Security surveillance and entry management system

ABSTRACT

An artificial intelligence (AI) entry management (EM) security system includes a camera, a microphone, a motion detector, a speaker, and a software platform. Geofences are utilized to create boundaries around physical areas, such as locations for package delivery or property boundaries. The EM device and other devices connected to the software platform are configured to monitor the geofences and detect a presence of an activity, an event, an object, or a device. At least one license plate reader is utilized to read license plate characters. Voice recognition and voice identification are used to grant or deny permissions for individuals on a property.

CROSS REFERENCES TO RELATED APPLICATIONS

This application is related to and claims priority from the followingU.S. patents and patent applications. This application is acontinuation-in-part of U.S. application Ser. No. 17/591,883, filed onFeb. 3, 2022, which is a continuation-in-part of U.S. application Ser.No. 17/566,288, filed on Dec. 30, 2021, which is a continuation-in-partof U.S. application Ser. No. 17/556,483, filed on Dec. 20, 2021, whichis a continuation-in-part of U.S. application Ser. No. 17/488,278, filedon Sep. 28, 2021, now issued as U.S. Pat. No. 11,303,856, which is acontinuation-in-part of PCT Application No. US2021/039812, filed on Jun.30, 2021, and a continuation-in-part of U.S. application Ser. No.17/469,863, filed on Sep. 8, 2021. PCT Application No. US2021/039812 isa continuation of U.S. application Ser. No. 17/363,262, filed on Jun.30, 2021, now issued as U.S. Pat. No. 11,151,825, and acontinuation-in-part of U.S. application Ser. No. 17/070,739, filed onOct. 14, 2020, now issued as U.S. Pat. No. 11,128,840. U.S. applicationSer. No. 17/363,262, filed on Jun. 30, 2021, is a continuation-in-partof U.S. application Ser. No. 17/070,739, filed on Oct. 14, 2020, nowissued as U.S. Pat. No. 11,128,840. U.S. application Ser. No. 17/488,278is also a continuation-in-part of U.S. application Ser. No. 17/363,262,filed on Jun. 30, 2021, which is a continuation-in-part of U.S.application Ser. No. 17/070,739, filed on Oct. 14, 2020, now issued asU.S. Pat. No. 11,128,840. U.S. application Ser. No. 17/488,278 alsoclaims the benefit of and priority to U.S. Provisional PatentApplication No. 63/228,433, filed on Aug. 2, 2021, and the benefit ofand priority to U.S. Provisional Patent Application No. 63/239,934,filed on Sep. 1, 2021. Each of the above referenced applications ishereby incorporated by reference herein in its entirety.

BACKGROUND OF THE INVENTION 1. Field of the Invention

The present application relates to security systems and entry managementsystems. More specifically, the present application relates to anartificial intelligence (“AI”) entry management device, system, andmethod of using the same.

DESCRIPTION OF THE PRIOR ART

It is generally known in the prior art to provide doorbells withcameras. It is further known to provide geofencing, voiceidentification, voice recognition, and license plate readers.

Prior art documents include the following:

U.S. Pat. No. 8,689,249 for In-home system monitoring method and systemhaving a video camera connected to a set-top box by inventors Pino, etal., filed Oct. 23, 2012 and issued Apr. 1, 2014, is directed to amethod of receiving digital television programming content from atelevision service provider, receiving a first user input of a selecteddigital television programming content, receiving a message from asystem, in response to receiving the message, causing a notification tobe displayed on the television as an overlay over the displayedtelevision programming content, receiving a first user command,determining a first control message to transmit to the system inresponse to receiving the first user command, transmitting the firstcontrol message. Also provided is a system including a video camera, anentry way security system, an HVAC system, a lighting system, an alarmsystem, or other system. User inputs may be received via a remotecontrol to a set top box or from a computing device at a remote computersystem through the internet and/or a mobile telephone network.

U.S. Pat. No. 11,170,593 for Multifunction smart door device byinventors Schneider, et al., filed May 5, 2020 and issued Nov. 9, 2021,is directed to multifunction smart door devices part of a system ofmultifunction smart door devices installed within or near stateroomdoors of a cruise ship. Each smart door device can control access to astateroom based on facial recognition or a wireless credential and canperform other functions such as controlling stateroom personalizationfeatures, providing an electronic peephole function, allowing controlledaccess for authorized crew members, accommodating remote unlocking, andproviding notifications. Data obtained by the smart door devices can beprovided to the cruise operator for service, safety, or securitypurposes, such as for anonymized foot traffic analysis, hazarddetection, and stateroom access auditing. Smart door devicefunctionality may be implemented in part by customers' mobile devices.

US Patent Publication No. 2021/0160461 for Smart home and securitysystem by inventors Martin, et al., filed Nov. 25, 2020 and publishedMay 27, 2021, is directed to a security and smart home system,components thereof, and associated methods. The system can include ahost-carried monitor configured to monitor data associated with thehost, such as motion data, position data, temperature data, or humiditydata. The system can include one or more security devices located at apremises to monitor security data at the premises, with the one or moresecurity devices in communication with a remote server programmed toprocess security event signals from the one or more security devices andtransmit action instructions to the one or more security devices.Security devices can include an electrical power switch, an electricalpower plug, and a camera.

US Patent Publication No. 2019/0354220 for Transparent display controldevice by inventors Ribbich, et al., filed May 15, 2019 and publishedNov. 21, 2019, is directed to a control device for a building managementsystem (BMS) including a touch screen display configured to mount to amounting surface, a communications interface configured to communicatewith the BMS, a near field communication (NFC) sensor configured toreceive information from a NFC device, a microphone configured to detectvocal input, and a processing circuit coupled to the touch screendisplay. The processing circuit including a processor and memory coupledto the processor, the memory storing instructions thereon that, whenexecuted by the processor, cause the control device to receive userinput from at least one of the touch screen display, the NFC sensor, orthe microphone, validate an identity of a user based on the user input,and cause the BMS to control an environmental variable of a space basedon the validation.

U.S. Pat. No. 10,657,383 for Computer vision to enable services byinventors Solh, et al., filed Sep. 23, 2016 and issued May 19, 2020, isdirected to computer vision for manual services. In some instances, aremote system may determine that a current time is within a thresholdperiod of time of a scheduled service and, based on the determination,send a first message requesting image data to a camera apparatus locatedwithin an environment. After sending the first message, the remotesystem may receive image data associated with the environment from thecamera apparatus and use the image to detect an object within theenvironment. The remote system can then send a second message to adevice of a guest and a third message to a device of a user, where eachof the second message and the third message indicates that the object iswithin the environment. In some instances, the object can include ananimal while in some instances, the object can include a person.

U.S. Pat. No. 11,132,877 for Doorbell communities by inventors Scalisi,et al., filed Apr. 30, 2020 and issued Sep. 28, 2021, is directed todoorbells that can send data to each other to enable a first doorbelluser to warn a second doorbell user regarding a suspicious visitor. Afirst user can indicate a first trait of a visitor via a first remotecomputing device. The first user can create a user group to enable themembers of the user group to use their doorbells to take pictures ofsuspicious visitors and to send the pictures of the suspicious visitorsto other members of the user group.

US Patent Publication No. 2019/0156406 for Method and system forapartment rental inspections without presence of brokers or rentalagents by inventors Landau, et al., filed Nov. 22, 2017 and publishedMay 23, 2019, is directed to a system for facilitating real estate (RE)unit rentals by intermediating landlords and potential tenants (PT) andenabling RE unit inspections and viewing without requiring on-sitelandlord representatives. The system includes a master-server facilityincluding software modules and databases for executing system algorithmsthat enable and control communications between landlord communicationdevices, PT devices and apartment devices including a remote door lock,cameras and movement sensors. The door lock is remotely-operable andwirelessly controlled. The apartment devices include communication andmonitoring devices temporarily installed in the RE units to enable REunit inspections and viewing. The software modules including at least:a) a unit listing software; b) a tenant liaison module; c) an inspectionscheduling module; d) a door opening module that sends to the PT devicesat least one activation code for the door lock; and e) a tenant presentmodule that verifies that the potential tenant is located in proximityto the entry door.

US Patent Publication No. 2021/0142603 for Secured delivery system andmethod of using same by inventor Carter, filed Jan. 15, 2021 andpublished May 13, 2021, is directed to a secured delivery systemincluding a doorbell device comprising a scanner, and a lockingmechanism operatively connected to the scanner a computer processor or acloud server and a structure, such as a residence or lockbox. A key,which can be in the form of a bar code, can be generated and sent todelivery or service personnel needing access to the structure. Thedelivery or service personnel present the bar code to the scanner. Uponreading the bar code, the locking mechanism is unlocked thereby allowingaccess to the structure.

U.S. Pat. No. 10,896,562 for Secured delivery system and method of usingsame by inventor Carter, filed Oct. 4, 2019 and issued Oct. 19, 2021, isdirected to a secured delivery system including a doorbell devicecomprising a scanner, and a locking mechanism operatively connected tothe scanner, a computer processor or a cloud server and a structure,such as a residence or lockbox. A key, which can be in the form of a barcode, can be generated and sent to delivery or service personnel needingaccess to the structure. The delivery or service personnel present thebar code to the scanner. Upon reading the bar code, the lockingmechanism is unlocked thereby allowing access to the structure.

U.S. Pat. No. 10,475,259 for Security system and method of using same byinventor Carter, filed Mar. 28, 2018 and issued Nov. 12, 2019, isdirected to a security system including a doorbell device comprising ascanner, and a locking mechanism operatively connected to the scannerand a structure, such as a home or lockbox. A key, which can be in theform of a bar code, can be generated and sent to delivery or servicepersonnel needing access to the structure. The delivery or servicepersonnel present the bar code to the scanner. Upon reading the barcode, the locking mechanism is unlocked thereby allowing access to thestructure.

US Patent Publication No. 2021/0080996 for Adjustable head-mounteddisplay by inventors Hudman, et al., filed Sep. 15, 2020 and publishedMar. 18, 2021, is directed to a head-mounted display including a front,a back, a first actuator, a second actuator, a first adjustable memberextending between the front and the back and operably engaging the firstactuator, and a second adjustable member extending between the front andthe back and operably engaging the second actuator. The first adjustablemember and the second adjustable member may be adjustable in length viathe second actuator to vary a gap distance between the front and theback. In some embodiments, the head-mounted display may include a wirerouting assembly for routing wire(s) between the front and the back ofthe head-mounted display. Additionally, in some embodiments, thehead-mounted display may include a harness for engaging a user.

US Patent Publication No. 2020/0126243 for Depth map with structured andflood light by inventors Bleyer, et al., filed Dec. 20, 2019 andpublished Apr. 23, 2020, is directed to a method including receiving animage of a scene illuminated by both a predetermined structured lightpattern and a flood fill illumination, generating an active brightnessimage of the scene based on the received image of the scene includingdetecting a plurality of dots of the predetermined structured lightpattern, and removing the plurality of dots of the predeterminedstructured light pattern from the active brightness image, andgenerating a depth map of the scene based on the received image and theactive brightness image.

U.S. Pat. No. 10,715,791 for Virtual eyeglass set for viewing actualscene that corrects for different location of lenses than eyes byinventors Matson, et al., filed Apr. 28, 2016 and issued Jul. 14, 2020,is directed to a virtual eyeglass set including a frame, a first virtuallens and second virtual lens, and a processor. The frame may mount ontoa user's head and hold the first virtual lens in front of the user'sleft eye and the second virtual lens in front of the user's right eye. Afirst side of each lens may face the user and a second side of each lensmay face away from the user. Each of the first virtual lens and thesecond virtual lens may include a light field display on the first side,and a light field camera on the second side. The processor mayconstruct, for display on each of the light field displays based onimage data received via each of the light field cameras, an image from aperspective of the user's respective eye.

U.S. Pat. No. 9,063,330 for Perception based predictive tracking forhead mounted displays by inventors LaValle, et al., filed May 22, 2014and issued Jun. 23, 2015, is directed to a method of and apparatus forpredictive tracking for a head mounted display. The method comprisesobtaining one or more three-dimensional angular velocity measurementsfrom a sensor monitoring the head mounted display and setting aprediction interval based upon the one or more three-dimensional angularvelocity measurements such that the prediction interval is substantiallyzero when the head mounted display is substantially stationary and theprediction interval increases up to a predetermined latency intervalwhen the head mounted display is moving at an angular velocity of orabove a predetermined threshold. The method further includes predictinga three-dimensional orientation for the head mounted display to create apredicted orientation at a time corresponding to the predictioninterval, and generating a rendered image corresponding to the predictedorientation for presentation on the head mounted display.

U.S. Pat. No. 10,535,151 for Depth map with structured and flood lightby inventors Bleyer, et al., filed Aug. 22, 2017 and issued Jan. 14,2020, is directed to a method including receiving an image of a sceneilluminated by both a predetermined structured light pattern and a floodfill illumination, generating an active brightness image of the scenebased on the received image of the scene including detecting a pluralityof dots of the predetermined structured light pattern, and removing theplurality of dots of the predetermined structured light pattern from theactive brightness image, and generating a depth map of the scene basedon the received image and the active brightness image.

U.S. Pat. No. 9,652,896 for Image based tracking in augmented realitysystems by inventors Jurgenson, et al., filed Nov. 30, 2015 and issuedMay 16, 2017, is directed to systems and methods for image basedlocation estimation are described. In one example embodiment, a firstpositioning system is used to generate a first position estimate. A setof structure façade data describing one or more structure façadesassociated with the first position estimate is then accessed. A firstimage of an environment is captured, and a portion of the image ismatched to part of the structure façade data. A second position is thenestimated based on a comparison of the structure façade data with theportion of the image matched to the structure façade data.

U.S. Pat. No. 9,005,129 for Wearable heart rate monitor by inventorsVenkatraman, et al., filed May 30, 2014 and issued Apr. 14, 2015, isdirected to a biometric monitoring device used to determine a user'sheart rate by using a heartbeat waveform sensor and a motion detectingsensor. In some embodiments, the device collects collecting concurrentoutput data from the heartbeat waveform sensor and output data from themotion detecting sensor, detects a periodic component of the output datafrom the motion detecting sensor, and uses the periodic component of theoutput data from the motion detecting sensor to remove a correspondingperiodic component from the output data from the heartbeat waveformsensor. From this result, the device may determine and present theuser's heart rate.

U.S. Pat. No. 8,945,017 for Wearable heart rate monitor by inventorsVenkatraman, filed Jun. 3, 2014 and issued Feb. 3, 2015, is directed toa biometric monitoring device used to determine a user's heart rate byusing a heartbeat waveform sensor and a motion detecting sensor. In someembodiments, the device collects collecting concurrent output data fromthe heartbeat waveform sensor and output data from the motion detectingsensor, detects a periodic component of the output data from the motiondetecting sensor, and uses the periodic component of the output datafrom the motion detecting sensor to remove a corresponding periodiccomponent from the output data from the heartbeat waveform sensor. Fromthis result, the device may determine and present the user's heart rate.

SUMMARY OF THE INVENTION

The present invention relates to a security management system operableto communicate with a plurality of other network devices.

Many consumers today purchase goods on the Internet from onlineretailers, and this form of shopping is expected to increase in theyears to come. This form of shopping, which has become commonplace,requires the purchased goods to be shipped to the purchaser. Often, thegoods are packaged and delivered to the residence of the purchaser whilethe purchaser is not home, and the packaged goods are merely leftunsecured by the door of the purchaser's residence. Of course, suchpackages are prone to being stolen, resulting in significant financialloss to someone in the online retailer chain.

Therefore, a need exists for improved security management systems andmethods of use thereof.

One object of the present invention is to provide an artificialintelligence (AI) entry management (EM) device for an entry management(EM) system. The AI EM device includes a camera, a microphone, a motiondetector, a speaker, and a housing. In one embodiment, the housingincludes a shape (e.g., oval shape) with a substantially open middle. Inanother embodiment, the housing is solid within the shape (e.g., ovalshape). The substantially open middle includes a housing protrusionportion configured to house the camera, the microphone, the motiondetector, and the speaker. In one embodiment, an AI EM device or AI EMsystem, as described herein, is part of a smart-home device that hasother functions, such as opening other entry points to a property orbuilding, turning on lights, setting temperature for a heating or airconditioning system and the like.

In one embodiment, the present invention includes an entry managementdevice including a housing comprising a camera and a software platform,wherein the entry management device is in communication with thesoftware platform, wherein the camera of the entry management device isoperable to read a non-fungible token (NFT) or an image associated withthe NFT displayed on at least one electronic device, wherein thesoftware platform is operable to authenticate the NFT or the imageassociated with the NFT, and wherein the entry management device isoperable to perform an action upon the authentication of the NFT or theimage associated with the NFT. The present invention further includes anaccess point including an electronic lock that is operable to lock andunlock the access point, wherein the electronic lock is in communicationwith the entry management device or wherein the electronic lock is incommunication with the entry management device via the softwareplatform, and wherein the action includes sending a command to theelectronic lock to unlock the access point if the NFT or the imageassociated with the NFT is authenticated. The NFT is non-transferable inone embodiment. The action includes exchanging a currency, providingdata, or instructing a device connected to the software platform or theentry management device to perform a second action in one embodiment.The NFT or the image associated with the NFT includes a virtual key inone embodiment.

In another embodiment, the present invention includes an entrymanagement system including a first entry management device including ahousing comprising a camera, a second entry management device includinga housing comprising a camera, and a software platform, wherein thefirst entry management device and the second entry management device arein communication with the software platform, wherein the first entrymanagement device is operable to detect an object, a person, or anevent, or to receive a detection of the object, the person, or the eventfrom a device connected to the software platform or the first entrymanagement device, wherein the second entry management device isoperable to receive an alert relating to the detection of the object,the person, or the event, and wherein the second entry management deviceis operable to perform an action upon receiving the alert relating tothe detection of the object, the person, or the event. In anotherembodiment, the action includes sending an alert to an electronic deviceassociated with the second entry management device. The action includesinstructing a robot, a drone, a camera, or an electronic deviceassociated with the second entry management device to perform a secondaction in another embodiment. The second action includes patrolling anarea, maintaining a position, following the object or the person,changing a position, and/or capturing video, imagery, and/or audio datain one embodiment. The present invention further includes an accesspoint comprising an electronic lock that is operable to lock and unlockthe access point, wherein the electronic lock is in communication withthe first entry management device or wherein the electronic lock is incommunication with the first entry management device via the softwareplatform, and wherein the first entry management device is operable tosend a command to the electronic lock to unlock the access point if thefirst entry management device reads or receives a virtual key andverifies the virtual key in another embodiment. The second entrymanagement device includes a plurality of entry management deviceswithin a predetermined distance of the first entry management device inone embodiment. In yet another embodiment, the second entry managementdevice includes a plurality of entry management devices within ageofence including the second entry management device and the firstentry management device. The detection of the object, the person, or theevent includes detection of a crime, an unauthorized person, and/or avehicle in one embodiment. The action includes instructing a drone orrobot which is hidden or obscured to patrol an area, follow the objector the person, and/or capture video, imagery, and/or audio data inanother embodiment. In yet another embodiment, the action includescapturing thermal imagery of the object or the person. The actionincludes marking an object or person with a marker or a dye in anotherembodiment. In yet another embodiment, the first entry managementdevice, the second entry management device, a drone connected to thefirst entry management device, the second entry management device, orthe software platform, a robot connected to the first entry managementdevice, the second entry management device, or the software platform, oranother device connected to the first entry management device, thesecond entry management device, or the software platform is waterproof,water resistant, fireproof, or bulletproof.

In yet another embodiment, the present invention includes an entrymanagement system including a first entry management device including ahousing comprising a camera, a second entry management device includinga housing comprising a camera, and a software platform, wherein thefirst entry management device and the second entry management device arein communication with the software platform, wherein the first entrymanagement device is operable to detect an object, a person, or anevent, or to receive a detection of the object, the person, or the eventfrom a device connected to the software platform or the first entrymanagement device, wherein the second entry management device isoperable to receive an alert relating to the detection of the object,the person, or the event, wherein the second entry management device isoperable to perform an action upon receiving the alert relating to thedetection of the object, the person, or the event, wherein the camera ofthe first entry management device is operable to read a non-fungibletoken (NFT) or an image associated with the NFT displayed on at leastone electronic device, wherein the software platform is operable toauthenticate the NFT or the image associated with the NFT, and whereinthe entry management device is operable to perform an action upon theauthentication of the NFT or the image associated with the NFT. In oneembodiment, the present invention further comprising an access pointcomprising an electronic lock that is operable to lock and unlock theaccess point, wherein the electronic lock is in communication with thefirst entry management device or wherein the electronic lock is incommunication with the first entry management device via the softwareplatform, and wherein the action includes sending a command to theelectronic lock to unlock the access point if the NFT or the imageassociated with the NFT is authenticated. The action includes sending analert to an electronic device associated with the second entrymanagement device in another embodiment.

These and other aspects of the present invention will become apparent tothose skilled in the art after a reading of the following description ofthe preferred embodiment when considered with the drawings, as theysupport the claimed invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a perspective environmental view of an AI EM device andsystem according to select embodiment of the invention.

FIG. 2 shows a front left perspective view of an AI EM device accordingto select embodiment of the invention.

FIG. 3 shows a back left perspective view of the AI EM device accordingto FIG. 2.

FIG. 4 shows a front view of the AI EM device according to FIG. 2.

FIG. 5 shows a back view of the AI EM device according to FIG. 2.

FIG. 6 shows a front right perspective partially disassembled view ofthe AI EM device according to FIG. 2.

FIG. 7 shows a back left perspective partially disassembled view of theAI EM device according to FIG. 2.

FIG. 8 shows a front view of a mobile electronic device with a digitalphotograph that is an image virtual key configured to be identified bythe camera of the AI EM device and verified for access to an accesspoint.

FIG. 9 shows a display screen showing the AI EM system tracking a mobileelectronic device, such as a mobile phone, of a third party to enable acontextual greeting and to provide logistic instructions to said thirdparty when their mobile device moves within a threshold distance of theAI EM device.

FIG. 10 is a top view of an exemplary storage container having twocompartments therein.

FIG. 11 shows a front view of a mobile electronic device that displays aplurality of digital photographs that in series are an image virtual keyconfigured to be identified by the camera of the AI EM device andverified for access to an access point.

FIG. 12 shows a front view of an exemplary AI EM device having a displayscreen that displays images for selection as a selected virtual key.

FIG. 13 shows a front view of an exemplary AI EM device communicatingwith a mobile electronic device to present a plurality of images forselection to produce an image virtual key for access to an access point.

FIG. 14 shows a top view of a building, a dwelling, having robot dockingstations configured on each corner of the building to providesubstantially complete monitoring of the perimeter of the building.

FIG. 15 shows an exemplary docking station having a plurality ofbatteries and a charging interface for charging a robot docked thereon.

FIG. 16 shows an exemplary docking station configured under the eave ofa home.

FIG. 17 shows an exemplary docking station configured under the eave ofa home.

FIG. 18 shows an exemplary docking station configured under the eave ofa home.

FIG. 19 is a schematic diagram of a system of the present invention.

DETAILED DESCRIPTION

The present invention is generally directed to entry management systems.

In one embodiment, the present invention includes an entry managementdevice including a housing comprising a camera and a software platform,wherein the entry management device is in communication with thesoftware platform, wherein the camera of the entry management device isoperable to read a non-fungible token (NFT) or an image associated withthe NFT displayed on at least one electronic device, wherein thesoftware platform is operable to authenticate the NFT or the imageassociated with the NFT, and wherein the entry management device isoperable to perform an action upon the authentication of the NFT or theimage associated with the NFT. The present invention further includes anaccess point including an electronic lock that is operable to lock andunlock the access point, wherein the electronic lock is in communicationwith the entry management device or wherein the electronic lock is incommunication with the entry management device via the softwareplatform, and wherein the action includes sending a command to theelectronic lock to unlock the access point if the NFT or the imageassociated with the NFT is authenticated. The NFT is non-transferable inone embodiment. The action includes exchanging a currency, providingdata, or instructing a device connected to the software platform or theentry management device to perform a second action in one embodiment.The NFT or the image associated with the NFT includes a virtual key inone embodiment.

In another embodiment, the present invention includes an entrymanagement system including a first entry management device including ahousing comprising a camera, a second entry management device includinga housing comprising a camera, and a software platform, wherein thefirst entry management device and the second entry management device arein communication with the software platform, wherein the first entrymanagement device is operable to detect an object, a person, or anevent, or to receive a detection of the object, the person, or the eventfrom a device connected to the software platform or the first entrymanagement device, wherein the second entry management device isoperable to receive an alert relating to the detection of the object,the person, or the event, and wherein the second entry management deviceis operable to perform an action upon receiving the alert relating tothe detection of the object, the person, or the event. In anotherembodiment, the action includes sending an alert to an electronic deviceassociated with the second entry management device. The action includesinstructing a robot, a drone, a camera, or an electronic deviceassociated with the second entry management device to perform a secondaction in another embodiment. The second action includes patrolling anarea, maintaining a position, following the object or the person,changing a position, and/or capturing video, imagery, and/or audio datain one embodiment. The present invention further includes an accesspoint comprising an electronic lock that is operable to lock and unlockthe access point, wherein the electronic lock is in communication withthe first entry management device or wherein the electronic lock is incommunication with the first entry management device via the softwareplatform, and wherein the first entry management device is operable tosend a command to the electronic lock to unlock the access point if thefirst entry management device reads or receives a virtual key andverifies the virtual key in another embodiment. The second entrymanagement device includes a plurality of entry management deviceswithin a predetermined distance of the first entry management device inone embodiment. In yet another embodiment, the second entry managementdevice includes a plurality of entry management devices within ageofence including the second entry management device and the firstentry management device. The detection of the object, the person, or theevent includes detection of a crime, an unauthorized person, and/or avehicle in one embodiment. The action includes instructing a drone orrobot which is hidden or obscured to patrol an area, follow the objector the person, and/or capture video, imagery, and/or audio data inanother embodiment. In yet another embodiment, the action includescapturing thermal imagery of the object or the person. The actionincludes marking an object or person with a marker or a dye in anotherembodiment. In yet another embodiment, the first entry managementdevice, the second entry management device, a drone connected to thefirst entry management device, the second entry management device, orthe software platform, a robot connected to the first entry managementdevice, the second entry management device, or the software platform, oranother device connected to the first entry management device, thesecond entry management device, or the software platform is waterproof,water resistant, fireproof, or bulletproof.

In yet another embodiment, the present invention includes an entrymanagement system including a first entry management device including ahousing comprising a camera, a second entry management device includinga housing comprising a camera, and a software platform, wherein thefirst entry management device and the second entry management device arein communication with the software platform, wherein the first entrymanagement device is operable to detect an object, a person, or anevent, or to receive a detection of the object, the person, or the eventfrom a device connected to the software platform or the first entrymanagement device, wherein the second entry management device isoperable to receive an alert relating to the detection of the object,the person, or the event, wherein the second entry management device isoperable to perform an action upon receiving the alert relating to thedetection of the object, the person, or the event, wherein the camera ofthe first entry management device is operable to read a non-fungibletoken (NFT) or an image associated with the NFT displayed on at leastone electronic device, wherein the software platform is operable toauthenticate the NFT or the image associated with the NFT, and whereinthe entry management device is operable to perform an action upon theauthentication of the NFT or the image associated with the NFT. In oneembodiment, the present invention further comprising an access pointcomprising an electronic lock that is operable to lock and unlock theaccess point, wherein the electronic lock is in communication with thefirst entry management device or wherein the electronic lock is incommunication with the first entry management device via the softwareplatform, and wherein the action includes sending a command to theelectronic lock to unlock the access point if the NFT or the imageassociated with the NFT is authenticated. The action includes sending analert to an electronic device associated with the second entrymanagement device in another embodiment.

None of the prior art discloses an EM device operable to command andcontrol other network devices as described herein, specifically an EMdevice operable to create geofences and coordinate with other devicesbased on activity detected within geofences, an EM device operable forvoice identification and voice recognition, and an EM device operable toinstruct other devices, including license plate readers, to captureimages and transmit data based on these images to other devices.

The software platform described in the present invention is operable toinclude a server computer, a cloud platform and/or an edge device, and adatabase or other data store, and is connected over a network with theAI EM device and other electronic devices described herein, such asrobots, drones, cameras, and Internet of Things (IoT) devices. Theserver computer, cloud platform and/or edge device include at least oneprocessor and at least one memory, and are operable for networkcommunication with other electronic devices which are not connected tothe platform, such as law enforcement or devices controlled by providersof security. In select embodiments of the disclosed AI EM device, aplurality of lights is included. The plurality of lights is positionedaround a periphery of the housing. In one embodiment, the plurality oflights is positioned around a periphery of a shape (e.g., an oval shape)of the housing. In select embodiments, each of the plurality of lightsincludes a light emitting diode. In one embodiment, each of the lightemitting diodes of the plurality of lights is configured to light upbased on sounds emitted from the speaker, whereby the plurality oflights is configured to mimic the AI EM device as if it were talking.The plurality of lights is configured to indicate an alarm has beentriggered by flashing, and is further configured to indicate a status ofthe AI EM device such as via a solid color (e.g., green for operationaland red for one or more problems existing with the AI EM device).

In select embodiments of the disclosed AI EM device, an LED lens isincluded. The LED lens is configured to cover and protect the pluralityof lights. In one embodiment, the LED lens has an oval shape.

In select embodiments of the disclosed AI EM device, a mounting bracketis included. The mounting bracket is configured for mounting the housingof the AI EM device to a surface. In one embodiment, the mountingbracket has an oval shape.

In select embodiments of the disclosed AI EM device, a power source isincluded. The power source includes a hardwired power source, a batterypowered power source, at least one solar panel, the like, orcombinations thereof.

In select embodiments of the disclosed AI EM device, a wirelesscommunication device is included. The wireless communication device ishoused inside of the housing protrusion portion of the housing of the AIEM device. The wireless communication device is configured tocommunicate with the EM system or other AI EM devices via wirelesscommunication. In one embodiment, the wireless communication of thewireless communication device is selected from a group consisting of:WI-FI, UHF radio waves in the industrial, scientific and medical (ISM)radio bands (e.g., from 2.402 GHz to 2.480 GHz), and building personalarea networks (PANs), also known as BLUETOOTH® (Bluetooth trademarkowned by Bluetooth SIG, Inc. of Kirkland, Wash.), the like, orcombinations thereof.

One feature of the disclosed AI EM device is that the speaker ispositioned in the housing protrusion portion and oriented toward thesubstantially open middle. This orientation of the speaker allows forprojecting sound from the speaker out of the AI EM device.

The AI EM device includes at least one processor and at least onememory. The AI EM device further includes a non-transitory computerreadable storage medium including software. The software includesprogram instructions configured for providing artificial intelligence tothe AI EM device. In select embodiments, the software is configured fordevelopment of intelligence within the AI EM device, including, speechrecognition, problem-solving, learning, planning, the like, combinationsthereof, etc. In select embodiments of the disclosed AI EM device, theprocessor is a networked processor. The networked processor is connectedto the AI EM device via wireless communication to the wirelesscommunication device on the AI EM device. In one embodiment, theprocessor is housed inside of the housing protrusion portion of thehousing of the AI EM device.

An exemplary AI EM system employs an AI system similar to or includingfeatures of the WATSON AI system. WATSON is a supercomputer thatcombines artificial intelligence (AI) and sophisticated analyticalsoftware for optimal performance as a “question answering” machine. Thesupercomputer is named for IBM's founder, Thomas J. Watson. The WATSONsupercomputer processes at a rate of 80 teraflops (trillionfloating-point operations per second). To replicate (or surpass) ahigh-functioning human's ability to answer questions, WATSON accesses 90servers with a combined data store of over 200 million pages ofinformation, which it processes against six million logic rules. It is aplatform for exploring, visualizing and presenting data that utilizesWATSON's cognitive capabilities to automatically surface data-driveninsights and recommend ways of presenting the data.

In another aspect, the invention includes an AI EM system. The disclosedAI EM system includes utilizing the disclosed AI EM device in any of thevarious embodiments and/or combination of embodiments shown and/ordescribed herein. As such, in general, the disclosed AI EM systemincludes the disclosed EM device with a camera, a microphone, a motiondetector, a speaker, a wireless communication device, a smart wearabledevice, the like, and/or combinations thereof. In addition, in oneembodiment, the disclosed AI EM system includes an AI device. The AIdevice is in communication with the EM device (e.g., wiredcommunication, wireless communication). In another embodiment, the AIdevice includes a processor with a non-transitory computer readablestorage medium having software with program instructions configured forproviding artificial intelligence to the AI EM device.

One feature of the disclosed AI EM system is that the software hasprogramming instructions that, when executed, cause the EM device toexecute entry management and ecommerce support functions including, butnot limited to, the delivery of messages, directives, instructions,greetings, recordings, and facilitating the connection of a third partyfor two-way audio/video communication.

The motion detector of the EM device is configured to activate uponmotion and provide a greeting, command, or instructions, whereby thesystem activates upon recognition of a paired mobile device. The pairedmobile device includes a stored identification paired with the system(e.g., via the approval of an owner/administrator). In one embodiment,the owner/administrator in the system includes, but is not limited to,individuals assigned programming rights configured to allow theowner/administrator to make selections (e.g., remotely) via the AI EMsystem. When activation occurs, the AI EM system is configured toprovide a response. In one embodiment, the response is a spontaneousresponse, an automatic response, or a pre-programmed response inaccordance with the device it detects.

The AI EM system is configured to provide a response in accordance withthe image read by its camera. In one embodiment, the response is aspontaneous response, or a pre-programed response in accordance with theimage read by its camera.

When activated, the platform or system sends a notification to the userdevice of the owner/administrator with an option to engage remotely intwo-way communication, activate a preprogrammed or custom message,provide a virtual key or activate the recording for a message, detect aperson or a device via the camera, the microphone, the motion detector,or the wireless communication device and provide an intelligent responseto the person or device via the speaker or the wireless communicationdevice. In one embodiment, the notification is sent simultaneously whenactivated. In one embodiment, the present invention provides foridentification of a specific person via voice identification orvoiceprint recognition. In one embodiment, voiceprint recognition isconducted on the software platform of the present invention or throughsoftware of the AI EM device. Voiceprint recognition is operable to beaccomplished using any method known in the art, including the methoddescribed in U.S. Pat. No. 10,629,209, which is incorporated herein byreference in its entirety. In one embodiment, voiceprint recognition orvoice identification includes other forms of audio identification, suchas identifying a certain pitch or note or series of pitches or notesthat are generated via an electronic device.

The AI EM system is operable to present a question to ask if a personwithin proximity of the EM device desires to leave a message. If thesystem receives an affirmative response, then the system is operable torecord an audio message via the microphone of the AI EM device. Theaffirmative response is recognized via voice recognition in oneembodiment, or software on the AI EM device or the platform of thepresent invention which recognizes words and/or phrases spoken by aperson. Voice recognition according to the present invention includesany voice recognition technology known in the art, such as thetechnology described in U.S. Pat. No. 10,650,802, which is incorporatedherein by reference in its entirety. In one embodiment, this message isrelayed to an administrator device (i.e., a user device of anadministrator) immediately or upon receiving a request from theadministrator device to play the message. The message is operable toalso include an identification of the person who left the message, asidentified by the system of the present invention or by the personleaving the message. For example and not limitation, the administratordevice is a smart electronic device that includes, but is not limitedto, a smart wearable device, a wearable device, a portable device,and/or a smart portable device. For example and not limitation, thesmart wearable device is a smart watch, smart glasses, virtual realitydevice, and/or augmented reality device. The AI EM system is alsooperable to transmit a question and/or prompt to a user device (e.g.,with or without administrative privileges) within proximity of the EMdevice. The user device is configured to receive a selection based onthe question and/or prompt. For example, and not limitation, thequestion and/or prompt from the system relates to whether the user ofthe user device desires to interface with an administrator. The userdevice is configured to receive a selection via a display screen andtransmit the selection to the AI EM system. The AI EM system is thenfurther operable to transmit a request to an administrator device. Theadministrator device is configured to receive a selection relating tothe request. If the request is approved, the AI EM system is configuredto initiate an audio interface or call (e.g., video call) between theadministrator device and the user device. The administrator device isconfigured to display the image data captured by the AI EM device andthe AI EM device is configured to display image data captured by theadministrator device. In another example of an AI EM system according tothe present invention, the EM device is configured to record messagesfor at least one administrator device and/or transmit messages to atleast one administrator device. A message is indicated, sent, oraccessible for only one or more than one recipient.

The present invention also provides for a package to be scanned by thecamera of the EM device and for the AI EM system to create or toinitiate a geofence around a predetermined region in proximity to the EMdevice, or around the range of visibility of the camera of the EMsystem, by way of example and not limitation, a monitored designatedarea (MDA) or multiple monitored designated areas (MDAs) created by theAI EM system in the view of the camera, or in view of multiple camerasof the AI EM system. Geofences are operable to be defined by thesoftware platform of the present invention based on receipt of inputsuch as property boundary information or other geographic informationnot specifically tied to a field of visibility of an electronic device,or by one or more devices connected to the software platform of thepresent invention. A geofence includes, but is not limited to, a virtualgeographic boundary, defined by at least one geographic designator or aplurality of points in physical space, such as global positioning system(GPS) coordinates, latitude and longitude coordinate points, radiofrequency identification (RFID) technology, BLUETOOTH technology,Internet Protocol (IP) addresses, or any other method known in the art,that enables software to trigger a response when a mobile device entersor leaves a particular area. One example of geofences used in thepresent application include the geofences described in U.S. Pat. Nos.9,906,902, 10,121,215, 9,875,251, 10,115,277, 10,237,232, 10,582,333,9,986,378, 10,375,514, 10,235,726, 10,805,761, and 10,979,849, each ofwhich is incorporated herein by reference in its entirety. One or moredevices connected to the software platform of the present invention,including the EM device, are operable to detect an event, an activity,an object, a person, or a device within the at least one geofence. Thesedevices are operable to communicate with the software platform toidentify a motion, a person, a package, an object, or a device. In oneembodiment, the one or more devices are operable to detect entry intoand exit from at least one geofence. Alternatively or additionally, theone or more devices are operable to detect the presence of an activity,event, object, person, or device proximal to the at least one geofence.The one or more devices are operable to send a request of identificationto the object, person, or device within the at least one geofence orapproaching the at least one geofence. In one embodiment, the deviceincludes a drone. The one or more devices are operable to receive anaudio response and/or visual response and analyze the response or sendthe response to the software platform for analysis according to anymethod described herein or known in the art.

In one embodiment, when the geofence or MDA is initiated, the EM deviceis configured to utilize the motion detector, camera, microphone, orcombinations thereof for creating the geofence or MDA monitored area,having a proximity distance from the AI EM device, and/or for detectinga breach of the geofence area or MDA. In select embodiments, when abreach of the geofence area or MDA is detected, the AI EM system isconfigured to: alert the owner via a wireless notification, trigger theEM device to set off an alarm of the EM device, trigger an externalalarm, the like; and/or or combinations thereof. In select embodiments,when the package is placed in the geofence monitored area or MDA, thenthe EM device is activatable when input is received (e.g. from a userdevice) belonging to a carrier entering the geofence area, or the EMdevice is activatable to monitor the geofence area or MDA via the motiondetector, camera, microphone, or combinations thereof. In other selectembodiments, the geofence or MDA is operable to be deactivated after theEM device receives a scan of the package or a virtual key, whereby thepackage is retrieved, whereby the notification, alarms, or combinationsthereof are deactivated by the scanning of the package or the virtualkey, and the geofence monitored area or MDA is operable to bereactivated after a subsequent scan.

In another embodiment, the AI EM system is operable to implementproximity detection and alerts upon a trigger, such as the EM devicescanning a package or a user entering a house associated with the AI EMsystem. By way of example, the AI EM system is operable to detectmovement in a visual or auditory range of the AI EM device.Alternatively, scanning a label of a package or another trigger eventcauses the AI EM device to arm other devices to detect movement orsound. In one example, a camera connected to the EM device eitherdirectly or through a platform is operable to detect movement in an areanear a delivered package, with this area being outside of a range ofvision of the AI EM device but within an area inside a range of visionof the camera. The area inside the range of vision of the camera isoperable to be a defined space (e.g., a geofence) or an area within apredetermined distance of a monitored area (e.g., a package deliveryzone, a front porch, etc.). Geofences and monitored areas are operableto be defined by the system centroidally (i.e., relative to a centralpoint) or non-centroidally (e.g., a perimeter around an object or aperimeter of a space, such as a perimeter of a porch, a package deliveryzone, a front porch region, etc.). Alternatively, the range of vision orvisibility of the camera included within the housing of the EM devicedefines the monitored area or region in proximity to the EM device.

In one embodiment, geofences are defined through the use of internetprotocol (IP) addresses such that the geofences are not defined visuallyand do not need to be monitored visually. Rather, in one embodiment, ageofence is established around a physical boundary, such as theperimeter of a property or the perimeter of a curtilage of a house. Adetection device, such as an electronic device detector or mobile phonedetector, determines when an electronic device enters the geofence andsends an alert to the entry management device regarding the presence ofthe electronic device. In one embodiment, the detection device is adetector as described in Pat. No. 8,718,597 or 10,547,736, each of whichis incorporated herein by reference in its entirety. Electronic devicesinclude, by way of example and not limitation, smart phones, wearables,cellular phones, laptops, vehicles with wireless connectivitycapabilities, drones, robots, or any other electronic device known inthe art operable for cellular or wireless network connection. In oneembodiment, the platform of the present invention recognizes theelectronic device through connection with a device connected to theplatform on the property. Upon recognition by the platform of anelectronic device that is on a whitelist, or a list of electronicdevices that are permitted to be in the geofence, a record of theelectronic device entering the geofence is stored on the platform.Additionally, an alert including an identification of the electronicdevice and a time of entry of the electronic device into the geofence issent to a device associated with the platform in one embodiment. If theelectronic device is on a blacklist, or a list of electronic deviceswhich are not permitted to be within the geofence, a record of theelectronic device entering the geofence is stored on the platform and analert including an identification of the electronic device and a time ofentry of the electronic device into the geofence is sent to a deviceassociated with the platform. Additionally, a notification is operableto be sent from the platform to the blacklisted device indicating thatthe person associated with the blacklisted device should leave thepremises immediately. In one embodiment, an alert is also sent from theplatform to a law enforcement device in the event that the blacklistedelectronic device is associated with a person who is not legallyauthorized to be on the premises, such as a person who is the subject ofa restraining order by one of the occupants of the house on thepremises, a criminal with one or more outstanding warrants against them,or a person of interest in a crime. In one embodiment, the deviceassociated with the platform is operable to send a command to theplatform to instruct one or more aerial or land robots, cameras, or anyother device connected to the platform described herein to monitor theelectronic device or take any action described herein against theblacklisted electronic device which has entered the geofence.

In the event that the electronic device is not a whitelisted device or ablacklisted device, the platform is operable to request anidentification from the electronic device and store the identificationand the time of entry into the geofence. An alert is also preferablysent to a device associated with the platform including theidentification of the electronic device and the time of entry into thegeofence. In one embodiment, the device associated with the platform isoperable to send a command to the platform to notify authorities,instruct one or more aerial or land robots, cameras, or any other deviceconnected to the platform described herein to monitor the electronicdevice or take any action described herein against the electronic devicewhich is not whitelisted and not blacklisted which has entered thegeofence. In one embodiment, the platform is operable to receive acommand from a device associated with the platform to whitelist orblacklist the electronic device which was previously not whitelisted orblacklisted. The platform preferably stores the duration of occupancywithin the geofence as well as the exit time of the electronic devicefrom the geofence, and is further operable to send an alert ornotification to a device associated with the platform including theoccupancy time and exit time of whitelisted, blacklisted, or not yetwhitelisted or blacklisted devices within the geofence. In oneembodiment, alerts or notifications are not sent for certain whitelisteddevices such as devices belonging to occupants of a household.

An exemplary AI EM system is configured to collect audio-visualinformation that is recorded in the event of a breach of an access pointor geofence. Sensors on an access point, or within or in proximity tothe geofence, are coupled with the AI EM system and when an access pointis opened without authorization from the AI EM system, an alarm isconfigured to sound and the camera and microphone are configured torecord information for later evaluation to determine the source of thebreach. For example, a video is recorded that is later watched toidentify a thief breaking into a home. Note, in one embodiment, a motionsensor is coupled with the AI EM system and video and audio is recordedwhen the motion detector is activated.

Another AI EM system embodiment of the present invention includes an EMdevice constructed and configured to communicate directly via wirelessor wired communication (e.g., radiofrequency, BLUETOOTH, ZIGBEE, WI-FI,Near Field Communication (NFC), a Link 16 network, and/or a mesh networkand/or other similar communication methods), with a smart electronicdevice including a memory, a processor, and a visual display. The EMdevice includes a housing including at least one input capture device,further including at least one of an image capture device, a videocapture device, an audio capture device, an audio transmitting device,an image transmitting device, and/or a video transmitting device. In oneembodiment, the EM device collects at least one of visual informationand audio information. The smart electronic device includes, but is notlimited to, a smart wearable device, a wearable device, a portabledevice, and a smart portable device. The smart wearable device includes,but is not limited to, smart watches (e.g., FITBIT, SAMSUNG GALAXY,APPLE WATCH, WEAR OS, or WHOOP) and virtual reality and augmentedreality devices (e.g., GOOGLE GLASS, VALVE INDEX, OCULUS, and HOLOLENS).For further details relating to these and related smart wearabledevices, see U.S. Pat. Nos. 10,715,791; 9,063,330; 10,535,151;9,652,896; 9,005,129; and 8,945,017, and US Patent Publication Nos.2021/0080996 and 2020/0126243, each of which is incorporated herein byreference in its entirety. Virtual reality (VR) is a simulatedexperience that is similar to or completely different from the realworld. Applications of virtual reality include entertainment (e.g.,video games), education (e.g., medical or military training), andbusiness (e.g., as virtual meetings). Augmented reality devices areconfigured to superimpose images and/or electronic media on a displaypresented to modify a user's view of the real world, wherein the viewincludes live or transmitted, alone or combined with or without audio.Virtual reality includes augmented transmissions of live video, recordedvideo, live or recorded images or a series of images, and combinations,with or without audio.

In one embodiment, the EM device and/or the smart electronic device isconfigured to transmit image and audio data in real-time and/ornear-real-time. Preferably, the EM device and the smart electronicdevice are configured to transmit image and audio data in real-timeand/or near-real-time. Additionally, the EM device and/or the smartelectronic device is configured to record the audio data and the visualdata. The EM device is further configured to transmit the recorded datato the smart electronic device. In yet another embodiment, the EM deviceis further configured to time stamp the visual and audio data (e.g., viathe software platform). Preferably, the smart electronic device isoperable to display timestamp data via the visual display and/or toinclude timestamp data saved or otherwise associated with the image,video, and/or audio data captured or received as input(s) by the EMdevice. The EM device is further configured to provide real-time alertsand/or messages to the smart electronic device. Additionally, the EMdevice is configured to receive real-time and/or near real-time datafrom the smart electronic device. Advantageously, the smart electronicdevice is configured to display the real-time and/or near-time data(e.g., video data, audio data, image data, alerts, messages).

The AI EM system is configured for two-way communication with the smartelectronic device. The AI EM system is configured to transmit capturedaudio and/or visual data to the smart electronic device. The AI EMsystem is further configured to receive audio and/or visual data fromthe smart electronic device. For example and not limitation, the AI EMsystem is configured to transmit a virtual key, a password, and/or otherverification means/mechanism (e.g. a collection of images to beverified) to the smart electronic device. The smart electronic device isthen configured to receive input related to the virtual key, passwordand/or other verification means (e.g., from a user device). In oneembodiment, the verification means includes the EM device receiving aselection of at least one image based on a prompt. The smart electronicdevice is configured to receive at least one image selection includingbut not limited to, via a control mechanism attached to the smartelectronic device. For example, and not limitation, the controlmechanism includes, but is not limited to, a button, a virtual button, aswitch, a virtual switch, a dial, a virtual dial, and/or a graphicaluser interface (GUI) configured to select at least one image and/orother verification means. Alternatively, in one embodiment, the smartelectronic device and/or smart electronic wearable device is configuredto track the motion of a user's head via a camera and to determine wherea user is looking based on head position. Alternatively, oradditionally, the smart electronic device is further configured to trackthe rotation and/or orientation of a user based on at least one sensor.For example, and not limitation, the at least one sensor includes anaccelerometer and/or a gyroscope. The smart electronic device is furtheroperable to track the user's eye position(s). In one embodiment, AI EMsystem is configured to identify which image is selected based on theduration of time that a user looked at an image. In yet anotherembodiment, the smart electronic device is configured to display avirtual keypad. In one embodiment, the smart electronic device monitorsa user's hand position in relation the virtual keypad and receives apassword, code, and/or answer to a security question based on the user'shand position.

The smart electronic device is further configured to capture audioand/or visual data (e.g., an image, video) of a user and an environmentsurrounding the user. The smart electronic device is further operable totransmit the captured audio and/or visual data to the EM device. The EMdevice is operable to perform image, audio, and/or video analysis on theaudio and/or visual data obtained from the at least smart wearabledevice. The image, audio, and/or video analysis includes, but is notlimited to, recognition of at least one person, at least one weapon, atleast one action, and/or at least one sound. Advantageously, the EMdevice is configured to compare the audio and/or visual data captured bythe smart electronic device with historical visual and/or audio data. Inone embodiment, the EM device is configured to generate an alert and/ormessage based on the comparison of the audio and/or visual data with thehistorical audio and/or visual data.

In another example, the smart electronic device is configured for use byan owner of a dwelling and/or housing, property owner for commercialbuildings, property management entity, etc. The smart electronic deviceis configured to receive the audio and/or visual data from the EMdevice. For example, and not limitation, a virtual reality headset isworn by an owner who is engaged with an immersive virtual realityenvironment. The virtual reality headset is configured to display theaudio and/or visual data from the EM device via a virtual realitydisplay. Advantageously, the virtual reality headset is furtherconfigured to generate a prompt in the virtual reality environment andis operable to receive input (e.g., from the wearer of the virtualreality headset (e.g., based on audio command, entry into a GUI, etc.)).In one embodiment, the input includes an action for the EM system basedon the audio and/or visual data. For example, and not limitation, theprompt includes whether an individual should be granted access to enterthe housing or dwelling. If the smart wearable device receives a commandto grant access to the individual, then the smart electronic device isconfigured to send a command to the EM device to disengage the lock.This enables a home owner to still receive updates and maintain securitywhile immersed in a virtual reality environment.

Advantageously, the AI EM system is operable to provide a duration oftime for an access point to be unlocked. For example, and notlimitation, after an individual has been authorized to enter through anaccess point, the EM device is configured to provide a duration of timeto remain unlocked. Once the duration of time has lapsed, then the EMdevice is configured to send a command to the electronic lock to engagedand lock an access point. Furthermore, the EM system is configured totransmit a message and/or alert to the smart electronic device toindicate the duration of time that the access point will be unlocked.Advantageously, the EM system is operable to generate an alert and/ormessage when the duration of time is expiring and to transmit a promptto the smart electronic device to determine if the duration of timeneeds to be extended.

Unlocking of an access point is operable to occur through any methoddescribed herein or known the art, such as through provision of animage, a code, authorization received by the platform of the presentinvention or the AI EM device, or through voice identification or voicerecognition. Advantageously, by providing entry via voice identificationor voiceprint recognition, the AI EM device provides for hand free entryinto a space.

In another example, the AI EM system is configured for use with athird-party. For example, and not limitation, the AI EM system includesa software platform in network communication with a third-party. Forexample, and not limitation, a third-party includes a securitymanagement company, a first responder, police, homeowners, businessowners, and/or property management companies. The AI EM system isconfigured to transmit audio and/or visual data relating to a smartelectronic device detected by the EM device and/or a network device. Thethird party is operable to send a command to the electronic lock basedon the transmitted audio and/or visual data.

In one embodiment, the AI device is configured to learn various inputs.An AI device is configured to learn from past events and learn torecognize or predict when a particular person is arriving or departingfrom a dwelling and produce messages or questions that correspond with arecognized person or event. The AI EM system is further configured tolearn to associate features of a person or vehicle to verify a person ora company. For example, the AI EM system is configured to use the camerato take pictures when a delivery person arrives and to further analyzethese pictures for logos or emblems to identify a person approaching theAI EM device. The camera is further operable to detect emblems, logos,color or uniforms, hat shapes, etc. Likewise, an exemplary AI EM systemis configured to detect threats including masks or a weapon, such as agun or knife. In the event that a threat is detected, a robot, land oraerial, is configured to record images and/or video of the threat and isfurther configured to follow said threat as they leave the area. A robotis operable to communicate, such as by transmitting data (e.g., videoand/or audio data, position data, such as through a global positioningsystem (GPS)) to at least one user device of an administrator and/oremergency authorities to aid in tracking and locating said threat, suchas said third party. The AI EM system is operable to control the robotwithout input from the administrator to record images and/or follow athreat. In one embodiment, the robot includes artificial intelligenceembedded in the robot and acts independently to recognize threats,record threat data, images, and video, and/or follow a threat. A robotis further configured to receive packages (e.g., from a delivery person)and to transport the package to a secondary location, such as within adwelling or another building, or to a storage container. The accesspoint is configured to be unlocked by the system for the robot todeliver a package. Likewise, a robot is configured to retrieve a packagethrough an access point and deliver the package to a person or otherrobot at the location.

Accordingly, in one embodiment, the present invention is directed to anAI EM system comprising an AI EM device including a housing comprising:a camera, a microphone, a speaker, a controller, a wirelesscommunication device, an access point including an electronic lock thatis controlled by the controller to lock and unlock said access point, anAI device in communication with the AI EM device including a processorwith a non-transitory computer readable storage medium comprisingsoftware having program instructions configured for providing AI to theAI EM device, a robot having a wireless signal transceiver thatcommunicates with the controller of the AI EM device, wherein the AI EMdevice is configured to work on a networkable platform with networkedsoftware accessible and interactive with said AI EM device and memberdevices running the networked software and participating on thenetworkable platform, wherein the networkable platform is configured forcommunication between said member devices including member devices ofowners, service personnel, property management, real estateprofessionals, short term rentals, hotels, and employees, wherein thenetworkable platform is configured to provide access and logistics toaccess points. The camera is adapted to read a virtual key, and uponverifying the virtual key, the software of the AI device is configuredto unlock said electronic lock to said access point. The software of theAI device is configured to provide a logistic message via the speakerincluding directions to the access point. In one embodiment, the robotincludes a robot speaker. In one embodiment, the robot speak is operableto emit the logistic message and/or the contextual greeting. In oneembodiment, the robot is configured to open the access point. In oneembodiment, the robot includes a package manipulator configured toretain and release a package, wherein the robot is configured to move apackage from a first location to a second location. The robot preferablyincludes a robot camera configured to take images. In one embodiment,the robot includes an AI device that is configured to identify a packageor a threat from an image taken by the robot camera. In one embodiment,the threat is a person. The robot is configured to take images of saidthreat and transmit said image of said threat to said AI EM system or auser device of an authority. The robot is configured to track the threatand configured to transmit a location of said threat to said AI EMsystem or the authority user device. The robot is configured to take animage of a vehicle related to the threat and is configured to transmitsaid image of the vehicle to the AI EM system or an authority. In oneembodiment, the AI EM system further includes a docking station for therobot. In one embodiment, the docking station includes a charging portto charge a battery on the robot when said robot is docked on thedocking station. In one embodiment, the docking station also includes aninterchangeable battery configured to be exchanged with a battery on therobot when the robot is docked on the docking station. The dockingstation is also operable to receive power from a renewable power source(e.g., solar power). The docking station includes a motion detector inone embodiment. The docking station is configured to monitor asubstantial portion of a perimeter of a building having said accesspoint. In one embodiment, at least 80% of the perimeter is monitored bythe motion detector. In one embodiment, the docking station alsoincludes a speaker. The docking station is also preferably configured toemit an alarm. In another embodiment, the docking station includes amotion detector. In one embodiment, the alarm is emitted when motionabove a threshold motion is detected by the motion detector. A pluralityof robots and a plurality of docking stations are also operable to beprovided. In one embodiment, the plurality of robots are configured todock on said docking stations. In one embodiment, the docking stationsare configured around a building configured on a property. In oneembodiment, the property includes said access point. In one embodiment,the plurality of robots each includes a robot camera that is configuredto take images. In one embodiment, the plurality of robots areconfigured to monitor a substantial portion of a perimeter of thebuilding. In one embodiment, at least 80% of the perimeter is monitoredby said cameras on said plurality of robots. Each of the plurality ofrobots includes a microphone that is configured to record sounds. In oneembodiment, the robot (e.g., each of the plurality of robots) includes acontroller. In one embodiment, the robot acts autonomously from the EMdevice to monitor a perimeter around a building. Each of the pluralityrobots includes a speaker that is configured to emit an alarm when athreat is detected. Additionally, in one embodiment, each of theplurality robots includes a light that is configured to turn on when athreat is detected. In one example, a first robot of the plurality ofrobots communicates a location of said first robot to a second robot ofthe plurality of robots to follow a threat. The plurality of robots isoperable to include aerial robots that follow a threat. In oneembodiment, the plurality of robots is operable to form a robot swarmaround said threat. A mobile device that interfaces with the AI EMsystem is also operable to be included in the present system. In oneembodiment, the mobile device is configured to activate the robot tomonitor a substantial portion of a perimeter. The robot is alsoconfigured to conduct surveillance routes from the docking station. Therobot includes a deterrent device in one embodiment, such as a peppersprayer or a weapon such as a gun, knife or spear.

A robot includes, but is not limited to, a land or aerial robot, whereinthe land robot moves over land and wherein the aerial robot isconfigured to fly. In one embodiment, an aerial robot includes one ormore propellers. In one embodiment, a land robot includes a wheel orwheels, actuating legs or treads for movement over land. In yet anotherembodiment, a robot is configured to monitor an area around a dwellingor building, such as a place of business, with a camera. In oneembodiment, a robot is instrumental in creating the geofence area. Inone embodiment, a camera includes a thermal camera that more effectivelydetects when a person or animal is moving about a building. A thermalcamera is configured to capture still digital images or video. Thermalcameras or night vision lenses on cameras of robots or drones enableviewing and analyzing images at night. In one embodiment, these imagesare transmitted to the platform for analysis, or are transmitted to adevice associated with the platform. The drone or robot is operable totransmit location data for the objects in the images via geofencing,Global Positioning System (GPS), or any other method of geolocationknown in the art. In one embodiment, a real-time or near real-timeposition of the robot or drone is sent to a device associated with theplatform, such as an administrator device. Alternatively oradditionally, the platform sends the real-time or near real-timeposition of the drone to an authority or law enforcement device. In yetanother embodiment, the drone or robot determines the real-time or nearreal-time location or approximate location of the object or person beingtracked, sends this information to the platform, and the platform sendsthe real-time or near real-time location or approximate location to anadministrator device or law enforcement or authority device. Position orgeolocation data includes GPS data, coordinate points, or any otherlocation data known in the art. Robots or drones are also operable tofollow or track a person, objects such as cars or other drones orrobots, or any other moving object such as an animal for a predetermineddistance, and send geolocation data relating to the person or objectbeing tracked in real time or near real time to an electronic deviceassociated with the AI EM device and/or an authority device (such as apolice device) as the robot or drone tracks the person or object. In oneembodiment, the predetermined distance is the distance which the droneor robot is operable to travel away from a docking/charging station andreturn to the docking/charging station to be recharged without a batteryof the drone or robot dying or losing power. Alternatively, thepredetermine distance is any other distance operable to be receivedthrough the platform by an administrator account. In one embodiment, thedrone or robot stops tracking an object or person when the object orperson is out of range of detection of the robot or drone.

In one embodiment, a robot is configured to dock with a docking stationwherein the robot is charged, or exchanges batteries. The dockingstation is operable to be hard wired to receive electricity from thedwelling or place of business to charge the robot or the batteries forthe robot, and/or the docking station is operable to be coupled with arenewable power supply, such as a wind generator (wind turbine), or asolar generator, such as a photovoltaic cell (solar panel). The dockingstation is further configured in strategic positions about the dwellingor place of business to provide effective monitoring. For example, fourrobots are configured with one at each corner of the home. The robotsand/or the docking stations are configured to provide a substantiallycomplete perimeter monitoring of the building, dwelling or place ofbusiness. In one embodiment, at least 80% or more of the perimeter iscaptured by a camera of the plurality of robots. In a preferredembodiment, at least 90% or more of the perimeter is captured by acamera of the plurality of robots. In a more preferred embodiment, atleast 95% or more of the perimeter is captured by a camera of theplurality of robots. In a most preferred embodiment, 100% of theperimeter is monitored and there is overlap in the monitored area fromone robot to another robot.

In one embodiment, a docking station is further configured under anoverhang or eaves of a building or under the rain gutter of the buildingfor protection from the elements. An aerial robot is operable to dock ontop of the docking station between the overhang and the docking station.In one embodiment, an aerial robot includes a docking extension theenables the aerial robot to dock to the docking station from underneathof the docking station or horizontally with the docking station. Inanother embodiment, a docking station includes a docking cover that isconfigured to extend over the aerial robot to protect the aerial robotfrom the elements. In yet another embodiment, the docking cover istransparent to enable surveillance by the aerial robot when docked underthe docking cover. In one embodiment, a docking station includes a lightthat acts as an exterior light or flood light around the building andthis light is configured to illuminate an area around the building,thereby improving the surveillance of the docking station or aerialrobot. In another embodiment, robots or drones are constructed with awaterproof, water resistant, fireproof, bullet resistant, and/or bulletproof material. Alternatively, the robots or drones are encapsulatedwith a waterproof, water resistant, fireproof, bullet resistant, and/orbullet proof material. In another embodiment, any device describedherein, such as an AI EMD, camera, or any other device exposed to theelements, is operable to be constructed with or encapsulated by awaterproof, water resistant, fireproof, bullet resistant, and/or bulletproof material.

In one embodiment, the robots (e.g., aerial robots or land robots) areconfigured to monitor or conduct surveillance using a camera and/or amicrophone. The robot is further operable to be programmed to focus inon any movement detected above some threshold of movement, and/or followa person entering a geofence region or area around a dwelling or accesspoint. The robots are further operable to capture images, photographs,audio, and/or video, of a person entering such an area. In addition, therobots further include lights and these lights are operable to beprogrammed to activate when motion is detected or a sound is detected.The lights include, but are not limited to, bright lights, such as floodlight, producing about 500 lumens or more, or about 500 lumens or more,about 1,000 lumens or more, about 2,500 lumens or more, about 5,000lumens or more and any range between and including the lumens provided.In addition, in another embodiment, the robots are configured with aspeaker that is configured to produce an alarm when an intruder isdetected, such as motion above a threshold motion being detected orsound above a threshold sound being detected. In yet another embodiment,the lights are any suitable color and are operable to flash in an alarmmode. In one embodiment, the lights are operable to flash in an alarmmode while an alarm sound is emitted from the speaker. The AI EM system,such as a computer or mobile device, such as a mobile phone or a smartwearable device as described herein, is operable to activate thesurveillance mode of the robots (e.g., after receiving input from a userdevice via a user interface). Also, the AI EM system is operable toactivate an alarm mode to cause the robot(s) to produce flashing lightsand/or an alarm sound from their speakers (e.g., after receiving inputfrom a user device). The AI EM system is further operable to receive aninput to activate a light mode (e.g., from a user device), wherein thelights on the robot are turned on. The robots include aerial robots thatare configured around the home and the lights on the robots improve thevisibility around the home, for example.

An exemplary AI EM system includes a robot, such as a land or aerialrobot, that is configured to move packages from a first location tosecond location, monitor a delivery location and/or communicate withpeople such as a delivery person. In one embodiment, a robot includes aspeaker, such as a directional speaker, to enable communication with athird party to provide a greeting and/or logistic information to saidthird party. The speaker is operable to transmit a message that wasrecorded by a user or an administrator, such as specific instructionsincluding logistic instructions. When a delivery person arrives and isidentified by the robot, the pre-recorded message is emitted through therobot speaker. In addition, the AI EM system is operable to send anotification to a user device when a person arrives at the building orhome. The user device is configured to display a video captured by thecamera on the robot and to communicate with the person in real-timethrough the robot speaker. For example, and not limitation, the userprovides a greeting and then provides specific instructions for deliveryof a package. The robot is configured to receive communication from auser mobile device such as a mobile phone or a smart wearable device asdescribed herein.

In another embodiment, a robot is configured to lead the delivery personto an access point for delivering the package. An exemplary robot isconfigured to take a package (e.g., from a delivery person) and deliverthe package to an access point, such as inside a building or into astorage container. A directional speaker is operable to enablecommunication with a third party with some level of privacy. In oneembodiment, only the person the speaker is directed at effectively hearsthe communication. Also, a directional speaker is operable to enableeffective communication from an aerial robot wherein the communication,such as logistic instructions, is heard by a third party over noise madeby the aerial robot from the propellers, for example. In one embodiment,the robot is further configured to receive audio data (e.g., from a userdevice) relating to an administrator or authorities, and is configuredto play the audio data through the robot speaker to enable anadministrator and/or authorities to communicate via the robot. In oneembodiment, a robot is configured to pick up a delivery package using apackage manipulator and deliver the package to a delivery location,which includes, but is not limited to, a storage container or asecondary location (e.g., to a back porch or fenced in area) for addedsecurity. In an exemplary embodiment, an aerial robot is operable toguide or direct a delivery person to a delivery location. An aerialrobot is operable to be used for monitoring a delivery location andprovides input to a geofence or MDA and provides input to the exemplaryAI EM system if someone intrudes into a geofence location. An exemplaryAI EM system is configured to direct and control a robot to investigateabnormalities in a geofenced area, MDA, or surrounding area, such aswhen a noise is detected. Likewise, an exemplary robot is be configuredto follow and record a delivery to an access point, to ensure thedelivery is made.

In one embodiment, an aerial robot is small in size, or micro-robots,having a length, width and height of no more than about 25 mm, or evenno more than about 10 mm. These micro aerial robots are inconspicuousand easy to dock around the building.

In yet another embodiment, a drone swarm is utilized to follow, track,and deter threats. A drone swarm is defined as two or more robots, suchas aerial robots, also referred to as drones, that follow a threat(e.g., an individual). In one example, a drone swarm is operable tofollow a person that has stolen a package delivered to an access point,or a storage container or that has breached a geofence area or amonitored designated are or areas (MDA) created by the AI EM device inthe view of the camera.

An exemplary AI EM device is configured to work on a networkableplatform with networked software accessible and interactive with the EMdevice and member devices running the networked software andparticipating on the networkable platform. In one embodiment, thenetworkable platform is configured for communication between said memberdevices including member devices of owners, service personnel, propertymanagement, real estate professionals, short term rentals, hotels,and/or employees. In one embodiment, the networkable platform isconfigured to provide access and logistics to access points.

The software of the AI device is operable to perform name recognition,facial recognition, or voiceprint recognition (voice identification). Inone embodiment, the software of the AI device is operable to communicatewith devices located within a premises or building including the EMdevice. The software of the AI device is further operable to enable theEM device to establish contact, record messages, or deliver a message.In one embodiment, the software of the AI device is further operable toenable the EM device to establish contact, record messages, or deliver amessage using the name and/or facial recognition. When the EM device isactivated by motion, the detection of a paired mobile device, thepresentation of a virtual key, or the owner/administrator user device,the EM device is configured to cause the programming instructions of thesoftware to activate or turn on the AI EM system. In one embodiment, thedisclosed AI EM system is that the AI device is configured to cause theEM device to detect the person and interpret voice detected by themicrophone from the person, i.e., perform voice recognition of theword(s) and/or phrase(s) spoke by the person. The AI device is operableto provide an intelligence response, including but not limited to,logistics, a greeting, a command, directions, a message, an inquire, arecording request, an alarm to the speaker, the like, and/orcombinations thereof. The wireless communication device is preferablyoperable to establish the identity of the person or the user device oncepaired. In one embodiment, after pairing, the AI device is configured torecognize the user device and provide a customized greeting, specificinstructions, access, or actions for the associated device.Alternatively, the AI EM device is operable to identify a voice andprovide a customized greeting, specific instructions, access, or actionsfor the person associated with the voice.

The AI device is further operable to require authentication of an imageor mobile device that is active and unlocked, the device must be active,or combinations thereof, prior to providing the customized greeting, thespecific instructions, access, or the actions for the associated device.

In one embodiment, the AI device is configured to recognize thepreviously paired mobile device and a virtual key or an identificationsequence. In one embodiment, if there is not a confirmed identification,the system seeks a third-party authentication. In one embodiment, thethird-party authentication is an embedded code within the virtual key,and/or an audible or verbal response code including a word or words, asentence, a number or numbers, sounds, and/or letters. The virtual keyutilized is operable to include a humanly created mark, drawing, writtensequence of numbers, letters, abstract sketch, or picture. In oneembodiment a virtual key includes a digital photograph that anadministrator user device is configured to send to a third party forentry. For example, and not limitation, the digital photograph is fromthe administrator's library of photographs. In one embodiment, a virtualkey includes words, letters, and the like. In another embodiment, avirtual key further includes a particular motion across a touchscreen,such as the display screen of the AI EM device. For example, and notlimitation, a virtual key that is from an administrator's personal photolibrary or stored on the administrator's user device in their photogallery is a personalized virtual key. Also, in one embodiment, thepresent invention AI EM system is configured to create a virtual keybased on input received (e.g., from a touch screen of theadministrator's user device). Another example of a personalized virtualkey includes a specific zig-zag pattern. An application software is partof the AI EM system and is operable to create a unique personalizedvirtual key through taking a photograph or using the touchscreen to drawout a virtual key (e.g., via user input). This application or subroutineis opened when a new authorization for entry in entered into the system.The system is operable to ask for the person's name, contactinformation, time or entry, or span of time, access point to be unlockedand for any messages to be delivered to the person/entrant uponreceiving the virtual key to the AI EM device. A personalized virtualkey includes a digital file that is created on or stored on anadministrator's electronic device and therefore is more secure than avirtual key that is generic.

A virtual key is operable to be used as an electronic device or filevirtual key. In one embodiment, the virtual key is used to unlock anelectronic device or a file in an electronic device. In one embodiment,a computer is operable to require a virtual key to be shown to a camera(e.g., a camera coupled to the computer) before the computer will unlockfor use. In one embodiment, the virtual key takes the place of apassword that is typed into the computer. Passwords can be hacked andstolen, but a virtual key is much more difficult to obtain as it isconfigured on a separate electronic device or a separate physical item.Likewise, a virtual key is operable to be used to unlock a file on anelectronic device. The computer is operable to request that a virtualkey be verified by showing the virtual key to the camera of the computerbefore a file is operable to be opened. Again, this is very difficultfor a hacker to obtain.

An exemplary AI EM system requires a plurality of virtual keys to beshown or displayed prior to verification and unlocking of a lockedaccess point. For example, and not limitation, the AI EM system isconfigured to request two or more images via the user device. The AI EMsystem is configured to receive data relating to the two or more imagesvia the user device. In one embodiment, the AI EM system is furtherconfigured to determine whether the digital images, such as digitalphotographs, were presented in a specific sequence to produce thevirtual key. The AI EM system is further operable to send the digitalphotographs in a single file and/or send them as separate files forsecurity purposes. In one embodiment, a virtual key requires the AI EMsystem to receive a selection of digital images via a display screen ofthe AI EM device. The AI EM device is further operable to display aplurality of images, such as four or more images. THE AI EM device isconfigured to receive a selection of at least one of the plurality ofimages via the user device to produce the virtual key. Again, the AI EMsystem is operable to send the images to the user device so the userknows which images to select on the display screen of the AI EM device.Furthermore, the AI EM system, in one embodiment, is configured toreceive a selection of at least one digital image and/or virtual key viatouch screen 17 prior to granting entry. In one embodiment, for example,and not limitation, the AI EM system receives a selection of a pluralityof digital images to produce a virtual key and the image virtual keyrequires each image virtual key 50, 50′, 50″ to be selected in aspecific sequence, such as balloon, dog, cat. In one embodiment, aplurality of other digital images 66 or photographs are also bedisplayed on the display screen during the selection or entry of thevirtual key.

The platform, a system administrator device, or the AI EM system isoperable to automatically send an image virtual key to a user device,such as to a mobile electronic device, such as a mobile phone or a smartwearable device as described herein. The virtual key is viewable via theuser's electronic device and then selectable via the touch screen. Inanother embodiment, the AI EM system is configured to enable entry ofthe image virtual key by selection of the correct images only when theuser device is within a certain range of the EM device. Again, theimages must be selected in a specific order. The platform, the systemadministrator device, or the AI EM system is operable to send imagevirtual keys to a user device based on a predetermined time. In oneexample, the platform, the system administrator device, or the AI EMsystem sends image virtual keys to a cleaning professional's electronicdevice prior to their weekly scheduled arrival. Then, when the cleaningprofessional device is detected within range of the EM device, the EMdevice is operable to communicate with the cleaning professional'selectronic device to send the image virtual key for selection by thecleaning professional device. The user device (e.g., a smart wearabledevice) is further operable to display a plurality of digital images.The user device is operable to receive a selection of the image virtualkey via a touch screen and/or other user interfaces.

In an alternative embodiment, a virtual key includes a biometricidentifier of a user, such as a fingerprint of a user recognized by afingerprint scanner or facial features of a user recognized by facialrecognition software of the EM device or by facial recognition softwareof a platform in network communication with the EM device. The virtualkey is also operable to include a voiceprint or voice identificationcorresponding to the voice of a specific person. A database stored inthe platform stores biometric data and grants certain permissions toeach user based on the biometric data received from the user. Forexample, the AI EM system is configured to grant a user access to thegarage based on verification of the user's biometric data. The AI EMsystem is further configured to grant a user access to the entirety of ahouse based on verification of the user's biometric data. The biometrickey is also operable to include a voiceprint or voice identification ofa user as described herein.

A wireless communication component of the EM device is operable forexchanging data between the EM device and fixed and/or mobile devicesover short distances using Wi-Fi or UHF radio waves in the industrial,scientific and medical radio bands (e.g., from 2.402 GHz to 2.480 GHz),and building personal area networks (PANs) (e.g., Bluetooth® (Bluetoothtrademark owned by Bluetooth SIG, Inc. of Kirkland, Wash.)). The EMdevice is configured to work on a networkable platform with networkedsoftware accessible and interactive with any other devices running thenetworked software and participating on the networkable platform. In oneembodiment, the networkable platform is configured for use by a varietyof members including owners, service personnel, property management,real estate professionals, short term rentals, hotels, employees, thelike, etc. In one embodiment, the networkable platform is operable toprovide access and logistics to additional industries and users.

In select embodiments of the disclosed AI EM system, a transponderdevice is included. The transponder device is configured to utilize aglobal positioning system or a wireless communication to identify amobile device and begin to transmit a signal for easy identification anddetection. In select embodiments, the transponder is configured to beattached to a stationary object, a door, a room, a building box, and/ora storage container. In one embodiment, upon the EM device detecting thedevice, the programming instructions of the software is also configuredto: send out an audible noise, illuminate, provide mapping instructionsor directions to the mobile device to provide guidance in locating aspecific location of the stationary object, door, room, building box, orthe storage container via the speaker; illuminate lights on the EMdevice; provide a mapping direction on the device including: an exactlocation; a location inside a building, a building without a geoaddress, a container, a storage unit; the like; and/or combinationsthereof. As such, the transponder device is configured to take overwhere a global positioning system ends to guide the person or the deviceto a specific location inside a geofence or outside a geofence. The EMdevice is operable to utilize the global positioning system, Wi-Fi, RF,or a wireless communication to identify a mobile device previouslypaired and initiate actions including messages, access, logistics toguide the person or the device to the specific location such that thegeo position of the EM device activates various actions. When thetransponder is activated and detects the person or the device within aset range, the transponder device is further configured to emit asignal, a sound, a light, or input to the device configured to guide anddirect the person or the device to the specific location.

A camera of the EM device is operable to read a virtual key (e.g.,presented from a user device and/or a user) and upon reading the virtualkey, the EM device is further configured to unlock an access point,provide a greeting, instructions or logistics, record a message, orestablish contact with the individual requested. In select embodiments,the virtual key includes a humanly created image selected from a groupconsisting of: a humanly created photo; a humanly created picture; ahumanly created drawing; a humanly created mark; a humanly creatednumber or numbers; a humanly created letter or letters; a humanlycreated word or words; the like; and/or combinations thereof.

In select embodiments of the disclosed AI EM system, the access pointincludes a delivery storage container or mailbox. In these embodiments,the EM device is operable to lock and unlock the delivery storagecontainer or mailbox. In select embodiments, the delivery storagecontainer or mailbox include a refrigerated compartment on an inside ofthe delivery storage container or mailbox. In one embodiment, therefrigerated compartment is configured for food or other refrigerateditems. In select embodiments, the refrigerated compartment is a firstportion of the inside of the delivery storage container, and a secondportion of the inside of the delivery storage container is configuredfor parcels. In other select embodiments, the refrigerated compartmentis the entire inside of the delivery storage container. Yet in otherselect embodiments, the refrigerated compartment is the entire inside ofa first delivery storage container and a second delivery storagecontainer is configured for parcels. In other select embodiments, thedelivery storage container or mailbox includes a warmer on the inside ofthe delivery storage container or mailbox. The warmer is configured towarm the inside of the delivery storage container or mailbox. The AI EMsystem is further configured to control the delivery storage containeror mailbox with the ability to select warmer, refrigerated, parcel, or acombination thereof per section of the delivery storage container ormailbox.

In select embodiments, the delivery storage container or mailbox ispositioned just inside a door of a home and the EM system is configuredto unlock and lock the door of the home for deliveries to the deliverystorage container or mailbox. In one embodiment, the position of thedelivery storage container or mailbox is configured to prevent the needfor deliveries to be walked through the house to the kitchen. A featureof the delivery storage container or mailbox is the inclusion of anultraviolet light on an inside. The ultraviolet light is configured forsanitizing the inside of the delivery storage container or mailboxincluding sanitizing any parcels placed in the inside of the deliverystorage container or mailbox.

In select embodiments, the delivery storage container or mailbox includethe EM device on an outside of the delivery storage container ormailbox. The EM device is configured in a separate location from thestorage container, however.

The AI EM system is further configured to produce an alarm including analarm noise and/or light. The alarm utilizes a light and/or speaker thatis part of the EM device and/or the storage container. In selectembodiments, the delivery storage container and/or the EM deviceproduces an alarm when the storage container is jostled or openedwithout authorization. A closure sensor is operable to detect theposition of the closure to the storage container and when the closure isopened without authorization, an alarm is initiated. In anotherembodiment, the storage container further includes a global positioningdevice, that is used by the AI EM system to monitor the location of thestorage container. If the storage container is moved beyond a thresholddistance from a set location, such as beyond the perimeter of anadministrator's property, the AI EM system is operable to initiate analarm. In this situation, the alarm is initiated on the storagecontainer, in an effort to prevent the storage container from beingstolen and an alert notification is sent to a user device correspondingto an administrator and/or authorities, such as the police. An exemplarystorage container includes an accelerometer that detects if motion ofthe storage container. Again, if the storage container is jostled, suchas when trying to be opened without authorization, an alarm is initiatedto deter the thief. By way of example and not limitation, an alarmincludes a light and/or sound emitted from the storage container and/orEM device and an alert is sent to a user device corresponding to anadministrator when an alarm is activated.

A light on a delivery storage container is configured for illuminatingthe delivery storage container and area around the delivery storagecontainer or mailbox. In one embodiment, a speaker on a delivery storagecontainer is configured to communicate with a delivery person andprovide logistic instructions regarding a delivery, such as whichcompartment to deliver a package into. In other select embodiments, thedelivery storage container or mailbox includes a power source beingselected from a group consisting of a wired power source; abattery-operated power source; a solar power source; the like; and/or acombination thereof. In other select embodiments, the delivery storagecontainer or mailbox includes a warmer configured to heat the inside ofthe delivery storage container or mailbox. In other select embodiments,the delivery storage container or mailbox includes a wireless connectionconfigured to control the delivery storage device or mailbox via amobile device or a personal computer, including being configured tocontrol the locking and unlocking of the delivery storage container ormailbox, controlling the temperature inside of the delivery storagecontainer or mailbox via the warmer or the refrigerated compartment, theultraviolet light inside of the delivery storage container or mailbox,or combinations thereof.

Upon reading a virtual key, the EM device is configured to activate adrone to retrieve deliveries from a specific location. The EM device isalso configured to act as a receptionist device for corporate,commercial, institutional or industrial applications. The receptionistdevice is configured to provide custom messages for each occupant andfor receiving and recording custom messages for each user. Thereceptionist device is operable to forward information wirelessly toeach occupant, or information is retrieved from the EM device bydisplaying a virtual key assigned to each occupant. The EM system isoperable to include a plurality of EM devices configured as receptionistdevices for corporate, commercial, institutional, or industrialapplications. In one embodiment, each of the plurality of EM devices isoperable to interact and communicate with each other, whereby theplurality of EM devices is configured to relay messages to the occupant.

A microphone of the EM device is operable to identify an audible keyfrom the person or the device. Upon identifying the audible key via themicrophone, the EM device is operable to unlock an access point and/orprovide a greeting, information, or logistics. In select embodiments,the audible key includes a word, words, a sentence, and/or a numberidentified via voice recognition or audio recognition, a sound orsounds, or a voiceprint identification (voice identification) of aperson, wherein the microphone is configured to match the audible keywith the person or device. In select embodiments, the EM device isconfigured to assign audible keys to a variety of users, whereby the EMdevice is further configured to provide access or information to each ofthe variety of users. In other select embodiments, the EM device isconfigured to maintain a record of each of the variety of users. Yet inother select embodiments, the EM device is configured to record audiblemessages.

Advantageously, the AI EM system is configured to record data, such asinteractions with the system including, but not limited to, audiorecordings, video recordings, dates, times, third person identification,such as electronic address, dates and/or times of entry, what accesspoint was locked or unlocked, dates and times of system breaches, suchas a lock being opened without access, or a storage container beingmoved. A sensor is operable to monitor the lock status of a lock on anaccess point, including a lock on a storage container for delivery. Inaddition, in one embodiment, a storage container includes a motionsensor or a GPS as described herein and the system is operable to recordif the storage container is tampered with or record a location if it isstolen and moved to a new location. The AI EM system is further operableto keep records of the virtual keys used for entry. This recorded datais stored and secured on a database or computer storage drive such thatonly a system administrator is granted access to this recorded data.

In a further embodiment, a software platform of the AI EM system isoperable to analyze images, video, audio, or any other content providedby the AI EM system to provide data such as foot traffic analytics,length of visits for customers, an amount of time spend browsingparticular items or sections of items, and wait times for customers. TheAI EM system is operable to create customer profiles based on thisinformation and retrieve information from the customer profile for useat a later date, such as when a customer returns and is recognized bythe AI EM system via facial recognition, scanning a code or image by theAI entry device, audial identification by the customer of theiridentity, or any other method described herein.

In another embodiment, the platform of the present invention providesfor automated follow ups with customers or visitors to a retail space oroffice space. By way of example, the software platform of the AI EMsystem collects contact information associated with visitors such as anemail address, phone number, or social profile account through manualentry from a device in network connection with the AI EM system orthrough identification of this contact information through web crawlingor internet searches based on a customer's name, facial recognition, orany other method of identification of a person described herein. In oneembodiment, information is extracted from a social media profile such asLINKEDIN, FACEBOOK, INSTAGRAM, TWITTER, or any other website orplatform. For example, the information includes a job title, a companyof employment, and/or hobbies and interests from a social media profile.By way of example, visitors to an office receive an email message (e.g.,via the visitor's mobile device) including a survey, follow up onservices provided, or solicitation from the business associated with theoffice 1 week after their visit to the office.

In another aspect, the present invention includes an AI EM system with aplurality of EM devices. Each of the plurality of EM devices areoperable to be the disclosed EM device in any of the various embodimentsand/or combination of embodiments shown and/or described herein. Assuch, in general, each of the EM devices are configured for use with anAI device in communication with the EM device including a processor witha non-transitory computer readable storage medium comprising softwarehaving program instructions configured for providing AI to the EMdevice. A network platform in communication with each of the pluralityof EM devices is also included. The network platform is configured toallow each of the plurality of EM devices to communication with eachother.

In select embodiments of the disclosed AI EM system with a plurality ofEM devices, the plurality of EM devices are installed in a neighborhood.In one embodiment, each of the plurality of EM devices is configured tocommunicate if a burglary occurs in any other house or activate and panthe streets to record all traffic activity.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to limiting of the disclosure. Asused herein, the term “and/or” includes any and all combinations of oneor more of the associated listed items. As used herein, the singularforms “a”, “an” and “the” are intended to include the plural forms aswell as the singular forms, unless the contest clearly indicatesotherwise. It will be further understood that the terms “compromises”and/or “comprising” when used in this specification, specify thepresence of stated features, steps, operations, elements and/orcomponents, but do not preclude the presence of addition of one or moreother features, steps, operations, elements, components and/or groupsthereof.

Unless otherwise defined, all terms (including technical and scientificterms) used herein have the same meaning as commonly understood by onehaving ordinary skill in the art to which this disclosure belongs. Itwill be further understood that terms, such as those defined in commonlyused dictionaries, should be interpreted as having a meaning that isconsistent with their meaning in the context of the relevant art and thepresent disclosure and will not be interpreted in an idealized or overlyformal sense unless expressly so defined herein.

A storage container, as used herein, is a receptable configured forreceiving a package and includes a lock that is controlled by the AI EMsystem, and is further configured to be a portable storage containerthat is operable to be moved to a desired location or a storagecontainer that is fixed in a location, such as a mailbox. In oneembodiment, a storage container is an example of an access point that islocked and unlocked by the AI EM system.

A smart-home system, as used herein, is a system that utilizeselectronic locks to lock and unlock entry ways, such as doors to abuilding such as a home or place of business from a remote source, suchas a mobile device or mobile phone or a smart wearable device asdescribed herein. A smart-home system, in one embodiment, furtherincludes subsystems to turn on or off lights, set the temperature on ahome heating or air conditioning system and the like.

Referring now to FIGS. 1-7, in describing the exemplary embodiments ofthe present disclosure, specific terminology is employed for the sake ofclarity. The present disclosure, however, is not intended to be limitedto the specific terminology so selected, and it is to be understood thateach specific element includes all technical equivalents that operate ina similar manner to accomplish similar functions. Embodiments of theclaims are operable to be embodied in many different forms and shouldnot be construed to be limited to the embodiments set forth herein. Theexamples set forth herein are non-limiting examples and are merelyexamples among other possible examples.

Referring now to FIGS. 1-7, in a preferred embodiment, the presentinvention overcomes the above-mentioned disadvantages and meets therecognized need for such an apparatus or method by providing of asmart-home system 11 having an AI EM device 10 for an EM system 100.Advantageously, the smart-home system 11 is operable to include aplurality of IoT or smart home devices which are in networkcommunication with the AI EM device 10 or operable for one-waycommunication or two-way communication with the AI EM device 10 or aplatform connected to the AI EM device 10. In one example, the AI EMdevice 10 is operable to send a command to one or more IoT devices basedon the AI EM device 10 scanning a code or an image, recognizing a userbased on audio or video input, or any other method described herein. Inone embodiment, the one or more IoT devices communicate over an industrystandard protocol, such as MATTER provided by the CONNECTIVITY STANDARDSALLIANCE, which enables devices provided by different companies tocommunicate using the same protocols. In one embodiment, thecommunication protocol includes an Internet Protocol (IP) basedcommunication protocol. In another embodiment, the software platformprovides an indication of the interoperability of IoT devices with thedevices already registered with the software platform. In oneembodiment, this indication of interoperability is provided via asoftware such as “The GearBrain” IoT Configurator.

In an exemplary embodiment, the AI EM device 10 is operable tocommunicate with cameras to capture imagery data and track a personaround a property. For example, a camera detects a guest or intruderusing image or audio recognition and alerts the AI EM device 10regarding the presence of the guest or intruder. The AI EM device 10 isoperable to send an alert to a device based on this detection or isoperable to command other cameras, robots, or IoT devices to track,record, communicate with, or otherwise engage with the guest orintruder. In one embodiment, a prerecorded or real-time or nearreal-time recording (e.g., received from a user device associated withthe AI EM device 10) is sent from the AI EM device 10 to other cameras,robots, or IoT devices for playback in real-time or near real-time. Therecording is operable to be played aloud by multiple devicessimultaneously or sequentially in one embodiment. Sequential playing ofthis recording is determined by which device(s) the intruder is closestto, with the devices closest to the intruder playing the recording firstand devices further away from the intruder or guest playing the devicesnext. These recordings are operable to be repeated by these devicesuntil an intruder or guest is no longer identified as being on theproperty or until a predetermined threshold of number of playbacks isreached, which causes an alert to be sent to a user device associatedwith the AI EM device 10 or to the authorities.

In one embodiment, the AI EM device 10 is operable to command andcontrol these cameras based on the detection of an intruder, a guest, orany other event. For example, a camera sends an image, a video, audio,or a notification of movement detection to the AI EM device 10, and theAI EM device 10 sends the image, the video, or the audio to the softwareplatform, and the software platform uses an AI or machine learning (ML)algorithm or other algorithm, which in one embodiment includes facialrecognition or action recognition to identify an intruder or a guest.The software platform then sends a command to the AI EM device 10 tocommand the camera to zoom in on the intruder or guest or track theintruder or guest. In one embodiment, an alert is sent to a user deviceassociated with the AI EM device 10 that a certain person is on theproperty along with an identification of where that person is on theproperty (e.g., Karen is in your driveway or Roy is in your backyard).Alternatively, the AI EM device 10 commands another IoT device or acamera to zoom in on, track, or otherwise engage with the guest orintruder. In one embodiment, the AI EM device 10 is operable to analyzethe audio, video, or image using an algorithm such as an artificialintelligence algorithm or machine learning algorithm without sending theaudio, video, or image to a software platform. Alternatively, a localcomputing device such as an edge device is operable to analyze theaudio, video, or image. In one embodiment, upon detection of an intruderor guest, the EM device instructs one or more cameras to scan thepremises for a vehicle and capture images of a vehicle. In oneembodiment, cameras include all functionality recited with respect torobots below, including weapon detection, action detection, etc.

In one embodiment, one or more cameras in combination with the AI EMdevice 10 are operable to detect a delivery of a package, such as dronedelivery of a package and provide an alert to a user device associatedwith the AI EM device 10. The one or more cameras are operable tocapture images, video, or audio, and recognize delivery of a package viaa shape of a package or actions associated with delivering the package,such as a drone landing and taking off or a delivery person performingthe action of delivering a package. This recognition occurs throughsoftware of the cameras, software of the AI EM device 10 upon images,video, or audio being sent to the AI EM device 10, or the softwareplatform upon images, video, or audio being sent to the platform. Thisis particularly useful in situations when the delivery location is outof a line of sight of the AI EM device 10.

In one embodiment, an AI EM device 10 includes camera 22, microphone 24,motion detector 14, speaker 18, and housing 12. In one embodiment, thehousing 12 has oval shape 16 with substantially open middle 20.Substantially open middle 20 includes a housing protrusion portion 26configured to house camera 22, microphone 24, motion detector 14, andspeaker 18. Shapes other than oval shapes (e.g., rectangular, circular,square, etc.) are compatible with the present invention.

In another embodiment, plurality of lights 28 are included with AI EMdevice 10. Plurality of lights 28 are positioned around periphery 30 ofoval shape 16 of housing 12. In select embodiments, each of theplurality of lights 28 include a light emitting diode 32, also known asLEDs. One feature is that each of the light emitting diodes 32 of theplurality of lights 28 are configured to light up based on soundsemitted from speaker 18. With this configuration, one feature of theinvention includes the plurality of lights 28 are configured to mimic AIEM device 10 as if it were talking. The plurality of lights 28 areconfigured to indicate an alarm has been triggered by flashing.Additionally, or alternatively, the plurality of lights 28 areconfigured to indicate a status of the AI EM device 10. As shown in theFigures, and best shown in FIGS. 6 and 7, in select embodiments of thedisclosed AI EM device 10, LED lens 34 are included. LED lens 34 areoperable to cover and protect the plurality of lights 28, like lightemitting diodes 32. LED lens 34 include an oval shape 16 of housing 12.Alternative LED lens shapes are compatible with the present invention.In alternative embodiments, the LED lens includes a shape similar tothat of the housing. For example, and not limitation, the LED lens iscircular when the housing is circular.

In one embodiment, mounting bracket 36 is included with AI EM device 10.Mounting bracket 36 is configured for mounting housing 12 of AI EMdevice 10 to surface 38, as shown in FIG. 1. Mounting bracket 36includes the oval shape 16 of housing 12. Alternative mounting bracketshapes are compatible with the present invention. In one embodiment, ashape of the mounting bracket matches a shape of the housing. In oneexample, the mounting bracket is rectangular for a rectangular housing.

In another embodiment, power source 40 is included with AI EM device 10.Power source 40 includes, but is not limited to, a hardwired powersource (as shown in the Figures), a battery powered power source, asolar power source, the like, or combinations thereof.

In yet another embodiment, wireless communication device 42 is includedwith AI EM device 10. Wireless communication device 42 is housed insideof housing protrusion portion 26 of housing 12 of AI EM device 10.Wireless communication device 42 is operable to communicate with EMsystem 100, like a networked software platform, or the like, or other AIEM devices 10 via a wireless communication. The wireless communicationof wireless communication device 42 includes, but is not limited to,Wi-Fi; UHF radio waves in the industrial, scientific and medical radiobands, from 2.402 GHz to 2.480 GHz, and building personal area networks(PANs), also known as Bluetooth® (Bluetooth trademark owned by BluetoothSIG, Inc. of Kirkland, Wash.); the like; or combinations thereof.

One feature of the disclosed AI EM device 10 is that speaker 18 isoperable to be positioned in housing protrusion portion 26 and orientedtoward substantially open middle 20. This orientation of speaker 18allows for projecting sound from speaker 18 out of AI EM device 10.

The AI EM device 10 includes at least one processor, at least onememory, and a non-transitory computer readable storage medium includingsoftware. The software includes program instructions configured forproviding artificial intelligence to AI EM device 10. In selectembodiments, the software is operable for development of intelligencewithin AI EM device 10, including, but not limited to, speechrecognition, problem-solving, learning, planning, the like, combinationsthereof, etc. In select embodiments of AI EM device 10, the processorincludes a networked processor. The networked processor is connected toAI EM device 10 via a wireless communication to wireless communicationdevice 42 on AI EM device 10. In other select embodiments, the processorincludes a chipped processor. The chipped processor is housed inside ofAI EM device 10, including, but not limited to, inside of housingprotrusion portion 26 of housing 12 of AI EM device 10.

In another aspect, the present invention includes an AI EM system 100.The AI EM system 100 includes, but is not limited to, utilizing thedisclosed AI EM device 10 in any of the various embodiments and/orcombination of embodiments shown and/or described herein. As such, ingeneral, the disclosed AI EM system 100 includes the disclosed AI EMdevice 10 with camera 22, microphone 24, motion detector 14, speaker 18,wireless communication device 42, the like, and/or combinations thereof.In addition, AI EM system 100 includes an AI device. The AI device is incommunication with AI EM device 10. The AI device includes a processorwith a non-transitory computer readable storage medium having softwarewith program instructions configured for providing artificialintelligence to the AI EM device 10.

The AI EM device system 100 and AI EM device 10 is operable to unlock anaccess point including, but not limited to a door or gate or a storagecontainer. As shown in FIG. 1, the AI EM device 10 is configured on adwelling 91, an exemplary access point 90, and is configured to unlockthe door-lock 94 on the door 92 of the dwelling. Also, the AI EM device10 is further configured to unlock the lock 72 on the storage container70, another access point 90′, to enable retrieval of items therein ordelivery of item into the storage container, or a compartment thereof.

As shown in FIG. 1, an exemplary AI EM system includes a robot 110, suchas an aerial robot 111, that is operable to use a package manipulator114 to pick up and release packages for movement of a package from afirst location to a secondary location. The aerial robot is configuredto fly and is commonly referred to as a drone. The aerial robot furtherincludes a camera 112 for taking digital photographs or video and isoperable to transfer the photographs and video to the exemplary AI EMsystem. The aerial robot is operable to be used for monitoring andsurveillance of a delivery area and is further operable to create andmonitor a geofence and/or MDA after a package has been delivered. Aftera package has been delivered, the aerial robot is operable to monitor anarea and take and send images to a user device of administrator ofsomeone entering a geofence area and/or an MDA. A robot speaker 116 isoperable to be used to communicate with a third party, such as adelivery person, to provide logistic instructions for package delivery.A speaker is further operable to be used as an audible alarm. Amicrophone 117 is operable to receive communication from a third partythat is provided to an administrator of the AI EM system, for example.An exemplary robot has a wireless signal transceiver 118 forcommunication with the AI EM system 100 such as the AI EM device 10. Therobot is operable to send photographs, video, audio recordings and thelike to the AI EM system which is operable to transfer the photographs,video, audio recordings, and the like to a user device of anadministrator or a third party. A robot is further operable tocommunicate directly with a user device of an administrator or authorityusing the wireless signal transceiver 118. In one embodiment, the robotincludes a controller 113 that incorporates artificial intelligence tocontrol functions of the robot. A robot or drone is also operable to becontrolled independently via the AI EM device or another deviceconnected to the software platform of the present invention. Theartificial intelligence of the robot is operable to interface with theartificial intelligence of the AI EM device, for example. Robot 110,like a drone or a land robot, is configured to be activated by AI EMsystem to investigate any suspicious activity, or threats, determined bythe AI device. Once activated, robot 110, like a drone, is configured toleave its docking station and investigate such suspicious activitiesand/or threats. Whereby, robot 110 or drone is operable to relayinformation, like images, back to the system, issue a command to thesuspicious activity or threat, and follow or track the individuals orvehicles, like by transmitting images of the vehicle, license plate,color, make, etc., as well as providing locational information ordirection information of such suspicions activities and/or threats. Therobot 110 or drone is operable to recognize the license plate charactersand send these characters to the platform and/or the law enforcementdevice in one embodiment. In one embodiment, the robot 110, drone, oranother device connected to the platform of the present invention suchas a camera includes a license plate reader such as an automated licenseplate reader. One example of an automated license plate reader isdescribed in U.S. Pat. No. 10,719,743, which is incorporated herein byreference in its entirety. Alternatively, recognition of the licenseplate characters is performed via software on the platform according toany method known in the art, including but not limited to opticalcharacter recognition. In one embodiment, the images, license platecharacters, locational information, and/or directional information issent to a platform of the present invention. Additionally, the images,license plate characters, locational information, and/or directionalinformation is operable to be sent directly to a law enforcement device,either through the platform or by the robot 110 or drone directly. Assuch, robot 110, such as a drone, is operable to act as a deterrent forsuspicious activities or threats. In one embodiment, a robot includes alight 119 that is activated when a motion or sound above a thresholdvalue is detected. The robot speaker 116 is further operable to emit analarm and the robot light 119 is operable to flash a color when a threatis detected, such as a person that is not identified by the AI EM systemor someone carrying a weapon, such as a gun or knife.

An exemplary robot 110, such as the aerial robot 111, is operable toreturn to a docking station 140 wherein the robot is operable to monitoran area with the camera 112 and microphone 117 and recharge. As shown,aerial robot 111′ is docked to the docking station 140 and is beingcharged, wherein a rechargeable battery 115 is receiving electricalpower. This charging electrical power is operable to come from thedwelling, or from a renewable power source 150, such as a solar panel152 as shown.

An AI EM system 100 includes or is operable to interface with a storagecontainer 70 to lock and unlock said storage container for delivery andsafe storage of items therein. A storage container 70, including amailbox 71, collectively referred to herein as a storage container,further includes a lock 72 and a wireless signal transceiver 78 forreceiving a wireless signal from the wireless communication device 42 ofthe AI EM device 10. An exemplary storage container includes a pluralityof compartments that include separate locks 72, 72′ for separateclosures 79, 79′ and features for retaining items therein, such as aheating device 80 or refrigeration device 86. As shown, a firstcompartment 74 includes a heating device 80 and a second compartment 76,separated from the first compartment by a divider 75, has arefrigeration device 86. Grocery items that need to be refrigerated aredelivered into the refrigerated compartment and in cold climates,medications and other items are stored in the heated compartment toprevent freezing.

An AI EM system 100, as shown in FIG. 1, includes a number of controlinterfaces, such as the AI EM device 10, a mobile electronic device 60,such as a mobile phone, a smart wearable device, an electronic wearabledevice, tablet computer, or a control panel 210, which is configuredwithin the dwelling 91 or building 93. The control interfaces areoperable to set up specific routines or directions for the system afterreceiving input (e.g., from a user device). The routines or directionsinclude setting a start and end time for a particular surveillanceprotocol including surveillance flight paths of aerial robots, forexample. The AI EM device is configured to receive a selection of astart time of 10 PM and an end time of 8:00 AM for aerial robots flysurveillance flight paths or routes about the building from the userdevice. In one embodiment, the AI EM device, or a computing device innetwork communication with the AI EM device or platform, instructs arobot such as a drone or a land robot to create a defined patrol path,such as a flight path or a land path. In one embodiment, these paths aredefined and implemented using the Global Positioning System (GPS).Alternatively, these paths are defined and implemented using any methodof geolocation known in the art or described herein, such as geofencing.In one embodiment, a robot or drone is operable to survey a designatedarea using GPS or any other method of geolocation in the art to generatepatrol paths such as flight paths or land paths for other robots ordrones. By way of example and not limitation, an aerial robot isoperable to instruct a land robot to follow a certain path based on datacollected by the aerial robot, such as images, audio, or video. In oneembodiment, the aerial robot is operable to perform image or audiorecognition or send the images, audio, or video to the platform or theAI EM device to perform image or audio recognition. In one embodiment, arobot instructs other robots to follow paths independent of the robot orsimultaneously with the robot. Programming of patrol paths includesprogramming periodic surveillance or triggered surveillance, such assurveillance triggered by image or audio recognition. The presentinvention is operable to use a combination of technology to enablemapping of areas and implementation of patrol routes. For example, LightDetection and Ranging (LIDAR) and/or Airborne Laser Swath Mapping (ALSM)are operable to be used in locations where density prevents GPS mapping.The present invention also is configured to receive a selection ofdrones or robots to follow patrol paths created by a robot or dronethrough the platform or the AI EM device of the present invention.

A mobile device connected to the software platform of the presentinvention is also operable to program, change, or alter a response of adrone, robot, or other device upon detection of an object, person,event, or threat in real time or near real time. In one embodiment, themobile device is operable to program, change, or alter the response viathe AI EM device.

The mobile electronic device 60 and or the control panel is configuredto view images taken by the AI EM device 10 and/or a robot camera 112.Any of these control interfaces include artificial intelligence and areoperable to communicate through the AI EM device or directly withcomponents of the system, such as the robots and/or the storagecontainer and/or any other access point, such as the front door tooperate a smart lock to open or lock.

In one embodiment, an AI EM system 100 is configured to unlock the lock72 of the storage container 70, or a compartment thereof, when a virtualkey is verified by the AI EM device 10. As described herein, a virtualkey includes an image that is read by camera 22 of the AI EM device 10,or an audible virtual key that is received by the microphone 24 of theAI EM device 10. An image virtual key 50, includes but is not limitedto, a digital image that is sent by an AI EM system administrator, suchas through an APP or as an attachment in a text message to a thirdparty's mobile electronic device. As shown in FIG. 8, a user device ofadministrator is configured to send a digital photograph of a puppy to athird party's mobile electronic device 60 which was received by awireless communication device 62, such as a wireless signal transceiver.This image is shown on the display screen 65 to the camera 22 of the AIEM device 10 to gain access to an access point, wherein the door-lock 94of the door to the dwelling is unlocked, or the lock 72 on the storagecontainer 70 is unlocked, for example. In addition, the virtual keyfurther includes an audible key that is played by the mobile devicethrough the speaker 68. The microphone on the AI EM device is operableto receive the audible key in order to verify it. In an exemplaryembodiment, both an image virtual key and an audible key are requiredfor verification before an access point is unlocked. The mobileelectronic device 60 further includes a microphone 64 for providingverbal input that is delivered to the AI EM system.

In one embodiment, an AI EM system 100 is configured to unlock the lock72 of the storage container 70, or a compartment thereof, when anon-fungible token (NFT) or an image corresponding to a NFT is read bythe AI EM device 10 and verified by the software platform.Alternatively, the NFT or image corresponding to the NFT is read by theAI EM device 10 and verified by the AI EM device 10 via a local databasestored on the AI EM device 10. In another embodiment the NFT or imagecorresponding to the NFT is verified using an edge device or otherdevice connected to the AI EM device 10. A NFT is a unique piece of datathat is stored on a digital ledger and that can thus be used torepresent a physical and/or a digital asset, e.g., in a transaction, inan inventory. In one embodiment, the NFT or the image associated withthe NFT includes a virtual key. Because an NFT is unique, it certifiesthe identity and uniqueness of the associated asset. The token itselfconsists in one embodiment of cryptographic hashes of a chain of datablocks. The token is non-fungible in that a first token is not directlyinterchangeable with a second token; rather, the value of the firsttoken and the value of the second token are determined in terms of afungible unit (e.g., a cryptocurrency) in one embodiment. In oneembodiment, the platform provides for creating an NFT from an image in aminting process. A NFT is operable to be minted from any image describedherein. In order to mint an NFT, a user account is connected to adigital wallet. The digital wallet is in one embodiment a third-partydigital wallet (e.g., METAMASK, TRUST WALLET, COINBASE) that isintegrated into and/or accessible by the software platform of thepresent invention. Alternatively, the digital wallet is created andhosted by the software platform of the present invention. When the useraccount is connected to the digital wallet, the user account is operableto upload the image, e.g., as a file. The user account is operable toedit the image and/or descriptive data such as metadata regarding theimage. The user account is also operable in one embodiment to edit theparameters of the image and/or its associated NFT, including but notlimited to a scarcity, a uniqueness, a number of copies, anindivisibility, ownership data, copyright rules, a transparency, aninteroperability, identification data, certification data, and/or atleast one token standard for creating NFTs. In one embodiment, theplatform is operable to support all ETHEREUM Request for Comment (ERC)standards as described by the ETHEREUM Improvement Proposals (EIP). Forexample, the platform is operable to support EIP-721: ERC-721Non-Fungible Token Standard, which was written by Entriken, et al., andpublished Jan. 24, 2018 and which is incorporated herein by reference inits entirety. Tokenization standards for blockchain platforms other thanETHEREUM are also compatible with the present invention. In oneembodiment, the platform supports fractional NFTs (f-NFTs), wherein theplatform is operable to split the non-fungible token such that a useraccount is operable to own a fraction of the non-fungible token and itscorresponding asset. Minting the NFT means that the token is stored onthe distributed ledger (e.g., the blockchain) and is thereforeimmutable. The image is mapped to the token, and the token is stored inthe digital wallet associated with the user account. In one embodiment,the token includes a cryptographic hash of data corresponding to theimage. The image itself is preferably not stored in the digital walletin order to allow for more efficient use of space in the digital wallet.In one embodiment, the platform of the present invention deploys atleast one smart contract to handle minting of the NFT. In oneembodiment, the parameters related to the NFT are accessible via thedigital inventory and/or the digital gallery.

In one embodiment, a user account includes a media wallet. The mediawallet is operable to store the NFT in a separate location from thedigital wallet and is also stored on the blockchain. In one embodiment,the media wallet is operable to log media consumption data wherein themedia consumption data includes views, shares, screenshots (includingscreen captures and/or screen recordings), comments, image data, videodata, audio data, user data about a user account accessing the NFT,and/or web analytics related to the NFT. In one embodiment, the mediawallet is further operable to manage access permissions to NFTs. In oneembodiment, the access permissions are managed with at least one smartcontract. The media wallet and the digital wallet are operable to be incommunication with each other wherein the media wallet is operable tofacilitate transactions of NFTs by accessing the digital wallet in orderto send and/or receive fungible tokens in exchange for an NFT.

In one embodiment, the platform is operable to create an NFT in anautomated manner. The platform is operable to recognize images, videos,and/or audio samples of value, save a piece of digital media based onthe images, video, and/or audio samples of value, and tokenize the pieceof digital media by minting an NFT and attaching the NFT to the piece ofdigital media. In one embodiment, the platform is operable to recognizethe value of the piece of digital media by identifying at least oneperson, event, and/or context in the piece of digital media. Theplatform is then operable to create the NFT, set the parameters of theNFT and, in one embodiment, offer the NFT for sale in a marketplace.This embodiment is useful in situations where the NFT provides for entryto a commercial establishment, such as an exclusive club. The softwareplatform of the present invention is operable to provide a marketplacefor NFTs for commercial establishments. In another embodiment, thesoftware platform is operable to make an NFT non-transferable, such asfor an NFT used to obtain access to a family dwelling. Revocation of theability of a NFT to unlock an access point via an AI EM device is alsooperable to be performed via the platform. Because every NFT isinherently unique, this advantageously provides for access of a specificaccount associated with the NFT to be restricted or prohibited whilestill providing for other accounts associated with different NFTs toaccess the entry point.

In another embodiment, each time an NFT is used to access an entrypoint, the entry is recorded on a blockchain or other distributedledger. Distributed ledger technology refers to an infrastructure ofreplicated, shared, and synchronized digital data that is decentralizedand distributed across a plurality of machines, or nodes. The nodesinclude but are not limited to a mobile device, a computer, a server,and/or any combination thereof. Data is replicated and synchronizedacross a network of nodes such that each node has a complete copy of thedistributed ledger. The replication and synchronization of data across adistributed set of devices provides increased transparency overtraditional data storage systems, as multiple devices have access to thesame set of records and/or database. Additionally, the use ofdistributed ledgers eliminates the need for third party and/oradministrative authorities because each of the nodes in the network isoperable to receive, validate, and store additional data, thus creatinga truly decentralized system. Eliminating the third party and/oradministrative authorities saves time and cost. A decentralized databaseis also more secure than traditional databases, which are stored on asingle device and/or server because the decentralized data is replicatedand spread out over both physical and digital space to segregated andindependent nodes, making it more difficult to attack and/or irreparablytamper with the data. Tampering with the data at one location does notautomatically affect the identical data stored at other nodes, thusproviding greater data security.

In addition to the decentralized storage of the distributed ledger,which requires a plurality of nodes, the distributed ledger has furtheradvantages in the way that data is received, validated, communicated,and added to the ledger. When new data is added to the distributedledger, it must be validated by a portion of the nodes (e.g., 51%)involved in maintaining the ledger in a process called consensus. Proofof work, proof of stake, delegated proof of stake, proof of space, proofof capacity, proof of activity, proof of elapsed time, and/or proof ofauthority consensus are all compatible with the present invention, asare other forms of consensus known in the art. In one embodiment, thepresent invention uses fault-tolerant consensus systems. Each node inthe system is operable to participate in consensus, e.g., by performingat least one calculation, performing at least one function, allocatingcompute resources, allocating at least one token, and/or storing data.It is necessary for a portion of the nodes in the system (e.g., 51% ofthe nodes) to participate in consensus in order for new data to be addedto the distributed ledger. Advantageously, requiring that the portion ofthe nodes participate in consensus while all nodes are operable toparticipate in consensus means that authority to modify the ledger isnot allocated to one node or even a group of nodes but rather is equallydistributed across all of the nodes in the system. In one embodiment, anode that participates in consensus is rewarded, e.g., with a digitaltoken, in a process called mining.

The blockchain is a commonly used implementation of a distributed ledgerand was described in Satoshi Nakamoto's whitepaper Bitcoin: APeer-to-Peer Electronic Cash System, which was published in October 2008and which is incorporated herein by reference in its entirety. In theblockchain, additional data is added to the ledger in the form of ablock. Each block is linked to its preceding block with a cryptographichash, which is a one-way mapping function of the data in the precedingblock that cannot practically be computed in reverse. In one embodiment,a timestamp is also included in the hash. The computation of thecryptographic hash based on data in a preceding block is acomputationally intensive task that could not practically be conductedas a mental process. The use of cryptographic hashes means that eachblock is sequentially related to the block before it and the block afterit, making the chain as a whole immutable. Data in a block in apreferred embodiment cannot be retroactively altered after it is addedto the chain because doing so changes the associated hash, which affectsall subsequent blocks in the chain and which breaks the mapping of thepreceding block. The blockchain is an improvement on existing methods ofdata storage because it connects blocks of data in an immutable fashion.Additionally, the blockchain is then replicated and synchronized acrossall nodes in the system, ensuring a distributed ledger. Any attemptedchanges to the blockchain are propagated across a decentralized network,which increases the responsiveness of the system to detect and eliminatefraudulent behavior compared to non-distributed data storage systems.The blockchain and the distributed ledger solve problems inherent tocomputer networking technology by providing a secure and decentralizedway of storing data that is immutable and has high fault tolerance. Thedistributed ledger stores digital data and is thus inextricably tied tocomputer technology. Additional information about the blockchain isincluded in The Business of Blockchain by William Mougavar published inApril 2016, which is incorporated herein by reference in its entirety.

In one embodiment, the data added to the distributed ledger of thepresent invention include digital signatures. A digital signature linksa piece of data (e.g., a block) to a digital identity (e.g., a useraccount). In one embodiment, the digital signature is created using acryptographic hash and at least one private key for a user. The contentof the piece of data is used to produce a cryptographic hash. Thecryptographic hash and the at least one private key are used to createthe digital signature using a signature algorithm. The digital signatureis only operable to be created using a private key. However, the digitalsignature is operable to be decoded and/or verified using a public keyalso corresponding to the user. The separation of public keys andprivate keys means that external parties can verify a digital signatureof a user using a public key but cannot replicate the digital signaturesince they do not have a private key. Digital signatures are not merelyelectronic analogs of traditional physical signatures. Physicalsignatures are easily accessible and easily replicable by hand. Inaddition, there is no standard algorithm to verify a physical signatureexcept comparing a first signature with a second signature from the sameperson via visual inspection, which is not always possible. In oneembodiment, the digital signatures are created using the data that isbeing linked to the digital identity whereas physical signatures areonly related to the identity of the signer and are agnostic of what isbeing signed. Furthermore, digital signatures are transformed into acryptographic hash using a private key, which is a proof of identity ofwhich there is no physical or pre-electronic analog. Digital signatures,and cryptographic hashes in general, are of sufficient data size andcomplexity to not be understood by human mental work, let alone verifiedthrough the use of keys and corresponding algorithms by human mentalwork. Therefore, creating, decoding, and/or verifying digital signatureswith the human mind is highly impractical.

Public, private, consortium, and hybrid blockchains are compatible withthe present invention. In one embodiment, the blockchain system used bythe present invention includes sidechains wherein the sidechains runparallel to a primary chain. Implementations of distributed ledgerand/or blockchain technology including, but not limited to, BITCOIN,ETHEREUM, HASHGRAPH, BINANCE, FLOW, TRON, TEZOS, COSMOS, and/or RIPPLEare compatible with the present invention. In one embodiment, theplatform includes at least one acyclic graph ledger (e.g., at least onetangle and/or at least one hashgraph). In one embodiment, the platformincludes at least one quantum computing ledger.

In one embodiment, the present invention further includes the use of atleast one smart contract, wherein a smart contract includes a set ofautomatically executable steps and/or instructions that are dependent onagreed-upon terms. The smart contract includes information including,but not limited to, at least one contracting party, at least onecontract address, contract data, and/or at least one contract term. Inone embodiment, the at least one smart contract is deployed on ablockchain such that the at least one smart contract is also stored on adistributed node infrastructure. In one embodiment, the terms of the atleast one smart contract are dependent on changes to the blockchain. Forexample, a provision of the at least one smart contract executes when anew block is added to the blockchain that meets the terms of the atleast one smart contract. The smart contract is preferably executedautomatically when the new block is added to the blockchain. In oneembodiment, a first smart contract is operable to invoke a second smartcontract when executed. A smart contract is operable to capture andstore state information about the current state of the blockchain and/orthe distributed ledger at any point in time. Advantageously, a smartcontract is more transparent than traditional coded contracts because itis stored on a distributed ledger. Additionally, all executions of thesmart contract are immutably stored and accessible on the distributedledger, which is an improvement over non-distributed, stateless codedcontracts. In one embodiment, the state information is also stored on adistributed ledger.

The present invention also provides for a cryptocurrency transaction tobe processed upon a NFT or image associated with the NFT being read byan AI EMD. By way of example, an entry fee to a venue is charged to auser account upon the NFT or image associated with the NFT being read bythe AI EMD. In another embodiment, a user account receives acryptocurrency payment upon the NFT or image associated with the NFTbeing read by the AI EMD. By way of example, a service provider such asa house cleaner or a delivery driver is operable to be compensated uponscanning the NFT or image associated with the NFT. In anotherembodiment, the NFT or image associated with the NFT does not grantaccess to an entry point but rather only provides for payment viacryptocurrency to a user wallet from a different user wallet. The userwallet or the different user wallet is operable to be a user walletassociated with the AI EMD of the present invention, a service provider,or any other party.

A cryptocurrency is a digital asset wherein ownership records andtransaction records of a unit of cryptocurrency (typically a token) arestored in a digital ledger using cryptography. Use of centralizedcryptocurrencies and decentralized cryptocurrencies are both compatiblewith the present invention. Centralized cryptocurrencies are mintedprior to issuance and/or are issued by a single body. Records of adecentralized cryptocurrency are stored on a distributed ledger (e.g., ablockchain), and any node participating in the distributed ledger isoperable to mint the decentralized cryptocurrency. The distributedledger thus serves as a public record of financial transactions.Cryptocurrencies are typically fungible in that each token of a givencryptocurrency is interchangeable. The present invention is operable tofacilitate transactions of at least one cryptocurrency, including, butnot limited to, BITCOIN, LITECOIN, RIPPLE, NXT, DASH, STELLAR, BINANCECOIN, and/or ETHEREUM. In one embodiment, the present invention isoperable to facilitate transactions of stablecoins, NEO EnhancementProtocol (NEP) tokens, and/or BINANCE Chain Evolution Proposal (BEP)tokens. In one embodiment, the present invention is operable to supporttokens created using the ETHEREUM Request for Comment (ERC) standards asdescribed by the Ethereum Improvement Proposals (EIP). For example, thepresent invention is operable to support ERC-20-compatible tokens, whichare created using the EIP-20: ERC-20 Token Standard, published byVogelsteller, et al., on Nov. 19, 2015, which is incorporated herein byreference in its entirety.

A cryptocurrency wallet stores keys for cryptocurrency transactions. Ascryptocurrency is a virtual currency, the ability to access and transfercryptocurrency must be protected through physical and/or virtual meanssuch that such actions are only operable to be performed by the rightfulowner and/or parties with permission. In one embodiment, acryptocurrency wallet stores a private key and a public key. In anotherembodiment, the cryptocurrency wallet is operable to create the privatekey and/or the public key, encrypt data, and/or sign data (e.g., with adigital signature). In one embodiment, the private key is generated viaa first cryptographic algorithm wherein the input to the firstcryptographic algorithm is random. Alternatively, the input to the firstcryptographic algorithm is non-random. In one embodiment, the public keyis generated from the private key using a second cryptographicalgorithm. In one embodiment, the first cryptographic algorithm and thesecond cryptographic algorithm are the same. The private key is onlyaccessible to the owner of the cryptocurrency wallet, while the publickey is accessible to the owner of the cryptocurrency wallet as well as areceiving party receiving cryptocurrency from the owner of thecryptocurrency wallet. Deterministic and non-deterministiccryptocurrency wallets are compatible with the present invention.

As a non-limiting example, a cryptocurrency transaction between a firstparty and a second party involves the first party using a private key tosign a transaction wherein the transaction includes data on a firstcryptocurrency wallet belonging to the first party, the amount of thetransaction, and a second cryptocurrency wallet belonging to the secondparty. In one embodiment, the second cryptocurrency wallet is identifiedby a public key. The transaction is then populated to a distributednetwork wherein a proportion (e.g., 51%) of the nodes of the distributednetwork verify the transaction. Verifying the transaction includesverifying that the private key corresponds to the first cryptocurrencywallet and that the amount of the transaction is available in the firstcryptocurrency wallet. The nodes then record the transaction on thedistributed ledger, e.g., by adding a block to a blockchain. Fulfillingthe cryptocurrency transaction is a computationally intensive processdue to key cryptography and the consensus necessary for adding data tothe distributed ledger that could not practically be performed in thehuman mind. In one embodiment, a node is operable to verify a block oftransactions rather than a single transaction.

Desktop wallets, mobile wallets, hardware wallets, and web wallets arecompatible with the present invention. A software wallet (e.g., adesktop wallet, a mobile wallet, a web wallet) stores private and/orpublic keys in software. A hardware wallet stores and isolates privateand/or public keys in a physical unit, e.g., a universal serial bus(USB) flash drive. The hardware wallet is not connected to the internetor any form of wireless communication, thus the data stored on thehardware wallet is not accessible unless the hardware wallet isconnected to an external device with network connection, e.g., acomputer. In one embodiment, the data on the hardware wallet is notoperable to be transferred out of the hardware wallet. In oneembodiment, the hardware wallet includes further data security measures,e.g., a password requirement and/or a biometric identifier requirement.In one embodiment, the present invention is operable to integrate athird-party cryptocurrency wallet. Alternatively, the present inventionis operable to integrate a payments platform that is compatible withcryptocurrency, including, but not limited to, VENMO, PAYPAL, COINBASE,and/or payments platforms associated with financial institutions.

In another embodiment, the AI EMD or software platform provides data orinformation upon the NFT or the image associated with the NFT being readand verified. Any of the information or data described herein isoperable to be provided upon the NFT or the image associated with theNFT being read and verified. Alternatively, the AI EMD or softwareplatform is operable to instruct another device to perform an actionupon the NFT or the image associated with the NFT being read orverified, such as an IoT device performing any action described hereinor any other device in communication with the AI EMD or the softwareplatform described herein performing any action described herein.

Another feature of AI EM system 100 is that the software includesprogramming instructions that, when executed, cause AI EM device 10 toexecute entry management and ecommerce support functions including thedelivery of messages, directives, instructions, greetings, recordings,and facilitating the connection of a third party for two-way audio/videocommunication.

A greeting includes, but is not limited to, a contextual greeting thatincludes some context to the third party, such as their name, or thename of an organization they are associated with. For example, a friendJan, comes over to water the plants while an owner is away and the AI EMdevice system is operable to provide a greeting to Jan that includes hername. In another example, a UPS delivery driver is operable to betracked by the AI EM device system and a greeting that includes the“UPS” name is provided when the delivery person moves within a thresholdrange or distance of the AI EM device or when they provide their virtualkey. The AI EM system is operable to track an electronic device having aglobal positioning system by receiving a location from the mobileelectronic device or by interfacing with a program, such as anApplication software, or App, to receive location information regardingthe electronic device. For example, and not limitation, a packagedelivery person includes a transponder or other device that is used totrack their location or the location of their vehicle and the AI EMsystem is operable to interface with a program or database to determinethis location.

In one embodiment, a greeting is contextual for a particular occasion,such as for holidays or special occasions including birthdays,anniversaries and the like. An exemplary AI EM system is operable tooffer occasion greeting packages that include a song or other occasionspecific messages for an additional fee to the administrator.

In one embodiment, the AI EM system 100 includes a motion detector 14 ofAI EM device 10 that is configured to activate upon motion and provide agreeting, command, or instructions, whereby system 100 is operable toactivate upon recognition of a paired mobile device. The paired mobiledevice includes a stored identification paired via the approval of anowner/administrator. The pair mobile device is configured to receive theapproval via an owner/administrator mobile device. Theowner/administrator includes individuals assigned programming rightsconfigured to allow the owner/administrator to make selections remotelyvia the AI EM system. When activation occurs, the AI EM device 10 isconfigured to provide a spontaneous response, or a pre-programmedresponse in accordance with the device it detects. In yet anotherembodiment, the AI EM system 100 includes an AI EM device 10 configuredto provide a spontaneous response, or a pre-programed response inaccordance with the image read by camera 22.

In one embodiment, the AI EM system 100 is operable, when activated,simultaneously, to send a notification to the user device of anowner/administrator with an option to engage remotely in two-waycommunication, activate a preprogrammed or custom message, provide avirtual key or activate the recording for a message, detect a person ora device via camera 22, microphone 24, motion detector 14, or wirelesscommunication device 42 and provide an intelligent response to theperson or device via speaker 18 or wireless communication device 42.

In yet another embodiment, the AI EM system 100 is configured when apackage is scanned by camera 22 of AI EM device 10, to initiate ageofence and/or MDA around an area of AI EM device 10. A geofence is amonitored area within proximity of an access point and/or the AI EMdevice. An MDA, or monitored designated area, is an area created by AIEM device within the field of view of camera 22. A geofence and/or MDAproximity distance from an access point and/or the AI EM device is about1 m or more, about 5 m or more, about 10 m or more, about 20 m or more,about 50 m or more. In one embodiment, when the geofence and/or MDA ofAI EM device 10 is initiated, AI EM device 10 is configured to utilizemotion detector 14, camera 22, microphone 24, or combinations thereof,for detecting a breach of the geofence area and/or MDA around AI EMdevice 10. In select embodiments, when a breach of the geofence areaand/or MDA around AI EM device 10 is detected, the AI EM system 100 isconfigured to: alert the owner via a wireless notification; trigger theEM device to set off an alarm of the EM device; trigger an externalalarm; the like; and/or or combinations thereof. In select embodiments,when the package is placed in the geofence area and/or MDA around AI EMdevice 10, the AI EM device 10 is operable to receive input to activateand to monitor the geofence area and/or MDA via motion detector 14,camera 22, microphone 24, or combinations thereof. In other selectembodiments, the AI EM device is operable to receive input to deactivatethe geofence area and/or MDA about the AI EM device 10. In oneembodiment, the input includes, but is not limited to, scanning of thepackage or a virtual key, whereby the package is retrieved. Oncescanned, the notification, alarms, or combinations thereof aredeactivated by the scanning of the package or the virtual key, and asubsequent scan can reactivate the geofence area and/or MDA around AI EMdevice 10. The AI device 10 is configured to learn various inputsaccording to one embodiment of the present invention. For example, thesoftware of the AI device is configured to relate to the occupants ofthe building for enabling name recognition by AI EM device 10. The AIdevice is further operable to enable AI EM device 10 to establishcontact, record messages, or deliver a message from the person orpersons named. In another embodiment, the AI device is operable tointerface with other AI devices, like other AI EM devices 10 configuredas a part of AI EM system 100. When AI EM device 10 is activated bymotion, the detection of a paired mobile device, the presentation of avirtual key, or the owner/administrator, AI EM device 10 is configuredto cause the programming instructions of the software to activate orturn on AI EM system 100. The AI device 10 is also operable to cause AIEM device 10 to detect the person and interpret voice detected bymicrophone 24 from the person. Upon detecting a person and interpretinga voice detected by the microphone 24, the AI EM device 10 is configuredto provide an intelligent response including, but not limited to,logistics, a greeting, a command, directions, a message, an inquire, arecording request, an alarm to speaker 18, the like, and/or combinationsthereof. The wireless communication device 42 is configured to establishthe identity of the person or the device once paired. In one embodiment,after pairing, the AI device is configured to recognize the device andprovide a customized greeting, specific instructions, access, or actionsfor the associated AI device 10. The AI device is further configured torequire authentication of an image or mobile device that is active andunlocked, AI device 10 must be active, or combinations thereof, prior toproviding the customized greeting, the specific instructions, access, orthe actions for the associated device 10. Advantageously, the AI device10 is operable to recognize the previously paired mobile device and avirtual key or an identification sequence. In one embodiment, if thereis not a confirmed identification, a third-party authentication issought which is an embedded code within the virtual key, or an audibleor verbal response code including, but not limited to, a word or words,a sentence, a number or numbers, sounds, or letters. Examples of virtualkeys include, but are not limited to, a humanly created mark, drawing,written sequence of numbers, letters, abstract sketch, or picture.

The wireless communication device 42 of AI EM device 10 is operable forexchanging data between AI EM device 10 and fixed and mobile devicesover short distances using wireless communications, including, but notlimited to, Wi-Fi or UHF radio waves in the industrial, scientific andmedical radio bands (e.g., from 2.402 GHz to 2.480 GHz), and buildingpersonal area networks (PANs), also known as Bluetooth® (Bluetoothtrademark owned by Bluetooth SIG, Inc. of Kirkland, Wash.). The AI EMdevice 10 is operable to communicate directly with, or through theplatform with, one or more electronic devices of security personnel orlaw enforcement. The AI EM device 10 is operable to work on anetworkable platform with networked software accessible and interactivewith any other devices running the networked software and participatingon the networkable platform. In one embodiment, the networkable platformis configured for use by a variety of members including owners, servicepersonnel, property management, real estate professionals, short termrentals, hotels, employees, the like, etc. In one embodiment, thenetworkable platform is operable to provide access and logistics toadditional industries and uses.

In one embodiment, the AI EM device 10 is operable to scan a code, animage, or any other data or symbol which is operable to grant access toa property and retrieve a profile associated with the device or accountassociated with the code, image, or the other data or symbol operable togrant access to the property. The AI EM device 10 is then operable tosend one or more command and control messages to one or more of aplurality of IoT devices or other devices connected to the AI EM device10 over a network or via one-way or two-way wireless or wiredcommunication. For example, a profile includes settings for one or morethermostats, one or more smart locks, one or more lighting devices, oneor more smart window devices, one or more media devices, and/or one ormore smart sockets. The AI EM device is operable to control thesedevices directly through a wireless connection between the AI EM deviceand the devices or through a platform, with the AI EM device and thedevices being connected to a network such as a wireless network (e.g.,WI-FI, cellular, etc.). All references to control of other devicesthrough the AI EM device described herein are understood to encompassdirect control or control of other devices through a platform. Thesoftware platform associated with the AI EM device is operable to storeaccount or profile information for a plurality of users. In oneembodiment, a hierarchy of profiles or accounts exists, wherein higherranked accounts (e.g., parent or administrator accounts) are operable toset and overrule settings for lower ranked accounts (e.g., child, guest,or service people accounts). Overruling settings includes manuallyoverruling settings through the platform based on input (e.g. providedvia a user device). The overruling settings are associated with thelower ranked account or overruling implemented settings in a property orhouse upon the EM device allowing a user device associated with a higherranked profile to enter a home. In one embodiment, compromise settingsexist between two accounts of the same hierarchical level. For example,a compromise setting includes the thermostat settings of a first accountoverruling the thermostat settings of a second account but the lightingsettings of the second account overruling the lighting settings of thefirst account. Profiles are customizable such that there are differentsettings for different times of the year, different days of the week,and different times of day.

In one example, the AI EM device 10 receives an image from a deviceassociated with the profile, and the AI EM device 10 sends a command toa smart thermostat to set a temperature of one or more rooms or floorsto a certain setting. These temperature settings are operable to be setthrough a software application connected to the AI EM device 10 or thesoftware platform of the present invention. In one embodiment, there isa hierarchy of profiles, such that settings of an adult account overrulesettings of a child account. For example, a child account includes athermostat setting of 75 degrees for a living room, and an adult accountincludes a thermostat setting of 72 degrees for the living room. If thechild account is granted access by the AI EM device 10, the AI EM device10 sends a command to the thermostat for the living room to set thetemperature to 75 degrees. Upon the adult account being granted by theAI EM device 10, the AI EM device 10 commands the thermostat to adjustthe temperature in the living room to 72 degrees. Conversely, if theadult account is granted access first by the AI EM device, the AI EMdevice sends a command to the thermostat to adjust the temperature ofthe living room to 72 degrees. Upon the child account being grantedaccess by the AI EM device after the adult account has already beengranted access, the AI EM device does not send a command to thethermostat to adjust the temperature of the living room. In anotherexample, only certain thermostats are commanded to adjust thetemperature of certain rooms or floors. An adult account granted accessto the property only causes thermostats on the first floor to beadjusted as to a predetermined settings since the bedroom of the adultis on the first floor. Conversely, a child account granted access by theAI EM device after an adult account is granted access does not cause thesettings of any network devices or IoT devices to change since the adultaccount has a higher priority than the child account.

In another embodiment, a child account is granted access to certainrooms or certain areas in a property via unlocking of smart lock IoTdevices for these rooms or areas when the AI EM device grants access toa child account. The child account is permitted to access a study viaunlocking of a smart lock associated with the study but a smart lockassociated with a playroom is not unlocked in one embodiment.Alternatively, thermostat or lighting IoT devices are utilized toincentivize or disincentivize certain behavior, with a thermostat in astudy being set to a warmer temperature in winter months than athermostat in a play room upon the child account being granted access bythe AI EM device.

Additionally, network connected or IoT lighting devices are operable tobe controlled based on the AI EM device granting property access acertain account. For example, the AI EM device is operable to grantaccess to a guest account associated with a service technician such as aplumber and turn on lighting associated with the area the plumber willbe working (such as a bathroom or a kitchen) and lighting on a path fromthe entryway to the area where the plumber will be working. In anotherembodiment, these lighting devices are operable to include settingsassociated with a particular account or profile. In one embodiment, anadult profile includes a brightness setting for one or more lightingdevices, with the AI EM device operable to overrule or not implementsettings associated with a child profile based on the adult profilesettings. Lighting devices are also operable to be utilized toincentivize or disincentivize certain behavior, with lighting in a studybeing set to automatically be turned on for weeknights after schoolhours for a child account while lighting in a playroom is notautomatically turned on for a child account during these time periods.

Smart window devices such as smart curtains or smart blinds are alsooperable to be controlled autonomously based on profile settings. In oneexample, smart curtains are automatically opened upon a maid accountbeing granted access to a property by the AI EM device.

In another embodiment, profile settings also control media devices suchas audio, video, and/or gaming devices. By way of example, an audiodevice connected to the AI EM device is operable to play a differentaudio track or playlist associated with a profile upon the user deviceassociated with that profile being granted access by the AI EM device.

Smart sockets are also operable to be connected to the AI EM deviceplatform. Any electrical device is operable to be plugged into a smartsocket, with the AI EM device being operable to cause the smart socketto be powered on or off based on settings associated with a profile uponthe user associated with that profile being granted access by the AI EMdevice. For example, a stove is powered on when the person who typicallycooks dinner is granted access by the EM device. In another example, alaptop computer is provided power when the owner of that computer isgranted access via the EM device.

IoT or network devices include at least one alarm system associated withthe access point in one embodiment, with the alarm system operable to beautomatically deactivated upon the EM device receiving a command tounlock the access point. The EM device is preferably in wirelesscommunication with at least one alarm system associated with the accesspoint, and wherein, upon receiving a command to unlock the access point,the facial recognition module identifies any authorized individualswithin a predetermined distance of the access point, and the at leastone alarm system is automatically disactivated if any authorizedindividuals are detected.

In one embodiment, settings for any network device or IoT device areoperable to be overruled in real-time via an interface of a mobiledevice by an administrator or parent account.

In another embodiment, wearables or sensor data is operable to beuploaded to the platform, and IoT devices are operable to beautomatically adjusted based on this data. For example, body temperaturedata is operable to be sent to the platform and thermostat temperatureor the temperature of a cooling or heating device, such as a cooling orheating mattress pad, mattress, or piece of furniture such as a chair isoperable to be adjusted based on the wearable data in real time or nearreal time. Additionally, or alternatively, the AI EM device is operableto provide wearable data and other data about settings and history ofsettings for IoT or network devices to an account associated with theplatform, such as a caregiver or nurse account. This enables a caregiveror nurse to better care for people in the property, and in oneembodiment the caregiver or nurse account is operable to overrulesettings on the fly for the benefit of the health of people within thehouse.

Wearable data is also useful for granting access to certain devices orareas within a house. For example, the system (e.g., via an EM app) isoperable to verify a child exercised for a predetermined period of timeusing wearable data (e.g., steps, heart rate, etc.). The system (e.g.,via the EM app) is operable to grant access to a device (e.g., gamingconsole) or a room of a house (e.g., playroom).

In one embodiment, a mobile device associated with a profile remains innetwork communication with the platform or the AI EM device while themobile device is within the house or property associated with the AI EMdevice. In one embodiment, a geofence is created around the house or theproperty (including the boundaries of the property), and the platform orAI EM device determines when the mobile device and/or a smart electronicdevice leaves the geofence and automatically locks the access point andturns off or adjusts settings associated with one or more IoT devices ornetwork devices. In another embodiment, an application on the mobiledevice and/or the smart electronic device is operable to determine ageolocation of the mobile device and/or the smart electronic device andtransmit the geolocation of the mobile device and/or smart electronicdevice to the platform, with the platform being operable toautomatically lock the access point and turn off or adjust settingsassociated with one or more IoT devices or network devices upon themobile device and/or smart electronic device moving a certain distanceaway from the AI EM device. Location data is created in the presentinvention using one or more hardware and/or software components. By wayof example and not limitation, geolocation data is created using theGlobal Positioning System (GPS), low energy BLUETOOTH based systems suchas beacons, wireless networks such as WIFI, Radio Frequency (RF)including RF Identification (RFID), Near Field Communication (NFC),magnetic positioning, and/or cellular triangulation. By way of example,location data is determined via an Internet Protocol (IP) address of adevice connected to a wireless network. A wireless router is alsooperable to determine identities of devices connected to the wirelessnetwork through the router, and thus is operable to determine thelocations of these devices through their presence in the connectionrange of the wireless router.

Geofence and geolocation technology is also operable to be used todetermine when child accounts or guest accounts have left a house orproperty. In one embodiment, an alert is sent to a user devicecorresponding to a parent account or administrator account upon adetection by the platform that a child account or guest account has leftthe property or house.

In select embodiments of AI EM system 100, a transponder device isincluded. The transponder device is configured to utilize a globalpositioning system or a wireless communication to identify a mobiledevice and begin to transmit a signal for easy identification anddetection. In select embodiments, the transponder device is attached toa stationary object, a door, a room, a building box or a storagecontainer. In one embodiment, upon AI EM device 10 detecting thetransponder device, the programming instructions of the software areconfigured to: send out an audible noise, illuminate, provide mappinginstructions or directions to the mobile device to provide guidance inlocating a specific location of the stationary object, door, room,building box, or the storage container via the speaker; illuminatelights on the EM device; provide a mapping direction on the deviceincluding: an exact location; a location inside a building, a buildingwithout a geo address, a container, a storage unit; the like; and/orcombinations thereof. As such, the transponder device is configured totake over where a global positioning system ends to guide the person orthe device to a specific location inside a geofence or outside ageofence. The AI EM device 10 is operable to utilize the globalpositioning system, Wi-Fi, radiofrequency (RF), Bluetooth®, or anotherwireless communication to identify a mobile device previously paired andinitiate actions including messages, access, logistics to guide theperson or the device to the specific location such that the geo positionof AI EM device 10 activates various actions. When the transponderdevice is activated and detects the person or the device within a setrange, the transponder device is operable to emit a signal, a sound, alight, or input to AI EM device 10 configured to guide and direct theperson or the device to the specific location.

The camera 22 of the AI EM system 100 is operable to read a virtual keyfrom the person or the device, and upon reading the virtual key, AI EMdevice 10 is configured to unlock an access point, provide a greeting,instructions or logistics, record a message, or establish contact withthe individual requested. In select embodiments, the virtual keyincludes, but is not limited to, a humanly created image including, butnot limited to: a humanly created photo; a humanly created picture; ahumanly created drawing; a humanly created mark; a humanly creatednumber or numbers; a humanly created letter or letters; a humanlycreated word or words; the like; and/or combinations thereof. The camera22 is also operable to read a virtual key from the person or the device,and upon reading the virtual key, AI EM device 10 is configured toactivate a drone to retrieve deliveries from a specific location.

In select embodiments of AI EM system 100, the access point is adelivery storage container or mailbox. In these embodiments, AI EMdevice 10 is operable to lock and unlock the delivery storage containeror mailbox. In select embodiments, the delivery storage container ormailbox include a refrigerated compartment on an inside of the deliverystorage container or mailbox. The refrigerated compartment is configuredfor food or other refrigerated items. In select embodiments, therefrigerated compartment is a first portion of the inside of thedelivery storage container, and a second portion of the inside of thedelivery storage container is configured for parcels. In other selectembodiments, the refrigerated compartment is the entire inside of thedelivery storage container. Yet in other select embodiments, therefrigerated compartment is the entire inside of a first deliverystorage container and a second delivery storage container is configuredfor parcels. In other select embodiments, the delivery storage containeror mailbox includes a warmer on the inside of the delivery storagecontainer or mailbox. In one embodiment, the warmer is configured towarm the inside of the delivery storage container or mailbox. In oneembodiment, a feature of AI EM system 100 is that system 100 isconfigured to control delivery storage container or mailbox the abilityto select warmer, refrigerated, parcel, or a combination thereof persection of the delivery storage container or mailbox. In selectembodiments, the delivery storage container or mailbox is positionedjust inside a door of a home and AI EM system 100 is configured tounlock and lock the door of the home for deliveries to the deliverystorage container or mailbox. In one embodiment, the position of thedelivery storage container or mailbox is configured to prevent the needfor deliveries to be walked through the house to the kitchen. A featureof the delivery storage container or mailbox is the inclusion of anultraviolet light on an inside. The ultraviolet light is configured forsanitizing the inside of the delivery storage container or mailboxincluding sanitizing any parcels placed in the inside of the deliverystorage container or mailbox. In select embodiments, the deliverystorage container or mailbox includes AI EM device 10 on an outside ofthe delivery storage container or mailbox. In other select embodiments,the delivery storage container or mailbox includes an alarm attached tothe delivery storage container or mailbox configured for security. Inother select embodiments, the delivery storage container or mailboxincludes lighting attached to the delivery storage container or mailboxconfigured for illuminating the delivery storage container or mailboxand area around the delivery storage container or mailbox. In otherselect embodiments, the delivery storage container or mailbox includes apower source which includes, but is not limited to: a wired powersource; a battery-operated power source; a solar power source; the like;and/or a combination thereof. In other select embodiments, the deliverystorage container or mailbox includes a warmer configured to heat theinside of the delivery storage container or mailbox. In other selectembodiments, the delivery storage container or mailbox includes awireless connection configured to control the delivery storage device ormailbox via a mobile device or a personal computer, including beingconfigured to control the locking and unlocking of the delivery storagecontainer or mailbox, controlling the temperature inside of the deliverystorage container or mailbox via the warmer or the refrigeratedcompartment, the ultraviolet light inside of the delivery storagecontainer or mailbox, or combinations thereof.

In yet another embodiment, the AI EM system 100 is operable to createand analyze data relating to delivery services and supply chainmanagement. In this embodiment, scanning of a code on a package by theEM device updates a database with information including time and date ofdelivery, length of time from when merchant shipped the good to when thecustomer received the good, and other pertinent information for insightson supply chain. Aggregation and analytics of this data provides fordetermining trends in deliveries in certain geographic areas anddetermining average delivery times for certain couriers from the time ofhand off to the courier to delivery. For example, the AI EM device isoperable to provide data related to the frequency of use of the AI EMdevice for entry, package delivery, or any other function describedherein, the type of deliveries made, the cost of products delivered, anumber of deliveries made by different couriers using the EM device, atotal cost of products delivered using the EM device, an average cost ofproducts delivered using the EM device, and/or any other statisticoperable to be determined from a label of a package or through image oraudio analysis. In one example, the platform is operable to aggregatethis data across multiple AI EM devices for certain locations, such asneighborhoods, zip codes, cities, states, countries, etc.

This information is useful for providing analytics about which couriersare active in a certain area, which merchants are shipping packages in acertain area, and even granular analytics relating to individualdelivery drivers, routes, and supply chain. Potential consumers of thisinformation include couriers to determine courier competitor activity bydate, time, and geographic area, and merchants to determine merchantcompetitor activity by date, time, and geographic area. For example, aclothing merchant is interested in activity of a competitor in a certaingeographic area and is able to obtain information about this activitythrough the aggregation of data by the AI system of the presentinvention regarding different courier activity for different merchantsin a geographic area.

In another embodiment, the AI EM system 100 is operable to create andstore data relating to entries and attempted entries for the AI EMdevice, such as an aggregated number of attempts to access the accesspoint using the EM devices and a number of times entry has been grantedto the access point using the EM device.

In one embodiment, the AI EM device 10 is configured as a receptionistdevice for corporate, commercial, institutional or industrialapplications. The receptionist device is configured to provide custommessages for each occupant and for receiving and recording custommessages for each user. In one embodiment, the receptionist device isoperable to forward wirelessly forward information to each occupant, orinformation is retrieved from AI EM device 10 by displaying a virtualkey assigned to each occupant. As discussed above, a plurality of AI EMdevices 10 are operable to be configured as receptionist devices forcorporate, commercial, institutional, or industrial applications. In oneembodiment, each of the plurality of AI EM devices 10 is operable tointeract and communicate with each other. In one embodiment, theplurality of AI EM devices 10 is operable to relay messages to theoccupant.

The microphone 24 of the AI EM device 10 is operable to identify anaudible key from the person or the device. Upon identifying the audiblekey via microphone 24, AI EM device 10 is configured to unlock an accesspoint or provide a greeting, information or logistics. In selectembodiments, the audible key includes, but is not limited to, a word,words, a sentence, a number, a sound or sounds, wherein microphone 24 isconfigured to match the audible key with the person or device. In selectembodiments, the AI device is configured to assign audible keys to avariety of users, whereby the AI device is further configured to provideaccess or information to each of the variety of users via a user device.In other select embodiments, the AI device is configured to maintain arecord of each of the variety of users. Yet in other select embodiments,the AI device is configured to record audible messages.

In another aspect, the present invention includes an AI EM system 100with a plurality of AI EM devices 10. Each of the plurality of AI EMdevices 10 is the disclosed AI EM device 10 in any of the variousembodiments and/or combination of embodiments shown and/or describedherein. As such, in general, each of the AI EM devices 10 is configuredfor use with an AI device in communication with the EM device 10including a processor with a non-transitory computer readable storagemedium comprising software having program instructions configured forproviding artificial intelligence to the AI EM device 10. A networkplatform in communication with each of the plurality of AI EM devices 10is included. The network platform is configured to allow each of theplurality of AI EM devices 10 to communication with each other.

In select embodiments of AI EM system 100 with a plurality of AI EMdevices 10, the plurality of AI EM devices 10 are located in aneighborhood. In one embodiment, each of the plurality of AI EM devices10 are configured with the ability to communicate if a crime such as aburglary occurs in any other house or activate and pan the streets torecord all traffic activity. In one embodiment, the plurality of AI EMdevices communicates with each other via a peer-to-peer (P2P) protocol.Alternatively, an AI EM device 10 is operable to send an alert to theplatform of the present invention, and the platform is operable to sendan alert to a plurality of AI EM devices 10 registered with a platformas being associated with a particular neighborhood or specificgeographic location, such as a zip code, a city, a borough, a community,or any other geographic area. In one embodiment, the alert is also sentto an authority device, such as a police device, a sheriff device, afirefighter device, a paramedic device, etc. In another embodiment, anAI EM device 10 is operable to communicate with other AI EM devices torequest the other AI EM devices to deploy at least one drone or at leastone robot. In one embodiment, each AI EM device, drone, robot, orprofile associated with any of these devices includes a setting whichauthorizes the AI EM device, drone, or robot to accept a request to bedeployed. The setting includes parameters which must be met for the AIEM device, drone, or robot to be deployed in one embodiment, such as acertain percentage of battery charge, no people, objects, or eventsdetected within a predetermined time period of receiving the request,etc. In another embodiment, the AI EM device, drone, or robot isoperable to override the request upon detection of an object, person, orevent within an area associated with the AI EM device. In this instance,the AI EM device is operable to send a command to the drone or robot toreturn to the area associated with the AI EM device and perform acertain action, such as patrolling or engaging with an object or person.The at least one robot or the at least one drone is operable to follow apatrol path requested by the AI EM device 10 or a patrol path designatedby the associated other AI EM device. In one embodiment, the patrol pathis within a geofence associated with the relevant AI EM device.Alternatively, the patrol path is within a predetermined location suchas a street of a neighborhood. In yet another embodiment, the drone orrobot is operable to be take a defensive position around a house such asnear an entry way (e.g., a door) or a window of a house or an entranceto a property such as an area near a gate and maintain the defensiveposition for a predetermined period of time. The drone or robot isoperable to hover, remain stationary, and/or change the angle of acamera or other sensor in the defensive position. In one embodiment, therobot or drone is operable to hover, remain stationary, or change theangle of a camera or other sensor autonomously and in real time or nearreal time based on a detection of an object, person, or event ofinterest by the robot, the drone, another robot, another drone, an entrymanagement device associated with the robot or drone, or another entrymanagement device. In one embodiment, the robot or drone is operable tocommunicate data, such as audio data, video data, and positioning data,to the associated AI EM device, which then communicates the data toother AI EM devices. Alternatively, the AI EM device associated with thedrone or robot communicates the data to the software platform of thepresent invention, which then communicates the data to other AI EMdevices. Although this embodiment is described primarily with respect todrones and robots, the present invention is also operable to be utilizedin connection with cameras and other electronic devices includingsensors to reposition the angle or location of the camera and/or otherelectronic devices. In one embodiment, an electronic device associatedwith an AI EM device is operable to receive an alert from the softwareplatform upon another AI EM device in the same community as the AI EMdevice sending data or an alert to the software platform.

Geographic location is just one parameter around which a community watchor neighborhood watch network of AI EM devices is established. Inanother example, a community watch network or neighborhood watch networkis operable to be established regardless of geographic location, such asa group of family or a group of friends. By way of example, a familycommunity watch network includes multiple AI EM devices from differentfamily members across the country. Upon an AI EM device from agrandparent detecting an object, person, or event of concern, such as agunshot, break in, unauthorized person, unknown person, unknown object,etc., the AI EM device is operable to communicate with the softwareplatform of the present invention and send an alert to an AI EM deviceor electronic device associated with a child or grandchild, whichprovides for accessing the AI EM device or other electronic device suchas a camera, robot, or drone associated with the AI EM device. In oneembodiment, the AI EM device or electronic device associated with thechild or grandchild allows for control of the AI EM device or otherelectronic device such as a camera, robot, or drone associated with theAI EM device located on the grandparent's property through the softwareplatform of the present invention. Alternatively, the AI EM device orelectronic device associated with the child or grandchild is operable toview data, including images, audio, or video, through a camera, robot,or drone associated with the AI EM device located on the grandparent'sproperty through the software platform of the present invention and takea separate action, such as contacting a neighbor of the grandparent orcontacting authorities. The invention therefore advantageously providesfor family members to be informed in real-time or near real-time aboutevents occurring in other family members' properties, and to take anyaction which helps prevent or reduce damage or harm to people orproperty.

As shown in FIG. 1, AI EM device 10 of AI EM system 100 is configured asa doorbell device 10. The doorbell device 10 is operable to bepositioned on or proximate to a door, and the system includes a lock onthe door. The doorbell device 10 includes a computing device comprisinga computer processor, such as a microcontroller. The microcontroller isoperatively connected to camera 22 and the lock on the door via a Wi-Fior Bluetooth® (Bluetooth trademark owned by Bluetooth SIG, Inc. ofKirkland, Wash.) signal. When camera 22 scans and processes apreprogrammed bar code, image, numbers or pictures, the microcontrollerof the doorbell device 10 sends a signal unlocking the door lock. Also,camera 22 processes a preprogrammed bar code, image, numbers orpictures, a signal is received from the cloud server or computerprocessor after authentication causing a locking device to open oraccess to be gained. In one embodiment, the doorbell device 10 includesa card reader adapted for electronically reading identification cards,credit cards, and the like. The microcontroller is operable to comprisea computer processor and a non-transitory computer readable storagemedium comprising software having programming instructions that, whenexecuted, cause the microcontroller to carry out the above-describedsteps. According to an embodiment of the invention, the software isoperable to for use as an application on a mobile smart phone and/or asmart wearable device. The doorbell device 10 is operable to include andinterface with one or more AI devices.

According to another embodiment of the invention, the system comprisesthe AI EM device 10 or doorbell device 10 or an independent scannerlocated near or secured to a door, or in proximity to or secured to alock box or other storage apparatus. The lock box or other storageapparatus is operable to contain letters, packages, or other deliveries.The lock box is configured to be located near an entry point, built intoa residential or commercial structure, located in a free-standingstructure such as a mailbox or decorative column, in the ground or otherplaces within the range of a Wi-Fi/Bluetooth® (trademark owned byBluetooth SIG, Inc. of Kirkland, Wash.) signal. The independent scanneris configured for wireless or wired capabilities. The entire system isconfigured to be wired, wireless and/or battery operated. A warningsignal is delivered to an administrator(s) when any battery in thesystem becomes weak.

The independent scanner is capable of reading bar codes, images,numbers, and pictures. Upon reading and processing a preprogrammed barcode, image(s), numbers or pictures, a lock on the door, lock box orother storage apparatus is unlocked. Also, upon reading and processingof preprogrammed bar code, image(s), numbers or pictures, the presentinvention is configured to audibly deliver an appointed message or ageneral message or to deliver the appointed message or general messagevia a text to a mobile phone or an e-mail.

The independent scanner and/or the EM device or devices connected to theindependent scanner and/or the EM device is capable of voice recognitionof audio input. In one embodiment, voice recognition refers to anability to recognize words and/or phrases spoken by a person. Voicerecognition according to the present invention includes any voicerecognition technology known in the art, such as the technologydescribed in U.S. Pat. No. 10,650,802, which is incorporated herein byreference in its entirety. The platform is operable to receive the voicecommands, recognize at least one word and/or at least one phrase in thevoice command, and instruct the independent scanner, the EM device, or adevice connected to the independent scanner and/or the EM device toperform an action based on the at least one word and/or the at least onephrase. Alternatively, the independent scanner, the EM device, or adevice connected to the independent scanner and/or the EM device isoperable to perform an action based on a recognition of at least oneword or at least one phrase in the voice command and the platform isoperable to receive a notification that the action has been performedbased on the voice command. Alternatively, the platform, the independentscanner, the EM device, or a device connected to the independent scannerand/or the EM device is operable to not take an action based on thevoice command. For example, absolute or time-based restrictions or rulesimplemented for the independent scanner, the EM device, or a deviceconnected to the independent scanner and/or the EM device by theplatform overrule the voice command and cause the action requested viathe voice command to not be taken. In one embodiment, a database ofrecognized voice commands is stored on the platform or in a deviceconnected to the platform. If a voice command is not included in thisdatabase, the platform is operable to instruct the independent scanner,the EM device, or a device connected to the independent scanner and/orthe EM device to take no action and optionally provide an audio orvisual response or notification that the independent scanner, the EMdevice, or a device connected to the independent scanner and/or the EMdevice is not taking any action, such as a voice message (e.g., “I'msorry, I did not recognize that command” or “I'm sorry, your requestcould not be completed”) or flashing a red light. In one embodiment, alog of all voice commands is stored in a database connected to theplatform of the present invention.

In another embodiment, the software application or software platform isoperable to perform voice identification or voiceprint recognition,i.e., identification of a person by the sound of the person's voice. Inone embodiment, voice identification or voiceprint recognition utilizedin the present invention includes the voiceprint recognition describedin U.S. Pat. No. 10,629,209. Voice identification is operable to beutilized in conjunction with voice recognition of voice commands, suchthat certain voice commands are implemented or denied based on voiceidentification of a user and the corresponding authorization status ofthe user. Implementation or denial of voice commands is operable to beperformed by the platform or by the independent scanner, the EM device,or a device connected to the independent scanner and/or the EM device.

In one embodiment, the independent scanner includes numbered buttons foradditional authentication or to route information or notification to theappropriate user device. The independent scanner is configured to bepositioned at an entry point or in proximity of a lock box, storagefacility or compartment. In another embodiment, the scanner comprises astorage or lockbox container with a built-in scanner either wired,wireless or battery operated.

According to an embodiment of the invention, the system includes a cardreader capable of reading identification cards, credit cards, and thelike. In one embodiment, the card reader is incorporated in the AI EMdevice 10, or in the independent scanner.

According to an embodiment of the invention, the system includes ascanner/reader incorporated in another device connected to a storagecontainer, box, storage facility or the like.

According to an embodiment of the invention, the system includes asecure storage container located on a property for the purpose ofreceiving packages and deliveries. The container includes an automaticlocking and unlocking mechanism triggered directly by the scannerremotely via wireless technology or via a signal from a computer orcloud server. The storage container is operable to be built into astructure, such as a house, located inside a column or other decorativestructure, or is free standing. In one embodiment, the storage containeror lock box is equipped with a scanner.

According to an embodiment of the invention, the system includes acomputer processor and a non-transitory computer readable storage mediumcomprising software having programming instructions that, when executed,cause a computer processor to carry out various steps described herein.According to an embodiment of the invention, the software is adapted foruse as an application on a mobile smart phone.

The software is configured to create a virtual key based on input (e.g.from a user device). Specifically, the software is operable to createbar codes, images, and pictures and is further operable to forward them,such as by text or e-mail, to allow access to authorized visitors,deliveries, service personnel, and the like. The virtual key includes abar code, a graphic image such as a photograph, and/or an alphanumericcode comprised of letters and/or numbers. In a preferred embodiment, thevirtual key comprises a graphic image and an underlying alphanumericcode, and the scanner is adapted to read graphic images and alphanumericcharacters. If weather or other issues prevent the scanner from beingable to read the graphic image, the scanner is operable to read thealphanumeric code. In another embodiment, the virtual key comprises agraphic image and an underlying code that is operable to be used forauthentication of the image, and the scanner is adapted to read graphicimages and bar codes. If weather or other issues prevent the scannerfrom being able to read the graphic image, the scanner is operable toread the alphanumeric code. When the scanner reads the virtual key, itinitiates one or more actions, such as unlocking an associated lock toallow access to a secured location or container, or transfer data to acomputer processor or a cloud server to authenticate the key or performthe functions enabling access.

The scanner is configured to wirelessly transmit notifications to theappropriate user device enabling a remote signature receipt. Thesoftware application or software platform is operable to deliver aspecific message for the specific bar code, image, picture and/ornumber(s) to input. The software enables remote programming of thescanner, lockbox, storage etc.

The software application or software platform enables remote two-waycommunication via wireless mobile devices. The software application orsoftware platform is operable to coordinate the actions of all featuresof the system. The software application or software platform is operableto receive data from a plurality of mobile devise or fixed devices viaInternet, WI-FI, or other wireless or wired means.

The software enables the programmer to create a virtual key, whichincludes, but is not limited to, a unique barcode, character, picture,letter(s) and/or number(s). A corresponding virtual key is sent todesignated recipient(s), such as delivery or service personnel. Whenscanned, access is gained, or a message is delivered from the system.The software allows access and messages to expire as programmed inaccordance with each unique barcode, character, picture, letter(s)and/or number(s).

Each virtual key is operable to be programmed to have a predeterminedlimited life span. Upon creating a virtual key, the AI EM system isfurther operable to set a predetermined data and time at which thevirtual key will expire and no longer provide access based on aselection (e.g., from a user device).

The software is configured to require a driver's license scan or cardreader for the purposes of verifying entry. The software is operable totime stamp every activation and document identity when desired. Thesoftware allows notifications to be sent to one or more mobile devices.

The software enables the person notified wirelessly to forward a uniquebarcode, character, picture, letter(s), and/or number(s), etc. to one ormore recipients to provide access or messages.

The software is operable to send a delivery confirmation to a userdevice of a sender, the delivery service and/or others involved. Thesoftware allows owners to change access according to need for residentsor guests, thereby eliminating the need to change locks.

The software enables preprogrammed messages, directives to differentindividuals in accordance with the corresponding scan. The softwareenables a remote signature, symbol, and/or image to be sent from ahandheld device to the system, enabling the delivery person to obtainsuch through the scanner or doorbell or other system apparatus.

The software is operable for a mobile or stationary transmission of abarcode, image, etc. for the purposes of access, message and/orinformation. The software has voice recognition and artificialintelligence, enabling dissemination to appropriate user devices andinterface with an authorized delivery person or guest. The artificialintelligence is operable to provide information, directives, and/orgreetings etc.

The software application or software platform enables all devices in thesystem to be synchronized in a secure manner by usernames and passwordsor similar identification protocol. In one embodiment, the system is bereferred to as “Virtual Access Locator Technology” (VALT). The systemcomprises:

-   Scanner/Scanner/Doorbell/Light apparatus mounted in proximity to a    door, lockbox, storage, compartment or other secured location or    container.-   Scanner includes illumination, camera, speaker, microphone, alarm,    and reader(s) for cards, mobile phones, and mobile devices.-   Controller comprised of a catalogue of keys for creation of a    variety of selected inputs to be sent or transmitted to the scanner    or to an individual(s) with a remote device or to an email address,    or other address. Each virtual key, bar code, alphanumeric input has    the capability of triggering a corresponding message, directive,    etc. from the system when a scan is performed.-   Controller(s) consisting of programmable devices (computer, laptop,    cell phone, tablet, smart wearable devices, etc.) running a software    application controlling one or more systems of the invention.-   Lock box(s), storage, compartments for storage of deliveries that    interface with the controller and the scanner.-   Software with a menu of features to customize the VALT system for    uses such as managing construction sites and deliveries, providing    remote contact by real estate agents with prospective buyers,    forwarding an electronic code/virtual key for access utilizing the    scanners, and serving property owners with a secure method of    receiving deliveries.-   A camera for monitoring package deliveries, recording access and    egress, and date stamping time of events.-   Two-way communication for wireless communication between person    initiating scan and appropriate person(s).-   Motion detection for activation of system or the pressing of a    button.-   If a delivery package requires a signature and the occupant is not    home, the scan will enable the system to notify the occupant and to    forward an electronic signature to the deliverer as well as remote    access triggered to a selected structure, such as a lockbox,    storage, compartment.-   An app enabling networking of AI devices within or outside the Wi-Fi    network.

An embodiment of the invention comprises a general-purpose computer thathas been programmed to perform particular functions as a specificpurpose computer pursuant to the instruction from program software, suchas the software described above.

According to an embodiment of the invention, when a package, letter orother delivery is anticipated, the source of the delivery (e.g., anonline retailer), identifies itself as a VALT application memberenabling the source to select delivery options which include theprovision of a virtual key to the retailer or carrier for delivery. Thesystem is operable to designate specific delivery instructions, access,and/or access points for each delivery after receiving input (e.g., froma user device). The virtual key includes, but is not limited to, apredetermined bar code(s), graphic image(s), and/or other accessauthorizing input. When the purchaser receives the access authorizinginput, that input is entered into the VALT system. The delivery sourceis further configured to provide the authorizing delivery input (virtualkey) to a delivery person responsible for delivering the package,letter, or other delivery to the purchaser. Alternatively, the purchaserprovides the virtual key to the delivery person. The VALT system storesthe authorizing input until an anticipated match is received (e.g., froma delivery person) (bar code, image, numbers, etc.).

The VALT system scanner scans the input from the delivery person todetermine if it matches the authorizing input that had been entered bythe purchaser. When a match occurs, the VALT system is triggered toinitiate one or more of the following actions:

-   Provide access (such as by unlocking a door or container)-   Deliver a preprogrammed message to the source of the delivery-   Establish contact with appropriate individual(s)-   Date stamp delivery-   Notify appropriate individuals of delivery (such as the intended    recipient)-   Initiate two-way communication-   Activate camera-   Activate motion detection-   Activate the AI device which will then interface with the VALT    system providing instructions, directives, etc.

In an alternative embodiment of the invention, the system is operable toreceive the authorizing input, such as a bar code(s) or image(s) (e.g.,via a user device) and the system is operable to transmit theauthorizing input to an authorized delivery source device. For example,and not limitation, the system is configured to create a personalizedauthorizing input based on input received (e.g., via a user device froman individual). The individual provides the personalized authorizinginput to an online retailer at the time of making a purchase from theonline retailer.

According to an embodiment of the invention, the system is configured tocreate barcodes, images, etc. or other authorizing inputs based on input(e.g., from a user device (e.g., a system administrator device)) thatare sent for the purpose of access:

-   Deliveries-   Guest-   Family-   Real Estate Sales-   Service and repair personnel-   Property management-   Online real estate rental platforms, such as Airbnb

In one embodiment, the EM system is operable to create a label andtransmit the label to a plurality of vendor devices based on input(e.g., from a user device (e.g., an administrator/owner user device))The label is created by using identified numbers or codes received bythe EM system such as credit card number, number provided byadministrator/owner at the time of order, and/or image selected by theadministrator/owner at the time of order.

According to an embodiment of the invention, the VALT system is operableto send a signal to a variety of access points. One of which includesmail compartments, storage compartments, entry, or other. Once access isprovided, the access information becomes invalid, or programmed toexpire at a designated time.

The VALT system includes the ability to deliver messages or informationassociated with each scan. The system is further operable for voicerecognition and AI (artificial intelligence), either built in ornetworked with other external AI devices, enabling it to conductinquiries, provide information, and respond to inquiries.

The VALT system is connectable to a database for the purpose of readingdrivers' licenses or other Identification cards or badges. The VALTsystem date stamps, stores and configures a report of all activity. TheVALT system confirms deliveries, date stamping each, and provides accessto package containers, storing them safely.

According to an embodiment of the invention, the two-way communicationenables remote communication with the device of an owner/administratorand the device of a person triggering the scan.

Locking compartments or storage compartments for the VALT system areconstructed and configured in the structure or located in proximity to astructure in range of the VALT wireless input, the cloud server runningthe application, edge computing network, and/or a mobile device runningthe application.

In select embodiments, the VALT system comprises a scanner device, suchas the AI EM device 10 described above. Upon the purchase of an itemfrom an online retail seller platform, a virtual key is created andtransmitted to the AI EM device 10 of the item purchaser. The virtualkey includes, but is not limited to, the specific IP address of thepurchaser. The virtual key is also sent to the designated retailer ordelivery service that is to deliver the item to the purchaser if a VALTmembership is confirmed. Upon delivering the item to the purchaser'slocation, the delivery service presents the virtual key, which includesa bar code that is scanned by the doorbell device. Upon scanning thevirtual key, the VALT scanner AI EM device 10 transmits a signal to theapplication server, computer processor or door lock that unlocks thedoor 112. The VALT system is operable to program the virtual key so thatit expires after a predetermined number of uses at the AI EM device 10.For example, the virtual key is configured to expire after it has beenscanned one time by the AI EM device 10. As such, the virtual key cannotbe used again. Alternatively, the virtual key is programmed to activateat a predetermined time and expire at a predetermined time.

According to an embodiment of the invention, the VALT system is operableto be used in the field of real estate sales. Real estate agents sendaccess information wirelessly via user devices in the form of a bar codeor image to a potential buyer visiting a home for sale. The potentialbuyer inputs the access information into the system to unlock the doorof the home and gain entrance. The VALT system is further configured toconfirm the identity of the potential buyer via driver's license scan.The system is operable to monitor access via built in camera(s), conductremote tour via interior cameras and monitor exit. The VALT system isoperable be used with online real estate rental platforms, such asAirbnb.

In another embodiment of the invention, the VALT system is operable beused to receive service providers at a location, such as buildingcontractors, sub-contractors, repair men, cleaning staff and otherservice personnel doing work at a residence. The VALT system is operableto create access information and transmit the access information to userdevices corresponding to service providers. The system is operable toreceive the access information to grant access to the residence.

Another embodiment of the invention comprises a mobile app that allowsfor the creation of a virtual key to enable the transfer of keys foraccessing a structure.

According to an embodiment of the invention, the VALT system comprisesan AI device and AI EM device 10 having camera 22 that is operable to beused as a scanner and a mobile app that is operable to be utilized bymerchants. The mobile app allows the transfer of specific barcode orother information. Also, included in the app is the ability to createvirtual keys which are operable to send to delivery personnel or servicepeople. An unlocking component is associated with the creation of thevirtual keys.

According to an embodiment of the invention, the virtual key expires ata predetermined time selected by the creator of the virtual key. Thevirtual key is configured to be securely sent to a cell phone and/orsmart wearable device for access by various personnel.

In another embodiment of the invention, multiple artificial intelligence(AI) devices such as robots including aerial robots, communicate withone another in an established network. This allows messages to beshared, transmitted, and stored in other AI devices for both securityand information purposes. If a delivery occurs and the recipient oroccupant is not available, the VALT system communicates with the AIdevice with a notification that is stored or sent to another AI device.According to an embodiment of the invention, membership in the networkis accepted via programming of a code, IP address, or some otheridentifier that is accepted by another device or devices for sharedcommunication. The information extends to the merchant who has theability to send a message to an AI device regarding delivery, shipping,or order information. The AI device is further operable to communicateinstructions to the delivery person via the VALT scanner orindependently, in addition to storing important information (e.g., froma delivery or service person).

Another embodiment of the invention provides a system for deliveringmerchandise comprising an online membership platform that is configuredto receive personal data such as name, address, and credit card datainformation at the time of creating a membership via a user device. Avirtual key is created in connection with at least one accountcorresponding to at least one member of the platform; the virtual keyoptionally includes special instructions for delivery personnel, forexample preferred location for leaving packages at the delivery address.The membership platform is operable to be accessed at the time of makingan online purchase. For example, an online retailer makes customersaware of the membership platform and provide a link to the platform whencustomers are about to make a purchase from the online retailer.Returning customers who have already created a membership enter apassword to bring up their existing membership. The system includes ascanner device that is operable to read bar codes, images, andalphanumeric symbols. The scanner device is operable to be encoded withthe personal data of a particular user, including a virtual keycorresponding to a user's device. The online retailer delivers theencoded scanner device to the particular user when a membership iscreated on the membership platform that corresponds to the particularuser.

The scanner device is configured to be positioned proximate to an accessdoor of the user's home, business or other delivery location. Thescanner device includes adhesive or other attachment means that allowsthe scanner device to be securely attached to the user's home, storagecontainer or other secure location. The scanner device includes but isnot limited to, a speaker, microphone, a display screen and a camera.Preferably, the display screen is a touch screen. When a delivery isscanned, confirmation of receipt of the package is transmitted to theonline retailer and the user device. Upon scanning of the package, thescanner device reads the virtual key.

If the membership platform received special delivery instructions, thenthe speaker is configured to broadcast audibly the instructions (such as“place the package on the back porch”) and/or present the text on atouch screen. The system is further operable to capture audio (e.g.,from a delivery driver) via a microphone. Advantageously, this enablesthe delivery driver to communicate with a user via the system when thedelivery driver is having an issue. The online retailer offers an“upgraded” scanner device that includes means for installing anelectronic lock on the user's access door that is operatively connectedto the scanner device. Upon scanning of the package by the scannerdevice, the scanner device reads the virtual key, which triggers theelectronic lock on the access door to unlock for a predetermined amountof time to allow the delivery driver to place the package inside theuser's home.

According to another embodiment of the invention, the VALT applicationis configured to maintain a record of every activation and access key. Arecord is maintained of each activation that includes the virtual keyutilized for the activation, the IP address and authorized user of themobile device of the individual and/or entity utilizing the virtual keyfor access, the duration of stay, and the date/time of departure and/ortermination of the virtual key.

According to another embodiment of the invention, the VALT applicationincludes voice recognition technology and the virtual key comprises anaudible recording of a series of numbers, words and/or sounds, which isoperable be created by input received from an administrator (e.g., via auser device). The voice recognition technology is operatively connectedto the scanner device whereby the scanner device is adapted to receiveand process voice data. When the scanner device receives and processesthe audible sound of the virtual key one or more actions is initiated,such as unlocking a door to a structure and/or providing a greetingand/or logistics information.

According to another embodiment of the invention, access to the VALTapplication is protected by biometric recognition of at least one user.Access to the VALT application is granted by the system whenpredetermined biometric data of the at least one user is authenticatedby the system. Authentication is achieved when scanned fingerprintsand/or other physical features of the user are received by input capturemechanisms (e.g., camera, video lens, etc.) of the EM device.

According to another embodiment of the invention, the VALT systemincludes a secondary power source that enables the system to continueworking in the event of a power outage. The secondary power source (a)serves as a backup power source, (b) charges a battery capable ofpowering the system when electricity is not available, and/or (c)contains a backup energy/power device capable of powering the system. Inone embodiment, the secondary power source includes one or more solar(photovoltaic) panels.

According to another embodiment of the invention, the virtual key isoperable to trigger a drone device that retrieves a package and takes itto a designated storage area. Rather than the virtual key being used toaccess a structure, the key activates a drone device that flies to thedelivery area and retrieves the package when the key is scanned.

Another embodiment of the invention includes a system that is referredto herein as “Mapping and Locator Technology” (MALT). The MALT system isan optional or additional feature of the VALT system. In accordance withthe MALT system, a global navigation satellite system, such as theGlobal Positioning System (GPS), is used to interface with multipledevices to initiate access and/or activate messages or logistics whendevices are within a particular range of distance between each other.The MALT system is configured to receive the particular range ofdistance necessary to initiate access and/or messages or logistics. Therange of distance includes but is not limited to, five feet.Alternatively, in another embodiment, the range of distance is less thanfive feet. In yet another embodiment, the range of distance is greaterthan five feet. The GPS detects the geo-location of each device, andwhen it is determined that the multiple devices are within theparticular range of distance of each other, then a number of differentactions are initiated, such as granting access to a structure and/oractivate messages and logistics.

The MALT system, utilizing a standard GPS service, is operable toestablish a relationship between a host device and one or more mobiledevices running the VALT application. The mobile devices include, butare not limited to, mobile smartphones and smart wearable devices. Thehost device comprises a computer processor and is linked to each mobiledevice using the IP address of each mobile device. In one embodiment,the host device is an AI device. When the mobile device comes withinproximity of the host device, the host device initiates one or moreactions, such as providing access to a structure and/or providing agreeting and/or logistics information. This feature eliminates the needfor optics and/or near-field communications (NFC). When utilized indelivery services it enables the carrier to simply arrive and comewithin proximity of the host device.

In another embodiment, the MALT system, utilizing a standard GPSservice, is configured to establish a relationship between a mobiledevice and a specific landmark or address. When the mobile device iswithin proximity of the specific landmark or address, access orlogistics are activated utilizing. The mobile devices include, but arenot limited to, mobile smartphones or a mobile device (e.g., carrier'sDIAD) which are be utilized for access and logistics. This featureeliminates the need for optics and/or near-field communications (NFC).When utilized in delivery services, it enables the carrier to simplyarrive and come within proximity of the landmark or address.

The MALT system is configured to interface with devices of VALT members.Information and logistics are programmed into each carrier's mobiledevice and when the carrier's mobile device is within proximity of alandmark or address, access and directives are initiated.

According to a preferred embodiment, the MALT system is operable toutilize a virtual key for added security. The host device is the AI EMdevice 10 described above. The AI EM device 10 is linked to a mobiledevice using the IP address of the mobile device. In addition, a virtualkey is created and transmitted to the linked mobile device. When themobile device comes within proximity of the AI EM device 10 and thevirtual key is read by the AI EM device 10, the host device initiatesone or more actions, such as unlocking the door to the structureoperatively connected to the AI EM device 10 and/or providing a greetingand/or logistics information. In order to initiate the action, thelinked mobile device must be within the particular predetermined rangeof distance of the AI EM device 10 and the AI EM device 10 must read thevirtual key from the mobile device. This provides an added layer ofsecurity. The virtual key includes, but is not limited to, a bar code, agraphic image, such as a photograph, and/or an alphanumeric codecomprised of letters and/or numbers. Preferably, the virtual keycomprises a graphic image and an alphanumeric code. If weather or otherissues prevent the AI EM device 10 from being able to read the graphicimage, the AI EM device 10 is operable to read the alphanumeric code.

In a method according to a preferred embodiment of the invention, theMALT system is operable to be used in a delivery process. When deliveryof an item, such as package or letter, is anticipated, a virtual key iscreated and transmitted, such as by e-mail or text, to the deliveryservice responsible for delivering the item. The virtual key preferablycomprises a graphic image and an underlying alphanumeric code. Thevirtual key is created by taking and selecting a photograph and enteringa series of alphanumeric characters. Alternatively, the virtual key iscreated via a user device corresponding to a seller of the item to bedelivered, and the seller user device transmits the virtual key to theuser device of a recipient and the user device of the delivery serviceresponsible for delivering the item. The delivery service transmits thevirtual key to the mobile device of the delivery person delivering theitem. In addition, the delivery person's mobile device is linked to therecipient's AI EM device 10 via the IP address of the mobile device. TheAI EM device 10 is provided at the home of the recipient. The AI EMdevice 10 is operatively connected to an access point of a structure,such as the front door of the recipient's home whereby the AI EM device10 is configured to lock and unlock the front door. When the deliveryperson arrives at the recipient's home, the delivery person presents thevirtual key on his mobile device to the AI EM device 10. When the AI EMdevice 10 detects that the delivery person's linked mobile device iswithin the required range of distance and reads the virtual key on themobile device, the VALT system initiates one or more actions, such asprovide access (such as by unlocking the front door), provide apreprogrammed message to the delivery person, contact the recipient orother appropriate individual(s), date stamp delivery, notify appropriateindividuals of delivery (such as the intended recipient), initiatetwo-way communication between the recipient and the delivery person,activate the camera, activate motion detection, and activate an AIdevice which interfaces with the VALT system providing instructions,directives, etc.

The MALT feature is operable to be activated or canceled via the VALTapplication. VALT offers at least two levels of authentication andconvenience: (1) image identification with a code to prevent theforwarding or transfer of the image, and (2) code detection via NFC forthe purposes of verifying the image code. The use of GPS makesdeliveries interactional and intuitive by providing immediate accessand/or information or directives.

Mobile electronic devices and GPS provide advantages over GPS andvehicle location. The VALT application uses GPS to provide deliveryconfirmation when the mobile device of the carrier and the VALT host arein proximity. As shown in FIG. 9, a mobile electronic device 60 istracked by the AI EM device system, wherein a location of a mobileelectronic device 102 of a third party 102, such as a mobile phone orbeacon with respect to an access point 90, as represented by display 15of the AI EM device system, as an example. It is to be understood thatthe tracking is accomplished without any display output, however thedisplay 15 is provided on the AI EM device 10, and/or on the thirdparty's mobile electronic device and/or an administrator's mobileelectronic device. The AI EM device system 100 is operable to provide acontextual greeting when the third party's mobile electronic devicemoves within a threshold distance from the AI EM device 10, such aswithin about 20 m or less, about 10 m or less, about 5 m or less and anyrange between and including the threshold ranges provided. Thecontextual greeting includes the name of the person associated with thethird party mobile electronic device or the name of a company that theyare associated with. The AI EM system is operable to provide a greetingand/or logistic instructions for delivery of a package, such as “Hi UPSdriver, please place the package in the storage container on the porch.”This tracking and display feature is provided and/or accessed by anadministrator on an electronic device including a mobile electronicdevice. Furthermore, the display on the AI EM device is operable to showthe location of a tracked delivery person, as shown. The AI EM systemenables a person to pull up the location of a delivery person beforeleaving or entering their home to know when to expect a delivery.

As shown in FIG. 10, an exemplary storage container 70 has a firstcompartment 74 and a second department 76 formed by a divider 75. Thefirst compartment has a heating device 80 and the second compartment hasa refrigeration device 86. Also, the UV lights 73, 73′ are configured toproduce a disinfecting UV light used to disinfect packages and contentswithin the storage container. The storage container 70 is alsoconfigured with a lock, which is an electronic lock that is unlocked andlocked by the AI EM device system when a virtual key is verified. Thestorage container also has a light 84 and a speaker 82. The light isoperable to be used to aid in finding and opening the storage container,when used after dark and the speaker is operable to be used to emitaudible phrase from the AI EM device system, such as logisticinformation. For example, and not limitation, the audible phrase isoperable to direct the delivery person to place a package in a specificcompartment of the storage container. Also, the speaker and light arefurther operable to be used as an alarm in the event the storagecontainer is jostled or moved or in the event that the storage containeris opened without authorized access.

As shown in FIG. 11, a mobile electronic device 60 is configured todisplay a plurality of digital images 66, which includes, but is notlimited to, digital photographs that, in series, are an image virtualkey 50, 50′, 50″ configured to be identified by the camera of the AI EMdevice and verified for access to an access point. For example, and notlimitation, a user device is configured and operable to receive aplurality of digital images or photographs from the EM system as asingle file or in separate files. The EM device is configured toreceived displayed virtual key images via the camera of the EM device.The displayed virtual key images correspond to a sequence. For example,and not limitation, the sequence includes dog, balloons, cat. The AI EMsystem is operable to unlock a lock when a virtual key is verified bythe AI EM device.

As shown in FIG. 12, an exemplary AI EM system 100 requires a virtualkey to be selected on a display screen 15, from a plurality of digitalimages 66, before a lock is unlocked. The AI EM device 10 includes adisplay screen 15 that includes, but is not limited to, a touch screen17 that is configured to receive a selection of at one or more digitalimages for entry. For example, and not limitation, the AI EM device isconfigured to receive a selection of a plurality of digital images toproduce a virtual key and the image virtual key requires each imagevirtual key 50, 50′, 50″ to be selected in a specific sequence, such asballoon, dog, cat, for example. A plurality of other digital images 66or photographs are also displayed on the display screen during theselection or entry of the virtual key. Again, the AI EM system isoperable to automatically send an image virtual key. The user device isconfigured to display the virtual key and to receive a selection ofimages corresponding to the virtual key. The AI EM system is operable tosend image virtual keys to a user device when a user corresponding tothe user device is expected to arrive, such as to a cleaningprofessional prior to their weekly scheduled arrival.

As shown in FIG. 13, an exemplary AI EM system 100 requires a virtualkey to be selected on a display screen 65, of a mobile electronic device60, from a plurality of digital images 66, before an access point isunlocked. The AI EM device 10 is operable to communicate with the mobileelectronic device through a wireless signal 25, such as a Bluetoothsignal and send a plurality of digital images for the person to selecton their own mobile device to enable entry to an access point. In oneembodiment, the plurality of digital images are configured in a grid andinclude one or more images that were sent previously to said user devicevia the AI EM system. The user device is operable to receive a selectionof images when approaching the AI EM device 10. The user device isfurther operable to receive a selection of a plurality of digital imagesto produce a virtual key. The image virtual key requires each imagevirtual key 50, 50′, 50″ to be selected in a specific sequence, such asballoon, dog, cat, for example. In another embodiment, a plurality ofother digital images 66 or photographs are displayed on the displayscreen 65 during the selection or entry of the virtual key. Again, asystem administrator device, or the AI EM system is operable toautomatically, send an image virtual key. The user device is configuredto display the virtual key via display screen and to receive a selectionof at least one image corresponding to the virtual key via a touchscreen. The AI EM system is operable to send image virtual keys to auser device based on when the user corresponding to a user device isexpected to arrive, such as to a cleaning professional prior to theirweekly scheduled arrival.

In another embodiment, the AI EM device 10 is positioned on the storagecontainer and includes a speaker and camera configured to interface withthe person to scan a virtual key and provide access to the storagecontainer and/or another access point. An exemplary storage container 70comprises a closure sensor 87 that detects the position of a storagecontainer closure, such as a lid or door. In the event the closure isopened without authorization, the light 84 and/or speaker 82 isactivated to produce an alarm. Also, an exemplary storage containerincludes accelerometer 88 that detects motion and when the motion abovea motion threshold is detected, an alarm is activated on the storagecontainer and/or EM device. An exemplary storage container, in oneembodiment, includes but is not limited to, a global positioning system(GPS) location device 89 that is used to monitor a location of thestorage container and when the storage container is moved beyond aperimeter limit or a threshold distance from a location, an alarm isactivated on the storage container and/or EM device. These theftprevention measures help to ensure that packages delivered into astorage container and the storage container are not stollen.

Referring now to FIGS. 14 and 15, an exemplary AI EM system 100,comprises an AI EM device 10 an access point 90, the front door to thehome and 90′ a storage container 70, as well as a plurality of robots110, aerial robots 111, 111′, 111″ and 111′″ that are configured to dockon corresponding docking stations 140, 140′, 140″ and 140′″. The dockingstations are configured to provide power to the robot via a chargingport 142 and/or interchangeable batteries 115, 115′, 115″. A battery onthe robot 115 is charged by the charging port 142 when the robot isdocked on the docking station 140, and/or the battery on the robot isoperable to interchanged with a battery of the docking station. In oneembodiment, the power for the charging of the batteries are from a powersource of the building, such as from a power line 144 that is pluggedinto or otherwise coupled with the building electrical power system. Inyet another embodiment, the power comes from a renewable power source,such as a solar panel 152. The power generated from the solar panel iscoupled directly with the docking station(s) and is configured on ornear the docking stations. Although the drones and robots of the presentinvention are described as docking or patrolling specific locationsthroughout the present application, one of ordinary skill in the artwill understand that the drones and robots are operable to be locatedanywhere on a premises or property, including out of a line of sight ofan AI EM device, or hidden or otherwise obscured from plain view. In oneembodiment, the drone or robot includes camouflage. Alternatively, adocking station of a drone or a robot is located in an enclosure suchthat the drone or robot is not visible until the drone or robot movesfrom within the enclosure to outside the enclosure. In one embodiment,the enclosure includes a door which is operable to be opened by therobot via physical contact or via electronic communication such as shortrange communication (BLUETOOTH®, NFC, RF, etc.).

Four of the docking stations are configured proximal to the corners ofthe building to provide substantially complete perimeter monitoring viathe camera 112, motion detector 120 and/or microphone 117 on the robot110, such as the aerial robot 111. Also, the docking station 140includes a camera 145, motion detector 146, microphone 147 and/or aspeaker 148. The docking station also effectively monitors an areaaround an access point, such as around a perimeter of a home orbusiness. The docking station emits an alarm when motion is detected orwhen a threat is detected by the robot or docking station. In the eventthat the camera on either the robot or the docking station detectsmotion for example, the aerial robots are deployed from the dockingstation to investigate more closely by flying to be in closer proximityto the source of the motion and/or sound. An alert is provided to theintelligence EM system 100 and images and audio received by themicrophone, of the robot or docking station, are transferred in realtime to the intelligence EM system 100 for an administrator to review.Also, the access points are operable to be locked in the event that anymotion or sound above a threshold amount is detected. The robot isoperable to act autonomously when monitoring the perimeter of thebuilding and is operable to interface with the intelligence EM system100 only when the detected sound or movement is determined to be threat.A robot is configured for surveillance or a property or an area around abuilding or access point and includes a camera that is operable todetect motion and a microphone to detect sound. The robot(s) is operableto act independently to monitor, record events detected and/or follow athreat or person that is detected.

In another embodiment, a robot is programmed with one or more patrolroutes on a predetermined schedule within a property, with the one ormore patrol routes controlled or determined by the EM device or asoftware platform to which the EM device is connected over a network.The software platform preferably includes at least one server or atleast one edge device. Alternatively, the software platform is acloud-based platform. The patrol routes are operable to include randommovement across a property, a patrol around a perimeter of a property, apatrol around a perimeter of a house, a patrol around the outside of aspecific area of a house such as the front porch or bedrooms, or anycombination thereof. Patrol routes are operable to differ based on theday of the week or the time of day.

In another embodiment, robots are operable to maintain one or morepatrol positions within a property. By way of example and notlimitation, a patrol position includes a position where the robot is ina stationary position or substantially stationary position (e.g.,hovering in a predetermined location). In the patrol position, the robotis operable to use any method of detecting potential objects, people,threats, vehicles, events, activities, or any other object or motiondescribed herein or known in the art. The robot preferably sends anotification or alert to a device associated with the platform upondetection of an object or motion. In an exemplary embodiment, the robotis a drone operable to hover in a patrol position above a property suchthat the drone has a view of a certain portion of the property or theentirety of the property. In one embodiment, a geofence is utilized torestrict the area of detection for the drone. A geofence includes anygeofence described herein or known in the art. The drone is operable toreturn to a docking station when a battery of the drone is low torecharge. In one embodiment, the EM device or the platform is operableto instruct a second drone to take up a secondary patrol position nearthe drone in the patrol position before the drone in the patrol positionreturns to the docking station to recharge. In this embodiment, theproperty always has a drone in a patrol position capable of detectingmotion or any other action or object described herein. Additionally, thedrone and the second drone are operable to implement whitelisting rulesto prevent notifications from being sent to upon the drone detecting thesecond drone or the second drone detecting the drone. The robots areoperable to work in conjunction with other security, surveillance, orthreat detection systems when on a patrol path, in a patrol position, inpursuit of an object, or in any other position described herein.Preferably, the platform or EM device of the present invention isoperable to control the security, surveillance, or threat detectionsystem, including activation of the system, determining which areas in aproperty should be scanned, and managing notifications to devicesassociated with the platform. By way of example and not limitation,threat detection systems include counter drone systems and unmannedaerial vehicle deterrent systems, including radar systems. Examples ofthese systems are described in US Patent Pub. No. 20200363824, US PatentPub. No. 20210302533, and U.S. Pat. No. 10,408,936, each of which isincorporated herein by reference in its entirety. Preferably, the threatdetection system does not emit a signal detectable via radar outside ofa boundary of the property in which the threat detection system isimplemented or far beyond the boundary of the property in which thethreat detection system is implemented. This passive radaradvantageously prevents detection of the threat detection system byother devices that are not within the property or not close to thethreat detection system. However, one drawback of passive radar or radarthat does not emit a large radar signature is that such systems often donot detect smaller drones such as mini drones. Accordingly, by using acombination of the threat detection system and drones of the presentinvention operable to detect motion, the present invention is operableto detect typical size drones and smaller drones such as mini droneswithout emitting a large radar signature.

In one example, drones associated with the platform or EM device of thepresent invention are whitelisted and therefore no notification isgenerated when a threat detection system such as a counter drone systemdetects the drones associated with the platform or EM device of thepresent invention. Similarly, devices associated with the threatdetection system are whitelisted and no notification is generated whendrones associated with the platform or EM device detect devicesassociated with the threat detection system. In an exemplary embodiment,one or more drones are operable to take a patrol position in the air orfollow patrol paths while the threat detection system is operable to bestationed on the ground. In one embodiment, the threat detection systemis operable to be moved to continuously scan different areas, orcomponents of the threat detection system are operable to be moved whilethe base of the threat detection system is stationary to continuouslyscan different areas. The one or more drones are operable to move incoordination with the threat detection system to cover different areassimultaneously. The drones are operable to communicate with the platformand the threat detection system regarding detected motion, including thegeolocation of the detected motion, and to track an object or personassociated with the detected motion. The drones are also operable tocommunicate with the platform and instruct the platform to send acommand to the threat detection system to scan an area in which one ormore drones observed motion. The combination of the drones which are ina patrol position or on a patrol path and the threat detection system isoperable to be utilized in areas with lots of people, chemicals, orother vulnerable locations, such as airports, military bases, militarycamps, prisons, theaters, stadiums, arenas, chemical facilities,government buildings, compounds, etc. Advantageously, the drones and thethreat detection system are operable to be deployed inside a building,outside of a building, or a combination thereof. In one embodiment, thedrones are mini drones, such as drones operable to participate in adrone swarm.

In one embodiment, the robots include image recognition technology toassist in providing security for a property. Alternatively, the platformof the present invention is operable to provide image recognitiontechnology upon receiving images or videos from a robot. In one example,the image recognition technology includes facial recognition technology,whereby certain people are whitelisted (i.e., allowed on the premises)or blacklisted (i.e., not allowed on the premises). Upon detection of ablacklisted person on the premises, the robot is operable toautomatically send a command to the EM device to alert the authorities,a registered user device associated with the EM device, or a guestdevice granted access by the EM device upon recognition of a blacklistedperson. Alternatively, the platform is operable to receive the image orvideo, recognize the blacklisted person, and alert the authorities, aregistered user device associated with the EM device, or a guest devicegranted access by the EM device. In one embodiment, recognition of awhitelisted person causes an alert to be sent to a registered userdevice associated with the EM device or a guest device granted access bythe EM device. The EM device is operable to communicate with a databaseor web crawler to retrieve information relating to an unknown person, ablacklisted person, or a whitelisted person based on facial recognition.In one embodiment, the information includes an identification of acareer or position of the person, information about a company associatedwith the person, an age of the person, an identification of any criminalhistory, litigation history of a person, mutual contacts between anowner of the EM device and the person, or any other informationavailable from a web search, an online criminal background search, or asocial media search including recent activity, media, posts, reportedlocations of the user, etc. In the event that facial recognition is notpossible due to concealment of the user's face, such as via a mask, ahood, sunglasses, or any other face obscuring article or item, the robotis operable to automatically send a command to the EM device to alert aregistered user device associated with the EM device or a guest devicegranted access by the EM device.

The EM device is also operable to include a facial recognition moduleoperable to identify individuals who are approaching the access pointand identify the individuals as authorized or unauthorized individuals.The EM device is operable to automatically transmit a lock command tothe electronic lock when an unrecognized or unauthorized individualapproaches the access point. Advantageously, this command is operable tobe sent when the individual is more than a predetermined distance awayfrom the access point, such as 1 meter away or more than 2 meters awayfrom the access point, thereby effectively locking an access pointbefore the unauthorized or unrecognized individual is able to open theaccess point. The EM device is operable to automatically send a commandto the at least one secondary camera to zoom in on a face of at leastone unrecognized individual within a predefined distance of the accesspoint. If the facial recognition module identifies an unauthorizedindividual, then the EM device automatically transmits an alert to atleast one registered user device associated with the access point. TheEM device is operable to activate and/or deactivate the at least onerobot, and wherein activation of the at least one robot causes the atleast one robot to track and follow at least one individual proximate tothe access point.

In another embodiment, image recognition technology includes weaponrecognition technology providing for recognition of weapons. Uponrecognition of a weapon, such as a firearm, a knife, a crowbar, abaseball bat, etc., the robot automatically sends a command to the EMdevice to alert the authorities, a registered user device of the EMdevice, or a guest device granted access by the EM device.Alternatively, the platform is operable to receive the image or video,recognize a weapon, and alert the authorities, a registered user deviceassociated with the EM device, or a guest device granted access by theEM device. In another embodiment, image recognition technology providesfor recognition of threatening or damaging actions, such as kicking adoor, breaking a window, throwing an object at a house, shooting afirearm, physical violence such as hitting another person, or injury ormedical emergencies such as someone falling, fainting, or passing out.Upon recognition of this action, the robot sends a command to the EMdevice to alert the authorities, a registered user device of the EMdevice, or a guest device granted access by the EM device uponrecognition of the action. Alternatively, the platform is operable toreceive the image or video, recognize an action, and alert theauthorities, a registered user device associated with the EM device, ora guest device granted access by the EM device. Artificial intelligenceor machine learning algorithms are utilized by the platform connected tothe EM device in one embodiment to assist in image recognition.

In another embodiment, the robots or the platform include audiorecognition technology which is operable to identify and classifycertain sounds. Examples of recognizable sounds include a gunshot, glassbreaking, screaming or yelling, or any other sound that signifies athreat, a potential threat, violence, or physical injury. Uponrecognition of a recognizable sound, the robot sends a command to the EMdevice to alert the authorities, a registered user device of the EMdevice, or a guest device granted access by the EM device uponrecognition of the action. Alternatively, the platform is operable toreceive the audio, recognize the recognizable sound, and alert theauthorities, a registered user device associated with the EM device, ora guest device granted access by the EM device. Artificial intelligenceor machine learning algorithms are utilized by the platform connected tothe EM device in one embodiment to assist in audio recognition.

A docking station 140 is configured on the ground or on anotherstructure 170 detached from the building 93, such as a dwelling 91,having an access point 90, such as a door 92. This structure 170 furtherincludes an access point 90′, such as a door 92′ and for example, andnot limitation, be a shed or other dwelling or building. In oneembodiment, the structure is specific for docking and be configuredproximal to the ground for servicing.

Referring now to FIGS. 16, 17 and 18, an exemplary docking station 140is configured under the eave 200 of a home, or under the gutter 202 forprotection from the elements. The docking station includes a dockingstation light 149, which is operable to act as an exterior light orflood light. As shown in FIG. 16, the aerial robot 111 is configured ontop of the docking station 140, between the docking station and the eave200 and gutter 202. The docking station light 149 is on to provideillumination which aids in the aerial robot surveilling an area aroundthe home. A second aerial robot 111′ is flying above the roof 204 of thehome. The details of the docking station 140 are shown in the dockingstation in the circle, for clarity. The docking station includes, but isnot limited to, any of the components as describe and shown in FIG. 15.As shown in FIG. 17, the aerial robot 111 is configured on under thedocking station 140 and under a docking cover, a dome shaped cover toprotect the aerial robot from the elements. The docking cover istransparent to enable surveillance through the cover by the motiondetector 120 and/or camera 112 of the aerial robot. A docking extension141 is coupled with the docking station 140 to retain the aerial robot111 to the docking station. Again, the docking station includes, but isnot limited to, any of the components as describe and shown in FIG. 15.As shown in FIG. 17 the aerial robot is coupled with a docking station140 that is also a light fixture 160, such a flood light for the home.The aerial robot is small and inconspicuous with respect to the lightfixture. As shown in FIG. 18, the aerial robot 111 is dockedhorizontally via the docking extension 141 that is coupled with thedocking station 140. The docking extension is operable to extend fromthe top, bottom or side of the aerial robot. The docking extension orreceiver on the docking station for the docking extension includes alatch or pin or other mechanical retaining mechanism to keep the aerialrobot securely docked.

A robot is operable to be activated to begin surveillance by the system,or by a separate mobile device. For example, and not limitation, therobot(s) are operable to be activated to monitor an area around a homewhen occupants leave. A robot is operable to interface with anysmart-home system, a system configured to lock and unlock doors foraccess to a building, such as a home and place of business. A smart-homesystem includes, but is not limited to, an AI EM system as describedherein. A robot is operable to be controlled by the smart-home system,wherein they receive instructions through a wired or wireless connectionwith the smart-home system to perform a function. A robot includes someautonomous functions, such as surveillance, monitoring and capturingimages and sound recordings. Also, a robot is operable to actindependently to follow a threat to record images of said threat and/orvehicle. In another embodiment, a robot or drone is operable to dispensea dye, liquid marker, or other marker or identifier onto an object orperson when the object or person is identified as a threat by the droneor robot to provide for easy identification of the object or person byauthorities or other parties.

In one embodiment, the EM device instructs one or more robots to patrolthe premises for a vehicle and capture images of a vehicle, including alicense plate, if a person is detected by the EM device or by anotherdevice in network communication with the EM device or another devicethat transmits an alert to the EM device regarding detection of a personon the premises. As described above, the or more robots are operable torecognize the license plate characters and send these characters to theplatform and/or the law enforcement device in one embodiment. In oneembodiment, the one or more robots or another device connected to theplatform of the present invention such as a camera includes a licenseplate reader such as an automated license plate reader. Alternatively,recognition of the license plate characters is performed via software onthe platform according to any method known in the art, including but notlimited to optical character recognition. In one embodiment, the images,license plate characters, locational information, and/or directionalinformation are sent to a platform of the present invention.Additionally, the images, license plate characters, locationalinformation, and/or directional information are operable to be sentdirectly to a law enforcement device, either through the platform or bythe robot directly. Alternatively, other devices such as cameras areinstructed by the EM device to capture images or videos of a vehicle.These instructions include movement or pivoting of a camera or a camerazooming in or out in one embodiment. This functionality is useful forcataloging a list of visitors to a property or premises, and in oneembodiment the platform or the EM device creates a searchable databaseof visitors who have visited a property along with a time of entry tothe property, a time of exit from the property, a duration of time spenton the property, and an identification of guests with a person duringtheir visit. If a person is not detected damaging property on camera,but property damage occurs the day a person visited the premises, thisinformation assists a resident and the authorities in obtaining moreinformation about potential suspects.

One or a plurality of the robots and in particular aerial robots isoperable to monitor and track a threat, such as an unauthorized personon or around an access point. The robot or robots are deployed from adocking station and follow the threat for closer surveillance. Therobot(s) 110 is operable to activate the robot light 119 to deter thethreat. The light is operable to flash and in one embodiment, is abright light, such as more than 500 lumen or more than 1,000 lumen. Thelight is operable to flash rapidly such as about 1 hertz or more, orabout 2 hertz or more, about 5 hertz and any range between and includingthe cycles per second provided. This bright rapidly flashing lighteffectively deters the threat. Also, the robot or robots are operable toemit an alarm by the robot speaker 116 and this alarm is operable to bedirected at the threat via the directional speaker capability asdescribed herein. By way of example and not limitation, the EM system isconfigured to receive input to activate the alarm or siren, such as theEM system is notified of activity detected by the robot. The EM systemis configured to send a picture or video of an intruder that is activelymoving about the building to a user device. The EM system is configuredto receive a selection to activate the alarm, and or deploy the robotsto take action to deter the intruder via the user device. The alarm orsiren is operable to generate a sound at about 75 decibels or more,about 100 decibels or more, about 120 decibels or more and any rangebetween and including the sound levels provide. The docking stations areoperable be activated when a threat is detected and emit a bright lightand also an alarm having the lumens and decibel levels, respectively, oreven higher lumens and decibels. A first robot detects a threat and therobot is operable to communicate with one or more additional robots toenable additional robots to find the threat, such as by communicating alocation of the first robot. The robots include GPS location and areoperable to use this to ensure that they do not collide with oneanother. A plurality of aerial robots is operable to create a robotswarm around a threat to effectively deter the threat. The robot swarmof flying aerial robot further includes one or more of the aerial robotsemitting a light deterrent and/or sound deterrent.

In one embodiment, a robot includes a physical deterrent 122, or adeterrent that is carried by the robot and delivered to the threat, suchas being projected at a threat, such as pepper spray 124, a stunningdevice 125, a net, a projectile such as a bullet, a fluid such as a dyeor foul smelling fluid. One or more of the robots, such as an aerialrobot is operable to dispense pepper spray at a threat to effectivelydeter the threat from proceeding. When a dye is dispensed by a robot ona threat, the dye helps authorities to later identify the threat as theyleave the area. A stunning device includes electrodes to deliver anelectrical shock and this disables the threat temporarily. The robot isoperable to project the electrodes at the threat or deliver theelectrodes to the threat, such as by intercepting with the threat. Anaerial robot is operable to fly into the threat with an electrode armedto deliver the stunning and immobilizing electric shock. Likewise, arobot is operable to project a net over a threat. When the threat isdisabled by the pepper spray, a stunning device, or by a net, anadministrator and/or the authorities are contacted by the AI EM system,including directly by the robot. A very bright light, or flashing light,as well as an alarm or siren is used as a deterrent that is projected ata threat, as described herein.

A robot is operable to be weaponized to do bodily harm and is configuredwith a weapon, such as a gun to shoot a projectile into a threat, or apiercing object, such as a knife or spear. In one embodiment, a robot isconfigured to project the bullet, knife or spear at the threat from adistance, or delivery a projectile to a threat when they intercept thethreat, such as by flying into the threat. A small charge projects abullet into the threat when the aerial robot intercepts the threat. Inone embodiment, a knife or spear is retractable and is deployed prior tointercepting with a threat.

The AI EM system is activated when unauthorized persons or activity isdetected by the EM device and/or when inputs are received by the system(e.g., from a mobile device), smart mobile device, smart wearabledevice, or other input device, thereby enabling monitoring andsurveillance by the robot(s) and/or through the AI EM system or EMdevice. In one embodiment, the robots are configured to travel in aprogrammed path in a routine manner to provide improved surveillance ofthe premises. The AI EM system is operable to program the robot orrobots to fly around the building such as a home every 10 minutes, orhave one of the aerial robots flying in a prescribed path while theother robots remain stationed on their docking stations based on inputreceived (e.g., via the user device). The robots are operable toalternate which one is conducting a surveillance route, such as asurveillance flight path around a building, for example. Other flightmaneuvers are programmed in as well, such as a deterring and coordinatedflight path by a plurality of aerial robots. An administrator userdevice is operable to control when the aerial robots run surveillanceand to direct aerial robots to return to a docking station, such as whenbad weather is approaching.

Robots are configured to communicate directly with each other, whereinwhen a first aerial robot finishes a surveillance route or flight path,it is operable to communicate with a second aerial robot which is thenoperable to fly a surveillance route before docking and communicatingwith the first or another, third aerial robot. The robots alsocommunicate collectively with the controller or the EM system, and/or anauthority, such as the police when required, such as when an intruder isdetected or when requested by an administrator.

A robot is configured within a building, such as within a home and isconfigured to open an access point, such as the door for greeting aperson or visitor or delivery person. The robot is operable to producean audible greeting to the person and this audible greeting includes acustomized greeting as the AI EM system opens another access point fordelivery of a package or give logistic instruction to the person. Therobot is operable to take a package from the person and deliver thepackage to an access point such as to a storage container or inside ofthe home, behind a door which is an access point. The robot isconfigured with a camera to scan a package including an address, orcode, such as a bar or QR code to determine what the appropriate actionshould be with respect to the package. The AI EM system in combinationwith the robot(s) is operable to act as a security system around anaccess point, such as around a home or storage container.

Data recorded by the AI EM system including images, including still andvideos, and audio recording captured by the AI EM device or robot(s) isstored on a SIM card or a local data storage device, and/or is uploadedto the cloud for safety and security. The AI EM system is configured todisplay the recorded files and to identify a threat and/or a threat'svehicle based on the recorded files. As described herein, the robots areoperable to be programed to capture images of license plate and/or otheridentifying features of a threat or a threat's vehicle.

The GPS application comprises a device capable of being tracked by GPS.The device is a mobile device or other device capable of being trackedby GPS. When the GPS device and the host device are in proximity, accessand/or messaging and logistics is triggered. The host device is an AIdevice. The robots include a GPS application.

According to another embodiment of the invention, access and/ormessaging is triggered when a linked mobile device is within apredetermined distance of a particular address. In such embodiment, ahost device is not needed.

According to another embodiment of the invention, the MALT systemcomprises a transponder device that is positioned at a specificlocation, such as a location where a delivery is to be made. Thetransponder device is used to identify the location of an object orlocation not associated with an address or landmark. This isparticularly useful for rural delivery locations that do not have avalid or determinable address. For example, the transponder device ispositioned on a mailbox or house where a delivery is to be made.

In one embodiment, the transponder device is a GPS transponder thattransmits a signal to a receiver device. The transponder device ispositioned at a particular location, such as a storage facility,building or house, or on a particular object, such as a box orcontainer. The receiver device is a GPS-integrated smartphone with GPStracking software. The transponder is positioned at a location where anitem is to be delivered. The receiver smartphone is provided to adelivery person responsible for delivering the item. The transpondertransmits a signal to the smartphone guiding the delivery person to thetransponder.

The transponder has an identifier number or signal that is programmedinto a device or a master server, or other designated application. Thedesignated controller device or application programs the transponder totransmit a signal to one or more receiving devices, such as a mobilephone or other device, utilizing GPS capabilities.

The GPS transponder is operable to serve as a guide to a specific box,package, location or object that does not have an association with a GPSaddress in a mapping application. The transponder is operable to confirmthe correct and appropriate match with a receiver device whenidentified. The transponder serves as a beacon/locator device fordeliveries or pickup.

The system is operable to be used by delivery personnel to facilitatedelivery of an item. The system is operable to be used by firstresponders, such as law enforcement officers, fire fighters andemergency medical personnel, to help them find a particular location.The system is operable to be used in any circumstance to help locate astationary structure or moveable object.

The GPS transponder is preferably physically attached to or built intodevices, boxes, or objects. The transponder is reusable and added andremoved for similar uses. The transponder is disposable.

The transponder is operable to be utilized to assist a delivery personlocate a specific package or mailbox within a high-rise building orapartment. The transponder is utilized to identify or locate a package,mailbox or location when weather or other conditions interfere with GPSmapping satellites.

Once the transponder and the receiver establish a match, the transponderis operable to be reprogrammed to match with other receivers. Thetransponder is operable to be programmed to signal one or morereceivers. The transponder utilizes GPS technology to assist inestablishing a relationship with one or more receivers. The GPStransponder is battery powered or hardwired if at a fixed location.

According to an embodiment of the invention, the system is used to trackthe location of a package. The GPS transponder is fixed to the packageand transmits a signal to the receiver indicating the location of thepackage.

According to an embodiment of the invention, the system includes acontainer that is adapted to automatically open when the receivingdevice is within a specific range or proximity of the transponder.

According to an embodiment of the invention, an action is triggered whenthe receiver device (e.g., smartphone, smart wearable device) comeswithin a certain range or proximity of the transponder. In oneembodiment, the action is a text message provided to the smartphone, orthe event is access granted to the building where the transponder islocated. Access is granted by unlocking an electronic lock on door ofthe building.

In an alternative embodiment, the transponder functions outside of a GPSnetwork and is independent of GPS. The transponder utilizes a uniqueidentifier network.

The AI EM system as disclosed herein is further operable for securityapplications including vault security systems, object security systems,art work security systems, security surveillance systems, factorysecurity, machine security, and theft protection systems.

The AI EM system is operable to utilize a plurality of learningtechniques including, but not limited to, machine learning (ML),artificial intelligence (AI), deep learning (DL), neural networks (NNs),artificial neural networks (ANNs), support vector machines (SVMs),Markov decision process (MDP), and/or natural language processing (NLP).The AI EM system is operable to use any of the aforementioned learningtechniques alone or in combination. In one embodiment, the AI EM systemor device utilizes an autoregressive language model that uses deeplearning such as Generative Pre-trained Transformer 3 (GPT-3).

Further, the AI EM system is operable to utilize predictive analyticstechniques including, but not limited to, machine learning (ML),artificial intelligence (AI), neural networks (NNs) (e.g., long shortterm memory (LSTM) neural networks), deep learning, historical data,and/or data mining to make future predictions and/or models. The AI EMsystem is preferably operable to recommend and/or perform actions basedon historical data, external data sources, ML, AI, NNs, and/or otherlearning techniques. The AI EM system is operable to utilize predictivemodeling and/or optimization algorithms including, but not limited to,heuristic algorithms, particle swarm optimization, genetic algorithms,technical analysis descriptors, combinatorial algorithms, quantumoptimization algorithms, iterative methods, deep learning techniques,and/or feature selection techniques.

FIG. 19 is a schematic diagram of an embodiment of the inventionillustrating a computer system, generally described as 800, having anetwork 810, a plurality of computing devices 820, 830, 840, a server850, and a database 870.

The server 850 is constructed, configured, and coupled to enablecommunication over a network 810 with a plurality of computing devices820, 830, 840. The server 850 includes a processing unit 851 with anoperating system 852. The operating system 852 enables the server 850 tocommunicate through network 810 with the remote, distributed userdevices. Database 870 is operable to house an operating system 872,memory 874, and programs 876.

In one embodiment of the invention, the system 800 includes a network810 for distributed communication via a wireless communication antenna812 and processing by at least one mobile communication computing device830. Alternatively, wireless and wired communication and connectivitybetween devices and components described herein include wireless networkcommunication such as WI-FI, WORLDWIDE INTEROPERABILITY FOR MICROWAVEACCESS (WIMAX), Radio Frequency (RF) communication including RFidentification (RFID), NEAR FIELD COMMUNICATION (NFC), BLUETOOTHincluding BLUETOOTH LOW ENERGY (BLE), ZIGBEE, Infrared (IR)communication, cellular communication, satellite communication,Universal Serial Bus (USB), Ethernet communications, communication viafiber-optic cables, coaxial cables, twisted pair cables, and/or anyother type of wireless or wired communication. In another embodiment ofthe invention, the system 800 is a virtualized computing system capableof executing any or all aspects of software and/or applicationcomponents presented herein on the computing devices 820, 830, 840. Incertain aspects, the computer system 800 is operable to be implementedusing hardware or a combination of software and hardware, either in adedicated computing device, or integrated into another entity, ordistributed across multiple entities or computing devices.

By way of example, and not limitation, the computing devices 820, 830,840 are intended to represent various forms of electronic devicesincluding at least a processor and a memory, such as a server, bladeserver, mainframe, mobile phone, personal digital assistant (PDA),smartphone, desktop computer, netbook computer, tablet computer,workstation, laptop, and other similar computing devices. The componentsshown here, their connections and relationships, and their functions,are meant to be exemplary only, and are not meant to limitimplementations of the invention described and/or claimed in the presentapplication.

In one embodiment, the computing device 820 includes components such asa processor 860, a system memory 862 having a random-access memory (RAM)864 and a read-only memory (ROM) 866, and a system bus 868 that couplesthe memory 862 to the processor 860. In another embodiment, thecomputing device 830 is operable to additionally include components suchas a storage device 890 for storing the operating system 892 and one ormore application programs 894, a network interface unit 896, and/or aninput/output controller 898. Each of the components is operable to becoupled to each other through at least one bus 868. The input/outputcontroller 898 is operable to receive and process input from, or provideoutput to, a number of other devices 899, including, but not limited to,alphanumeric input devices, mice, electronic styluses, display units,touch screens, signal generation devices (e.g., speakers), or printers.

By way of example, and not limitation, the processor 860 is operable tobe a general-purpose microprocessor (e.g., a central processing unit(CPU)), a graphics processing unit (GPU), a microcontroller, a DigitalSignal Processor (DSP), an Application Specific Integrated Circuit(ASIC), a Field Programmable Gate Array (FPGA), a Programmable LogicDevice (PLD), a controller, a state machine, gated or transistor logic,discrete hardware components, or any other suitable entity orcombinations thereof that can perform calculations, process instructionsfor execution, and/or other manipulations of information.

In another implementation, shown as 840 in FIG. 19, multiple processors860 and/or multiple buses 868 are operable to be used, as appropriate,along with multiple memories 862 of multiple types (e.g., a combinationof a DSP and a microprocessor, a plurality of microprocessors, one ormore microprocessors in conjunction with a DSP core).

Also, multiple computing devices are operable to be connected, with eachdevice providing portions of the necessary operations (e.g., a serverbank, a group of blade servers, or a multi-processor system).Alternatively, some steps or methods are operable to be performed bycircuitry that is specific to a given function.

According to various embodiments, the computer system 800 is operable tooperate in a networked environment using logical connections to localand/or remote computing devices 820, 830, 840 through a network 810. Acomputing device 830 is operable to connect to a network 810 through anetwork interface unit 896 connected to a bus 868. Computing devices areoperable to communicate communication media through wired networks,direct-wired connections or wirelessly, such as acoustic, RF, orinfrared, through an antenna 897 in communication with the networkantenna 812 and the network interface unit 896, which are operable toinclude digital signal processing circuitry when necessary. The networkinterface unit 896 is operable to provide for communications undervarious modes or protocols.

In one or more exemplary aspects, the instructions are operable to beimplemented in hardware, software, firmware, or any combinationsthereof. A computer readable medium is operable to provide volatile ornon-volatile storage for one or more sets of instructions, such asoperating systems, data structures, program modules, applications, orother data embodying any one or more of the methodologies or functionsdescribed herein. The computer readable medium is operable to includethe memory 862, the processor 860, and/or the storage media 890 and isoperable be a single medium or multiple media (e.g., a centralized ordistributed computer system) that store the one or more sets ofinstructions 900. Non-transitory computer readable media includes allcomputer readable media, with the sole exception being a transitory,propagating signal per se. The instructions 900 are further operable tobe transmitted or received over the network 810 via the networkinterface unit 896 as communication media, which is operable to includea modulated data signal such as a carrier wave or other transportmechanism and includes any delivery media. The term “modulated datasignal” means a signal that has one or more of its characteristicschanged or set in a manner as to encode information in the signal.

Storage devices 890 and memory 862 include, but are not limited to,volatile and non-volatile media such as cache, RAM, ROM, EPROM, EEPROM,FLASH memory, or other solid state memory technology; discs (e.g.,digital versatile discs (DVD), HD-DVD, BLU-RAY, compact disc (CD), orCD-ROM) or other optical storage; magnetic cassettes, magnetic tape,magnetic disk storage, floppy disks, or other magnetic storage devices;or any other medium that is operable to be used to store the computerreadable instructions and which is operable to be accessed by thecomputer system 800.

In one embodiment, the computer system 800 is within a cloud-basednetwork. In one embodiment, the server 850 is a designated physicalserver for distributed computing devices 820, 830, and 840. In oneembodiment, the server 850 is a cloud-based server platform. In oneembodiment, the cloud-based server platform hosts serverless functionsfor distributed computing devices 820, 830, and 840.

In another embodiment, the computer system 800 is within an edgecomputing network. The server 850 is an edge server, and the database870 is an edge database. The edge server 850 and the edge database 870are part of an edge computing platform. In one embodiment, the edgeserver 850 and the edge database 870 are designated to distributedcomputing devices 820, 830, and 840. In one embodiment, the edge server850 and the edge database 870 are not designated for distributedcomputing devices 820, 830, and 840. The distributed computing devices820, 830, and 840 connect to an edge server in the edge computingnetwork based on proximity, availability, latency, bandwidth, and/orother factors.

It is also contemplated that the computer system 800 is operable to notinclude all of the components shown in FIG. 19, is operable to includeother components that are not explicitly shown in FIG. 19, or isoperable to utilize an architecture completely different than that shownin FIG. 19. The various illustrative logical blocks, modules, elements,circuits, and algorithms described in connection with the embodimentsdisclosed herein are operable to be implemented as electronic hardware,computer software, or combinations of both. To clearly illustrate thisinterchangeability of hardware and software, various illustrativecomponents, blocks, modules, circuits, and steps have been describedabove generally in terms of their functionality. Whether suchfunctionality is implemented as hardware or software depends upon theparticular application and design constraints imposed on the overallsystem. Skilled artisans may implement the described functionality invarying ways for each particular application (e.g., arranged in adifferent order or partitioned in a different way), but suchimplementation decisions should not be interpreted as causing adeparture from the scope of the present invention.

Certain modifications and improvements will occur to those skilled inthe art upon a reading of the foregoing description. The above-mentionedexamples are provided to serve the purpose of clarifying the aspects ofthe invention and it will be apparent to one skilled in the art thatthey do not serve to limit the scope of the invention. All modificationsand improvements have been deleted herein for the sake of concisenessand readability but are properly within the scope of the presentinvention.

The invention claimed is:
 1. An entry management system comprising: anentry management device including a housing comprising a camera; and asoftware platform; wherein the entry management device is incommunication with the software platform; wherein the camera of theentry management device is operable to read a non-fungible token (NFT)or an image associated with the NFT displayed on at least one electronicdevice; wherein the software platform is operable to authenticate theNFT or the image associated with the NFT; and wherein the entrymanagement device is operable to perform an action upon theauthentication of the NFT or the image associated with the NFT.
 2. Theclaim 1, further comprising an access point comprising an electroniclock that is operable to lock and unlock the access point, wherein theelectronic lock is in communication with the entry management device orwherein the electronic lock is in communication with the entrymanagement device via the software platform, and wherein the actionincludes sending a command to the electronic lock to unlock the accesspoint if the NFT or the image associated with the NFT is authenticated.3. The system of claim 1, wherein the NFT or the image associated withthe NFT is non-transferable.
 4. The system of claim 1, wherein theaction includes exchanging a currency, providing data, or instructing adevice connected to the software platform or the entry management deviceto perform a second action.
 5. The system of claim 1, wherein the NFT orthe image associated with the NFT includes a virtual key.
 6. An entrymanagement system comprising: a first entry management device includinga housing comprising a camera; a second entry management deviceincluding a housing comprising a camera; and a software platform;wherein the first entry management device and the second entrymanagement device are in communication with the software platform;wherein the first entry management device is operable to detect anobject, a person, or an event, or to receive a detection of the object,the person, or the event from a device connected to the softwareplatform or the first entry management device; wherein the second entrymanagement device is operable to receive an alert relating to thedetection of the object, the person, or the event; and wherein thesecond entry management device is operable to perform an action uponreceiving the alert relating to the detection of the object, the person,or the event.
 7. The system of claim 6, wherein the action includessending an alert to an electronic device associated with the secondentry management device.
 8. The system of claim 6, wherein the actionincludes instructing a robot, a drone, a camera, or an electronic deviceassociated with the second entry management device to perform a secondaction.
 9. The system of claim 8, wherein the second action includespatrolling an area, maintaining a position, following the object or theperson, changing a position, and/or capturing video, imagery, and/oraudio data.
 10. The system of claim 6, further comprising an accesspoint comprising an electronic lock that is operable to lock and unlockthe access point, wherein the electronic lock is in communication withthe first entry management device or wherein the electronic lock is incommunication with the first entry management device via the softwareplatform, and wherein the first entry management device is operable tosend a command to the electronic lock to unlock the access point if thefirst entry management device reads or receives a virtual key andverifies the virtual key.
 11. The system of claim 6, wherein the secondentry management device includes a plurality of entry management deviceswithin a predetermined distance of the first entry management device.12. The system of claim 6, wherein the second entry management deviceincludes a plurality of entry management devices within a geofenceincluding the second entry management device and the first entrymanagement device.
 13. The system of claim 6, wherein the detection ofthe object, the person, or the event includes detection of a crime, anunauthorized person, and/or a vehicle.
 14. The system of claim 6,wherein the action includes instructing a drone or robot which is hiddenor obscured to patrol an area, follow the object or the person, and/orcapture video, imagery, and/or audio data.
 15. The system of claim 6,wherein the action includes capturing thermal imagery of the object orthe person or instructing another device to capture thermal imagery ofthe object or the person.
 16. The system of claim 6, wherein the actionincludes a drone or robot marking an object or person with a marker or adye.
 17. The system of claim 6, wherein the first entry managementdevice, the second entry management device, a drone connected to thefirst entry management device, the second entry management device, orthe software platform, a robot connected to the first entry managementdevice, the second entry management device, or the software platform, oranother device connected to the first entry management device, thesecond entry management device, or the software platform is waterproof,water resistant, fireproof, or bulletproof.
 18. An entry managementsystem comprising: a first entry management device including a housingcomprising a camera; a second entry management device including ahousing comprising a camera; and a software platform; wherein the firstentry management device and the second entry management device are incommunication with the software platform; wherein the first entrymanagement device is operable to detect an object, a person, or anevent, or to receive a detection of the object, the person, or the eventfrom a device connected to the software platform or the first entrymanagement device; wherein the second entry management device isoperable to receive an alert relating to the detection of the object,the person, or the event; wherein the second entry management device isoperable to perform an action upon receiving the alert relating to thedetection of the object, the person, or the event; wherein the camera ofthe first entry management device is operable to read a non-fungibletoken (NFT) or an image associated with the NFT displayed on at leastone electronic device; wherein the software platform is operable toauthenticate the NFT or the image associated with the NFT; and whereinthe entry management device is operable to perform an action upon theauthentication of the NFT or the image associated with the NFT.
 19. Thesystem of claim 18, further comprising an access point comprising anelectronic lock that is operable to lock and unlock the access point,wherein the electronic lock is in communication with the first entrymanagement device or wherein the electronic lock is in communicationwith the first entry management device via the software platform, andwherein the action includes sending a command to the electronic lock tounlock the access point if the NFT or the image associated with the NFTis authenticated.
 20. The system of claim 18, wherein the actionincludes sending an alert to an electronic device associated with thesecond entry management device.