain or store a program for use by or in connection with aninstruction execution system, apparatus, or device.

A computer-readable signal medium may include a propagated data signalwith computer-readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Acomputer-readable signal medium may be any computer-readable medium thatis not a computer-readable storage medium and that can communicate,propagate, or transport a program for use by or in connection with aninstruction execution system, apparatus, or device. Program codeembodied on a computer-readable medium may be transmitted using anyappropriate medium, including, but not limited to, wireless, wireline,optical fiber cable, RF, etc., or any suitable combination of theforegoing.

The terms “determine,” “calculate,” “compute,” and variations thereof,as used herein, are used interchangeably and include any type ofmethodology, process, mathematical operation or technique.

The term “means” as used herein shall be given its broadest possibleinterpretation in accordance with 35 U.S.C., Section 112(f) and/orSection 112, Paragraph 6. Accordingly, a claim incorporating the term“means” shall cover all structures, materials, or acts set forth herein,and all of the equivalents thereof. Further, the structures, materialsor acts and the equivalents thereof shall include all those described inthe summary, brief description of the drawings, detailed description,abstract, and claims themselves.

The preceding is a simplified summary of the disclosure to provide anunderstanding of some aspects of the disclosure. This summary is neitheran extensive nor exhaustive overview of the disclosure and its variousembodiments. It is intended neither to identify key or critical elementsof the disclosure nor to delineate the scope of the disclosure but topresent selected concepts of the disclosure in a simplified form as anintroduction to the more detailed description presented below. As willbe appreciated, other embodiments of the disclosure are possibleutilizing, alone or in combination, one or more of the features setforth above or described in detail below. Also, while the disclosure ispresented in terms of exemplary embodiments, it should be appreciatedthat an individual aspect of the disclosure can be separately claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is described in conjunction with the appendedfigures:

FIG. 1 depicts a first system in accordance with embodiments of thepresent disclosure;

FIG. 2 depicts an architecture in accordance with embodiments of thepresent disclosure;

FIG. 3 depicts a second system in accordance with embodiments of thepresent disclosure;

FIG. 4A depicts a first system comprising instructions in accordancewith embodiments of the present disclosure;

FIG. 4B depicts a second system comprising instructions in accordancewith embodiments of the present disclosure;

FIG. 4C depicts a third system comprising instructions in accordancewith embodiments of the present disclosure;

FIG. 4D depicts a fourth system comprising instructions in accordancewith embodiments of the present disclosure;

FIG. 5A depicts a first multiple robot system in accordance withembodiments of the present disclosure;

FIG. 5B depicts a second multiple robot system in accordance withembodiments of the present disclosure;

FIG. 6 depicts a contact center system in accordance with embodiments ofthe present disclosure;

FIG. 7 depicts a first communication system in accordance withembodiments of the present disclosure;

FIG. 8 depicts a second communication system in accordance withembodiments of the present disclosure;

FIG. 9 depicts a first interaction in accordance with embodiments of thepresent disclosure;

FIG. 10 depicts a second interaction in accordance with embodiments ofthe present disclosure;

FIG. 11 depicts a third interaction in accordance with embodiments ofthe present disclosure;

FIG. 12 depicts a fourth interaction in accordance with embodiments ofthe present disclosure;

FIG. 13 depicts a fifth interaction in accordance with embodiments ofthe present disclosure;

FIG. 14 depicts a sixth interaction in accordance with embodiments ofthe present disclosure; and

FIG. 15 depicts a fifth system in accordance with embodiments of thepresent disclosure.

DETAILED DESCRIPTION

The ensuing description provides embodiments only and is not intended tolimit the scope, applicability, or configuration of the claims. Rather,the ensuing description will provide those skilled in the art with anenabling description for implementing the embodiments. It will beunderstood that various changes may be made in the function andarrangement of elements without departing from the spirit and scope ofthe appended claims.

Any reference in the description comprising an element number, without asubelement identifier when a subelement identifier exists in thefigures, when used in the plural, is intended to reference any two ormore elements with a like element number. When such a reference is madein the singular form, it is intended to reference one of the elementswith the like element number without limitation to a specific one of theelements. Any explicit usage herein to the contrary or providing furtherqualification or identification shall take precedence.

The exemplary systems and methods of this disclosure will also bedescribed in relation to analysis software, modules, and associatedanalysis hardware. However, to avoid unnecessarily obscuring the presentdisclosure, the following description omits well-known structures,components, and devices that may be shown in block diagram form, and arewell known or are otherwise summarized.

For purposes of explanation, numerous details are set forth in order toprovide a thorough understanding of the present disclosure. It should beappreciated, however, that the present disclosure may be practiced in avariety of ways beyond the specific details set forth herein.

In one embodiment, a system is disclosed, comprising: a networkinterface; a data repository; a microprocessor in communication with thenetwork interface and when provided with instructions cause themicroprocessor to: communicate with a robot configured to perform acustomer service task at a service location; access a security criteriafrom the data repository; determine whether the robot is in compliancewith the security criteria; operate the robot in a secure mode when thedetermination indicates the robot is in compliance with the securitycriteria; and operate the robot in a non-secure mode when thedetermination indicates the robot is not in compliance with the securitycriteria.

In another embodiment, a robot is disclosed, comprising: a networkinterface; a microprocessor in communication with the network interfaceand when provided with instructions cause the microprocessor to: accessa security criteria from a data repository; determine whether the robotis in compliance with the security criteria; operate the robot in asecure mode to perform a customer service task in a service location,when the determination indicates the robot is in compliance with thesecurity criteria; and operate the robot in a non-secure mode, when thedetermination indicates the robot is not in compliance with the securitycriteria.

In another embodiment, a system, comprising: means to access, by atleast one microprocessor, a security criteria from a data repository;means to determine, by the at least one microprocessor, whether a robotis in compliance with the security criteria; means to operate, by the atleast one microprocessor, the robot in a secure mode to perform acustomer service task in a service location when the means to performthe determination determine the robot is in compliance with the securitycriteria; and means to operate, by the at least one microprocessor, therobot in a non-secure mode, when the means to perform the determinationdetermine the robot is not in compliance with the security criteria.

FIG. 1 depicts a system in accordance with embodiments of the presentdisclosure. In one embodiment, robot 102 is provided to service location104 to perform a task. The task may comprise one or more physicalaspects or activities within service location 104. Service location 104may be any customer-controlled location, including, but not limited to,interior and/or exterior portions of a home, retail, commercial,municipal, or industrial facility. Robot 102 may be entirely orpartially owned by the customer. It should be noted that owned includes,but is not limited to, having legal title, possession, authority over,management over, stewardship of, rented, leased, borrowed, or othercontrol associated with legal possession and authority to act as anowner, less any rights contractually surrendered. In another embodiment,robot 102 is entirely owned by a contact center, or other entity.

In another embodiment, a portion of robot 102 is owned by a customer andanother portion is owned by the contact center. The portion of robot 102owned by the contact center may be hardware and/or software. Forexample, a customer may wish to deploy robot 102 to perform aspecialized task, such as to repair a washing machine. Robot 102 mayrequire specialized tools to perform such a task. Accordingly, thecustomer may contact the contact center or other entity and scheduledelivery of a component to coordinate with robot 102 and provide thetools necessary to complete the task. In another embodiment, robot 102may not have instructions to perform a task. The customer may downloador otherwise acquire instructions to enable robot 102 to perform thedesired task. In yet another embodiment, software instructions may beprovided as embedded software with an attachment. To continue the priorexample, robot 102 is fitted with a specialized tool required to repaira washing machine. The specialized tool, which may be a “dumb” tool(e.g., wrench, lift, pulley, etc.) and not require any computationalability for itself to operate, but may contain a media comprisinginstructions that, once in communication with robot 102, enables robot102 to perform a task. The specialized tool may also be a “smart” tool(e.g., robotic arm, etc.) having a microprocessor and its owninstructions and optionally a media having instructions for robot 102 toperform the task or a portion thereof. For example, a specialized toolmay perform an operation, such as applying a force to a shaft held by abearing and robot 102 may be configured by the instructions to examineimages of the bearing captured by a camera and, based thereon, determineif the bearing has failed.

Robot 102 may be entirely autonomous, autonomous once positioned in apredetermined location or proximate to the object of a task, or a droneor proxy for an operator, such as a supervisor robot or agent of acontact center remotely controlling robot 102 in whole or in part.Control may alternate from robot 102 to a networked supervisor, human orrobotic, based upon progression of the task, specific waypoints in atask, or due to component or linkage failures. In one embodiment, ahuman remotely operating robot 102 may suffer a loss of communicationand robot 102 may proceed autonomously to ensure the task progresses oris placed in a safe state. For example, an agent of a contact center maybe remotely operating robot 102 and attempting to light a pilot light ofa gas water heater when communication between the contact center andagent are lost. Robot 102 may be configured to then discontinueattempting to light the pilot light, turn off the gas supply, and waitfor communications to be restored.

In another embodiment, robot 102 may interact with one or more humanand/or automated resources. For example, robot 102 may utilize anon-board speaker or display to communicate with a human, such as torequest assistance in locating the object of the task. In anotherembodiment, robot 102 may communicate with an off-site resource (humanand/or automated) to access data, instructions, etc. or to provide data,which may include, but is not limited to, images, videos, sound, and/orother data (e.g., serial numbers, settings, display values, etc.).

Security for robot 102 and the actions performed by robot 102 may be aparticularly sensitive issue for consumer acceptance, such as the owner,occupant, controller, etc. of service location 104, which may comprisepersonal or other sensitive information and objects and persons. Robot102 may comprise, in part, a computer with communication ability and besubject to viruses or other malware. Accordingly, robot 102 may beprovided with anti-virus software, which may be verified and provideassurance that robot 102 operates without influence from unauthorizedparties. While certain on-board security measures may be implemented (asdiscussed more completely with respect to FIG. 2), external monitoring,command, and/or control resources may be provided to robot 102 directly,such as via a direct signal received by, sent from, antenna 106 (e.g.,WiFi, cellular, Bluetooth, GPS, etc.). Antenna 106 may be configured tooperate using other electromagnetic signals (e.g., infrared, radar,etc.) and/or mechanical signals (e.g., sound, feelers, etc.).

Robot 102 may communicate before, during, and/or after entering servicelocation 104 with one or more monitoring services, such as physicalsecurity 108. Physical security 108 may monitor a number of inputs, forexample, to determine that robot 102 is at the correct service location104, is not removed from service location 104 (e.g., stolen), opened byan unauthorized party, subject to stresses outside of predeterminedlimits (e.g., being hit, falling down stairs, colliding with an object,etc.). In another embodiment, physical security 108 may defineoperations to avoid damaging or accessing (actual or perceived)unauthorized data (e.g., electronic “eavesdropping,” audio/visualeavesdropping, room layouts, images or identification of items/personsunrelated to the task, etc.). Physical security 108 may then monitor theposition of robot 102, data that is, has been, or could be gathered andapply means to terminate such a security breach (e.g., temporarilydisable the microphone), dispose of inappropriate or unrelated data(e.g., discarding room maps or images), and/or require permission toperform an action from remote and/or on-site resources (e.g., “Mr.Smith, may I have access to your electrical service panel?”).

We now consider example scenarios and the embodiments disclosed therein.In a first scenario, a customer encounters a middle-of-the-nightchirping of a smoke detector with a failing battery. The customer isunable or unwilling to climb a ladder to replace the battery themselvesor have another person do the task. Accordingly, the customer opens aservice request with a contact center to have a new batter replaced byrobot 102.

In a first sub-scenario, the customer owns robot 102, which isconfigured to perform the entirely of the task. Robot 102 is providedwith a replacement battery, or configured to access a replacementbattery, and performs the replacement. In a second sub-scenario, thecustomer owns robot 102, which comprises hardware to perform the task,but lacks sufficient instructions to perform the task. The customeraccesses a set of instruction software 110, such as via a web interfaceto an application store, acquires the store for provisioning robot 102which is then deployed to replace the battery. Alternatively, robot 102may utilize in whole or in part, external processing agent 112 toperform real-time or near real-time data processing. For example, robot102 may acquire an image of the smoke detector and utilize externalprocessing agent 112 to provide an update to the procedure based uponidentification of the particular make and model of the smoke detector(e.g., the particular model requires a modification to the instructionsin order to access the battery compartment, etc.). In a thirdsub-scenario, the customer owns robot 102 which lacks the physicalcapacity to perform the task. The customer arranges for associatedhardware, which may then be physically or logically attached to robot102 to perform the task. For example, robot 102 may lack the ability toaccess the smoke detector. An accessory may be provisioned that eitherflies, climbs walls, has extension legs, or has other means of accessingthe ceiling and the smoke detector to perform the task or enable robot102 to perform the task.

In a fourth sub-scenario, the customer does not own robot 102 or isotherwise unable to provide any hardware to assist robot 102 inperforming the task. Accordingly, the customer may acquire robot 102 forthe purpose of performing the task.

The forgoing scenario, and related sub-scenarios, illustrates certainbasic operations and components utilized in performing a task.Additional components and instructions utilized to perform a task, aswell as to help ensure success, protect persons, property, and data, andpromote customer acceptance, may be provided. Robot 102 may image theroom or other area to identify the location of the smoke detector. Inthe process, robot 102 may acquire images of people, including children,the layout of the home, location of objects of value, pictures, etc. aswell as acquire certain information related to communications (e.g.,wireless router name and password, network attached devices, etc.).Privacy monitoring 114 may provide instructions to robot 102 (e.g.,delete certain information, downgrade the image quality showing certainelements, turn off microphones, purge all acquired data after thirtyminutes, etc.). Additionally, third-party monitoring/auditing 116 may beprovided to ensure compliance via certification services or otherverification. It should be appreciated that physical security 108,privacy 114, and/or third-party monitoring/auditing 116 may be provided,at least in part, on-board robot 102 and/or a component associated withservice location 104 (e.g., networked device with monitoring software,etc.).

Robot 102, particularly when located within service location 104, may besubject to monitoring by a number of human and/or automated agents. Inone embodiment, robot 102 is within service location 104 andcommunicates with other agents, such as by sending and receiving signalsutilizing antenna 106. Communication components are discussed in greaterdetail with respect to FIG. 2. Robot 102 may then operate within servicearea 104 to perform a task. The presence of the entities and theirstatus, such as whether or not a particular entity is activelymonitoring robot 102, may be reported, such as via message, website,etc. to inform authorized persons of interest that robot 102 isoperating as intended.

In one embodiment, robot 102 communicates with physical security agent108. Physical security agent 108 may ensure robot 102 is within theexpected location for robot 102 (e.g., geo-fencing). Additionally,physical security agent 108 may receive security state indiciaindicating that robot 102 has encountered a security threat such as byan accelerometer within robot 102 reporting a signal indicating robot102 has fallen down a stair or been struck. Other security state indiciamay indicate an attempt by an authorized party to access an internalcomponent, remove a component, disable or hinder operation, or otherhazard which robot 102 may encounter.

In yet another embodiment, physical security agent 108 may includeenvironmental risks to robot 102 such as power spike, temperature,pressure, hazardous chemical, debris, particulate matter, or otherunacceptable operating parameter. Physical security agent 108 may signalrobot 102 and/or on-site personnel to remove robot 102 from its presentlocation.

Physical security agent 108 may be an automated supervisor agent thatmonitors signals and if a security risk is detected, initiate aresponse. If it appears robot 102 is leaving service location 104, butsuch a departure is not expected or authorized, a party may beattempting to steal robot 102. Accordingly, physical security agent 108may signal robot 102 to respond, such as by playing a recorded or liveaudio message (e.g., “Please return me to the service area,” “Help! I'mbeing stolen,” etc.), which may be interactive via a microphone and/orcamera (“Mr. Customer, why are you moving the robot outside?”). Physicalsecurity agent 108 may then authorize the removal if appropriate (e.g.,“I am placing the robot outside to be picked up. I no longer need itsservices”).

Physical security agent 108 may take other actions such as notificationof law enforcement, recording images, audio, GPS, and/or other datawhich may be used by law enforcement to locate robot 102 and partiesattempting to steal robot 102. Robot may have a siren, loudspeaker,strobe or other attention-getting signals which may be activated upon aresponse by physical security agent 108. When physical security agent108 detects deliberate or suspected deliberate misuse or abuse of robot102, physical security agent 108 may present the abusing party, viarobot 102 and/or other communications channel (e.g., call, text, etc.),with a warning to discontinue such actions, indicate a penalty (e.g.,loss of privileges, fee, etc.), or other action designed to mitigateharm inflicted on robot 102 and/or the financial loss to the owner ofrobot 102.

In another embodiment, physical security agent 108 may monitor robot102, and inputs received from components of robot 102, to protectpersons, property, and data. For example, before performing a high-riskoperation (e.g., lighting a gas pilot light, touching an object known tohave a high risk of shattering, etc.) physical security agent 108 mayrequire, directly or via robot 102, that all human personnel are at asafe distance before the task is allowed to be performed. In yet anotherembodiment, physical security 108 may halt the actions of robot 102 andoptionally take over inputs (e.g., manipulate a camera, apply a forcewith an arm, etc.) and, once physical security agent 108 is satisfied,signal robot 102 to proceed with its actions. In still anotherembodiment, physical security agent 108 may observe an event (e.g.,child or pet approaching the robot or other violation of a safety orsecurity protocol) and signal robot 102 to halt operations or perform asafe shut-down (e.g., place itself and other objects under control ofrobot 102 into a safe condition).

In another embodiment, software agent 110 provides access to one or moredownloadable software applications, patches, libraries, etc., to bemaintained by a media of robot 102 for future execution. Software agent110 may receive a request for a service and identify a particularsoftware application or respond to a request for a particular softwareapplication. Software agent 110 may access the software application froma repository and may further require an account, payment, authorization,or other permission from personnel associated with service location 104,an agent associated with robot 102, an agent associated with theparticular software application, government regulatory agency, and/orother permission-determining entity with the decision-making authorityfor at least one of robot 102 and service location 104.

In another embodiment, external processing agent 112 provides liveexecutable software to robot 102. Robot 102, even when configured toperform a task, may lack data or data processing required to perform atleast a portion of the task. Accordingly, robot 102 may communicate withexternal processing agent 112 to gain additional data accessing and/ordata processing resources. For example, robot 102 may be tasks to repaira washing machine. Due to a parts shortage, the manufacturer installed amotor different from the motor provided in the documentation, whichrobot 102 may currently have accessed. Robot 102, or other agent incommunication with robot 102, may identify the discrepancy. However,robot 102 may not have access to the correct information regarding theactual motor. Accordingly, robot 102 may access external processingagent 112 to access motor documentation, which may comprise instructionsfor robot 102 to perform a service (e.g., location of mounting bolts,disconnection procedures for wires, etc.). In another example, robot 102may be performing a task in service location 104 which requires externalknowledge (e.g., external temperature, barometric pressure, etc.), suchas to calibrate an environmentally-sensitive machine. Robot 102 mayaccess external processing agent 112, causing external processing agent112 to locate and provide the requested information.

In another embodiment, external processing agent 112 provides at least aportion of executable instructions. For example, with respect to atleast one function of robot 102, robot 102 is a “dumb terminal” havingprocessor-executable instructions provided by external processing agent112 without storing or attempting to store a complete, or substantiallycomplete, set of the instructions in a media of robot 102. In yetanother embodiment, external processing agent 112 provides command andcontrol signals to and/or from robot 102. The signals may configurerobot 102, operate robot 102 or a portion of robot 102, utilize aninput/output device of robot 102, and/or other remote operation directedby external processing agent 112.

In another embodiment, privacy agent 114 may monitor robot 102, andcomponents thereof, to ensure compliance with a privacy policy. In oneembodiment, privacy agent 114 detects and reports compliance, or lack ofcompliance, with a privacy policy. In another embodiment, privacy agent114 enforces the privacy policy. For example, a robot 102 may be movingthroughout service location 104 to access the location for a task.Persons, photographs, and other images may be encountered. Accordingly,privacy agent 114 may cause the camera(s) of robot 102 to degrade (e.g.,lower resolution, fewer frames, altered contrast or other image setting,introduced noise, redaction, etc.) until such time as the cameras arerequired to perform the task. Information gathered, but not needed afterthe task has been complete, may be monitored by privacy agent 114 andoptionally, purged upon privacy agent 114 signaling robot 102.

In another embodiment, third-party monitoring agent 116 monitors and/oraudits robot 102. Third-party monitoring agent 116 may receive signalsfrom robot 102 and/or any other agents (e.g., agents 108, 110, 112,114), human-submitted observations, other automated systems (e.g., robotdelivery/servicing, financial, credit reporting, etc.) to determine ifrobot 102 is operating within a previously determined protocol.Third-party monitoring agent 116 may demine if a violation of protocolhas occurred and signal personnel associated with at least one ofservice location 104, robot 102, and/or other human or automated agentthat such a violation has occurred. In another embodiment, third-partymonitoring agent 116 may cause, directly or via other agent (e.g.,agents 108, 110, 112, 114), and/or personnel to perform correctiveaction to cause robot 102 to return to operating within the previouslydetermined protocol.

Third-party monitoring agent 116 may access, physically and/orlogically, robot 102 before, during, and/or after the performance of atask at service location 104. Should a problem be encountered (e.g., avirus, out-of-protocol programming, etc.) third-party monitoring agent116 may signal appropriate systems and/or personnel to remedy the issue.For example, a protocol may be established that causes robot 102 topurge all location mapping and images associated with service location102 upon leaving service location 102. Should third-party monitoringagent 116 perform an audit or otherwise determine that such informationwas not purged, personnel and/or systems may be signaled that robot 102has operated outside of the protocol. Accordingly, a malicious or errantprogram that caused any data to be erroneously retained may be addressedand, if successful, third-party monitoring agent 116 may indicate thatrobot 102 has returned to operating within the protocol. Additionally,how such errant instructions came to exist in robot 102 may be analyzedto prevent further violations or identify the potential actions of badactors.

In one embodiment, each of agents 108, 110, 112, 114, and 116 arelocated externally to robot 102. In another embodiment, at least one ofagents 108, 110, 112, 114, and 116 is located internally or co-locatedwith robot 102, entirely or in part. For example, physical securityagent 108 may comprise an on-board theft or abuse detection and responsecomponent to respond promptly but may be directed by or communicate withan external portion of physical security agent 108, such as a human orautomated agent in a contact center which may take, or override, aself-defense, self-preservation, alarm, location, evidence gathering, orother loss prevention action.

FIG. 2 depicts architecture 200 in accordance with embodiments of thepresent disclosure. It should be appreciated that robot 102 generally,and when configured to perform a specific task, may comprise more,fewer, different, and/or differently arranged components from thoseillustrated without departing from the scope of the disclosure provided.Robot 102 comprises a number of internal physical and logical componentsthat may be utilized for performing tasks and other operations of robot102. Robot 102 may interact with the outside world physically byutilization of one or more of mobility/actuator 226, sensor 228, I/Odevice 230, and communications (or “comm”) link 232.

Robot 102 comprises at least one: the physical capability. In oneembodiment, the physical capability is provided by an I/O device 230 asembodied by an output device, which may include, but is not limited to,visual display, speaker, vibrator, indicator, electro-mechanical output,actuator, emitter, etc.

Sensor 228 and/or mobility/actuator 226 may enable robot 102 withphysical movements and optionally measure attributes associated with thephysical movements. For example, mobility/actuator 226 may be arotational motor of an arm attached to, or controlled by, robot 102.Sensor 228 may be an encoder monitoring the position of the arm toensure precision of the rotation of the arm. Sensor 228 may be orutilize other components of robot 102. For example, mobility/actuator226 may be a rotational motor turning a screw. Sensor 228 may beembodied as a camera (e.g., one of I/O devices 230) and terminate therotational motion when the camera detects the screw is properlypositioned or, if removing the screw, no longer present. Sensor 228 maybe embodied as a microphone (e.g., one of I/O devices 230) and detectthe sound of the screw falling into a collection pan. Sensor 228 may bea torque-measuring component and determine the screw has beensufficiently tightened or, if the torque abruptly falls, the screw headmay have been stripped or sheared off. Upon successfully, orunsuccessfully, completing the task, mobility/actuator 226 maydiscontinue rotating the screw.

Mobility/actuator 226 may comprise, but not be limited to, anelectro-mechanical output to provide robot 102 with locomotion,positioning, orientation, etc. for itself and/or an attachment orassociated component. Mobility/actuator 226 may provide anelectro-mechanical output to provide robot 102 with a means of applyinga force (e.g., push, pull, bend, shear, twist, rotate, etc.), directlyor via an attachment or associated component, to another object.

In another embodiment, the physical capability as provided by I/O device230 embodied as an input device may include, but is not limited to, asensor, which may be the same as sensor 228 monitoring an associatedmobility/actuator 226 or a different I/O device 230 may be configured toprovide robot 102 with inputs regarding external factors including, butnot limited to, force, temperature, pressure, chemical, electromagnetic,particle, acoustic/mechanical wave, position, location, orientation,acceleration, etc.

Robot 102 may communicate with other electronic devices viacommunications link 232. Communications link 232 may communicate viaradio-frequency (e.g., Bluetooth, WiFi, GPS, cellular, two-way radio,etc.), infrared, or by using other portions of the electromagneticspectrum. Communications link 232 may comprise a wired communicationlink including, but not limited to, direct connection to another deviceproximate to the robot, wired telephone, wired Ethernet, and/or wiredport (e.g., USB, HDMI, fiber optic, DVD reader/player, etc.).

Onboard I/O 222 provides input/output translation (e.g., drivers,language translation, etc.) to enable other components of robot 102 toutilize/provide input/output device 230. I/O device 230 may allow forthe direct interaction with Robot 102 and comprise one or more of directinput device (e.g., keyboard, mouse, trackpad/trackball,electro-mechanical inputs, dynamically determined function button (softbutton), camera, microphone, etc.). I/O device 230 may be embodied as anaudio device, such as a microphone and speaker, to receive spokencommands, locate sound-emitting sources, acoustic location (sonar),interact with human or automated personnel using a spoken language,audio signal (e.g., alarms, conformation tones, sirens, etc.). I/Odevice 230 may be embodied as a camera to receive gesture commands,locate objects, locate position of robot 102, or other visual operation.I/O device 230, when embodied as a camera, may comprise a sensorconfigured to detect one or more electromagnetic wavelengths, including,but not limited to, visual, infrared, ultraviolet, and x-rays. I/Odevice 230 may comprise imaging and/or distance measuring components(e.g., Radar, LIDAR, etc.). I/O device 230 may also be embodied as amechanical wave imager (e.g., sonogram, sonar, seismic, etc.).Additionally, mobility/actuator 226 and sensor 228 may operate as aprobe to measure distance or determine position for robot 102 or anassociated component. In yet another embodiment, I/O device 230 maycomprise an emitter configured to provide heating, cooling, partial orwave radiation, chemicals, etc.

Robot 102 comprises a number of components generally local to robot 102.It should be appreciated that local components are generally internal torobot 102, but local components may be externally located (e.g.,plugged-in, attached, etc.) or even networked (e.g., accessed viacommunication link 232) are also contemplated and are within the scopeof the disclosure provided herein. Internal components may beinterconnected via bus 202 providing data, signals, and/or otherinformation between components of robot 102. Bus 202 may comprise, butnot be limited to, inter/intra chip bus, backplane, jumper, etc.

Robot 102 comprises, in part, a computer. As such, robot 102 comprisespower module 204 to provide power to components, such as processor 236and other components. Power 204 may manage batteries, cause thesignaling of a low-power state, monitor and/or manage direct powerconnections, and/or provide power to other components, such asmobility/actuator 226. Power 204 may respond to queries, such as todetermine the estimated power duration available or if a certain amountof power, such as to perform a task, is available. Power 204 may managepower from a variety of sources (e.g., solar panels, plug-in, batteries,mechanical energy stores (e.g., springs), etc.) and provide such powerto components needing power.

Fault detection 206 comprises means to detect, and optionally manage,any out of parameter operation of robot 102. In one embodiment,processor 236 commands mobility/actuator 226 to apply a force to anobject. Mobility/actuator 226 draws power, via power 204, commensuratewith the desired force. However, the actually force measured by sensor228 may be outside of an expected for the force. Fault detection 206 maydetermine that a fault exists and apply an adjustment (e.g., increasethe amount of power requested to apply the desired force) or indicate afault, known or unknown, which may lead to robot 102 discontinuing atask, seeking assistance from a human or automated agent, or otheraction associated with a particular fault.

Motion/mobility control 208 comprises drivers and/or other componentsutilized in translating a requested action into a resulting action.Motion/mobility control 208 may comprise device-specific drivers, forexample, mobility/actuator 226 may be a robotic arm having a first setof functionalities. Upgrading the robotic arm may introduce new ordifferent functionalities and, accordingly, motion/mobility control 208is modified accordingly. In one embodiment, legacy support is providedso that processor 236 issuing a command to the arm (e.g., “retract”)performs the same action on the upgraded arm. Additional, different, orfewer commands/features may also be provided by a particularmobility/actuator 226 and/or sensor 228, and accommodated by,motion/mobility control 208.

Data storage 210 and/or memory 214 comprises a medium enabling data tobe stored and accessed by robot 102. Data storage 210 and memory 214 maybe integrated or distinct and comprise magnetic, optical, electrical,and/or other data storage media.

In one embodiment, robot 102 may require task-specific instructionsand/or data to perform a task. Additionally, task-specific data may begathered by robot 102. Robot 102 may utilize specific task data 212 forsuch purposes and, upon completion of a task, discard the data stored inspecific task data 212. For example, a mapping of a home (e.g., aservice location 104) is performed in order for robot 102 to complete atask. Once the task is complete, such information is unneeded and evenpresents a security risk. Accordingly, upon completion of the task,specific task data 212 is purged without affecting other data (e.g.,data in data storage 210, memory 214, etc.).

Operating software 216 may provide an operating system, drivers,translators, and/or other information in order to facilitate robot 102performing a task.

Task-specific instructions 218 may comprise task data or instructions.Task-specific instructions 218 may be dynamic and/or removable, such asto facilitate the ready reprogramming of robot 102 for a different task,functionality specific (e.g., operation of a particular sensor, roboticarm, imager, etc.).

Security 220 may provide monitoring, communication, and/or othersecurity operations to protect robot 102 and/or persons, property, anddata. Security 220 may ensure safe operation of robot 102. For example,even though a robotic arm is capable of moving at a given high rate ofspeed, security 220 may limit the speed to ensure safe operation ofrobot 102. Security 220 may comprise a number of computer protectionmeans, including, but not limited to, anti-virus, communicationencryption, theft detection, attack detection, unauthorized access,damage, uncertified hardware/software, suspicious activity, etc.

Communication (or “comm”) management 224 provides operational featuresto enable robot 102 to utilize communication link 232. For example,communication management 224 may comprise a network interface card(nic), SIM card, and/or other networking components (e.g., 802.11nchipset, GSM chipset, LTE chipset, etc.). Communication link 232 may beprovided via emitting/detecting equipment such as antennae,emitter/receiver, port, cable, and/or other communication hardware.Communication management 224 may comprise, alone or in concert withother components, safety and/or power management protocols. For example,communications management 224 may be providing high-definition audio andvideo to a contact center agent during the performance of a task. Theagent may be monitoring a critical or sensitive subject of the task.Should the communication degrade, communications management 224 maythrottle down (e.g., reduce resolution, frame rate, etc.) the quality ofthe video, terminate the audio, or take another action to ensure theagent is able to maintain some observational capability. In anotherembodiment, communications management 224 may veto a task to beperformed by robot 102. Robot 102 may be performing a task that requiresan acute observation, provided by a networked agent. If communicationsmanagement 224 determines that the quality of communications isunsatisfactory, the task may be paused until a better communication linkis established.

Communications management 224 may also provide channel managementservices. For example, robot 102 may be utilizing a public-accesswireless network to communicate non-sensitive information (e.g.,“heartbeat” signal, battery power remaining, etc.). However, for moresensitive information (e.g., images of service location 104, medicalinformation, etc.) communications management 224 may establish a VPN orutilize a different channel (e.g., cellular network) for suchinformation. Similarly, communications may fail or degrade on onechannel and communications management 224 may establish or utilizeanother channel to help maintain communications.

Communications management 224 may provide more routine computationalfunctions such as maintaining access credentials to networks,authorizing or denying access to robot 102 (e.g., physical or virtualservice ports).

Processor 236 may provide general computing (e.g., arithmetic logicunit, graphical processing, etc.) and/or specific (e.g., imageprocessing, gesture interpretation, etc.) for robot 102.

FIG. 3 depicts system 300 in accordance with embodiments of the presentdisclosure. Configured robot 314 may be configured to perform a task orset of tasks from un-configured robot 310. Transformation ofun-configured robot 310 to configured robot 314 is variously embodied.In one embodiment, user 302, alone or with benefit of an electroniccommunication device (e.g., smart phone, Internet connected computer,dedicated robot configuring device, etc.) provides processor 304 with anissue or task. In one embodiment, processor 304 may be a portion of acontact center, robot application store, local device, service provider,and/or other entity or enterprise. User 302 may provide processor 304with a specific instruction, such as one of instructions 308A-n,requested or identify a task or issue to solve, whereby processor 304determines the appropriate instruction.

In one embodiment, un-configured robot 310 requires softwareinstructions and a hardware accessory in order to perform a particulartask. User 302 provides the issue or task or specifies the instructionscausing processor 304 to access data repository 306 comprisinginstructions 308. Processor 304 determines that instruction C (308C) isthe appropriate instruction. Processor 304 then causes un-configuredrobot 310 to load instruction set 308C thereby causing robot 310 tobecome configured robot 314. Configured robot 314 may then be deployedfor the performance of the task.

User 302 may own or otherwise control unconfigured robot 310. User 302may install hardware accessory 312 and or instruction C (308C) directlyor via request to processor 304. Processor 304 may determine the requestrequires unconfigured robot 310 to have (e.g., attached, installed,paired, available, in communication with, etc.) hardware accessory 312to enable configured robot 314 to perform the task. Processor 304 maythen instruct a party, such as installer, user 302, or other party toobtain and install hardware accessory 312 into un-configured robot 310in order to transform un-configured robot 310 into configured robot 314.In another embodiment, such as when user 302 does not have direct accessto un-configured robot 310, processor 304 may cause a provisioningentity to access robot 310 install hardware accessory 312 and/orinstruction C (308C) to make configured robot 314 available for theperformance of the task. In yet another embodiment, the selectedinstruction, such as instruction C (308C), may be provided toun-configured robot 310 as part of the installation of hardwareaccessory 312.

Processor 304 may cause or perform certain pre-provisioning,provisioning, pre-deployment, deployment, and/or post-deploymentprocedures, such as to help ensure the security of configured robot 314,user 302, a service area such as service area 104, and other persons,property, and data. In one embodiment, processor 304 causesun-configured robot 310 to be purged of any nonessential data, hardware,and/or software. Processor 304 may also perform the capabilitiesassessment, such as to ensure un-configured robot 310, once configuredto become configured robot 314, would be capable of performing the taskprovided to it by user 302 and associated processor 304. In anotherembodiment, processor 304 may insure the presence of security and/orsafety components, including, but not limited to, safety shutoff,antivirus software, location finding components, etc. Additionally,processor 304 may verify other operational characteristics ofun-configured robot 310 and/or configured robot 314, such as to ensureconfigured robot 314 is operating within acceptable performanceparameters. For example, processor 304 may ensure that movements are asexpected, for example to ensure that a robotic arm is not bent, thatsensors are operating as expected, and/or other operational needs ofrobot 314 are acceptable. Accordingly, un-configured robot 310 orconfigured robot 314 may be exercised and observed by componentsinternal to un-configured robot 310 or configured robot 314 or externalthereto.

Should configured robot 314, or un-configured robot 310 once configured,be determined to be unsuitable or unable to performance the task,processor 304 may attempt to provision a different configured robot 314,dispatch a human agent, or notify user 302 that the task is not able tobe performed by a robot and/or seek a different means to perform thetask.

FIGS. 4A-4D depict systems comprising robot 102 and instructions 410selected to configure robot 102 into a task-specific robot. The locationof instructions 410 are variously embodied and may enable robot 102 tooperate autonomously without any further human involvement. Instructions410 may be placed on various components accessible to robot 102 as amatter of convenience or as a matter of performance or practicality. Forexample, instructions 410 may require a number of human inputs, such aspreferences, and by locating instructions 410 on a user device (See,FIG. 4B) the user may be presented with detailed graphics or other meansby which to make a determination and input their preferences. In anotherembodiment, the potential set of instructions 410 may be too large toload internally to robot 102; accordingly, various associated componentsmay be provided with instructions 410 to be selectively available torobot 102. For example, robot 102 may be configured to perform a taskthat has a decision and based on the occurrence of an event, executesone very large file or a second very large file. The problem compoundsif there are many path options that may be encountered and many largefiles. Accordingly, instructions 410, in whole or in part, may bemaintained outside of robot 102.

While instructions 102 may be machine instructions and stored as binarydata, the media encompassing instructions 410 is variously embodied.While a data download may provide instructions 410 directly to internalstorage or memory of robot 410, other media (e.g., magnetic, optical,PROM, ePROM, fPROM, USB memory stick, proprietary media, etc.) mayembody instructions 410 and be made available to robot 102.

FIG. 4A depicts system 400 comprising instructions in accordance withembodiments of the present disclosure. In one embodiment, robot 102comprises instructions 410 located with (e.g., data storage 210,specific task data 212, memory 214, task-specific instructions 218,and/or other storage medium).

FIG. 4B depicts system 406 comprising instructions in accordance withembodiments of the present disclosure. In one embodiment, device 408comprises instructions 410 accessed by robot 102. Robot 102 may be incommunication with device 408 via wired or wireless communications andexecuting instructions directly retrieved from device 408 and/ordownloading at least a portion of instructions 410 for execution. Inanother embodiment, at least a portion of instructions 410 compriseinputs and/or outputs for human operator of device 408. Device 408 maybe local, such as within service area 104, to robot 102. In anotherembodiment, device 408 may be a significant distance from robot 102,such as via communication incorporating the Internet, cellular network,telephone network, and/or other network.

FIG. 4C depicts system 412 comprising instructions in accordance withembodiments of the present disclosure. In one embodiment, attachment 414comprises instructions 410 for execution by robot 102. Attachment 414may comprise a physical capability provider for robot 102, such asmobility/actuator 226, sensor 228, I/O device 230, communication link232, and/or other component.

FIG. 4D depicts system 416 comprising instructions in accordance withembodiments of the present disclosure. Robot 418 comprises instructions410 for execution by robot 102. Robot 418 may be a supervisor roboton-site or remotely located or one of a plurality of robots, includingrobot 102, deployed for the performance of a task. In a further option,robot 418 may be solely provided for the purpose of maintaininginstructions 410 for use by robot 102.

FIG. 5A depicts multiple robot system 500 in accordance with embodimentsof the present disclosure. In one embodiment, service location 104comprises a plurality of robots engaged in single or disparate tasks. Inone embodiment, supervisor robot 502 is provided within service location104 for the purposes of monitoring robot 102. Supervisor robot 502 maycommunicate with robot 102 and/or other devices via antenna 504 andassociated communication hardware. Additionally, supervisor robot 502may provide observational supervision such as via camera 506, or otherinput device (e.g., microphone, radar, etc.). Supervisor robot 502 maydetermine robot 102 is operating outside of expected parameters,unsafely, unsecurely, or otherwise represents a hazard to itself,supervisor robot 502, persons, property, and/or data.

Supervisor robot 502 may monitor data exchanged or be a conduit forcommunications to and from robot 102 and monitoring the content thereof.Should robot 102 attempt to provide confidential information, supervisorrobot 502 may block the transmission and may further identify robot 102is compromised. If compromised, robot 102 on its own accord or viacommand from supervisor robot 502 may cause robot 102 to shut down,discontinue certain operations, enter a safe state, or otherwise takeaction to mitigate the security risk. Similarly supervisor robot 502 mayobserve robot 102 performing abnormally or unexpectedly. As a result,supervisor robot 502 may cause robot 102 to change operations, notify anoperator, or discontinue performing the operation.

Supervisor robot 502 may monitor a plurality of robots 102 such as toensure proper coordination of physical activities. For example, robot102 and a number of peer robots may be attempting to lift four cornersof an object uniformly. Supervisor robot 502 may monitor each of robots102 and the number of peer robots and/or the object being lifted toensure coordination or take appropriate action if coordination is notevident to the degree expected.

In another embodiment, supervisor robot 502 may be remotely located andoutside of service location 104. For example supervisor robot 502 may beoutside of a home providing a communication link to robot 102 viashort-term communication protocol (e.g., Bluetooth) while supervisorrobot 502 communicates with another component via a different network,such as a long-range network utilizing the Internet, cellulartelephones, satellite link, etc., supervisor robot 502 may also belocated within a contact center or other service provider.

FIG. 5B depicts a second multiple robot system 514 in accordance withembodiments of the present disclosure. In one embodiment, a plurality ofrobots 102 is provided for the performance of the task. For example,robot 102 may form part one of a two-robot team further comprising robot508. Robot 508 and robot 102 may communicate via radio frequencycommunications, such as via antennas 510 and 106 or other communicationdevice. Additionally, one or more of robots 102 and robot 508 maycomprise a camera 512 or other observational monitoring device as ameans of coordination of efforts between robot 102 and robot 508. Robots102 and 508 may be working in concert to perform a single task (e.g.,team lift), the same task with respect to different objects to dividethe labor (e.g., each mowing a portion of a field), or differentcomponents of the same task (e.g., one operating a motor, the otherperforming an action with the motor causes an object to be correctlypositioned).

Communication to other entities may be provided individually by robot508 and robot 102, or one of robot 508 and robot 102 may serve as aproxy for the other. In yet another embodiment, robot 508 may comprisesupervisor robot 502 (See, FIG. 5A).

With reference now to FIG. 6, communication system 600 is discussed inaccordance with at least some embodiments of the present disclosure. Thecommunication system 600 may be a distributed system and, in someembodiments, comprises a communication network 604 connecting one ormore communication devices 608 to a work assignment mechanism 616, whichmay be owned and operated by an enterprise administering contact center602 in which a plurality of resources 612 is distributed to handleincoming work items (in the form of contacts) from customercommunication devices 608.

Contact center 602 is variously embodied to receive and/or send messagesthat are or are associated with work items and the processing andmanagement (e.g., scheduling, assigning, routing, generating,accounting, receiving, monitoring, reviewing, etc.) of the work items byone or more resources 612. The work items are generally generated and/orreceived requests for a processing resource 612 embodied as, or acomponent of, an electronic and/or electromagnetically conveyed message.Contact center 602 may include more or fewer components than illustratedand/or provide more or fewer services than illustrated. The borderindicating contact center 602 may be a physical boundary (e.g., abuilding, campus, etc.), legal boundary (e.g., company, enterprise,etc.), and/or logical boundary (e.g., resources 612 utilized to provideservices to customers for a customer of contact center 602).

Furthermore, the border illustrating contact center 602 may beas-illustrated or, in other embodiments, include alterations and/or moreand/or fewer components than illustrated. For example, in otherembodiments, one or more of resources 612, customer database 618, and/orother component may connect to routing engine 632 via communicationnetwork 604, such as when such components connect via a public network(e.g., Internet). In another embodiment, communication network 604 maybe a private utilization of, at least in part, a public network (e.g.,VPN); a private network located, at least partially, within contactcenter 602; or a mixture of private and public networks that may beutilized to provide electronic communication of components describedherein. Additionally, it should be appreciated that componentsillustrated as external, such as social media server 630 and/or otherexternal data sources 634 may be within contact center 602 physicallyand/or logically, but still be considered external for other purposes.For example, contact center 602 may operate social media server 630(e.g., a website operable to receive user messages from customers and/orresources 612) as one means to interact with customers via theircustomer communication device 608.

Customer communication devices 608 are embodied as external to contactcenter 602 as they are under the more direct control of their respectiveuser or customer. However, embodiments may be provided whereby one ormore customer communication devices 608 are physically and/or logicallylocated within contact center 602 and are still considered external tocontact center 602, such as when a customer utilizes customercommunication device 608 at a kiosk and attaches to a private network ofcontact center 602 (e.g., WiFi connection to a kiosk, etc.), within orcontrolled by contact center 602.

It should be appreciated that the description of contact center 602provides at least one embodiment whereby the following embodiments maybe more readily understood without limiting such embodiments. Contactcenter 602 may be further altered, added to, and/or subtracted fromwithout departing from the scope of any embodiment described herein andwithout limiting the scope of the embodiments or claims, except asexpressly provided.

Additionally, contact center 602 may incorporate and/or utilize socialmedia server 630 and/or other external data sources 634 may be utilizedto provide one means for a resource 612 to receive and/or retrievecontacts and connect to a customer of a contact center 602. Otherexternal data sources 634 may include data sources, such as servicebureaus, third-party data providers (e.g., credit agencies, publicand/or private records, etc.). Customers may utilize their respectivecustomer communication device 608 to send/receive communicationsutilizing social media server 630.

In accordance with at least some embodiments of the present disclosure,the communication network 604 may comprise any type of knowncommunication medium or collection of communication media and may useany type of protocols to transport electronic messages betweenendpoints. The communication network 604 may include wired and/orwireless communication technologies. The Internet is an example of thecommunication network 604 that constitutes an Internet Protocol (IP)network consisting of many computers, computing networks, and othercommunication devices located all over the world, which are connectedthrough many telephone systems and other means. Other examples of thecommunication network 604 include, without limitation, a standard PlainOld Telephone System (POTS), an Integrated Services Digital Network(ISDN), the Public Switched Telephone Network (PSTN), a Local AreaNetwork (LAN), a Wide Area Network (WAN), a Session Initiation Protocol(SIP) network, a Voice over IP (VoIP) network, a cellular network, andany other type of packet-switched or circuit-switched network known inthe art. In addition, it can be appreciated that the communicationnetwork 604 need not be limited to any one network type and instead maybe comprised of a number of different networks and/or network types. Asone example, embodiments of the present disclosure may be utilized toincrease the efficiency of a grid-based contact center 602. Examples ofa grid-based contact center 602 are more fully described in U.S. PatentPublication No. 2010/0296417 to Steiner, the entire contents of whichare hereby incorporated herein by reference. Moreover, the communicationnetwork 604 may comprise a number of different communication media, suchas coaxial cable, copper cable/wire, fiber-optic cable, antennas fortransmitting/receiving wireless messages, and combinations thereof.

The communication devices 608 may correspond to customer communicationdevices. In accordance with at least some embodiments of the presentdisclosure, a customer may utilize their communication device 608 toinitiate a work item. Illustrative work items include, but are notlimited to, a contact directed toward and received at a contact center602, a web page request directed toward and received at a server farm(e.g., collection of servers), a media request, an application request(e.g., a request for application resources location on a remoteapplication server, such as a SIP application server), and the like. Thework item may be in the form of a message or collection of messagestransmitted over the communication network 604. For example, the workitem may be transmitted as a telephone call, a packet or collection ofpackets (e.g., IP packets transmitted over an IP network), an emailmessage, an Instant Message, an SMS message, a fax, and combinationsthereof. In some embodiments, the communication may not necessarily bedirected at the work assignment mechanism 616, but rather may be on someother server in the communication network 604 where it is harvested bythe work assignment mechanism 616, which generates a work item for theharvested communication, such as social media server 630. An example ofsuch a harvested communication includes a social media communicationthat is harvested by the work assignment mechanism 616 from a socialmedia network or server 630. Exemplary architectures for harvestingsocial media communications and generating work items based thereon aredescribed in U.S. patent application Ser. Nos. 12/784,369, 12/706,942,and 12/707,277, filed Mar. 20, 2010, Feb. 17, 2010, and Feb. 17, 2010,respectively; each of which is hereby incorporated herein by referencein its entirety.

The format of the work item may depend upon the capabilities of thecommunication device 608 and the format of the communication. Inparticular, work items are logical representations within a contactcenter 602 of work to be performed in connection with servicing acommunication received at contact center 602 (and, more specifically,the work assignment mechanism 616). The communication may be receivedand maintained at the work assignment mechanism 616, a switch or serverconnected to the work assignment mechanism 616, or the like, until aresource 612 is assigned to the work item representing thatcommunication. At which point, the work assignment mechanism 616 passesthe work item to a routing engine 632 to connect the communicationdevice 608, which initiated the communication, with the assignedresource 612.

Although the routing engine 632 is depicted as being separate from thework assignment mechanism 616, the routing engine 632 may beincorporated into the work assignment mechanism 616 or its functionalitymay be executed by the work assignment engine 620.

In accordance with at least some embodiments of the present disclosure,the communication devices 608 may comprise any type of knowncommunication equipment or collection of communication equipment.Examples of a suitable communication device 608 include, but are notlimited to, a personal computer, laptop, Personal Digital Assistant(PDA), cellular phone, smart phone, telephone, or combinations thereof.In general, each communication device 608 may be adapted to supportvideo, audio, text, and/or data communications with other communicationdevices 608 as well as the processing resources 612. The type of mediumused by the communication device 608 to communicate with othercommunication devices 608 or processing resources 612 may depend uponthe communication applications available on the communication device608.

In accordance with at least some embodiments of the present disclosure,the work item is sent toward a collection of processing resources 612via the combined efforts of the work assignment mechanism 616 androuting engine 632. The resources 612 can either be completely automatedresources (e.g., Interactive Voice Response (IVR) units,microprocessors, servers, or the like), human resources utilizingcommunication devices (e.g., human agents utilizing a computer,telephone, laptop, etc.), or any other resource known to be used incontact center 602.

As discussed above, the work assignment mechanism 616 and resources 612may be owned and operated by a common entity in a contact center 602format. In some embodiments, the work assignment mechanism 616 may beadministered by multiple enterprises, each of which has its owndedicated resources 612 connected to the work assignment mechanism 616.

In some embodiments, the work assignment mechanism 616 comprises a workassignment engine 620, which enables the work assignment mechanism 616to make intelligent routing decisions for work items. In someembodiments, the work assignment engine 620 is configured to administerand make work assignment decisions in a queueless contact center 602, asis described in U.S. patent application Ser. No. 12/882,950, the entirecontents of which are hereby incorporated herein by reference. In otherembodiments, the work assignment engine 620 may be configured to executework assignment decisions in a traditional queue-based (or skill-based)contact center 602.

The work assignment engine 620 and its various components may reside inthe work assignment mechanism 616 or in a number of different servers orprocessing devices. In some embodiments, cloud-based computingarchitectures can be employed whereby one or more components of the workassignment mechanism 616 are made available in a cloud or network suchthat they can be shared resources among a plurality of different users.Work assignment mechanism 616 may access customer database 618, such asto retrieve records, profiles, purchase history, previous work items,and/or other aspects of a customer known to contact center 602. Customerdatabase 618 may be updated in response to a work item and/or input fromresource 612 processing the work item.

It should be appreciated that one or more components of contact center602 may be implemented in a cloud-based architecture in their entirety,or components thereof (e.g., hybrid), in addition to embodiments beingentirely on-premises. In one embodiment, customer communication device608 is connected to one of resources 612 via components entirely hostedby a cloud-based service provider, wherein processing and data storageelements may be dedicated to the operator of contact center 602 orshared or distributed amongst a plurality of service provider customers,one being contact center 602.

In one embodiment, a message is generated by customer communicationdevice 608 and received, via communication network 604, at workassignment mechanism 616. The message received by a contact center 602,such as at the work assignment mechanism 616, is generally, and herein,referred to as a “contact.” Routing engine 632 routes the contact to atleast one of resources 612 for processing.

In another embodiment, at least one of resource 612 maybe “robotqualified” and possess the skills to interact with a robot, such asrobot 102, and/or devices and personnel associated with robot 102.Resource 612 maybe automated, human, and/or a combination thereof.Resource 612 may instruct, operate, and/or supervise robot 102 or thecoordination of robot 102 with other robots, devices, and personnel. Inyet another embodiment, resource 612 may qualify, provision,certify/verify, audit, dispatch, retrieve, de-provision, and/or otherlogistical operation for robot 102, instructions, and/or hardwarerequired for robot 102 to perform a task without undue risk to persons,property, or data.

FIG. 7 depicts communication system 700 in accordance with embodimentsof the present disclosure. Communication system 700 generally comprisesportions of communication system 600, and/or other device-device anddevice-human communication components, which are omitted for the sake ofavoiding unnecessarily complicating the figure. Generally, communicationsystem 700 comprises three nodes which may be, or be at least capableof, communication at the same or different times. In one embodiment,customer 302, which may be utilizing customer communication device 608,is enabled to communicate with contact center 602 and robot-qualifiedagent 702. Robot-qualified agent 702 comprises at least one of resource612 having been designated as qualified as having skills related torobots and/or resolving customer service requests by utilizing roboticagents, such as robot 102.

In one embodiment, customer 302 communicates with robot 102 directly andnatively. For example, customer 302 communicates to robot 102 byspeaking and/or gesturing. As a result, robot 102, for example utilizingI/O device 230 when embodied as a microphone, hears spoken commands orother information provided by customer 302. Similarly I/O device 230,when embodied as a camera, may see customer 302 gesture to issuecommands. Gestured commands, natively, may include, but are not limitedto, pointing, looking (e.g., eye position), facial expression, waving,sign language, body position, interacting (e.g., pointing, touching,holding, looking, moving, etc.) with an object other than robot 102,physical activity (e.g., running, walking, sitting, standing, etc.),location/orientation (e.g., present in a location having a meaningdifferent than if present in another location, arm position, legposition, etc.), attire, proximity to another human, physicalinteraction with another human, identity of a proximate other human,role of a proximate other human, and/or other observable human trait,attribute, or behavior.

In another embodiment, customer 302 communicates with robot 102 directlyand non-natively. For example, customer 302 may utilize a smart phone orpersonal computer with a communications link with robot 102 to enablecustomer 302 to communicate with robot 102. In another embodiment,customer 302 may communicate with robot 102 via an I/O device 230 whenembodied as a keypad, button, dial, mouse, touchpad, etc. Additionally,customer 302 may communicate with robot 302 via manipulation of acomponent in communication with sensor 228 and/or I/O device 230. Forexample, customer 302 may push robot 102 to convey a command to move,move an arm or other component of robot 102 to cause robot 102 to go toor interact with to an item of interest or perform a desired action.Customer 302 may point (e.g., hand and/arm gesture, eye gesture, etc.)or utilize a pointing device (e.g., stick, cane, laser pointer, etc.) toconvey a particular item or location to robot 102 observing customer 302and/or the pointing device, or an output therefrom, via a camera and/orother I/O device 230.

Customer 302 may communicate with robot-qualified agent 702 via acustomer communication device 608. Robot 102 may communicate withrobot-qualified agent 702 via a customer communication device 608. Eachof customer 302, robot 102, and robot-qualified agent 702 may serve ascommunication link for the other two. For example, robot-qualified agent702 and customer 302 may communicate via robot 102, customer 302 androbot 102 may be in communication via robot-qualified agent 702 and/orat least one component of contact center 602, or robot 102 androbot-qualified 702 and/or at least one component of contact center 602may be in communication via customer 302 and/or customer communicationdevice 608.

In another embodiment, robot 102 may be supervised via one or both ofcustomer 302 and robot-qualified agent 702. Supervision may includebeing observed, overriding an action, stopping an action, halting anaction until permission is granted, emergency shut-down, and/orscuttling robot 102. Scuttling robot 102 may comprise a purging of alldata gathered with respect to customer 302 and/or service location 104,the entirety of all volatile memory of robot 102, or the circuitry anddata of robot 102 (e.g., such as application of a voltage designed todestroy operations of at least some circuitry, electromagnetic pulse,and/or other means to “brick” robot 102 and render it inoperable and/ordevoid of some or all data).

In another embodiment, at least one of customer 302, robot-qualifiedagent 702, and robot 102 must be authenticated to at least one of theothers of customer 302, robot-qualified agent 702, and robot 102. Absentauthentication, robot 102 may be disabled entirely, disabled withrespect to a particular task, purged of task-specific data and/orinstructions, or other action selected for unauthorized parties. Robot102 may seek to authenticate customer 302 to ensure a person attemptingto utilize robot 102 is an authorized party. Robot 102 may ask for ausername, password, biometric information, non-verbal password, and/orother input which is designed to be provided only by the authorizedparty. A non-verbal password may be a gesture of the human orinteraction with robot 102. For example, a non-verbal password maycomprise the human touching a contact-sensitive portion of an arm ofrobot 102, then crossing their arms, and then moving the arm of robot102 in a circle. Robot 102 may evaluate the authentication attemptdirectly and/or utilize robot-qualified agent 702 and/or other resourceof contact center 602.

In another embodiment, robot 102 is authenticated to robot-qualifiedagent 702 and/or other resource of contact center 602. For example,robot 102 may be selected to receive an instruction, such as one ofinstructions 308, after customer 302 purchased such instructions therebyenabling robot 102 to perform a task. Customer 302 may have providedrobot-qualified agent 702 and/or other resource 612 of contact center602 with a unique indicia identifying robot 102. Upon robot 102 beingauthenticated to robot-qualified agent 702 and/or other resource 612 ofcontact center 602, the instructions 308 are provided to robot 102and/or activated.

FIG. 8 depicts communication system 800 in accordance with embodimentsof the present disclosure. In one embodiment, robot 102 communicateswith contact center 602, and optionally robot-qualified agent 702, vianetwork 604. As a part of, or link to network 604, robot 102 may utilizeone or more of satellite 802, cellular tower 804, local equipment 806,and/or other available network or network component. In one embodiment,local communication equipment 806 comprises equipment providingcommunication services to/from robot 102 while robot 102 is at servicelocation 104, dispatched to a public site, private site open to thepublic, private site authorized to be accessed by robot 102, or otherlocation having communication equipment 806 usable by robot 102 when inor proximate to the location.

In another embodiment, local node 808 may comprise a computer, smartphone, tablet computer, storage device, output device, node on adifferent network, and/or other communication device comprising a nodeto local communication equipment 806. In one embodiment, local node 808may be a monitor for communication between robot 102 and contact center602 utilizing local communication equipment 806. Monitoring may bepassive, wherein a user of local node 808 merely observes suchcommunications, or active, wherein a user of local node 808 mayauthorize, deny authorization, provide input, interact with robot 102,and/or interact with contact center 602 via local node 808.

FIG. 9 depicts interaction 900 in accordance with embodiments of thepresent disclosure. Customer 302 may have a customer service need andinteract with contact center 602 to address the need. To avoidunnecessarily complicating the figure, portions of contact center 602are omitted. In one embodiment, customer 302 initiates contact torequest a service from agent 612. In one embodiment, agent 612 is ahuman agent. In another embodiment, agent 612 is an automated agent. Inyet another embodiment, agent 612 comprises portions of a human andportions of a automated agent, such as when a human agent presents orapproves a recommendation of an automated agent, a human agent presentsor receives information from robot 102 translated into a human-readablelanguage understood by human agent 612. For example, a robot may providea machine signal (e.g., “ARM1:x=235, y=0,z=183; 15 deg/sec; 3Newton/meters”) to an automated counterpart of agent 612, which maytranslate such information and present “arm positioned and turning—lowforce, low speed” to human counterpart of agent 612 who does not requiretechnical specifics. As a further option, the words (herein presented inEnglish) may be further translated into a language understood by thehuman counterpart of agent 612.

In one embodiment, step 901 presents an issue to agent 612 from customer302. Optionally, step 904 may comprise troubleshooting techniques, whichmay be performed by customer 302 and instructed by agent 612 (e.g.,“Have you tried turning it off and on again?” “Check the connector,”etc.). Agent 612 may determine that a robot may be able to perform atask to resolve the issue presented in step 901 and/or discovered duringother interaction between customer 302 and agent 612.

Steps 906 and 908 determine that a robot is not available at thelocation, such as service location 104, to perform a task requiring aphysical action at the location. Customer 302 and agent 612 arrange fordelivery of a robot at step 910. Next, agent 612 signals server 902 toprovision robot 102 in order to perform the task. Server 902 performsprovisioning step 912 of robot 102.

Provisioning of robot 102 in step 914 is variously embodied. In oneembodiment, robot 102 may be already provisioned to perform the task andstep 916 merely performs a verification that robot 102 is “alive” andavailable to be dispatched to perform the task. In another embodiment,robot 102 lacks the instructions and/or hardware to perform the task andprovisioning comprises loading instructions and/or hardware to robot 102(See, FIG. 3).

Provisioning step 914 may comprise additional efforts to ensure thesafety of persons, property, and data. In one embodiment, step 914provides a “cleaning” process to ensure that robot 102 does not possessunwanted, foreign, unexplained, and/or uncertified code, instructions,settings, etc. Verification step 916 may be provided to validate robot102. In another embodiment, step 914 provides additional instructions,data, and/or security hardware to robot 102. For example, a “kill”switch, third-party monitoring/auditing software, anti-virus software,encryption, and/or other hardware and/or software may be provided toensure robot 102 operates as expected without undue risk to persons,property, or data. Step 916 may ensure robot is property configured toperform the task and maintain safety and security. Once step 916 hasbeen completed, robot 102 is ready to be dispatched.

Step 918 dispatches robot 102 to the location of the task, such asservice location 104. Dispatch step 918 may comprise shipping robot 102via freight carrier (e.g., postal service, private courier, etc.), humandelivery agent, and/or automated delivery agent. For example, robot 102may be self propelled and able to navigate to service locationautonomously or via a delivery robot (e.g., self-driving car, etc.).Robot 102 then performs task at step 920. Once the task is complete,customer 302 dismisses 922 robot 102. As a further option, agent 612and/or robot 102, itself, may dismiss robot 102. It should beappreciated that a task is complete when the task has been successfullyor unsuccessfully concluded. For example, an additional problem,mistake, failure, or other issue may cause a task to be completedunsuccessfully, wherein another means of performing the task (e.g.,different robot, human service agent, abandonment of the task, etc.) maybe performed.

Upon completion of the task, data collected by robot 102, and optionallyspecialized instructions utilized to perform the task, may be purged asa component of cleaning robot 102 at step 924. Step 924 may furthercomprise charging batteries, removing any specialized hardware orsoftware installed during provisioning step 914. Task- or site-specificdata gathered by robot 102 may be purged. Step 924 may further compriseallowing a third-party to verify and/or audit robot 924 to ensure it is“cleaned” to a level determined by a previously established protocol.

FIG. 10 depicts interaction 1000 in accordance with embodiments of thepresent disclosure. Interaction 1000 may be implemented when a robot102, of unknown or unverified capability, is available to perform thetask. In one embodiment, customer 302 contacts agent 612 and presents anissue at step 1002. Step 1004 may be provided to perform informationgathering and/or troubleshooting. Agent 612 may determine that a roboticagent would be an option to perform the task. Steps 1006 and 1008 informagent 612 that a robot is, or will be, available on-site, such as acustomer-owned or operated robot.

Agent 612 may be provided with data regarding the on-site robot 102. Atstep 1010, Agent 612 causes server 902 to provision the robot. Step 1012connects server 902 to robot 102 for provisioning. Step 1014 verifiesthe robot. Verification may be query-response (e.g., “What are yourcapabilities?” “What is your model number?” etc.) or operational. Agent612 and/or other component of contact center 602 or other datarepository may be able to determine capabilities upon accessing arobot's manufacturer, model number, options, etc. Operationalverification may determine if robot 102 is capable of performing certainactions or performing certain actions with a required precision orforce. For example, instructing robot 102 to perform an action andobserving whether the action was performed with sufficient precision,strength, etc. The results may be determined via at I/O Device 206 orother observation. Verify step 1014 may also ensure that neededconsumables (e.g., battery charge, chemicals, etc.) are, or can be made,available to robot 102 prior to performing the task.

Step 1014 may further determine that robot 102 has sufficient protectionmeasures in place to ensure property, persons, and data are not going tobe placed into a situation with undue risk. For example, step 1014 mayensure anti-viral, third-party monitoring, safety cut-offs, “kill”switch, scuttle, data ports, and/or other features are in working orderand compliant with a previously determined safety criteria.

Step 1016 provisions robot 102, such as to ensure robot 102 isconfigured to perform the task, which may have been identified in step1002. Step 1016 may be the application of software, hardware component,or both. Step 1016 may further provision additional robots (peer and/orsupervisor) and ensure required inter-robot communications are, or willbe, available when needed.

In step 1018, robot 102 performs the task and step 1020 cleans therobot. Step 1020 may be the return of physical accessories (attachments,other robots, etc.), the purging of software and/or data no longerneeded or authorized, closing of communication channels, and/or otheroperation to ensure robot 102 is placed in an appropriate statefollowing completion of the task in step 1018.

FIG. 11 depicts interaction 1100 in accordance with embodiments of thepresent disclosure. Three communication nodes may be provided comprisingrobot 102, customer 302, and agent 612 for communications therebetween.Each node may be active simultaneously or at least one node may beunavailable at certain times in a procedure. In one embodiment, agent612 serves as a node for communications between customer 302 and robot102. For example, robot 102 may be delivered, by itself or other means,to customer 302. Customer 302 may be interacting with robot 102 for thefirst time and calls (e.g., telephone call, video call, text, etc.) acontact center 602, such accessing an automated agent executing onserver 902, to begin the process of utilizing robot 102.

Customer 302 may initially connect with server 902, at step 1102, suchas via an interactive voice response (IVR) to assess the nature of thecall and/or enqueue the call. Customer 302 may ask for or be determinedto require a robot-qualified agent at step 1104. Step 1106 identifies arobot-qualified agent, such as agent 612. And, in step 1108, agent 612is connected to customer 302.

Step 1110 exchanges data between customer 302 and user 612, such asconnection information, that may not have previously been obtained. Step1112 initiates a connection between agent 612 and robot 102 via server902. Server 902 attempts to connect to robot 102 in step 1114 and, oncethe connection is established in step 1116, then connects robot 102 toagent 612 in step 1118. As a result, in step 1120 agent 612 and robot102 are connected.

Optionally, validation/authentication steps may be performed. customer302 may have been authenticated via a device, such as customercommunication device 608 (See, FIG. 6) which in turn authenticates user302 to a resource 612 of a contact center, such as server 902. However,validation/authentication may still be performed to ensure the correctrobot 102 is available to the correct customer 302. For example, in step1122, agent 612 may ask customer 302 to issue a verbal, textual,gesture, or other password to robot 102. Agent 612 then observes theresponse, either directly or via receiving indicia that the password iscorrect as determined by a component electronically monitoring robot102. Similarly, agent 612 may cause robot 102 to perform an action instep 1124 and ask customer 302 or a device associated with customer 302if robot 102 is performing a particular action. If successful, thenagent 612 has confirmed that robot 102 is associated, and optionallywithin sight, of customer 302.

FIG. 12 depicts interaction 1200 in accordance with embodiments of thepresent disclosure. In step 1202, customer 302 connects to a resource,such as agent 612, via robot 102 acting as a communication node orendpoint. For example, customer 302 may own or have access to robot 102and seek to use it for a task. In one embodiment, customer 302 connectsa customer communication device 608 to robot 102 for communicating withrobot 102 and, optionally, agent 612. In another embodiment, customer302 communicates directly (e.g., speaking, typing, etc.) with robot 102.Next, robot 102 connects with server 920 in step 1204. Server 902, instep 1206, identifies a robot-qualified agent, such as agent 612 and, instep 1208, joins agent 612 to robot 102 for communications therebetween.

In step 1210, robot-to-agent communications are provided and, in step1212, connection information is obtained to enable agent-to-customercommunications. Step 1212, may be the determination that robot 102 willfacilitate agent-to-customer communications, obtaining a telephonenumber or other telecommunications address that agent 612 may utilize tocall or otherwise establish another communications channel with customer302. Accordingly, in step 1214, agent 612 may initiate the connectionwith customer 302 via server 902. Server 902 then connects to customer302 at step 1216 and, in step 1218, customer 302 and agent 612 areconnected.

Optionally, validation steps 1220 and/or 1222 are provided. For example,in step 1220, agent 612 may prompt customer 302 for a username,password, password gesture or other authentication indicia. Robot 102may observe and report or serve as a communications node foragent-customer communications. If not already authenticated, step 1222may be performed to authenticate robot 102 to agent 612.

Once agent 612, customer 302, and robot 102 are in communication,certain tasks may then be possible. For example, customer 302 mayexplain an issue and agent 612 may initiate an action on robot 102 toresolve the issue. Communications need not happen in parallel. Forexample, robot 102 may operate autonomously while agent 612 is connectedto customer 302 to ask if the task was performed satisfactorily, resolveany outstanding issues, and, if necessary, coordinate purging of anysensitive information no longer needed, arrange the retrieval of robot102 or an accessory thereof.

FIG. 13 depicts interaction 1300 in accordance with embodiments of thepresent disclosure. Certain tasks may not be able to be completed byrobot 102 alone. For example, customer 302 may need to make a selectionto their liking or assist robot 102 with a physical task. In oneembodiment, agent 612 may be utilized to coordinate efforts between usercustomer 302 and robot 102. In step 1302, agent 612 directs user 302 toperform a particular task. In step 1304, agent 612 directs robot 102 toperform a counterpart portion of the task. For example, robot 102 mayaccess a live wire upon user 302 disconnecting power to the wire and socommunicating the fact to agent 612. In another example, robot 102 maybe performing a medical function and agent 612 may coordinate with user302 to address any preliminary tasks (e.g., position an arm for a bloodpressure cuff, etc.) and signal robot 102 to begin the task (e.g.,taking a blood pressure, etc.).

Agent 612 may provide task instructions 1306 to server 902 forimplementation via robot 102, such as to perform the robot portion of atask at step 1310. Similarly, server 902 may issue task instructions touser 302 in step 1308 to further automate the performance of acoordinated task.

FIG. 14 depicts device 1400 in accordance with embodiments of thepresent disclosure. Device 1400 may be one of communication devices 608configured with functionality associated with robot 102 with whichdevice 1400 may be in communication directly or via contact center 602.Device 1400 may comprise an input and/or output means for robot 102 viacommunication link 232, sensor 228, and/or I/O device 230. Device 1400may comprise a network communication to utilize local (e.g., WiFi,infrared, etc.) communications and/or distance communications (e.g.,cellular, GPS, etc.) for inputs and/or outputs. Optionally, device 1400may be wired (e.g., Ethernet, direct connection to robot 102, etc.).

Device 1400 may comprise display 1402 proving statuses, input means,and/or outputs for robot 102. In one embodiment, device 1400 may beutilized for providing robot 102, authorizing robot 102 to perform atask; pausing or terminating operations of robot 102; and optionallyscuttling robot 102, such as be causing the destructive, ornon-destructive, purging of data and/or circuitry within robot 102.Device 1400 may be utilized and a communication device with contactcenter 602 and agent 612 and may further operate as a node in acommunication link between contact center 602 and robot 102 and/or athird-party, such as via an verification and/or auditing service.

FIG. 15 depicts system 1500 in accordance with embodiments of thepresent disclosure. Robot 102 may optionally comprise robot softwarecomponent 1502 and/or robot hardware component 1504 and, as a furtheroption, communicate with customer communication device 1508, which mayhave customer software component 1506. Any one or more of the foregoingmay present a security risk to persons, property, or data. The risk maybe due to the presence of a malicious software (e.g., virus, spyware,etc.), the absence of protective hardware (e.g., tamper detectiondevice) and/or software (e.g., anti-virus software, etc.), or unknownhardware or software.

In one embodiment, security is assumed to be absent until provenotherwise. Robot 102 may be allowed to operate in a non-secure modewhile security is yet to be proven. The non-secure mode may be alimitation of an operational function (e.g., limited speed/force,restricted location of operation, disabling at least one mode ofradio-frequency communication, etc.). For example, robot 102 may beprevented from entering or leaving service location 104, approaching orleaving a portion of service location 104, and/or other restriction ontravel while in the non-secure mode. In another embodiment, thenon-secure mode may be a blocking of a component or operational function(e.g., disabling a camera/microphone, disabling all radio-frequencycommunications, etc.).

The non-secure mode may enable one function as an alternative to adisabled function otherwise provided in a secure mode. For example,infrared communications are generally less preferable to radio-frequencycommunications due to the lower bandwidth and increased powerrequirements. However, infrared communications will not penetrate walls,absent a hole, window, or other opening, and quickly attenuate whenreflected off most household or office surfaces. As a result, infraredcommunications generally require close proximity between the transmitterand receiver and, preferably, line-of-sight. In contrast, certain radiofrequency communication protocols have a larger broadcast area,especially radio frequencies that are known to support higher bandwidthcommunications. As a result, robot 102 may be operating in a non-securemode and have I/O device 230 embodied as an infrared communicationcomponent, enabled, such as to allow robot 102 to communicate withcustomer communication device 1508 or another trusted communicationcomponent (not shown). As a result, the opportunity for a nefariousdevice to communicate with robot 102 is greatly reduced. In contrast,had robot 102 been allowed to communicate utilizing radio-frequencycommunications, a nefarious device may be well hidden or, depending onthe protocol utilized, a substantial distance away from robot 102.

One security criteria may be the establishment of an encryptedcommunication link, such as a virtual private network (VPN). Once robot102 is determined to be in compliance with the criteria, robot 102 maybe operated in a secure mode wherein radio-frequency communications areenabled and, unless otherwise needed, infrared communications disabled.As a result, higher bandwidth may be provided via a radio-frequencylink, utilizing the VPN, and robot 102 may be operated in the securemode.

The term “criteria” is the plural form of “criterion,” however,idiomatically, “criteria” is often used interchangeably with thesingular, “criterion.” For the avoidance of confusion, the “securitycriteria,” described herein, comprises at least one criterion, which maybe a single criterion, except when a requirement for a plurality isprovided with respect to a particular embodiment.

In one embodiment, the security criteria comprises a required feature ofrobot 102. The approved mode of operation may further encompass robotsoftware component 1502, robot hardware component 1504, customersoftware component 1506, customer communication device 1508, and/orcontact center 602. The security criteria may comprise anti-virussoftware, anti-spyware software, VPN, monitoring software, datafiltering software associated with a data gathering component,third-party monitoring, calibration of a component, operating motionand/or force governors, and/or other security criteria as may bedetermined to be a prerequisite to operating robot 102 in the securemode.

Robot 102 may have features, functions, and/or components, such ascomponents 202-236, and optionally 234, described with reference to FIG.2, for which a security criteria may be established. For example,mobility/actuator 226 may require calibration for each use, for certainusages, within the previously determined time period, etc. In anotherexample, processor 236 must be executing a certain one, or certain oneof a plurality, of anti-virus software applications. In anotherembodiment, the security criteria is situational or positional. Forexample, robot 102 may be within service location 104 to perform serviceon a washing machine. While robot 102 is proximate to the washingmachine (e.g., within a previously determined distance, within the sameroom, within sight, etc.), the security criteria may be unconcerned withthe operation of I/O device 230 when embodied as a high-resolutioncamera. However, a conditional security criteria may be implementedrequiring that, upon robot 102 being moved or moving away from thewashing machine, I/O device 230 must be operated, disabled, or operatedin a low-resolution mode. Should the particular I/O device 230 continueto operate in the high-resolution mode, robot 102 may then revert to thenon-secure mode of operation.

The difference between the operation of robot 102 in the secure mode orin the non-secure mode is illustrated by various embodiments. Generally,and in one embodiment, the secure mode is an indication that robot 102is trusted, and as such, allows robot 102 to operate at a higherperformance level with respect to the performance of the customerservice task and/or general operation of robot 102 (e.g., communicatingutilizing a higher-bandwidth communications mode, operating in a higherpower-consumption mode, etc.). It should be appreciated thatnon-security-based limits may be imposed on robot 102. For example, thelength of a task may determine whether robot 102 operates in a high- orlow-power consumption mode, which may be determined independently fromany security criteria. As another example, mobility/actuator 226 mayhave a service load, such as applying one hundred foot-pounds of torqueto a bolt; however, such a force may be likely to damage the bolt orcause an accelerated wear to mobility/actuator 226 and, therefore,independently of any security criteria, mobility/actuator 226 operatesin a less than ideal mode, such as to limit the torque to seventy-fivefoot-pounds.

Robot 102, when in the non-secure mode, is not trusted in whole or inpart. Therefore, measures are put in place to curtail the operation ofrobot 102 or a component thereof to reduce the risk of harm to persons,property, or data that may be caused by a robot that cannot be trusted.In one embodiment, the entirety of robot 102 may be operated in thesecure mode or the non-secure mode. In another embodiment, a component,feature, or function operates in one of the secure mode or thenon-secure mode while the remainder of robot 102 operates in the otherone of the secure mode or the non-secure mode.

The security-imposed limit may render robot 102 inoperable, inoperableto perform a particular task, such as the customer service task, orinhibit robot 102's ability to perform an operation as quickly,efficiently, or in a desired manner. The security-imposed limit may bedirected to a particular component, such as one associated with thereason for robot 102 being in the non-secure mode, or to a differentcomponent. Continuing the example above, I/O device 230 may be ahigh-resolution camera that is unable to operate in a low-resolutionmode. If robot 102 is moved away from service location 104, or otherlocation where high-resolution imaging is appropriate, setting I/Odevice 230 to a low resolution is desired. However, if I/O device 230 isunable to operate in such a mode, it may be deactivated. In anotherembodiment, I/O device 230 continues to operate in a high-resolutionmode; however, communication link 232 is downgraded to make transmissionof high-resolution images choppy and error-prone. Additionally oralternatively, I/O device 230 may be disconnected from data storage 210,task-specific data 218, specific task data 212, and/or memory 214 toprevent captured images from being stored, which may then be accessed bya nefarious agent or device. In yet another embodiment, robot 102 may bedisabled entirely or disabled such that the security risk posed isgreatly reduce, but robot 102 may be able to determine that it has beenreturned to service location 104 and again qualified to operate in thesecure mode.

An indication of whether robot 102 is operating in the secure mode maybe provided to user 302 and/or contact center 602. The indicator may bevia customer communication device 1508 directly by robot 102, such asvia a light, display, tone, vibration, movement, etc.

In another embodiment, robot 102 may be subject to a cleaning cycle.Contact center 602, user 302 interacting directly with robot 102 or viacustomer communication device 1508, and/or a component of robot 102,robot software component 1502, and/or robot hardware component 1504 mayinitiate and/or be subject to the cleaning cycle. The cleaning cyclepurges some to all volatile memory, which may include storage devices,to ensure no unwanted software and/or data remain. This may result inthe purging of information gathered while robot 102 is within servicelocation 104 (e.g., images, audio, WiFi identifiers, etc.) and/orinformation robot 102 may have been provided before or during time spentin service location 104 that may be deemed to be sensitive information(e.g., billing information, account number, social security number,credit card number, etc.). In another embodiment, robot 102 may have a“kill switch.” The “kill switch” may be activated if robot 102 performsany unusual or unexpected activity. This may be physical (e.g.,movement, travel, damaging property, harming a person, etc.), datagathering (e.g., accessing data on a homeowner's networked storagedevice when the customer service task requires no such data), datatransmission (e.g., utilizing a communication channel unexpectedly,disabling secure communications, etc.). The “kill switch” may be aninstant shut down of the entirety of robot 102 or of select componentssuch as to cause robot 102 to be unable to gather information, transmitutilizing an unsecure channel, move, etc. The “kill switch” may beutilized by a resource (e.g., resource 612, server 902, and/orrobot-qualified agent 702) of contact center 602, user 302 interactingdirectly with robot 102 or via customer communication device 1508,and/or a component of robot 102, robot software component 1502, and/orrobot hardware component 1504.

User 302 has a potential to mitigate or contribute to security risks forrobot 102. In one embodiment, customer 302 has procured customersoftware component 1506 for customer communication device 1508. Customersoftware component 1506 may be a monitoring application provided by aparty, which may be the same as or different than the provider of robot102 and/or the operator of contact center 602 or any component thereof.Customer software component 1506 may monitor data gathering (e.g., “seewhat the robot sees”), data transmissions (e.g., “communicating withagent Smith of the Alpha Service Center”), instructions that are or maybe executed, and/or other monitoring function. Customer softwarecomponent 1506 may provide a communications link between robot 102 andcontact center 602, which may be monitored and/or subject to approval byuser 302 interacting with customer software component 1506.Additionally, a status may be provided via customer software component1506, such as the status of anti-virus applications, calibration, and/orother criteria (including those described with respect to FIG. 14).

Unfortunately, customer communication device 1508 may be plagued withmalware or other potentially harmful software. Robot 102 and/or contactcenter 602 may refuse, in whole or in part, to communicate with customercommunication device 1508, notify user 302 of a potential security risk,and/or take other action as may be appropriate. For example, robot 102may determine that a link has been created with customer communicationdevice 1508 which it discovers has a virus. Accordingly, robot 102, andoptionally contact center 602, may refuse to trust customercommunication device 1508. Not trusting customer communication device1508 may result in a refusal to communicate, refusal to receive certaincommunications (e.g., commands, access data, etc.), or blocking one ormore functions of robot 102. As a further option, robot 102 may notifyuser 302, such as via I/O device 230, of the problem and may suggeststeps to remedy the issue. Often a security issue is present due to adown-level version of a security application, such as an anti-virusapplication. Should customer communication device 302 be deemedpartially trustworthy, robot 102 and/or contact center 602 maycommunicate with robot 302 to the extent such communications do notexceed the trust afforded to customer communication device 1508. Forexample, customer communication device 1508 may be trusted to start andstop robot 102's performance of the customer service task, but not trustcustomer communication device 1508 to issue a new customer service task.

In the foregoing description, for the purposes of illustration, methodswere described in a particular order. It should be appreciated that inalternate embodiments, the methods may be performed in a different orderthan that described. It should also be appreciated that the methodsdescribed above may be performed by hardware components or may beembodied in sequences of machine-executable instructions, which may beused to cause a machine, such as a general-purpose or special-purposemicroprocessor (e.g., GPU, CPU), or logic circuits programmed with theinstructions to perform the methods (e.g., FPGA).

These machine-executable instructions may be stored on one or moremachine-readable mediums, such as CD-ROMs or other type of opticaldisks, floppy diskettes, ROMs, RAMs, EPROMs, EEPROMs, magnetic oroptical cards, flash memory, or other types of machine-readable mediumssuitable for storing electronic instructions. Alternatively, the methodsmay be performed by a combination of hardware and software.

While machine-executable instructions may be stored and executed locallyto a particular machine (e.g., personal computer, mobile computingdevice, laptop, etc.), it should be appreciated that the storage of dataand/or instructions and/or the execution of at least a portion of theinstructions may be provided via connectivity to a remote data storageand/or processing device or collection of devices, commonly known as“the cloud,” but may include a public, private, dedicated, shared and/orother service bureau, computing service, and/or “server farm.” Examplesof the microprocessors as described herein may include, but are notlimited to, at least one of Qualcomm® Snapdragon® 800 and 801, Qualcomm®Snapdragon® 610 and 615 with 4G LTE Integration and 64-bit computing,Apple® A7 microprocessor with 64-bit architecture, Apple® M7 motioncoprocessors, Samsung® Exynos® series, the Intel® Core™ family ofmicroprocessors, the Intel® Xeon® family of microprocessors, the Intel®Atom™ family of microprocessors, the Intel Itanium® family ofmicroprocessors, Intel® Core® i5-4670K and i7-4770K 22 nm Haswell,Intel® Core® i5-3570K 22 nm Ivy Bridge, the AMD® FX™ family ofmicroprocessors, AMD® FX-4300, FX-6300, and FX-8350 32 nm Vishera, AMD®Kaveri microprocessors, Texas Instruments® Jacinto C6000™ automotiveinfotainment microprocessors, Texas Instruments® OMAP™ automotive-grademobile microprocessors, ARM® Cortex™-M microprocessors, ARM® Cortex-Aand ARM926EJ-S™ microprocessors, other industry-equivalentmicroprocessors, and may perform computational functions using any knownor future-developed standard, instruction set, libraries, and/orarchitecture.

Any of the steps, functions, and operations discussed herein can beperformed continuously and automatically.

The exemplary systems and methods of this disclosure have been describedin relation to robotic service agents. However, to avoid unnecessarilyobscuring the present disclosure, the preceding description omits anumber of known structures and devices. This omission is not to beconstrued as a limitation of the scope of the claimed disclosure.Specific details are set forth to provide an understanding of thepresent disclosure. It should, however, be appreciated that the presentdisclosure may be practiced in a variety of ways beyond the specificdetail set forth herein.

Furthermore, while the exemplary embodiments illustrated herein show thevarious components of the system collocated, certain components of thesystem can be located remotely, at distant portions of a distributednetwork, such as a LAN and/or the Internet, or within a dedicatedsystem. Thus, it should be appreciated, that the components of thesystem can be combined into one or more devices, such as a robotintegrated with a communication device, or collocated on a particularnode of a distributed network, such as an analog and/or digitaltelecommunications network, a packet-switched network, or acircuit-switched network. It will be appreciated from the precedingdescription, and for reasons of computational efficiency, that thecomponents of the system can be arranged at any location within adistributed network of components without affecting the operation of thesystem. For example, the various components can be located in a switchsuch as a PBX and media server, gateway, in one or more communicationsdevices, at one or more users' premises, or some combination thereof.Similarly, one or more functional portions of the system could bedistributed between a telecommunications device(s) and an associatedcomputing device.

Furthermore, it should be appreciated that the various links connectingthe elements can be wired or wireless links, or any combination thereof,or any other known or later developed element(s) that is capable ofsupplying and/or communicating data to and from the connected elements.These wired or wireless links can also be secure links and may becapable of communicating encrypted information. Transmission media usedas links, for example, can be any suitable carrier for electricalsignals, including coaxial cables, copper wire, and fiber optics, andmay take the form of acoustic or light waves, such as those generatedduring radio-wave and infra-red data communications.

Also, while the flowcharts and interactions have been discussed andillustrated in relation to a particular sequence of events, it should beappreciated that changes, additions, and omissions to this sequence canoccur without materially affecting the operation of the disclosure.

A number of variations and modifications of the disclosure can be used.It would be possible to provide for some features of the disclosurewithout providing others.

In yet another embodiment, the systems and methods of this disclosurecan be implemented in conjunction with a special purpose computer, aprogrammed microprocessor or microcontroller and peripheral integratedcircuit element(s), an ASIC or other integrated circuit, a digitalsignal microprocessor, a hard-wired electronic or logic circuit such asdiscrete element circuit, a programmable logic device or gate array suchas PLD, PLA, FPGA, PAL, special purpose computer, any comparable means,or the like. In general, any device(s) or means capable of implementingthe methodology illustrated herein can be used to implement the variousaspects of this disclosure. Exemplary hardware that can be used for thepresent disclosure includes computers, handheld devices, telephones(e.g., cellular, Internet enabled, digital, analog, hybrids, andothers), and other hardware known in the art. Some of these devicesinclude microprocessors (e.g., a single or multiple microprocessors),memory, nonvolatile storage, input devices, and output devices.Furthermore, alternative software implementations including, but notlimited to, distributed processing or component/object distributedprocessing, parallel processing, or virtual machine processing can alsobe constructed to implement the methods described herein.

In yet another embodiment, the disclosed methods may be readilyimplemented in conjunction with software using object or object-orientedsoftware development environments that provide portable source code thatcan be used on a variety of computer or workstation platforms.Alternatively, the disclosed system may be implemented partially orfully in hardware using standard logic circuits or VLSI design. Whethersoftware or hardware is used to implement the systems in accordance withthis disclosure is dependent on the speed and/or efficiency requirementsof the system, the particular function, and the particular software orhardware systems or microprocessor or microcomputer systems beingutilized.

In yet another embodiment, the disclosed methods may be partiallyimplemented in software that can be stored on a storage medium, executedon programmed general-purpose computer with the cooperation of acontroller and memory, a special purpose computer, a microprocessor, orthe like. In these instances, the systems and methods of this disclosurecan be implemented as a program embedded on a personal computer such asan applet, JAVA® or CGI script, as a resource residing on a server orcomputer workstation, as a routine embedded in a dedicated measurementsystem, system component, or the like. The system can also beimplemented by physically incorporating the system and/or method into asoftware and/or hardware system.

Although the present disclosure describes components and functionsimplemented in the embodiments with reference to particular standardsand protocols, the disclosure is not limited to such standards andprotocols. Other similar standards and protocols not mentioned hereinare in existence and are considered to be included in the presentdisclosure. Moreover, the standards and protocols mentioned herein andother similar standards and protocols not mentioned herein areperiodically superseded by faster or more effective equivalents havingessentially the same functions. Such replacement standards and protocolshaving the same functions are considered equivalents included in thepresent disclosure.

The present disclosure, in various embodiments, configurations, andaspects, includes components, methods, processes, systems and/orapparatus substantially as depicted and described herein, includingvarious embodiments, subcombinations, and subsets thereof. Those ofskill in the art will understand how to make and use the presentdisclosure after understanding the present disclosure. The presentdisclosure, in various embodiments, configurations, and aspects,includes providing devices and processes in the absence of items notdepicted and/or described herein or in various embodiments,configurations, or aspects hereof, including in the absence of suchitems as may have been used in previous devices or processes, e.g., forimproving performance, achieving ease, and\or reducing cost ofimplementation.

The foregoing discussion of the disclosure has been presented forpurposes of illustration and description. The foregoing is not intendedto limit the disclosure to the form or forms disclosed herein. In theforegoing Detailed Description for example, various features of thedisclosure are grouped together in one or more embodiments,configurations, or aspects for the purpose of streamlining thedisclosure. The features of the embodiments, configurations, or aspectsof the disclosure may be combined in alternate embodiments,configurations, or aspects other than those discussed above. This methodof disclosure is not to be interpreted as reflecting an intention thatthe claimed disclosure requires more features than are expressly recitedin each claim. Rather, as the following claims reflect, inventiveaspects lie in less than all features of a single foregoing disclosedembodiment, configuration, or aspect. Thus, the following claims arehereby incorporated into this Detailed Description, with each claimstanding on its own as a separate preferred embodiment of thedisclosure.

Moreover, though the description of the disclosure has includeddescription of one or more embodiments, configurations, or aspects andcertain variations and modifications, other variations, combinations,and modifications are within the scope of the disclosure, e.g., as maybe within the skill and knowledge of those in the art, afterunderstanding the present disclosure. It is intended to obtain rights,which include alternative embodiments, configurations, or aspects to theextent permitted, including alternate, interchangeable and/or equivalentstructures, functions, ranges, or steps to those claimed, whether or notsuch alternate, interchangeable and/or equivalent structures, functions,ranges, or steps are disclosed herein, and without intending to publiclydedicate any patentable subject matter.

What is claimed is:
 1. A system, comprising: a network interface; a datarepository; a microprocessor in communication with the network interfaceand when provided with instructions cause the microprocessor to:communicate with a robot configured to perform a customer service taskat a service location; access a security criteria from the datarepository; determine whether the robot is in compliance with thesecurity criteria; operate the robot in a secure mode when thedetermination indicates the robot is in compliance with the securitycriteria; and operate the robot in a non-secure mode when thedetermination indicates the robot is not in compliance with the securitycriteria.
 2. The system of claim 1, wherein, the security criteria atrusted anti-virus software application being executed by the robot. 3.The system of claim 1, wherein, the security criteria comprises asecurity audit.
 4. The system of claim 1, wherein, the operation of therobot in the non-secure mode comprises restricting an area of travel ofthe robot.
 5. The system of claim 1, wherein, the security criteriacomprises a trusted cleaning cycle whereby sensitive data is purged fromthe robot.
 6. The system of claim 1, wherein the security criteriacomprises a prohibition of the robot transmitting a signal notassociated with the performance of the customer service task.
 7. Thesystem of claim 1, wherein the non-secure mode comprises a shut-down ofthe robot.
 8. The system of claim 1, wherein the security criteriacomprises blocking the robot from gathering data not required for theperformance of the customer service task.
 9. The system of claim 8,wherein the blocking disables a component of the robot operable togather the data not required for the performance of the customer servicetask.
 10. The system of claim 1, wherein the microprocessor comprises aportion of a customer communication device operated by a user at theservice location.
 11. A robot, comprising: a network interface; amicroprocessor in communication with the network interface and whenprovided with instructions cause the microprocessor to: access asecurity criteria from a data repository; determine whether the robot isin compliance with the security criteria; operate the robot in a securemode to perform a customer service task in a service location, when thedetermination indicates the robot is in compliance with the securitycriteria; and operate the robot in a non-secure mode, when thedetermination indicates the robot is not in compliance with the securitycriteria.
 12. The robot of claim 11, wherein the security criteriacomprises a signal from a contact center indicating compliance with asecurity criteria of the contact center.
 13. The robot of claim 11,wherein the microprocessor, while the robot is performing the customerservice task, determines the robot is not in compliance with thesecurity criteria, disables at least one component of the robot.
 14. Therobot of claim 11, wherein the security criteria is provided by a signalfrom a communication device associated with a user at the servicelocation.
 15. The robot of claim 11, wherein the non-secure modecomprises the blocking of a component, blocking of an operation,blocking of a communication, limiting a speed of a component of therobot, limiting a force applied by a component of the robot, or limitinga location accessible to the robot.
 16. A system, comprising: means toaccess, by at least one microprocessor, a security criteria from a datarepository; means to determine, by the at least one microprocessor,whether a robot is in compliance with the security criteria; means tooperate, by the at least one microprocessor, the robot in a secure modeto perform a customer service task in a service location when the meansto perform the determination determine the robot is in compliance withthe security criteria; and means to operate, by the at least onemicroprocessor, the robot in a non-secure mode, when the means toperform the determination determine the robot is not in compliance withthe security criteria.
 17. The system of claim 11, wherein the securitycriteria comprises a signal from a contact center indicating compliancewith a security criteria of the contact center.
 18. The system of claim11, further comprising, means to disable at least one component of therobot, by the microprocessor, upon determining that the robot, whileengaged in the customer service task, is not in compliance with thesecurity criteria.
 19. The system of claim 11, wherein the securitycriteria is provided by a signal from a communication device associatedwith a user at the service location.
 20. The system of claim 11, whereinthe means to operate the robot in the non-secure mode comprise limitingat least one operational feature of the robot.